Search results

1 – 10 of 40
Article
Publication date: 9 November 2021

Biqin Zhan, Xian Huang, Chenyuan Cai and Honglian Cong

Fully formed knitting technology is a cutting-edge technology in the design and production of knitted apparel. Using this technology and its supporting design system, a new…

Abstract

Purpose

Fully formed knitting technology is a cutting-edge technology in the design and production of knitted apparel. Using this technology and its supporting design system, a new development mode of fully formed knitted apparel with double-layer structure and fake two-piece knitwear is proposed.

Design/methodology/approach

Based on the upper body structure feature points of human body characteristics and single-layer knitted garment prototype, a double-layer structure knitted garment pattern was established by pattern expansion method. The model was introduced into SDS-APPEX3 design system for process design, including three aspects consists: the inner vest, the outer blouse and double-layer joint part, analysis of the process and forming principle. Weaving on four-needle bed computerized flat knitting machine of MACH-2XS, through the setting of the machine parameters. Finally, a full-shaped fake two-piece knitted blouse was formed.

Findings

On the basis of single-layer knitted garment pattern, a double-layer garment pattern is constructed, and the design and weaving are completed on the four-needle bed computerized knitting machine of MACH-2XS and its supporting SDS-APPEX3 design system through the fake two-piece double-layer garment style design. The double-layer joint model is an effective reference for the construction of this kind of fake two-piece fully formed knitted clothing.

Originality/value

In this paper, a design and knitting method of fully formed double-layer structure fake two-piece knitted garment is proposed. The integrated knitting of fully formed double-layer structure sweater is realized for the first time, which provides ideas for the development of fully formed double-layer structure knitted clothing style and enriches the fully formed clothing style.

Details

International Journal of Clothing Science and Technology, vol. 34 no. 3
Type: Research Article
ISSN: 0955-6222

Keywords

Book part
Publication date: 3 May 2011

Mary Rice

A story that Robert told in class during this research exposes the tension of simultaneously studying literacy and identity when submission and control are also processes at work…

Abstract

A story that Robert told in class during this research exposes the tension of simultaneously studying literacy and identity when submission and control are also processes at work in the story. There are two pieces of this story. In the first part of the story, Robert relates the narrative. The second part consists of the details of the story he told. Both pieces can be used to illustrate different elements of the tension between studying literacy and identity as a single construct labeled literate identity. In addition to suggesting a metaphor for literacy and identity, Robert's story navigates the constructs of submission and control that Wong (2008) discusses in terms of the aesthetic of motivation. The tension between submission and control when coupled with an exploration of literacy and identity has implications for the notions of resistance to literacy in the field of boys' literacy as well as the being and doing of literacy for the boys in this study.Our class began with the students congratulating Robert on his storytelling. When I inquired further, I found out that Robert had started to tell the legend of Cupid and Psyche in a previous class, but he had run out of time. The rest of the students expressed interest in hearing the story, either for the first time, or to know the end. Initially, his telling ebbed and flowed. He apologized for his lack of fluency and explained he was trying to provide us the parts of the story we would find the most interesting. Eventually he settled into a rhythm and finished 50 minutes later. (Reconstructed field note, December 2009)

Details

Adolescent Boys' Literate Identity
Type: Book
ISBN: 978-0-85724-906-7

Article
Publication date: 7 August 2017

Zhi-Jin Zhong, Tongchen Wang and Minting Huang

The purpose of this paper is to examine the impact of internet censorship, which is represented by the Great Fire Wall, on Chinese internet users’ self-censorship.

3615

Abstract

Purpose

The purpose of this paper is to examine the impact of internet censorship, which is represented by the Great Fire Wall, on Chinese internet users’ self-censorship.

Design/methodology/approach

A 3×2 factorial experiment (n=315) is designed. Different patterns of censorship (soft censorship, compared censorship, and hard censorship) and the justification of internet regulation are involved in the experiment as two factors. The dependent variable is self-censorship which is measured through the willingness to speak about sensitive issues and the behavior of refusing to sign petitions with true names.

Findings

The results show that perceived internet censorship significantly decreases the willingness to talk about sensitive issues and the likelihood of signing petitions with true names. The justification of censorship significantly decreases self-censorship on the behaviors of petition signing. Although there are different patterns of internet censorship that Chinese netizens may encounter, they do not differ from each other in causing different levels of self-censorship.

Research limitations/implications

The subjects are college students who were born in the early 1990s, and the characteristics of this generation may influence the results of the experiment. The measurement of self-censorship could be refined.

Originality/value

The study contributes to the body of literature about internet regulation because it identifies a causal relationship between the government’s internet censorship system and ordinary people’s reaction to the regulation in an authoritarian regime. Unpacking different patterns of censorship and different dimensions of self-censorship depicts the complexity of censoring and being censored.

Details

Internet Research, vol. 27 no. 4
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 June 1953

TWO factories were built recently and production was started in them. Both were engaged on similar types of work and time study was applied in both. In one, the time study…

Abstract

TWO factories were built recently and production was started in them. Both were engaged on similar types of work and time study was applied in both. In one, the time study engineer insisted on determining and applying “permanent” standards although the production flow was intermittent. In the other the time study engineer insisted on setting “temporary” standards because production was intermittent. In both factories incentives were paid based upon the standards fixed.

Details

Work Study, vol. 2 no. 6
Type: Research Article
ISSN: 0043-8022

Article
Publication date: 10 October 2008

Katherine J. Barker, Jackie D'Amato and Paul Sheridon

To make readers aware of the pervasiveness of credit card fraud and how it affects credit card companies, merchants and consumers.

8538

Abstract

Purpose

To make readers aware of the pervasiveness of credit card fraud and how it affects credit card companies, merchants and consumers.

Design/methodology/approach

A range of recent publications in journals and information from internet web sites provide corroboration and details of how fraudsters are using credit cards to steal billions of dollars each year. Numerous schemes and techniques are described in addition to recommendations as to how to help control this growing type of fraud.

Findings

Credit card fraud is a healthy and growing means of stealing billions of dollars from credit card companies, merchants and consumers. This paper offers current information to help understand the techniques used by fraudsters and how to avoid falling prey to them.

Research limitations/implications

This fraud relies on technology currently available and the easy ability to obtain machinery to steal individual identities and account information, and to produce fraudulent credit cards. Information cited is current but could change radically as technological breakthroughs occur. The changing nature of technology also affects the recommendations made to control this fraud.

Practical implications

A very useful source of current information on credit card fraud for bank, credit card companies, merchants, and consumers.

Originality/value

This paper provides specific current information and recommendations regarding a fraud topic that is of interest to a wide audience.

Details

Journal of Financial Crime, vol. 15 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Book part
Publication date: 23 October 2023

Glenn W. Harrison and J. Todd Swarthout

We take Cumulative Prospect Theory (CPT) seriously by rigorously estimating structural models using the full set of CPT parameters. Much of the literature only estimates a subset…

Abstract

We take Cumulative Prospect Theory (CPT) seriously by rigorously estimating structural models using the full set of CPT parameters. Much of the literature only estimates a subset of CPT parameters, or more simply assumes CPT parameter values from prior studies. Our data are from laboratory experiments with undergraduate students and MBA students facing substantial real incentives and losses. We also estimate structural models from Expected Utility Theory (EUT), Dual Theory (DT), Rank-Dependent Utility (RDU), and Disappointment Aversion (DA) for comparison. Our major finding is that a majority of individuals in our sample locally asset integrate. That is, they see a loss frame for what it is, a frame, and behave as if they evaluate the net payment rather than the gross loss when one is presented to them. This finding is devastating to the direct application of CPT to these data for those subjects. Support for CPT is greater when losses are covered out of an earned endowment rather than house money, but RDU is still the best single characterization of individual and pooled choices. Defenders of the CPT model claim, correctly, that the CPT model exists “because the data says it should.” In other words, the CPT model was borne from a wide range of stylized facts culled from parts of the cognitive psychology literature. If one is to take the CPT model seriously and rigorously then it needs to do a much better job of explaining the data than we see here.

Details

Models of Risk Preferences: Descriptive and Normative Challenges
Type: Book
ISBN: 978-1-83797-269-2

Keywords

Article
Publication date: 4 May 2012

Michaël Shanks

The purpose of this paper is to re‐examine Milgram's obedience experiment and see how it can be used in management teaching and training. Milgram's discussion of authority…

Abstract

Purpose

The purpose of this paper is to re‐examine Milgram's obedience experiment and see how it can be used in management teaching and training. Milgram's discussion of authority, obedience and defence mechanisms are familiar to psychologists and sociologists, but less so to managers and people of responsibility in corporations, for whom it can help highlight ethical and psychological issues that undermine a sense of responsibility.

Design/methodology/approach

The paper revisits the experiment which shows how conscience can be manipulated by a fake ideal. The possibility of such external manipulation, it is then hypothesized, is favoured by an insufficiently human personal ideal, and by extension an inadequate corporate vision. The absence of an ideal may generate a whole series of “internal manipulations” which are frequently encountered in business life whenever a genuine sense of an ideal has been neutralized, allowing conformity to external pressures to take the upper hand. Examples are provided of such internal manipulations, taken from the world of business.

Findings

Two conditions are suggested for encouraging responsibility. First, a dynamic link with a meaningful personal and corporate ideal and second, a personal call to unmask various forms of self‐avoidance and confront psychological truth in the face of responsible decision. The paper underlines the inescapably personal and not merely social or contextual origin of deviant behaviour.

Originality/value

The paper offers openings for ethical training in responsibility in terms of inwardness (conscience, self‐questioning, virtues) and not simply in terms of incantations to conform to mission statements or charts.

Details

Journal of Global Responsibility, vol. 3 no. 1
Type: Research Article
ISSN: 2041-2568

Keywords

Article
Publication date: 1 March 2005

Andrea Davies and James A. Fitchett

This paper is a practical attempt to contribute to the ongoing reappraisal of the dichotomies and categories that have become prevalent throughout marketing research.

2779

Abstract

Purpose

This paper is a practical attempt to contribute to the ongoing reappraisal of the dichotomies and categories that have become prevalent throughout marketing research.

Design/methodology/approach

The paper reviews current literature on incommensurability and undertakes a comparative re‐examination of two studies.

Findings

How the authors view their research is constituted in retrospective terms through a marketing and consumption logic based on the principles of division, distinction and difference. Re‐examination of some empirical case material suggests that in practice the perceived duality separating research traditions is unsound. A misplaced reading of paradigm incommensurability has resulted in research practices appearing oppositional and static when they are essentially undifferentiated and dynamic. An over‐socialised research epistemology has raised the tangible outcomes of research activities to be dominant in directing research practice.

Research limitations/implications

The comparative analysis is illustrative rather than representative.

Originality/value

The paper offers an applied exposition of theoretical debates in marketing research concerning paradigm incommensurability.

Details

European Journal of Marketing, vol. 39 no. 3/4
Type: Research Article
ISSN: 0309-0566

Keywords

Article
Publication date: 24 February 2012

Alison Faulkner and Thurstine Basset

The purpose of this paper is to review current perspectives on peer support in mental health informed by service user perspectives.

1244

Abstract

Purpose

The purpose of this paper is to review current perspectives on peer support in mental health informed by service user perspectives.

Design/methodology/approach

The paper is informed by a literature review and consultations with five groups of service users engaged in different forms of peer support.

Findings

The findings suggest that there are many benefits to service users from engaging in peer support. These include: shared identity; development and sharing of skills; increased confidence; improved mental health and wellbeing; and the potential for challenging stigma and discrimination. Most difficulties encountered were associated with “intentional peer support”, where service users are employed as peer support workers – these included role conflict, setting boundaries, and ensuring adequate training and support. A key theme that divided opinion was the degree to which peer support should be “professionalised” as part of statutory services.

Practical implications

The findings suggest that it is vital to acknowledge the different views about peer support that arise in different service user and voluntary sector groups: views about such core issues as payment, equality, and professionalisation. Ultimately, peer support arises from people wanting to create their own support networks; any plans to formalise it from within statutory services need to acknowledge that pre‐existing grassroots expertise.

Originality/value

Recent developments mean that peer support, which originated from the grassroots of service user experience, has taken a new direction through becoming incorporated into statutory services. This paper looks at some of the benefits and pitfalls of these developments informed by the views of service users.

Details

Mental Health and Social Inclusion, vol. 16 no. 1
Type: Research Article
ISSN: 2042-8308

Keywords

Article
Publication date: 1 November 1909

The Society of the White Cross of Geneva appears to have been founded with the object of organising on an international basis the attempts that are being made at the present time…

Abstract

The Society of the White Cross of Geneva appears to have been founded with the object of organising on an international basis the attempts that are being made at the present time in civilised countries to bring under control, and if possible to stamp out, certain abuses, frauds, and other injurious factors more or less existent in modern civilised life. Among the subjects to be dealt with are mentioned “les empoisonnements alimentaires,” and adulteration generally, and the principal part of the business of the International Congress which met at Geneva last year and whose second sitting has just ended in Paris, appears to have related to food questions. The objects aimed at by the society are, no doubt, excellent, but they are hardly likely to be attained if the procedure followed in certain respects at the Geneva and Paris Congresses is adopted in the future. Many of the questions brought before these Congresses were of a highly technical nature, and, for this reason, it was not only very desirable, but absolutely necessary that the matters under discussion should have been dealt with, so far as time allowed, by a thoroughly representative international body composed exclusively of scientific and legal experts of recognised position in their respective countries—that is to say, if the conclusions arrived at were to be taken as representing a serious expression of authoritative opinion. It does not appear that the conclusions and resolutions of these Congresses were arrived at by meetings constituted on these lines, and it is probably for this reason that very little, if any, impression has been produced by the gatherings referred to. The initial mistake appears to have been the admission of a number of people who were obviously only interested in the commercial aspects of the subjects dealt with, and who were sufficiently numerous and persistent to influence the meetings in directions favourable to what were declared to be the “requirements” of trade.

Details

British Food Journal, vol. 11 no. 11
Type: Research Article
ISSN: 0007-070X

1 – 10 of 40