Search results

1 – 10 of 595
Content available
Article
Publication date: 1 February 2004

1421

Abstract

Details

Aircraft Engineering and Aerospace Technology, vol. 76 no. 1
Type: Research Article
ISSN: 0002-2667

Keywords

Open Access
Article
Publication date: 8 September 2021

Haijian Li, Junjie Zhang, Zihan Zhang and Zhufei Huang

This paper aims to use active fine lane management methods to solve the problem of congestion in a weaving area and provide theoretical and technical support for traffic control

1033

Abstract

Purpose

This paper aims to use active fine lane management methods to solve the problem of congestion in a weaving area and provide theoretical and technical support for traffic control under the environment of intelligent connected vehicles (ICVs) in the future.

Design/methodology/approach

By analyzing the traffic capacities and traffic behaviors of domestic and foreign weaving areas and combining them with field investigation, the paper proposes the active and fine lane management methods for ICVs to optimal driving behavior in a weaving area. The VISSIM simulation of traffic flow vehicle driving behavior in weaving areas of urban expressways was performed using research data. The influence of lane-changing in advance on the weaving area was evaluated and a conflict avoidance area was established in the weaving area. The active fine lane management methods applied to a weaving area were verified for different scenarios.

Findings

The results of the study indicate that ICVs complete their lane changes before they reach a weaving area, their time in the weaving area does not exceed the specified time and the delay of vehicles that pass through the weaving area decreases.

Originality/value

Based on the vehicle group behavior, this paper conducts a simulation study on the active traffic management control-oriented to ICVs. The research results can optimize the management of lanes, improve the traffic capacity of a weaving area and mitigate traffic congestion on expressways.

Details

Journal of Intelligent and Connected Vehicles, vol. 4 no. 2
Type: Research Article
ISSN: 2399-9802

Keywords

Open Access
Article
Publication date: 6 November 2023

Mohammad Tayeh, Rafe’ Mustafa and Adel Bino

This study investigated the impact of corporate ownership structure on agency costs in the insurance industry.

Abstract

Purpose

This study investigated the impact of corporate ownership structure on agency costs in the insurance industry.

Design/methodology/approach

The study sample included 23 insurance companies listed on the Amman Stock Exchange (ASE) from 2010 to 2019. Panel regression was used to account for the firm- and time-specific unobservable variables and system-GMM estimation was used to address endogeneity concerns.

Findings

The results show that managerial ownership positively (negatively) affects selling, general and administrative (SG&A) expenses (assets turnover), implying that unmonitored managers engage in activities that serve their own interests rather than those of shareholders. The largest shareholder's ownership has no impact on agency costs, implying that the ownership of the largest shareholder is irrelevant. However, as the wedge between the percentage of capital owned by the largest shareholders and managers increases, SG&A expenses (efficiency ratio) decrease (increases), indicating that the existence of large non-management shareholders reduces agency costs. After accounting for the endogeneity problem, the impact of ownership structure on agency costs measured by asset turnover remains robust.

Originality/value

To the best of the authors' knowledge, this study is the first to provide unique evidence and useful insights into the determinants of agency costs from a frontier market in the Middle East and North Africa (MENA), with a focus on the insurance sector. Additionally, this study uses a new measure of separation between ownership and control by calculating the wedge between managers' and large shareholders' ownership.

Details

Journal of Economics, Finance and Administrative Science, vol. 28 no. 56
Type: Research Article
ISSN: 2077-1886

Keywords

Content available
Article
Publication date: 1 March 2008

Richard C. Becherer, Mark E. Mendenhall and Karen Ford Eickhoff

Entrepreneurship and leadership may flow from the same genealogical source and the appearance of separation of the two constructs may be due to differences in the contexts through…

1690

Abstract

Entrepreneurship and leadership may flow from the same genealogical source and the appearance of separation of the two constructs may be due to differences in the contexts through which the root phenomenon flows. Entrepreneurship and leadership are figuratively different manifestations of the need to create. To better understand the origin of entrepreneurship and leadership, research must first focus on the combinations or hierarchy of traits that are necessary, but perhaps not sufficient, to stimulate the two constructs. Factors that trigger a drive to create or take initiative within the individual in the context of a particular circumstance should be identified, and the situational factors that move the individual toward more traditional leader or classic entrepreneurial-type behaviors need to be understood.

Details

New England Journal of Entrepreneurship, vol. 11 no. 2
Type: Research Article
ISSN: 2574-8904

Open Access
Article
Publication date: 29 June 2021

C. Ahamed Saleel, Saad Ayed Alshahrani, Asif Afzal, Maughal Ahmed Ali Baig, Sarfaraz Kamangar and T.M. Yunus Khan

Joule heating effect is a pervasive phenomenon in electro-osmotic flow because of the applied electric field and fluid electrical resistivity across the microchannels. Its effect…

608

Abstract

Purpose

Joule heating effect is a pervasive phenomenon in electro-osmotic flow because of the applied electric field and fluid electrical resistivity across the microchannels. Its effect in electro-osmotic flow field is an important mechanism to control the flow inside the microchannels and it includes numerous applications.

Design/methodology/approach

This research article details the numerical investigation on alterations in the profile of stream wise velocity of simple Couette-electroosmotic flow and pressure driven electro-osmotic Couette flow by the dynamic viscosity variations happened due to the Joule heating effect throughout the dielectric fluid usually observed in various microfluidic devices.

Findings

The advantages of the Joule heating effect are not only to control the velocity in microchannels but also to act as an active method to enhance the mixing efficiency. The results of numerical investigations reveal that the thermal field due to Joule heating effect causes considerable variation of dynamic viscosity across the microchannel to initiate a shear flow when EDL (Electrical Double Layer) thickness is increased and is being varied across the channel.

Originality/value

This research work suggest how joule heating can be used as en effective mechanism for flow control in microfluidic devices.

Details

Frontiers in Engineering and Built Environment, vol. 1 no. 2
Type: Research Article
ISSN: 2634-2499

Keywords

Open Access
Article
Publication date: 18 April 2023

Heng Xu and Nan Zhang

Privacy scholars appear to struggle in conceptualizing blockchain from a privacy perspective: is it a privacy-enhancing mechanism like differential privacy, a privacy-intruding…

1391

Abstract

Purpose

Privacy scholars appear to struggle in conceptualizing blockchain from a privacy perspective: is it a privacy-enhancing mechanism like differential privacy, a privacy-intruding tool like third-party cookies or a technology orthogonal to the issue of privacy? Blockchain does not seem to neatly fit into any of these buckets that we traditionally use to gauge the privacy implications of information technologies. In this article, the authors argue that blockchain transcends the extant conceptualization of privacy because it modifies the nature of data flow upon which the modern concept of privacy is based.

Design/methodology/approach

The authors introduce a conceptualization of blockchain as a new mechanism for data management. Then, following this conceptualization, the authors present a functional review of blockchain, summarizing the features it provides for the data it manages. This review sets up the discussion of how blockchain redefines data flow by separating the power of collection, access and query of data to different entities. After illustrating how this change regrounds privacy concerns in a blockchain system, the authors conclude with a discussion of the recommendations for future privacy research on blockchain.

Findings

The authors demonstrate that blockchain, by design, separates three core data-centric operations that are assumed to be inextricably linked in the canonical conceptualization of privacy: the collection, access and query of data. Collection means to capture and then store the data; access means to modify or augment the data and query means the ability to test or verify certain properties of the data (e.g. whether a bank account has a zero balance). Traditionally, any entities that collect data can evidently read, modify or query the same data as they wish. With blockchain, however, an entity that stores the data may not be able to modify the data, yet an entity that cannot even read the data may be able to verify certain properties of the data.

Originality/value

Privacy scholars appear to struggle in conceptualizing blockchain from a privacy perspective: is it a privacy-enhancing mechanism like differential privacy, a privacy-intruding tool like third-party cookies or a technology orthogonal to the issue of privacy? In this article, the authors aim to respond to this important question.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 4 January 2021

Radosław Wajman

Crystallization is the process widely used for components separation and solids purification. The systems for crystallization process evaluation applied so far, involve numerous…

2421

Abstract

Purpose

Crystallization is the process widely used for components separation and solids purification. The systems for crystallization process evaluation applied so far, involve numerous non-invasive tomographic measurement techniques which suffers from some reported problems. The purpose of this paper is to show the abilities of three-dimensional Electrical Capacitance Tomography (3D ECT) in the context of non-invasive and non-intrusive visualization of crystallization processes. Multiple aspects and problems of ECT imaging, as well as the computer model design to work with the high relative permittivity liquids, have been pointed out.

Design/methodology/approach

To design the most efficient (from a mechanical and electrical point of view) 3D ECT sensor structure, the high-precise impedance meter was applied. The three types of sensor were designed, built, and tested. To meet the new concept requirements, the dedicated ECT device has been constructed.

Findings

It has been shown that the ECT technique can be applied to the diagnosis of crystallization. The crystals distribution can be identified using this technique. The achieved measurement resolution allows detecting the localization of crystals. The usage of stabilized electrodes improves the sensitivity of the sensor and provides the images better suitable for further analysis.

Originality/value

The dedicated 3D ECT sensor construction has been proposed to increase its sensitivity in the border area, where the crystals grow. Regarding this feature, some new algorithms for the potential field distribution and the sensitivity matrix calculation have been developed. The adaptation of the iterative 3D image reconstruction process has also been described.

Details

Sensor Review, vol. 41 no. 1
Type: Research Article
ISSN: 0260-2288

Keywords

Open Access
Article
Publication date: 15 August 2022

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore…

6795

Abstract

Purpose

Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore, there are numerous access control models and even more have recently evolved to conform with the challenging requirements of resource protection. That makes it hard to classify the models and decide for an appropriate one satisfying security needs. Therefore, this study aims to guide through the plenty of access control models in the current state of the art besides this opaque accumulation of terms meaning and how they are related.

Design/methodology/approach

This study follows the systematic literature review approach to investigate current research regarding access control models and illustrate the findings of the conducted review. To provide a detailed understanding of the topic, this study identified the need for an additional study on the terms related to the domain of authorization and access control.

Findings

The authors’ research results in this paper are the distinction between authorization and access control with respect to definition, strategies, and models in addition to the classification schema. This study provides a comprehensive overview of existing models and an analysis according to the proposed five classes of access control models.

Originality/value

Based on the authors’ definitions of authorization and access control along with their related terms, i.e. authorization strategy, model and policy as well as access control model and mechanism, this study gives an overview of authorization strategies and propose a classification of access control models providing examples for each category. In contrast to other comparative studies, this study discusses more access control models, including the conventional state-of-the-art models and novel ones. This study also summarizes each of the literature works after selecting the relevant ones focusing on the database system domain or providing a survey, a classification or evaluation criteria of access control models. Additionally, the introduced categories of models are analyzed with respect to various criteria that are partly selected from the standard access control system evaluation metrics by the National Institute of Standards and Technology.

Details

International Journal of Web Information Systems, vol. 18 no. 2/3
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 9 October 2023

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are…

1035

Abstract

Purpose

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are increasingly used in security-critical domains. Current survey works on databases and data security only consider authorization and access control in a very general way and do not regard most of today’s sophisticated requirements. Accordingly, the purpose of this paper is to discuss authorization and access control for relational and NoSQL database models in detail with respect to requirements and current state of the art.

Design/methodology/approach

This paper follows a systematic literature review approach to study authorization and access control for different database models. Starting with a research on survey works on authorization and access control in databases, the study continues with the identification and definition of advanced authorization and access control requirements, which are generally applicable to any database model. This paper then discusses and compares current database models based on these requirements.

Findings

As no survey works consider requirements for authorization and access control in different database models so far, the authors define their requirements. Furthermore, the authors discuss the current state of the art for the relational, key-value, column-oriented, document-based and graph database models in comparison to the defined requirements.

Originality/value

This paper focuses on authorization and access control for various database models, not concrete products. This paper identifies today’s sophisticated – yet general – requirements from the literature and compares them with research results and access control features of current products for the relational and NoSQL database models.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Book part
Publication date: 9 December 2021

Mark Taylor and Richard Kirkham

A policy of surveillance which interferes with the fundamental right to a private life requires credible justification and a supportive evidence base. The authority for such…

Abstract

A policy of surveillance which interferes with the fundamental right to a private life requires credible justification and a supportive evidence base. The authority for such interference should be clearly detailed in law, overseen by a transparent process and not left to the vagaries of administrative discretion. If a state surveils those it governs and claims the interference to be in the public interest, then the evidence base on which that claim stands and the operative conception of public interest should be subject to critical examination. Unfortunately, there is an inconsistency in the regulatory burden associated with access to confidential patient information for non-health-related surveillance purposes and access for health-related surveillance or research purposes. This inconsistency represents a systemic weakness to inform or challenge an evidence-based policy of non-health-related surveillance. This inconsistency is unjustified and undermines the qualities recognised to be necessary to maintain a trustworthy confidential public health service. Taking the withdrawn Memorandum of Understanding (MoU) between NHS Digital and the Home Office as a worked example, this chapter demonstrates how the capacity of the law to constrain the arbitrary or unwarranted exercise of power through judicial review is not sufficient to level the playing field. The authors recommend ‘levelling up’ in procedural oversight, and adopting independent mechanisms equivalent to those adopted for establishing the operative conceptions of public interest in the context of health research to non-health-related surveillance purposes.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

1 – 10 of 595