Search results

1 – 10 of 38
Article
Publication date: 18 December 2023

Leiming Geng, Ruihua Zhang and Weihua Liu

It is an indispensable part of airworthiness certification to evaluate the fuel tank flammability exposure time for transport aircraft. There are many factors and complex coupling…

Abstract

Purpose

It is an indispensable part of airworthiness certification to evaluate the fuel tank flammability exposure time for transport aircraft. There are many factors and complex coupling relationships affecting the fuel tank flammability exposure time. The current work not only lacks a comprehensive analysis of these factors but also lacks the significance of each factor, the interaction relationship and the prediction method of flammability exposure time. The lack of research in these aspects seriously restricts the smooth development of the airworthiness forensics work of domestic large aircraft. This paper aims to clarify the internal relationship between user input parameters and predict the flammability exposure time of fuel tanks for transport aircraft.

Design/methodology/approach

Based on the requirements of airworthiness certification for large aircraft, an in-depth analysis of the Monte Carlo flammability evaluation source procedures specified in China Civil Aviation Regulation/FAR25 airworthiness regulations was made, the internal relationship between factors affecting the fuel tank flammability exposure time was clarified and the significant effects and interactions of input parameters in the Monte Carlo evaluation model were studied using the response surface method. And the BP artificial neural network training samples with high significance factors were used to establish the prediction model of flammability exposure time.

Findings

The input parameters in the Monte Carlo program directly or indirectly affect the fuel tank flammability exposure time by means of the influence on the flammability limit or fuel temperature. Among the factors affecting flammability exposure time, the cruising Mach number, balance temperature difference and maximum range are the most significant, and they are all positively correlated with flammability exposure time. Although there are interactions among all factors, the degree of influence on flammability exposure time is not the same. The interaction between maximum range and equilibrium temperature difference is more significant than other factors. The prediction model of flammability exposure time based on multifactor interaction and BP neural network has good accuracy and can be applied to the prediction of fuel tank flammability exposure time.

Originality/value

The flammability exposure time prediction model was established based on multifactor interaction and BP neural network. The limited test results were combined with intelligent algorithm to achieve rapid prediction, which saved the test cost and time.

Details

Aircraft Engineering and Aerospace Technology, vol. 96 no. 2
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 13 December 2023

Sofia Martynovich

The interpretation of any emerging form or period in art history was never a trivial task. However, in the case of digital art, technology, becoming an integral part, multiplied…

Abstract

Purpose

The interpretation of any emerging form or period in art history was never a trivial task. However, in the case of digital art, technology, becoming an integral part, multiplied the complexity of describing, systematizing and evaluating it. This article investigates the most common metadata standards for the documentation of art as a broad category and suggests possible next steps toward an extended metadata standard for digital art.

Design/methodology/approach

Describing several techno-cultural phenomena formed in the last decade, manifesting the extendibility of digital art (its ability to be easily extended across multiple modalities), the article, at first, points to the long overdue need to re-evaluate the standards around it. Then it suggests a deeper analysis through a comparative study. In the scope of the study three artworks, The Arnolfini Portrait (Jan van Eyck), an iconic example of the early Renaissance, The World's First Collaborative Sentence (Douglas Davis), a classic example of early Internet art and Fake It Till You Make It (Maya Man), a prominent example of the blockchain art, are examined following the structure of the VRA Core 4.0 standard.

Findings

The comparative study demonstrates that digital art is more multi-semantic than traditional physical art, and requires new taxonomies as well as approaches for data acquisition.

Originality/value

Acknowledging that digital art simply has not yet evolved to the stage of being systematically collected by cultural institutions for documentation, curation and preservation, but otherwise, in the past few years, it has been at the front-center of social, economic and technological trends, the article suggests looking for hints on the future-proof extended metadata standard in some of those trends.

Details

Journal of Documentation, vol. 80 no. 2
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 8 July 2022

Uzair Khan, Hikmat Ullah Khan, Saqib Iqbal and Hamza Munir

Image Processing is an emerging field that is used to extract information from images. In recent years, this field has received immense attention from researchers, especially in…

Abstract

Purpose

Image Processing is an emerging field that is used to extract information from images. In recent years, this field has received immense attention from researchers, especially in the research domains of object detection, Biomedical Imaging and Semantic segmentation. In this study, a bibliometric analysis of publications related to image processing in the Science Expanded Index Extended (SCI-Expanded) has been performed. Several parameters have been analyzed such as annual scientific production, citations per article, most cited documents, top 20 articles, most relevant authors, authors evaluation using y-index, top and most relevant sources (journals) and hot topics.

Design/methodology/approach

The Bibliographic data has been extracted from the Web of Science which is well known and the world's top database of bibliographic citations of multidisciplinary areas that covers the various journals of computer science, engineering, medical and social sciences.

Findings

The research work in image processing is meager in the past decade, however, from 2014 to 2019, it increases dramatically. Recently, the IEEE Access journal is the most relevant source with an average of 115 publications per year. The USA is most productive and its publications are highly cited while China comes in second place. Image Segmentation, Feature Extraction and Medical Image Processing are hot topics in recent years. The National Natural Science Foundation of China provides 8% of all funds for Image Processing. As Image Processing is now becoming one of the most critical fields, the research productivity has enhanced during the past five years and more work is done while the era of 2005–2013 was the area with the least amount of work in this area.

Originality/value

This research is novel in this regard that no previous research focuses on Bibliometric Analysis in the Image Processing domain, which is one of the hot research areas in computer science and engineering.

Article
Publication date: 16 April 2024

Amir Schreiber and Ilan Schreiber

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues…

Abstract

Purpose

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues, including threats like deepfakes and unanticipated AI-induced risks. This study aims to address the insufficient exploration of AI cybersecurity awareness in the current literature.

Design/methodology/approach

Using in-depth surveys across varied sectors (N = 150), the authors analyzed the correlation between the absence of AI risk content in organizational cybersecurity awareness programs and its impact on employee awareness.

Findings

A significant AI-risk knowledge void was observed among users: despite frequent interaction with AI tools, a majority remain unaware of specialized AI threats. A pronounced knowledge difference existed between those that are trained in AI risks and those who are not, more apparent among non-technical personnel and sectors managing sensitive information.

Research limitations/implications

This study paves the way for thorough research, allowing for refinement of awareness initiatives tailored to distinct industries.

Practical implications

It is imperative for organizations to emphasize AI risk training, especially among non-technical staff. Industries handling sensitive data should be at the forefront.

Social implications

Ensuring employees are aware of AI-related threats can lead to a safer digital environment for both organizations and society at large, given the pervasive nature of AI in everyday life.

Originality/value

Unlike most of the papers about AI risks, the authors do not trust subjective data from second hand papers, but use objective authentic data from the authors’ own up-to-date anonymous survey.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 23 April 2024

Chen Zhong, Hong Liu and Hwee-Joo Kam

Cybersecurity competitions can effectively develop skills, but engaging a wide learner spectrum is challenging. This study aims to investigate the perceptions of cybersecurity…

Abstract

Purpose

Cybersecurity competitions can effectively develop skills, but engaging a wide learner spectrum is challenging. This study aims to investigate the perceptions of cybersecurity competitions among Reddit users. These users constitute a substantial demographic of young individuals, often participating in communities oriented towards college students or cybersecurity enthusiasts. The authors specifically focus on novice learners who showed an interest in cybersecurity but have not participated in competitions. By understanding their views and concerns, the authors aim to devise strategies to encourage their continuous involvement in cybersecurity learning. The Reddit platform provides unique access to this significant demographic, contributing to enhancing and diversifying the cybersecurity workforce.

Design/methodology/approach

The authors propose to mine Reddit posts for information about learners’ attitudes, interests and experiences with cybersecurity competitions. To mine Reddit posts, the authors developed a text mining approach that integrates computational text mining and qualitative content analysis techniques, and the authors discussed the advantages of the integrated approach.

Findings

The authors' text mining approach was successful in extracting the major themes from the collected posts. The authors found that motivated learners would want to form a strategic way to facilitate their learning. In addition, hope and fear collide, which exposes the learners’ interests and challenges.

Originality/value

The authors discussed the findings to provide education and training experts with a thorough understanding of novice learners, allowing them to engage them in the cybersecurity industry.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 17 April 2024

Jayne M. Leh

Groups of students were enrolled in a course that sought to produce a three-phase theoretical model over three semesters.

Abstract

Purpose

Groups of students were enrolled in a course that sought to produce a three-phase theoretical model over three semesters.

Design/methodology/approach

A design project to comprehensively address school violence was launched at a university in eastern Pennsylvania.

Findings

This article updates the recent and most critical finding of the project by illuminating specific implications of the importance of teacher training and the development toward competence in recognition of children who are emotionally and psychologically injured through proactive measures such as screening for emotional and psychological well-being.

Research limitations/implications

Although the model has not been tested, screening to identify those in need of emotional support and training to support teachers is clear. Screening and training offer important opportunities to help learners build skills toward resilience to soften the effects of trauma.

Practical implications

A view of the “whole child” with regard to academic success could further foster social and emotional development.

Social implications

Early intervention can prevent the onset of symptoms associated with posttraumatic stress and related disorders. This effort alone may significantly reduce the uncomfortable incidences and perhaps ultimate prevention of the violence that is perpetuated among children.

Originality/value

Preliminary research supports a continued conversation regarding effective tools to find children emotionally and psychologically at-risk, which allows teachers an opportunity for timely emotional and psychological interventions.

Details

Journal of Applied Research in Higher Education, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-7003

Keywords

Article
Publication date: 8 February 2024

Ahmad Farhan Alshira’h, Malek Hamed Alshirah and Abdalwali Lutfi

This study aims to determine the impact of forensic accounting, probability of detections, tax penalties, government spending, tax justice and tax ethics on value-added tax (VAT…

Abstract

Purpose

This study aims to determine the impact of forensic accounting, probability of detections, tax penalties, government spending, tax justice and tax ethics on value-added tax (VAT) evasion.

Design/methodology/approach

The study uses partial least squares-structural equation modeling to examine the connection between tax sanction, probability of detection, tax ethics, tax justice, forensic accounting and government spending on VAT evasion based on 248 responses collected from the retail industry in Jordan.

Findings

The findings also demonstrate that there is a negative correlation between tax sanctions, probability of detection, tax ethics, tax justice, forensic accounting, government spending and VAT evasion efficiency.

Practical implications

The results, considering forensic accounting and government expenditure considerations, may emphasize the importance of the tax sanction, probability of detection, tax ethics, adoption of tax justice in the public sector and tax authority. Additionally, the findings are important for regulators and decision-makers in announcing new laws and strategies for VAT evasion.

Social implications

It turns out that the tax authority and public sector can definitely improve their capacity to protect public funds and limit VAT evasion practices within SMEs by adopting increased tax sanctions, probability of detection, tax ethics, tax justice, forensic accounting and government spending.

Originality/value

Numerous studies have been conducted at the individual level in the context of income tax on the link between tax punishment, probability of detection, tax ethics, tax justice, forensic accounting and tax evasion. This study expands on the scant evidence of this connection to the retail business in the context of VAT avoidance. Additionally, it advances prior studies by integrating fresh elements, such as forensic accounting and government expenditure, that have never been considered in connection to VAT evasion in the retail sector.

Details

Journal of Financial Reporting and Accounting, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1985-2517

Keywords

Article
Publication date: 23 February 2024

Junseon Jeong, Minji Park, Hyeonah Jo, Chunju Kim and Ji Hoon Song

This study identifies the policing pre-deployment training content for Korean experts based on needs assessments. Korean policing is at an excellent level to transfer knowledge…

Abstract

Purpose

This study identifies the policing pre-deployment training content for Korean experts based on needs assessments. Korean policing is at an excellent level to transfer knowledge and skills. Pre-deployment training should be designed systematically and training of trainers approaches should be implemented.

Design/methodology/approach

This study used T-tests, Borich needs assessments, and Locus for Focus model analyses to determine the priorities of needs for pre-deployment training in policing. A survey of 116 experienced experts was conducted, with 87 responding (75%).

Findings

The study identified 26 factors that deployed law enforcement professionals want to learn from pre-deployment training. These factors were categorized into three areas: research, training design and methods and understanding of partner countries and international development cooperation. The nine highest priorities for training needs were related to understanding the status and conditions of police training in the country to which policing experts are deployed.

Research limitations/implications

This study was limited to Korean policing experts. And the study did not evaluate the validity of the training curriculum or indicators.

Practical implications

Technical assistance in international policing development cooperation aims to train future trainers who can train local police. This study found that limited learner information and poor communication skills can lead to ineffective technical assistance.

Originality/value

This study highlights the importance of knowledge transfer and effective pre-deployment training for policing. The findings can be used to improve training programs and police human resource development.

Article
Publication date: 23 February 2024

Patrizio Monfardini, Silvia Macchia and Davide Eltrudis

Knowledge-intensive public organizations (KIPOs henceforth) rely heavily on knowledge as the primary resource to provide public services. This study deals with a specific kind of…

Abstract

Purpose

Knowledge-intensive public organizations (KIPOs henceforth) rely heavily on knowledge as the primary resource to provide public services. This study deals with a specific kind of KIPO in the judiciary system: the courts. The paper aims to explore the court’s managerial and organisational change resulting from the national recovery and resilience plan (NRRP) reform in response to Covid-19, focussing on how this neglected KIPO responds to change, either by showing acts of resistance or undergoing a hybridisation process.

Design/methodology/approach

The paper adopts a qualitative research design, developing an explorative case study to investigate the process of a court’s managerial and organisational change caused by NRRP reform and to shed light on how this neglected KIPO reacts to change, showing resistance acts and developing the hybridisation process. Thirty-one interviews in six months have been conducted with the three main actors in Courts: judges, clerks and trial clerks.

Findings

The paper shows that in this understudied KIPO, judges fiercely resist the managerial logic that decades of reforms have been trying to impose. The recent introduction of an office for speeding up trials (Ufficio Per il Processo (UPP)) was initially opposed. Then, the resistance strategy changed, and judges started to benefit from UPP delegating repetitive and low-value tasks while retaining their core activities. Clerks approached the reform with a more positive attitude, seeing in UPP the mechanism to bridge the distance between them and the judges.

Originality/value

Considering their relevance to society, courts must be more addressed in KIPOs' studies. This paper allows the reader to enter such KIPO and understand its peculiar features. Secondly, the article helps to understand micropractices of resistance that may hinder the effectiveness of managerial reforms.

Details

Journal of Public Budgeting, Accounting & Financial Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1096-3367

Keywords

Article
Publication date: 16 January 2024

Călin Mihail Rangu, Leonardo Badea, Mircea Constantin Scheau, Larisa Găbudeanu, Iulian Panait and Valentin Radu

In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented…

Abstract

Purpose

In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented insurers with operational challenges and increased costs. The assessment of risks for health systems and cyber–physical systems (CPS) necessitates a heightened degree of attention. The significant values of potential damages and claims request a solid insurance system, part of cyber-resilience. This research paper focuses on the emerging cyber insurance market that is currently in the process of standardizing and improving its risk analysis concerning the potential insured entity.

Design/methodology/approach

The authors' approach involves a quantitative analysis utilizing a Likert-style questionnaire designed to survey cyber insurance professionals. The authors' aim is to identify the current methods used in gathering information from potential clients, as well as the manner in which this information is analyzed by the insurers. Additionally, the authors gather insights on potential improvements that could be made to this process.

Findings

The study the authors elaborated it has a particularly important cyber and risk components for insurance area, because it addresses a “niche” area not yet proper addressed in specialized literature – cyber insurance. Cyber risk management approaches are not uniform at the international level, nor at the insurer level. Also, not all insurers can perform solid assessments, especially since their companies should first prove that they are fully compliant with international cyber security standards.

Research limitations/implications

This research has concentrated on analyzing the current practices in terms of gathering information about the insured entity before issuing the cyber insurance policy, level of details concerning the cyber security posture of the insured entity and way such information should be analyzed in a standardized and useful manner. The novelty of this research resides in the analysis performed as detailed above and the proposals in terms of information gathered, depth of analysis and standardization of approach made. Future work on the topic can focus on the standardization process for analyzing cyber risk for insurance clients, to improve the proposal based also on historical elements and trends in the market. Thus, future research can further refine the standardization process to analyze in more depth the way this can be implemented and included in relevant legislation at the EU level.

Practical implications

Proposed improvements include proposals in terms of the level of detail and the usefulness of an independent centralized approach for information gathering and analysis, especially given the re-insurance and brokerage activities. The authors also propose a common practical procedural approach in risk management, with the involvement of insurance companies and certification institutions of cyber security auditors.

Originality/value

The study investigates the information gathered by insurers from potential clients of cyber insurance and the way this is analyzed and updated for issuance of the insurance policy.

Details

The Journal of Risk Finance, vol. 25 no. 2
Type: Research Article
ISSN: 1526-5943

Keywords

1 – 10 of 38