Search results

1 – 7 of 7
Open Access
Article
Publication date: 16 September 2022

Jan Sher Akmal, Mika Salmi, Roy Björkstrand, Jouni Partanen and Jan Holmström

Introducing additive manufacturing (AM) in a multinational corporation with a global spare parts operation requires tools for a dynamic supplier selection, considering both cost…

2258

Abstract

Purpose

Introducing additive manufacturing (AM) in a multinational corporation with a global spare parts operation requires tools for a dynamic supplier selection, considering both cost and delivery performance. In the switchover to AM from conventional manufacturing, the objective of this study is to find situations and ways to improve the spare parts service to end customers.

Design/methodology/approach

In this explorative study, the authors develop a procedure – in collaboration with the spare parts operations managers of a case company – for dynamic operational decision-making for the selection of spare parts supply from multiple suppliers. The authors' design proposition is based on a field experiment for the procurement and delivery of 36 problematic spare parts.

Findings

The practice intervention verified the intended outcomes of increased cost and delivery performance, yielding improved customer service through a switchover to AM according to situational context. The successful operational integration of dynamic additive and static conventional supply was triggered by the generative mechanisms of highly interactive model-based supplier relationships and insignificant transaction costs.

Originality/value

The dynamic decision-making proposal extends the product-specific make-to-order practice to the general-purpose build-to-model that selects the mode of supply and supplier for individual spare parts at an operational level through model-based interactions with AM suppliers. The successful outcome of the experiment prompted the case company to begin the introduction of AM into the company's spare parts supply chain.

Details

International Journal of Operations & Production Management, vol. 42 no. 13
Type: Research Article
ISSN: 0144-3577

Keywords

Open Access
Article
Publication date: 21 September 2023

Krishna K. Tummala

This paper examines the decline of the largest working parliamentary democracy in India overtime, but accelerating since 2014 as the Bharatiya Janata Party (BJP), under the…

Abstract

Purpose

This paper examines the decline of the largest working parliamentary democracy in India overtime, but accelerating since 2014 as the Bharatiya Janata Party (BJP), under the leadership of Prime Minister Narendra Modi at the Center (as the federal government is commonly known).

Design/methodology/approach

It is eclectic. Original constitution, along with commentaries, are studied. News outlets, government pronouncements, journal articles, and other media outlets — electronic and print — are also sourced.

Findings

The findings show how three important features in democracy — elections and their outcomes, control of information, and suppression of dissent are widely used to undermine constitutional democracy.

Originality/value

Democracy can be undermined without altering the Constitution itself. It also explains the irony of Modi’s popularity, given the undemocratic practices. As he may continue in office for some time to come, commanding a log-rolling majority, the need of the hour is a united, constructive and effective opposition to ensure a healthy working democracy.

Details

Public Administration and Policy, vol. 26 no. 3
Type: Research Article
ISSN: 1727-2645

Keywords

Open Access
Article
Publication date: 9 October 2023

Andrea Ciacci and Lara Penco

The literature mainly concentrates on the relationships between externally oriented digital transformation (ExtDT), big data analytics capability (BDAC) and business model…

1665

Abstract

Purpose

The literature mainly concentrates on the relationships between externally oriented digital transformation (ExtDT), big data analytics capability (BDAC) and business model innovation (BMI) from an intra-organizational perspective. However, it is acknowledged that the external environment shapes the firm's strategy and affects innovation outcomes. Embracing an external environment perspective, the authors aim to fill this gap. The authors develop and test a moderated mediation model linking ExtDT to BMI. Drawing on the dynamic capabilities view, the authors' model posits that the effect of ExtDT on BMI is mediated by BDAC, while environmental hostility (EH) moderates these relationships.

Design/methodology/approach

The authors adopt a quantitative approach based on bootstrapped partial least square-path modeling (PLS-PM) to analyze a sample of 200 Italian data-driven SMEs.

Findings

The results highlight that ExtDT and BDAC positively affect BMI. The findings also indicate that ExtDT is an antecedent of BMI that is less disruptive than BDAC. The authors also obtain that ExtDT solely does not lead to BDAC. Interestingly, the effect of BDAC on BMI increases when EH moderates the relationship.

Originality/value

Analyzing the relationships between ExtDT, BDAC and BMI from an external environment perspective is an underexplored area of research. The authors contribute to this topic by evaluating how EH interacts with ExtDT and BDAC toward BMI.

Details

Journal of Small Business and Enterprise Development, vol. 31 no. 8
Type: Research Article
ISSN: 1462-6004

Keywords

Open Access
Article
Publication date: 26 July 2021

Weifei Hu, Tongzhou Zhang, Xiaoyu Deng, Zhenyu Liu and Jianrong Tan

Digital twin (DT) is an emerging technology that enables sophisticated interaction between physical objects and their virtual replicas. Although DT has recently gained significant…

12113

Abstract

Digital twin (DT) is an emerging technology that enables sophisticated interaction between physical objects and their virtual replicas. Although DT has recently gained significant attraction in both industry and academia, there is no systematic understanding of DT from its development history to its different concepts and applications in disparate disciplines. The majority of DT literature focuses on the conceptual development of DT frameworks for a specific implementation area. Hence, this paper provides a state-of-the-art review of DT history, different definitions and models, and six types of key enabling technologies. The review also provides a comprehensive survey of DT applications from two perspectives: (1) applications in four product-lifecycle phases, i.e. product design, manufacturing, operation and maintenance, and recycling and (2) applications in four categorized engineering fields, including aerospace engineering, tunneling and underground engineering, wind engineering and Internet of things (IoT) applications. DT frameworks, characteristic components, key technologies and specific applications are extracted for each DT category in this paper. A comprehensive survey of the DT references reveals the following findings: (1) The majority of existing DT models only involve one-way data transfer from physical entities to virtual models and (2) There is a lack of consideration of the environmental coupling, which results in the inaccurate representation of the virtual components in existing DT models. Thus, this paper highlights the role of environmental factor in DT enabling technologies and in categorized engineering applications. In addition, the review discusses the key challenges and provides future work for constructing DTs of complex engineering systems.

Details

Journal of Intelligent Manufacturing and Special Equipment, vol. 2 no. 1
Type: Research Article
ISSN: 2633-6596

Keywords

Open Access
Article
Publication date: 19 September 2023

Mohamad Zreik

This paper aims to examine the USA's policy toward Myanmar or Burma, analyzing the bilateral relationship between the two countries from the pre-colonial period to the present…

Abstract

Purpose

This paper aims to examine the USA's policy toward Myanmar or Burma, analyzing the bilateral relationship between the two countries from the pre-colonial period to the present day. It highlights the implications of political shifts in the system of government in Myanmar for the bilateral relationship with the USA, particularly after the 1962 coup and the emergence of rising regional powers like China. The paper also shows how the economic role of Myanmar has increased, leading to more equal relations with the United States of America.

Design/methodology/approach

This paper employs a qualitative research design, analyzing data from both primary and secondary sources. The methodology includes a literature review and document analysis to gain a comprehensive understanding of the USA–Myanmar bilateral relationship. The research also analyzes political and economic developments in Myanmar and the region, placing the USA policy in a broader context.

Findings

The research finds that the USA has been an influential player in Myanmar's politics and economy. However, with Myanmar's integration into the Chinese Belt and Road Initiative and its accession to Association of Southeast Asian Nations (ASEAN), its economic role has become more significant, leading to a more balanced relationship with the USA. The paper also shows that the USA's policy toward Myanmar has undergone significant changes, particularly after the 2011 easing of sanctions by former President Barack Obama.

Originality/value

Although many works have traced the history of USA–Myanmar ties, this study provides a fresh perspective by setting past events against the backdrop of contemporary geopolitical upheavals, therefore highlighting the complex evolution of their bilateral dynamics. The paper contributes to the literature on the USA–Myanmar bilateral relationship by providing a comprehensive analysis of the relationship from a historical perspective. The research also adds to the discussion of the implications of political and economic developments in Myanmar for the bilateral relationship with the USA. The findings of this study have important implications for policymakers and scholars interested in the USA's role in Southeast Asia and its relations with rising regional powers like China.

Details

Southeast Asia: A Multidisciplinary Journal, vol. 23 no. 3
Type: Research Article
ISSN: 1819-5091

Keywords

Open Access
Article
Publication date: 24 July 2020

Javeed Ahamed Golandaj and Karabasappa Gadigeppa Kallihal

Enormous amount of biomedical wastes (BMW) produced everyday across the world. Management of BMW depends on adherence to protocol. BMW management at generation point, definitely…

4150

Abstract

Purpose

Enormous amount of biomedical wastes (BMW) produced everyday across the world. Management of BMW depends on adherence to protocol. BMW management at generation point, definitely, depends upon the awareness, attitudes and practises of health-care staff, the purpose of this study will assess the awareness, attitude and practise regarding different aspects of BMW.

Design/methodology/approach

An observational with appropriate checklists, and a cross-sectional study, involving questionnaires, was conducted during 7-24 January 2016. The existing system of BMW management, funds, resources, etc., knowledge, attitude and practises about BMW were assessed amongst 273 health-care workers in selected public health-care institutes of Karnataka.

Findings

Of 273 study participants, majority (54%) of them have not received any training pertaining to BMW. The results showed a poor level of knowledge and awareness of BMW management amongst health-care personnel. Merely, 43% of the participants correctly knew the categorization of BMW and its disposal in proper colour-coded bins/bags. Awareness is very poor amongst the lower age group, male participants, lab-technicians/pharmacists and supporting staff. Doctors were good at theoretical knowledge such as rules, legislation and public-health importance of BMW management than the practical aspects such as categorization and colour-coding. Further, the attitude of health-care staff is favourable about BMW. Immunization for hepatitis-B was very poor amongst waste handlers (43%).

Originality/value

As the awareness and practise regarding BMW management were poor across different health-care staff there is a need to conduct periodic training and regular monitoring with special focus on the proper use of personal protective equipment. Further, precautionary immunization should be provided, especially waste handlers and sanitary workers.

Details

Journal of Humanities and Applied Social Sciences, vol. 3 no. 1
Type: Research Article
ISSN: 2632-279X

Keywords

Open Access
Article
Publication date: 17 December 2021

Alexandre Cappellozza, Gustavo Hermínio Salati Marcondes de Moraes, Gilberto Perez and Alessandra Lourenço Simões

This paper aims to investigate the influence of moral disengagement, perceived penalty, negative experiences and turnover intention on the intention to violate the established…

Abstract

Purpose

This paper aims to investigate the influence of moral disengagement, perceived penalty, negative experiences and turnover intention on the intention to violate the established security rules.

Design/methodology/approach

The method used involves two stages of analysis, using techniques of structural equation modeling and artificial intelligence with neural networks, based on information collected from 318 workers of organizational information systems.

Findings

The model provides a reasonable prediction regarding the intention to violate information security policies (ISP). The results revealed that the relationships of moral disengagement and perceived penalty significantly influence such an intention.

Research limitations/implications

This research presents a multi-analytical approach that expands the robustness of the results by the complementarity of each analysis technique. In addition, it offers scientific evidence of the factors that reinforce the cognitive processes that involve workers’ decision-making in security breaches.

Practical implications

The practical recommendation is to improve organizational communication to mitigate information security vulnerabilities in several ways, namely, training actions that simulate daily work routines; exposing the consequences of policy violations; disseminating internal newsletters with examples of inappropriate behavior.

Social implications

Results indicate that information security does not depend on the employees’ commitment to the organization; system vulnerabilities can be explored even by employees committed to the companies.

Originality/value

The study expands the knowledge about the individual factors that make information security in companies vulnerable, one of the few in the literature which aims to offer an in-depth perspective on which individual antecedent factors affect the violation of ISP.

1 – 7 of 7