Search results
1 – 10 of 206Rob Sheffield, Karina R. Jensen and Stephanie Kaudela-Baum
This chapter reviews the key findings and innovation leadership insights from this book, as well as pointing out directions for future research. We find a series of learning…
Abstract
This chapter reviews the key findings and innovation leadership insights from this book, as well as pointing out directions for future research. We find a series of learning insights for people engaged in innovation leadership, at the distinct levels of self-leadership, team leadership, organisational leadership, and ecosystem leadership. We also find commonalities across these levels, as well as differences that reflect the complexity of these different leadership arenas. Leadership practice that orchestrates contributions from diverse viewpoints, seeing itself as with the group, rather than above it, is most likely to help turn ideas into value in repeatable ways. We also find evidence that mindset, skills, and behaviours are all important in the make-up of competencies. We point to the requirement for further research at all four levels, to bring further insights in what is still an emerging field; as well as a need for more research into competency development for innovation leadership; and we advocate a research approach that emphasises relational leadership, acknowledging that most leadership practice is shared across people.
Details
Keywords
Laura Fargo McKinnon and Kris S. Helge
The purpose of this article is to provide a general review of the concepts of copyright and open access as they relate to library instruction. The authors provide instructional…
Abstract
Purpose
The purpose of this article is to provide a general review of the concepts of copyright and open access as they relate to library instruction. The authors provide instructional advice to librarians on these topics.
Design/methodology/approach
The authors approach the topic from a descriptive and instructional stance. General research on the topics listed above was conducted and is presented as an overview.
Findings
The authors discuss the basics of copyright law, Creative Commons licenses, open access resources and copyright considerations specific to using music in instruction.
Originality/value
This article includes useful tips and resources for instructional librarians, such as where to find open access or Creative Commons content. It is of value to any librarian that utilizes other entities’ content in the course of instruction.
Details
Keywords
Jing Xu, Xizhi Gu, Donghong Ding, Zengxi Pan and Ken Chen
The purpose of this paper is to systematically review the published slicing methods for additive manufacturing (AM), especially the multi-direction and non-layerwise slicing…
Abstract
Purpose
The purpose of this paper is to systematically review the published slicing methods for additive manufacturing (AM), especially the multi-direction and non-layerwise slicing methods, which are particularly suitable for the directed energy deposition (DED) process to improve the surface quality and eliminate the usage of support structures.
Design/methodology/approach
In this paper, the published slicing methods are clarified into three categories: the traditional slicing methods (e.g. the basic and adaptive slicing methods) performed in the powder bed fusion (PBF) system, the multi-direction slicing methods and non-layerwise slicing methods used in DED systems. The traditional slicing methods are reviewed only briefly because a review article already exists for them, and the latter two slicing methods are reviewed comprehensively with further discussion and outlook.
Findings
A few traditional slicing approaches were developed in the literature, including basic and adaptive slicing methods. These methods are efficient and robust when they are performed in the PBF system. However, they are retarded in the DED process because costly support structures are required to sustain overhanging parts and their surface quality and contour accuracy are not satisfactory. This limitation has led to the development of various multi-direction and non-layerwise slicing methods to improve the surface quality and enable the production of overhangs with minimum supports.
Originality/value
An original review of the AM slicing methods is provided in this paper. For the traditional slicing methods and the multi-direction and non-layerwise slicing method, the published slicing strategies are discussed and compared. Recommendations for future slicing work are also provided.
Details
Keywords
Robert Detmering, Anna Marie Johnson, Claudene Sproles, Samantha McClellan and Rosalinda Hernandez Linares
This paper aims to provide an introductory overview and selected annotated bibliography of recent resources on library instruction and information literacy across all library…
Abstract
Purpose
This paper aims to provide an introductory overview and selected annotated bibliography of recent resources on library instruction and information literacy across all library types.
Design/methodology/approach
It introduces and annotates English-language periodical articles, monographs, dissertations and other materials on library instruction and information literacy published in 2014.
Findings
It provides information about each source, discusses the characteristics of current scholarship and highlights sources that contain unique or significant scholarly contributions.
Originality/value
The information may be used by librarians and interested parties as a quick reference to literature on library instruction and information literacy.
Details
Keywords
Tom Schultheiss and Linda Mark
The following classified, annotated list of titles is intended to provide reference librarians with a current checklist of new reference books, and is designed to supplement the…
Abstract
The following classified, annotated list of titles is intended to provide reference librarians with a current checklist of new reference books, and is designed to supplement the RSR review column, “Recent Reference Books,” by Frances Neel Cheney. “Reference Books in Print” includes all additional books received prior to the inclusion deadline established for this issue. Appearance in this column does not preclude a later review in RSR. Publishers are urged to send a copy of all new reference books directly to RSR as soon as published, for immediate listing in “Reference Books in Print.” Reference books with imprints older than two years will not be included (with the exception of current reprints or older books newly acquired for distribution by another publisher). The column shall also occasionally include library science or other library related publications of other than a reference character.
This paper aims to investigate cyber security awareness of the staff of Estonian libraries and gives an overview why libraries could be a target of cyber attacks and why…
Abstract
Purpose
This paper aims to investigate cyber security awareness of the staff of Estonian libraries and gives an overview why libraries could be a target of cyber attacks and why librarians need cyber security at first place.
Design/methodology/approach
The data used in this paper is based on a review of relevant literature to provide an overview of the concept of cyber security, and the results of the original online survey created by the paper’s author, conducted among Estonian librarians. The online questionnaire was developed using the world-recognised human aspects of information security questionnaire (HAIS-Q), which is based on the knowledge-attitudes-behaviour (KAB) methodology. A total of 388 completed questionnaires were returned from employees of academic, specialised, public and school libraries. The results are interpreted on the basis of descriptive statistics and Kruger and Kearney approach.
Findings
The final score of library employees is 86, which is classified as good, but based on the result, two focus areas need more attention than previously, which are the use of devices and prevention and handling of incidents.
Originality/value
The cyber behaviour of library employees has not been widely studied in the world using HAIS-Q and KAB models, and to the best of the authors’ knowledge, no research has been previously carried out in the Estonian library context into cyber security awareness.
Details