Search results

1 – 10 of 211
Book part
Publication date: 17 November 2010

Stephen Fineman and Yiannis Gabriel

The social ritual of apology is highly nuanced in Western cultures. At its profoundest, it represents felt and displayed feelings of remorse for injuring another party and…

Abstract

The social ritual of apology is highly nuanced in Western cultures. At its profoundest, it represents felt and displayed feelings of remorse for injuring another party and transgressing a central moral code. The felt regret is accompanied by a strong impulse to right the wrongs caused. The absence of such apology is taken as denial or devaluation of the moral worth of the harmed party, hence the restorative significance of a sincere apology. The restoration, however, is likely to be more symbolic than literal for a deep hurt, as the injury itself cannot be reversed. What is restored by the apology is the dignity of the victim; recognition that they should not have been treated in the way they have been. The moral and relational value of such apologies is nicely captured by Kathleen Gill:The apology is not a thing; it is an act that displays a certain set of beliefs, attitudes, etc. experienced by the offender. More importantly, an apology is not a mechanism for offsetting losses. The apology does not compensate for loss; it is instead a way to acknowledge the value of what was lost. ( Gill, 2000, p. 16 )It follows that this kind of apology implicates emotions beyond feelings of remorse and regret. It involves the expression of feelings of empathy and shame, the former placing the perpetrator in the victim's shoes, the latter signaling ownership and responsibility for having crossed a moral line — and wishing to do something about it. Yet what is felt has also to be performed, and convincingly so if the apology is to provide what Goffman terms a “remedial exchange” (Goffman, 1971). Acts of apologizing are in part cultural and in part institutionalized. In the traditional Catholic Church, for example, the apology ritual contains a confession of sins, plus an act of prayer or restoration to the wronged party. It once also involved penances, such as fasts, sexual continence, pilgrimages, or floggings.

Details

Relational Practices, Participative Organizing
Type: Book
ISBN: 978-0-85724-007-1

Article
Publication date: 13 March 2017

Aggelos Kiayias, Thomas Zacharias and Bingsheng Zhang

This paper aims to investigate the importance of auditing for election privacy via issues that appear in the state-of-the-art implementations of e-voting systems that apply…

Abstract

Purpose

This paper aims to investigate the importance of auditing for election privacy via issues that appear in the state-of-the-art implementations of e-voting systems that apply threshold public key encryption (TPKE) in the client such as Helios and use a bulletin board (BB).

Design/methodology/approach

Argumentation builds upon a formal description of a typical TPKE-based e-voting system where the election authority (EA) is the central node in a star network topology. The paper points out the weaknesses of the said topology with respect to privacy and analyzes how these weaknesses affect the security of several instances of TPKE-based e-voting systems. Overall, it studies the importance of auditing from a privacy aspect.

Findings

The paper shows that without public key infrastructure (PKI) support or – more generally – authenticated BB “append” operations, TPKE-based e-voting systems are vulnerable to attacks where the malicious EA can act as a man-in-the-middle between the election trustees and the voters; hence, it can learn how the voters have voted. As a countermeasure for such attacks, this work suggests compulsory trustee auditing. Furthermore, it analyzes how lack of cryptographic proof verification affects the level of privacy that can be provably guaranteed in a typical TPKE e-voting system.

Originality/value

As opposed to the extensively studied importance of auditing to ensure election integrity, the necessity of auditing to protect privacy in an e-voting system has been mostly overlooked. This paper reveals design weaknesses present in noticeable TPKE-based e-voting systems that can lead to a total breach of voters’ privacy and shows how auditing can be applied for providing strong provable privacy guarantees.

Details

Information & Computer Security, vol. 25 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 August 1991

Observation, either for defence or navigation, has been an objective for man down the centuries. Prehistoric man and medieval lord built settlements and castles on high ground for…

Abstract

Observation, either for defence or navigation, has been an objective for man down the centuries. Prehistoric man and medieval lord built settlements and castles on high ground for a clear view of the approaches. At sea, crowsnests were added to masts to aid navigation. Towards the end of the last century armies used manned balloons for battlefield observation. In the First World War aircraft were used for this purpose. With the development of space rockets came satellites, providing man with the ultimate in navigation aid, military observation, telecommunications and meteorlogical observation.

Details

Aircraft Engineering and Aerospace Technology, vol. 63 no. 8
Type: Research Article
ISSN: 0002-2667

Case study
Publication date: 29 June 2021

Sebastian Prim and Mikael Samuelsson

The case is suitable for strategy or entrepreneurship modules. It is designed to teach students about the importance of implementing formal processes when entering a growth phase…

Abstract

Subject area of the teaching case:

The case is suitable for strategy or entrepreneurship modules. It is designed to teach students about the importance of implementing formal processes when entering a growth phase as well as the complexities, unexpected costs, and benefits that growing a business can bring.

Student level:

The case is aimed at MBA or Master-level students or executive education programmes as part of a strategy or entrepreneurship module.

Brief overview of the teaching case:

Lattice Towers is a South African company in the telecommunications infrastructure sector. They are struggling to generate sufficient cash flow to sustain operations as a result of poor strategic decision-making regarding tower-build site acquisition. To compound matters, the owner has been struggling with health issues related to the stress caused by the crises that Lattice Towers is going through. Recently, however, a multinational publicly listed behemoth in the telecommunications industry, Helios Towers, offered to acquire the company. The acquisition offer seems like a saving grace to the owner; however, Lattice Towers is deeply personal to the him and he would not like to lose the brand. Furthermore, there is a tremendous opportunity for business growth due to the imminent increase in demand for tower infrastructure. But based on the challenging financial position the business currently finds itself in, he might not have the option to keep the business.

Expected learning outcomes:

To develop a decision-making framework and strategy to navigate the business life-cycle stages, from survival to growth

Understand the concepts of uncertainty, risk, and liquidity premiums that apply to entrepreneurship

Understand the stress-related implications for entrepreneurs

Understand the psychological costs and benefits of entrepreneurship

Understand the personal financial implications for entrepreneurship

Details

The Case Writing Centre, University of Cape Town, Graduate School of Business, vol. no.
Type: Case Study
ISSN: 2633-8505
Published by: The Case Writing Centre, University of Cape Town, Graduate School of Business

Keywords

Article
Publication date: 21 March 2011

St. D. Ilcev

The purpose of this paper is to examine the potential applications of stratospheric communication platforms (SCP), which have been recently introduced as an alternative for…

1425

Abstract

Purpose

The purpose of this paper is to examine the potential applications of stratospheric communication platforms (SCP), which have been recently introduced as an alternative for satellite communications.

Design/methodology/approach

Various applications, solutions and services are planned by using aircraft or airship SCP, which could be classified as digital narrowband or broadband, depending on the broadband required. The platforms as base stations can provide service for fixed and mobile applications, with commercial and military solutions. Subscribers will use uplink to the platform for transmitting and receiving information, where onboard SCP switching devices will downlink to the ground station and route traffic directly to other subscribers within the same platform coverage, to another platform via optical inter‐platform links, trough heterogeneous networks including satellite or to the terrestrial telecommunications network. Each SCP can deploy an antenna for large coverage area or a multibeam antenna capable of projecting numerous spot beams within its potential coverage area.

Findings

This paper outlines the findings of fixed and mobile applications, features, testing and some specific development programs of SCP using aircraft solutions, such as SkyTower and airship solutions, such as CRL/TAO/NAL.

Research limitations/implications

Particular consideration is given to the use of SCP for delivery of future broadband, broadcast and multimedia wireless communications including research for new communication, navigation and surveillance (CNS) implications.

Practical implications

SCP will provide communication facilities that can exploit the best features for both terrestrial and satellite schemes.

Originality/value

Emerging solutions of voice, data and video over IP are offered by SCPs operating in the stratosphere at altitudes of up to 25 km.

Details

Aircraft Engineering and Aerospace Technology, vol. 83 no. 2
Type: Research Article
ISSN: 0002-2667

Keywords

Article
Publication date: 28 June 2013

Gao Xian‐Zhong, Hou Zhong‐Xi, Guo Zheng, Zhu Xiong‐Feng, Liu Jian‐Xia and Chen Xiao‐Qian

The purpose of this paper is to propose a methodology to determine the designing parameters for solar powered high‐altitude, long‐endurance (HALE) unmanned aerial vehicles (UAV).

1228

Abstract

Purpose

The purpose of this paper is to propose a methodology to determine the designing parameters for solar powered high‐altitude, long‐endurance (HALE) unmanned aerial vehicles (UAV).

Design/methodology/approach

By depicting solar power distribution on earth, along with the efficiencies analysis of photo‐voltaic cells (P‐cell) and lithium‐sulfur battery (LS‐battery), the influence of energy to concept design parameters is analyzed first. Second, the lift efficiency is determined from ground to 20 km for HALE UAV. Third, the methodology to determine design parameters for HALE UAV is generalized by analyzing the carrying ability of some famous HALE UAVs, such as Zephyr, Helios, and so on.

Findings

Energy is the key constraint on design of HALE UAV. The questions about where HALE UAVs are capable of operating and how long they could work can be answered according to power density distribution on earth. The total mass of HALE UAV can be divided into two parts: one is the constant mass, the other is the mass increasing with area of wing. The total mass can be estimated by the former one; the later one plays an important role in estimating wing load in the designing process.

Practical implications

The only way to enhance carrying ability of HALE UAVs is to redistribute their wing load: lighter structure materials and a better method to fix P‐cell with lighter fundus are the key technologies to enhance HALE UAVs’ carrying ability. At current technological levels, it is not easy to design a UAV to achieve the aim of high‐altitude long‐endurance.

Originality/value

This paper presents a very efficient and convenient method to determine the designing parameters of HALE UAV.

Details

Aircraft Engineering and Aerospace Technology, vol. 85 no. 4
Type: Research Article
ISSN: 0002-2667

Keywords

Article
Publication date: 1 September 1959

MAKING its first appearance nine years ago at the Mining Exhibition at Essen, the Cobra conveyor chain lubricator has been used in many European countries for tray transporters…

Abstract

MAKING its first appearance nine years ago at the Mining Exhibition at Essen, the Cobra conveyor chain lubricator has been used in many European countries for tray transporters, crucible transporters in steelworks, foundries, coke works, and on conveyors and assembly lines for numerous industries. There are two types manufactured, the Cobra 1, which is activated directly by the motion of the transporter, and the Cobra 2, operated by compressed air and controlled by the transporter by means of an actuating arm. The Cobra 1 is used when there is difficulty in employing compressed air or when it is easy to make use of the motion of the conveyor. When compressed air is readily available, however, Cobra 2 is used. It is manufactured by Helios‐Apparate Wetzel & Schlosshauer G.m.b.H., Heidelberg, Germany, and marketed in the U.K. by W. S. Forrest & Co., Almora Hall, Middleton‐St.‐George, Co. Durham.

Details

Industrial Lubrication and Tribology, vol. 11 no. 9
Type: Research Article
ISSN: 0036-8792

Article
Publication date: 25 June 2020

Jason Whalley and Peter Curwen

The purpose of this paper is to chart the growth of Millicom, a Luxembourg based but international operator of cable and mobile telecommunication networks.

Abstract

Purpose

The purpose of this paper is to chart the growth of Millicom, a Luxembourg based but international operator of cable and mobile telecommunication networks.

Design/methodology/approach

A longitudinal case study approach is adopted covering the period 1990–2019 (inclusive). Data are drawn from multiple sources, including annual reports of Millicom and the trade press.

Findings

The analysis of this study highlights the changing geographical focus of Millicom. When founded, it was present in three regions – Africa, Asia and Latin America – but over time, it has concentrated its operations on the latter region. Secondly, Millicom has widened its operational remit to include more lines of business. This reflects the converged strategy that has been adopted in Latin America, where it is now active in cable and mobile telecommunication markets.

Research limitations/implications

The paper illustrates the difficulties of research into privately owned companies and especially those active in the telecommunications industry in the early 1990s.

Practical implications

The analysis of this study highlights the challenges of researching companies active, as the telecommunications sector began to be liberalised. There is limited data in the public domain covering the early 1990s, not least because the Internet as understood today had not yet emerged.

Originality/value

To the best of authors’ knowledge, this is the first academic paper to analyse the internationalisation of Millicom.

Details

Digital Policy, Regulation and Governance, vol. 22 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 7 October 2014

M. Maina Olembo, Timo Kilian, Simon Stockhardt, Andreas Hülsing and Melanie Volkamer

The purpose of this study was to develop and test SCoP. Users find comparing long meaningless strings of alphanumeric characters difficult. While visual hashes – where users…

Abstract

Purpose

The purpose of this study was to develop and test SCoP. Users find comparing long meaningless strings of alphanumeric characters difficult. While visual hashes – where users compare images rather than strings – have been proposed as an alternative, people are unable to sufficiently distinguish more than 30 bits, which does not provide adequate security against collision attacks. Our goal is to improve the situation.

Design/methodology/approach

A visual hash scheme was developed using shapes, colours, patterns and position parameters. It was evaluated in a series of pilot user studies and improved iteratively, leading to SCoP, which encodes 60 distinguishable bits. We tested SCoP further in two follow-up studies, simulating verifying in remote electronic voting and https certificate validation.

Findings

Participants attained an average accuracy rate of 97 per cent with SCoP when comparing two visual hash images, one placed above the other. From the follow-up studies, SCoP was seen to be more promising for the https certificate validation use case, with direct image comparison, while a low average accuracy rate in simulating verifiability in remote electronic voting limits its applicability in an image-recall use case.

Research limitations/implications

Participants achieved high accuracy rates in unrealistic situations, where the images appeared on the screen at the same time and in the same size. Studies in more realistic situations are therefore necessary.

Originality/value

We identify a visual hash scheme encoding a higher number of distinguishable bits than previously reported in literature, and extend the testing to realistic scenarios.

Details

Information Management & Computer Security, vol. 22 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 September 1958

Aylesbury Turned Parts (True Screws) Ltd., Britannia Street, Aylesbury, Bucks, are U.K. agents for the range of Helios vernier calipers made by Schneider & Kern. These can be read…

Abstract

Aylesbury Turned Parts (True Screws) Ltd., Britannia Street, Aylesbury, Bucks, are U.K. agents for the range of Helios vernier calipers made by Schneider & Kern. These can be read down to 0?001 in. over lengths up to 30 in.

Details

Aircraft Engineering and Aerospace Technology, vol. 30 no. 9
Type: Research Article
ISSN: 0002-2667

1 – 10 of 211