Search results

1 – 10 of 329
To view the access options for this content please click here
Article
Publication date: 6 June 2016

Zhengbiao Han, Shuiqing Huang, Huan Li and Ni Ren

This paper uses the GB/T20984-2007 multiplicative method to assess the information security risk of a typical digital library in compliance with the principle and thought…

Abstract

Purpose

This paper uses the GB/T20984-2007 multiplicative method to assess the information security risk of a typical digital library in compliance with the principle and thought of ISO 27000. The purpose of this paper is to testify the feasibility of this method and provide suggestions for improving information security of the digital library.

Design/methodology/approach

This paper adopts convenience sampling to select respondents. The assessment of assets is through analyzing digital library-related business and function through a questionnaire which collects data to determine asset types and the importance of asset attributes. The five-point Likert scale questionnaire method is used to identify the threat possibility and its influence on the assets. The 12 respondents include directors and senior network technicians from the editorial department, comic library, children’s library, counseling department and the learning promotion centre. Three different Guttman scale questionnaires, tool testing and on-site inspection are combined to identify and assess vulnerabilities. There were different Guttman scale questionnaires for management personnel, technical personnel and general librarian. In all, 15 management librarians, 7 technical librarians and 72 ordinary librarians answered the vulnerability questionnaire. On-site inspection was conducted on the basis of 11 control domains of ISO 27002. Vulnerabilities were scanned using remote security evaluation system NSFOCUS. The scanning covered ten IP sections and a total of 81 hosts.

Findings

Overall, 2,792 risk scores were obtained. Among them, 282 items (accounting for 10.1 per cent of the total) reached the high risk level; 2 (0.1 per cent) reached the very high risk level. High-risk items involved 26 threat types (accounting for 44.1 per cent of all threat types) and 13 vulnerability types (accounting for 22.1 per cent of all vulnerability types). The evaluation revealed that this digital library faces seven major hidden dangers in information security. The assessment results were well accepted by staff members of this digital library, which testified to the applicability of this method to a Chinese digital library.

Research limitations/implications

This paper is only a case study of a typical Chinese digital library using a digital library information security assessment method. More case-based explorations are necessary to prove the feasibility of the assessing strategy proposed in this study.

Originality/value

Based on the findings of recent literature, the authors found that very few researchers have made efforts to develop methods for calculating the indicators for digital library information security risk assessment. On the basis of ISO 27000 and other related information security standards, this case study proposed an operable method of digital library information security risk assessment and used it to assess a the information security of a typical Chinese digital library. This study can offer insights for formulating a digital library information security risk assessment scale.

Details

The Electronic Library, vol. 34 no. 3
Type: Research Article
ISSN: 0264-0473

Keywords

To view the access options for this content please click here
Article
Publication date: 15 May 2017

Hong-Xin Cui, Ke Feng, Huan-Liang Li and Jin-Hua Han

To improve the trajectory tracking accuracy of 6R decoupled manipulator in singularity region, this paper aims to propose a singularity avoidance algorithm named…

Abstract

Purpose

To improve the trajectory tracking accuracy of 6R decoupled manipulator in singularity region, this paper aims to propose a singularity avoidance algorithm named “singularity separation plus improved Gaussian distribution damped reciprocal”.

Design/methodology/approach

The manipulator is divided into forearm and wrist, and the corresponding singularity factors are separated based on kinematics calculation. Singularity avoidance is achieved by replacing the common reciprocal with the improved Gaussian distribution damped reciprocal.

Findings

Compared with common damped reciprocal algorithm and classical Gaussian distribution algorithm, the continuity of the proposed algorithm is improved and the tracking error is minimized. The simulation and experiment results prove effectiveness and practicability of the proposed algorithm.

Originality/value

This study has an important significance to improve the efficiency and operation accuracy of 6R decoupled manipulator.

Details

Industrial Robot: An International Journal, vol. 44 no. 3
Type: Research Article
ISSN: 0143-991X

Keywords

To view the access options for this content please click here
Article
Publication date: 7 November 2016

Wen Pei and Jeng-Huan Li

The credit card business has been one of the key businesses for banks in Taiwan. The purpose of this paper is to use competitive dynamics and structured context analysis…

Abstract

Purpose

The credit card business has been one of the key businesses for banks in Taiwan. The purpose of this paper is to use competitive dynamics and structured context analysis (SCA) to explore the competition relationships among market, resources, and strategies concerning the credit card issued banks in Taiwan.

Design/methodology/approach

The market commonality and resource similarity analysis of competitive dynamics in the first stage obtained the competitive mapping of four major credit card issue banks, as well as the differences of competition strategy. In the second stage, 1,968 pieces of data on credit card news from 2013 to 2014 were collected. SCA was used to analyze the competitive action, competitive response, number of responses, response lag, and response order.

Findings

The competitor mapping and four hypothesis obtained from competitive dynamics correspond to the credit card competition strategy, as obtained from SCA.

Originality/value

This research combined competitive dynamics and SCA to analyze the credit cards market in Taiwan. The research model could be used in the other financial market.

Details

Kybernetes, vol. 45 no. 10
Type: Research Article
ISSN: 0368-492X

Keywords

To view the access options for this content please click here
Article
Publication date: 5 September 2016

Weiwei Li, Chong Wu, He Dong, Huan Wang and Mei Li

Coal and power generation are related upstream and downstream industries. Coal price marketization and electricity price regulation have caused the price of coal to be…

Abstract

Purpose

Coal and power generation are related upstream and downstream industries. Coal price marketization and electricity price regulation have caused the price of coal to be sensitive to the benefits of generators. The paper aims to discuss these issues.

Design/methodology/approach

As a financial tool, contracts for differences can both help balance interests and reduce risks caused by spot price fluctuation. This thesis regards coal demand as a triangular fuzzy stochastic variable while directing a levelling consideration towards risk returns for coal and power enterprises that are involved in coal generation contracts for differences. Risk and benefit measurement models were established between coal suppliers and power generators, and risk and benefit balance optimization models for contract negotiation were constructed.

Findings

A numerical example showed that the above models can be effectively used to avoid the risks of coal-electricity parties.

Originality/value

This thesis regards coal demand as a triangular fuzzy random variable while directing a levelling consideration towards the risk return to coal and power enterprises that are involved with coal generation contracts for differences. The features of this thesis are the following: demand information is regarded as a fuzzy random variable instead of a random variable. With historical data, sales experience and increasingly clear macro-economic conditions, coal and power enterprises are able to make a fuzzy decision – to a certain extent – when the transaction approaches. Accurate market information enables the supply chain system to satisfy the clients’ needs better, improve the profit level or avoid severe financial damages; by developing a feasible set of contracts for different parameters, it is possible to estimate whether the price difference enables supply chain coordination, requires changes or gives accounts to all involved parties of the supply chain; and without the assumption that the traditional M-V rule is unfavourable to decision makers, this thesis proposes the prospect M-V rule, which involves decision makers’ projections of future coal generation prices and enables wide applicability of the response method to contracts for differences.

To view the access options for this content please click here
Article
Publication date: 1 February 2003

Colin Clarke‐Hill, Huaning Li and Barry Davies

Co‐operation and competition characterise the inter‐firm relationships in strategic alliances. This article proposes a paradox approach to studying co‐operation and…

Abstract

Co‐operation and competition characterise the inter‐firm relationships in strategic alliances. This article proposes a paradox approach to studying co‐operation and competition. It explains the paradox perspective and provides an analytic framework for the paradox of co‐operation and competition. In the light of the paradoxical nature, it advocates a multi‐paradigm approach to co‐operative and competitive strategies, which combines strategic positioning, the resource‐based view and game theory. The article suggests that the multi‐paradigms can not only encompass the contradictions of the paradox from the different perspectives, but also emulate the individual ones and provide a holistic picture. The multi‐paradigm approach therefore establishes a better methodology basis than fragmented orthodox theories in exploring the contradictory, interactive and dynamic nature.

Details

Management Research News, vol. 26 no. 1
Type: Research Article
ISSN: 0140-9174

Keywords

To view the access options for this content please click here
Article
Publication date: 29 July 2014

Xicheng Li

The mathematical model of a two-phase Lamé-Clapeyron-Stefan problem for a semi-infinite material with a density jump is considered. The purpose of this paper is to study…

Abstract

Purpose

The mathematical model of a two-phase Lamé-Clapeyron-Stefan problem for a semi-infinite material with a density jump is considered. The purpose of this paper is to study the analytical solutions of the models and show the performance of several parameters.

Design/methodology/approach

To describe the heat conduction, the Caputo type time fractional heat conduction equation is used and a convective term is included since the changes in density give rise to motion of the liquid phase. The similarity variables are used to simplify the models.

Findings

The analytical solutions describing the changes of temperature in both liquid and solid phases are obtained. For the solid phase, the solution is given in the Wright function form. While for the liquid phase, since the appearance of the advection term, an approximate solution in series form is given. Based on the solutions, the performance of the parameters is discussed in detail.

Originality/value

From the point of view of mathematics, the moving boundary problems are nonlinear, so barely any analytical solutions for these problems can be obtained. Furthermore, there are many applications in which a material undergoes phase change, such as in melting, freezing, casting and cryosurgery.

Details

International Journal of Numerical Methods for Heat & Fluid Flow, vol. 24 no. 6
Type: Research Article
ISSN: 0961-5539

Keywords

To view the access options for this content please click here
Article
Publication date: 4 September 2009

Peng Du, Jun Wang, Weijia Jia, Liusheng Huang and Huan Li

Time slot allocation in world interoperability for microwave access (WiMax) mesh networks is controlled by a centralized scheduling algorithm, as specified in the IEEE…

Abstract

Purpose

Time slot allocation in world interoperability for microwave access (WiMax) mesh networks is controlled by a centralized scheduling algorithm, as specified in the IEEE standard 802.16. The scheduling algorithm should be able to minimize the total transmission time for all traffic flows. The purpose of this paper is to investigate the multi‐channel scheduling problem in WiMax mesh networks, in order to explore the potential of simultaneous transmissions and thus minimize the total transmission time.

Design/methodology/approach

The paper first analyzes how many channels are sufficient for the avoidance of interference, then presents an efficient scheduling algorithm along with the channel assignment strategy for time slot allocation. Particularly, for networks with chain topology, the paper provides an optimal solution to minimize the total transmission time.

Findings

The simulation results show that this scheme can improve the system performance substantially as compared with the single‐channel system. Also, it is observed that double‐channel settings may provide a performance similar to the multiple channels.

Practical implications

The algorithm presented in this paper is conformed to the IEEE standard 802.16‐2004; so it is suitable for WiMax mesh networks.

Originality/value

The paper is of value in presenting a scheduling and channel assignment schema for multi‐channel WiMax mesh networks. The work is also important for the study of time division multiple access (TDMA)‐based multi‐channel wireless mesh networks.

Details

International Journal of Pervasive Computing and Communications, vol. 5 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

To view the access options for this content please click here
Article
Publication date: 1 February 2004

Huaning Li and Colin M. Clarke‐Hill

This paper analyses the investment patterns of Sino‐British joint ventures in China. The research is based on the data of 551 Sino‐British joint ventures formed over the…

Abstract

This paper analyses the investment patterns of Sino‐British joint ventures in China. The research is based on the data of 551 Sino‐British joint ventures formed over the period of 1983 to 1996. It aims to provide an overview of Sino‐British joint ventures' investment in China and to explain the investment conditions. The article analyses the investment patterns from the dimensions of investment value, geographical location, industry sector and equity ownership. To explain the formation of the patterns, it further explores the host country factors of investment based on the policy framework, economic determinants and business facilitation. It reveals the investment trend, the uneven spatial distribution, the sectoral characteristics and the ownership structure of joint ventures. Suggests that government economic strategy and policies towards FDI are imperative in shaping the investment patterns. Locational advantages, economic growth, industrial structures and reform process are major economic factors influencing the investment decisions. Decentralisation of decision making and local governments' facilitation efforts also play a complementary role in attracting foreign investment.

Details

European Business Review, vol. 16 no. 1
Type: Research Article
ISSN: 0955-534X

Keywords

To view the access options for this content please click here
Article
Publication date: 9 November 2015

Wen-Chin Hsu, Chih-Fong Tsai and Jia-Huan Li

Although journal rankings are important for authors, readers, publishers, promotion, and tenure committees, it has been argued that the use of different measures (e.g. the…

Abstract

Purpose

Although journal rankings are important for authors, readers, publishers, promotion, and tenure committees, it has been argued that the use of different measures (e.g. the journal impact factor (JIF), and Hirsch’s h-index) often lead to different journal rankings, which render it difficult to make an appropriate decision. A hybrid ranking method based on the Borda count approach, the Standardized Average Index (SA index), was introduced to solve this problem. The paper aims to discuss these issues.

Design/methodology/approach

Citations received by the articles published in 85 Health Care Sciences and Services (HCSS) journals in the period of 2009-2013 were analyzed with the use of the JIF, the h-index, and the SA index.

Findings

The SA index exhibits a high correlation with the JIF and the h-index (γ > 0.9, p < 0.01) and yields results with higher accuracy than the h-index. The new, comprehensive citation impact analysis of the 85 HCSS journals shows that the SA index can help researchers to find journals with both high JIFs and high h-indices more easily, thereby harvesting references for paper submissions and research directions.

Originality/value

The contribution of this study is the application of the Borda count approach to combine the HCSS journal rankings produced by the two widely accepted indices of the JIF and the h-index. The new HCSS journal rankings can be used by publishers, journal editors, researchers, policymakers, librarians, and practitioners as a reference for journal selection and the establishment of decisions and professional judgment.

Details

Online Information Review, vol. 39 no. 7
Type: Research Article
ISSN: 1468-4527

Keywords

To view the access options for this content please click here
Article
Publication date: 1 October 2001

Paul Blyton, Edmund Heery and Peter Turnbull

Presents 35 abstracts from the 2001 Employment Research Unit Annual conference held at Cardiff Business School in September 2001. Attempts to explore the theme of changing…

Abstract

Presents 35 abstracts from the 2001 Employment Research Unit Annual conference held at Cardiff Business School in September 2001. Attempts to explore the theme of changing politics of employment relations beyond and within the nation state, against a background of concern in the developed economies at the erosion of relatively advanced conditions of work and social welfare through increasing competition and international agitation for more effective global labour standards. Divides this concept into two areas, addressing the erosion of employment standards through processes of restructuring and examining attempts by governments, trade unions and agencies to re‐create effective systems of regulation. Gives case examples from areas such as India, Wales, London, Ireland, South Africa, Europe and Japan. Covers subjects such as the Disability Discrimination Act, minimum wage, training, contract workers and managing change.

Details

Management Research News, vol. 24 no. 10/11
Type: Research Article
ISSN: 0140-9174

Keywords

1 – 10 of 329