Search results

1 – 10 of 101
Article
Publication date: 11 July 2008

A. Nicolet, F. Zolla, Y. Ould Agha and S. Guenneau

This paper aims to review various techniques used in computational electromagnetism such as the treatment of open problems, helicoidal geometries and the design of arbitrarily…

Abstract

Purpose

This paper aims to review various techniques used in computational electromagnetism such as the treatment of open problems, helicoidal geometries and the design of arbitrarily shaped invisibility cloaks. This seemingly heterogeneous list is unified by the concept of geometrical transformation that leads to equivalent materials. The practical set‐up is conveniently effected via the finite element method.

Design/methodology/approach

The change of coordinates is completely encapsulated in the material properties.

Findings

The most significant examples are the simple 2D treatment of helicoidal geometries and the design of arbitrarily shaped invisibility cloaks.

Originality/value

The paper provides a unifying point of view, bridging several techniques in electromagnetism.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 27 no. 4
Type: Research Article
ISSN: 0332-1649

Keywords

Article
Publication date: 9 October 2007

Carey K.L. Goh and Rob Law

The purpose of this paper is to bring a new scientific theory into practice in the hotel industry.

3424

Abstract

Purpose

The purpose of this paper is to bring a new scientific theory into practice in the hotel industry.

Design/methodology/approach

In‐depth open‐ended interviews were used with eight hospitality practitioners, consumers, and academic researchers.

Findings

The article lays out current practices of security and privacy measurements in the hospitality industry and points out the related limitations. More importantly, it provides insights to hotel operators on possible future applications of a new scientific invention and how it could help alleviate the limitations found in the existing security and privacy measures.

Practical implications

The paper raises the awareness of a new scientific breakthrough that sheds new lights to security and privacy strategies in hotel operations. Hotels, which are able to react quickly to gain the first‐mover‐advantage in leading the industry on the application of such technology, will certainly gain tremendous publicity, and more importantly will be the first to create a new level of confidence in the market on security and privacy strategies implemented in their daily hotel operations.

Originality/value

This paper communicates a recent scientific development and its possible applications in the hotel industry. In this way, it bridges the gap between a scientific invention and its real‐world application. It is expected to provide insights for hoteliers who are interested in technology applications.

Details

International Journal of Contemporary Hospitality Management, vol. 19 no. 7
Type: Research Article
ISSN: 0959-6119

Keywords

Book part
Publication date: 21 March 2023

Bharat Mehra

This chapter introduces the construct of “white pricks” defined as vaccines of moral awakenings to inoculate against racialized trauma in a white-centered majority in library and

Abstract

This chapter introduces the construct of “white pricks” defined as vaccines of moral awakenings to inoculate against racialized trauma in a white-centered majority in library and information science (LIS) education and challenge its hegemonic power, privilege, and oppressions. In keeping with the theme of the book, one male “voice” of color from the margins of a predominantly white-female majority provides a strategic approach to operationalize social justice toward antiracist praxis and decenter white privilege in a professional association’s leadership networks of LIS educators. The narrative also highlights ways to integrate the American Library Association’s ninth principle recently included in its Code of Ethics beyond “lip-service” via social justice actions to change imbalanced power dynamics and discard systemic enactment of dysfunctional behaviors, practices, and policies.

Details

Antiracist Library and Information Science: Racial Justice and Community
Type: Book
ISBN: 978-1-80262-099-3

Keywords

Abstract

Details

Architects, Sustainability and the Climate Emergency
Type: Book
ISBN: 978-1-80382-292-1

Article
Publication date: 16 August 2021

Sebastian Weydner-Volkmann and Linus Feiten

The purpose of this paper is to defend the notion of “trust in technology” against the philosophical view that this concept is misled and unsuitable for ethical evaluation. In…

Abstract

Purpose

The purpose of this paper is to defend the notion of “trust in technology” against the philosophical view that this concept is misled and unsuitable for ethical evaluation. In contrast, it is shown that “trustworthy technology” addresses a critical societal need in the digital age as it is inclusive of IT-security risks not only from a technical but also from a public layperson perspective.

Design/methodology/approach

From an interdisciplinary perspective between philosophy andIT-security, the authors discuss a potential instantiation of a “trustworthy information and communication technology (ICT)”: a solution for privacy respecting video surveillance. Here, strong data protection measures address grave concerns such as the threat of bulk biometric tracking of citizens. In a logical argument, however, the authors show that this technical notion of “trust” needs to be complemented by interlocking trust relations to justify public trust.

Findings

Based on this argument, the authors demonstrate that the philosophical position considering “trust in technology” to denote either “reliability” or “interpersonal trust” is too limited as it fails to address critical aspects of IT-security. In a broader, socio-technical sense, however, it is shown that several distinct accounts of trust – technical, interpersonal and institutional – should meaningfully interlock, to address concerns with ICTs.

Originality/value

This conceptual study demonstrates the potential of “trust in technology” for a more comprehensive evaluation of ICTs within the context of operation. Furthermore, it adds to the discussion of trust in IT-security by highlighting the layperson’s challenge of judging a technology’s trustworthiness. Vice versa, it contributes to Ethics of Technology by highlighting crucial IT-security needs.

Details

Journal of Information, Communication and Ethics in Society, vol. 19 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Book part
Publication date: 4 February 2013

Katrina M. Hubbard, Annette M. Burris and Ashley L. Gray

This chapter examines the educational perspective of three black, female graduate students within the context of a social justice framework. The US educational system has a long…

Abstract

This chapter examines the educational perspective of three black, female graduate students within the context of a social justice framework. The US educational system has a long history of racial discrimination, which has created an environment that is in many ways hostile to those who are different. For many students of color, negotiating this culturally hostile environment can lead to feelings of invisibility and isolation. This chapter explores these dynamics and their impact upon an individual’s educational, social, and personal development from the perspective of nondominants in a dominant culture. Through the exploration of our own experiences, we highlight the various coping mechanisms employed by three minority students to deal with the socially constructed hierarchies that exist in the classroom environment as a result of differences across racial and gender lines. It is our hope that this chapter will provide insight to educators who desire to develop a well-balanced classroom experience for all students.

Details

Social Justice Issues and Racism in the College Classroom: Perspectives from Different Voices
Type: Book
ISBN: 978-1-78190-499-2

Abstract

Details

Decolonizing Educational Relationships: Practical Approaches for Higher and Teacher Education
Type: Book
ISBN: 978-1-80071-529-5

Article
Publication date: 21 March 2016

Xiaoyong Tian, Ming Yin and Dichen Li

Artificial electromagnetic (EM) medium and devices are designed with integrated micro- and macro-structures depending on the EM transmittance performance, which is difficult to…

Abstract

Purpose

Artificial electromagnetic (EM) medium and devices are designed with integrated micro- and macro-structures depending on the EM transmittance performance, which is difficult to fabricate by the conventional processes. Three-dimensional (3D) printing provides a new solution for the delicate artificial EM medium. This paper aims to first review the applications of 3D printing in the fabrication of EM medium briefly, mainly focusing on photonic crystals, metamaterials and gradient index (GRIN) devices. Then, a new design and fabrication strategy is proposed for the EM medium based on the 3D printing process, which was verified by the implementation of a 3D 90o Eaton lens based on GRIN metamaterials.

Design/methodology/approach

A new design and manufacturing strategy driven by the physical (EM transmittance) performance is proposed to illustrate the realization procedures of EM medium based device with controllable micro- and macro-structures. Stereolithography-based 3D printing process is used to obtain the designed EM device, an GRIN Eaton lens. The EM transmittance of the Eaton lens was validated experimentally and by simulation.

Findings

A 3D 90o Eaton lens was realized based on GRIN metamaterials structure according to the proposed design and manufacturing strategy, which had the broadband (12-18 GHz) and low loss characteristic. The feasibility of 3D printing for the artificial EM medium and GRIN devices has been verified for the further real applications in the industries.

Originality/value

The applications of 3D printing in artificial EM medium and devices were systematically reviewed. A new design strategy driven by physical performance for the EM device was proposed and validated by the firstly 3D printed 3D Eaton lens.

Details

Rapid Prototyping Journal, vol. 22 no. 2
Type: Research Article
ISSN: 1355-2546

Keywords

Book part
Publication date: 8 October 2018

Vanessa K. Bohns, Daniel A. Newark and Erica J. Boothby

We explore how, and how accurately, people assess their influence over others’ behavior and attitudes. We describe the process by which a person would determine whether he or she…

Abstract

Purpose

We explore how, and how accurately, people assess their influence over others’ behavior and attitudes. We describe the process by which a person would determine whether he or she was responsible for changing someone else’s behavior or attitude, and the perceptual, motivational, and cognitive factors that are likely to impact whether an influencer’s claims of responsibility are excessive, insufficient, or accurate.

Methodology/approach

We first review classic work on social influence, responsibility or blame attribution, and perceptions of control, identifying a gap in the literature with respect to understanding how people judge their own responsibility for other people’s behavior and attitudes. We then draw from a wide range of social psychological research to propose a model of how an individual would determine his or her degree of responsibility for someone else’s behavior or attitude.

Practical implications

A potential influencer’s beliefs about the extent of his or her influence can determine whether he or she engages in an influence attempt, how he or she engages in such an attempt, and whether he or she takes responsibility for another person’s behavior or beliefs.

Originality/value of paper

For decades, scholars researching social influence have explored how one’s behavior and attitudes are shaped by one’s social environment. However, amidst this focus on the perspective of the target of social influence, the perspective of the influencer has been ignored. This paper addresses the largely neglected question of how much responsibility influencers take for the impact their words, actions, and presence have on others.

Details

Advances in Group Processes
Type: Book
ISBN: 978-1-78769-013-4

Keywords

Abstract

Details

A Circular Argument
Type: Book
ISBN: 978-1-80071-385-7

1 – 10 of 101