Search results

1 – 10 of 201
Article
Publication date: 1 August 2001

José F. Rodríguez, James P. Thomas and John E. Renaud

An experimental study of the mechanical behavior of fused‐deposition (FD) ABS plastic materials is described. Elastic moduli and strength values are determined for the ABS…

8344

Abstract

An experimental study of the mechanical behavior of fused‐deposition (FD) ABS plastic materials is described. Elastic moduli and strength values are determined for the ABS monofilament feedstock and various unidirectional FD‐ABS materials. The results show a reduction of 11 to 37 per cent in modulus and 22 to 57 per cent in strength for FD‐ABS materials relative to the ABS monofilament. These reductions occur due to the presence of voids and a loss of molecular orientation during the FD extrusion process. The results can be used to benchmark computational models for stiffness and strength as a function of the processing parameters for use in computationally optimizing the mechanical performance of FD‐ABS materials in functional applications.

Details

Rapid Prototyping Journal, vol. 7 no. 3
Type: Research Article
ISSN: 1355-2546

Keywords

Article
Publication date: 1 September 2000

Jose F. Rodriguez, James P. Thomas and John E. Renaud

Fused‐deposition (FD) is a robotically controlled “fiber” extrusion process that produces a new class of materials with a variety of controllable mesostructural features related…

2907

Abstract

Fused‐deposition (FD) is a robotically controlled “fiber” extrusion process that produces a new class of materials with a variety of controllable mesostructural features related to fiber layout and the presence of voids. Mesostructural features of importance to the stiffness and strength of unidirectionally extruded materials were characterized as a function of the processing variables. Samples were made using the Stratasys FDM1600 Modeler with the P400 acrylonitrile‐butadiene‐styrene plastic. Results showed that the void geometry/density and the extent of bonding between contiguous fibers depended strongly on the fiber gap and extrusion flow rate. Settings for minimum void and maximum fiber‐to‐fiber bonding were determined. Void and bond length densities in the plane transverse to the fiber extrusion direction varied from 4 to 16 per cent and 39 to 73 per cent respectively. The results quantify the important mesostructural features as a function of the FD process variables and are expected to find use with other FD materials.

Details

Rapid Prototyping Journal, vol. 6 no. 3
Type: Research Article
ISSN: 1355-2546

Keywords

Article
Publication date: 1 October 2003

José F. Rodríguez, James P. Thomas and John E. Renaud

Analytical/Computational models for the fused deposition (FD) material stiffness and strength as a function of mesostructural parameters are developed. Effective elastic moduli…

3840

Abstract

Analytical/Computational models for the fused deposition (FD) material stiffness and strength as a function of mesostructural parameters are developed. Effective elastic moduli are obtained using the strength of materials approach and an elasticity approach based on the asymptotic theory of homogenization. Theoretical predictions for unidirectional FD‐acrylonitrile butadiene styrene materials are validated with experimentally determined values of moduli and strength. For moduli predictions, the results were found to be satisfactory with difference between experimental and theoretical values of less than 10 percent in most cases.

Details

Rapid Prototyping Journal, vol. 9 no. 4
Type: Research Article
ISSN: 1355-2546

Keywords

Article
Publication date: 14 November 2008

Victor M. Pérez, John E. Renaud and Layne T. Watson

To reduce the computational complexity per step from O(n2) to O(n) for optimization based on quadratic surrogates, where n is the number of design variables.

Abstract

Purpose

To reduce the computational complexity per step from O(n2) to O(n) for optimization based on quadratic surrogates, where n is the number of design variables.

Design/methodology/approach

Applying nonlinear optimization strategies directly to complex multidisciplinary systems can be prohibitively expensive when the complexity of the simulation codes is large. Increasingly, response surface approximations (RSAs), and specifically quadratic approximations, are being integrated with nonlinear optimizers in order to reduce the CPU time required for the optimization of complex multidisciplinary systems. For evaluation by the optimizer, RSAs provide a computationally inexpensive lower fidelity representation of the system performance. The curse of dimensionality is a major drawback in the implementation of these approximations as the amount of required data grows quadratically with the number n of design variables in the problem. In this paper a novel technique to reduce the magnitude of the sampling from O(n2) to O(n) is presented.

Findings

The technique uses prior information to approximate the eigenvectors of the Hessian matrix of the RSA and only requires the eigenvalues to be computed by response surface techniques. The technique is implemented in a sequential approximate optimization algorithm and applied to engineering problems of variable size and characteristics. Results demonstrate that a reduction in the data required per step from O(n2) to O(n) points can be accomplished without significantly compromising the performance of the optimization algorithm.

Originality/value

A reduction in the time (number of system analyses) required per step from O(n2) to O(n) is significant, even more so as n increases. The novelty lies in how only O(n) system analyses can be used to approximate a Hessian matrix whose estimation normally requires O(n2) system analyses.

Details

Engineering Computations, vol. 25 no. 8
Type: Research Article
ISSN: 0264-4401

Keywords

Book part
Publication date: 7 September 2023

Pok Man Tang, Anthony C. Klotz, Joel Koopman, Elijah X. M. Wee and Yizhen Lu

Professional touching behavior (PTB), defined as intentional touching behavior that occurs between organizational members and that falls within the boundaries of appropriateness

Abstract

Professional touching behavior (PTB), defined as intentional touching behavior that occurs between organizational members and that falls within the boundaries of appropriateness and professionalism in the workplace, is prevalent in organizations. Scholars from multiple disciplines, including human resources researchers, have acknowledged the importance of physical contact for facilitating interpersonal communication and relationship-building. However, PTB may not only elicit positive reactions from those who receive it but also negative reactions as well, with implications for social dynamics in organizations. PTB can, on the one hand, fulfill employees’ desires for interpersonal connection; at the same time, such physical contact at work can represent a threat to employees’ health. To explain the nature and implications of these divergent effects of receiving PTB, the authors draw upon sociometer theory and behavioral immune system (BIS) theory to model the emotional, cognitive, and physiological processes via which, and the conditions under which, receiving such behavior will result in socially functional responses and prompt subsequent prosocial behavior, and when PTB will be perceived as a health risk and prompt withdrawal behavior. The theoretical framework of this chapter expands our conceptual understanding of the consequences of interpersonal physical contact at work and has important human resources management (HRM) implications for organizational managers.

Details

Research in Personnel and Human Resources Management
Type: Book
ISBN: 978-1-83753-389-3

Keywords

Abstract

Details

A History of the Assessment of Sex Offenders: 1830–2020
Type: Book
ISBN: 978-1-78769-360-9

Book part
Publication date: 14 November 2022

Saeedeh Rezaee Vessal and Amitabh Anand

The purpose of this research is to conduct a literature review on the evolution, antecedents, and outcomes of luxury consumption (LC). To accomplish our goal, we used a…

Abstract

The purpose of this research is to conduct a literature review on the evolution, antecedents, and outcomes of luxury consumption (LC). To accomplish our goal, we used a combination of bibliometrics and systematic approaches to review 165 articles published between 1998 and 2019. The investigation revealed that the evolution of LC is mostly driven by consumer motivation and is influenced by cultural and psychological variables. Furthermore, we explored the aforementioned antecedents of LC along four major axes. Antecedents related to (1) individual characteristics, (2) brand components, (3) cultural and social values, and (4) organizational strategies. Furthermore, based on the outcomes of LC, we found two categories (individual traits and social values). The chapter concludes by proposing a broader research agenda for the future.

Details

Exploring the Latest Trends in Management Literature
Type: Book
ISBN: 978-1-80262-357-4

Keywords

Article
Publication date: 13 March 2020

R.I. Ferguson, Karen Renaud, Sara Wilford and Alastair Irons

Cyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics…

2123

Abstract

Purpose

Cyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics has become far more sophisticated over the years and is now able to uncover even more evidence that can be used to support prosecution of cyber criminals in a court of law. Governments, too, have embraced the ability to track suspicious individuals in the online world. Forensics investigators are driven to gather data exhaustively, being under pressure to provide law enforcement with sufficient evidence to secure a conviction.

Yet, there are concerns about the ethics and justice of untrammeled investigations on a number of levels. On an organizational level, unconstrained investigations could interfere with, and damage, the organization's right to control the disclosure of their intellectual capital. On an individual level, those being investigated could easily have their legal privacy rights violated by forensics investigations. On a societal level, there might be a sense of injustice at the perceived inequality of current practice in this domain.

This paper argues the need for a practical, ethically grounded approach to digital forensic investigations, one that acknowledges and respects the privacy rights of individuals and the intellectual capital disclosure rights of organizations, as well as acknowledging the needs of law enforcement. The paper derives a set of ethical guidelines, and then maps these onto a forensics investigation framework. The framework to expert review in two stages is subjected, refining the framework after each stage. The paper concludes by proposing the refined ethically grounded digital forensics investigation framework. The treatise is primarily UK based, but the concepts presented here have international relevance and applicability.

Design/methodology/approach

In this paper, the lens of justice theory is used to explore the tension that exists between the needs of digital forensic investigations into cybercrimes on the one hand, and, on the other, individuals' rights to privacy and organizations' rights to control intellectual capital disclosure.

Findings

The investigation revealed a potential inequality between the practices of digital forensics investigators and the rights of other stakeholders. That being so, the need for a more ethically informed approach to digital forensics investigations, as a remedy, is highlighted and a framework proposed to provide this.

Research limitations/implications

The proposed ethically informed framework for guiding digital forensics investigations suggests a way of re-establishing the equality of the stakeholders in this arena, and ensuring that the potential for a sense of injustice is reduced.

Originality/value

Justice theory is used to highlight the difficulties in squaring the circle between the rights and expectations of all stakeholders in the digital forensics arena. The outcome is the forensics investigation guideline, PRECEpt: Privacy-Respecting EthiCal framEwork, which provides the basis for a re-aligning of the balance between the requirements and expectations of digital forensic investigators on the one hand, and individual and organizational expectations and rights, on the other.

Details

Journal of Intellectual Capital, vol. 21 no. 2
Type: Research Article
ISSN: 1469-1930

Keywords

Article
Publication date: 24 October 2022

David A. Jaud, Olivier Gergaud and Renaud Lunardo

This study aims to examine within-family and peer communication (type and frequency) and subsequent wine consumption of young adults. Specifically, this research investigates…

Abstract

Purpose

This study aims to examine within-family and peer communication (type and frequency) and subsequent wine consumption of young adults. Specifically, this research investigates whether the distinct types of technical, prohibition and moderation-based communication affect wine knowledge, responsible drinking practices, and ultimately, wine consumption.

Design/methodology/approach

The authors adopted an econometric approach based on a cross-sectional study with data collected from a large sample of 1,466 students in France.

Findings

The authors show that wine technical-based messages from parents help young adults acquire knowledge about wine, which in turn increases consumption. Also, moderation-based messages make young adults both, more knowledgeable about wine and, as expected, more responsible in terms of drinking practices, subsequently limiting their consumption. Finally, prohibition-based messages marginally decrease wine knowledge and have no impact on responsible drinking practices.

Social implications

This article provides relevant recommendations for public policymakers and brands, who should target parents and peers as part of their responsible drinking communication or advertising campaigns.

Originality/value

To fill a gap in the literature on young consumer behavior and food marketing, this research primarily investigates the relationship between family (and peer) communication and young adults' wine consumption, particularly whether and how, which type(s) of parental communication influences young adults' wine knowledge and adoption of responsible drinking practices.

Details

British Food Journal, vol. 125 no. 6
Type: Research Article
ISSN: 0007-070X

Keywords

Article
Publication date: 9 February 2022

Ivano Bongiovanni, Karen Renaud, Humphrey Brydon, Renette Blignaut and Angelo Cavallo

Boards of Directors and other organisational leaders make decisions about the information security governance systems to implement in their companies. The increasing number of…

Abstract

Purpose

Boards of Directors and other organisational leaders make decisions about the information security governance systems to implement in their companies. The increasing number of cyber-breaches targeting businesses makes this activity inescapable. Recently, researchers have published comprehensive lists of recommended cyber measures, specifically to inform organisational boards. However, the young cybersecurity industry has still to confirm and refine these guidelines. As a starting point, it would be helpful for organisational leaders to know what other organisations are doing in terms of using these guidelines. In an ideal world, bespoke surveys would be developed to gauge adherence to guidelines, but this is not always feasible. What we often do have is data from existing cybersecurity surveys. The authors argue that such data could be repurposed to quantify adherence to existing information security guidelines, and this paper aims to propose, and test, an original methodology to do so.

Design/methodology/approach

The authors propose a quantification mechanism to measure the degree of adherence to a set of published information security governance recommendations and guidelines targeted at organisational leaders. The authors test their quantification mechanism using a data set collected in a survey of 156 Italian companies on information security and privacy.

Findings

The evaluation of the proposed mechanism appears to align with findings in the literature, indicating the validity of the present approach. An analysis of how different industries rank in terms of their adherence to the selected set of recommendations and guidelines confirms the usability of our repurposed data set to measure adherence.

Originality/value

To the best of the authors’ knowledge, a quantification mechanism as the one proposed in this study has never been proposed, and tested, in the literature. It suggests a way to repurpose survey data to determine the extent to which companies are implementing measures recommended by published cybersecurity guidelines. This way, the proposed mechanism responds to increasing calls for the adoption of research practices that minimise waste of resources and enhance research sustainability.

1 – 10 of 201