Search results
1 – 10 of 484Kenneth Ray, Sylvia Marion Carley and Derrick Brown
Community college African American male student enrollment and academic success is diminishing. The authors explore the importance and wisdom of mentoring programs for African…
Abstract
Community college African American male student enrollment and academic success is diminishing. The authors explore the importance and wisdom of mentoring programs for African American males attending community colleges. The chapter considers issues of student persistence and retention and how they relate to effective community college mentoring programs. Specifically, the authors discuss how community college mentoring programs can counteract inherent obstacles for African American students attending commuter style campuses. A description of how some community colleges successfully engage African American male students in order to achieve Kuh's four attributes of a supportive college environment and to overcome the issues of college departure -- being first-generation college students, lacking academic self-concept, no or minimal institutional engagement with students, and no or minimal student involvement student involvement on campus – is provided. The authors highlight successful community college programs which include the national “Students African American Brotherhood” program, Santa Fe College's “My Brother's Keeper,” the North Carolina Community College System, and Hillsborough Community College's Collegiate 100.
Javier Estrada and J.Ignacio Peña
Between 1988 and 1994 ten European countries introduced or modified their regulations on insider trading. We evaluate in this article the impact of such regulatory changes on the…
Abstract
Between 1988 and 1994 ten European countries introduced or modified their regulations on insider trading. We evaluate in this article the impact of such regulatory changes on the risk, return, and some other characteristics of these ten markets. After extensive testing, we find that the evidence suggests that these regulations have had little (if any) impact on the market characteristics we examine, and briefly speculate about the reasons that justify our findings.
Elmira Janavi and Maryam Emami
The goal of this study was to investigate the co-citation of information security patents in the United States Patent and Trademark Office (USPTO) database.
Abstract
Purpose
The goal of this study was to investigate the co-citation of information security patents in the United States Patent and Trademark Office (USPTO) database.
Design/methodology/approach
This research is a scientometrics study that has been conducted using the co-citation analysis. The statistical population of the present study includes all patents of information security filed in the USPTO database from 1971 to 2015. As a result of this search, 30,736 patents were retrieved. In this investigation, UCINET software and its complementary package (NetDraw) were employed to plot scientific maps.
Findings
The findings of this study indicated an upward trend of patents in the field of information security between 1971 and 2015. The “California State” has the top world rank in information security inventions, followed by “Japan” and the “Washington State.” “VAN WIE, DAVID M” is the most cited inventor in the field of information security. The analysis of inventors' co-citation data indicated that “ADAMS, NEIL- LITTLE” and “HERBERT ANTHONY” had the highest co-citation rates with each other and were ranked first. The survey of high-citation inventors based on centrality indices indicated that “LEACH, PAUL J” graded first in degree centrality, “BENALOH, JOSH D” in betweenness centrality and “BENALOH, JOSH D” in closeness centrality.
Originality/value
The co-citation analysis of patents can show the most important patents and the relationships between them. Such analyses can be useful for large-scale policymaking or identification of existing gaps and attempting to address them.
Details
Keywords
In the last four years, since Volume I of this Bibliography first appeared, there has been an explosion of literature in all the main functional areas of business. This wealth of…
Abstract
In the last four years, since Volume I of this Bibliography first appeared, there has been an explosion of literature in all the main functional areas of business. This wealth of material poses problems for the researcher in management studies — and, of course, for the librarian: uncovering what has been written in any one area is not an easy task. This volume aims to help the librarian and the researcher overcome some of the immediate problems of identification of material. It is an annotated bibliography of management, drawing on the wide variety of literature produced by MCB University Press. Over the last four years, MCB University Press has produced an extensive range of books and serial publications covering most of the established and many of the developing areas of management. This volume, in conjunction with Volume I, provides a guide to all the material published so far.
Details
Keywords
Ronald Klimberg, Kenneth D. Lawrence and Sheila M. Lawrence
Regression analysis is a commonly applied technique used to measure the relationship/predict/forecast of comparable units. A set of comparable units is some group of entities each…
Abstract
Regression analysis is a commonly applied technique used to measure the relationship/predict/forecast of comparable units. A set of comparable units is some group of entities each performing somewhat the same set of activities. In this chapter, we will apply a modified version of our recently developed methodology to incorporate into the regression analysis a new variable that captures the unique weighting of each comparable unit. This new variable is the relative efficiency of each comparable unit that will be generated by a technique called data envelopment analysis (DEA). The results of applying this methodology with the DEA variable to a hospital labor data set will be presented.
Tariq P. Sattar, Hernando Leon Rodriguez and Bryan Bridge
Structural integrity inspection of offshore wind turbine blades poses problems of gaining access to the blades, danger to human operatives and large costs of removing a blade and…
Abstract
Purpose
Structural integrity inspection of offshore wind turbine blades poses problems of gaining access to the blades, danger to human operatives and large costs of removing a blade and transporting it off‐shore for inspection. The purpose of this paper is to show that a climbing robot that can perform in situ blade inspection with micro/nano focus computed axial X‐ray tomography is a solution to find defects in the thickest blade sections and reduce the cost of inspection.
Design/methodology/approach
The weight of such an inspection system will be high, typically 200 kg and cross sectional scanner dimensions of 1 × 2 m to envelope a blade. The design of a climbing ring robot that completely encircles a turbine tower, typically 3 m in diameter, will provide the best means of climbing with this payload. Because of the development costs of such a huge robot, the optimal design path is to first prototype a small scale model.
Findings
First results on such a model are described and from its performance the load carrying capabilities of a full scale version computed. The robot is able to climb either straight up or down, or with a spiralling motion, or rotate around the circumference at the same height. Furthermore, the design is entirely modular thus enabling easy on‐site assembly of the robot.
Originality/value
A climbing robot with high payload and versatile motion capability, with adhesive forces between the robot and climbing surface provided entirely by mechanical means rather than by vacuum suction or magnetic force, making the system much safer and easier to manipulate.
Details
Keywords
Kenneth Shiu Pong Ng, Jiru Zhang, Jose Weng Chou Wong and Kennis Kaiqi Luo
Food delivery apps (FDAs), as a well-known technology, have been widely adopted by restaurants and customers. Different from existing studies in this field that mainly focused on…
Abstract
Purpose
Food delivery apps (FDAs), as a well-known technology, have been widely adopted by restaurants and customers. Different from existing studies in this field that mainly focused on the technical (internal) parts, the study aims to introduce a new framework by linking up technical (internal) factors and service-related (external) factors in the context of FDAs. This study also empirically analyzes a comprehensive model that identifies the impacts of internal and external factors in FDAs on the continuous use intention.
Design/methodology/approach
This study proposes a comprehensive model integrating internal and external factors with a sample of 498 respondents who had ordered or purchased food through delivery apps for the partial least squares structural equation modeling (PLS-SEM) analysis.
Findings
The results of the study show that time-saving is the most significant factor on customers' perceptions, and various food choices and usefulness have also direct positive impacts on perceived value and satisfaction. In addition, perceived value shows a stronger effect than satisfaction on customers' continuous usage.
Originality/value
These findings provide a new perspective on FDAs, which not only simplify the elements of FDAs but also classify internal and external factors to foster the theoretical and practical development. Ultimately, the model proposed and validated in this study can serve as the basis for future FDAs and other service apps development.
Details