Search results

1 – 3 of 3
Article
Publication date: 16 October 2018

Kristy Henson, Paul Constantino, F. Robin O’Keefe and Greg Popovich

The topic of human skeletal analysis is a sensitive subject in North America. Laws and regulations surrounding research of human skeletal material make it difficult to use these…

2998

Abstract

Purpose

The topic of human skeletal analysis is a sensitive subject in North America. Laws and regulations surrounding research of human skeletal material make it difficult to use these remains to characterize various populations. Recent technology has the potential to solve this dilemma. Three-dimensional (3D) scanning creates virtual models of this material, and stores the information, allowing future studies on the material. The paper aims to discuss these issues.

Design/methodology/approach

To assess the potential of this methodology, the authors compared processing time, accuracy and costs of computer tomography (CT) scanner to the Artec Eva portable 3D surface scanner. Using both methodologies the authors scanned and 3D printed one adult individual. The authors hypothesize that the Artec Eva will create digital replicas of <5 percent error based on Buikstra and Ubelaker standard osteometric measurements. Error was tested by comparing the measurements of the skeletal material to the Artec data, CT data and 3D printed data.

Findings

Results show that larger bones recorded by the Artec Eva have <5 percent error of the original specimen while smaller more detailed images have >5 percent error. The CT images are closer to <5 percent accuracy, with few bones still >5 percent error. The Artec Eva scanner is inexpensive in comparison to a CT machine, but takes twice as long to process the Eva’s data. The Artec Eva is sufficient in replication of larger elements, but the CT machine is still a preferable means of skeletal replication, particularly for small elements.

Originality/value

This research paper is unique because it compares two common forms of digitization, which has not been done. The authors believe this paper would be of value to natural history curators and various researchers.

Details

Library Hi Tech, vol. 37 no. 3
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 28 January 2014

Augustine Pang, Nasrath Begam Binte Abul Hassan and Aaron Chee Yang Chong

The aim of this paper is to examine how crises can be triggered online, how different social media tools escalate crises, and how issues gain credibility when they transit to…

10410

Abstract

Purpose

The aim of this paper is to examine how crises can be triggered online, how different social media tools escalate crises, and how issues gain credibility when they transit to mainstream media.

Design/methodology/approach

This exploratory study uses the multiple case study method to analyze five crises, generated online, throughout their life-cycles, in order to build analytic generalizations (Yin).

Findings

Crises are often triggered online when stakeholders are empowered by social media platforms to air their grievances. YouTube and Twitter have been used to raise issues through its large user base and the lack of gatekeeping. Facebook and blogs escalate crises beyond the immediate stakeholder groups. These crises are covered by mainstream media because of their newsworthiness. As a result, the crises gain credibility offline. Mainstream media coverage ceases when traditional news elements are no longer present.

Research limitations/implications

If crises are increasingly generated online, this study aims to apply a framework to manage the impact on organizations.

Practical implications

How practitioners can use different new media tools to counter crises online and manage the transition of crises to mainstream media.

Originality/value

This is one of the first few studies that analyses how organizational crises originate online, gain traction and get escalated onto mainstream media. Understanding what causes crises to trigger online and gain legitimacy offline will enable practitioners to engage in effective crisis management strategies.

Details

Corporate Communications: An International Journal, vol. 19 no. 1
Type: Research Article
ISSN: 1356-3289

Keywords

Article
Publication date: 22 January 2020

Norah Ylang

This paper aims to examine demographic differences between individuals who do not take measures to protect themselves from identity theft victimization and those who do. A…

Abstract

Purpose

This paper aims to examine demographic differences between individuals who do not take measures to protect themselves from identity theft victimization and those who do. A majority of the research on identity theft has focused on predictors of victimization, reporting behaviors of the victims and their health and mental outcomes. However, little remains known about the individuals who choose to take any identity-theft measures despite concerns over this fast-growing breed of crime.

Design/methodology/approach

Guided by Felson and Cohen’s routine activities theoretical framework (1979), this study uses the 2014 Identity Theft Supplement of the National Crime Victimization Survey to identify the demographic characteristics that influence the use of self-protection measures among individuals in the general population.

Findings

This study finds that these individuals are much more likely to be white, older, female and highly educated. The decision to undertake protection against identity theft is also influenced by the following factors: prior experience of misuse, possession of a bank account in the prior 12 months, current possession of at least one credit card and awareness that one is entitled to a free copy of one’s credit report.

Originality/value

This study addresses the gap in scholarship on identity theft prevention by applying the concept of guardianship in Cohen and Felson’s routine activity theory (1979) to the usage of self-protection measures in a general population. Future findings will identify the areas which agencies and researchers can focus on to inform policies that foster individuals’ own initiatives to take self-protection measures against potential identity theft.

Details

Journal of Financial Crime, vol. 27 no. 1
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 3 of 3