Search results

1 – 10 of 435
Article
Publication date: 25 May 2023

Ashwani Kumar and Deepak Chhabra

This study aims to explore the potential benefits favoring the adaptation of structural optimization techniques in the additive manufacturing (AM) of medical utilities to meet the…

Abstract

Purpose

This study aims to explore the potential benefits favoring the adaptation of structural optimization techniques in the additive manufacturing (AM) of medical utilities to meet the repetitive demand for functionally precise customized orthoses. Irregularities encountered during the conventional treatment of tendon injuries can be eschewed using advanced structural simulation in design and innovative splint fabrication using 3D printing.

Design/methodology/approach

A customized mallet finger splint designed from 3D scans was subjected to ANSYS topological simulation comprising multi-level weight reduction to retain optimal mass (100%, 90%, 80%, 70% and 60%). A batch of the four typical 3D printing materials was chosen to conduct a comparative mechanical and thermal stress analysis, facilitating the selection of the optimal one for fabricating functionally adaptive splints. Assurance of structural safety was accomplished through the experimental validation of simulation results against the testing data set of ASTM D695 and ASTM D638 Type-1 specimens over a universal testing machine (UTM). Fused deposition modeling (FDM) 3D printing processed the optimized splint fabrication to assist evaluation of weight reduction percentage, fitting aesthetics, appearance, comfort, practicality and ventilation ease at the user end.

Findings

AM efficacy can efficiently execute the design complexity involved in the topology optimization (TO) results and introduces rehabilitation practicality into the application. Topologically optimized splint provided with favorable comfort, stiffness and strengthening features, offers ventilation ease and structural stability for customized appliances, with 30.52% lighter weight and 121.37% faster heat dissipation than unoptimized one.

Originality/value

The state of art multidisciplinary optimization featured with structural and material optimization attributes can deliberately meet medical necessity for performance-oriented orthotic devices.

Details

Rapid Prototyping Journal, vol. 29 no. 8
Type: Research Article
ISSN: 1355-2546

Keywords

Article
Publication date: 1 March 1981

C.A. Smith

A review of paint and other coverings that were used, mainly during the 19th Century, to protect against corrosion.

Abstract

A review of paint and other coverings that were used, mainly during the 19th Century, to protect against corrosion.

Details

Anti-Corrosion Methods and Materials, vol. 28 no. 3
Type: Research Article
ISSN: 0003-5599

Article
Publication date: 11 December 2023

Rezzy Eko Caraka, Robert Kurniawan, Rung Ching Chen, Prana Ugiana Gio, Jamilatuzzahro Jamilatuzzahro, Bahrul Ilmi Nasution, Anjar Dimara Sakti, Muhammad Yunus Hendrawan and Bens Pardamean

The purpose of this paper is to manage knowledge pertaining to micro, small and medium enterprise (MSME) actors in the business, agriculture and industry sectors. This study uses…

Abstract

Purpose

The purpose of this paper is to manage knowledge pertaining to micro, small and medium enterprise (MSME) actors in the business, agriculture and industry sectors. This study uses text mining techniques, specifically Latent Dirichlet Allocation Mallet, to analyze the data obtained from the in-depth interviews. This analysis helps us identify and understand the issues faced by these actors.

Design/methodology/approach

In this study, the authors use big data and business analytics to recalculate the MSME business vulnerability index in 503 districts and 34 provinces across Indonesia. Subsequently, the authors conduct in-depth interviews with MSME actors in Medan, Central Java, Yogyakarta, Bali and Manokwari, West Papua. Through these interviews, the authors explore their strategies for surviving the COVID-19 pandemic and the extent of their digital literacy, and the application of technology to maximize sales and business outcomes.

Findings

The findings reveal that, for the sustainable growth of MSMEs during and after the pandemic, collaboration across the Penta-Helix framework is essential. This collaboration enables the development of practical solutions for the challenges posed by COVID-19, particularly in the context of the “new normal.” In addition, the authors’ survey of MSMEs involved in agriculture, trade and processing sectors demonstrates that 58.33% experienced a decrease in income during the pandemic and 12.66% reported an increase in revenue. In contrast, 25% experienced no change in income before and during the pandemic.

Originality/value

This research contributes significantly by offering comprehensive insights obtained from in-depth surveys conducted with MSMEs across multiple sectors. The findings underscore the importance of addressing the challenges MSMEs face and highlight the need for collaboration within the Penta-Helix framework to foster their resilience and success amidst the COVID-19 pandemic.

Details

Journal of Asia Business Studies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1558-7894

Keywords

Article
Publication date: 9 March 2015

Eugene Ferry, John O Raw and Kevin Curran

The interoperability of cloud data between web applications and mobile devices has vastly improved over recent years. The popularity of social media, smartphones and cloud-based…

2092

Abstract

Purpose

The interoperability of cloud data between web applications and mobile devices has vastly improved over recent years. The popularity of social media, smartphones and cloud-based web services have contributed to the level of integration that can be achieved between applications. This paper investigates the potential security issues of OAuth, an authorisation framework for granting third-party applications revocable access to user data. OAuth has rapidly become an interim de facto standard for protecting access to web API data. Vendors have implemented OAuth before the open standard was officially published. To evaluate whether the OAuth 2.0 specification is truly ready for industry application, an entire OAuth client server environment was developed and validated against the speciation threat model. The research also included the analysis of the security features of several popular OAuth integrated websites and comparing those to the threat model. High-impacting exploits leading to account hijacking were identified with a number of major online publications. It is hypothesised that the OAuth 2.0 specification can be a secure authorisation mechanism when implemented correctly.

Design/methodology/approach

To analyse the security of OAuth implementations in industry a list of the 50 most popular websites in Ireland was retrieved from the statistical website Alexa (Noureddine and Bashroush, 2011). Each site was analysed to identify if it utilised OAuth. Out of the 50 sites, 21 were identified with OAuth support. Each vulnerability in the threat model was then tested against each OAuth-enabled site. To test the robustness of the OAuth framework, an entire OAuth environment was required. The proposed solution would compose of three parts: a client application, an authorisation server and a resource server. The client application needed to consume OAuth-enabled services. The authorisation server had to manage access to the resource server. The resource server had to expose data from the database based on the authorisation the user would be given from the authorisation server. It was decided that the client application would consume emails from Google’s Gmail API. The authorisation and resource server were modelled around a basic task-tracking web application. The client application would also consume task data from the developed resource server. The client application would also support Single Sign On for Google and Facebook, as well as a developed identity provider “MyTasks”. The authorisation server delegated authorisation to the client application and stored cryptography information for each access grant. The resource server validated the supplied access token via public cryptography and returned the requested data.

Findings

Two sites out of the 21 were found to be susceptible to some form of attack, meaning that 10.5 per cent were vulnerable. In total, 18 per cent of the world’s 50 most popular sites were in the list of 21 OAuth-enabled sites. The OAuth 2.0 specification is still very much in its infancy, but when implemented correctly, it can provide a relatively secure and interoperable authentication delegation mechanism. The IETF are currently addressing issues and expansions in their working drafts. Once a strict level of conformity is achieved between vendors and vulnerabilities are mitigated, it is likely that the framework will change the way we access data on the web and other devices.

Originality/value

OAuth is flexible, in that it offers extensions to support varying situations and existing technologies. A disadvantage of this flexibility is that new extensions typically bring new security exploits. Members of the IETF OAuth Working Group are constantly refining the draft specifications and are identifying new threats to the expanding functionality. OAuth provides a flexible authentication mechanism to protect and delegate access to APIs. It solves the password re-use across multiple accounts problem and stops the user from having to disclose their credentials to third parties. Filtering access to information by scope and giving the user the option to revoke access at any point gives the user control of their data. OAuth does raise security concerns, such as defying phishing education, but there are always going to be security issues with any authentication technology. Although several high impacting vulnerabilities were identified in industry, the developed solution proves the predicted hypothesis that a secure OAuth environment can be built when implemented correctly. Developers must conform to the defined specification and are responsible for validating their implementation against the given threat model. OAuth is an evolving authorisation framework. It is still in its infancy, and much work needs to be done in the specification to achieve stricter validation and vendor conformity. Vendor implementations need to become better aligned in order to provider a rich and truly interoperable authorisation mechanism. Once these issues are resolved, OAuth will be on track for becoming the definitive authentication standard on the web.

Details

Information & Computer Security, vol. 23 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 August 1969

Reid, Morris of Borth‐y‐Gest, Pearce, Wilberforce and Diplock

February 11, 1969 Damages — Assessment — Fatal Accidents Acts — Dependency — Standard application — Inflation of currency — Not to be taken into account — Disturbance of jury's…

Abstract

February 11, 1969 Damages — Assessment — Fatal Accidents Acts — Dependency — Standard application — Inflation of currency — Not to be taken into account — Disturbance of jury's assessment on appeal.

Details

Managerial Law, vol. 6 no. 5
Type: Research Article
ISSN: 0309-0558

Article
Publication date: 1 April 1981

C.A. Smith

A review of paint and other coverings that were used, mainly during the 19th Century to protect metal against corrosion. In this second and final article a variety of substances…

Abstract

A review of paint and other coverings that were used, mainly during the 19th Century to protect metal against corrosion. In this second and final article a variety of substances that were tried as an alternative to paint coatings, are reviewed.

Details

Anti-Corrosion Methods and Materials, vol. 28 no. 4
Type: Research Article
ISSN: 0003-5599

Book part
Publication date: 14 December 2023

Florian Kragulj, Anna Katharina Grill, Raysa Geaquinto Rocha and Arminda do Paço

Sustainable management requires companies to build up new knowledge to acquire the competencies needed for action. This chapter aims to deliver knowledge about sustainability and…

Abstract

Sustainable management requires companies to build up new knowledge to acquire the competencies needed for action. This chapter aims to deliver knowledge about sustainability and knowledge for sustainability. Firstly, we systematically analyse the sustainability literature in the social sciences through a bibliographic analysis and topic modelling using VOSviewer and Mallet software. We outline research directions, themes and critical contributions for each research cluster identified. Additionally, we categorise over 30 definitions of sustainability identified by Meuer, Koelbel, and Hoffmann (2020). Secondly, we enumerate knowledge types needed for effective sustainability transitions of organisations. We trace typologies of sustainable business models and their distinct evaluations of sustainability. In this chapter, we argue that integrating the triad of social, ecological and economic goals is central for sustainability attempts as well as long-term thinking. Therefore, our research offers a comprehensive overview of sustainability in the social sciences supporting researchers and practitioners to navigate this miscellaneous and scattered field. Accordingly, our study is precious to young scholars researching sustainability who want to use the term in an informed and meaningful way.

Details

Innovation, Social Responsibility and Sustainability
Type: Book
ISBN: 978-1-83797-462-7

Keywords

Article
Publication date: 14 January 2022

Mary-Ann Mallet, Kwame Owusu Kwateng and Dorcas Nuertey

This study aims to assess the effect of supplier–buyer association on supply chain sustainability using the pharmaceutical industry in Ghana as a case study.

Abstract

Purpose

This study aims to assess the effect of supplier–buyer association on supply chain sustainability using the pharmaceutical industry in Ghana as a case study.

Design/methodology/approach

The study used a quantitative research approach. The study design was a cross-sectional survey design. The unit of analysis for the study was top-level managers of pharmaceutical companies in Ghana. By the use of the purposive and convenience sampling techniques, 90 respondents from pharmaceutical firms in Ghana were included. The study used descriptive statistics, t-test and regression tools in the data analysis.

Findings

It was discovered that trust mediates positively the relationship between supplier–buyer relationship and supply chain sustainability. Moreover, the study found that supplier–buyer relationship (SBR) has a significant and positive impact on supply chain sustainability.

Practical implications

The study concluded that SBR is the foundation upon which effective supply chain and supply chain sustainability are established.

Originality/value

This paper provides researchers with a contemporary perspective toward understanding the relationship between SBR and supply chain sustainability and the mediating role of trust.

Details

International Journal of Pharmaceutical and Healthcare Marketing, vol. 16 no. 2
Type: Research Article
ISSN: 1750-6123

Keywords

Article
Publication date: 7 August 2017

Adetoun A. Oyelude

This edition looks at trending snippets mainly from library conferences around the world in the past few months.

240

Abstract

Purpose

This edition looks at trending snippets mainly from library conferences around the world in the past few months.

Design/methodology/approach

The conferences and the themes reflect the thoughts and focus of library and information professionals worldwide as seen in internet reports from wikis and blogs.

Findings

Thus far, data and data management is the most focused topic of 2017.

Social implications

Daniel Shapiro in his report on the LITA blog described his experience at the two-day workshop organized by the Library of Congress, George Washington University and George Mason University.

Originality/value

The workshop titled “Collections as data: hack-to-learn” had four datasets and five tools to work with. Over the two-day period, participants worked with data tools such as OpenRefine, Voyant, MALLET, Gephi and Carto. Working with the data and data analysis tools for Shapiro yielded results, but the usual process in research of formulating hypothesis is still crucial even with all the deluge of data.

Details

Library Hi Tech News, vol. 34 no. 6
Type: Research Article
ISSN: 0741-9058

Keywords

Article
Publication date: 29 July 2014

Karen Meager and John McLachlan

The purpose of this paper is to inform L&D Professionals of our research finding and the key highlights from our published book, so that they can use this information when…

3580

Abstract

Purpose

The purpose of this paper is to inform L&D Professionals of our research finding and the key highlights from our published book, so that they can use this information when reviewing or designing Leadership Development Programmes.

Design/methodology/approach

We wanted to discover the common themes present in successful leadership. We researched over 60 leaders from businesses of various sizes and structures. They completed a set of multiple choice questions (personality profiling questions) and then we asked them a set of open question to identify their likes/dislikes, keys to success, areas for development, values and main issues they face.

Findings

We found that the leaders profiled across a broad spectrum of personality types (from the multiple choice questions), and yet there were strong similarities in the themes in the open question answers. We concluded that successful leadership was not dependant on a personality type but could be developed and learnt while staying true to your own personality.

Research limitations/implications

We would have liked to research more leaders and define the research specifically by type of organization. As the purpose of the research was to inform our writing of a useful and practical leadership development book, we did not feel it was essential for this purpose.

Practical implications

We would like this to inform the shape of future leadership development towards a more “whole person” development and away from the traditional skills-based approach. This will support leaders to be healthier, more successful and better role models.

Social implications

Leaders are one of the most important roles in the world, and we need healthier, more rounded, emotionally regulated, more focused leaders to be appropriate role models for future generations. It is also important that a diverse range of leadership styles is accepted and developed in organizations.

Originality/value

What is new in our paper is the development of the idea, supported by our research that Leaders can be authentic and successful without the need for a personality transplant. We have brought together our research with our psychological qualifications and business experience to produce a leadership development approach that is deep in its thinking and construction but easy and practical to use and apply.

Details

Development and Learning in Organizations: An International Journal, vol. 28 no. 5
Type: Research Article
ISSN: 1477-7282

Keywords

1 – 10 of 435