Search results

1 – 5 of 5
Content available
Article
Publication date: 21 October 2019

Jill Dickinson

271

Abstract

Details

Journal of Property, Planning and Environmental Law, vol. 11 no. 3
Type: Research Article
ISSN: 2514-9407

Content available
Book part
Publication date: 26 September 2022

Richard D. Simmons and Nigel Culkin

Abstract

Details

Covid, Brexit and The Anglosphere
Type: Book
ISBN: 978-1-80382-690-5

Open Access
Article
Publication date: 11 January 2016

Jorge Martins and Miguel Baptista Nunes

The purpose of this paper is to present the results of an exploratory study that investigates Portuguese academics’ conceptions concerning the temporal properties of e-learning…

3799

Abstract

Purpose

The purpose of this paper is to present the results of an exploratory study that investigates Portuguese academics’ conceptions concerning the temporal properties of e-learning, in the context of traditional Higher Education Institutions.

Design/methodology/approach

Grounded Theory methodology was used to systematically analyse data collected in semi-structured interviews with 62 academics. Data analysis followed the constant comparative method and its three-staged coding approach: open, axial and selective coding. Data collection and analysis developed until theoretical saturation was reached.

Findings

Emergent academics’ conceptions concerning the temporal properties of e-learning indicate the existence of unregulated and unaccounted for dynamics, which are a direct consequence of transitioning from campus-based lecturing to teaching online using the affordances of virtual learning environments. This transition produces disruptions to established workload metrics and work patterns, as well as conflicts with dominant modes of instructional delivery that are not synchronised with the demands of online interaction and immediacy.

Originality/value

This paper is valuable to e-learning strategists and administrators. An understanding of the temporal properties of e-learning as perceived by academics provides actionable knowledge that is directly applicable to the design of suitable work arrangements, normative frameworks and e-learning practices that address perceived time-related barriers. To mitigate the time-related conflicts and disruptions identified in the study the authors suggest the establishment of university-wide norms of virtual presence and the implementation of temporal protocols to sustain the productive engagement between instructors and learners.

Details

International Journal of Educational Management, vol. 30 no. 1
Type: Research Article
ISSN: 0951-354X

Keywords

Open Access
Article
Publication date: 20 November 2023

Zaina Nakabuye, Jamiah Mayanja, Sarah Bimbona and Micheal Wassermann

The purpose of this paper is to investigate the relationships between technology orientations and export performance of small and medium-sized enterprises (SMEs).

1216

Abstract

Purpose

The purpose of this paper is to investigate the relationships between technology orientations and export performance of small and medium-sized enterprises (SMEs).

Design/methodology/approach

A quantitative research design was adopted for this study. The paper formulates hypotheses from the literature review. These hypotheses are tested using structural equation modeling with data collected from 231 SMEs in Uganda. Data were analyzed using SPSS version 23 and AMOS.

Findings

The findings of this study showed technology orientation has a positive and significant relationship with the performance of Ugandan SMEs and that supply chain agility moderates technology orientation and export performance.

Research limitations/implications

The study discusses the findings, advances limitations and managerial implications. It also suggests future research avenues. It proposes some recommendations to help Ugandan SMEs to form flexible supply chains, use the latest technology and create strong relationship ties with their partners in the supply chain.

Practical implications

The study suggests that managers of Ugandan SMEs should use the latest technology in production, marketing, logistics and supply chain management which will enable them to respond quickly to customer tastes and preferences leading to higher levels of export performance.

Originality/value

This study contributes to the literature on strategic management showing the reliability of scales used and the confirmatory of the factor structure. This study shows that in strategic management technology, orientation is critical in increasing export performance. This study has extended the resource-based view (RBV) and dynamic capabilities theories.

Details

Modern Supply Chain Research and Applications, vol. 5 no. 4
Type: Research Article
ISSN: 2631-3871

Keywords

Open Access
Article
Publication date: 14 August 2020

F.J. Farsana, V.R. Devi and K. Gopakumar

This paper introduces an audio encryption algorithm based on permutation of audio samples using discrete modified Henon map followed by substitution operation with keystream…

1573

Abstract

This paper introduces an audio encryption algorithm based on permutation of audio samples using discrete modified Henon map followed by substitution operation with keystream generated from the modified Lorenz-Hyperchaotic system. In this work, the audio file is initially compressed by Fast Walsh Hadamard Transform (FWHT) for removing the residual intelligibility in the transform domain. The resulting file is then encrypted in two phases. In the first phase permutation operation is carried out using modified discrete Henon map to weaken the correlation between adjacent samples. In the second phase it utilizes modified-Lorenz hyperchaotic system for substitution operation to fill the silent periods within the speech conversation. Dynamic keystream generation mechanism is also introduced to enhance the correlation between plaintext and encrypted text. Various quality metrics analysis such as correlation, signal to noise ratio (SNR), differential attacks, spectral entropy, histogram analysis, keyspace and key sensitivity are carried out to evaluate the quality of the proposed algorithm. The simulation results and numerical analyses demonstrate that the proposed algorithm has excellent security performance and robust against various cryptographic attacks.

Details

Applied Computing and Informatics, vol. 19 no. 3/4
Type: Research Article
ISSN: 2634-1964

Keywords

Access

Only content I have access to

Year

Content type

1 – 5 of 5