Search results

1 – 10 of 37
Article
Publication date: 5 December 2023

Xiubin Gu, Yi Qu and Zhengkui Lin

The purpose of this study is to investigate the pricing strategies for knowledge payment products, taking into account the quality level of pirated knowledge products, in the…

93

Abstract

Purpose

The purpose of this study is to investigate the pricing strategies for knowledge payment products, taking into account the quality level of pirated knowledge products, in the context of platform copyright supervision.

Design/methodology/approach

This study abstracts the knowledge payment transaction process and aims to maximize producer's revenue by constructing a pricing model for knowledge payment products. It discusses pricing strategies for knowledge payment products under two scenarios: traditional supervision and blockchain supervision. The analysis explores the impact of pirated knowledge products quality level and blockchain technology on pricing strategies and consumer surplus, while providing threshold conditions for effective strategies.

Findings

Deploying blockchain technology in platform operations can significantly reduce costs and increase efficiency. In both scenarios, knowledge producer needs to balance factors such as the quality of pirated knowledge products, the supervision level of platform, and consumer surplus to dynamically adjust pricing strategies in order to maximize his own revenue.

Originality/value

This study enriches the literature on the pricing models of knowledge payment products and has practical significance in guiding knowledge producer to develop effective pricing strategies under copyright supervision.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Open Access
Article
Publication date: 13 March 2024

Keanu Telles

The paper provides a detailed historical account of Douglass C. North's early intellectual contributions and analytical developments in pursuing a Grand Theory for why some…

Abstract

Purpose

The paper provides a detailed historical account of Douglass C. North's early intellectual contributions and analytical developments in pursuing a Grand Theory for why some countries are rich and others poor.

Design/methodology/approach

The author approaches the discussion using a theoretical and historical reconstruction based on published and unpublished materials.

Findings

The systematic, continuous and profound attempt to answer the Smithian social coordination problem shaped North's journey from being a young serious Marxist to becoming one of the founders of New Institutional Economics. In the process, he was converted in the early 1950s into a rigid neoclassical economist, being one of the leaders in promoting New Economic History. The success of the cliometric revolution exposed the frailties of the movement itself, namely, the limitations of neoclassical economic theory to explain economic growth and social change. Incorporating transaction costs, the institutional framework in which property rights and contracts are measured, defined and enforced assumes a prominent role in explaining economic performance.

Originality/value

In the early 1970s, North adopted a naive theory of institutions and property rights still grounded in neoclassical assumptions. Institutional and organizational analysis is modeled as a social maximizing efficient equilibrium outcome. However, the increasing tension between the neoclassical theoretical apparatus and its failure to account for contrasting political and institutional structures, diverging economic paths and social change propelled the modification of its assumptions and progressive conceptual innovation. In the later 1970s and early 1980s, North abandoned the efficiency view and gradually became more critical of the objective rationality postulate. In this intellectual movement, North's avant-garde research program contributed significantly to the creation of New Institutional Economics.

Details

EconomiA, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1517-7580

Keywords

Article
Publication date: 5 May 2023

Shivangi Verma and Naval Garg

Post-millennial youths are well equipped with internet technology and computers since birth and find it easier to operate computers and technologies than their previous…

Abstract

Purpose

Post-millennial youths are well equipped with internet technology and computers since birth and find it easier to operate computers and technologies than their previous generations. With the advancement of technology, the ethical dilemma associated with its use has evolved. This paper aims to develop and validate a measurement scale for the ethical orientation of post-millennial technology usage by capturing the key factors that best describe the behavior adopted by students.

Design/methodology/approach

A systematic scale development procedure was used, involving both reviews of the literature and focus group discussions to generate the items that specify the domain of this study. After generating items, exploratory factor analysis and confirmatory factor analysis were applied to identify latent constructs of techno-ethical orientation. Lastly, the scale was subjected to reliability and validity testing.

Findings

The study found that the techno-ethical orientation scale has five dimensions: privacy concerns, classroom behavior, accessibility dilemma, social media usage and assignment ethics. Overall, a scale comprising 17 statements was derived.

Research limitations/implications

The findings of our study attempt to augment the growing efforts to explore all facets of techno-ethics. It is probably the first attempt to develop a valid and reliable scale for the techno-ethical orientation of post-millennial.

Practical implications

This scale could be used by academicians and practitioners to assess the techno-ethical orientation of post-millennial for positive interventions.

Originality/value

This study derives a new reliable and valid scale for measuring the techno-ethical orientation of post-millennial toward technology usage.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 20 March 2023

Sibongile Ngwenya and Omwoyo Bosire Onyancha

This paper aims to explore the diffusion of Intellectual Property (IP) knowledge in universities in Zimbabwe. Specifically, the study examines the tools, policies, programmes and…

Abstract

Purpose

This paper aims to explore the diffusion of Intellectual Property (IP) knowledge in universities in Zimbabwe. Specifically, the study examines the tools, policies, programmes and unique strategies used by the universities.

Design/methodology/approach

The paper reports the findings of a survey that was conducted on a population of lecturers (1,546), research officers (RO) (11), IP officer (1), faculty librarians (FLs) (27) and final year undergraduate students (9,224) at universities in Zimbabwe. Questionnaires were administered to the lecturers and students while interviews were administered to the IP officer, ROs and FLs. Data analysis comprised the use of Google forms and Microsoft Excel software.

Findings

The findings reveal diffusing IP knowledge in Zimbabwean universities involves mainly the use of policies and regulations, library web pages, workshops, although not specifically on IP, presentations on IP in the university, advice and guidance services and IP lectures/teaching.

Research limitations/implications

This study presents the IP situation in Zimbabwe and its findings may be applied to Africa and other developing countries.

Practical implications

This study endorses IP as a national issue and suggests a benchmark for diffusing knowledge on IP in Zimbabwean universities.

Originality/value

This study acknowledges the multi-disciplinary nature of IP and should lead to all university students graduating with adequate knowledge on IP.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 5 April 2024

Lida Haghnegahdar, Sameehan S. Joshi, Rohith Yanambaka Venkata, Daniel A. Riley and Narendra B. Dahotre

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems…

19

Abstract

Purpose

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems. Manufacturing systems are increasingly faced with risk of attacks not only by traditional malicious actors such as hackers and cyber-criminals but also by some competitors and organizations engaged in corporate espionage. This paper aims to elaborate a plausible risk practice of designing and demonstrate a case study for the compromised-based malicious for polymer 3D printing system.

Design/methodology/approach

This study assumes conditions when a machine was compromised and evaluates the effect of post compromised attack by studying its effects on tensile dog bone specimens as the printed object. The designed algorithm removed predetermined specific number of layers from the tensile samples. The samples were visually identical in terms of external physical dimensions even after removal of the layers. Samples were examined nondestructively for density. Additionally, destructive uniaxial tensile tests were carried out on the modified samples and compared to the unmodified sample as a control for various mechanical properties. It is worth noting that the current approach was adapted for illustrating the impact of cyber altercations on properties of additively produced parts in a quantitative manner. It concurrently pointed towards the vulnerabilities of advanced manufacturing systems and a need for designing robust mitigation/defense mechanism against the cyber altercations.

Findings

Density, Young’s modulus and maximum strength steadily decreased with an increase in the number of missing layers, whereas a no clear trend was observed in the case of % elongation. Post tensile test observations of the sample cross-sections confirmed the successful removal of the layers from the samples by the designed method. As a result, the current work presented a cyber-attack model and its quantitative implications on the mechanical properties of 3D printed objects.

Originality/value

To the best of the authors’ knowledge, this is the original work from the team. It is currently not under consideration for publication in any other avenue. The paper provides quantitative approach of realizing impact of cyber intrusions on deteriorated performance of additively manufactured products. It also enlists important intrusion mechanisms relevant to additive manufacturing.

Details

Rapid Prototyping Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-2546

Keywords

Article
Publication date: 5 June 2023

Gagan Deep Kaur

The paper aims to discuss error detection and correction in Kashmiri carpet weaving (KCW), mediated by cryptographic code, Talim which is held to guarantee accurate information…

19

Abstract

Purpose

The paper aims to discuss error detection and correction in Kashmiri carpet weaving (KCW), mediated by cryptographic code, Talim which is held to guarantee accurate information transference from designing to weaving, even after hundred years. Yet, carpets often show errors on completion.

Design/methodology/approach

Human factors analysis revealed error emergence, detection and correction in this practice whose task domains are distributed over large geographies (from in-premises to several kilometers) and timescales (from days to decades). Using prospective observation method, production process of two research carpets from their design, coding and weaving was observed while noting the errors made, identified and corrected by actors in each phase.

Findings

The errors were found to emerge, identified and corrected during different phases of designing, coding and weaving while giving rise to fresh errors in each phase, due to actors’ normal work routines.

Originality/value

In view of this, usual branding of “weaver-error” behind flawed carpet turns out to be misplaced value judgment passed in hindsight.

Details

Research Journal of Textile and Apparel, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1560-6074

Keywords

Article
Publication date: 19 April 2023

Subaveerapandiyan A., Priyanka Sinha, Madhuri Kumari and Mohammad Amees

The present study investigates information-sharing behaviour and awareness of students towards the infringement of copyright and associated rights while information sharing. The…

Abstract

Purpose

The present study investigates information-sharing behaviour and awareness of students towards the infringement of copyright and associated rights while information sharing. The purpose of this study is to seek answers to the issue of whether or not students infringe on the rights of others and, if they do, whether they do so deliberately or unwittingly. Even though the Copyright Act and copyrighted works are often disregarded, students, teachers and peers are long-term trading and adapting new e-resources for their use.

Design/methodology/approach

The study collected data from students in India through a survey using Google Forms from January 2022 to May 2022. It analysed it using SPSS software to identify behaviour patterns, trends and factors influencing actions and awareness regarding potential copyright issues during data sharing.

Findings

The study finds that many students in India engage in copyright infringement, either deliberately or unwittingly. Many students are unaware of copyright laws and regulations and do not understand the consequences of their actions.

Research limitations/implications

The study’s findings are limited to students in Tamil Nadu, India, and may not represent students in other countries or regions. The findings can inform policies and educational programmes that promote ethical and legal behaviour among students and help reduce the incidence of copyright infringement.

Originality/value

This study’s originality and value stem from its unique approach of merging information sharing, seeking and copyright concepts.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 8 January 2024

Milind Tiwari, Jamie Ferrill and Douglas M.C. Allan

This paper aims to offer the first known synthesis of peer-reviewed literature on trade-based money laundering (TBML). Given the topic is in its nascent stage yet gaining…

Abstract

Purpose

This paper aims to offer the first known synthesis of peer-reviewed literature on trade-based money laundering (TBML). Given the topic is in its nascent stage yet gaining prominence across scholarship and practice, this foundation is pertinent for future TBML research.

Design/methodology/approach

A systematic literature review was undertaken with a formulaic search string. Both qualitative (thematic) and quantitative (meta) analysis methods were used to illustrate the findings.

Findings

The systematic literature review, using qualitative and quantitative synthesis, led to a thematic categorization of extant TBML literature into four categories: TBML risk assessment, TBML detection, the role of professionals and understanding of TBML. Due to the limited number of studies, insights that can be drawn from the extant literature on the best way to combat TBML are also limited.

Originality/value

As the first systematic literature review on TBML, this study identified that the existing TBML literature has focused on increasing the understanding of the phenomenon in terms of its definition and mechanisms, detection, linkage with other crimes, such as organized crime and terrorism financing, and risk assessment frameworks. The originality of these findings lies in identifying areas future researchers might explore to broaden the academic literature.

Details

Journal of Accounting Literature, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-4607

Keywords

Article
Publication date: 3 April 2024

Tim Wright, Zainab Ruhwanya and Jacques Ophoff

The COVID-19 pandemic necessitated a significant shift in how employees executed their professional responsibilities. Concurrently, the incidence of cybercrime experienced a…

Abstract

Purpose

The COVID-19 pandemic necessitated a significant shift in how employees executed their professional responsibilities. Concurrently, the incidence of cybercrime experienced a noteworthy surge due to the increased utilisation of cyberspace. The abrupt transition to telecommuting altered the interpersonal dynamics inherent in traditional work environments. This paper aims to examine the impact of interpersonal factors on the cybercrime preventative measures adopted by telecommuting employees.

Design/methodology/approach

A conceptual model, grounded in the Theory of Interpersonal Behaviour, is evaluated through an online survey. The data set comprises responses from 209 employees in South Africa, and the analysis uses partial least squares structural equation modelling.

Findings

The results reveal substantial predictive power to explain cybercrime preventative behaviours. Notably, the study underscores the significant influence of habit and affect on intention and subsequent behaviour.

Practical implications

The results suggest that practitioners should give due attention to emotional dimensions (affect) as a catalyst for information security behaviour. The formulation of employees’ information security responsibilities should be pragmatic, fostering subconscious compliance to establish routine behaviour (habit).

Originality/value

This research underscores the pivotal roles played by habit and emotions in shaping behavioural patterns related to information security. Furthermore, it provides researchers with an illustrative model for operationalising these constructs within the realm of security. The results contribute additional perspectives on the repercussions of the COVID-19 pandemic on cybercrime preventative behaviours.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 29 February 2024

Robert Bogue

The purpose of this paper is to illustrate the growing role of robots in the logistics industry.

Abstract

Purpose

The purpose of this paper is to illustrate the growing role of robots in the logistics industry.

Design/methodology/approach

Following an introduction, which identifies key challenges facing the industry, this paper discusses robotic applications in warehouses, followed by sections covering transportation and delivery and conclusions.

Findings

The logistics industry faces a number of challenges that drive technological and operational changes. Robots are already playing a role within the warehouse sector and more complex applications have recently arisen from developments in artificial intelligence-enabled vision technology. In the transportation sector, autonomous trucks are being developed and trialled by leading manufacturers. Many major logistics companies are involved and limited services are underway. Last-mile delivery applications are growing rapidly, and trials, pilot schemes and commercial services are underway in Europe, the USA and the Far East. The Chinese market is particularly buoyant, and in 2019, a delivery robot was launched that operates on public roads, based on Level-4 autonomous driving technology. The drone delivery sector has been slower to develop, in part due to regulatory constraints, but services are now being operated by drone manufacturers, retailers and logistics providers.

Originality/value

This paper provides details of existing and future applications of robots in the logistics industry.

Details

Industrial Robot: the international journal of robotics research and application, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0143-991X

Keywords

1 – 10 of 37