Search results

1 – 10 of over 2000
Content available
Article
Publication date: 23 June 2021

Joe Garcia, Russell Shannon, Aaron Jacobson, William Mosca, Michael Burger and Roberto Maldonado

This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software…

1340

Abstract

Purpose

This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong traceability and provability concerning the SSA’s output product, known as an operational flight program (OFP). Through a secure development environment (SDE), each critical software development function performed on said OFP during its development has a corresponding record represented on a blockchain.

Design/methodology/approach

An SDE is implemented as a virtual machine or container incorporating software development tools that are modified to support blockchain transactions. Each critical software development function, e.g. editing, compiling, linking, generates a blockchain transaction message with associated information embedded in the output of a said function that, together, can be used to prove integrity and support traceability. An attestation process is used to provide proof that the toolchain containing SDE is not subject to unauthorized modification at the time said critical function is performed.

Findings

Blockchain methods are shown to be a viable approach for supporting exhaustive traceability and strong provability of development system integrity for mission-critical software produced by an NAE SSA for NAE embedded systems software.

Practical implications

A blockchain-based authentication approach that could be implemented at the OFP point-of-load would provide for fine-grain authentication of all OFP software components, with each component or module having its own proof-of-integrity (including the integrity of the used development tools) over its entire development history.

Originality/value

Many SSAs have established control procedures for development such as check-out/check-in. This does not prove the SSA output software is secure. For one thing, a build system does not necessarily enforce procedures in a way that is determinable from the output. Furthermore, the SSA toolchain itself could be attacked. The approach described in this paper enforces security policy and embeds information into the output of every development function that can be cross-referenced to blockchain transaction records for provability and traceability that only trusted tools, free from unauthorized modifications, are used in software development. A key original concept of this approach is that it treats assigned developer time as a transferable digital currency.

Open Access
Article
Publication date: 5 October 2022

Shqipe Gashi Nulleshi and Malin Tillmar

The purpose of this paper is to examine how rural entrepreneurship is discussed by analyzing articles in the leading journals of the two main research fields, entrepreneurship…

1674

Abstract

Purpose

The purpose of this paper is to examine how rural entrepreneurship is discussed by analyzing articles in the leading journals of the two main research fields, entrepreneurship studies, and rural studies, through the concept of rural proofing.

Design/methodology/approach

The systematic literature review centers on the two main fields where rural entrepreneurship is studied and covers papers in nine leading journals in entrepreneurship studies and two leading journals in rural studies, between the years 1989 and 2020. In total, 97 papers were reviewed and we utilize and operationalize the rural proofing concept based on Fahmy et al.'s (2004) 3 characteristics of rural: remoteness, accessibility, and rural locale and sense of place. The authors take stock of the dimensions of rural proofing addressed within each of the research fields to find similarities and differences; that is, if articles are rural proofed (or not) when discussing rural entrepreneurship.

Findings

The classification of articles across the three dimensions of rural proofing shows that the field of rural entrepreneurship is being addressed mainly in the dimensions of remoteness and accessibility, while few authors in rural studies journals give priority to the rural locale and sense of place dimension. The results of the authors' review reveal that out of a total of 97 articles on rural entrepreneurship, 56 articles address at least one dimension of rural proofing and 41 articles do not address any dimension. Among the 41 articles not rural proofed, rurality is not problematized when discussing rural entrepreneurship. Instead, the authors focus on specific topics such as social capital, community entrepreneurship/networks, entrepreneurs'/farmers' identity, illegality in rural areas, and institutional framework. The number of non-rural-proofed articles in entrepreneurship journals is almost double that in rural studies journals. This means that authors in entrepreneurship journals do not problematize rurality to the same extent as authors in rural studies journals when addressing rural entrepreneurship.

Research limitations/implications

The authors emphasize the need for increased cross-fertilization between the fields of entrepreneurship and rural studies as an avenue to develop the entrepreneurship field in the direction towards rural proofing. A close collaboration with academia and policymakers is essential to promote interdisciplinary research in order to make a distinctive contribution to rural development. Scholars in either of the two fields will benefit from our review and identification of similarities and differences in the research. The review is one step towards promoting a closer dialog between the two fields.

Originality/value

Previous reviews have focused mainly on what rural entrepreneurship entails (e.g. what topics are discussed) rather than how rural entrepreneurship is discussed. This paper centers on the differences and similarities of the two main fields and provides an in-depth qualitative analysis of how rural entrepreneurship is discussed by utilizing the rural proofing concept.

Details

International Journal of Entrepreneurial Behavior & Research, vol. 28 no. 9
Type: Research Article
ISSN: 1355-2554

Keywords

Open Access
Article
Publication date: 29 October 2021

Subramanian Visweswaran

The purpose of this article is to determine necessary and sufficient conditions in order that (D, K) to be an S-accr pair, where D is an integral domain and K is a field which…

1534

Abstract

Purpose

The purpose of this article is to determine necessary and sufficient conditions in order that (D, K) to be an S-accr pair, where D is an integral domain and K is a field which contains D as a subring and S is a multiplicatively closed subset of D.

Design/methodology/approach

The methods used are from the topic multiplicative ideal theory from commutative ring theory.

Findings

Let S be a strongly multiplicatively closed subset of an integral domain D such that the ring of fractions of D with respect to S is not a field. Then it is shown that (D, K) is an S-accr pair if and only if K is algebraic over D and the integral closure of the ring of fractions of D with respect to S in K is a one-dimensional Prüfer domain. Let D, S, K be as above. If each intermediate domain between D and K satisfies S-strong accr*, then it is shown that K is algebraic over D and the integral closure of the ring of fractions of D with respect to S is a Dedekind domain; the separable degree of K over F is finite and K has finite exponent over F, where F is the quotient field of D.

Originality/value

Motivated by the work of some researchers on S-accr, the concept of S-strong accr* is introduced and we determine some necessary conditions in order that (D, K) to be an S-strong accr* pair. This study helps us to understand the behaviour of the rings between D and K.

Details

Arab Journal of Mathematical Sciences, vol. 29 no. 1
Type: Research Article
ISSN: 1319-5166

Keywords

Open Access
Article
Publication date: 25 August 2020

Munmun Hazarika and Sougata Marik

For n…

Abstract

For n1, let Dn be the polydisk in n, and let Tn be the n-torus. L2(Tn) denotes the space of Lebesgue square integrable functions on Tn. In this paper we define slant Toeplitz operators on L2(Tn). Besides giving a necessary and sufficient condition for an operator on L2(Tn) to be slant Toeplitz, we also establish several properties of slant Toeplitz operators.

Details

Arab Journal of Mathematical Sciences, vol. 27 no. 1
Type: Research Article
ISSN: 1319-5166

Keywords

Open Access
Article
Publication date: 11 January 2019

Aguech Rafik and Selmi Olfa

In this paper, we consider a two color multi-drawing urn model. At each discrete time step, we draw uniformly at random a sample of m…

Abstract

In this paper, we consider a two color multi-drawing urn model. At each discrete time step, we draw uniformly at random a sample of m balls (m1) and note their color, they will be returned to the urn together with a random number of balls depending on the sample’s composition. The replacement rule is a 2 × 2 matrix depending on bounded discrete positive random variables. Using a stochastic approximation algorithm and martingales methods, we investigate the asymptotic behavior of the urn after many draws.

Details

Arab Journal of Mathematical Sciences, vol. 26 no. 1/2
Type: Research Article
ISSN: 1319-5166

Keywords

Open Access
Article
Publication date: 14 December 2021

Phillip Baumann and Kevin Sturm

The goal of this paper is to give a comprehensive and short review on how to compute the first- and second-order topological derivatives and potentially higher-order topological…

Abstract

Purpose

The goal of this paper is to give a comprehensive and short review on how to compute the first- and second-order topological derivatives and potentially higher-order topological derivatives for partial differential equation (PDE) constrained shape functionals.

Design/methodology/approach

The authors employ the adjoint and averaged adjoint variable within the Lagrangian framework and compare three different adjoint-based methods to compute higher-order topological derivatives. To illustrate the methodology proposed in this paper, the authors then apply the methods to a linear elasticity model.

Findings

The authors compute the first- and second-order topological derivatives of the linear elasticity model for various shape functionals in dimension two and three using Amstutz' method, the averaged adjoint method and Delfour's method.

Originality/value

In contrast to other contributions regarding this subject, the authors not only compute the first- and second-order topological derivatives, but additionally give some insight on various methods and compare their applicability and efficiency with respect to the underlying problem formulation.

Details

Engineering Computations, vol. 39 no. 1
Type: Research Article
ISSN: 0264-4401

Keywords

Open Access
Article
Publication date: 15 March 2019

Tarek Saanouni

The initial value problem for a semi-linear high-order heat equation is investigated. In the focusing case, global well-posedness and exponential decay are obtained. In the…

Abstract

The initial value problem for a semi-linear high-order heat equation is investigated. In the focusing case, global well-posedness and exponential decay are obtained. In the focusing sign, global and non global existence of solutions are discussed via the potential well method.

Details

Arab Journal of Mathematical Sciences, vol. 26 no. 1/2
Type: Research Article
ISSN: 1319-5166

Keywords

Open Access
Article
Publication date: 27 April 2023

Lars Mäncher, Christopher Zerres and Thomas Breyer-Mayländer

The aim of the research is to identify the factors that create an authentic company's corporate social responsibility (CSR) engagement and to investigate whether an authentic CSR…

2217

Abstract

Purpose

The aim of the research is to identify the factors that create an authentic company's corporate social responsibility (CSR) engagement and to investigate whether an authentic CSR engagement influences the purchase intention. In addition, the study attempts to provide insights into the mediation role of attitude toward the company and frequency of purchase on purchase intention.

Design/methodology/approach

In this study, a theoretical framework is developed in which major antecedents of authentic CSR are identified. A specific example of a brand and its corporate social responsibility activities was used for the study. An online questionnaire was used to collect the data. To verify the hypothesis, structural equation modeling with the partial least squares method was used. A total of 240 people participated in the study.

Findings

The results of the study confirmed that CSR authenticity positively influences consumer purchase intention. Furthermore, the hypothesized impact of CSR authenticity on attitudes toward the company and frequency of purchase could be verified.

Originality/value

Although there is research on the antecedents influencing the consumer's perceived authenticity of CSR, it has not addressed differences in impact and has not presented a full picture of influencing antecedents. In addition, CSR proof as a new antecedent is investigated in the study. Moreover, research on outcomes of perceived CSR authenticity still lacks depth. The study therefore addresses this research gap by providing an extensive research framework including antecedents influencing CSR authenticity and outcomes of CSR authenticity.

Details

European Journal of Management Studies, vol. 28 no. 2
Type: Research Article
ISSN: 2183-4172

Keywords

Content available
Article
Publication date: 23 November 2021

Phuc Bao Uyen Nguyen

The purpose is to develop search and detection strategies that maximize the probability of detection of mine-like objects.

Abstract

Purpose

The purpose is to develop search and detection strategies that maximize the probability of detection of mine-like objects.

Design/methodology/approach

The author have developed a methodology that incorporates variational calculus, number theory and algebra to derive a globally optimal strategy that maximizes the expected probability of detection.

Findings

The author found a set of look angles that globally maximize the probability of detection for a general class of mirror symmetric targets.

Research limitations/implications

The optimal strategies only maximize the probability of detection and not the probability of identification.

Practical implications

In the context of a search and detection operation, there is only a limited time to find the target before life is lost; hence, improving the chance of detection will in real terms be translated into the difference between success or failure, life or death. This rich field of study can be applied to mine countermeasure operations to make sure that the areas of operations are free of mines so that naval operations can be conducted safely.

Originality/value

There are two novel elements in this paper. First, the author determine the set of globally optimal look angles that maximize the probability of detection. Second, the author introduce the phenomenon of concordance between sensor images.

Details

Journal of Defense Analytics and Logistics, vol. 5 no. 2
Type: Research Article
ISSN: 2399-6439

Keywords

Content available
Book part
Publication date: 9 March 2021

Abstract

Details

The Emerald Handbook of Blockchain for Business
Type: Book
ISBN: 978-1-83982-198-1

1 – 10 of over 2000