Search results

1 – 10 of 14
Article
Publication date: 11 February 2019

Purnomo Yustianto, Robin Doss and Suhardi

The modelling landscape experiences a rich proliferation of modelling language, or metamodel. The emergence of cross-disciplinary disciplines, such as enterprise engineering and…

Abstract

Purpose

The modelling landscape experiences a rich proliferation of modelling language, or metamodel. The emergence of cross-disciplinary disciplines, such as enterprise engineering and service engineering, necessitates a multi-perspective approach to traverse the component from strategic level to technological aspect. This paper aims to find a unifying structure of metamodels introduced by academics and industries.

Design/methodology/approach

A grounded approach is taken to define the structure by collating the metamodels to form an emerging structure. Metamodels were collected from a literature survey from several interrelated disciplines: software engineering, system engineering, enterprise architecture, service engineering, business process management and financial accounting.

Findings

The result suggests seven stereotypes of metamodel, characterized by its label: goal, enterprise, business model, service, process, software and system. The aspect of “process” holds a central role in connecting all other aspect in the modelling continuum. Service engineering can be viewed as an alternative abstraction of enterprise engineering in containing the concepts of “business model”, “capability”, “value”, “interaction”, “process” and “software”.

Research limitations/implications

Metamodel collection was performed to emphasize on representativeness rather than comprehensiveness, in which old and unpopular metamodel were disregarded unless it offer unique characteristic not yet represented in the collection. Owing to its bottom-up approach, the paper is not intended to identify a gap in metamodel offering.

Originality/value

This paper produces a structure of metamodel landscape in a graphical format to illustrate correlation between metamodels in which evolutive patterns of metamodel proliferation can be observed. The produced structure can serve as map in metamodel continuum.

Details

Journal of Modelling in Management, vol. 14 no. 1
Type: Research Article
ISSN: 1746-5664

Keywords

Article
Publication date: 31 December 2006

R. Chellappa Doss, A. Jennings and N. Shenoy

Routing in ad hoc networks faces significant challenges due to node mobility and dynamic network topology. In this work we propose the use of mobility prediction to reduce the…

Abstract

Routing in ad hoc networks faces significant challenges due to node mobility and dynamic network topology. In this work we propose the use of mobility prediction to reduce the search space required for route discovery. A method of mobility prediction making use of a sectorized cluster structure is described with the proposal of the Prediction based Location Aided Routing (P‐LAR) protocol. Simulation study and analytical results of P‐LAR find it to offer considerable saving in the amount of routing traffic generated during the route discovery phase.

Details

International Journal of Pervasive Computing and Communications, vol. 2 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Book part
Publication date: 15 May 2023

Joshua J. Turner, Olena Kopystynska, Kay Bradford, Brian J. Higginbotham and David G. Schramm

High divorce rates have coincided with higher rates of remarriage. Although remarriages are more susceptible to dissolution than first-order marriages, less research has focused…

Abstract

High divorce rates have coincided with higher rates of remarriage. Although remarriages are more susceptible to dissolution than first-order marriages, less research has focused on factors that promote vulnerabilities among remarried couples. In the current study, the authors focused on whether predictors of divorce differ by the number of times someone has been married. The authors examined some of the most common reasons for divorce, as identified by parents who completed a state-mandated divorce education course (n = 8,364), while also controlling for participant sociodemographic characteristics. Participants going through their first divorce were more likely to identify growing apart and infidelity as reasons for seeking a divorce. Conversely, those going through a subsequent divorce were more likely to list problems with alcohol/drug abuse, childrearing differences, emotional/psychological/verbal mistreatment, money problems, physical violence, and arguing. Multivariate analyses indicated that sociodemographic factors were stronger predictors of divorce number than commonly listed reasons for divorce for both male and female participants. Implications for remarital and stepfamily stability and directions for future research are discussed.

Details

Conjugal Trajectories: Relationship Beginnings, Change, and Dissolutions
Type: Book
ISBN: 978-1-80455-394-7

Keywords

Book part
Publication date: 2 June 2022

Robin Phelps-Ward and Jimmy L. Howard

The experience of going natural or deciding to rock an afro, wash-n-go, twist-out, or braided updo on a campus where similar faces are rarely seen in the classroom, in the…

Abstract

The experience of going natural or deciding to rock an afro, wash-n-go, twist-out, or braided updo on a campus where similar faces are rarely seen in the classroom, in the residence hall, or even in the nearby local community can be one fraught with numerous personal and political identity tensions. Nonetheless, this is the experience for many Black women collegians, both undergraduate and graduate, who choose to wear their natural hair in its kinky, curly, coily, or afro-textured state while in college. Through an intersectional perspective we examine the stories of six Black women and their experiences with their hair, identities, and community as they transitioned to wearing their natural hair. Through this study we center the bodies, voices, and needs of Black women as they navigate the complexities of thriving in a Eurocentric environment (i.e., a predominantly white university). This chapter ends with a call for greater attention to the meaningfulness of Black women's hair and a discussion of strategies for campus agents to more intentionally support Black women throughout their development in college.

Details

African American Young Girls and Women in PreK12 Schools and Beyond
Type: Book
ISBN: 978-1-78769-532-0

Keywords

Article
Publication date: 9 August 2021

Sameeullah Khan, Asif Iqbal Fazili and Irfan Bashir

This paper aims to theorize counterfeit luxury consumption among millennials from a generational identity perspective.

1653

Abstract

Purpose

This paper aims to theorize counterfeit luxury consumption among millennials from a generational identity perspective.

Design/methodology/approach

The paper proposes and tests a model of counterfeit buying behavior using an online survey of 467 millennial respondents. The study uses multi-item measures from the extant literature and uses the structural equation modeling technique to test the proposed hypotheses.

Findings

The findings reveal when millennials have a self-defining relationship with their generation, they tend to internalize the generational norm pertaining to counterfeit luxury consumption. Millennials’ counterfeit related values: market mavenism, postmodernism, schadenfreude and public self-consciousness contribute to their generational identity. Moreover, market mavenism, cool consumption and public self-consciousness establish counterfeit luxury consumption as a generational norm.

Practical implications

The findings of this paper suggest that the expertise and influence of market mavens can be used to deter counterfeit consumption. Moreover, luxury brands must communicate a cool image to offset the rebellious image of counterfeits. Further, from a standardization versus adaption standpoint, the generational perspective allows for the standardization of anti-counterfeiting campaigns.

Originality/value

The paper makes a novel contribution to the counterfeiting literature by demonstrating that millennials pursue counterfeit luxury brands when they pledge cognitive allegiance to their generation. The paper, thus, extends the identity perspective of counterfeit luxury consumption to group contexts. The authors also test and validate the role of descriptive norms in group contexts by introducing the construct generational norm to counterfeiting literature.

Details

Journal of Product & Brand Management, vol. 31 no. 3
Type: Research Article
ISSN: 1061-0421

Keywords

Article
Publication date: 16 February 2015

Robin Miller and Steve Appleton

– The purpose of this paper is to explore integration and complexity through the evaluation of a case study service which supports multiply excluded homeless people.

Abstract

Purpose

The purpose of this paper is to explore integration and complexity through the evaluation of a case study service which supports multiply excluded homeless people.

Design/methodology/approach

A mixed methods theory based evaluation. Data gathering included semi-structured interviews with external stakeholders, analysis of referral and outcome data, focus groups with frontline staff members and managers, and interviews with people living in the service.

Findings

The service was highly rated by its stakeholders due to its ability to meet the immediate needs of many individuals and to facilitate access and engagement with community and specialist resources. However, not every individual responded to the support that was an offer, and a number were unable to access the service due to the nature of their needs or a lack of capacity in the service. Whilst the service was able to engage community and specialist services this often appeared to be within the parameters set by these services rather than flexibly around the needs of the individual.

Research limitations/implications

The research is based in one case study service and findings may not be transferable to different local contexts and providers. However, the findings are consistent with previous studies.

Practical implications

It is possible for commissioners to intervene in the complexities that multiply excluded homeless people experiences through the introduction of a new service. However, this is unlikely to address all of the gaps and fragmentation that people in these circumstances face. It is therefore important that partners are sensitive to such limitations and have a shared willingness to respond to continuing gaps and shortfalls.

Social implications

Despite specific national policies people continue to experience multiple exclusion homelessness which suggest that more still needs to be done to prevent people from this extremely disadvantaged social circumstance. Whilst specialist services can provide excellent support the response is still fragmented for some people meaning that work to better integrate their responses must continue.

Originality/value

The paper contributes to the evidence base of support models for multiple excluded homeless people and the factors that can enable a housing support service to respond to such needs. It also provides comment on the relevance of the concept of complex adaptive systems to the study of integration.

Details

Journal of Integrated Care, vol. 23 no. 1
Type: Research Article
ISSN: 1476-9018

Keywords

Article
Publication date: 1 October 2004

Alan D. Smith

With the rapid growth of e‐commerce, governmental and corporate agencies are taking extra precautions when it comes to protecting information. The development of e‐security as a…

4727

Abstract

With the rapid growth of e‐commerce, governmental and corporate agencies are taking extra precautions when it comes to protecting information. The development of e‐security as a discipline has enabled organisations to discover a wider array of similarities between attacks occurring across their security environment and develop appropriate countermeasures. To further improve the security of information, there is a need for conceptualising the interrelationships between e‐security and the major elements involved in changing a company's infrastructure. Organisations should act in an ethical manner, especially when it comes to e‐security and e‐privacy policies, procedures, and practices. The consequential theory of utilitarianism is used and applied to a conceptual model to help explain how organisations may develop better secured information in an information‐sharing and globally networked environment.

Details

Aslib Proceedings, vol. 56 no. 5
Type: Research Article
ISSN: 0001-253X

Keywords

Article
Publication date: 1 March 1994

Rachid Zeffane and Bruce Cheek

Because information is vital to effective decision making, the fostering of conditions which promote effective use of existing channels of information is therefore seen as a prime…

188

Abstract

Because information is vital to effective decision making, the fostering of conditions which promote effective use of existing channels of information is therefore seen as a prime element contributing to organizational survival and success (Fulmer et al, 1990). In particular, the way in which characteristics of individuals and the attributes of the tasks they perform, affect the use of different information sources is a pertinent issue in organizational analysis. It is also an important consideration in information systems development and management. Much of the existing research in this area has been dominated by attempts to define appropriate modes of information processing and the construction of models that might enhance effective communication (O'Reilly, 1982; Schick et al, 1990; Kim 8c Lee, 1991). The importance of this area of research has been heightened by the dynamics and complexities of industrial organizations and the need for various modes of information processing to address these dynamics (Kim & Lee, 1991). Also, because the appropriate use of information is the ‘life‐blood’ of organizational dynamics, the identification of aspects that might affect differential use of various channels (of information) is fundamental to an understanding of the area.

Details

Management Research News, vol. 17 no. 3/4
Type: Research Article
ISSN: 0140-9174

Open Access
Article
Publication date: 15 June 2002

Katey Walker

Abstract

Details

Journal of Leadership Education, vol. 1 no. 1
Type: Research Article
ISSN: 1552-9045

Article
Publication date: 8 January 2018

Kristina Sundberg and Ulrika Kjellman

The purpose of this paper is to investigate how tattoos can be considered documents of an individual’s identity, experiences, status and actions in a given context, relating to…

3116

Abstract

Purpose

The purpose of this paper is to investigate how tattoos can be considered documents of an individual’s identity, experiences, status and actions in a given context, relating to ideas stating that archival records/documents can be of many types and have different functions. The paper also wants to discuss how tattoos serve as a bank of memories and evidence on a living body; in this respect, the tattooed body can be viewed as an archive, which immortalises and symbolises the events and relationships an individual has experienced in his or her life, and this in relation to a specific social and cultural context.

Design/methodology/approach

To discuss these issues, the authors take the point of departure in the tattoo practice of Russian/Soviet prisoners. The tattoo material referred to is from the “Russian Criminal Tattoo Archive”. The archive is created by FUEL Design and Publishing that holds the meanings of the tattoos as explained in Russian Criminal Tattoo Encyclopaedia Volume I-III. The authors exemplify this practice with two photographs of Soviet/Russian prisoners and their tattoos. By using a semiotic analysis that contextualises these images primarily through literature studies, the authors try to say something about what meaning these tattoos might carry.

Findings

The paper argues that it is possible to view the tattoo as a document, bound to an individual, reflecting his/her life and a given social and cultural context. As documents, they provide the individual with the essential evidence of his or her endeavours in a criminal environment. They also function as an individual’s memory of events and relationships (hardships and comradeships). Subsequently, the tattoos help create and sustain an identity. Finally, the tattoo presents itself as a document that may represent a critique of a dominant society or simply the voice of the alienated.

Originality/value

By showing how tattoos can be seen as documents and memory records, this paper brings a new kind of item into information and archival studies. It also uses theories and concepts from information and archival studies to put new light on the functions of tattoos.

Details

Journal of Documentation, vol. 74 no. 1
Type: Research Article
ISSN: 0022-0418

Keywords

1 – 10 of 14