Search results
1 – 10 of 162Globally, consumer’s inclination towards functional foods had noticed due to their greater health consciousness coupled with enhanced health-care cost. The fact that probiotics…
Abstract
Purpose
Globally, consumer’s inclination towards functional foods had noticed due to their greater health consciousness coupled with enhanced health-care cost. The fact that probiotics could promote a healthier gut microbiome led projection of probiotic foods as functional foods and had emerged as an important dietary strategy for improved human health. It had established that ice cream was a better carrier for probiotics than fermented milked due to greater stability of probiotics in ice cream matrix. Global demand for ice cream boomed and probiotic ice cream could have been one of the most demanded functional foods. The purpose of this paper was to review the technological aspects and factors affecting probiotic viability and to standardize methodology to produce functional probiotic ice cream.
Design/methodology/approach
Attempt was made to search the literature (review and researched papers) to identify diverse factors affecting the probiotic viability and major technological challenge faced during formulation of probiotic ice cream. Keywords used for data searched included dairy-based functional foods, ice cream variants, probiotic ice cream, factors affecting probiotic viability and health benefits of probiotic ice cream.
Findings
Retention of probiotic viability at a level of >106 cfu/ml is a prerequisite for functional probiotic ice creams. Functional probiotic ice cream could have been produced with the modification of basic mix and modulating technological parameters during processing and freezing. Functionality can be further enhanced with the inclusion of certain nutraceutical components such as prebiotics, antioxidant, phenolic compounds and dietary fibres. Based upon reviewed literature, suggested method for the manufacture of functional probiotic ice cream involved freezing of a probiotic ice cream mix obtained by blending 10% probiotic fermented milk with 90% non-fermented plain ice cream mix for higher probiotic viability. Probiotic ice cream with functional features, comparable with traditional ice cream in terms of technological and sensory properties could be produced and can crop up as a novel functional food.
Originality/value
Probiotic ice cream with functional features may attract food manufacturers to cater health-conscious consumers.
Details
Keywords
Omotayo Farai, Nicole Metje, Carl Anthony, Ali Sadeghioon and David Chapman
Wireless sensor networks (WSN), as a solution for buried water pipe monitoring, face a new set of challenges compared to traditional application for above-ground infrastructure…
Abstract
Purpose
Wireless sensor networks (WSN), as a solution for buried water pipe monitoring, face a new set of challenges compared to traditional application for above-ground infrastructure monitoring. One of the main challenges for underground WSN deployment is the limited range (less than 3 m) at which reliable wireless underground communication can be achieved using radio signal propagation through the soil. To overcome this challenge, the purpose of this paper is to investigate a new approach for wireless underground communication using acoustic signal propagation along a buried water pipe.
Design/methodology/approach
An acoustic communication system was developed based on the requirements of low cost (tens of pounds at most), low power supply capacity (in the order of 1 W-h) and miniature (centimetre scale) size for a wireless communication node. The developed system was further tested along a buried steel pipe in poorly graded SAND and a buried medium density polyethylene (MDPE) pipe in well graded SAND.
Findings
With predicted acoustic attenuation of 1.3 dB/m and 2.1 dB/m along the buried steel and MDPE pipes, respectively, reliable acoustic communication is possible up to 17 m for the buried steel pipe and 11 m for the buried MDPE pipe.
Research limitations/implications
Although an important first step, more research is needed to validate the acoustic communication system along a wider water distribution pipe network.
Originality/value
This paper shows the possibility of achieving reliable wireless underground communication along a buried water pipe (especially non-metallic material ones) using low-frequency acoustic propagation along the pipe wall.
Details
Keywords
Karunanithi Kanagaraj and Ramalinggam Rajamanickam
The purpose of this paper is to explore and evaluate the current legal position on the admissibility and exclusion of illegally obtained evidence in money laundering cases.
Abstract
Purpose
The purpose of this paper is to explore and evaluate the current legal position on the admissibility and exclusion of illegally obtained evidence in money laundering cases.
Design/methodology/approach
A thorough exploratory analytical analysis signifies that such illegally obtained evidence from money laundering offences is admissible, provided it does not undermine the administration of justice or the right to a fair trial.
Findings
By virtue of the lack of written or codified rules governing the admissibility and exclusion of illegally obtained evidence in cases involving money laundering, the rule of admissibility remains the primary foundational principle for the governance of the admissibility and exclusion of illegally obtained evidence in money laundering cases.
Originality/value
The Malaysian Criminal Justice System has historically relied on the long-standing admissibility principles to admit and exclude illegally obtained evidence. For decades, courts have used their discretion to admit illegally obtained evidence based on the relevancy test, and they have further demonstrated to use the same discretion to exclude gravely prejudicial evidence. Evidence obtained illegally but if relevant to the matter in issue is deemed admissible. Evidence derived from an act associated with unlawful activities or a predicate offence in money laundering may be obtained illegally, which may influence the prosecution case and conversely, defend the accused’s rights to a fair trial.
Details
Keywords
Jaeyoung Park, Woosik Shin, Beomsoo Kim and Miyea Kim
This study aims to explore the spillover effects of data breaches from a consumer perspective in the e-commerce context. Specifically, we investigate how an online retailer’s data…
Abstract
Purpose
This study aims to explore the spillover effects of data breaches from a consumer perspective in the e-commerce context. Specifically, we investigate how an online retailer’s data breach affects consumers’ privacy risk perceptions of competing firms, and further how it affects shopping intention for the competitors. We also examine how the privacy risk contagion effect varies depending on the characteristics of competitors and their competitive responses.
Design/methodology/approach
We conducted two scenario-based experiments with surveys. To assess the spillover effects and the moderating effects, we employed an analysis of covariance. We also performed bootstrapping-based mediation analyses using the PROCESS macro.
Findings
We find evidence for the privacy risk contagion effect and demonstrate that it negatively influences consumers’ shopping intention for a competing firm. We also find that a competitor’s cybersecurity message is effective in avoiding the privacy risk contagion effect and the competitor even benefits from it.
Originality/value
While previous studies have examined the impacts of data breaches on customer perceptions of the breached firm, our study focuses on customer perceptions of the non-breached firms. To the best of the authors’ knowledge, this study is one of the first to provide empirical evidence for the negative spillover effects of a data breach from a consumer perspective. More importantly, this study empirically demonstrates that the non-breached competitor’s competitive response is effective in preventing unintended negative spillover in the context of the data breach.
Details
Keywords
Ali Amin, Rizwan Ali, Ramiz Ur Rehman and Collins G. Ntim
This study aims to examine the impact of chief executive officers’ (CEOs’) personal characteristics on firms’ risk taking and the moderating role of family ownership on this…
Abstract
Purpose
This study aims to examine the impact of chief executive officers’ (CEOs’) personal characteristics on firms’ risk taking and the moderating role of family ownership on this relationship.
Design/methodology/approach
This study used 2,647 firm-year observations of non-financial firms listed on Pakistan Stock Exchange over the period 2013–2021. To test the hypotheses, the authors used ordinary least squares regression and, to resolve the possible endogeneity problem, the authors used system generalized method of moments technique.
Findings
Drawing insights first from upper echelons theory, the authors report that CEOs with business, economics, finance and/or management educational background and female CEOs reduce firms’ risk-taking behaviour. Further, using insights from social and organizational identity theoretical perspectives, the results indicate that due to strong family affiliation and organizational identity, family owners exhibit risk aversion behaviour and moderate this relationship.
Originality/value
This study provides novel evidence of risk averse behaviour of CEOs with business, economics, finance and/or management educational background and female CEOs along with moderating impact of family ownership on this relationship in an emerging economy. Overall, the results extend empirical support for upper echelons and social identity theories in an emerging market context.
Details
Keywords
This study examines the non-linear impact of financial development on income inequality and analyses the mediators through which financial development affects income inequality.
Abstract
Purpose
This study examines the non-linear impact of financial development on income inequality and analyses the mediators through which financial development affects income inequality.
Design/methodology/approach
The study uses a dynamic panel threshold method with an endogeneous threshold variable on a comprehensive sample of 85 countries over the period of 1996-2015.
Findings
The author finds that financial development activities increase income inequality in developed countries. However, financial development promotes income equality in developing countries. Further, the study finds that education and institutional quality are the channels through which financial development has non-linear impacts on income inequality.
Originality/value
The study explores relatively new method to examine the nonlinear impact of financial development and also considers new dataset for the main explanatory variable.
Details
Keywords
Muhammed Turan Aslan, Bahattin Kanber, Hasan Demirtas and Bilal Sungur
The purpose of this study is analysis of deformation and vibrations of turbine blades produced by high electrolyte pressure during electrochemical machining.
Abstract
Purpose
The purpose of this study is analysis of deformation and vibrations of turbine blades produced by high electrolyte pressure during electrochemical machining.
Design/methodology/approach
An experimental setup was designed, experiments were conducted and the obtained results were compared with the finite element results. The deformations were measured according to various flow rates of electrolyte. In finite element calculations, the pressure distribution created by the electrolyte on the blade surface was obtained in the ANSYS® (A finite element analysis software) Fluent software and transferred to the static structural where the deformation analysis was carried out. Three different parameters were examined, namely blade thickness, blade material and electrolyte pressure on blade disk caused by mass flow rate. The deformation results were compared with the gap distances between cathode and anode.
Findings
Large deformations were obtained at the free end of the blade and the most curved part of it. The appropriate pressure values for the electrolyte to be used in the production of blisk blades were proposed numerically. It has been determined that high pressure applications are not suitable for gap distance lower than 0.5 mm.
Originality/value
When the literature is examined, it is required that the high speed flow of the electrolyte is desired in order to remove the parts that are separated from the anode from the machining area during electrochemical machining. However, the electrolyte flowing at high speeds causes high pressure in the blisk blades, excessive deformation and vibration of the machined part, and as a result, contact of the anode with the cathode. This study provides important findings for smooth electro chemical machining at high electrolyte flows.
Details
Keywords
Elham Rostami and Fredrik Karlsson
This paper aims to investigate how congruent keywords are used in information security policies (ISPs) to pinpoint and guide clear actionable advice and suggest a metric for…
Abstract
Purpose
This paper aims to investigate how congruent keywords are used in information security policies (ISPs) to pinpoint and guide clear actionable advice and suggest a metric for measuring the quality of keyword use in ISPs.
Design/methodology/approach
A qualitative content analysis of 15 ISPs from public agencies in Sweden was conducted with the aid of Orange Data Mining Software. The authors extracted 890 sentences from these ISPs that included one or more of the analyzed keywords. These sentences were analyzed using the new metric – keyword loss of specificity – to assess to what extent the selected keywords were used for pinpointing and guiding actionable advice. Thus, the authors classified the extracted sentences as either actionable advice or other information, depending on the type of information conveyed.
Findings
The results show a significant keyword loss of specificity in relation to pieces of actionable advice in ISPs provided by Swedish public agencies. About two-thirds of the sentences in which the analyzed keywords were used focused on information other than actionable advice. Such dual use of keywords reduces the possibility of pinpointing and communicating clear, actionable advice.
Research limitations/implications
The suggested metric provides a means to assess the quality of how keywords are used in ISPs for different purposes. The results show that more research is needed on how keywords are used in ISPs.
Practical implications
The authors recommended that ISP designers exercise caution when using keywords in ISPs and maintain coherency in their use of keywords. ISP designers can use the suggested metrics to assess the quality of actionable advice in their ISPs.
Originality/value
The keyword loss of specificity metric adds to the few quantitative metrics available to assess ISP quality. To the best of the authors’ knowledge, applying this metric is a first attempt to measure the quality of actionable advice in ISPs.
Details
Keywords
Thi Bich Tran and Duy Khoi Nguyen
This study investigates the optimum size for manufacturing firms and the impact of subcontracting on firms' likelihood of achieving their optimal scale in Vietnam.
Abstract
Purpose
This study investigates the optimum size for manufacturing firms and the impact of subcontracting on firms' likelihood of achieving their optimal scale in Vietnam.
Design/methodology/approach
Using data from the enterprise census in 2017 and 2021, the paper first estimates the production function to identify the optimum firm size for manufacturing firms and then, applies the logit model to investigate factors associated with the optimal firm size.
Findings
The study reveals that medium-sized firms exhibit the highest level of productivity. Nevertheless, a consistent trend emerges, indicating that nearly 90% of manufacturing firms in Vietnam operated below their optimal scale in both 2017 and 2021. An analysis of the impact of subcontracting on firms' likelihood to achieve their optimal scale emphasizes its crucial role, especially for foreign firms, exerting an influence nearly five times greater than that of the judiciary system.
Practical implications
The paper's findings offer crucial policy implications, suggesting that initiatives aimed at enhancing the overall productivity of the manufacturing sector should prioritise facilitating contract arrangements to encourage firms to reach their optimal size. These insights are also valuable for other countries with comparable firm size distributions.
Originality/value
This paper provides the first empirical evidence on the relationship between firm size and productivity as well as the role of subcontracting in firms' ability to reach their optimal scale in a country with a right-skewed distribution of firm sizes.
Details
Keywords
Arindam Bhattacharjee and Anita Sarkar
Cyberloafing is an organization-directed counterproductive work behavior (CWB). One stream of literature deems cyberloafing to be bad for organizations and their employees, while…
Abstract
Purpose
Cyberloafing is an organization-directed counterproductive work behavior (CWB). One stream of literature deems cyberloafing to be bad for organizations and their employees, while another suggests cyberloafing is a coping response to stressful work events. Our work contributes to the latter stream of literature. The key objective of our study is to examine whether cyberloafing could be a means to cope with a stressful work event-abusive supervision, and if yes, what mediating and boundary conditions are involved. For this investigation, the authors leveraged the Stressor-Emotion-CWB theory which posits that individuals engage in CWB to cope with the negative affect generated by the stressors and that this relationship is moderated at the first stage by personality traits.
Design/methodology/approach
Using a multi-wave survey design, the authors collected data from 357 employees working in an Indian IT firm. Results revealed support for three out of the four hypotheses.
Findings
Based on the Stressor-Emotion-CWB theory, the authors found that work-related negative affect fully mediated the positive relationship between abusive supervision and cyberloafing, and work locus of control (WLOC) moderated the positive relationship between abusive supervision and work-related negative affect. The authors did not find any evidence of a direct relationship between abusive supervision and cyberloafing. Also, the positive indirect relationship between abusive supervision and cyberloafing through work-related negative affect was moderated at the first stage by the WLOC such that the indirect effect was stronger (weaker) at high (low) levels of WLOC.
Originality/value
This work demonstrates that cyberloafing could be a way for employees to cope with their abusive supervisors.
Details