Search results
21 – 30 of over 1000Siva Marimuthu and Dhavamani Chinnathambi
Since the inception of aerospace engineering, reducing drag is of eternal importance. Over the years, researchers have been trying to improve the aerodynamics of National Advisory…
Abstract
Purpose
Since the inception of aerospace engineering, reducing drag is of eternal importance. Over the years, researchers have been trying to improve the aerodynamics of National Advisory Committee for Aeronautics (NACA) aerofoils in many ways. It is proved that smooth-surfaced NACA 0012 aerofoil produces more drag in compressible flow. Recent research on shark-skin pattern warrants a feasible solution to many fluid-engineering problems. Several attempts were made by many researchers to implement the idea of shark skin in the form of coatings, texture and more. However, those ideas are at greater risk when it comes to wing maintenance. The purpose of this paper is to implement a relatively larger biomimetic pattern which would make way for easy maintenance of patterned wings with improved performance.
Design/methodology/approach
In this paper, two biomimetic aerofoils are designed by optimizing the surface pattern of shark skin and are tested at different angles of attack in the computational flow domain.
Findings
The results of the biomimetic aerofoils prove that viscous and total drag can be reduced up to 33.08% and 3.68%, respectively, at high subsonic speed when validated against a NACA 0012 aerofoil. With the ample effectiveness of patched shark-skin pattern, biomimetic aerofoil generates as high as 10.42% lift than NACA 0012.
Originality/value
In this study, a feasible shark-skin pattern is constructed for NACA 0012 in a transonic flow regime. Computational results achieved using the theoretical model agree with experimental data.
Details
Keywords
Pallavi Srivastava, Trishna Sehgal, Ritika Jain, Puneet Kaur and Anushree Luukela-Tandon
The study directs attention to the psychological conditions experienced and knowledge management practices leveraged by faculty in higher education institutes (HEIs) to cope with…
Abstract
Purpose
The study directs attention to the psychological conditions experienced and knowledge management practices leveraged by faculty in higher education institutes (HEIs) to cope with the shift to emergency remote teaching caused by the COVID-19 pandemic. By focusing attention on faculty experiences during this transition, this study aims to examine an under-investigated effect of the pandemic in the Indian context.
Design/methodology/approach
Interpretative phenomenological analysis is used to analyze the data gathered in two waves through 40 in-depth interviews with 20 faculty members based in India over a year. The data were analyzed deductively using Kahn’s framework of engagement and robust coding protocols.
Findings
Eight subthemes across three psychological conditions (meaningfulness, availability and safety) were developed to discourse faculty experiences and challenges with emergency remote teaching related to their learning, identity, leveraged resources and support received from their employing educational institutes. The findings also present the coping strategies and knowledge management-related practices that the faculty used to adjust to each discussed challenge.
Originality/value
The study uses a longitudinal design and phenomenology as the analytical method, which offers a significant methodological contribution to the extant literature. Further, the study’s use of Kahn’s model to examine the faculty members’ transitions to emergency remote teaching in India offers novel insights into the COVID-19 pandemic’s effect on educational institutes in an under-investigated context.
Details
Keywords
Norazah Mohd. Suki and Norbayah Mohd. Suki
The purpose of this paper is to examine the determinants that influence students’ decision-making and satisfaction in campus e-voting, and to investigate the moderating effect on…
Abstract
Purpose
The purpose of this paper is to examine the determinants that influence students’ decision-making and satisfaction in campus e-voting, and to investigate the moderating effect on students’ decision-making and satisfaction in campus e-voting between students with different levels of trust in the system.
Design/methodology/approach
This study employed a quantitative method and applied the use of self-administered questionnaires among university students who have at least experienced once in casting votes electronically in the past year during the campus e-voting period. The data were analysed using partial least square-structural equation modelling (PLS-SEM) approach.
Findings
The PLS-SEM approach revealed that voters’ commitment to vote was the strongest determinant of students’ decision-making and satisfaction in campus e-voting. Voters’ high satisfaction with campus e-voting was based on the commitment and requirement of students of the university to vote. Compulsory voting was not a hassle for them in order to achieve campus development and sustainability. A moderation analysis revealed that the relative influence of commitment to vote on students’ satisfaction in campus e-voting was higher in the group with medium level of trust than among the group with high level of trust.
Practical implications
The election commission of the university and the university management should increase students’ turnout and commitment to vote during campus e-voting by outlining effective marketing strategies, campaigns and promotions across a number of digital platforms, including mobile SNS. They need to ensure that voters can sense their involvement is warranted and will continue to vote electronically in the next campus election.
Originality/value
The research yielded an exclusive perspective into students’ decision-making and satisfaction in campus e-voting. It also uncovered the influence of moderating effect of trust in the system in developing countries which is marginally concealed in the literature. The measurements produced can be used as a research tool for more exploratory and explanatory research related to political marketing among young adult voters.
Details
Keywords
Duygu Turker and Gokce Ozdemir
The purpose of this study is to propose a definition and model of social sustainability within the ambit of systems theory and to test it on hospitality e-distributors. The study…
Abstract
Purpose
The purpose of this study is to propose a definition and model of social sustainability within the ambit of systems theory and to test it on hospitality e-distributors. The study suggests that social sustainability arises through the congruence among the interrelated components of social innovation, societal demand and social stakeholders in a transformation model and it can be assessed to whether and how this congruence addresses to the equity principles.
Design/methodology/approach
The study provides a case analysis on two selected hospitality e-distributors – Booking.com and Airbnb. The data obtained from a video-based content on managerial interviews were triangulated with the data of corporate disclosures and expert views derived from a focus group study.
Findings
The study reveals that both companies affect the intra-generational, procedural and geographical equity principles across physical and virtual communities so long as they take the advantage of their strategic positions. While Booking.com transforms its own industry, Airbnb disrupts the entire system by blurring the boundaries between market and non-market as well as touristic and non-touristic areas.
Practical implications
The study contributes to the practitioners by showing how to configure and assess the social sustainability of their organizations at the different contexts.
Social implications
The study provides a holistic perspective on social sustainability by linking the concept with social innovation, societal demand and social stakeholders and highlighting its contribution to equity principles.
Originality/value
Despite the proliferation of studies, the authors have very little understanding on the social pillar of sustainability. The current study fills the gap by addressing these conceptualization and measurement challenges in the literature.
Details
Keywords
Othmar Manfred Lehner, Kim Ittonen, Hanna Silvola, Eva Ström and Alena Wührleitner
This paper aims to identify ethical challenges of using artificial intelligence (AI)-based accounting systems for decision-making and discusses its findings based on Rest's…
Abstract
Purpose
This paper aims to identify ethical challenges of using artificial intelligence (AI)-based accounting systems for decision-making and discusses its findings based on Rest's four-component model of antecedents for ethical decision-making. This study derives implications for accounting and auditing scholars and practitioners.
Design/methodology/approach
This research is rooted in the hermeneutics tradition of interpretative accounting research, in which the reader and the texts engage in a form of dialogue. To substantiate this dialogue, the authors conduct a theoretically informed, narrative (semi-systematic) literature review spanning the years 2015–2020. This review's narrative is driven by the depicted contexts and the accounting/auditing practices found in selected articles are used as sample instead of the research or methods.
Findings
In the thematic coding of the selected papers the authors identify five major ethical challenges of AI-based decision-making in accounting: objectivity, privacy, transparency, accountability and trustworthiness. Using Rest's component model of antecedents for ethical decision-making as a stable framework for our structure, the authors critically discuss the challenges and their relevance for a future human–machine collaboration within varying agency between humans and AI.
Originality/value
This paper contributes to the literature on accounting as a subjectivising as well as mediating practice in a socio-material context. It does so by providing a solid base of arguments that AI alone, despite its enabling and mediating role in accounting, cannot make ethical accounting decisions because it lacks the necessary preconditions in terms of Rest's model of antecedents. What is more, as AI is bound to pre-set goals and subjected to human made conditions despite its autonomous learning and adaptive practices, it lacks true agency. As a consequence, accountability needs to be shared between humans and AI. The authors suggest that related governance as well as internal and external auditing processes need to be adapted in terms of skills and awareness to ensure an ethical AI-based decision-making.
Details
Keywords
Sarah Fleming and Vassiliki Costarelli
Taekwondo (TKD) is a weight‐classified combat sport. Athletes are required to make weight in order to compete in their chosen weight division. However, the weight management…
Abstract
Purpose
Taekwondo (TKD) is a weight‐classified combat sport. Athletes are required to make weight in order to compete in their chosen weight division. However, the weight management strategies that are often employed are frequently at the expense of nutritional health and sporting performance. The purpose of this study is to investigate eating behaviours and general practices used by Taekwondo (TKD) athletes in order to make weight before competition.
Design/methodology/approach
A total of 30 male, international and national, TKD athletes (average age: 23.4 years±4.6) were recruited from a known TKD Club in London, UK. Weight management behaviours, beliefs and attitudes were investigated with the use of a specially designed questionnaire.
Findings
A total of 87 per cent of the TKD athletes surveyed stated that they would try to reduce body weight before competition to make weight classification and 47 per cent of the athletes reported that, in their effort to reduce weight, they would use a combination of restricting energy and fluid intake and increasing energy expenditure. A total of 80 per cent of the athletes stated that they would attempt to make weight on average six to nine times a year.
Originality/value
Food and fluid restriction in combination with increased energy expenditure were the preferred methods of weight loss employed by TKD athletes in the sample.
Details
Keywords
Jitendra Yadav, Kuldeep Singh, Nripendra P. Rana and Denis Dennehy
Social media has played a pivotal role in polarizing views on Russia–Ukraine conflict. The effects of polarization in online interactions have been extensively studied in many…
Abstract
Purpose
Social media has played a pivotal role in polarizing views on Russia–Ukraine conflict. The effects of polarization in online interactions have been extensively studied in many contexts. This research aims to examine how multiple social media sources may act as an integrator of information and act as a platform for depolarizing behaviors.
Design/methodology/approach
This study analyzes the communications of 6,662 tweets related to the sanctions imposed on Russia by using textual analytics and predictive modeling.
Findings
The research findings reveal that the tweeting behavior of netizens was depolarized because of information from multiple social media sources. However, the influx of information from non-organizational sources such as trending topics and discussions has a depolarizing impact on the user’s pre-established attitude.
Research limitations/implications
For policymakers, conflict mediators and observers, and members of society in general, there is a need for (1) continuous and consistent communication throughout the crisis, (2) transparency in the information being communicated and (3) public awareness of the polarized and conflicting information being provided from multiple actors that may be biased in the claims being made about the conflict crisis.
Originality/value
While previous research has examined Russia–Ukraine conflict from a variety of perspectives, this is the first study to examine how social media might be used to reduce attitude polarization during times of conflict.
Details
Keywords
Karin Hedström, Fredrik Karlsson and Ella Kolkowska
Employees' compliance with information security policies is considered an essential component of information security management. The research aims to illustrate the usefulness of…
Abstract
Purpose
Employees' compliance with information security policies is considered an essential component of information security management. The research aims to illustrate the usefulness of social action theory (SAT) for management of information security.
Design/methodology/approach
This research was carried out as a longitudinal case study at a Swedish hospital. Data were collected using a combination of interviews, information security documents, and observations. Data were analysed using a combination of a value-based compliance model and the taxonomy laid out in SAT to determine user rationality.
Findings
The paper argues that management of information security and design of countermeasures should be based on an understanding of users' rationale covering both intentional and unintentional non-compliance. The findings are presented in propositions with practical and theoretical implications: P1. Employees' non-compliance is predominantly based on means-end calculations and based on a practical rationality, P2. An information security investigation of employees' rationality should not be based on an a priori assumption about user intent, P3. Information security management and choice of countermeasures should be based on an understanding of the use rationale, and P4. Countermeasures should target intentional as well as unintentional non-compliance.
Originality/value
This work is an extension of Hedström et al. arguing for the importance of addressing user rationale for successful management of information security. The presented propositions can form a basis for information security management, making the objectives underlying the study presented in Hedström et al. more clear.
Details
Keywords
The purpose of this study is to investigate the extent of digital surveillance by Arab authorities, which face risks and threats of surveillance, and how journalists seek to press…
Abstract
Purpose
The purpose of this study is to investigate the extent of digital surveillance by Arab authorities, which face risks and threats of surveillance, and how journalists seek to press freedom by using tools and techniques to communicate securely.
Design/methodology/approach
The study used focus group discussions with 14 journalists from Syria, Saudi Arabia, Libya, Yemen, Oman, Jordan and Egypt. While in Egypt, questionnaires were distributed to 199 journalists from both independent and semi-governmental outlets to investigate how Egyptian journalists interpret the new data protection law and its implications for press freedom.
Findings
The study indicated that journalists from these countries revealed severe censorship by their respective governments, an element inconsistent with the Arab Constitution. The recommendation of the study encourages media organisations to play a more active role in setting policies that make it easier for journalists to adopt and use digital security tools, while Egyptian journalists see the law as a barrier to media independence because it allows the government to exercise greater information control through digital policy and imposes regulatory rules on journalists.
Practical implications
The study identifies practical and theoretical issues in Arab legislation and may reveal practices of interest to scientists researching the balance between data protection, the right of access to information and media research as an example of contemporary government indirect or “soft” censorship methods.
Originality/value
To the best of the authors’ knowledge, this paper is one of the first research contributions to analyse the relationships between Arab authoritarians who used surveillance to restrict freedom of the press after the Arab Spring revolutions of 2011 to keep themselves in power as long as they could. In addition, Egypt's use of surveillance under new laws allowed the regimes to install software on the journalists’ phones that enabled them to read the files and emails and track their locations; accordingly, journalists can be targeted by the cyberattack and can be arrested.
Details
Keywords
Jan-Willem Bullee and Marianne Junger
Social engineering is a prominent aspect of online crime. Various interventions have been developed to reduce the success of this type of attacks. This paper aims to investigate…
Abstract
Purpose
Social engineering is a prominent aspect of online crime. Various interventions have been developed to reduce the success of this type of attacks. This paper aims to investigate if interventions can help to decrease the vulnerability to social engineering attacks. If they help, the authors investigate which forms of interventions and specific elements constitute success.
Design/methodology/approach
The authors selected studies which had an experimental design and rigorously tested at least one intervention that aimed to reduce the vulnerability to social engineering. The studies were primarily identified from querying the Scopus database. The authors identified 19 studies which lead to the identification of 37 effect sizes, based on a total sample of N = 23,146 subjects. The available training, intervention materials and effect sizes were analysed. The authors collected information on the context of the intervention, the characteristics of the intervention and the characteristics of the research methodology. All analyses were performed using random-effects models, and heterogeneity was quantified.
Findings
The authors find substantial differences in effect size for the different interventions. Some interventions are highly effective; others have no effect at all. Highly intensive interventions are more effective than those that are low on intensity. Furthermore, interventions with a narrow focus are more effective than those with a broad focus.
Practical implications
The results of this study show differences in effect for different elements of interventions. This allows practitioners to review their awareness campaigns and tailor them to increase their success.
Originality/value
The authors believe that this is the first study that compares the impact of social engineering interventions systematically.
Details