Search results

21 – 30 of over 1000
Article
Publication date: 5 July 2021

Siva Marimuthu and Dhavamani Chinnathambi

Since the inception of aerospace engineering, reducing drag is of eternal importance. Over the years, researchers have been trying to improve the aerodynamics of National Advisory…

181

Abstract

Purpose

Since the inception of aerospace engineering, reducing drag is of eternal importance. Over the years, researchers have been trying to improve the aerodynamics of National Advisory Committee for Aeronautics (NACA) aerofoils in many ways. It is proved that smooth-surfaced NACA 0012 aerofoil produces more drag in compressible flow. Recent research on shark-skin pattern warrants a feasible solution to many fluid-engineering problems. Several attempts were made by many researchers to implement the idea of shark skin in the form of coatings, texture and more. However, those ideas are at greater risk when it comes to wing maintenance. The purpose of this paper is to implement a relatively larger biomimetic pattern which would make way for easy maintenance of patterned wings with improved performance.

Design/methodology/approach

In this paper, two biomimetic aerofoils are designed by optimizing the surface pattern of shark skin and are tested at different angles of attack in the computational flow domain.

Findings

The results of the biomimetic aerofoils prove that viscous and total drag can be reduced up to 33.08% and 3.68%, respectively, at high subsonic speed when validated against a NACA 0012 aerofoil. With the ample effectiveness of patched shark-skin pattern, biomimetic aerofoil generates as high as 10.42% lift than NACA 0012.

Originality/value

In this study, a feasible shark-skin pattern is constructed for NACA 0012 in a transonic flow regime. Computational results achieved using the theoretical model agree with experimental data.

Details

Aircraft Engineering and Aerospace Technology, vol. 93 no. 5
Type: Research Article
ISSN: 1748-8842

Keywords

Open Access
Article
Publication date: 6 February 2024

Pallavi Srivastava, Trishna Sehgal, Ritika Jain, Puneet Kaur and Anushree Luukela-Tandon

The study directs attention to the psychological conditions experienced and knowledge management practices leveraged by faculty in higher education institutes (HEIs) to cope with…

Abstract

Purpose

The study directs attention to the psychological conditions experienced and knowledge management practices leveraged by faculty in higher education institutes (HEIs) to cope with the shift to emergency remote teaching caused by the COVID-19 pandemic. By focusing attention on faculty experiences during this transition, this study aims to examine an under-investigated effect of the pandemic in the Indian context.

Design/methodology/approach

Interpretative phenomenological analysis is used to analyze the data gathered in two waves through 40 in-depth interviews with 20 faculty members based in India over a year. The data were analyzed deductively using Kahn’s framework of engagement and robust coding protocols.

Findings

Eight subthemes across three psychological conditions (meaningfulness, availability and safety) were developed to discourse faculty experiences and challenges with emergency remote teaching related to their learning, identity, leveraged resources and support received from their employing educational institutes. The findings also present the coping strategies and knowledge management-related practices that the faculty used to adjust to each discussed challenge.

Originality/value

The study uses a longitudinal design and phenomenology as the analytical method, which offers a significant methodological contribution to the extant literature. Further, the study’s use of Kahn’s model to examine the faculty members’ transitions to emergency remote teaching in India offers novel insights into the COVID-19 pandemic’s effect on educational institutes in an under-investigated context.

Details

Journal of Knowledge Management, vol. 28 no. 11
Type: Research Article
ISSN: 1367-3270

Keywords

Article
Publication date: 9 October 2017

Norazah Mohd. Suki and Norbayah Mohd. Suki

The purpose of this paper is to examine the determinants that influence students’ decision-making and satisfaction in campus e-voting, and to investigate the moderating effect on…

Abstract

Purpose

The purpose of this paper is to examine the determinants that influence students’ decision-making and satisfaction in campus e-voting, and to investigate the moderating effect on students’ decision-making and satisfaction in campus e-voting between students with different levels of trust in the system.

Design/methodology/approach

This study employed a quantitative method and applied the use of self-administered questionnaires among university students who have at least experienced once in casting votes electronically in the past year during the campus e-voting period. The data were analysed using partial least square-structural equation modelling (PLS-SEM) approach.

Findings

The PLS-SEM approach revealed that voters’ commitment to vote was the strongest determinant of students’ decision-making and satisfaction in campus e-voting. Voters’ high satisfaction with campus e-voting was based on the commitment and requirement of students of the university to vote. Compulsory voting was not a hassle for them in order to achieve campus development and sustainability. A moderation analysis revealed that the relative influence of commitment to vote on students’ satisfaction in campus e-voting was higher in the group with medium level of trust than among the group with high level of trust.

Practical implications

The election commission of the university and the university management should increase students’ turnout and commitment to vote during campus e-voting by outlining effective marketing strategies, campaigns and promotions across a number of digital platforms, including mobile SNS. They need to ensure that voters can sense their involvement is warranted and will continue to vote electronically in the next campus election.

Originality/value

The research yielded an exclusive perspective into students’ decision-making and satisfaction in campus e-voting. It also uncovered the influence of moderating effect of trust in the system in developing countries which is marginally concealed in the literature. The measurements produced can be used as a research tool for more exploratory and explanatory research related to political marketing among young adult voters.

Details

Journal of Enterprise Information Management, vol. 30 no. 6
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 21 October 2019

Duygu Turker and Gokce Ozdemir

The purpose of this study is to propose a definition and model of social sustainability within the ambit of systems theory and to test it on hospitality e-distributors. The study…

Abstract

Purpose

The purpose of this study is to propose a definition and model of social sustainability within the ambit of systems theory and to test it on hospitality e-distributors. The study suggests that social sustainability arises through the congruence among the interrelated components of social innovation, societal demand and social stakeholders in a transformation model and it can be assessed to whether and how this congruence addresses to the equity principles.

Design/methodology/approach

The study provides a case analysis on two selected hospitality e-distributors – Booking.com and Airbnb. The data obtained from a video-based content on managerial interviews were triangulated with the data of corporate disclosures and expert views derived from a focus group study.

Findings

The study reveals that both companies affect the intra-generational, procedural and geographical equity principles across physical and virtual communities so long as they take the advantage of their strategic positions. While Booking.com transforms its own industry, Airbnb disrupts the entire system by blurring the boundaries between market and non-market as well as touristic and non-touristic areas.

Practical implications

The study contributes to the practitioners by showing how to configure and assess the social sustainability of their organizations at the different contexts.

Social implications

The study provides a holistic perspective on social sustainability by linking the concept with social innovation, societal demand and social stakeholders and highlighting its contribution to equity principles.

Originality/value

Despite the proliferation of studies, the authors have very little understanding on the social pillar of sustainability. The current study fills the gap by addressing these conceptualization and measurement challenges in the literature.

Details

Sustainability Accounting, Management and Policy Journal, vol. 11 no. 4
Type: Research Article
ISSN: 2040-8021

Keywords

Open Access
Article
Publication date: 21 June 2022

Othmar Manfred Lehner, Kim Ittonen, Hanna Silvola, Eva Ström and Alena Wührleitner

This paper aims to identify ethical challenges of using artificial intelligence (AI)-based accounting systems for decision-making and discusses its findings based on Rest's…

25953

Abstract

Purpose

This paper aims to identify ethical challenges of using artificial intelligence (AI)-based accounting systems for decision-making and discusses its findings based on Rest's four-component model of antecedents for ethical decision-making. This study derives implications for accounting and auditing scholars and practitioners.

Design/methodology/approach

This research is rooted in the hermeneutics tradition of interpretative accounting research, in which the reader and the texts engage in a form of dialogue. To substantiate this dialogue, the authors conduct a theoretically informed, narrative (semi-systematic) literature review spanning the years 2015–2020. This review's narrative is driven by the depicted contexts and the accounting/auditing practices found in selected articles are used as sample instead of the research or methods.

Findings

In the thematic coding of the selected papers the authors identify five major ethical challenges of AI-based decision-making in accounting: objectivity, privacy, transparency, accountability and trustworthiness. Using Rest's component model of antecedents for ethical decision-making as a stable framework for our structure, the authors critically discuss the challenges and their relevance for a future human–machine collaboration within varying agency between humans and AI.

Originality/value

This paper contributes to the literature on accounting as a subjectivising as well as mediating practice in a socio-material context. It does so by providing a solid base of arguments that AI alone, despite its enabling and mediating role in accounting, cannot make ethical accounting decisions because it lacks the necessary preconditions in terms of Rest's model of antecedents. What is more, as AI is bound to pre-set goals and subjected to human made conditions despite its autonomous learning and adaptive practices, it lacks true agency. As a consequence, accountability needs to be shared between humans and AI. The authors suggest that related governance as well as internal and external auditing processes need to be adapted in terms of skills and awareness to ensure an ethical AI-based decision-making.

Details

Accounting, Auditing & Accountability Journal, vol. 35 no. 9
Type: Research Article
ISSN: 0951-3574

Keywords

Article
Publication date: 6 February 2009

Sarah Fleming and Vassiliki Costarelli

Taekwondo (TKD) is a weight‐classified combat sport. Athletes are required to make weight in order to compete in their chosen weight division. However, the weight management…

1259

Abstract

Purpose

Taekwondo (TKD) is a weight‐classified combat sport. Athletes are required to make weight in order to compete in their chosen weight division. However, the weight management strategies that are often employed are frequently at the expense of nutritional health and sporting performance. The purpose of this study is to investigate eating behaviours and general practices used by Taekwondo (TKD) athletes in order to make weight before competition.

Design/methodology/approach

A total of 30 male, international and national, TKD athletes (average age: 23.4 years±4.6) were recruited from a known TKD Club in London, UK. Weight management behaviours, beliefs and attitudes were investigated with the use of a specially designed questionnaire.

Findings

A total of 87 per cent of the TKD athletes surveyed stated that they would try to reduce body weight before competition to make weight classification and 47 per cent of the athletes reported that, in their effort to reduce weight, they would use a combination of restricting energy and fluid intake and increasing energy expenditure. A total of 80 per cent of the athletes stated that they would attempt to make weight on average six to nine times a year.

Originality/value

Food and fluid restriction in combination with increased energy expenditure were the preferred methods of weight loss employed by TKD athletes in the sample.

Details

Nutrition & Food Science, vol. 39 no. 1
Type: Research Article
ISSN: 0034-6659

Keywords

Article
Publication date: 9 January 2024

Jitendra Yadav, Kuldeep Singh, Nripendra P. Rana and Denis Dennehy

Social media has played a pivotal role in polarizing views on Russia–Ukraine conflict. The effects of polarization in online interactions have been extensively studied in many…

Abstract

Purpose

Social media has played a pivotal role in polarizing views on Russia–Ukraine conflict. The effects of polarization in online interactions have been extensively studied in many contexts. This research aims to examine how multiple social media sources may act as an integrator of information and act as a platform for depolarizing behaviors.

Design/methodology/approach

This study analyzes the communications of 6,662 tweets related to the sanctions imposed on Russia by using textual analytics and predictive modeling.

Findings

The research findings reveal that the tweeting behavior of netizens was depolarized because of information from multiple social media sources. However, the influx of information from non-organizational sources such as trending topics and discussions has a depolarizing impact on the user’s pre-established attitude.

Research limitations/implications

For policymakers, conflict mediators and observers, and members of society in general, there is a need for (1) continuous and consistent communication throughout the crisis, (2) transparency in the information being communicated and (3) public awareness of the polarized and conflicting information being provided from multiple actors that may be biased in the claims being made about the conflict crisis.

Originality/value

While previous research has examined Russia–Ukraine conflict from a variety of perspectives, this is the first study to examine how social media might be used to reduce attitude polarization during times of conflict.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 7 October 2013

Karin Hedström, Fredrik Karlsson and Ella Kolkowska

Employees' compliance with information security policies is considered an essential component of information security management. The research aims to illustrate the usefulness of…

1429

Abstract

Purpose

Employees' compliance with information security policies is considered an essential component of information security management. The research aims to illustrate the usefulness of social action theory (SAT) for management of information security.

Design/methodology/approach

This research was carried out as a longitudinal case study at a Swedish hospital. Data were collected using a combination of interviews, information security documents, and observations. Data were analysed using a combination of a value-based compliance model and the taxonomy laid out in SAT to determine user rationality.

Findings

The paper argues that management of information security and design of countermeasures should be based on an understanding of users' rationale covering both intentional and unintentional non-compliance. The findings are presented in propositions with practical and theoretical implications: P1. Employees' non-compliance is predominantly based on means-end calculations and based on a practical rationality, P2. An information security investigation of employees' rationality should not be based on an a priori assumption about user intent, P3. Information security management and choice of countermeasures should be based on an understanding of the use rationale, and P4. Countermeasures should target intentional as well as unintentional non-compliance.

Originality/value

This work is an extension of Hedström et al. arguing for the importance of addressing user rationale for successful management of information security. The presented propositions can form a basis for information security management, making the objectives underlying the study presented in Hedström et al. more clear.

Details

Information Management & Computer Security, vol. 21 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 7 March 2023

Miral Sabry AlAshry

The purpose of this study is to investigate the extent of digital surveillance by Arab authorities, which face risks and threats of surveillance, and how journalists seek to press…

Abstract

Purpose

The purpose of this study is to investigate the extent of digital surveillance by Arab authorities, which face risks and threats of surveillance, and how journalists seek to press freedom by using tools and techniques to communicate securely.

Design/methodology/approach

The study used focus group discussions with 14 journalists from Syria, Saudi Arabia, Libya, Yemen, Oman, Jordan and Egypt. While in Egypt, questionnaires were distributed to 199 journalists from both independent and semi-governmental outlets to investigate how Egyptian journalists interpret the new data protection law and its implications for press freedom.

Findings

The study indicated that journalists from these countries revealed severe censorship by their respective governments, an element inconsistent with the Arab Constitution. The recommendation of the study encourages media organisations to play a more active role in setting policies that make it easier for journalists to adopt and use digital security tools, while Egyptian journalists see the law as a barrier to media independence because it allows the government to exercise greater information control through digital policy and imposes regulatory rules on journalists.

Practical implications

The study identifies practical and theoretical issues in Arab legislation and may reveal practices of interest to scientists researching the balance between data protection, the right of access to information and media research as an example of contemporary government indirect or “soft” censorship methods.

Originality/value

To the best of the authors’ knowledge, this paper is one of the first research contributions to analyse the relationships between Arab authoritarians who used surveillance to restrict freedom of the press after the Arab Spring revolutions of 2011 to keep themselves in power as long as they could. In addition, Egypt's use of surveillance under new laws allowed the regimes to install software on the journalists’ phones that enabled them to read the files and emails and track their locations; accordingly, journalists can be targeted by the cyberattack and can be arrested.

Details

Digital Policy, Regulation and Governance, vol. 25 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 4 August 2020

Jan-Willem Bullee and Marianne Junger

Social engineering is a prominent aspect of online crime. Various interventions have been developed to reduce the success of this type of attacks. This paper aims to investigate…

Abstract

Purpose

Social engineering is a prominent aspect of online crime. Various interventions have been developed to reduce the success of this type of attacks. This paper aims to investigate if interventions can help to decrease the vulnerability to social engineering attacks. If they help, the authors investigate which forms of interventions and specific elements constitute success.

Design/methodology/approach

The authors selected studies which had an experimental design and rigorously tested at least one intervention that aimed to reduce the vulnerability to social engineering. The studies were primarily identified from querying the Scopus database. The authors identified 19 studies which lead to the identification of 37 effect sizes, based on a total sample of N = 23,146 subjects. The available training, intervention materials and effect sizes were analysed. The authors collected information on the context of the intervention, the characteristics of the intervention and the characteristics of the research methodology. All analyses were performed using random-effects models, and heterogeneity was quantified.

Findings

The authors find substantial differences in effect size for the different interventions. Some interventions are highly effective; others have no effect at all. Highly intensive interventions are more effective than those that are low on intensity. Furthermore, interventions with a narrow focus are more effective than those with a broad focus.

Practical implications

The results of this study show differences in effect for different elements of interventions. This allows practitioners to review their awareness campaigns and tailor them to increase their success.

Originality/value

The authors believe that this is the first study that compares the impact of social engineering interventions systematically.

Details

Information & Computer Security, vol. 28 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

21 – 30 of over 1000