Search results

1 – 10 of over 18000
To view the access options for this content please click here
Book part

Luciano Fratocchi, Alessandro Ancarani, Paolo Barbieri, Carmela Di Mauro, Guido Nassimbeni, Marco Sartor, Matteo Vignoli and Andrea Zanoni

The first aim of the chapter is to offer a characterization of back-reshoring as a possible step of the firm’s nonlinear internationalization process. The second aim is to…

Abstract

Purpose

The first aim of the chapter is to offer a characterization of back-reshoring as a possible step of the firm’s nonlinear internationalization process. The second aim is to review the empirical literature on back-reshoring and to complement it with the findings of an extensive data collection.

Methodology/approach

In this chapter we adopted an explorative approach building on both theoretical and empirical literature from the fields of international business and international operations Management. We also collected secondary data on back-reshoring decisions in order to define the magnitude of the investigated phenomenon and to offer a primary characterization.

Findings

Our findings confirm that, though it cannot be considered a generalized trend, back-reshoring is a very topical issue for international business scholars. It represents an autonomous phenomenon consistent with the idea of nonlinear internationalization process.

Research limitations/implications

The chapter is based on cross-sectional data. Longitudinal research is required in order to address the proposed research questions and help understanding “how much” and what kind of manufacturing will be housed in western countries in the near future.

Originality/value

This is the first attempt to conceptualize back-reshoring as a possible step of the firms’ internationalization process. It is also the first chapter that summarizes and discusses the literature and empirical evidence on back-reshoring emerging from a wide range of countries.

Details

The Future Of Global Organizing
Type: Book
ISBN: 978-1-78560-422-5

Keywords

To view the access options for this content please click here
Book part

Carlo Bellavite Pellegrini, Laura Pellegrini and Emiliano Sironi

Systemic risk has been one of the most interesting issues in banking and financial literature during the last years, particularly in evaluating its effects on the…

Abstract

Systemic risk has been one of the most interesting issues in banking and financial literature during the last years, particularly in evaluating its effects on the stability of the whole financial system during crises. Differently from other studies which analyze systemic risk focusing on European countries, we explore the determinant of systemic risk in other regional or continental banking systems, as Latin America. Using the CoVaR approach proposed by Adrian and Brunnermeier (2016), we study the impact of corporate variables on systemic risk on a sample of 30 Latin American banks belonging to seven countries, continuously listed from 2002Q1 to 2015Q4. We investigate the contribution of the corporate variables over different economic periods: the Subprime crisis (2007Q3–2008Q3), the European Great Financial Depression (2008Q4–2010Q2), and the Sovereign debt crisis (2010Q3–2012Q3).

Details

Asia-Pacific Contemporary Finance and Development
Type: Book
ISBN: 978-1-78973-273-3

Keywords

To view the access options for this content please click here
Article

Xu Li, Jun Li, Xiaoyi Zhang, Jianfeng Gao and Chao Zhang

Viscous dampers are commonly used in large span cable-stayed bridges to mitigate seismic effects and have achieved great success.

Abstract

Purpose

Viscous dampers are commonly used in large span cable-stayed bridges to mitigate seismic effects and have achieved great success.

Design/methodology/approach

However, the nonlinear analysis on damper parameters is usually computational intensive and nonobjective. To address these issues, this paper proposes a simplified method to determine the viscous damper parameters for double-tower cable-stayed bridges. An empirical formula of the equivalent damping ratio of viscous dampers is established through decoupling nonclassical damping structures and linearization of nonlinear viscous dampers. Shaking table tests are conducted to verify the feasibility of the proposed method. Moreover, this simplified method has been proved in long-span cable-stayed bridges.

Findings

The feasibility of this method is verified by the simplified model shaking table test. This simplified method for determining the parameters of viscous dampers is verified in cable-stayed bridges with different spans.

Originality/value

This simplified method has been validated in cable-stayed bridges with various spans.

Details

Engineering, Construction and Architectural Management, vol. 27 no. 8
Type: Research Article
ISSN: 0969-9988

Keywords

To view the access options for this content please click here
Article

Mhamed Zineddine

Trust is one of the main pillars of many communication and interaction domains. Computing is no exception. Fog computing (FC) has emerged as mitigation of several cloud…

Abstract

Purpose

Trust is one of the main pillars of many communication and interaction domains. Computing is no exception. Fog computing (FC) has emerged as mitigation of several cloud computing limitations. However, selecting a trustworthy node from the fog network still presents serious challenges. This paper aims to propose an algorithm intended to mitigate the trust and the security issues related to selecting a node of a fog network.

Design/methodology/approach

The proposed model/algorithm is based on two main concepts, namely, machine learning using fuzzy neural networks (FNNs) and the weighted weakest link (WWL) algorithm. The crux of the proposed model is to be trained, validated and used to classify the fog nodes according to their trust scores. A total of 2,482 certified computing products, in addition to a set of nodes composed of multiple items, are used to train, validate and test the proposed model. A scenario including nodes composed of multiple computing items is designed for applying and evaluating the performance of the proposed model/algorithm.

Findings

The results show a well-performing trust model with an accuracy of 0.9996. Thus, the end-users of FC services adopting the proposed approach could be more confident when selecting elected fog nodes. The trained, validated and tested model was able to classify the nodes according to their trust level. The proposed model is a novel approach to fog nodes selection in a fog network.

Research limitations/implications

Certainly, all data could be collected, however, some features are very difficult to have their scores. Available techniques such as regression analysis and the use of the experts have their own limitations. Experts might be subjective, even though the author used the fuzzy group decision-making model to mitigate the subjectivity effect. A methodical evaluation by specialized bodies such as the security certification process is paramount to mitigate these issues. The author recommends the repetition of the same study when data form such bodies is available.

Originality/value

The novel combination of FNN and WWL in a trust model mitigates uncertainty, subjectivity and enables the trust classification of complex FC nodes. Furthermore, the combination also allowed the classification of fog nodes composed of diverse computing items, which is not possible without the WWL. The proposed algorithm will provide the required intelligence for end-users (devices) to make sound decisions when requesting fog services.

Details

Information & Computer Security, vol. 28 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

To view the access options for this content please click here

Abstract

Details

Super-Sticky Wechat and Chinese Society
Type: Book
ISBN: 978-1-78743-091-4

To view the access options for this content please click here

Abstract

Details

Children and Mobile Phones: Adoption, Use, Impact, and Control
Type: Book
ISBN: 978-1-78973-036-4

To view the access options for this content please click here
Article

Rong Huang, Xinyue Zhou, Weiling Ye and Siyuan Guo

This paper aims to clarify an important nuance by proposing that people attribute human mind to brands on two distinct dimensions: think and feel.

Abstract

Purpose

This paper aims to clarify an important nuance by proposing that people attribute human mind to brands on two distinct dimensions: think and feel.

Design/methodology/approach

Eight studies were conducted to first develop and validate the 14-item Brand Anthropomorphism Questionnaire, and then to investigate how the two subscales, think or feel dimensions, influence consumer moral judgment of brands.

Findings

This research developed a 14-item Brand Anthropomorphism Questionnaire with two subscales, which are psychometrically sound and show discriminant validity with regard to existing brand constructs. Furthermore, think or feel brand anthropomorphism dimensions can predict consumers’ moral judgment of brands.

Research limitations/implications

The present research offers preliminary evidence about the value of distinguishing between think brand and feel brand in consumer moral judgment. Further research could investigate other potential impact of the two dimensions, and possible antecedents of think/feel dimensions.

Practical implications

Managers can use the scale for assessment, planning, decision-making and tracking purposes. In addition, in the event of brand scandal or brand social responsibility activities, public-relations efforts can use the findings to earn or regain the trust of consumers, as this research demonstrates that marketers can shape (tailor) the feel or think dimensions of brand perception to change consumers’ moral judgment of the brands.

Originality/value

This research makes theoretical contribution to the brand anthropomorphism literature by differentiating the two dimensions and exploring the influence of anthropomorphism of consumer moral judgment.

Details

Journal of Product & Brand Management, vol. 29 no. 7
Type: Research Article
ISSN: 1061-0421

Keywords

To view the access options for this content please click here
Article

Luosong Jin, Weidong Liu, Cheng Chen, Wei Wang and Houyin Long

With the advent of the information age, this paper aims to apply risk analysis theories to study the risk prevention mechanism of information disclosure, thus supporting…

Abstract

Purpose

With the advent of the information age, this paper aims to apply risk analysis theories to study the risk prevention mechanism of information disclosure, thus supporting the green electricity supply.

Design/methodology/approach

This paper conducts a comprehensive evaluation and analysis of the impact of power market transactions, power market operations and effective government supervision, so as to figure out the core risk content of power market information disclosure. Moreover, AHP-entropy method is adopted to weigh different indicators of information disclosure risks for the participants in the electricity market.

Findings

The potential reasons for information disclosure risk in the electricity market include insufficient information disclosure, high cost of obtaining information, inaccurate information disclosure, untimely information disclosure and unfairness of information disclosure.

Originality/value

Some suggestions and implications on risk prevention mechanism of information disclosure in the electricity market are provided, so as to ensure the green electricity supply and promote the electricity market reform in China.

Details

Journal of Enterprise Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1741-0398

Keywords

To view the access options for this content please click here
Book part

Thomas V. Maher and Jennifer Earl

Growing interest in the use of digital technologies and a Putnam-inspired debate about youth engagement has drawn researchers from outside of the study of social movements…

Abstract

Growing interest in the use of digital technologies and a Putnam-inspired debate about youth engagement has drawn researchers from outside of the study of social movements into research on the topic. This interest in youth protest participation has, in turn, developed into a substantial area of research of its own. While offering important research contributions, we argue that these areas of scholarship are often not well grounded in classic social movement theory and research, instead focusing on new media and/or the relationship between activism and other forms of youth engagement. This chapter seeks to correct this by drawing on interviews with 40 high school and college students from a moderately sized southwestern city to examine whether traditional paths to youth activism (i.e., family, friends, and institutions) have changed or eroded as online technology use and extra-institutional engagement among youth has risen. We find that youth continue to be mobilized by supportive family, friends, and institutional opportunities, and that the students who were least engaged are missing these vital support networks. Thus, it is not so much that the process driving youth activism has changed, but that some youth are not receiving support that has been traditionally necessary to spur activism. This offers an important reminder for scholars studying youth and digital activism and youth participation more broadly that existing theory and research about traditional pathways to activism needs to be evaluated in contemporary research.

Details

Social Movements and Media
Type: Book
ISBN: 978-1-78743-098-3

Keywords

To view the access options for this content please click here
Article

Jie Lin and Minghua Wei

With the rapid development and stable operated application of lithium-ion batteries used in uninterruptible power supply (UPS), the prediction of remaining useful life…

Abstract

Purpose

With the rapid development and stable operated application of lithium-ion batteries used in uninterruptible power supply (UPS), the prediction of remaining useful life (RUL) for lithium-ion battery played an important role. More and more researchers paid more attentions on the reliability and safety for lithium-ion batteries based on prediction of RUL. The purpose of this paper is to predict the life of lithium-ion battery based on auto regression and particle filter method.

Design/methodology/approach

In this paper, a simple and effective RUL prediction method based on the combination method of auto-regression (AR) time-series model and particle filter (PF) was proposed for lithium-ion battery. The proposed method deformed the double-exponential empirical degradation model and reduced the number of parameters for such model to improve the efficiency of training. By using the PF algorithm to track the process of lithium-ion battery capacity decline and modified observations of the state space equations, the proposed PF + AR model fully considered the declined process of batteries to meet more accurate prediction of RUL.

Findings

Experiments on CALCE dataset have fully compared the conventional PF algorithm and the AR + PF algorithm both on original exponential empirical degradation model and the deformed double-exponential one. Experimental results have shown that the proposed PF + AR method improved the prediction accuracy, decreases the error rate and reduces the uncertainty ranges of RUL, which was more suitable for the deformed double-exponential empirical degradation model.

Originality/value

In the running of UPS device based on lithium-ion battery, the proposed AR + PF combination algorithm will quickly, accurately and robustly predict the RUL of lithium-ion batteries, which had a strong application value in the stable operation of laboratory and other application scenarios.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 14 no. 2
Type: Research Article
ISSN: 1756-378X

Keywords

1 – 10 of over 18000