Search results

1 – 6 of 6
To view the access options for this content please click here
Article

Xiaosong Zhou, Xu Sun, Qingfeng Wang and Sarah Sharples

The current understanding of serendipity is based primarily on studies employing westerners as the participants, and it remains uncertain whether or not this understanding…

Abstract

Purpose

The current understanding of serendipity is based primarily on studies employing westerners as the participants, and it remains uncertain whether or not this understanding would be pervasive under different cultures, such as in China. In addition, there is not a sufficient systematic investigation of context during the occurrence of serendipity in current studies. The purpose of this paper is to examine the above issues by conducting a follow-up empirical study with a group of Chinese scholars.

Design/methodology/approach

The social media application “WeChat” was employed as a research tool. A diary-based study was conducted and 16 participants were required to send to the researchers any cases of serendipity they encountered during a period of two weeks, and this was followed by a post-interview.

Findings

Chinese scholars experienced serendipity in line with the three main processes of: encountering unexpectedness, connection-making and recognising the value. An updated context-based serendipity model was constructed, where the role of context during each episode of experiencing serendipity was identified, including the external context (e.g. time, location and status), the social context and the internal context (e.g. precipitating conditions, sagacity/perceptiveness and emotion).

Originality/value

The updated context model provides a further understanding of the role played by context during the different processes of serendipity. The framework for experiencing serendipity has been expanded, and this may be used to classify the categories of serendipity.

Details

Journal of Documentation, vol. 74 no. 3
Type: Research Article
ISSN: 0022-0418

Keywords

To view the access options for this content please click here
Article

Zhihua Ying, Yadong Jiang, Huibin Qin, Liang Zheng and Xiaosong Du

The purpose of this paper is to show how a quartz crystal microbalance modified with poly (epichlorohydrin) (PECH) is fabricated and used for detection of acetone vapor…

Abstract

Purpose

The purpose of this paper is to show how a quartz crystal microbalance modified with poly (epichlorohydrin) (PECH) is fabricated and used for detection of acetone vapor using a spin‐coating method.

Design/methodology/approach

Measurements are based on the frequency shifts due to the adsorption of acetone vapor on the surface of the modified electrodes. A first‐order linear time‐invariant (LTI) system model is used to simulate the sensor response.

Findings

It is found that frequency shifts are linear to the concentrations of analyte, and cycle test examination shows good repeatability. The sensitivity to acetone vapor is better than other volatile compounds. A good match result is obtained with the LTI system model.

Originality/value

The device performance opens a potential way for analyzing acetone vapor.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 29 no. 2
Type: Research Article
ISSN: 0332-1649

Keywords

To view the access options for this content please click here
Article

Behjat Zuhaira and Naveed Ahmad

Significant numbers of business process management (BPM) projects fail. Their failure is attributed toward many factors. Among them, low quality of BPM is one reason. Some…

Abstract

Purpose

Significant numbers of business process management (BPM) projects fail. Their failure is attributed toward many factors. Among them, low quality of BPM is one reason. Some of the tasks in BPM have their roots in business process reengineering (BPR). The literature has cited many different critical success and failure factors for quality BPM and BPR. Lack of software tools is one of the technology-oriented factors that results in poor BPM and BPR. This paper aims to build a generic feature set offered by software tools for process modeling their analysis implementation and management. It presents an objective analysis in identifying weaknesses and strengths of these tools, primarily for BPM.

Design/methodology/approach

A method is proposed to evaluate the quality of process reengineering and management delivered by software tools. It consists of four phases: feature extraction, tool selection, data extraction and tool evaluation.

Findings

The data gathered is quantified to test research hypotheses, the results are statistically significant and highlight multiple areas for future improvements. Moreover, the cluster visualizations created also help to understand the strengths and weaknesses of BPM/BPR tools.

Research limitations/implications

Despite the research approach used, there is a chance of subjectivity when it comes to evaluating different tools.

Practical implications

The paper includes implications for practitioners and researchers for choosing appropriate software tool for process modeling, analysis, implementation and management, matching their requirements with BPM and BPR. It also identifies features that are missing in these tools.

Originality/value

This paper provides a comprehensive analysis of BPM and supporting tools, relates them to key stages of BPM life cycle and BPR methodologies. It also identifies various areas for further development in these tools.

Details

Business Process Management Journal, vol. 27 no. 1
Type: Research Article
ISSN: 1463-7154

Keywords

To view the access options for this content please click here

Abstract

Details

Angel Financing in Asia Pacific
Type: Book
ISBN: 978-1-78635-128-9

To view the access options for this content please click here
Article

Zhi Liu, Xiaosong Zhang, Yue Wu and Ting Chen

The purpose of this paper is to propose an approach to detect Indirect Memory‐Corruption Exploit (IMCE) at runtime on binary code, which is often caused by integer…

Abstract

Purpose

The purpose of this paper is to propose an approach to detect Indirect Memory‐Corruption Exploit (IMCE) at runtime on binary code, which is often caused by integer conversion error. Real‐world attacks were evaluated for experimentation.

Design/methodology/approach

Current dynamic analysis detects attacks by enforcing low level policy which can only detect control‐flow hijacking attack. The proposed approach detects IMCE with high level policy enforcement using dynamic taint analysis. Unlike low‐level policy enforced on instruction level, the authors' policy is imposed on memory operation routine. The authors implemented a fine‐grained taint analysis system with accurate taint propagation for detection.

Findings

Conversion errors are common and most of them are legitimate. Taint analysis with high‐level policy can accurately block IMCE but have false positives. Proper design of data structures to maintain taint tag can greatly improve overhead.

Originality/value

This paper proposes an approach to block IMCE with high‐level policy enforcement using taint analysis. It has very low false negatives, though still causes certain false positives. The authors made several implementation contributions to strengthen accuracy and performance.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 32 no. 2
Type: Research Article
ISSN: 0332-1649

Keywords

To view the access options for this content please click here
Article

Shiquan Wang, Guoyin Shang and Shuang Zhang

Concerning that limited explanation exists examining the function of corporate governance in trust processing within entrepreneurial network development, the purpose of…

Abstract

Purpose

Concerning that limited explanation exists examining the function of corporate governance in trust processing within entrepreneurial network development, the purpose of this paper is to explore trust evolution and the role of corporate governance in an entrepreneurial network.

Design/methodology/approach

This paper makes an innovative exploration based on the case study of NVC Lighting Holding Limited.

Findings

It proposes that in the initial period of network relationship which is based on entrepreneur’s individual social network and embodies sole social network embeddness, entrepreneurial network relies more on affective trust than contractual trust. When stepping into extending period of network relationship which reflects separate embeddedness of social and market network, however, entrepreneurial network has an equal reliance on both affective trust and contractual trust. With further development, when ushering in the phase of maturity which undergoes superimposing embeddedness of both social and market network, entrepreneur network inclines to rely more heavily on affective trust than contractual trust. During the whole process, it can be found that the reliance of entrepreneurial network on trust has the tendency to transfer from affective trust to contractual trust. Furthermore, decreasing of equity ratio of founders and strengthening of controlling right heterogeneity in the corporate governance have facilitated the transfer process and the entrepreneurs’ authority has restraining effect on the evolution of the process.

Originality/value

Through case study, this paper presents the trust evolution process in different stages of entrepreneurial network. Another important theoretic contribution of this paper is that it reveals the function of corporate governance in trust processing within entrepreneurial network development.

Details

Chinese Management Studies, vol. 13 no. 4
Type: Research Article
ISSN: 1750-614X

Keywords

1 – 6 of 6