Search results

1 – 10 of over 2000
Content available
Book part
Publication date: 28 June 2023

Xinru Liu and Honggen Xiao

Abstract

Details

Poverty and Prosperity
Type: Book
ISBN: 978-1-80117-987-4

Book part
Publication date: 3 August 2017

Matt Bower

Mobile devices, through their capacity to enable anytime-anywhere learning as well as capture, annotate and share multimedia, offer entirely new ways for students to learn. This…

Abstract

Mobile devices, through their capacity to enable anytime-anywhere learning as well as capture, annotate and share multimedia, offer entirely new ways for students to learn. This chapter provides review of mobile learning with a particular focus on learning design. First various definitions and characteristics of mobile learning are examined in order to establish a common understanding of its boundaries and meaning. Example uses of mobile learning in schools and higher education are described as a way to provide a more concrete understanding of design possibilities. Benefits of mobile learning are unpacked, as distilled from the literature, including the ability to provide flexible, accessible, authentic, personalized, ubiquitous and seamless learning. Mobile learning issues are also examined, including technical problems, cognitive load issues, distraction, equity and safety. A primary school science and a university pre-service teacher education vignette are described so as to offer a more in-depth illustration of what mobile learning can look like and achieve in practice. Finally, mobile learning research findings and observations are synthesized into recommendations, to inform and guide evidence-based mobile learning design practices. Opportunities for future research and investigation are also discussed.

Details

Design of Technology-Enhanced Learning
Type: Book
ISBN: 978-1-78714-183-4

Book part
Publication date: 5 April 2024

Ziwen Gao, Steven F. Lehrer, Tian Xie and Xinyu Zhang

Motivated by empirical features that characterize cryptocurrency volatility data, the authors develop a forecasting strategy that can account for both model uncertainty and…

Abstract

Motivated by empirical features that characterize cryptocurrency volatility data, the authors develop a forecasting strategy that can account for both model uncertainty and heteroskedasticity of unknown form. The theoretical investigation establishes the asymptotic optimality of the proposed heteroskedastic model averaging heterogeneous autoregressive (H-MAHAR) estimator under mild conditions. The authors additionally examine the convergence rate of the estimated weights of the proposed H-MAHAR estimator. This analysis sheds new light on the asymptotic properties of the least squares model averaging estimator under alternative complicated data generating processes (DGPs). To examine the performance of the H-MAHAR estimator, the authors conduct an out-of-sample forecasting application involving 22 different cryptocurrency assets. The results emphasize the importance of accounting for both model uncertainty and heteroskedasticity in practice.

Book part
Publication date: 3 February 2023

Bhayu Rhama

This chapter is building conceptual background of psychological risk for international tourists. Drawing on Place Attachment Theory, Moral Disengagement Theory, Followership…

Abstract

This chapter is building conceptual background of psychological risk for international tourists. Drawing on Place Attachment Theory, Moral Disengagement Theory, Followership Theory, Job Demands-Resources, Acculturation Theory and Goal Progress Theory of Rumination, this chapter proposes a framework of psychological risks with six psychological risks that tourists could encounter in foreign destination: destination detachment risk, moral disengagement risk, risk of false risk assessment, burnout risk, risk of loneliness and risk of rumination. High destination detachment could lead tourists to behave less environmentally friendly, while high moral disengagement could lead tourists to behave less ethically friendly. Followership to the influencers in social media could lead tourists to engage in risk-taking behaviours and false risk assessment, leading to burnout risk, risk of loneliness and risk of rumination, where negative autobiographical memory is created and forming memory-related distress when they arrive homes. Place detachment and moral disengagement risk local environmental and social health, while burnout, loneliness and rumination pose risks for the tourists' psychological health. Several studies propose suggestions for the destination manager and tourists to manage the risk effectively and adequately, including place attachment and moral engagement campaign, careful travel planning and social support.

Book part
Publication date: 5 October 2023

Hannes Velt and Rudolf R. Sinkovics

This chapter offers a comprehensive review the literature on authentic leadership (AL). The authors employ a bibliometric approach to identify, classify, visualise and synthesise…

Abstract

This chapter offers a comprehensive review the literature on authentic leadership (AL). The authors employ a bibliometric approach to identify, classify, visualise and synthesise relevant scholarly publications and the work of a core group of interdisciplinary scholars who are key contributors to the research on AL. They review 264 journal articles, adopting a clustering technique to assess the central themes of AL scholarship. They identify five distinct thematic clusters: authenticity in the context of leadership; structure of AL; social perspectives on AL; dynamism of AL; and value perceptions of AL. Velt and Sinkovics assert that these clusters will help scholars of AL to understand the dominant streams in the literature and provide a foundation for future research.

Details

The Emerald Handbook of Authentic Leadership
Type: Book
ISBN: 978-1-80262-014-6

Keywords

Abstract

Details

Energy Economics
Type: Book
ISBN: 978-1-83867-294-2

Book part
Publication date: 24 August 2023

Jean Wang and Lars Schweizer

This study investigates the way in which acquisition-related human factors affect knowledge transfer in the context of Chinese cross-border M&A for strategic assets. The authors…

Abstract

This study investigates the way in which acquisition-related human factors affect knowledge transfer in the context of Chinese cross-border M&A for strategic assets. The authors find that the process of knowledge transfer is reciprocal for revenue and cost synergies, including explicit and tacit knowledge. The establishment of joint ventures (JV) in China after the takeover boosts product-oriented knowledge transfer from overseas-acquired firms in mature markets to Chinese acquirers. The promotion of overseas synergies stimulates complementary knowledge transfer flow, which is reversely transferred from Chinese acquirers to overseas-acquired subsidiaries such as low-saving sourcing and new market applications. This study identifies three acquisition-related human factors that impact overseas knowledge senders for knowledge transfer. These human factors are implemented by Chinese strategic investors as new shareholders during the loosen integration phase. The first facilitator is all-round communication programs with top management involvement, aiming to build up constructive communication channels to boost knowledge transfer. The second facilitator is competence-based trust, which stimulates cooperation and application based on similar professional competence between Chinese acquirers and their overseas-acquired subsidiaries. The impeder is a high turnover of key skilled workers at Chinese acquirers to undermine the effectiveness of knowledge transfer.

Book part
Publication date: 15 July 2019

Saba S. Colakoglu, Niclas Erhardt, Stephanie Pougnet-Rozan and Carlos Martin-Rios

Creativity and innovation have been buzzwords of managerial discourse over the last few decades as they contribute to the long-term survival and competitiveness of firms. Given…

Abstract

Creativity and innovation have been buzzwords of managerial discourse over the last few decades as they contribute to the long-term survival and competitiveness of firms. Given the non-linear, causally ambiguous, and intangible nature of all innovation-related phenomena, management scholars have been trying to uncover factors that contribute to creativity and innovation from multiple lenses ranging from organizational behavior at the micro-level to strategic management at the macro-level. Along with important and insightful developments in these research streams that evolved independently from one another, human resource management (HRM) research – especially from a strategic perspective – has only recently started to contribute to a better understanding of both creativity and innovation. The goal of this chapter is to review the contributions of strategic HRM research to an improved understanding of creativity at the individual-level and innovation at the firm-level. In organizing this review, the authors rely on the open innovation funnel as a metaphor to review research on both HRM practices and HRM systems that contribute to creativity and innovation. In the last section, the authors focus on more recent developments in HRM research that focus on ambidexterity – as a way for HRM to simultaneously facilitate exploration and exploitation. This chapter concludes with a discussion of future research directions.

Details

Research in Personnel and Human Resources Management
Type: Book
ISBN: 978-1-78973-852-0

Keywords

Book part
Publication date: 29 May 2023

Divya Nair and Neeta Mhavan

A zero-day vulnerability is a complimentary ticket to the attackers for gaining entry into the network. Thus, there is necessity to device appropriate threat detection systems and…

Abstract

A zero-day vulnerability is a complimentary ticket to the attackers for gaining entry into the network. Thus, there is necessity to device appropriate threat detection systems and establish an innovative and safe solution that prevents unauthorised intrusions for defending various components of cybersecurity. We present a survey of recent Intrusion Detection Systems (IDS) in detecting zero-day vulnerabilities based on the following dimensions: types of cyber-attacks, datasets used and kinds of network detection systems.

Purpose: The study focuses on presenting an exhaustive review on the effectiveness of the recent IDS with respect to zero-day vulnerabilities.

Methodology: Systematic exploration was done at the IEEE, Elsevier, Springer, RAID, ESCORICS, Google Scholar, and other relevant platforms of studies published in English between 2015 and 2021 using keywords and combinations of relevant terms.

Findings: It is possible to train IDS for zero-day attacks. The existing IDS have strengths that make them capable of effective detection against zero-day attacks. However, they display certain limitations that reduce their credibility. Novel strategies like deep learning, machine learning, fuzzing technique, runtime verification technique, and Hidden Markov Models can be used to design IDS to detect malicious traffic.

Implication: This paper explored and highlighted the advantages and limitations of existing IDS enabling the selection of best possible IDS to protect the system. Moreover, the comparison between signature-based and anomaly-based IDS exemplifies that one viable approach to accurately detect the zero-day vulnerabilities would be the integration of hybrid mechanism.

Details

Smart Analytics, Artificial Intelligence and Sustainable Performance Management in a Global Digitalised Economy
Type: Book
ISBN: 978-1-80382-555-7

Keywords

Book part
Publication date: 18 August 2022

Zheng Wang

In an urbanising world, neighbouring is perceived to be steadily losing significance and a remnant of the past. The same belief can also be found in China where rapid urbanisation…

Abstract

In an urbanising world, neighbouring is perceived to be steadily losing significance and a remnant of the past. The same belief can also be found in China where rapid urbanisation has had a tremendous impact on the social networks and neighbourhood life of urban residents. This chapter challenges the common perception of neighbouring in demise and argues that neighbouring remains an important form of social relationship, even if the meanings and role of neighbouring have changed. This chapter first charts the changing role of neighbouring from the socialist era to post-reform China. It then provides an account of four common types of neighbourhoods in Chinese cities – work-unit estates, traditional courtyards, commodity housing estates and urban villages – and considers how and why neighbouring in different ways still matters to them. In pre-reform socialist China, neighbourhood life and neighbouring comprised much of the daily social life of residents. Since the reform era, with the proliferation of private commodity housing estates, middle-class residents prioritise comfort, security and privacy, such that neighbouring levels have subsided. Nevertheless, in other neighbourhood types, such as work-unit housing estates, traditional courtyards and urban villages, neighbours still rely upon one another for various reasons.

Details

Neighbours Around the World: An International Look at the People Next Door
Type: Book
ISBN: 978-1-80043-370-0

Keywords

1 – 10 of over 2000