Search results
1 – 10 of 14Lida Haghnegahdar, Sameehan S. Joshi, Rohith Yanambaka Venkata, Daniel A. Riley and Narendra B. Dahotre
Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems…
Abstract
Purpose
Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems. Manufacturing systems are increasingly faced with risk of attacks not only by traditional malicious actors such as hackers and cyber-criminals but also by some competitors and organizations engaged in corporate espionage. This paper aims to elaborate a plausible risk practice of designing and demonstrate a case study for the compromised-based malicious for polymer 3D printing system.
Design/methodology/approach
This study assumes conditions when a machine was compromised and evaluates the effect of post compromised attack by studying its effects on tensile dog bone specimens as the printed object. The designed algorithm removed predetermined specific number of layers from the tensile samples. The samples were visually identical in terms of external physical dimensions even after removal of the layers. Samples were examined nondestructively for density. Additionally, destructive uniaxial tensile tests were carried out on the modified samples and compared to the unmodified sample as a control for various mechanical properties. It is worth noting that the current approach was adapted for illustrating the impact of cyber altercations on properties of additively produced parts in a quantitative manner. It concurrently pointed towards the vulnerabilities of advanced manufacturing systems and a need for designing robust mitigation/defense mechanism against the cyber altercations.
Findings
Density, Young’s modulus and maximum strength steadily decreased with an increase in the number of missing layers, whereas a no clear trend was observed in the case of % elongation. Post tensile test observations of the sample cross-sections confirmed the successful removal of the layers from the samples by the designed method. As a result, the current work presented a cyber-attack model and its quantitative implications on the mechanical properties of 3D printed objects.
Originality/value
To the best of the authors’ knowledge, this is the original work from the team. It is currently not under consideration for publication in any other avenue. The paper provides quantitative approach of realizing impact of cyber intrusions on deteriorated performance of additively manufactured products. It also enlists important intrusion mechanisms relevant to additive manufacturing.
Details
Keywords
Syed Masroor Hassan and Zillur Rahman
This paper aims to investigate the role of personal and affective factors in curbing unethical consumer behaviour (UCB). Specifically, this study scrutinizes how religiosity…
Abstract
Purpose
This paper aims to investigate the role of personal and affective factors in curbing unethical consumer behaviour (UCB). Specifically, this study scrutinizes how religiosity, consumer ethical beliefs (CEBs) and anticipated guilt influence UCB.
Design/methodology/approach
Using a survey-based approach, the author distributed offline and online questionnaires among students enrolled in a public university in Roorkee, India and analysed the data using structural equation modelling.
Findings
The results provide evidence that intrinsically religious individuals develop strong ethical beliefs, which can help them to refrain from unethical behaviour and adopt ethical conduct. Also, individuals prone to experiencing anticipated guilt show less inclination to commit unethical behaviour.
Research limitations/implications
This research presents significant theoretical and practical implications to facilitate academic understanding and managerial decision-making in the context of consumer ethics.
Originality/value
This research is one of the few empirical studies in the Indian context that simultaneously examines the antecedents and consequences of CEB.
Details
Keywords
Tim Wright, Zainab Ruhwanya and Jacques Ophoff
The COVID-19 pandemic necessitated a significant shift in how employees executed their professional responsibilities. Concurrently, the incidence of cybercrime experienced a…
Abstract
Purpose
The COVID-19 pandemic necessitated a significant shift in how employees executed their professional responsibilities. Concurrently, the incidence of cybercrime experienced a noteworthy surge due to the increased utilisation of cyberspace. The abrupt transition to telecommuting altered the interpersonal dynamics inherent in traditional work environments. This paper aims to examine the impact of interpersonal factors on the cybercrime preventative measures adopted by telecommuting employees.
Design/methodology/approach
A conceptual model, grounded in the Theory of Interpersonal Behaviour, is evaluated through an online survey. The data set comprises responses from 209 employees in South Africa, and the analysis uses partial least squares structural equation modelling.
Findings
The results reveal substantial predictive power to explain cybercrime preventative behaviours. Notably, the study underscores the significant influence of habit and affect on intention and subsequent behaviour.
Practical implications
The results suggest that practitioners should give due attention to emotional dimensions (affect) as a catalyst for information security behaviour. The formulation of employees’ information security responsibilities should be pragmatic, fostering subconscious compliance to establish routine behaviour (habit).
Originality/value
This research underscores the pivotal roles played by habit and emotions in shaping behavioural patterns related to information security. Furthermore, it provides researchers with an illustrative model for operationalising these constructs within the realm of security. The results contribute additional perspectives on the repercussions of the COVID-19 pandemic on cybercrime preventative behaviours.
Details
Keywords
George Kwame Fobiri, Ebenezer Kofi Howard, Solomon Marfo Ayesu, Ama Kour Timpabi and Diana Oppong
The purpose of this study is to investigate the value of Ghanaian weaving art tradition to humanity from socio-cultural and economic points of view. This study sought to answer…
Abstract
Purpose
The purpose of this study is to investigate the value of Ghanaian weaving art tradition to humanity from socio-cultural and economic points of view. This study sought to answer questions such as “What is the interest of researchers regarding Ghanaian textile weaving art tradition?”, “To what extent has weaving art tradition projected the Ghanaian culture?” and “What is the socio-economic value of Ghanaian weaving art tradition?”
Design/methodology/approach
The systematic literature review approach was used to analyse data obtained from the Scopus online database. The PRISMA framework was adopted to select 22 relevant studies for analysis and conclusions. Also, the VOSviewer software was used to analyse and understand the co-occurrence of keywords.
Findings
It was revealed that Ghanaian weaving art tradition stands as a major craft that projects Ghana globally. Researchers around the world keep adding knowledge on Ghanaian traditional weaving and its value to humanity, resulting in a significant rise recently in the publication trend. Also, the rich cloth from the art is celebrated annually to invite people around the globe to learn the Ghanaian culture for social development. This study again found that traditional weaving serves as a major source of income for weavers and marketers of indigenous Ghanaian woven fabrics.
Practical implications
The findings of this study serve as a wake-up call to the Government of Ghana, institutional actors and national leaders to practically engage in the projection of the local art by playing individual roles such as financially supporting the craftsmen, initiating and implementing appropriate policies and displaying the local cloth on international occasions. This will make the local art more attractive for effective marketing and cultural preservation.
Originality/value
With reliable information extracted from the Scopus online database, this study presents original results and makes appropriate suggestions worth adopting for the improvement of the Ghanaian weaving art tradition.
Details
Keywords
Faris ALshubiri and Mawih Kareem Al Ani
This study aims to analyse the intellectual property rights (INPR), foreign direct investment (FDI) inflows and technological exports of 32 developing and developed countries for…
Abstract
Purpose
This study aims to analyse the intellectual property rights (INPR), foreign direct investment (FDI) inflows and technological exports of 32 developing and developed countries for the period of 2006–2020.
Design/methodology/approach
Diagnostic tests were used to confirm the panel least squares, fixed effect, random effect, feasible general least squares, dynamic ordinary least squares and fully modified ordinary least squares estimator results as well as to increase the robustness.
Findings
According to the findings for the developing countries, trademark, patent and industrial design applications, each had a significant positive long-run effect on FDI inflows. In addition, there was a significant positive long-run relationship between patent applications and medium- and high-technology exports. Meanwhile, trademark and industrial design applications had a significant negative long-term effect on medium- and high-technology exports. In developed countries, patent and industrial design applications each have a significant negative long-term on medium- and high-technology exports. Furthermore, patent and trademark applications each had a significant negative long-run effect on FDI inflows.
Originality/value
This study contributes significantly to the focus that host countries evaluate the technology gaps between domestic and foreign investors at different industry levels to select the best INPR rules and innovation process by increasing international cooperation. Furthermore, the host countries should follow the structure–conduct–performance paradigm based on analysis of the market structure, strategic firms and industrial dynamics systems.
Details
Keywords
Khurram Shahzad, Shakeel Ahmad Khan and Abid Iqbal
For the provision of smart library services to end users, tools of the Internet of Things (IoT) play a significant role. The study aims to discover the factors influencing the…
Abstract
Purpose
For the provision of smart library services to end users, tools of the Internet of Things (IoT) play a significant role. The study aims to discover the factors influencing the adoption of IoT in university libraries, investigate the impact of IoT on university library services and identify challenges to adopt IoT applications in university libraries.
Design/methodology/approach
A systematic literature review was carried out to address the objectives of the study. The 40 most relevant research papers published in the world’s leading digital databases were selected to conduct the study.
Findings
The findings illustrated that rapid growth in technology, perceived benefits, the networked world and the changing landscape of librarianship positively influenced the adoption of IoT in university libraries. The study also displayed that IoT supported library professionals to initiate smart library services, assisted in service efficiency, offered context-based library services, provided tracking facilities and delivered effective management of library systems. Results also revealed that a lack of technical infrastructure, security and privacy concerns, a lack of technological skills and unavailability of policy and strategic planning caused barriers to the successful adoption of IoT applications in university libraries.
Originality/value
The study has provided theoretical implications through a valuable addition to the current literature. It has also offered managerial implications for policymakers to construct productive policies for the implementation of IoT applications in university libraries for the attainment of fruitful outcomes. Finally, the study provides a baseline for understanding the adoption of IoT in academic libraries.
Details
Keywords
While most West European nations were formed around pre-existing entities that could be called “countries” before the modern age, this was not the case in the Middle East. Some…
Abstract
While most West European nations were formed around pre-existing entities that could be called “countries” before the modern age, this was not the case in the Middle East. Some entities, like Egypt, did have a clear political and cultural identity before colonialism, others, like Algeria, did not. This chapter discusses the four states of the Maghreb: Morocco, Algeria, Tunisia and Libya, through the perspective of “country creation” going into and coming out of colonial rule. We can see here two “models” of fairly similar types of historical development, one showing a gradual process through a protectorate period to relatively stable modern nations, another through violent conquest and direct colonization ending in violent liberation and military and wealthy but fragile states. The article asks whether these models for the history of country creation and the presence or absence of pre-colonial identities can help explain the modern history and nature of these states in the Arab Spring and the years thereafter. Then, a more tentative attempt is made to apply these models to two countries of the Arab east, Syria and Iraq. While local variations ensure that no model can be transferred directly, it can show the importance of studying the historical factors that go into the transition from geographical region to a country with people that can form the basis of a nation.
Details
Keywords
Jung Ran Park, Erik Poole and Jiexun Li
The purpose of this study is to explore linguistic stylometric patterns encompassing lexical, syntactic, structural, sentiment and politeness features that are found in…
Abstract
Purpose
The purpose of this study is to explore linguistic stylometric patterns encompassing lexical, syntactic, structural, sentiment and politeness features that are found in librarians’ responses to user queries.
Design/methodology/approach
A total of 462 online texts/transcripts comprising answers of librarians to users’ questions drawn from the Internet Public Library were examined. A Principal Component Analysis, which is a data reduction technique, was conducted on the texts and transcripts. Data analysis illustrates the three principal components that predominantly occur in librarians’ answers: stylometric richness, stylometric brevity and interpersonal support.
Findings
The results of the study have important implications in digital information services because stylometric features such as lexical richness, structural clarity and interpersonal support may interplay with the degree of complexity of user queries, the (a)synchronous communication mode, application of information service guideline and manuals and overall characteristics and quality of a given digital information service. Such interplay may bring forth a direct impact on user perceptions and satisfaction regarding interaction with librarians and the information service received through the computer-mediated communication channel.
Originality/value
To the best of the authors’ knowledge, the stylometric features encompassing lexical, syntactic, structural, sentiment and politeness using Principal Component Analysis have not been explored in digital information/reference services. Thus, there is an emergent need to explore more fully how linguistic stylometric features interplay with the types of user queries, the asynchronous online communication mode, application of information service guidelines and the quality of a particular digital information service.
Details
Keywords
Samuel Foli, Susanne Durst and Serdal Temel
Acknowledging, on the one hand, the increasing fragility of supply chains and the number of risks involved in supply chain operations and, on the other hand, the role of small…
Abstract
Purpose
Acknowledging, on the one hand, the increasing fragility of supply chains and the number of risks involved in supply chain operations and, on the other hand, the role of small- and medium-sized enterprises (SMEs) in supply chains and the high exposure of these firms to risks of different types, this study aims to examine the relationship between supply chain risk management (SCRM) and innovation performance in SMEs. Furthermore, the impact of technological turbulence on this relationship was studied to take into account recent technological changes.
Design/methodology/approach
Structural equation modelling was carried out on a sample of Turkish SMEs to test the hypotheses developed.
Findings
The findings presented allow the authors to better understand the link between SCRM and innovation performance in SMEs. More precisely, empirical evidence is provided about the impact of SCRM components such as maturity and ability on innovation performance. Furthermore, the findings show the impact of technological turbulence on both SCRM and innovation performance.
Originality/value
By focusing on SCRM in SMEs, this paper contributes to the body of knowledge with regard to SCRM in general and with regard to SMEs in particular; research on the latter has only started recently. Moreover, by having studied SMEs from a developing country (other than China), this paper helps to develop a broader and more diverse perspective of SCRM.
Details
Keywords
Kian Yeik Koay and KerSoon Ang
This study aims to examine the factors influencing consumers’ intentions to use QR code menus in the post-COVID-19 pandemic using the unified theory of acceptance and use of…
Abstract
Purpose
This study aims to examine the factors influencing consumers’ intentions to use QR code menus in the post-COVID-19 pandemic using the unified theory of acceptance and use of technology and rational choice theory as the theoretical foundations.
Design/methodology/approach
Using a survey method, 200 data are collected from consumers who had used QR code menus in the past. Partial least squares structural equation modelling is used to analyse the data.
Findings
Our findings show that performance expectancy, effort expectancy, social influence, habit and perceived privacy protection have a significant positive influence on intentions. However, facilitating conditions, hedonic motivation and perceived privacy risk do not have a significant influence on intentions.
Originality/value
This study further extends the work of previous studies by using the unified theory of acceptance and use of technology model, with additional two new predictors, namely perceived privacy protection and perceived privacy risk, to understand consumers’ intentions to use QR code menus.
Details