Search results

1 – 10 of 14
Article
Publication date: 5 April 2024

Lida Haghnegahdar, Sameehan S. Joshi, Rohith Yanambaka Venkata, Daniel A. Riley and Narendra B. Dahotre

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems…

19

Abstract

Purpose

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems. Manufacturing systems are increasingly faced with risk of attacks not only by traditional malicious actors such as hackers and cyber-criminals but also by some competitors and organizations engaged in corporate espionage. This paper aims to elaborate a plausible risk practice of designing and demonstrate a case study for the compromised-based malicious for polymer 3D printing system.

Design/methodology/approach

This study assumes conditions when a machine was compromised and evaluates the effect of post compromised attack by studying its effects on tensile dog bone specimens as the printed object. The designed algorithm removed predetermined specific number of layers from the tensile samples. The samples were visually identical in terms of external physical dimensions even after removal of the layers. Samples were examined nondestructively for density. Additionally, destructive uniaxial tensile tests were carried out on the modified samples and compared to the unmodified sample as a control for various mechanical properties. It is worth noting that the current approach was adapted for illustrating the impact of cyber altercations on properties of additively produced parts in a quantitative manner. It concurrently pointed towards the vulnerabilities of advanced manufacturing systems and a need for designing robust mitigation/defense mechanism against the cyber altercations.

Findings

Density, Young’s modulus and maximum strength steadily decreased with an increase in the number of missing layers, whereas a no clear trend was observed in the case of % elongation. Post tensile test observations of the sample cross-sections confirmed the successful removal of the layers from the samples by the designed method. As a result, the current work presented a cyber-attack model and its quantitative implications on the mechanical properties of 3D printed objects.

Originality/value

To the best of the authors’ knowledge, this is the original work from the team. It is currently not under consideration for publication in any other avenue. The paper provides quantitative approach of realizing impact of cyber intrusions on deteriorated performance of additively manufactured products. It also enlists important intrusion mechanisms relevant to additive manufacturing.

Details

Rapid Prototyping Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-2546

Keywords

Article
Publication date: 25 January 2023

Syed Masroor Hassan and Zillur Rahman

This paper aims to investigate the role of personal and affective factors in curbing unethical consumer behaviour (UCB). Specifically, this study scrutinizes how religiosity…

Abstract

Purpose

This paper aims to investigate the role of personal and affective factors in curbing unethical consumer behaviour (UCB). Specifically, this study scrutinizes how religiosity, consumer ethical beliefs (CEBs) and anticipated guilt influence UCB.

Design/methodology/approach

Using a survey-based approach, the author distributed offline and online questionnaires among students enrolled in a public university in Roorkee, India and analysed the data using structural equation modelling.

Findings

The results provide evidence that intrinsically religious individuals develop strong ethical beliefs, which can help them to refrain from unethical behaviour and adopt ethical conduct. Also, individuals prone to experiencing anticipated guilt show less inclination to commit unethical behaviour.

Research limitations/implications

This research presents significant theoretical and practical implications to facilitate academic understanding and managerial decision-making in the context of consumer ethics.

Originality/value

This research is one of the few empirical studies in the Indian context that simultaneously examines the antecedents and consequences of CEB.

Details

International Journal of Ethics and Systems, vol. 40 no. 2
Type: Research Article
ISSN: 2514-9369

Keywords

Article
Publication date: 3 April 2024

Tim Wright, Zainab Ruhwanya and Jacques Ophoff

The COVID-19 pandemic necessitated a significant shift in how employees executed their professional responsibilities. Concurrently, the incidence of cybercrime experienced a…

Abstract

Purpose

The COVID-19 pandemic necessitated a significant shift in how employees executed their professional responsibilities. Concurrently, the incidence of cybercrime experienced a noteworthy surge due to the increased utilisation of cyberspace. The abrupt transition to telecommuting altered the interpersonal dynamics inherent in traditional work environments. This paper aims to examine the impact of interpersonal factors on the cybercrime preventative measures adopted by telecommuting employees.

Design/methodology/approach

A conceptual model, grounded in the Theory of Interpersonal Behaviour, is evaluated through an online survey. The data set comprises responses from 209 employees in South Africa, and the analysis uses partial least squares structural equation modelling.

Findings

The results reveal substantial predictive power to explain cybercrime preventative behaviours. Notably, the study underscores the significant influence of habit and affect on intention and subsequent behaviour.

Practical implications

The results suggest that practitioners should give due attention to emotional dimensions (affect) as a catalyst for information security behaviour. The formulation of employees’ information security responsibilities should be pragmatic, fostering subconscious compliance to establish routine behaviour (habit).

Originality/value

This research underscores the pivotal roles played by habit and emotions in shaping behavioural patterns related to information security. Furthermore, it provides researchers with an illustrative model for operationalising these constructs within the realm of security. The results contribute additional perspectives on the repercussions of the COVID-19 pandemic on cybercrime preventative behaviours.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 9 April 2024

George Kwame Fobiri, Ebenezer Kofi Howard, Solomon Marfo Ayesu, Ama Kour Timpabi and Diana Oppong

The purpose of this study is to investigate the value of Ghanaian weaving art tradition to humanity from socio-cultural and economic points of view. This study sought to answer…

Abstract

Purpose

The purpose of this study is to investigate the value of Ghanaian weaving art tradition to humanity from socio-cultural and economic points of view. This study sought to answer questions such as “What is the interest of researchers regarding Ghanaian textile weaving art tradition?”, “To what extent has weaving art tradition projected the Ghanaian culture?” and “What is the socio-economic value of Ghanaian weaving art tradition?”

Design/methodology/approach

The systematic literature review approach was used to analyse data obtained from the Scopus online database. The PRISMA framework was adopted to select 22 relevant studies for analysis and conclusions. Also, the VOSviewer software was used to analyse and understand the co-occurrence of keywords.

Findings

It was revealed that Ghanaian weaving art tradition stands as a major craft that projects Ghana globally. Researchers around the world keep adding knowledge on Ghanaian traditional weaving and its value to humanity, resulting in a significant rise recently in the publication trend. Also, the rich cloth from the art is celebrated annually to invite people around the globe to learn the Ghanaian culture for social development. This study again found that traditional weaving serves as a major source of income for weavers and marketers of indigenous Ghanaian woven fabrics.

Practical implications

The findings of this study serve as a wake-up call to the Government of Ghana, institutional actors and national leaders to practically engage in the projection of the local art by playing individual roles such as financially supporting the craftsmen, initiating and implementing appropriate policies and displaying the local cloth on international occasions. This will make the local art more attractive for effective marketing and cultural preservation.

Originality/value

With reliable information extracted from the Scopus online database, this study presents original results and makes appropriate suggestions worth adopting for the improvement of the Ghanaian weaving art tradition.

Details

Research Journal of Textile and Apparel, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1560-6074

Keywords

Article
Publication date: 26 January 2024

Faris ALshubiri and Mawih Kareem Al Ani

This study aims to analyse the intellectual property rights (INPR), foreign direct investment (FDI) inflows and technological exports of 32 developing and developed countries for…

Abstract

Purpose

This study aims to analyse the intellectual property rights (INPR), foreign direct investment (FDI) inflows and technological exports of 32 developing and developed countries for the period of 2006–2020.

Design/methodology/approach

Diagnostic tests were used to confirm the panel least squares, fixed effect, random effect, feasible general least squares, dynamic ordinary least squares and fully modified ordinary least squares estimator results as well as to increase the robustness.

Findings

According to the findings for the developing countries, trademark, patent and industrial design applications, each had a significant positive long-run effect on FDI inflows. In addition, there was a significant positive long-run relationship between patent applications and medium- and high-technology exports. Meanwhile, trademark and industrial design applications had a significant negative long-term effect on medium- and high-technology exports. In developed countries, patent and industrial design applications each have a significant negative long-term on medium- and high-technology exports. Furthermore, patent and trademark applications each had a significant negative long-run effect on FDI inflows.

Originality/value

This study contributes significantly to the focus that host countries evaluate the technology gaps between domestic and foreign investors at different industry levels to select the best INPR rules and innovation process by increasing international cooperation. Furthermore, the host countries should follow the structure–conduct–performance paradigm based on analysis of the market structure, strategic firms and industrial dynamics systems.

Article
Publication date: 10 January 2024

Khurram Shahzad, Shakeel Ahmad Khan and Abid Iqbal

For the provision of smart library services to end users, tools of the Internet of Things (IoT) play a significant role. The study aims to discover the factors influencing the…

179

Abstract

Purpose

For the provision of smart library services to end users, tools of the Internet of Things (IoT) play a significant role. The study aims to discover the factors influencing the adoption of IoT in university libraries, investigate the impact of IoT on university library services and identify challenges to adopt IoT applications in university libraries.

Design/methodology/approach

A systematic literature review was carried out to address the objectives of the study. The 40 most relevant research papers published in the world’s leading digital databases were selected to conduct the study.

Findings

The findings illustrated that rapid growth in technology, perceived benefits, the networked world and the changing landscape of librarianship positively influenced the adoption of IoT in university libraries. The study also displayed that IoT supported library professionals to initiate smart library services, assisted in service efficiency, offered context-based library services, provided tracking facilities and delivered effective management of library systems. Results also revealed that a lack of technical infrastructure, security and privacy concerns, a lack of technological skills and unavailability of policy and strategic planning caused barriers to the successful adoption of IoT applications in university libraries.

Originality/value

The study has provided theoretical implications through a valuable addition to the current literature. It has also offered managerial implications for policymakers to construct productive policies for the implementation of IoT applications in university libraries for the attainment of fruitful outcomes. Finally, the study provides a baseline for understanding the adoption of IoT in academic libraries.

Details

The Electronic Library , vol. 42 no. 2
Type: Research Article
ISSN: 0264-0473

Keywords

Book part
Publication date: 19 April 2024

Knut S. Vikør

While most West European nations were formed around pre-existing entities that could be called “countries” before the modern age, this was not the case in the Middle East. Some…

Abstract

While most West European nations were formed around pre-existing entities that could be called “countries” before the modern age, this was not the case in the Middle East. Some entities, like Egypt, did have a clear political and cultural identity before colonialism, others, like Algeria, did not. This chapter discusses the four states of the Maghreb: Morocco, Algeria, Tunisia and Libya, through the perspective of “country creation” going into and coming out of colonial rule. We can see here two “models” of fairly similar types of historical development, one showing a gradual process through a protectorate period to relatively stable modern nations, another through violent conquest and direct colonization ending in violent liberation and military and wealthy but fragile states. The article asks whether these models for the history of country creation and the presence or absence of pre-colonial identities can help explain the modern history and nature of these states in the Arab Spring and the years thereafter. Then, a more tentative attempt is made to apply these models to two countries of the Arab east, Syria and Iraq. While local variations ensure that no model can be transferred directly, it can show the importance of studying the historical factors that go into the transition from geographical region to a country with people that can form the basis of a nation.

Details

A Comparative Historical and Typological Approach to the Middle Eastern State System
Type: Book
ISBN: 978-1-83753-122-6

Keywords

Article
Publication date: 16 August 2022

Jung Ran Park, Erik Poole and Jiexun Li

The purpose of this study is to explore linguistic stylometric patterns encompassing lexical, syntactic, structural, sentiment and politeness features that are found in…

Abstract

Purpose

The purpose of this study is to explore linguistic stylometric patterns encompassing lexical, syntactic, structural, sentiment and politeness features that are found in librarians’ responses to user queries.

Design/methodology/approach

A total of 462 online texts/transcripts comprising answers of librarians to users’ questions drawn from the Internet Public Library were examined. A Principal Component Analysis, which is a data reduction technique, was conducted on the texts and transcripts. Data analysis illustrates the three principal components that predominantly occur in librarians’ answers: stylometric richness, stylometric brevity and interpersonal support.

Findings

The results of the study have important implications in digital information services because stylometric features such as lexical richness, structural clarity and interpersonal support may interplay with the degree of complexity of user queries, the (a)synchronous communication mode, application of information service guideline and manuals and overall characteristics and quality of a given digital information service. Such interplay may bring forth a direct impact on user perceptions and satisfaction regarding interaction with librarians and the information service received through the computer-mediated communication channel.

Originality/value

To the best of the authors’ knowledge, the stylometric features encompassing lexical, syntactic, structural, sentiment and politeness using Principal Component Analysis have not been explored in digital information/reference services. Thus, there is an emergent need to explore more fully how linguistic stylometric features interplay with the types of user queries, the asynchronous online communication mode, application of information service guidelines and the quality of a particular digital information service.

Details

Global Knowledge, Memory and Communication, vol. 73 no. 3
Type: Research Article
ISSN: 2514-9342

Keywords

Open Access
Article
Publication date: 22 September 2022

Samuel Foli, Susanne Durst and Serdal Temel

Acknowledging, on the one hand, the increasing fragility of supply chains and the number of risks involved in supply chain operations and, on the other hand, the role of small…

2818

Abstract

Purpose

Acknowledging, on the one hand, the increasing fragility of supply chains and the number of risks involved in supply chain operations and, on the other hand, the role of small- and medium-sized enterprises (SMEs) in supply chains and the high exposure of these firms to risks of different types, this study aims to examine the relationship between supply chain risk management (SCRM) and innovation performance in SMEs. Furthermore, the impact of technological turbulence on this relationship was studied to take into account recent technological changes.

Design/methodology/approach

Structural equation modelling was carried out on a sample of Turkish SMEs to test the hypotheses developed.

Findings

The findings presented allow the authors to better understand the link between SCRM and innovation performance in SMEs. More precisely, empirical evidence is provided about the impact of SCRM components such as maturity and ability on innovation performance. Furthermore, the findings show the impact of technological turbulence on both SCRM and innovation performance.

Originality/value

By focusing on SCRM in SMEs, this paper contributes to the body of knowledge with regard to SCRM in general and with regard to SMEs in particular; research on the latter has only started recently. Moreover, by having studied SMEs from a developing country (other than China), this paper helps to develop a broader and more diverse perspective of SCRM.

Details

Journal of Entrepreneurship in Emerging Economies, vol. 16 no. 3
Type: Research Article
ISSN: 2053-4604

Keywords

Article
Publication date: 8 February 2024

Kian Yeik Koay and KerSoon Ang

This study aims to examine the factors influencing consumers’ intentions to use QR code menus in the post-COVID-19 pandemic using the unified theory of acceptance and use of…

Abstract

Purpose

This study aims to examine the factors influencing consumers’ intentions to use QR code menus in the post-COVID-19 pandemic using the unified theory of acceptance and use of technology and rational choice theory as the theoretical foundations.

Design/methodology/approach

Using a survey method, 200 data are collected from consumers who had used QR code menus in the past. Partial least squares structural equation modelling is used to analyse the data.

Findings

Our findings show that performance expectancy, effort expectancy, social influence, habit and perceived privacy protection have a significant positive influence on intentions. However, facilitating conditions, hedonic motivation and perceived privacy risk do not have a significant influence on intentions.

Originality/value

This study further extends the work of previous studies by using the unified theory of acceptance and use of technology model, with additional two new predictors, namely perceived privacy protection and perceived privacy risk, to understand consumers’ intentions to use QR code menus.

Details

British Food Journal, vol. 126 no. 5
Type: Research Article
ISSN: 0007-070X

Keywords

1 – 10 of 14