Search results

1 – 10 of 528
Article
Publication date: 12 December 2023

Catherine Manathunga

The purpose of this paper is to investigate the impact of the COVID-19 pandemic on doctoral education. Pandemics throughout history have generated new educational theories and…

Abstract

Purpose

The purpose of this paper is to investigate the impact of the COVID-19 pandemic on doctoral education. Pandemics throughout history have generated new educational theories and practices, accelerated some trends and signalled the abrupt end of others. The unpredictable effects of the COVID-19 pandemic have particularly impacted upon First Nations and transcultural communities and People of Colour throughout the globe. A second significant recent global trend that occurred at the height of the pandemic was the reignited #BlackLivesMatter (#BLM) protest campaign. This campaign drew attention to the vast inequities faced by black, transcultural (migrant, refugee, culturally diverse and international) and Indigenous peoples and triggered rapid action in higher education institutions against racism and unconscious bias.

Design/methodology/approach

This conceptual paper draws upon postcolonial/decolonial theory to demonstrate how the COVID pandemic and #BLM movement prompts us to revitalise doctoral education.

Findings

These two issues have created renewed urgency around the need to decolonise higher education and a desire to transform the “business-as-usual” geopolitical power dynamics that continue to privilege Northern knowledge over culturally diverse knowledge systems from First Nations and transcultural contexts. A key site where special opportunities exist to effect this transformation lies in doctoral education. Doctoral education is a significant location of new knowledge creation and the development of the world’s future researchers.

Research limitations/implications

Applying post/decolonial theory enables one to rethink how doctoral education should be changed to work towards greater decolonisation.

Originality/value

This study applies Santos’ ideas about “the sociologies of emergence” in the global South to think about how doctoral education should be reconstructed as a liberated zone of decolonisation and epistemic justice.

Details

Studies in Graduate and Postdoctoral Education, vol. 15 no. 2
Type: Research Article
ISSN: 2398-4686

Keywords

Article
Publication date: 16 April 2024

Ashlyn Tom and Alice Kim

To assess which partnerships were most critical during the recovery planning process following Hurricanes Maria and Irma. We discuss the roles and impact of different types of…

Abstract

Purpose

To assess which partnerships were most critical during the recovery planning process following Hurricanes Maria and Irma. We discuss the roles and impact of different types of partners, barriers and facilitators to partnerships and lessons in collaboration during the development of the economic and disaster recovery plan for Puerto Rico.

Design/methodology/approach

The Homeland Security Operational Analysis Center (HSOAC) was tasked with assisting the Puerto Rican government with an assessment of damages from Hurricanes Maria and Irma and the development of the Recovery Plan. During the process, a small team compiled and coded a database of meetings with non-HSOAC partners. The team was divided into sector teams that mirrored FEMA’s Recovery Support Functions. Each sector completed two surveys identifying high impact partners and their roles and contributions, as well as barriers and facilitators to partnerships.

Findings

A total of 1,382 engagements were recorded across all sectors over seven months. The most frequently identified high impact partners were federal and Puerto Rican governmental organizations partners. NGOs and nonprofits were noted as key partners in obtaining community perspective. Sector teams cited a lack of trust and difficulty identifying partners as barriers to partner engagement. Given the expedited nature of disaster response, establishing partnerships before disasters occur may help facilitate community input. Early networking, increased transparency and defining roles and responsibilities may increase trust and effectiveness among partnerships.

Originality/value

To our knowledge, this is one of the few studies that quantifies and illustrates the partnerships formed and their contributions during recovery planning, and lessons learned.

Details

Disaster Prevention and Management: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0965-3562

Keywords

Article
Publication date: 16 April 2024

Satyendra Kr Sharma, Rajkumar Sharma and Anil Jindal

Supply chain vulnerability (SCV) analysis is vital for manufacturers globally because it creates a pathway for building resilient supply chains in uncertain environments. This…

Abstract

Purpose

Supply chain vulnerability (SCV) analysis is vital for manufacturers globally because it creates a pathway for building resilient supply chains in uncertain environments. This study aims to identify drivers of SCV in the Indian manufacturing sector.

Design/methodology/approach

Sixteen drivers were identified from the literature review and followed by expert interviews. Interpretive structural modeling was used to determine the hierarchical structural relationship among identified SCV factors.

Findings

It was found that risk is not a board room agenda. Misaligned performance measures with incentives and lack of risk dashboard are the causal factors of SCV. Supply chain security, centralized production and distribution and lack of trust in the supply chain were driven factors.

Originality/value

This provides new insights to assess and prioritize initiatives for supply chain sustainability in terms of continuing business operations. The structural model provides a systemic view of SCV and helps reduce vulnerability.

Details

Journal of Modelling in Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1746-5664

Keywords

Article
Publication date: 9 March 2023

Hang Yin, Jishan Hou, Chengju Gong and Chen Xu

The behavior of the entities in a small and medium-sized enterprise (SME) cooperation network is influenced by the core enterprise. Addressing the problem of how the network…

Abstract

Purpose

The behavior of the entities in a small and medium-sized enterprise (SME) cooperation network is influenced by the core enterprise. Addressing the problem of how the network vulnerability changes when the core enterprise is attacked is a challenging topic. The purpose of this paper is to reveal the failure process of SME cooperation networks caused by the failure of the core SME from the perspective of cascading failure.

Design/methodology/approach

According to the Torch High Technology Industry Development Center, Ministry of Science & Technology in China, 296 SMEs in Jiangsu province were used to construct an SME cooperation network of technology-based SMEs and an under-loading cascading failure model. The weight-based attack strategy was selected to mimic a deliberate node attack and was used to analyze the vulnerability of the SME cooperation network.

Findings

Some important conclusions are obtained from the simulation analysis: (1) The minimum boundary of node enterprises has a negative relationship with networks' invulnerability, while the breakdown probability has an inverted-U relationship with networks' invulnerability. (2) The combined effect of minimum boundary and breakdown probability indicates that the vulnerability of networks is mainly determined by the breakdown probability; while, minimum boundary helps prevent cascading failure occur. Furthermore, according to the case study, adapting capital needs and resilience in the cooperation network is the core problem in improving the robustness of SME cooperation networks.

Originality/value

This research proposed an under-loading cascading failure model to investigate the under-loading failure process caused by the shortage of resources when the core enterprise fails or withdraws from the SME cooperation network. Two key parameters in the proposed model—minimum capacity and breakdown probability—could serve as a guide for research on the vulnerability of SME cooperation networks. Additionally, practical meanings for each parameter in the proposed model are given, to suggest novel insights regarding network protection to facilitate the robustness and vulnerability in real SME cooperation networks.

Article
Publication date: 24 April 2024

Jan Mei Soon-Sinclair, Rounaq Nayak and Louise Manning

The 2008 Chinese melamine milk scandal resulted in six reported fatalities and affected around 300,000 children, of whom 54,000 were hospitalised. Previous studies have used…

Abstract

Purpose

The 2008 Chinese melamine milk scandal resulted in six reported fatalities and affected around 300,000 children, of whom 54,000 were hospitalised. Previous studies have used linear approaches to examine the root causes of the melamine milk scandal.

Design/methodology/approach

In the present study, we applied a systems approach to the melamine milk scandal to identify the complex systems-level failures across the supply chain leading to the incident and why food fraud incidents such as this occurred in the dairy sector. Additionally, systemic failures associated with food fraud vulnerability factors were considered (i.e. opportunities, motivation and control measures).

Findings

48 contributory factors of influence were identified and grouped across six sociotechnical levels across the Chinese dairy system, from government to equipment and surroundings. Lack of vertical integration (processes and communication) contributed to the failure. When viewed from a broader perspective, the melamine milk scandal can be linked to a series of human errors and organisational issues associated with government bodies, the dairy supply chain, individual organisations and management decisions and individual actions of staff or processes.

Practical implications

This approach is of value to policymakers and the industry as it supports public health investigations of food fraud incidents and proactive food safety management.

Originality/value

To the best of our knowledge, this is the first study to analyse a food safety or fraud incident using the AcciMap approach and the food fraud vulnerability assessment (FFVA) technique. AcciMap analysis is applied to both unintentional and intentional aspects of the incident.

Details

British Food Journal, vol. 126 no. 6
Type: Research Article
ISSN: 0007-070X

Keywords

Article
Publication date: 6 May 2024

Ben Wisner

The transcript provides an overview of the development of the field and changing paradigms in this regard.

Abstract

Purpose

The transcript provides an overview of the development of the field and changing paradigms in this regard.

Design/methodology/approach

The transcript was developed in the context of a United Nations Office for Disaster Risk Reduction (UNDRR) project on the history of disaster risk reduction (DRR).

Findings

The transcript traces the initial discussions of how the At Risk book was conceived and presents new dimensions and challenges within the field.

Originality/value

The interview highlights the importance of the need to document the transitions, developments and paradigm changes in the field over time.

Details

Disaster Prevention and Management: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0965-3562

Keywords

Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 12 April 2024

Syed Shah Shah Alam, Taslima Jannat, Chieh Yu Lin, Nor Asiah Omar and Yi Hui Ho

The purpose of this study is to examine the factors that affect managers’ ethical decision-making in export-oriented readymade garments in Bangladesh.

Abstract

Purpose

The purpose of this study is to examine the factors that affect managers’ ethical decision-making in export-oriented readymade garments in Bangladesh.

Design/methodology/approach

This is an empirical study based on the quantitative approach undertaking a cross-sectional survey method where a convenience sampling technique was applied. The analysis was done using partial least square structural equation model applying Smart-PLS version 3.0.

Findings

This study confirmed that all the components of cognitive appraisal processes, including perceived severity, perceived vulnerability, response efficacy and self-efficacy, have a significant influence on attitude. Attitude, in turn, mediates the relationship between these variables and the behavioural intention of ethical practice, except for perceived vulnerability. Besides, moral obligation is found to mediate the relationship between attitude, self-efficacy and the behavioural intention of ethical decision-making. The study also found that ethical climate and subjective norms have a direct influence on behavioural intention. Furthermore, behavioural intention, ethical climate and self-efficacy are positively related to actual decision-making behaviour. However, this study did not find any direct effect of subjective norms on moral obligation.

Practical implications

The organization should include an emphasis on building ethical culture and setting an ethical code of conduct within the organization to sustain ethical practice within employees. However, the practitioner should work on enhancing self-efficacy to curb unethical practices by individuals.

Originality/value

This research contributes to the management of garments manufacturers by a practical and theoretical understanding of what influences the ethical behavioural decision-making process. Valuable guidelines are provided on the ethical decision-making process in the garments manufacturing companies for future researchers.

Details

International Journal of Ethics and Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9369

Keywords

Article
Publication date: 5 April 2024

Lida Haghnegahdar, Sameehan S. Joshi, Rohith Yanambaka Venkata, Daniel A. Riley and Narendra B. Dahotre

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems…

19

Abstract

Purpose

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems. Manufacturing systems are increasingly faced with risk of attacks not only by traditional malicious actors such as hackers and cyber-criminals but also by some competitors and organizations engaged in corporate espionage. This paper aims to elaborate a plausible risk practice of designing and demonstrate a case study for the compromised-based malicious for polymer 3D printing system.

Design/methodology/approach

This study assumes conditions when a machine was compromised and evaluates the effect of post compromised attack by studying its effects on tensile dog bone specimens as the printed object. The designed algorithm removed predetermined specific number of layers from the tensile samples. The samples were visually identical in terms of external physical dimensions even after removal of the layers. Samples were examined nondestructively for density. Additionally, destructive uniaxial tensile tests were carried out on the modified samples and compared to the unmodified sample as a control for various mechanical properties. It is worth noting that the current approach was adapted for illustrating the impact of cyber altercations on properties of additively produced parts in a quantitative manner. It concurrently pointed towards the vulnerabilities of advanced manufacturing systems and a need for designing robust mitigation/defense mechanism against the cyber altercations.

Findings

Density, Young’s modulus and maximum strength steadily decreased with an increase in the number of missing layers, whereas a no clear trend was observed in the case of % elongation. Post tensile test observations of the sample cross-sections confirmed the successful removal of the layers from the samples by the designed method. As a result, the current work presented a cyber-attack model and its quantitative implications on the mechanical properties of 3D printed objects.

Originality/value

To the best of the authors’ knowledge, this is the original work from the team. It is currently not under consideration for publication in any other avenue. The paper provides quantitative approach of realizing impact of cyber intrusions on deteriorated performance of additively manufactured products. It also enlists important intrusion mechanisms relevant to additive manufacturing.

Details

Rapid Prototyping Journal, vol. 30 no. 4
Type: Research Article
ISSN: 1355-2546

Keywords

Article
Publication date: 25 April 2024

Jayme Stewart, Jessie Swanek and Adelle Forth

Despite representing a relatively small portion of the population, those who experience repeat victimization make up a significant share of all sexual and violent crimes, implying…

Abstract

Purpose

Despite representing a relatively small portion of the population, those who experience repeat victimization make up a significant share of all sexual and violent crimes, implying that perpetrators target them repeatedly. Indeed, research reveals specific traits (e.g. submissiveness) and behaviors (e.g. gait) related to past victimization or vulnerability. The purpose of this study is to explore the link between personality traits, self-assessed vulnerability and nonverbal cues.

Design/methodology/approach

In all, 40 undergraduate Canadian women were videotaped while recording a dating profile. Self-report measures of assertiveness, personality traits and vulnerability ratings for future sexual or violent victimization were obtained following the video-recording. The videotape was coded for nonverbal behaviors that have been related to assertiveness or submissiveness.

Findings

Self-perceived sexual vulnerability correlated with reduced assertiveness and dominance and increased emotionality (e.g. fear and anxiety). Additionally, nonverbal behaviors differed based on personality traits: self-touch was linked to lower assertiveness, dominance and extraversion and higher submissiveness, emotionality and warm-agreeableness.

Originality/value

To the best of the authors’ knowledge, this is the first study of its kind to consider the relationships between personality, self-perceived vulnerability and nonverbal behaviors among college-aged women. Potential implications, including enhancing autonomy and self-efficacy, are discussed.

Details

Journal of Criminal Psychology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2009-3829

Keywords

1 – 10 of 528