Search results

1 – 10 of over 1000
Article
Publication date: 9 October 2023

Yong Sun, Ya-Feng Zhang, Yalin Wang and Sihui Zhang

This paper aims to investigate the cooperative governance mechanisms for personal information security, which can help enrich digital governance research and provide a reference…

Abstract

Purpose

This paper aims to investigate the cooperative governance mechanisms for personal information security, which can help enrich digital governance research and provide a reference for the formulation of protection policies for personal information security.

Design/methodology/approach

This paper constructs an evolutionary game model consisting of regulators, digital enterprises and consumers, which is combined with the simulation method to examine the influence of different factors on personal information protection and governance.

Findings

The results reveal seven stable equilibrium strategies for personal information security within the cooperative governance game system. The non-compliant processing of personal information by digital enterprises can damage the rights and interests of consumers. However, the combination of regulatory measures implemented by supervisory authorities and the rights protection measures enacted by consumers can effectively promote the self-regulation of digital enterprises. The reputation mechanism exerts a restricting effect on the opportunistic behaviour of the participants.

Research limitations/implications

The authors focus on the regulation of digital enterprises and do not consider the involvement of malicious actors such as hackers, and the authors will continue to focus on the game when assessing the governance of malicious actors in subsequent research.

Practical implications

This study's results enhance digital governance research and offer a reference for developing policies that protect personal information security.

Originality/value

This paper builds an analytical framework for cooperative governance for personal information security, which helps to understand the decision-making behaviour and motivation of different subjects and to better address issues in the governance for personal information security.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Open Access
Article
Publication date: 28 February 2017

Tai-Yong Roh, Sun-Joong Yoon and Sung Won Seo

We examine whether the suitability principles hold for the mutual fund industry in Korea, by analyzing the dynamics and the characteristics of the multi-class fund flows. For…

18

Abstract

We examine whether the suitability principles hold for the mutual fund industry in Korea, by analyzing the dynamics and the characteristics of the multi-class fund flows. For 12-years from 2002 to 2013, the volatility of fund flows associated with A-class fund, which is more appropriate for long-term investments, is larger than that associated with C-class fund. Therefore, it can be interpreted that the suitability principles do not hold. To examine the empirical observation, we mainly focus on the role of the dollar cost averaging (DCA) style funds. We show that if we adjust for the effect of DCA funds, the suitability principles does not hold only before the 2008 financial crisis. Thus, we argue that individuals' irrational decision making is caused by heavy investments on A-class fund through DCA style types before the financial crisis. This leads to the observed violation of the suitability principles before the crisis. Our findings also suggest that after the financial crisis, the mutual fund industry in Korea becomes mature.

Details

Journal of Derivatives and Quantitative Studies, vol. 25 no. 1
Type: Research Article
ISSN: 2713-6647

Keywords

Article
Publication date: 18 April 2016

Fusong Yuan, Peijun lv, Pengfei Wang, Yuguang Wang, Yong Wang and Yuchun Sun

The use of removable complete dentures is a selectable restorative procedure for edentulous patients. To improve the fabrication quality and efficiency of removable complete…

Abstract

Purpose

The use of removable complete dentures is a selectable restorative procedure for edentulous patients. To improve the fabrication quality and efficiency of removable complete dentures, this paper aims to introduce a new method to fabricate customized wax complete dentures with additive manufacturing. This process uses complementary digital technologies, and allows faster and better manufacture of complete dentures.

Design/methodology/approach

In the study, a dental scanner was used to obtain surface data from edentulous casts and rims made by the dentist. A parameterized three-dimensional graphic database of artificial teeth was pre-established. Specialized computer-aided design software was used to set up the artificial dentition and design the esthetic gingiva and base plate. A selective laser sintering machine was used to transfer the data from stereolithography files into a wax base plate with location holes for each artificial tooth.

Findings

Under this method, a set of wax base plates with 28 location holes available for the placement of the artificial teeth were designed and fabricated within 6 h. The try-in wax dentures fitted the patient’s mouth well, besides occlusion relationships. Then, the occlusion relationships can be adjusted manually to achieve a balanced centric occlusion.

Originality/value

This method can be used to design and fabricate wax try-in removable complete dentures semi-automatically and rapidly; however, the algorithm for the occlusion contact design needs to be improved.

Details

Rapid Prototyping Journal, vol. 22 no. 3
Type: Research Article
ISSN: 1355-2546

Keywords

Article
Publication date: 13 March 2009

M. Tawfik Mady

The purpose of this exploratory study is to survey quality management practices in two industrial sectors in the state of Kuwait. It aims to provide reliable and valid constructs…

4363

Abstract

Purpose

The purpose of this exploratory study is to survey quality management practices in two industrial sectors in the state of Kuwait. It aims to provide reliable and valid constructs for measuring quality management practices and to test the effect of type of industry and plant size on the implementation level.

Design/methodology/approach

A questionnaire was administered, with the help of the Kuwaiti Public Authority for Industry (PAFI), to a stratified sample of 105 Kuwaiti plants. Confirmatory factor analysis and internal consistency tests were used to verify scales validity and reliability. The two independent samples t‐test and analysis of variance (ANOVA) were utilised to investigate the statistical effects of type of industry and plant size respectively.

Findings

The results revealed four reliable and valid constructs: customer focus, total quality management (TQM) human practices, process quality resource, and quality measurements. While type of industry showed no significant effect on the level of implementation of the four quality management constructs, plant size was a determinant factor of the implementation of customer focus and process quality practices.

Originality/value

The study is the first quality management survey in Kuwait. No valid or reliable TQM scales were developed before in such rigorous methodology. The study contributes to the unresolved issue of the size effect, especially when considering plant rather than company size. The need for governmental support, especially for small plants, in quality management implementation was reinforced.

Details

International Journal of Quality & Reliability Management, vol. 26 no. 3
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 5 June 2007

Yong Sun, Lin Ma and Joseph Mathew

The purpose of this article is to present a new split system model (SSM) that predicts the reliability of complex systems with multiple preventive maintenance (PM) actions in the…

1113

Abstract

Purpose

The purpose of this article is to present a new split system model (SSM) that predicts the reliability of complex systems with multiple preventive maintenance (PM) actions in the long term.

Design/methodology/approach

The SSM was developed using probability theory based on the concept of separating repaired and unrepaired components within a system virtually when modelling the reliability of the system after repairs. After theoretical analysis, a case study and Monte Carlo simulation were used to evaluate the effectiveness of the newly developed model.

Findings

The model can be used to determine the remaining life of systems, to show the changes in reliability with PM actions, and to quantify PM intervals after imperfect repairs.

Practical implications

SSM can be used to predict the reliability of complex systems with multiple PM actions, and hence can be used to support asset PM decision making over the whole life of the asset, such as scheduled PM times and spare parts requirements. An asset often has some vulnerable components, i.e. where the lives of these components are much shorter than the rest of the asset. In this case, PM is often conducted on these vulnerable components for maximising the useful life of the asset. The specific formulae derived in this paper can be used to predict the reliability of the asset for this scenario.

Originality/value

The proposed model uses a new concept of split systems to predict the changes of reliability of complex systems with multiple PM actions. Asset managers will find this model to be a useful tool in the optimisation of their asset PM strategies.

Details

Journal of Quality in Maintenance Engineering, vol. 13 no. 2
Type: Research Article
ISSN: 1355-2511

Keywords

Article
Publication date: 4 April 2008

Miyuki Imada, Masakatsu Ohta, Masayasu Yamaguchi and Sun Yong Kim

The paper's aim is to present a novel anonymity quantification method, LooM (loosely managed privacy protection method) for achieving privacy protection in pervasive computing…

Abstract

Purpose

The paper's aim is to present a novel anonymity quantification method, LooM (loosely managed privacy protection method) for achieving privacy protection in pervasive computing environments.

Design/methodology/approach

The main feature is that the method quantitatively controls anonymity by a single value (disclosure threshold value) using a classification algorithm of the decision tree. The value is not affected by the set size of users or the distribution of users' private information. The effectiveness of this method is confirmed by simulation using sample databases of attribute‐value pairs. Proposes a model of privacy information disclosure that achieves a balance between users' privacy protection requirements and service providers' disclosure requirements and applies web questionnaire survey data to this model.

Findings

LooM can be applicable to a variety of pervasive computing and communication services handling a huge amount of data containing privacy information.

Originality/value

The paper proposes a model of privacy information disclosure that achieves a balance between users' privacy protection requirements and service providers' disclosure requirements.

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 May 2002

Kwong‐Sak Leung, Jian‐Yong Sun and Zong‐Ben Xu

In this paper, a set of safe adaptive genetic algorithms (sGAs) is proposed based on the Splicing/Decomposable encoding scheme and the efficient speed‐up strategies developed by…

Abstract

In this paper, a set of safe adaptive genetic algorithms (sGAs) is proposed based on the Splicing/Decomposable encoding scheme and the efficient speed‐up strategies developed by Xu et al.. The proposed algorithms implement the self‐adaptation of the problem representation, selection and recombination operators at the levels of population, individual and component which commendably balance the conflicts between “reliability” and “efficiency”, as well as “exploitation” and “exploration” existed in the evolutionary algorithms. It is shown that the algorithms converge to the optimum solution in probability one. The proposed sGAs are experimentally compared with the classical genetic algorithm (CGA), non‐uniform genetic algorithm (nGA) proposed by Michalewicz, forking genetic algorithm (FGA) proposed by Tsutsui et al. and the classical evolution programming (CEP). The experiments indicate that the new algorithms perform much more efficiently than CGA and FGA do, comparable with the real‐coded GAs — nGA and CEP. All the algorithms are further evaluated through an application to a difficult real‐life application problem: the inverse problem of fractal encoding related to fractal image compression technique. The results for the sGA is better than those of CGA and FGA, and has the same, sometimes better performance compared to those of nGA and CEP.

Details

Engineering Computations, vol. 19 no. 3
Type: Research Article
ISSN: 0264-4401

Keywords

Article
Publication date: 1 April 1990

Guido Belforte

This review discusses various means of locomotion developed in a number of countries and concludes with the description of a mobile robot developed at the Technical University of…

Abstract

This review discusses various means of locomotion developed in a number of countries and concludes with the description of a mobile robot developed at the Technical University of Torino in Italy.

Details

Industrial Robot: An International Journal, vol. 17 no. 4
Type: Research Article
ISSN: 0143-991X

Content available
Article
Publication date: 6 February 2017

Mohan Kumaraswamy

461

Abstract

Details

Built Environment Project and Asset Management, vol. 7 no. 1
Type: Research Article
ISSN: 2044-124X

Book part
Publication date: 10 November 2016

Eunha Koh

Although Korean sociology of sport is relatively unknown to the international community of scholars, it is a mature field in Korea. Sociology of sport was first introduced in…

Abstract

Although Korean sociology of sport is relatively unknown to the international community of scholars, it is a mature field in Korea. Sociology of sport was first introduced in Korea in the mid-1960s when the field first evolved in North America and Europe. However, the development of the field shows different aspects from its Western counterpart due to unique cultural and environmental factors both in academia and in society. There are three major research trends that form Korean sociology of sport. First, there is the research focus on the benefit of sport and physical activity by examining empirical data using quantitative methodologies. The second group of researchers pays attention to individual experience in diverse sport fields and utilize qualitative methodologies to investigate empirical or secondary data. The third and most recent trend is a critical approach that theoretically analyzes ideologies, power relations, and identity politics in sport and society. When looking at the future, there are problems and limitations within the field in Korea. These include lack of continuity in terms of conference sub-themes, over-production of doctoral degree graduates, conservatism rooted in the field, and a danger of regarding sport policy research as an exit for sport sociologists. However, there are also possibilities and reasons for optimism. The biggest possibility for Korean sociology of sport is globalization of the field. Another significant possibility is the need for sport sociologists in planning, developing, and evaluating sport policy. Finally, diversification of the field gives ample opportunities for future research.

Details

Sociology of Sport: A Global Subdiscipline in Review
Type: Book
ISBN: 978-1-78635-050-3

Keywords

1 – 10 of over 1000