Search results
1 – 10 of 846Gobi K., Kannapiran B., Devaraj D. and Valarmathi K.
The conventional strain gauge type pressure sensor suffers in static testing of engines due to the contact transduction method. This paper aims to focus on the concept of…
Abstract
Purpose
The conventional strain gauge type pressure sensor suffers in static testing of engines due to the contact transduction method. This paper aims to focus on the concept of non-contact transduction-based pressure sensor using eddy current displacement sensing coil (ECDS) to overcome the temperature limitations of the strain gauge type pressure sensor. This paper includes the fabrication of prototypes of the proposed pressure sensor and its performance evaluation by static calibration. The fabricated pressure sensor is proposed to measure pressure in static test environment for a short period in the order of few seconds. The limitations of the fabricated pressure sensor related to temperature problems are highlighted and the suitable design changes are recommended to aid the future design.
Design/methodology/approach
The design of ECDS-based pressure sensor is aimed to provide non-contact transduction to overcome the limitations of the strain gauge type of pressure sensor. The ECDS is designed and fabricated with two configurations to measure deflection of the diaphragm corresponding to the applied pressure. The fabricated ECDS is calibrated using a standard micro meter to ensure transduction within limits. The fabricated prototypes of pressure sensors are calibrated using dead weight tester, and the calibration results are analyzed to select the best configuration. The proposed pressure sensor is tested at different temperatures, and the test results are analyzed to provide recommendations to overcome the shortcomings.
Findings
The performance of the different configurations of the pressure sensor using ECDS is evaluated using the calibration data. The analysis of the calibration results indicates that the pressure sensor using ECDS (coil-B) with the diaphragm as target is the best configuration. The accuracy of the fabricated pressure sensor with best configuration is ±2.8 per cent and the full scale (FS) output is 3.8 KHz. The designed non-contact transduction method extends the operating temperature of the pressure sensor up to 150°C with the specified accuracy for the short period.
Originality/value
Most studies of eddy current sensing coil focus on the displacement and position measurement but not on the pressure measurement. This paper is concerned with the design of the pressure sensor using ECDS to realize the non-contact transduction to overcome the limitations of strain gauge type pressure sensors and evaluation of the fabricated prototypes. It is shown that the accuracy of the proposed pressure sensor is not affected by the high temperature for the short period due to non-contact transduction using ECDS.
Details
Keywords
Nancy K. Lankton, Charles Stivason and Anil Gurung
Organizational insiders play a critical role in protecting sensitive information. Prior research finds that moral beliefs influence compliance decisions. Yet, it is less clear…
Abstract
Purpose
Organizational insiders play a critical role in protecting sensitive information. Prior research finds that moral beliefs influence compliance decisions. Yet, it is less clear what factors influence moral beliefs and the conditions under which those factors have stronger/weaker effects. Using an ethical decision-making model and value congruence theory, this study aims to investigate how moral intensity and organizational criticality influence moral beliefs and intentions to perform information protection behaviors.
Design/methodology/approach
The hypotheses were tested using a scenario-based survey of 216 organizational insiders. Two of the scenarios depict low criticality information security protection behaviors and two depict high criticality behaviors.
Findings
A major finding is that users rely more on perceived social consensus and magnitude of consequences when organizational criticality is low and on temporal immediacy and proximity when criticality is high. In addition, the moral intensity dimensions explain more variance in moral beliefs when organizational criticality is low.
Research limitations/implications
The study is limited by its sample, which is organizational insiders at a mid-size university. It is also limited in that it only examined four of the six moral intensity dimensions.
Practical implications
The findings can guide management about which moral intensity dimensions are more important to focus on when remediating tone at the top and other leadership weaknesses relating to information security.
Originality/value
This study adds value by investigating the separate dimensions of moral intensity on information protection behaviors. It also is the first to examine moral intensity under conditions of low and high organizational criticality.
Details
Keywords
K. Gobi, B. Kannapiran, D. Devaraj and K. Valarmathi
In Aerospace applications, the inlet tubes are used to mount strain gauge type pressure sensors on the engine under static test to measure engine chamber pressure. This paper aims…
Abstract
Purpose
In Aerospace applications, the inlet tubes are used to mount strain gauge type pressure sensors on the engine under static test to measure engine chamber pressure. This paper aims to focus on the limitations of the inlet tube and its design aspects to serve better in the static test environment. The different sizes of the inlet tubes are designed to meet the static test and safety requirements. This paper presents the performance evaluation of the designed inlet tubes with calibration results and the selection criteria of the inlet tube to measure combustion chamber pressure with the specified accuracy during static testing of engines.
Design/methodology/approach
Two sensors, specifically, one cavity type pressure sensor with the inlet tube of range 0-6.89 MPa having natural frequency of the diaphragm 17 KHz and another flush diaphragm type pressure sensor of the same range having −3 dB frequency response, 5 KHz are mounted on the same pressure port of the engine under static test to study the shortcomings of the inlet tube. The limitations of the inlet tube have been analyzed to aid the tube design. The different sizes of inlet tubes are designed, fabricated and tested to study the effect of the inlet tube on the performance of the pressure sensor. The dynamic calibration is used for this purpose. The dynamic parameters of the sensor with the designed tubes are calculated and analyzed to meet the static test requirements. The diaphragm temperature test is conducted on the representative hardware of pressure sensor with and without inlet tube to analyze the effect of the inlet tube against the temperature error. The inlet tube design is validated through the static test to gain confidence on measurement.
Findings
The cavity type pressure sensor failed to capture the pressure peak, whereas the flush diaphragm type pressure sensor captured the pressure peak of the engine under a static test. From the static test data and dynamic calibration results, the bandwidth of cavity type sensor with tube is much lower than the required bandwidth (five times the bandwidth of the measurand), and hence, the cavity type sensor did not capture the pressure peak data. The dynamic calibration results of the pressure sensor with and without an inlet tube show that the reduction of the bandwidth of the pressure sensor is mainly due to the inlet tube. From the analysis of dynamic calibration results of the sensor with the designed inlet tubes of different sizes, it is shown that the bandwidth of the pressure sensor decreases as the tube length increases. The bandwidth of the pressure sensor with tube increases as the tube inner diameter increases. The tube with a larger diameter leads to a mounting problem. The inlet tube of dimensions 6 × 4 × 50 mm is selected as it helps to overcome the mounting problem with the required bandwidth. From the static test data acquired using the pressure sensor with the selected inlet tube, it is shown that the selected tube aids the sensor to measure the pressure peak accurately. The designed inlet tube limits the diaphragm temperature within the compensated temperature of the sensor for 5.2 s from the firing of the engine.
Originality/value
Most studies of pressure sensor focus on the design of a sensor to measure static and slow varying pressure, but not on the transient pressure measurement and the design of the inlet tube. This paper presents the limitations of the inlet tube against the bandwidth requirement and recommends dynamic calibration of the sensor to evaluate the bandwidth of the sensor with the inlet tube. In this paper, the design aspects of the inlet tube and its effect on the bandwidth of the pressure sensor and the temperature error of the measured pressure values are presented with experimental results. The calibration results of the inlet tubes with different configurations are analyzed to select the best geometry of the tube and the selected tube is validated in the static test environment.
Details
Keywords
Chenhui Liu, Huigang Liang, Nengmin Wang and Yajiong Xue
Employees’ information security policy (ISP) compliance exerts a significant strain on information security management. Drawing upon the compliance theory and control theory, this…
Abstract
Purpose
Employees’ information security policy (ISP) compliance exerts a significant strain on information security management. Drawing upon the compliance theory and control theory, this study attempts to examine the moderating roles of organizational commitment and gender in the relationships between reward/punishment expectancy and employees' ISP compliance.
Design/methodology/approach
Using survey data collected from 310 employees in Chinese organizations that have formally adopted information security policies, the authors applied the partial least square method to test hypotheses.
Findings
Punishment expectancy positively affects ISP compliance, but reward expectancy has no significant impact on ISP compliance. Compared with committed employees, both reward expectancy and punishment expectancy have stronger impacts on low-commitment employees' ISP compliance. As for gender differences, punishment expectancy exerts a stronger effect on females' ISP compliance than it does on males.
Originality/value
By investigating the moderating roles of organizational commitment and gender, this paper offers a deeper understanding of reward and punishment in the context of ISP compliance. The findings reveal that efforts in building organizational commitment will reduce the reliance on reward and punishment, and further controls rather than the carrot and stick should be applied to ensure male employees' ISP compliance.
Details
Keywords
Bowen Guan and Carol Hsu
The purpose of this paper is to investigate the association between abusive supervision and employees' information security policy (ISP) noncompliance intention, building on…
Abstract
Purpose
The purpose of this paper is to investigate the association between abusive supervision and employees' information security policy (ISP) noncompliance intention, building on affective commitment, normative commitment and continuance commitment. The study also examines the moderating effect of perceived certainty and severity of sanctions on the relationship between the three dimensions of organizational commitment and ISP noncompliance intention.
Design/methodology/approach
Survey methodology was used for data collection through a well-designed online questionnaire. Data was analyzed using the structural equation model with Amos v. 22.0 software.
Findings
This study demonstrates that abusive supervision has a significant, negative impact on affective, normative and continuance commitment, and the three dimensions of organizational commitment are negatively associated with employees' ISP noncompliance intention. Results also indicate that the moderating effect of perceived severity of sanctions is significant, and perceived certainty of sanctions plays a positive moderating role in the relationship between affective commitment and employees' ISP noncompliance intention.
Practical implications
Findings of this research are beneficial for organizational management in the relationships between supervisors and employees. These results provide significant evidence that avoiding abusive supervision is important in controlling employees' ISP noncompliance behavior.
Originality/value
This research fills an important gap in examining employees' ISP noncompliance intentions from the perspective of abusive supervision and the impact of affective, normative and continuance commitment on ISP noncompliance. The study is also of great value for information systems research to examine the moderating role of perceived certainty and severity of sanctions.
Details
Keywords
Zhengchuan Xu and Ken Guo
Human factor is often cited as one of the biggest challenges for organizational information security management. The purpose of this paper is to investigate how and why employees…
Abstract
Purpose
Human factor is often cited as one of the biggest challenges for organizational information security management. The purpose of this paper is to investigate how and why employees fail to carry out required security tasks.
Design/methodology/approach
On the basis of coping theory, this paper develops a theoretical model to examine employee effortful security behavior (ESB). The model is tested with the data collected through a survey of computer users.
Findings
The results suggest that employee procrastination of security tasks and psychological detachment from security issues are two antecedents of ESB. Psychological detachment and procrastination are in turn influenced by perceived externalities of security risk and triage of business tasks over security issues by employees.
Originality/value
This paper contributes to the information systems security literature by providing a nuanced understanding of the antecedents and process of how employees cope with security task demands. It also offers some insights for practitioners in terms of the importance of designing and implementing security measures that are viewed as relevant to employees.
Details
Keywords
Jeffrey D. Wall and Prashant Palvia
The authors seek to understand the formation of control- and security-related identities among organizational employees through and interpretive narrative analysis. The authors…
Abstract
Purpose
The authors seek to understand the formation of control- and security-related identities among organizational employees through and interpretive narrative analysis. The authors also seek to identify how the identities form over time and across contexts. Several identities are identified as well as the changes that may occur in the identities.
Design/methodology/approach
Few interpretive or critical studies exist in behavioral information security research to represent employee perspectives of power and control. Using qualitative interviews and narrative analysis of the interview transcripts, this paper analyzes the security- and control-related identities and values that employees adopt in organizational settings.
Findings
Two major categories of behavioral security compliance identities were identified: compliant and noncompliant. Specific identities within the compliant category included: faithful follower vs the reasoned follower, and other-preserving versus the self-preserving identities. The noncompliant category included: anti-authority identity, utilitarian identity, trusting identity and unaware identity. Furthermore, three patterns of identity changes were observed.
Research limitations/implications
The authors’ narrative stories suggest that employee identities are complex and multi-faceted, and that they may be fluid and adaptive to situational factors. Future research should avoid assumptions that all employees are the same or that employee beliefs remain constant over time or in different contexts. Identities are also strongly rooted in individuals' rearing and other life experiences. Thus, security control is far broader than is studied in behavioral studies. The authors find that history matters and should be examined carefully.
Practical implications
The authors’ study provides insights that managers can use to enhance security initiatives. It is clear that different employees build different control-related identities. Managers must understand that their employees are unique and will not all respond to policies, punishments, and other forms of control in the same way. The narratives also suggest that many organizations lack appropriate programs to enhance employees' awareness of security issues.
Originality/value
The authors’ narrative analysis suggests that employee security identities are complex and multi-faceted, and that they are fluid and adaptive to situational factors. Research should avoid assumptions that all employees are the same or that their beliefs remain constant over time or in different contexts. Identities are also strongly rooted in individuals' rearing and other life experiences. Their history matters and should be examined carefully.
Details
Keywords
Tim Jacks, Prashant Palvia, Richard Schilhavy and Lei Wang
Despite the constant stream of research investigating information technology (IT) business value, IT capabilities, and competitive advantage, researchers are calling for a more…
Abstract
Purpose
Despite the constant stream of research investigating information technology (IT) business value, IT capabilities, and competitive advantage, researchers are calling for a more coherent understanding of the firm‐level impacts of IT, and how those firm‐level impacts can be measured. The purpose of this study is to investigate the multitude of organization‐level studies of the impact of IT.
Design/methodology/approach
Meta‐analysis of IS literature from 2001‐2009.
Findings
The findings are synthesized into an overarching framework of the impact of IT at the organization level. The framework categorizes measures of the impact of IT into productivity, profitability, and intangible benefits, while the antecedents of IT impact are categorized into IT resources, IT capabilities, IT/business alignment and external factors.
Originality/value
The research framework proposed provides a comprehensive snapshot of IS studies on organizational performance.
Details
Keywords
Sreedivya Kondattu Mony, Aruna Jeyanthy Peter and Devaraj Durairaj
The extensive increase in power demand has challenged the ability of power systems to deal with small-signal oscillations such as inter-area oscillations, which occur under unseen…
Abstract
Purpose
The extensive increase in power demand has challenged the ability of power systems to deal with small-signal oscillations such as inter-area oscillations, which occur under unseen operating conditions. A wide-area measurement system with a phasor measurement unit (PMU) in the power network enhances the observability of the power grid under a wide range of operating conditions. This paper aims to propose a wide-area power system stabilizer (WAPSS) based on Gaussian quantum particle swarm optimization (GQPSO) using the wide-area signals from a PMU to handle the inter-area oscillations in the system with a higher degree of controllability.
Design/methodology/approach
In the design of the wide-area stabilizer, a dead band is introduced to mitigate the influence of ambient signal frequency fluctuations. The location and the input signal of the wide-area stabilizer are selected using the participation factor and controllability index calculations. An improved particle swarm optimization (PSO) technique, namely, GQPSO, is used to optimize the variables of the WAPSS to move the unstable inter-area modes to a stable region in the s-plane, thereby improving the overall system stability.
Findings
The proposed GQPSO-based WAPSS is compared with the PSO-based WAPSS, genetic algorithm-based WAPSS and power system stabilizer. Eigenvalue analysis, time-domain simulation responses and performance index analysis are used to assess performance. The various evaluation techniques show that GQPSO WAPSS has a consistently good performance, with a higher damping ratio, faster convergence with fewer oscillations and a minimum error in the performance index analysis, indicating a more stable system with effective oscillation damping.
Originality/value
This paper proposes an optimally tuned design for the WAPSS with a wide-area input along with a dead-band structure for damping the inter-area oscillations. Tie line power is used as the input to the WAPSS and optimal tuning of the WAPSS is performed using an improved PSO algorithm, known as Gaussian quantum PSO.
Details
Keywords
Yu Wang, Tie-nan Wang and Xin Li
R&D indicates absorptive capacity, which may affect IT payoff. The purpose of this paper is to examine how R&D investment affects the relation between IT investment and firm…
Abstract
Purpose
R&D indicates absorptive capacity, which may affect IT payoff. The purpose of this paper is to examine how R&D investment affects the relation between IT investment and firm performance and under what circumstances R&D intensity is more beneficial to IT returns. Such study has been lacking in R&D research and IT payoff literature.
Design/methodology/approach
A conceptual model for linking IT investment, R&D investment, environmental dynamism and firm performance was developed and tested by data collected from Chinese listed firms from 2007 to 2013, using fixed effects regression model.
Findings
The results show positive moderating effects of firm R&D investment and government R&D subsidies on the relation between IT investment and firm performance. Furthermore, the impact of firm R&D investment on IT payoff is stronger for firms in more dynamic environments. The findings suggest that R&D investment creates additional business value through interactions with IT, and complementarities between R&D and IT, as manifested in their interaction effect on firm performance vary across industry sectors.
Research limitations/implications
This paper indicates the importance of complementarities between R&D and IT, which should prove helpful to researchers and practitioners engaged in Chinese business.
Originality/value
This paper presents one of the first attempts at examining the moderating effect of R&D investment on the relation between IT investment and firm performance. Especially this study helps to understand under what circumstances R&D investment is more or less likely to be beneficial to IT returns.
Details