Search results

1 – 10 of over 16000
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Book part
Publication date: 31 October 2017

Daniel T. L. Shek, Po Chung, Li Lin, Hildie Leung and Eddie Ng

Abstract

Details

Global and Culturally Diverse Leaders and Leadership
Type: Book
ISBN: 978-1-78743-495-0

Access Restricted. View access options
Article
Publication date: 1 January 1990

J.H. Lau, S.J. Erasmus and D.W. Rice

A review of state‐of‐the‐art technology pertinent to tape automated bonding (for fine pitch, high I/O, high performance, high yield, high volume and high reliability) is…

239

Abstract

A review of state‐of‐the‐art technology pertinent to tape automated bonding (for fine pitch, high I/O, high performance, high yield, high volume and high reliability) is presented. Emphasis is placed on a new understanding of the key elements (for example, tapes, bumps, inner lead bonding, testing and burn‐in on tape‐with‐chip, encapsulation, outer lead bonding, thermal management, reliability and rework) of this rapidly moving technology.

Details

Circuit World, vol. 16 no. 2
Type: Research Article
ISSN: 0305-6120

Available. Open Access. Open Access
Article
Publication date: 15 January 2016

Daniel T.L. Shek and Li Lin

This study examined the effectiveness of a 4.5-day service leadership program for students from Chinese universities using objective outcome evaluation. The participants were…

77

Abstract

This study examined the effectiveness of a 4.5-day service leadership program for students from Chinese universities using objective outcome evaluation. The participants were assessed before and after the program, with two post-test measurements (immediate assessment and assessment 12 days after the completion of class learning). At pretest and two posttest time points, the participants completed a questionnaire measuring positive youth development, service leadership qualities and beliefs, and life satisfaction. Results showed that students’ performance in both the immediate posttest and follow-up test was better than that in the pretest. Despite the limitations of the one-group pretest-posttest design, results suggest that the curricular-based service leadership program was effective to promote students’ positive youth development, service leadership qualities and beliefs, as well as life satisfaction, and the effectiveness maintained a short period after the class had ended. While the existing findings are promising, these findings should be replicated in the future.

Details

Journal of Leadership Education, vol. 15 no. 1
Type: Research Article
ISSN: 1552-9045

Available. Content available
Book part
Publication date: 27 January 2022

Abstract

Details

Women and the Abuse of Power
Type: Book
ISBN: 978-1-80043-335-9

Available. Open Access. Open Access
Book part
Publication date: 4 June 2021

Laura Vitis

Technology-facilitated violence against women (TFVW) is readily becoming a key site of analysis for feminist criminologists. The scholarship in this area has identified online…

Abstract

Technology-facilitated violence against women (TFVW) is readily becoming a key site of analysis for feminist criminologists. The scholarship in this area has identified online sexual harassment, contact-based harassment, image-based abuse, and gender-based cyberhate – among others – as key manifestations of TFVW. It has also unpacked the legal strategies available to women seeking formal justice outcomes. However, much of the existing empirical scholarship has been produced within countries like the United States, United Kingdom, and Australia, and there has been limited research on this phenomenon within South East Asia. As such, this chapter maps how technology is shaping Singaporean women's experiences of gendered, sexual, and domestic violence. To do so, it draws upon findings from a research project which examined TFVW in Singapore by utilizing semistructured interviews with frontline workers in the fields of domestic and sexual violence and LGBT services. Drawing from Dragiewicz et al.’s (2018) work on technology-facilitated coercive control (TFCC), I argue that victims-survivors of dating, domestic, and family violence need to be provided with support that is TFCC informed and technically guided. I also suggest that further research is needed to fully understand the prevalence and nature of TFVW in the Singaporean context.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Access Restricted. View access options
Article
Publication date: 1 December 1997

Y.H. Yoo, D.Y. Yang and D.T. Chung

Describes simulations of impact forging processes. Uses the explicit time integration finite element method, which is based on direct time integration of equation of motion, to…

489

Abstract

Describes simulations of impact forging processes. Uses the explicit time integration finite element method, which is based on direct time integration of equation of motion, to compute the deformation of the workpiece and the dies. Uses the program developed to simulate the copper blow test performed on a 350,000J counter‐blow hammer. The calculated result reveals a good agreement in the final deformed configurations between the experiment and the explicit simulation. In order to compare this with the explicit method, the implicit time integration rigid‐plastic finite element program considering the inertia effect is also applied to the copper blow test simulation. As a result of the copper blow test simulation using the explicit program and the implicit program, finds that the calculated results have good agreements in available plastic deformation energy, forging load and equivalent plastic strain distribution. Finally, applies the developed program to simulations of multi‐blow forging processes. Presents three major findings from the multi‐blow forging simulations: (1) the continuous analysis technique used for the multi‐blow forging simulations works well; (2) the blow efficiency and the forging load generated by blow operations can be analysed efficiently and simulated results coincide with previous experimental and analytical ones; (3) the geometrical configuration of the workpiece is closely related to blow efficiency.

Details

Engineering Computations, vol. 14 no. 8
Type: Research Article
ISSN: 0264-4401

Keywords

Access Restricted. View access options
Book part
Publication date: 6 December 2024

Muhammad Haseeb Shakil, Junaid Khalil, Ali Sajjad, Muhammad Mukarram and Qasim Ali Nisar

Purpose: This chapter aims to review and brief the role of Strategic Corporate Social Responsibility (SCSR) in the tourism industry, targeting its impact on the performance and…

Abstract

Purpose: This chapter aims to review and brief the role of Strategic Corporate Social Responsibility (SCSR) in the tourism industry, targeting its impact on the performance and sustainability of the tourism industry. This chapter seeks to provide insights into how SCSR can lead to a positive transformation and competitive advantage.

Methodology: The chapter incorporates a brief literature review to examine current trends, hurdles, and benchmarking in the implementation of SCSR in the tourism industry. Comparative analysis and recent literature are used to extract valuable results and implications for effective tourism management.

Research limitations: The current chapter has limited potential biases in the selection of literature and the evolving nature of CSR in the tourism sector. Future research is required to check the developments in tourism and CSR.

Results: This chapter shed light on the complex association between the performance of CSR and business in the tourism industry, highlighting the importance of governance qualities and new initiatives for achieving financial sustainability.

Originality/value: This chapter adds valuable insights to the existing literature by shedding light on the most recent literature on SCSR in the tourism industry and provides inputs for setups looking for sustainability.

Details

Corporate Social Responsibility, Corporate Governance and Business Ethics in Tourism Management: A Business Strategy for Sustainable Organizational Performance
Type: Book
ISBN: 978-1-83608-705-2

Keywords

Access Restricted. View access options
Article
Publication date: 17 April 2019

Hu Xiao, Rongxin Cui and Demin Xu

This paper aims to present a distributed Bayesian approach with connectivity maintenance to manage a multi-agent network search for a target on a two-dimensional plane.

477

Abstract

Purpose

This paper aims to present a distributed Bayesian approach with connectivity maintenance to manage a multi-agent network search for a target on a two-dimensional plane.

Design/methodology/approach

The Bayesian framework is used to compute the local probability density functions (PDFs) of the target and obtain the global PDF with the consensus algorithm. An inverse power iteration algorithm is introduced to estimate the algebraic connectivity λ2 of the network. Based on the estimated λ2, the authors design a potential field for the connectivity maintenance. Then, based on the detection probability function, the authors design a potential field for the search target. The authors combine the two potential fields and design a distributed gradient-based control for the agents.

Findings

The inverse power iteration algorithm can distributed estimate the algebraic connectivity by the agents. The agents can efficient search the target with connectivity maintenance with the designed distributed gradient-based search algorithm.

Originality/value

Previous study has paid little attention to the multi-agent search problem with connectivity maintenance. Our algorithm guarantees that the strongly connected graph of the multi-agent communication topology is always established while performing the distributed target search problem.

Details

Assembly Automation, vol. 40 no. 1
Type: Research Article
ISSN: 0144-5154

Keywords

Available. Open Access. Open Access
Book part
Publication date: 4 June 2021

Yee Man Louie

The rapid advancement of technology poses many social challenges including the emerging issue of technology-facilitated abuse (TFA) and violence. In Australia, women from…

Abstract

The rapid advancement of technology poses many social challenges including the emerging issue of technology-facilitated abuse (TFA) and violence. In Australia, women from culturally and linguistically diverse (CALD) backgrounds are found to be more vulnerable to domestic violence (DV) and abuse, including TFA. This chapter presents a snapshot of CALD women's technology-facilitated domestic abuse (TFDA) experiences in Melbourne through the eyes of a small group of DV practitioners. Findings show CALD women experience TFA similar to that of the mainstream, with tracking and monitoring through the use of smartphone and social media most common. Their migration and financial status, and language and digital literacy can increase their vulnerability to TFDA, making their experience more complicated. Appropriate digital services and resources together with face-to-face support services can be a way forward. Further research should focus on better understanding CALD women's perceptions of and responses to TFDA and explore ways to improve engagement with and use of community media channels/platforms.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Available. Open Access. Open Access
Book part
Publication date: 4 June 2021

Bridget Harris and Delanie Woodlock

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical…

Abstract

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical framework for technology-facilitated harms in heterosexual relationships which we characterize as digital coercive control. Here, we include behaviors which can be classified as abuse and stalking and also individualized tactics which are less easy to categorize, but evoke fear and restrict the freedoms of a particular woman. Drawing on their knowledge of a victim/survivor's experiences and, in the context of patterns and dynamics of abuse, digital coercive control strategies are personalized by perpetrators and extend and exacerbate “real-world” violence.

Digital coercive control is unique because of its spacelessness and the ease, speed, and identity-shielding which technology affords. Victim/survivors describe how perpetrator use of technology creates a sense of omnipresence and omnipotence which can deter women from exiting violent relationships and weakens the (already tenuous) notion that abuse can be “escaped.” We contend that the ways that digital coercive control shifts temporal and geographic boundaries warrant attention. However, spatiality more broadly cannot be overlooked. The place and shape in which victim/survivors and perpetrators reside will shape both experiences of and response to violence. In this chapter, we explore these ideas, reporting on findings from a study on digital coercive control in regional, rural, and remote Australia. We adopt a feminist research methodology in regard to our ethos, research processes, analysis, and the outputs and outcomes of our project. Women's voices are foreground in this approach and the emphasis is on how research can be used to inform, guide, and develop responses to domestic violence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

1 – 10 of over 16000
Per page
102050