The purpose of this paper is to trace the changing pattern of identity politics in Hong Kong Special Administrative Region (HKSAR). It shows that in response to the massive urban…
Abstract
Purpose
The purpose of this paper is to trace the changing pattern of identity politics in Hong Kong Special Administrative Region (HKSAR). It shows that in response to the massive urban renewal projects in the 2000s, “civic localism” in the form of cultural preservation movement emerged to protect local community culture against the government-business hegemony. However, due to the deepening of social integration between Hong Kong and the mainland, a new “anti-mainland localism” emerged in the 2010s against the influx of mainlanders. In 2015–2016, as a result of Beijing’s active interference in Hong Kong affairs, localism is further transformed to Hong Kong “independence.”
Design/methodology/approach
This paper uses a historical methodology to trace the changing pattern of identity politics in Hong Kong after it becomes a special administrative region of China in 1997.
Findings
It shows how the interaction among the following three factors has shaped the pattern of localism in Hong Kong: macro historical-structural context, social movement dynamics and the response of Hong Kong and mainland government.
Practical implications
This paper argues that Beijing’s hardline policy toward Hong Kong localism may work in the short run to all push the pro-independence activities underground. However, unless the structural contradiction of the HKSAR is resolved, it seems likely that anti-mainland localism and Hong Kong independence sentiment and movement will come back with a vengeance at a later stage.
Originality/value
The literature tends to discuss Hong Kong localism in very general terms and fails to reveal its changing nature. This paper contributes by distinguishing three different forms of localism: civic localism in the mid-2000s, anti-mainland in the late 2000s and early 2010s, and independence after 2016. It shows how the macro historical-structural transformation, social movement dynamics and the responses of the Hong Kong SAR government and Beijing government have led to the changes of civic localism to anti-mainland localism, and finally to independence.
Details
Keywords
Caner Asbaş and Şule Tuzlukaya
A cyberattack is an attempt by cybercriminals as individuals or organizations with unauthorized access using one or more computers and computer systems to steal, expose, change…
Abstract
A cyberattack is an attempt by cybercriminals as individuals or organizations with unauthorized access using one or more computers and computer systems to steal, expose, change, disable or eliminate information, or to breach computer information systems, computer networks, and computer infrastructures. Cyberattackers gain a benefit from victims, which may be criminal such as stealing data or money, or political or personal such as revenge. In cyberattacks, various targets are possible. Some potential targets for businesses include business and customer financial data, customer lists, trade secrets, and login credentials.
Cyberattackers use a variety of methods to gain access to data, including malware such as viruses, worms, and spyware and phishing methods, man-in-the-middle attacks, denial-of-service attacks, SQL injection, zero-day exploit, and DNS tunneling.
Related to cyberattack, the term cyberwarfare is gaining popularity nowadays. Cyberwarfare is the use of cyberattacks by a state or an organization to cause harm as in warfare against another state's or organization's computer information systems, networks, and infrastructures.
Military, civil, and ideological motivations, or hacktivism can be used to launch a cyberwarfare. For these reasons, cyberwarfare may be used to conduct espionage, sabotage, propaganda, and economic disruption.
Considering highly digitalized business processes such as e-mails, digital banking, online conference, and digital manufacturing methods, damage of cyberwarfare to businesses and countries are unavoidable. As a result, developing strategies for defending against cyberattacks and cyberwarfare is critical for businesses. The concepts of cyberattack and cyberwarfare, as well as business strategies to be protected against them will be discussed in this chapter.
Details
Keywords
Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some…
Abstract
Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some legal aspects concerning MNEs, cyberspace and e‐commerce as the means of expression of the digital economy. The whole effort of the author is focused on the examination of various aspects of MNEs and their impact upon globalisation and vice versa and how and if we are moving towards a global digital economy.
Details
Keywords
Siu Chan and Ying Heidi
Despite the rich literature on the effects of parental mental health problems on child development, the needs of children of mentally ill parents have been overlooked in both…
Abstract
Despite the rich literature on the effects of parental mental health problems on child development, the needs of children of mentally ill parents have been overlooked in both research and services. This study investigated the needs of a neglected group, namely Chinese adolescent children of parents with schizophrenia, in order to gain insights into the design of programmes for these adolescents. In‐depth interviews were conducted individually with five Chinese adolescent girls whose mother or father was diagnosed with schizophrenia. Analysis of the interview data revealed four common themes: stigma and discrimination; mixed feelings of love and anger; the role of being a carer; and positive gains. The results shed light on the importance of taking cultural context into consideration when providing services for these children and further conducting research in this area. Although mental health problems are regarded as a taboo and associated with shame in Chinese culture, these children, out of a respect for their parents (‘filial piety’1), showed a strong sense of loyalty to their parents and suppressed their anger and sorrow for their parents' sake. Implications for social services for children whose parents have mental health problems and suggestions for future research are discussed.
Details
Keywords
Since the launch of the Mainland and Hong Kong Closer Economic Partnership Arrangement (CEPA) in 2003, Hong Kong cinema is believed to have confronted drastic changes. Hong Kong…
Abstract
Purpose
Since the launch of the Mainland and Hong Kong Closer Economic Partnership Arrangement (CEPA) in 2003, Hong Kong cinema is believed to have confronted drastic changes. Hong Kong cinema is described to be dying, lacking creative space and losing local distinctiveness. A decade later, the rise of Hong Kong – China coproduction cinema under CEPA has been normalized and changed the once pessimism in the industry. The purpose of this paper is to demonstrate how Hong Kong cinema adjusted its production and creation in the first 10 years of CEPA.
Design/methodology/approach
Beginning with a review of the overall development, three paradigmatic cases are examined for reflecting upon what the major industrial and commercial concerns on the Hong Kong – China coproduction model are, and how such a coproduction model is not developed as smooth as what the Hong Kong filmmakers expected.
Findings
Collectively, this paper singles out the difficulties in operation and the limit of transnationality that occur in the Chinese context for the development of Hong Kong cinema under the Hong Kong – China coproduction model.
Originality/value
This is the author’s research in his five-year study of Hong Kong cinema and it contributes a lot to the field of cinema studies with relevant industrial and policy concern.
Details
Keywords
The purpose of this paper is to classify and categorize the vulnerability types emerged with time as information technology (IT) systems evolved. This comparative study aims to…
Abstract
Purpose
The purpose of this paper is to classify and categorize the vulnerability types emerged with time as information technology (IT) systems evolved. This comparative study aims to compare the seriousness of the old well-known vulnerabilities that may still exist with lower possibility of happening with that of new technologies like cloud computing with Mobility access. Cloud computing is a new structure of IT that is becoming the main part of the new model of business environment. However, issues regarding such new hype of technology do not come without obstacles. These issues have to be addressed before full acceptability of cloud services in a globalized business environment. Businesses need to be aware of issues of concerns before joining the cloud services. This paper also highlights these issues and shows the comparison table to help businesses with appropriate decision-making when joining the cloud.
Design/methodology/approach
A historical review of emerged vulnerabilities as IT systems evolved was conducted, then these vulnerabilities were categorized into eight different categories, each of which composed of multiple vulnerability types. Simple scoring techniques were used to build a “risk” analysis table where each vulnerability type was given a score based on availability of matured solution and the likeliness of happening, then in case of vulnerability type, another score was used to derive the impact of such vulnerability. The resulted weighted score can be derived from the multiplication of likeliness to happen score with that of its impact in case it did happen. Percentage of seriousness represented by the percentage of the derived weighted score of each of the vulnerabilities can then be concluded. Similar table was developed for issues related to cloud computing environment in specific.
Findings
After surveying the historical background of IT systems and emerged vulnerabilities as well as reviewing the common malicious types of system vulnerabilities, this paper identifies 22 different types of vulnerability categorized in eight different categories. This comparative study explores amount of possible vulnerabilities in new technology like cloud computing services. Specific issues for cloud computing were also explored and a similar comparative study was developed on these issues. The result of the comparative study between all types of vulnerabilities since the start of IT system development till today’s technology of cloud computing, shows that the highest percentage vulnerability category was the one related to mobility access as mobile applications/systems are relatively newly emerged and do not have a matured security solution(s).
Practical implications
Learning from history, one can conclude the current risk factor in dealing with new technology like cloud computing. Businesses can realize that decision to join the cloud requires thinking about the issues mentioned in this paper and identifying the most vulnerability types to try to avoid them.
Originality/value
A new comparative study and new classification of vulnerabilities demonstrated with risk analysis using simple scoring technique.
Details
Keywords
Reports on a survey conducted to investigate acute respiratory infections (ARI) in children in developing countries, looking particularly at the Philippines. Explores the role of…
Abstract
Reports on a survey conducted to investigate acute respiratory infections (ARI) in children in developing countries, looking particularly at the Philippines. Explores the role of the National Committee for Acute Respiratory Infections and states its objectives and responsibilities. Asserts that state of health is associated with community structure, environmental factors, and social and psychological conditions. Finds also that maternal factors are important determinants in the incidence of ARI episodes, for example, the mother’s characteristics, level of health knowledge, her illness control activities, age, level of education, number of children, smoking behaviour, and the extent to which she has to fulfil other tasks. Explains the methodology used in the survey, the sampling procedure and research instruments used. Indicates that poor housing and living conditions should become the focal point of developmental efforts, and that better nipping in the bud health management should be encouraged through health education programmes.
Details
Keywords
Haixiao Dai, Phong Lam Nguyen and Cat Kutay
Digital learning systems are crucial for education and data collected can analyse students learning performances to improve support. The purpose of this study is to design and…
Abstract
Purpose
Digital learning systems are crucial for education and data collected can analyse students learning performances to improve support. The purpose of this study is to design and build an asynchronous hardware and software system that can store data on a local device until able to share. It was developed for staff and students at university who are using the limited internet access in areas such as remote Northern Territory. This system can asynchronously link the users’ devices and the central server at the university using unstable internet.
Design/methodology/approach
A Learning Box has been build based on minicomputer and a web learning management system (LMS). This study presents different options to create such a system and discusses various approaches for data syncing. The structure of the final setup is a Moodle (Modular Object Oriented Developmental Learning Environment) LMS on a Raspberry Pi which provides a Wi-Fi hotspot. The authors worked with lecturers from X University who work in remote Northern Territory regions to test this and provide feedback. This study also considered suitable data collection and techniques that can be used to analyse the available data to support learning analysis by the staff. This research focuses on building an asynchronous hardware and software system that can store data on a local device until able to share. It was developed for staff and students at university who are using the limited internet access in areas such as remote Northern Territory. This system can asynchronously link the users’ devices and the central server at the university using unstable internet. Digital learning systems are crucial for education, and data collected can analyse students learning performances to improve support.
Findings
The resultant system has been tested in various scenarios to ensure it is robust when students’ submissions are collected. Furthermore, issues around student familiarity and ability to use online systems have been considered due to early feedback.
Research limitations/implications
Monitoring asynchronous collaborative learning systems through analytics can assist students learning in their own time. Learning Hubs can be easily set up and maintained using micro-computers now easily available. A phone interface is sufficient for learning when video and audio submissions are supported in the LMS.
Practical implications
This study shows digital learning can be implemented in an offline environment by using a Raspberry Pi as LMS server. Offline collaborative learning in remote communities can be achieved by applying asynchronized data syncing techniques. Also asynchronized data syncing can be reliably achieved by using change logs and incremental syncing technique.
Social implications
Focus on audio and video submission allows engagement in higher education by students with lower literacy but higher practice skills. Curriculum that clearly supports the level of learning required for a job needs to be developed, and the assumption that literacy is part of the skilled job in the workplace needs to be removed.
Originality/value
To the best of the authors’ knowledge, this is the first remote asynchronous collaborative LMS environment that has been implemented. This provides the hardware and software for opportunities to share learning remotely. Material to support low literacy students is also included.
Details
Keywords
International population mobility has increased dramatically in the last ten years due to immigration policies, globalisation and skilled individual’s quest for better prospects…
Abstract
International population mobility has increased dramatically in the last ten years due to immigration policies, globalisation and skilled individual’s quest for better prospects. New Zealand has consciously invited migrants onto its shores and it is now a land of tremendous diversity. The basis for this paper is a qualitative study on first generation Indian immigrant women seeking employment in the host country New Zealand. The research examines in‐depth what it means to seek entry into the world of work as a migrant, from the perspective of legitimate peripheral participation in learning to function in the host country. The results suggest a many layered experience, and a complex terrain, with a landscape of initial hope, followed by feelings of being devalued, a downward spiral of weeping, regret letters and lowered self esteem. The paper sketches emergent cameos of these women and draws out some of the significant variables in their learning trajectories. In sights for creating conditions for legitimate peripheral participation are offered emphasising a worldview that embraces both the internal and external realities as stepping stones in the topography of work experiences for migrants in New Zealand.
Details
Keywords
Nader H. Shooshtari, Maureen J. Fleming, Jeffrey P. Radighieri and Carl‐Christian Nitzsche
Outlines the development of the Asia Pacific Economic Co‐operation Forum (APEC), which began as a deliberately informal discussion group in 1989, and traces the evolution of its…
Abstract
Outlines the development of the Asia Pacific Economic Co‐operation Forum (APEC), which began as a deliberately informal discussion group in 1989, and traces the evolution of its membership and organizational structure. Summarizes the research and planning work undertaken to date, pointing out that decisions are consensus‐based and not binding on members. Lists the issues identified as crucial to the Asian economic crisis by the 1998 APEC meeting and discusses its role in Asia and in the global economy. Admits that significant, tangible results have been few so far and considers the reasons why; but believes it has the potential to “establish itself as a viable force in dealing with the economic problems of its members”.