Search results

1 – 10 of 50
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 9 March 2015

B. S. Yilbas, I.-H. Toor, F. Patel, Y. Al-Shehri and M. A. Baig

The purpose of this paper is to investigate the corrosion resistance of high velocity oxy-fuel (HVOF)-sprayed Diamalloy 2002 coating on carbon steel. The coating microstructure is…

159

Abstract

Purpose

The purpose of this paper is to investigate the corrosion resistance of high velocity oxy-fuel (HVOF)-sprayed Diamalloy 2002 coating on carbon steel. The coating microstructure is examined in line with the corrosion resistance.

Design/methodology/approach

HVOF spraying of coating is achieved, and the coating response to electrolytic solution is measured experimentally in terms of corrosion resistance.

Findings

HVOF coating improves the corrosion resistance of the substrate such that the corrosion rate of the substrate is 7.1 mpy and the coating results in 4.5 mpy. However, presence of deep pit sites at the surface suggests the occurrence of preferential corrosion around the splat boundaries. In addition, closely spaced surface texture peaks act as crevice corrosion centers at the surface while initiating the formation of deep pit sites.

Research limitations/implications

This study is limited by experimental investigations. In future, it may be extended to include model studies.

Practical implications

The findings of this study are very useful for those working in the coating industry. However, HVOF coating is limited to high temperature protection in harsh environments.

Social implications

It is useful for the power industry, particularly for gas turbines.

Originality/value

It is an original work and describes the corrosion resistance of the coating surface. It is found that the coating improved the corrosion resistance of the steel surface.

Details

Industrial Lubrication and Tribology, vol. 67 no. 2
Type: Research Article
ISSN: 0036-8792

Keywords

Access Restricted. View access options
Book part
Publication date: 11 December 2023

Danah AlThukair and Julie Rattray

In Saudi Arabia, quality management receives a significant amount of attention in higher education. In medical education, specifically, Saudi colleges have been fully engaged with…

Abstract

In Saudi Arabia, quality management receives a significant amount of attention in higher education. In medical education, specifically, Saudi colleges have been fully engaged with quality assurance and accreditation since 1992, under the supervision of the Saudi Council for Health Specialties. Along with the quality standards determined by accreditation agencies, the perspective of employers on the quality of learning and teaching needs to be acknowledged. The needs of medical employers can be translated into quality standards for medical education to help overcome the perceived deficiencies which lead to poorly equipped graduates. This chapter explores how employers conceptualize quality in medical education with an emphasis on learning and teaching and employers’ perspectives on the quality attributes of medical graduates. This chapter is based on interviews with 14 medical employers in Saudi Arabia. From the employers’ perspective, a high-quality medical education is marked by high quality educational systems, curricula, faculty members, and medical training. Additionally, medical graduates must attain a balance of soft skills, practical and clinical skills, and theoretical medical knowledge. Understanding employers’ perspectives on quality in medical education will complement our existing understanding of quality in medical education.

Details

Quality Assurance in Higher Education in the Middle East: Practices and Perspectives
Type: Book
ISBN: 978-1-80262-556-1

Keywords

Access Restricted. View access options
Article
Publication date: 10 July 2017

Noluxolo Gcaza, Rossouw von Solms, Marthie M. Grobler and Joey Jansen van Vuuren

The purpose of this paper is to define and delineate cyber security culture. Cyber security has been a concern for many years. In an effort to mitigate the cyber security risks…

1697

Abstract

Purpose

The purpose of this paper is to define and delineate cyber security culture. Cyber security has been a concern for many years. In an effort to mitigate the cyber security risks, technology-centred measures were deemed to be the ultimate solution. Nowadays, however, it is accepted that the process of cyber security requires much more than mere technical controls. On the contrary, it now demands a human-centred approach, including a cyber security culture. Although the role of cultivating a culture in pursuing cyber security is well appreciated, research focusing intensely on cyber security culture is still in its infancy. Additionally, knowledge on the subject is not clearly bounded and defined.

Design/methodology/approach

General morphological analysis (GMA) is used to define, structure and analyse the cyber security environment culture.

Findings

This paper identifies the most important variables in cultivating a cyber security culture.

Research implications

The delineation of the national cyber security domain will contribute to the relatively new domain of cyber security culture. They contribute to the research community by means of promoting a shared and common understanding of terms. It is a step in the right direction towards eliminating the ambiguity of domain assumptions.

Practical implications

Practically, the study can assist developing nations in constructing strategies that addresses the key factors that need to be apparent in lieu to cultivating its envisaged national culture of cyber security. Additionally, the GMA will contribute to the development of solutions or means that do not overlook interrelations of such factors.

Originality/value

Delineating and defining the cyber security culture domain more precisely could greatly contribute to realizing the elements that collectively play a role in cultivating such a culture for a national perspective.

Details

Information & Computer Security, vol. 25 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Access Restricted. View access options
Article
Publication date: 17 October 2022

Wael Hassan El-Garaihy, Tamer Farag, Khalid Al Shehri, Piera Centobelli and Roberto Cerchione

Nowadays, a prominent research area is the development of competitive advantages in companies, due to their environmental commitment and orientation. Based on resource-based view…

1112

Abstract

Purpose

Nowadays, a prominent research area is the development of competitive advantages in companies, due to their environmental commitment and orientation. Based on resource-based view (RBV) and institutional theory (InT), this paper aims to investigate the influence of internal and external orientation on businesses' sustainable performance while considering the effect of sustainable supply chain management (SSCM) practices.

Design/methodology/approach

Data from 351 manufacturing companies in the Kingdom of Saudi Arabia have been collected and analysed through structural equation modelling (SEM) using the partial least squares (PLS) method.

Findings

The results indicated that both internal and external environmental orientation have important effects on SSCM practices, which in turn have a considerable beneficial effect on environmental, social and economic performance.

Originality/value

Although SSCM is constantly gaining ground in the literature, most SSCM research and models examine its effects, antecedents or motivation, mainly adopting a qualitative approach. Research on the topic adopting a large-scale empirical approach is still limited. In this context, this study contributes to the SSCM management literature by exploring the role of environmental orientation in facilitating the adoption of SSCM practices and improving companies' performance.

Access Restricted. View access options
Article
Publication date: 20 April 2012

Wahyudin P. Syam, Huda A. Al‐Shehri, A.M. Al‐Ahmari, Khalid A. Al‐Wazzan and M.A. Mannan

The purpose of this paper is to investigate the potential application of electron beam melting, as a layered manufacturing process, to fabricate dental coping of metal‐ceramic…

2950

Abstract

Purpose

The purpose of this paper is to investigate the potential application of electron beam melting, as a layered manufacturing process, to fabricate dental coping of metal‐ceramic crown restoration using Ti6Al4V powder.

Design/methodology/approach

This experiment was conducted in two steps: shrinkage study to determine scale up factor for shrinkage compensation and parameter selection study, based on thickness, hardness, and surface roughness, to select process parameter of electron beam melting.

Findings

A promising result of fabricating metal coping of Ti6Al4V via electron beam melting was shown. Ti6Al4V coping was successfully fabricated, with an average thickness of 0.52 mm required for dental coping. Total average hardness of 333.35 HV that is comparable to casted Ti6Al4V with considerably high roughness of RSm of 382 μm.

Originality/value

The paper presents a novel application of electron beam melting to fabricate metal coping for metal‐ceramic crown restoration.

Details

Rapid Prototyping Journal, vol. 18 no. 3
Type: Research Article
ISSN: 1355-2546

Keywords

Access Restricted. View access options
Article
Publication date: 12 July 2023

Zhifeng Lin, Wei Zhang, Jiawei Li, Jing Yang, Bing Han and Peng Xie

As a common form of failure in industry, corrosion causes huge economic losses. At present, with the development of computational techniques, artificial intelligence (AI) is…

363

Abstract

Purpose

As a common form of failure in industry, corrosion causes huge economic losses. At present, with the development of computational techniques, artificial intelligence (AI) is playing a more and more important role in the field of scientific research. This paper aims to review the application of AI in corrosion protection research.

Design/methodology/approach

In this paper, the role of AI in corrosion protection is systematically described in terms of anticorrosion materials and methods, corrosion image recognition and corrosion life prediction.

Findings

With efficient and in-depth data processing methods, AI can rapidly advance the research process in terms of anticorrosion materials and methods, corrosion image recognition and corrosion life prediction and save on costs.

Originality/value

This paper summarizes the application of AI in corrosion protection research and provides the basis for corrosion engineers to quickly and comprehensively understand the role of AI and improve production processes.

Details

Anti-Corrosion Methods and Materials, vol. 70 no. 5
Type: Research Article
ISSN: 0003-5599

Keywords

Access Restricted. View access options
Book part
Publication date: 2 December 2024

Jasmine Mariappan, Supriya Lamba Sahdev, Chitra Krishnan, Firdous Ahmad Malik and Astha Gupta

This chapter introduces the era of Artificial Intelligence (AI) and the Metaverse, delving into their integration and profound impact on community, creativity, collaboration, and…

Abstract

This chapter introduces the era of Artificial Intelligence (AI) and the Metaverse, delving into their integration and profound impact on community, creativity, collaboration, and societal change. It begins by exploring the emergence of the Metaverse and its fusion with AI technologies, highlighting how AI ensures consistency in depicting virtual worlds with diverse laws of physics and economies, thereby enhancing their realism and dynamism through advanced world-building techniques. The chapter further examines AI’s role in artistic creation, emphasizing its contributions to art, music, and storytelling across different levels. It also explores collaborative intelligence, focusing on human-AI partnerships in crafting virtual environments and developing virtual collaborators or creative assistants. Additionally, it discusses the democratization of creativity and innovation within the AI-metaverse ecosystem, emphasizing participatory storytelling and community engagement modules. Ethical and societal considerations such as algorithm bias and digital property rights are carefully addressed throughout the discussion. The chapter concludes by summarizing the opportunities and imperatives in AI-Metaverse collaboration, highlighting achievements and insights that promote openness, accountability, and inclusivity. In conclusion, this chapter underscores ongoing technological advancements in AI and the Metaverse, poised to revolutionize human interaction, creativity, and self-expression. It advocates for responsible and pragmatic development to achieve positive outcomes for all stakeholders.

Details

The Metaverse Dilemma: Challenges and Opportunities for Business and Society
Type: Book
ISBN: 978-1-83797-525-9

Keywords

Access Restricted. View access options
Article
Publication date: 15 February 2011

Vishanth Weerakkody, Ramzi El‐Haddadeh and Shafi Al‐Shafi

The purpose of this paper is to explore empirically the complexities of e‐government implementation and diffusion from a developing country perspective.

3463

Abstract

Purpose

The purpose of this paper is to explore empirically the complexities of e‐government implementation and diffusion from a developing country perspective.

Design/methodology/approach

An empirical case study using an interview‐based research agenda is adopted. After reviewing the extant literature on e‐government, the paper first proposes a conceptual model, which is consequently used to explore empirically, within the State of Qatar, the key challenges influencing e‐government implementation and diffusion from organisational, technological, social and political perspectives.

Findings

The conceptual model proposed in this study offers a comprehensive overview of the implementation and diffusion challenges of e‐government through identifying various factors associated with organisational, technological, social and political perspectives from the literature. Through adopting an empirical research strategy focusing on developing countries that are not in an advanced state of e‐government development, this study offers a holistic view in understanding e‐government implementation and diffusion complexities for the benefit of similar countries.

Research limitations/implications

This research only focuses on exploring empirically the implementation and diffusion challenges facing e‐government in one developing country and does not investigate how these challenges may influence citizens' adoption of these services in that country or in a wider context.

Practical implications

The conceptual model in this study offers practitioners, policy makers and researchers a comprehensive overview of the implementation and diffusion challenges of e‐government projects, particularly in developing countries. The key findings of this study show that, irrespective of strong financial support and resources, governments must be prepared to tackle a number of challenges related to the complexity of e‐government implementation and diffusion. In addition, the study indicates that better alignment of national ICT strategies with various local level e‐government projects, clear legislation, implementation guidelines and standards are imperative for e‐government success.

Originality/value

The core contribution of this research adds to the growing body of knowledge concerning the implementation and diffusion of e‐government in developing countries. In particular, the conceptual model formulated through the synthesis of extant literature offers researchers and practitioners a lens to better appreciate the key challenges that require consideration when implementing and diffusing e‐government.

Details

Journal of Enterprise Information Management, vol. 24 no. 2
Type: Research Article
ISSN: 1741-0398

Keywords

Access Restricted. View access options
Book part
Publication date: 14 July 2006

Nafeez Mosaddeq Ahmed

Al-Qaeda is conventionally portrayed as a monolithic, hierarchical organization whose activities – coordinated by the network's leader Osama bin Laden – are the source of…

Abstract

Al-Qaeda is conventionally portrayed as a monolithic, hierarchical organization whose activities – coordinated by the network's leader Osama bin Laden – are the source of international terrorism today. Al-Qaeda is considered a radical tendency within the broader Islamist Salafi movement, legitimizing its terrorist operations as a global Islamist jihad against Western civilization. Al-Qaeda's terrorist activity today is considered, “blowback” from long finished CIA and western covert operations in Afghanistan.

The conventional wisdom is demonstrably false. After the Cold War, Western connections with al-Qaeda proliferated around the world, challenging mainstream conceptions of al-Qaeda's identity. Western covert operations and military – intelligence connections in strategic regions show that “al-Qaeda” is a network whose raison d’etre and modus operandi are inextricably embedded in a disturbing conglomerate of international Western diplomatic, financial, military and intelligence policies today. US, British, and Western power routinely manipulates al-Qaeda through a complex network of state-regional and human nodes. Such manipulation extended directly to the 9-11 hijackers, and thus to the events of 9-11 itself.11This paper advances an original argument based partially on research in Ahmed (2005), supplemented here with significant new data and analysis. Also see Ahmed (2002).

Details

The Hidden History of 9-11-2001
Type: Book
ISBN: 978-1-84950-408-9

Access Restricted. View access options
Article
Publication date: 23 March 2010

Faris Al‐Sobhi, Vishanth Weerakkody and Muhammad Mustafa Kamal

The purpose of this paper is to investigate the role of the intermediary in delivering public services from government departments to different stakeholders (business and…

1341

Abstract

Purpose

The purpose of this paper is to investigate the role of the intermediary in delivering public services from government departments to different stakeholders (business and citizens) and to highlight the challenges that face the development of e‐government services in the context of Madinah City, in Saudi Arabia.

Design/methodology/approach

The paper uses a broad literature review to identify significant factors that contribute to e‐government adoption and diffusion success. These factors are then used as a basis for analyzing the findings from a case study that focuses on the concept of intermediaries for e‐government service delivery in Saudi Arabia. To investigate a less‐recognized phenomenon, such as the use of intermediaries in e‐government contexts, the authors adopt a qualitative case study approach to gain further understating. This method allowed examining the phenomenon in its natural settings through employing multiple methods of data collection. Further, it gave the researchers enough room to get a closer look at the reasons behind introducing the intermediary concept in the e‐government context and provided considerable flexibility during interviews and observations.

Findings

The results of this paper indicate that digital divide and poor infrastructure to conduct payments (secure transactions) for e‐government services was hindering citizens' adoption of e‐services in Saudi Arabia. Thus, the intermediary concept was facilitating citizens' access to e‐government services and helping to reduce the digital divide in Saudi Arabia. The findings also show that intermediaries helped in increasing the availability of e‐government services. Additionally, this paper finds that trust between the service provider (government) and service requester (citizens and businesses) is an important factor that influences not only e‐government adoption and diffusion, but also the role of electronic intermediary (e‐offices) in facilitating this adoption.

Originality/value

The authors take into account the most salient adoption factors when introducing e‐government systems. Electronic intermediaries may help to enhance the understating and analysis of those adoption factors in government settings and facilitate government departments in realizing the importance of intermediaries' role in e‐government contexts. Furthermore, this paper significantly contributes to the knowledge and practice of e‐government adoption and diffusion and provides sufficient support to decision makers in expediting e‐government adoption and diffusion.

Details

Transforming Government: People, Process and Policy, vol. 4 no. 1
Type: Research Article
ISSN: 1750-6166

Keywords

1 – 10 of 50
Per page
102050