B. S. Yilbas, I.-H. Toor, F. Patel, Y. Al-Shehri and M. A. Baig
The purpose of this paper is to investigate the corrosion resistance of high velocity oxy-fuel (HVOF)-sprayed Diamalloy 2002 coating on carbon steel. The coating microstructure is…
Abstract
Purpose
The purpose of this paper is to investigate the corrosion resistance of high velocity oxy-fuel (HVOF)-sprayed Diamalloy 2002 coating on carbon steel. The coating microstructure is examined in line with the corrosion resistance.
Design/methodology/approach
HVOF spraying of coating is achieved, and the coating response to electrolytic solution is measured experimentally in terms of corrosion resistance.
Findings
HVOF coating improves the corrosion resistance of the substrate such that the corrosion rate of the substrate is 7.1 mpy and the coating results in 4.5 mpy. However, presence of deep pit sites at the surface suggests the occurrence of preferential corrosion around the splat boundaries. In addition, closely spaced surface texture peaks act as crevice corrosion centers at the surface while initiating the formation of deep pit sites.
Research limitations/implications
This study is limited by experimental investigations. In future, it may be extended to include model studies.
Practical implications
The findings of this study are very useful for those working in the coating industry. However, HVOF coating is limited to high temperature protection in harsh environments.
Social implications
It is useful for the power industry, particularly for gas turbines.
Originality/value
It is an original work and describes the corrosion resistance of the coating surface. It is found that the coating improved the corrosion resistance of the steel surface.
Details
Keywords
Danah AlThukair and Julie Rattray
In Saudi Arabia, quality management receives a significant amount of attention in higher education. In medical education, specifically, Saudi colleges have been fully engaged with…
Abstract
In Saudi Arabia, quality management receives a significant amount of attention in higher education. In medical education, specifically, Saudi colleges have been fully engaged with quality assurance and accreditation since 1992, under the supervision of the Saudi Council for Health Specialties. Along with the quality standards determined by accreditation agencies, the perspective of employers on the quality of learning and teaching needs to be acknowledged. The needs of medical employers can be translated into quality standards for medical education to help overcome the perceived deficiencies which lead to poorly equipped graduates. This chapter explores how employers conceptualize quality in medical education with an emphasis on learning and teaching and employers’ perspectives on the quality attributes of medical graduates. This chapter is based on interviews with 14 medical employers in Saudi Arabia. From the employers’ perspective, a high-quality medical education is marked by high quality educational systems, curricula, faculty members, and medical training. Additionally, medical graduates must attain a balance of soft skills, practical and clinical skills, and theoretical medical knowledge. Understanding employers’ perspectives on quality in medical education will complement our existing understanding of quality in medical education.
Details
Keywords
Noluxolo Gcaza, Rossouw von Solms, Marthie M. Grobler and Joey Jansen van Vuuren
The purpose of this paper is to define and delineate cyber security culture. Cyber security has been a concern for many years. In an effort to mitigate the cyber security risks…
Abstract
Purpose
The purpose of this paper is to define and delineate cyber security culture. Cyber security has been a concern for many years. In an effort to mitigate the cyber security risks, technology-centred measures were deemed to be the ultimate solution. Nowadays, however, it is accepted that the process of cyber security requires much more than mere technical controls. On the contrary, it now demands a human-centred approach, including a cyber security culture. Although the role of cultivating a culture in pursuing cyber security is well appreciated, research focusing intensely on cyber security culture is still in its infancy. Additionally, knowledge on the subject is not clearly bounded and defined.
Design/methodology/approach
General morphological analysis (GMA) is used to define, structure and analyse the cyber security environment culture.
Findings
This paper identifies the most important variables in cultivating a cyber security culture.
Research implications
The delineation of the national cyber security domain will contribute to the relatively new domain of cyber security culture. They contribute to the research community by means of promoting a shared and common understanding of terms. It is a step in the right direction towards eliminating the ambiguity of domain assumptions.
Practical implications
Practically, the study can assist developing nations in constructing strategies that addresses the key factors that need to be apparent in lieu to cultivating its envisaged national culture of cyber security. Additionally, the GMA will contribute to the development of solutions or means that do not overlook interrelations of such factors.
Originality/value
Delineating and defining the cyber security culture domain more precisely could greatly contribute to realizing the elements that collectively play a role in cultivating such a culture for a national perspective.
Details
Keywords
Wael Hassan El-Garaihy, Tamer Farag, Khalid Al Shehri, Piera Centobelli and Roberto Cerchione
Nowadays, a prominent research area is the development of competitive advantages in companies, due to their environmental commitment and orientation. Based on resource-based view…
Abstract
Purpose
Nowadays, a prominent research area is the development of competitive advantages in companies, due to their environmental commitment and orientation. Based on resource-based view (RBV) and institutional theory (InT), this paper aims to investigate the influence of internal and external orientation on businesses' sustainable performance while considering the effect of sustainable supply chain management (SSCM) practices.
Design/methodology/approach
Data from 351 manufacturing companies in the Kingdom of Saudi Arabia have been collected and analysed through structural equation modelling (SEM) using the partial least squares (PLS) method.
Findings
The results indicated that both internal and external environmental orientation have important effects on SSCM practices, which in turn have a considerable beneficial effect on environmental, social and economic performance.
Originality/value
Although SSCM is constantly gaining ground in the literature, most SSCM research and models examine its effects, antecedents or motivation, mainly adopting a qualitative approach. Research on the topic adopting a large-scale empirical approach is still limited. In this context, this study contributes to the SSCM management literature by exploring the role of environmental orientation in facilitating the adoption of SSCM practices and improving companies' performance.
Details
Keywords
Wahyudin P. Syam, Huda A. Al‐Shehri, A.M. Al‐Ahmari, Khalid A. Al‐Wazzan and M.A. Mannan
The purpose of this paper is to investigate the potential application of electron beam melting, as a layered manufacturing process, to fabricate dental coping of metal‐ceramic…
Abstract
Purpose
The purpose of this paper is to investigate the potential application of electron beam melting, as a layered manufacturing process, to fabricate dental coping of metal‐ceramic crown restoration using Ti6Al4V powder.
Design/methodology/approach
This experiment was conducted in two steps: shrinkage study to determine scale up factor for shrinkage compensation and parameter selection study, based on thickness, hardness, and surface roughness, to select process parameter of electron beam melting.
Findings
A promising result of fabricating metal coping of Ti6Al4V via electron beam melting was shown. Ti6Al4V coping was successfully fabricated, with an average thickness of 0.52 mm required for dental coping. Total average hardness of 333.35 HV that is comparable to casted Ti6Al4V with considerably high roughness of RSm of 382 μm.
Originality/value
The paper presents a novel application of electron beam melting to fabricate metal coping for metal‐ceramic crown restoration.
Details
Keywords
Abstract
Purpose
As a common form of failure in industry, corrosion causes huge economic losses. At present, with the development of computational techniques, artificial intelligence (AI) is playing a more and more important role in the field of scientific research. This paper aims to review the application of AI in corrosion protection research.
Design/methodology/approach
In this paper, the role of AI in corrosion protection is systematically described in terms of anticorrosion materials and methods, corrosion image recognition and corrosion life prediction.
Findings
With efficient and in-depth data processing methods, AI can rapidly advance the research process in terms of anticorrosion materials and methods, corrosion image recognition and corrosion life prediction and save on costs.
Originality/value
This paper summarizes the application of AI in corrosion protection research and provides the basis for corrosion engineers to quickly and comprehensively understand the role of AI and improve production processes.
Details
Keywords
Jasmine Mariappan, Supriya Lamba Sahdev, Chitra Krishnan, Firdous Ahmad Malik and Astha Gupta
This chapter introduces the era of Artificial Intelligence (AI) and the Metaverse, delving into their integration and profound impact on community, creativity, collaboration, and…
Abstract
This chapter introduces the era of Artificial Intelligence (AI) and the Metaverse, delving into their integration and profound impact on community, creativity, collaboration, and societal change. It begins by exploring the emergence of the Metaverse and its fusion with AI technologies, highlighting how AI ensures consistency in depicting virtual worlds with diverse laws of physics and economies, thereby enhancing their realism and dynamism through advanced world-building techniques. The chapter further examines AI’s role in artistic creation, emphasizing its contributions to art, music, and storytelling across different levels. It also explores collaborative intelligence, focusing on human-AI partnerships in crafting virtual environments and developing virtual collaborators or creative assistants. Additionally, it discusses the democratization of creativity and innovation within the AI-metaverse ecosystem, emphasizing participatory storytelling and community engagement modules. Ethical and societal considerations such as algorithm bias and digital property rights are carefully addressed throughout the discussion. The chapter concludes by summarizing the opportunities and imperatives in AI-Metaverse collaboration, highlighting achievements and insights that promote openness, accountability, and inclusivity. In conclusion, this chapter underscores ongoing technological advancements in AI and the Metaverse, poised to revolutionize human interaction, creativity, and self-expression. It advocates for responsible and pragmatic development to achieve positive outcomes for all stakeholders.
Details
Keywords
Vishanth Weerakkody, Ramzi El‐Haddadeh and Shafi Al‐Shafi
The purpose of this paper is to explore empirically the complexities of e‐government implementation and diffusion from a developing country perspective.
Abstract
Purpose
The purpose of this paper is to explore empirically the complexities of e‐government implementation and diffusion from a developing country perspective.
Design/methodology/approach
An empirical case study using an interview‐based research agenda is adopted. After reviewing the extant literature on e‐government, the paper first proposes a conceptual model, which is consequently used to explore empirically, within the State of Qatar, the key challenges influencing e‐government implementation and diffusion from organisational, technological, social and political perspectives.
Findings
The conceptual model proposed in this study offers a comprehensive overview of the implementation and diffusion challenges of e‐government through identifying various factors associated with organisational, technological, social and political perspectives from the literature. Through adopting an empirical research strategy focusing on developing countries that are not in an advanced state of e‐government development, this study offers a holistic view in understanding e‐government implementation and diffusion complexities for the benefit of similar countries.
Research limitations/implications
This research only focuses on exploring empirically the implementation and diffusion challenges facing e‐government in one developing country and does not investigate how these challenges may influence citizens' adoption of these services in that country or in a wider context.
Practical implications
The conceptual model in this study offers practitioners, policy makers and researchers a comprehensive overview of the implementation and diffusion challenges of e‐government projects, particularly in developing countries. The key findings of this study show that, irrespective of strong financial support and resources, governments must be prepared to tackle a number of challenges related to the complexity of e‐government implementation and diffusion. In addition, the study indicates that better alignment of national ICT strategies with various local level e‐government projects, clear legislation, implementation guidelines and standards are imperative for e‐government success.
Originality/value
The core contribution of this research adds to the growing body of knowledge concerning the implementation and diffusion of e‐government in developing countries. In particular, the conceptual model formulated through the synthesis of extant literature offers researchers and practitioners a lens to better appreciate the key challenges that require consideration when implementing and diffusing e‐government.
Details
Keywords
Al-Qaeda is conventionally portrayed as a monolithic, hierarchical organization whose activities – coordinated by the network's leader Osama bin Laden – are the source of…
Abstract
Al-Qaeda is conventionally portrayed as a monolithic, hierarchical organization whose activities – coordinated by the network's leader Osama bin Laden – are the source of international terrorism today. Al-Qaeda is considered a radical tendency within the broader Islamist Salafi movement, legitimizing its terrorist operations as a global Islamist jihad against Western civilization. Al-Qaeda's terrorist activity today is considered, “blowback” from long finished CIA and western covert operations in Afghanistan.
The conventional wisdom is demonstrably false. After the Cold War, Western connections with al-Qaeda proliferated around the world, challenging mainstream conceptions of al-Qaeda's identity. Western covert operations and military – intelligence connections in strategic regions show that “al-Qaeda” is a network whose raison d’etre and modus operandi are inextricably embedded in a disturbing conglomerate of international Western diplomatic, financial, military and intelligence policies today. US, British, and Western power routinely manipulates al-Qaeda through a complex network of state-regional and human nodes. Such manipulation extended directly to the 9-11 hijackers, and thus to the events of 9-11 itself.11This paper advances an original argument based partially on research in Ahmed (2005), supplemented here with significant new data and analysis. Also see Ahmed (2002).
Faris Al‐Sobhi, Vishanth Weerakkody and Muhammad Mustafa Kamal
The purpose of this paper is to investigate the role of the intermediary in delivering public services from government departments to different stakeholders (business and…
Abstract
Purpose
The purpose of this paper is to investigate the role of the intermediary in delivering public services from government departments to different stakeholders (business and citizens) and to highlight the challenges that face the development of e‐government services in the context of Madinah City, in Saudi Arabia.
Design/methodology/approach
The paper uses a broad literature review to identify significant factors that contribute to e‐government adoption and diffusion success. These factors are then used as a basis for analyzing the findings from a case study that focuses on the concept of intermediaries for e‐government service delivery in Saudi Arabia. To investigate a less‐recognized phenomenon, such as the use of intermediaries in e‐government contexts, the authors adopt a qualitative case study approach to gain further understating. This method allowed examining the phenomenon in its natural settings through employing multiple methods of data collection. Further, it gave the researchers enough room to get a closer look at the reasons behind introducing the intermediary concept in the e‐government context and provided considerable flexibility during interviews and observations.
Findings
The results of this paper indicate that digital divide and poor infrastructure to conduct payments (secure transactions) for e‐government services was hindering citizens' adoption of e‐services in Saudi Arabia. Thus, the intermediary concept was facilitating citizens' access to e‐government services and helping to reduce the digital divide in Saudi Arabia. The findings also show that intermediaries helped in increasing the availability of e‐government services. Additionally, this paper finds that trust between the service provider (government) and service requester (citizens and businesses) is an important factor that influences not only e‐government adoption and diffusion, but also the role of electronic intermediary (e‐offices) in facilitating this adoption.
Originality/value
The authors take into account the most salient adoption factors when introducing e‐government systems. Electronic intermediaries may help to enhance the understating and analysis of those adoption factors in government settings and facilitate government departments in realizing the importance of intermediaries' role in e‐government contexts. Furthermore, this paper significantly contributes to the knowledge and practice of e‐government adoption and diffusion and provides sufficient support to decision makers in expediting e‐government adoption and diffusion.