Search results
1 – 10 of over 1000Yong Sun, Ya-Feng Zhang, Yalin Wang and Sihui Zhang
This paper aims to investigate the cooperative governance mechanisms for personal information security, which can help enrich digital governance research and provide a reference…
Abstract
Purpose
This paper aims to investigate the cooperative governance mechanisms for personal information security, which can help enrich digital governance research and provide a reference for the formulation of protection policies for personal information security.
Design/methodology/approach
This paper constructs an evolutionary game model consisting of regulators, digital enterprises and consumers, which is combined with the simulation method to examine the influence of different factors on personal information protection and governance.
Findings
The results reveal seven stable equilibrium strategies for personal information security within the cooperative governance game system. The non-compliant processing of personal information by digital enterprises can damage the rights and interests of consumers. However, the combination of regulatory measures implemented by supervisory authorities and the rights protection measures enacted by consumers can effectively promote the self-regulation of digital enterprises. The reputation mechanism exerts a restricting effect on the opportunistic behaviour of the participants.
Research limitations/implications
The authors focus on the regulation of digital enterprises and do not consider the involvement of malicious actors such as hackers, and the authors will continue to focus on the game when assessing the governance of malicious actors in subsequent research.
Practical implications
This study's results enhance digital governance research and offer a reference for developing policies that protect personal information security.
Originality/value
This paper builds an analytical framework for cooperative governance for personal information security, which helps to understand the decision-making behaviour and motivation of different subjects and to better address issues in the governance for personal information security.
Details
Keywords
Tai-Yong Roh, Sun-Joong Yoon and Sung Won Seo
We examine whether the suitability principles hold for the mutual fund industry in Korea, by analyzing the dynamics and the characteristics of the multi-class fund flows. For…
Abstract
We examine whether the suitability principles hold for the mutual fund industry in Korea, by analyzing the dynamics and the characteristics of the multi-class fund flows. For 12-years from 2002 to 2013, the volatility of fund flows associated with A-class fund, which is more appropriate for long-term investments, is larger than that associated with C-class fund. Therefore, it can be interpreted that the suitability principles do not hold. To examine the empirical observation, we mainly focus on the role of the dollar cost averaging (DCA) style funds. We show that if we adjust for the effect of DCA funds, the suitability principles does not hold only before the 2008 financial crisis. Thus, we argue that individuals' irrational decision making is caused by heavy investments on A-class fund through DCA style types before the financial crisis. This leads to the observed violation of the suitability principles before the crisis. Our findings also suggest that after the financial crisis, the mutual fund industry in Korea becomes mature.
Details
Keywords
Fusong Yuan, Peijun lv, Pengfei Wang, Yuguang Wang, Yong Wang and Yuchun Sun
The use of removable complete dentures is a selectable restorative procedure for edentulous patients. To improve the fabrication quality and efficiency of removable complete…
Abstract
Purpose
The use of removable complete dentures is a selectable restorative procedure for edentulous patients. To improve the fabrication quality and efficiency of removable complete dentures, this paper aims to introduce a new method to fabricate customized wax complete dentures with additive manufacturing. This process uses complementary digital technologies, and allows faster and better manufacture of complete dentures.
Design/methodology/approach
In the study, a dental scanner was used to obtain surface data from edentulous casts and rims made by the dentist. A parameterized three-dimensional graphic database of artificial teeth was pre-established. Specialized computer-aided design software was used to set up the artificial dentition and design the esthetic gingiva and base plate. A selective laser sintering machine was used to transfer the data from stereolithography files into a wax base plate with location holes for each artificial tooth.
Findings
Under this method, a set of wax base plates with 28 location holes available for the placement of the artificial teeth were designed and fabricated within 6 h. The try-in wax dentures fitted the patient’s mouth well, besides occlusion relationships. Then, the occlusion relationships can be adjusted manually to achieve a balanced centric occlusion.
Originality/value
This method can be used to design and fabricate wax try-in removable complete dentures semi-automatically and rapidly; however, the algorithm for the occlusion contact design needs to be improved.
Details
Keywords
The purpose of this exploratory study is to survey quality management practices in two industrial sectors in the state of Kuwait. It aims to provide reliable and valid constructs…
Abstract
Purpose
The purpose of this exploratory study is to survey quality management practices in two industrial sectors in the state of Kuwait. It aims to provide reliable and valid constructs for measuring quality management practices and to test the effect of type of industry and plant size on the implementation level.
Design/methodology/approach
A questionnaire was administered, with the help of the Kuwaiti Public Authority for Industry (PAFI), to a stratified sample of 105 Kuwaiti plants. Confirmatory factor analysis and internal consistency tests were used to verify scales validity and reliability. The two independent samples t‐test and analysis of variance (ANOVA) were utilised to investigate the statistical effects of type of industry and plant size respectively.
Findings
The results revealed four reliable and valid constructs: customer focus, total quality management (TQM) human practices, process quality resource, and quality measurements. While type of industry showed no significant effect on the level of implementation of the four quality management constructs, plant size was a determinant factor of the implementation of customer focus and process quality practices.
Originality/value
The study is the first quality management survey in Kuwait. No valid or reliable TQM scales were developed before in such rigorous methodology. The study contributes to the unresolved issue of the size effect, especially when considering plant rather than company size. The need for governmental support, especially for small plants, in quality management implementation was reinforced.
Details
Keywords
Yong Sun, Lin Ma and Joseph Mathew
The purpose of this article is to present a new split system model (SSM) that predicts the reliability of complex systems with multiple preventive maintenance (PM) actions in the…
Abstract
Purpose
The purpose of this article is to present a new split system model (SSM) that predicts the reliability of complex systems with multiple preventive maintenance (PM) actions in the long term.
Design/methodology/approach
The SSM was developed using probability theory based on the concept of separating repaired and unrepaired components within a system virtually when modelling the reliability of the system after repairs. After theoretical analysis, a case study and Monte Carlo simulation were used to evaluate the effectiveness of the newly developed model.
Findings
The model can be used to determine the remaining life of systems, to show the changes in reliability with PM actions, and to quantify PM intervals after imperfect repairs.
Practical implications
SSM can be used to predict the reliability of complex systems with multiple PM actions, and hence can be used to support asset PM decision making over the whole life of the asset, such as scheduled PM times and spare parts requirements. An asset often has some vulnerable components, i.e. where the lives of these components are much shorter than the rest of the asset. In this case, PM is often conducted on these vulnerable components for maximising the useful life of the asset. The specific formulae derived in this paper can be used to predict the reliability of the asset for this scenario.
Originality/value
The proposed model uses a new concept of split systems to predict the changes of reliability of complex systems with multiple PM actions. Asset managers will find this model to be a useful tool in the optimisation of their asset PM strategies.
Details
Keywords
Miyuki Imada, Masakatsu Ohta, Masayasu Yamaguchi and Sun Yong Kim
The paper's aim is to present a novel anonymity quantification method, LooM (loosely managed privacy protection method) for achieving privacy protection in pervasive computing…
Abstract
Purpose
The paper's aim is to present a novel anonymity quantification method, LooM (loosely managed privacy protection method) for achieving privacy protection in pervasive computing environments.
Design/methodology/approach
The main feature is that the method quantitatively controls anonymity by a single value (disclosure threshold value) using a classification algorithm of the decision tree. The value is not affected by the set size of users or the distribution of users' private information. The effectiveness of this method is confirmed by simulation using sample databases of attribute‐value pairs. Proposes a model of privacy information disclosure that achieves a balance between users' privacy protection requirements and service providers' disclosure requirements and applies web questionnaire survey data to this model.
Findings
LooM can be applicable to a variety of pervasive computing and communication services handling a huge amount of data containing privacy information.
Originality/value
The paper proposes a model of privacy information disclosure that achieves a balance between users' privacy protection requirements and service providers' disclosure requirements.
Details
Keywords
It is generally agreed that sport development in South Korea has shown a stepwise process of its policy sector formation from elite sport, sport for all, sport industry, and…
Abstract
It is generally agreed that sport development in South Korea has shown a stepwise process of its policy sector formation from elite sport, sport for all, sport industry, and school sport since the 1960s. This chapter aims to examine the historical and institutional features of sport development in South Korea. The primary focus is given to developing conceptual understandings of the identified features of sport development since the governmental involvement in sport development was initiated in the early 1960s. The organizing aspects of national sport policy are strategically investigated to provide analytical resources for mapping the historical and institutional features of sport development. The notion of policy paradigm is utilized to articulate a series of stepwise formation of sport policy subfields. Finally, paradigm shifts in sport policy are discussed for their congruence with the nation's broader political and economic contexts: industrialization, democratization, and globalization.
Details
Keywords
Kwong‐Sak Leung, Jian‐Yong Sun and Zong‐Ben Xu
In this paper, a set of safe adaptive genetic algorithms (sGAs) is proposed based on the Splicing/Decomposable encoding scheme and the efficient speed‐up strategies developed by…
Abstract
In this paper, a set of safe adaptive genetic algorithms (sGAs) is proposed based on the Splicing/Decomposable encoding scheme and the efficient speed‐up strategies developed by Xu et al.. The proposed algorithms implement the self‐adaptation of the problem representation, selection and recombination operators at the levels of population, individual and component which commendably balance the conflicts between “reliability” and “efficiency”, as well as “exploitation” and “exploration” existed in the evolutionary algorithms. It is shown that the algorithms converge to the optimum solution in probability one. The proposed sGAs are experimentally compared with the classical genetic algorithm (CGA), non‐uniform genetic algorithm (nGA) proposed by Michalewicz, forking genetic algorithm (FGA) proposed by Tsutsui et al. and the classical evolution programming (CEP). The experiments indicate that the new algorithms perform much more efficiently than CGA and FGA do, comparable with the real‐coded GAs — nGA and CEP. All the algorithms are further evaluated through an application to a difficult real‐life application problem: the inverse problem of fractal encoding related to fractal image compression technique. The results for the sGA is better than those of CGA and FGA, and has the same, sometimes better performance compared to those of nGA and CEP.
Details
Keywords
This review discusses various means of locomotion developed in a number of countries and concludes with the description of a mobile robot developed at the Technical University of…
Abstract
This review discusses various means of locomotion developed in a number of countries and concludes with the description of a mobile robot developed at the Technical University of Torino in Italy.