114 research outputs found

    Comparative study of physical properties of zirconia based dental ceramics

    Get PDF
    The aim of this project was to evaluate and compare the mechanical properties of commercial yttria partially stabilized tetragonal zirconia polycrystalline (Y-TZP) ceramics, which have generated interest in restorative dentistry because of their high strength and high resistance to fracture. Mechanical properties of three commercial Y-TZP ceramics (Lava™, Cercon® and Invizion™) were investigated including the biaxial flexural strength, hardness, fatigue, and subcritical crack growth. Crown shaped specimens (Kavo Everest ZS-blanks with IPS e.max® Ceram and IPS e.max® Zirpress) were submitted to the fatigue followed by biaxial flexural strength test. The microstructure was analysed using AFM, and elemental analysis and fracture pattern were analysed via SEM. Additionally, stress induced ransformation toughening was studied using Vickers indentation (load 20-50 kg) and Raman spectroscopy. The phase transformation was also analysed on fracture surfaces of specimens that failed after biaxial flexural strength and subcritical crack growth test. The results of this project showed no significant difference in the mean biaxial flexural strength of uncoloured and coloured Lava™; however, Cercon® (823±115 MPa) and Invizion™ (828±87 MPa) had significantly lower flexural strength than Lava™ groups (~1100 MPa). All groups had similar hardness values (>1300 Hv). The survival strength of three commercial ceramics ranged from 60 to 70% of their mean biaxial flexural strength at 500,000 cycles. The types of sintering processes (heat pressed and sintered methods) did not influence the flexural strength of crown shaped specimens after fatigue for 50,000 cycles. The subcritical crack growth parameter ranged from 30-197. There were differences in the appearance of the microstructure and the amount of elemental components between the three Y-TZP ceramics. The XRD showed that the as-received surface had three phases, which were tetragonal cubic1 and cubic 2 (slightly larger than cubic 1). The polished surface contained two phases, which were tetragonal and cubic 1. The Raman spectroscopy revealed that the variation of loads had little effect on the level of transformation toughening per unit area; however, the transformation was varied by the distance from the centre to outside the indentation area. The cubic phase had the highest level at the centre while the tetragonal phase was found at a higher level outside the indentation. The monoclinic phase was only detected within the indentation area. For the fractured specimens, monoclinic and cubic phase were found at a higher level at the fracture origin, tension and compression sites. Further study examined the biaxial flexural strength and shear bond strength of zirconia containing 1, 2 and 5 wt% titanium phosphate glasses in order to identify whether glass affected the flexural and bond strengths. The results showed that the addition of glass 5 wt% or greater lead to the dramatic decrease of the biaxial flexural strength. There was also no significant difference in biaxial flexural strength and shear bond strength between titanium phosphate glass zirconia 0 wt%, 1 wt% and 2 wt% glasses zirconia etched for 2 and 5 minutes. Therefore, this project concluded that there was a difference in properties and phase transformation between Lava™ Cercon® and Invizion™ groups

    Barriers and motivations affecting information systems usage by Hajj-Umrah religious tourism operators in Saudi Arabia

    Get PDF
    Hajj & Umrah religious tourism accounts for seven million visitors each year in Saudi Arabia. The government has recently taken initiatives to promote the use of Information Systems (IS) in the religious tourism industry, encouraging firms to adopt IS innovations like e-commerce and enforcing the use of the Makha'a information system in Umrah for external pilgrims and the Yosr information system in Hajj for internal pilgrims. This study outlines the motivations and challenges that affect the utilisation of various IS services in the Saudi religious tourism industry through a qualitative analysis of the views and perceptions of senior executives and owners of travel firms. The findings suggest that while government initiatives and industry competitiveness were two positive factors promoting IS use, there are some major barriers preventing private firms from fully utilising the advantages of information systems. These include external factors such as lack of support from the IT industry and access to IT resources as well as internal factors within an organisation such as lack of commitment or the need for professional IT expertise. The study finds that relative advantage is a critical contributor to IS utilisation which depends on information systems characteristic

    Investigating the Formation of Information Security Climate Perceptions with Social Network Analysis: A Research Proposal

    Get PDF
    Over the past years, a large amount of studies has advanced knowledge that explains how individuals react to information security cues and why they are motivated to perform secure practices. Nevertheless, those studies predominantly set their focus on the adoption of secure practices at an individual level; therefore they were unable to analyse such adoption at the higher level. As a consequence, the formation and dissemination processes of information security perceptions were overlooked despite their importance. Understanding those processes would inform methods to distribute effectively desirable information security perceptions within the workplace, while potentially explaining why in some cases implementation of information security measures was not successful at changing the employees’ beliefs and behaviours. The first part of this paper reviews the concept of information security climate that emerge from the individual’s interactions with the work environment, which has been under researched and investigated inconsistently. The second part begins with discussing the influence mechanisms that could disseminate information security climate perceptions, then suggests the adoption of social network analysis techniques to analyse those mechanisms. As a result, the paper forwards an integrated framework about information security climate perceptions, as well as proposes a research agenda for future investigations on how those perceptions could be formed and disseminated within the workplace

    Who influences information security behaviours of young home computer users in Vietnam? An ego-centric network analysis approach

    Get PDF
    This study aims to explore the social roles of the people who can influence young home computer users (HCUs) in Vietnam, as well as the interactions that make those people influential. Since HCUs are considered the weakest link in the security chain and cyber-threats can attack organisation’s information systems indirectly via these HCUs, it is therefore necessary to identify their sources of security influence for designing effective intervention. To this end, the ego-centric network analysis approach was employed to analyse the personal networks of security influence of 116 HCUs, comprising 548 influential sources in total. Close relationships such as family members, partners, friends, and colleagues were predominantly nominated as capable of influencing HCUs’ security behaviours. Furthermore, these sources influence the HCUs by possessing the power bases of expert, reward, and coercive, as well as holding legitimate positions that make them influential

    Determinants of Successful ICT Risk Management in Thai Organisations

    Get PDF
    This paper reports a study of the key factors that affect ICT risk management using Thai businesses as the data sources. Three hundred and two respondents from listed organisations on the Stock Exchange of Thailand (SET) were surveyed and the data analysed to establish the strength of relationships in a model derived from extant literature and the application of the two most commonly used governance standards for information and communication technology (ICT), COBIT and ISO/IEC 17799. The research shows that a small number of key factors have the most effect on successful ICT risk management, namely organisational policy, human resource management planning, organisational security and management of ICT. The focus of the research is to propose the successful ICT risk management model to organisations

    Contextual Difference and Intention to Perform Information Security Behaviours Against Malware in a BYOD Environment: a Protection Motivation Theory Approach

    Get PDF
    The research domain of end-user’s information security behaviours has been gaining much attention over the recent years. While the nature of intention to perform information security behaviours are being revealed, there are still gaps in this area. In particular, few studies have addressed whether such intention remains across contexts, especially from home to public places. Secondly, the amount of the cyber-threats swells with the increase of personal devices with the rapid adoption of the BYOD trend. This research employed MSEM methods to develop a conceptual model based on Protection Motivation Theory by using data collected from 252 higher education students in a BYOD Australian university. Our findings confirmed and explored in details how intention to perform information security behaviours varied due to the change of context. Academics and practitioners could mitigate the security gap by focusing on the intention’s differences discussed in our findings

    Understanding the Formation of Information Security Climate Perceptions: A Longitudinal Social Network Analysis

    Get PDF
    Business process capture is a first step in the larger endeavour of business process management. In this paper we view business process capture as a knowledge conversion process. We explore the conversion of knowledge when business analysts capture information about business processes from domain experts. We identify seven process capture activities in a thematic analysis of comments made by business analysts in response to open-ended questions in an online survey. The seven activities are involving, simplifying, tailoring, training, combining, confirming, and engaging soft skills. We show how these activities involve the transfer of tacit and explicit knowledge between the business analyst and the domain expert and how the transfer conforms to the SECI modes of knowledge conversion, well known in the research domain of knowledge management. The paper contributes a SECI-based knowledge conversion model of business process capture and insight for business analysts about business process capture activities

    INVESTIGATING THE POSSIBILITY FOR IS/IT TO SUPPORT THE DELIVERY OF CHINESE MEDICINE

    Get PDF
    As Chinese medicine (CM) has increased in popularity globally it now becomes imperative to investigate ways in which safe, efficient, effective and evidence-based approaches might be adopted into CM practice. In the case of western or more traditional healthcare delivery practice, IS/IT is often adopted and employed to assist in this regard and thus this paper examines how IS/IT might be used to support the delivery of CM. In particular, the paper investigates how IS/IT tools and techniques might be used in supporting CM clinics daily processes and thereby bring greater value to a country’s healthcare. In doing so, this paper studies the current global CM situation and provides a solid foundation for how to design and develop an enterprise wide CM clinical management system

    Using IS/IT to Support the Delivery of Chinese Medicine: The Design of a Chinese Medicine Clinic System

    Get PDF
    Using Information System/Information Technology (IS/IT) in Chinese Medicine (CM) has not been discussed much, if at all, in the literature. This is unlike the numerous references to the role for IS/IT to support various aspects of western medicine practice. Though the diagnosis and treatments between western medicine and CM are different, the clinical processes are similar. Thus, we believe that by implementing IS/IT system solutions, CM practice can also enjoy many benefits. CM practice relies on expert knowledge, hence applying knowledge management (KM) concepts to any proposed Chinese Medicine Clinic System (CMCS) is a necessary critical factor in the design of suitable IS/IT solutions in this context. This paper serves to identify a role for IS/IT in assisting CM clinic daily key processes as well as identify key system features and functions for a suitable CMCS

    E-readiness to G-readiness: developing a green information technology readiness framework

    Get PDF
    Businesses are under increasing pressure from competitors, regulators and community groups to implement sustainable business practices. Balancing economic and environmental performance to be green and competitive is therefore a key strategic issue. The increased discussion on green information technology (IT) has sparked the interest of this research. Green IT is poised to influence not only technology but also competitive strategy and even the legality of some business strategic options. Understanding and leveraging Green IT is therefore critical for businessesÂż continued progress. Nevertheless, the principles, practices and value of Green IT is yet to be researched. This paper introduces the concept of Green IT and describes the main pillars of a g-readiness framework to help organisations evaluate their readiness for adopting Green IT. It argues that just as e-readiness has been, and continues to be, a critical quality in the digital economy, g-readiness is an equally critical quality in the low carbon digital economy. Without a clear understanding of g-readiness, organisations would approach Green IT initiatives on an ad hoc and somewhat reactive basis which is undesirable
    • …
    corecore