Search results

1 – 10 of 93
Content available
Article
Publication date: 1 September 2005

104

Abstract

Details

Assembly Automation, vol. 25 no. 3
Type: Research Article
ISSN: 0144-5154

Keywords

Content available
Article
Publication date: 1 June 1998

125

Abstract

Details

Assembly Automation, vol. 18 no. 2
Type: Research Article
ISSN: 0144-5154

Keywords

Open Access
Article
Publication date: 14 May 2018

Jan-Willem Bullee, Lorena Montoya, Marianne Junger and Pieter Hartel

When security managers choose to deploy a smart lock activation system, the number of units needed and their location needs to be established. This study aims to present the…

1575

Abstract

Purpose

When security managers choose to deploy a smart lock activation system, the number of units needed and their location needs to be established. This study aims to present the results of a penetration test involving smart locks in the context of building security. The authors investigated how the amount of effort an employee has to invest in complying with a security policy (i.e. walk from the office to the smart key activator) influences vulnerability. In particular, the attractiveness of a no-effort alternative (i.e. someone else walking from your office to the key activators to perform a task on your behalf) was evaluated. The contribution of this study relates to showing how experimental psychology can be used to determine the cost-benefit analysis (CBA) of physical building security measures.

Design/methodology/approach

Twenty-seven different “offenders” visited the offices of 116 employees. Using a script, each offender introduced a problem, provided a solution and asked the employee to hand over their office key.

Findings

A total of 58.6 per cent of the employees handed over their keys to a stranger; no difference was found between female and male employees. The likelihood of handing over the keys for employees close to a key activator was similar to that of those who were further away.

Research limitations/implications

The results suggest that installing additional key activators is not conducive to reducing the building’s security vulnerability associated with the handing over of keys to strangers.

Originality/value

No research seems to have investigated the distribution of smart key activators in the context of a physical penetration test. This research highlights the need to raise awareness of social engineering and of the vulnerabilities introduced via smart locks (and other smart systems).

Details

Journal of Corporate Real Estate, vol. 20 no. 2
Type: Research Article
ISSN: 1463-001X

Keywords

Article
Publication date: 1 December 2002

Christine Connolly

This paper reviews bowl feeders with optical sensors, used in industrial automation and assembly, describing their advantages over mechanically tooled bowl feeders, their…

Abstract

This paper reviews bowl feeders with optical sensors, used in industrial automation and assembly, describing their advantages over mechanically tooled bowl feeders, their underlying technology and development trends.

Details

Assembly Automation, vol. 22 no. 4
Type: Research Article
ISSN: 0144-5154

Keywords

Book part
Publication date: 21 May 2021

Burak Demir and Keti Ventura

Introduction: Digitalization has become crucial in our daily lives. The rapid rise of new technologies and high interest levels of individuals enforces companies to invest in…

Abstract

Introduction: Digitalization has become crucial in our daily lives. The rapid rise of new technologies and high interest levels of individuals enforces companies to invest in these technologies. Nowadays, as customers are willing to try new experiences, companies dynamically start to find new ways to develop their products and services. One of the most popular technologies used by companies to improve their services is the Internet of Things (IoT) technologies. Education, health, transportation, retail, and energy are some of the industries in which the IoT is frequently being used. As security concerns of individuals arose and willingness to remote control increases, innovative and technological projects with IoT applications are engaged in the construction and real estate sector.

Aim: The purpose of this chapter is to explore IoT applications within the new generation smart home systems. In this framework, the effect of IoT technologies on architectural structure of the smart home and operating systems as well as IoT and mobile-supported customer-focused applications and difficulties are analyzed.

Method: The study is designed as an exploratory study. The data are obtained from face-to-face interviews with companies operating on technology-based commercial and residential projects. Descriptive analysis method is used to analyze data. Sample selection was carried out by the judicial sampling technique.

Findings: The results showed that smart home systems offer several customer-oriented experiences to their users like personalized accessibility, comfort, time control, and energy savings. Wired and wireless communication protocols are included in the architecture of the system. Linux core software-based Android and iOS operating systems are used in order to enhance personal accessibility. However, some difficulties are noticed in the sector. Lack of information and internet infrastructure of companies that install electrical set-up are mentioned. Contractors, after sales service support, and customer-oriented applications are evaluated.

Article
Publication date: 1 December 2000

Subba Rao Siriginidi

Highlights the need for business process reengineering and impact of IT on enterprises. Presents in detail the evolution, modules, verticals, model, management concerns and…

7511

Abstract

Highlights the need for business process reengineering and impact of IT on enterprises. Presents in detail the evolution, modules, verticals, model, management concerns and network infrastructure, selection of software packages and enterprise preparedness for implementation of enterprise resource planning. Briefly describes the key features of popular ERP packages, viz. MFG/PRO, IFS/AVALON, SAAP, BAAN IV, J.D. Edwards, Marshal (R) and PeopleSoft. Concludes that enterprises definitely attain best business practices by implementing ERP, in an effort to position for success in the twenty‐first century.

Details

Business Process Management Journal, vol. 6 no. 5
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 1 October 1980

OUR leading article last month was headed “Automation or Extinction”. We were told, not directly (for whether through shyness or lack of conviction we know not, they never got in…

Abstract

OUR leading article last month was headed “Automation or Extinction”. We were told, not directly (for whether through shyness or lack of conviction we know not, they never got in touch with us themselves) the TUC found no favour in it. Apparently while they don't mind us advocating shorter hours so that everybody who wants to can have at least a share in the employment that is available, they object to our underlining the fact that while Union chiefs wanted prices of their goods to be cut (in this case, steel; but the principle applies to everything) they neglected to say how this could be done.

Details

Work Study, vol. 29 no. 10
Type: Research Article
ISSN: 0043-8022

Abstract

Details

Continuous Auditing
Type: Book
ISBN: 978-1-78743-413-4

Article
Publication date: 1 March 1998

Steve Smith

The new technology of RF‐ID, intelligent tagging, has become widespread in some industries such as distribution and baggage handling, and is set to dominate retail security in the…

Abstract

The new technology of RF‐ID, intelligent tagging, has become widespread in some industries such as distribution and baggage handling, and is set to dominate retail security in the near future. Library security and automation are tailor‐made applications for it which are ready to roll. What is it and what does it mean for Librarians?

Details

VINE, vol. 28 no. 3
Type: Research Article
ISSN: 0305-5728

Article
Publication date: 1 June 2000

P.Di Barba

Introduces papers from this area of expertise from the ISEF 1999 Proceedings. States the goal herein is one of identifying devices or systems able to provide prescribed…

Abstract

Introduces papers from this area of expertise from the ISEF 1999 Proceedings. States the goal herein is one of identifying devices or systems able to provide prescribed performance. Notes that 18 papers from the Symposium are grouped in the area of automated optimal design. Describes the main challenges that condition computational electromagnetism’s future development. Concludes by itemizing the range of applications from small activators to optimization of induction heating systems in this third chapter.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 19 no. 2
Type: Research Article
ISSN: 0332-1649

Keywords

1 – 10 of 93