Search results

1 – 10 of over 2000
Article
Publication date: 9 March 2015

Maegan Hendow, Alina Cibea and Albert Kraler

This paper aims to examine the primary fundamental rights concerns related to biometrics and their use in automated border controls (ABCs), as well as how these issues converge in…

Abstract

Purpose

This paper aims to examine the primary fundamental rights concerns related to biometrics and their use in automated border controls (ABCs), as well as how these issues converge in the European Commission’s Smart Borders proposal.

Design/methodology/approach

This paper draws on extensive background research and qualitative in-depth interviews conducted in 2013 for the European Union (EU) FP-7 project “FastPass – A harmonized, modular reference system for all European automatic border crossing points”.

Findings

The Smart Borders proposal not only compounds the individual concerns related to the use of biometrics in border controls and automatisation thereof, but also has serious issues of its own, premier among which is the imposition of a two-tier border control system.

Social implications

The paper is a catalyst for open debate on the fundamental questions of how we got to this point and where do we want to go. It questions the process by which the increased use of IT in border controls has become the norm and policy trend in Europe, and discusses where the limits could be drawn from a fundamental rights perspective. In particular, it warns against the institutionalisation of a two-tier border control system among third-country nationals.

Originality/value

Little attention is given to the fundamental rights concerns raised for EU and non-EU citizens as related to biometrics and their use in ABCs, and how these issues are reproduced in the Smart Borders proposal. The paper fills this gap by taking a bottom-up approach: examining the implications of individual elements of the proposal to see their impact on the broader policy.

Details

Journal of Information, Communication and Ethics in Society, vol. 13 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 25 November 2013

Elin Palm

This paper aims to deal with an increasing securitization and criminalisation of migration in Europe highlighting ethical implications of the current surveillance-based EU…

573

Abstract

Purpose

This paper aims to deal with an increasing securitization and criminalisation of migration in Europe highlighting ethical implications of the current surveillance-based EU migration governance. It is shown that EU member states employ surveillance regimes to control movements across borders and to restrict migrants' access to their territories. The ethical acceptability of such practices is questioned with a particular focus on the “freedom of movement”.

Design/methodology/approach

In order to establish the extent to which the current EU migration governance can be considered ethically justifiable, the article starts out from the right to mobility as coded in the UN Declaration of Human Rights. It is shown that the current migration governance obstructs the rights specified in Articles 13 and 14. At the same time, shortcomings of the UN declaration are discussed and the need for a better protection of the freedom of movement is suggested.

Findings

It is established that human rights are such that promote normative agency and a type of rights that trump, for example, states interests in restricting access to their territories do not outweigh individuals rights to seek asylum. In order to make this relation more clear however, the right to mobility should be made symmetric, including both a right to leave and to enter (but not a right to immigrate and settle). An extensive right to freedom of movement is advocated based on the significance of mobility for normative agency. A substantial right to mobility supports the right to seek asylum.

Originality/value

As of yet, ethical implications of surveillance-based border control are under-researched.

Details

Journal of Information, Communication and Ethics in Society, vol. 11 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 11 May 2012

Olli I. Heimo, Antti Hakkala and Kai K. Kimppa

The purpose of this paper is to show that most, if not all RFID/biometric passports have clear technical and social problems in their intended use and that there are clear…

930

Abstract

Purpose

The purpose of this paper is to show that most, if not all RFID/biometric passports have clear technical and social problems in their intended use and that there are clear problems with the databases into which biometric data are being collected, due to use of this data for other (publicly), non‐intended uses.

Design/methodology/approach

The approach of this paper is both a meta‐study of the flaws in the technological specifications as well as the social implementation of RFID/biometric passports. Finland is used as a case, but the results extend beyond Finland in most, if not all the topics presented – not necessarily all results to all implementations, but all to some others.

Findings

The current implementations of RFID/biometric passports are lacking in both technical and social implementations and pose clear risks to their use, both due to lax implementation of the technology itself but specifically due to the social changes brought about. These problems cause both erosion of privacy and trust.

Research limitations/implications

Further research into other potential social implications on a national level is required. The authors fear that the cases presented do not necessarily reflect all the potential problems, but just the most evident ones.

Practical implications

The problems with the technological implications can be averted by using the best technological solutions, and thus the best technological solutions should be used instead of the ones proven to be lacking.

Social implications

The social implications should at least be brought forth for public discourse and acknowledged, which currently does not seem to happen.

Originality/value

The paper contributes to the understanding of problems with current RFID/biometric passport implementations as well as inherent social problems that are hard, if not impossible to avoid. The problems belong under the category of critical eGovernment applications, and similar issues are visible in other eGovernment applications.

Details

Journal of Information, Communication and Ethics in Society, vol. 10 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 17 July 2020

Frank Koenig, Pauline Anne Found, Maneesh Kumar and Nicholas Rich

The aim of this paper is to develop a contribution to knowledge that adds to the empirical evidence of predictive condition-based maintenance by demonstrating how the availability…

Abstract

Purpose

The aim of this paper is to develop a contribution to knowledge that adds to the empirical evidence of predictive condition-based maintenance by demonstrating how the availability and reliability of current assets can be improved without costly capital investment, resulting in overall system performance improvements

Design/methodology/approach

The empirical, experimental approach, technical action research (TAR), was designed to study a major Middle Eastern airport baggage handling operation. A predictive condition-based maintenance prototype station was installed to monitor the condition of a highly complex system of static and moving assets.

Findings

The research provides evidence that the performance frontier for airport baggage handling systems can be improved using automated dynamic monitoring of the vibration and digital image data on baggage trays as they pass a service station. The introduction of low-end innovation, which combines advanced technology and low-cost hardware, reduced asset failures in this complex, high-speed operating environment.

Originality/value

The originality derives from the application of existing hardware with the combination of edge and cloud computing software through architectural innovation, resulting in adaptations to an existing baggage handling system within the context of a time-critical logistics system.

Details

Journal of Manufacturing Technology Management, vol. 32 no. 3
Type: Research Article
ISSN: 1741-038X

Keywords

Article
Publication date: 15 September 2023

Nikhita Tuli, Ritu Srivastava and Harish Kumar

Access to services for consumers with disabilities (CwD) has gained increased attention from researchers and service providers in recent years. Consequently, ensuring that…

Abstract

Purpose

Access to services for consumers with disabilities (CwD) has gained increased attention from researchers and service providers in recent years. Consequently, ensuring that services are designed and maintained in a manner that is more inclusive and accessible to CwD has become imperative. However, academic literature is fragmented and thus, this study aims to provide a state-of-the-art synthesis for further theoretical development.

Design/methodology/approach

This study reviews 77 relevant articles in the domain using a multidisciplinary review following the PRISMA protocol, and a thematic analysis was conducted.

Findings

The study thoroughly synthesizes the theories, contexts and methods used in the extant literature. Next, the study presents a new theoretical framework with four broader dimensions: beyond regulations, towards accessibility, value co-creation, inclusion of CwD and role of stakeholders. Furthermore, it highlights the related sub-dimensions attributed to the service design stages (planning, usage and post-usage). Based on this, the study offers critical avenues for future research using the Double Diamond framework.

Originality/value

The study contributes significantly to service design literature for CwD and transformative service research by developing a new consolidated theoretical framework. The findings should direct service providers towards better service designs in related fields. Socially, the study has implications for promoting accessibility and inclusion for CwD, while providing them the freedom of choice.

Article
Publication date: 1 April 2003

Georgios I. Zekos

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some…

88711

Abstract

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some legal aspects concerning MNEs, cyberspace and e‐commerce as the means of expression of the digital economy. The whole effort of the author is focused on the examination of various aspects of MNEs and their impact upon globalisation and vice versa and how and if we are moving towards a global digital economy.

Details

Managerial Law, vol. 45 no. 1/2
Type: Research Article
ISSN: 0309-0558

Keywords

Article
Publication date: 9 March 2015

Btihaj Ajana

Investments in the technologies of borders and their securitisation continue to be a focal point for many governments across the globe. This paper is concerned with a particular…

2172

Abstract

Purpose

Investments in the technologies of borders and their securitisation continue to be a focal point for many governments across the globe. This paper is concerned with a particular example of such technologies, namely, “Big Data” analytics. In the past two years, the technology of Big Data has gained a remarkable popularity within a variety of sectors, ranging from business and government to scientific and research fields. While Big Data techniques are often extolled as the next frontier for innovation and productivity, they are also raising many ethical and political issues. The aim of this paper is to consider some of these issues and provide a critical reflection on the implications of using Big Data for the governance of borders.

Design/methodology/approach

The author draws on the example of the new Big Data solution recently developed by IBM for the Australian Customs and Border Protection Service. The system, which relies on data collected from Passenger Name Records, aims to facilitate and automate mechanisms of profiling enable the identification of “high-risk” travellers. It is argued that the use of such Big Data techniques risks augmenting the function and intensity of borders.

Findings

The main concerns addressed here revolve around three key elements, namely, the problem of categorisation, the projective and predictive nature of Big Data techniques and their approach to the future and the implications of Big Data on understandings and practices of identity.

Originality/value

By exploring these issues, the paper aims to contribute to the debates on the impact of information and communications technology-based surveillance in border management.

Details

Journal of Information, Communication and Ethics in Society, vol. 13 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 15 February 2013

Supachai Vongbunyong, Sami Kara and Maurice Pagnucco

The purpose of this paper is to develop an automated disassembly cell that is flexible and robust to the physical variations of a product. In this way it is capable of dealing…

1097

Abstract

Purpose

The purpose of this paper is to develop an automated disassembly cell that is flexible and robust to the physical variations of a product. In this way it is capable of dealing with any model of product, regardless of the level of detail in the supplied information.

Design/methodology/approach

The concept of cognitive robotics is used to replicate human level expertise in terms of perception and decision making. As a result, difficulties with respect to the uncertainties and variations of the product in the disassembly process are resolved.

Findings

Cognitive functions, namely reasoning and execution monitoring, can be used in basic behaviour control to address problems in variations of the disassembly process due to variations in the product's structure particularly across different models of the product.

Research limitations/implications

The paper provides a practical approach to formulating the disassembly domain and behaviour control of the cognitive robotic agent via a high‐level logical programming language that combines domain‐specific heuristic knowledge with search to deal with variations in products and uncertainties that arise during the disassembly process.

Practical implications

Full disassembly automation that is flexible and robust to the uncertainties that may arise potentially replaces human labour in a difficult and hazardous task. Consequently, the disassembly process will be more economically feasible, especially in developed countries.

Originality/value

The paper provides a practical approach to the basic cognitive functions that replicate the human expert's behaviour to the disassembly cell.

Article
Publication date: 8 July 2020

Wichai Pawgasame and Komwut Wipusitwarakun

The border control becomes challenging when a protected region is large and there is a limited number of border patrols. This research paper proposes a novel heuristic-based…

Abstract

Purpose

The border control becomes challenging when a protected region is large and there is a limited number of border patrols. This research paper proposes a novel heuristic-based patrol path planning scheme in order to efficiently patrol with resource scarcity.

Design/methodology/approach

The trespasser influencing score, which is determined from the environmental characteristics and trespassing statistic of the region, is used as a heuristic for measuring a chance of approaching a trespasser. The patrol plan is occasionally updated with a new trespassing statistic during a border operation. The performance of the proposed patrol path planning scheme was evaluated and compared with other patrol path planning schemes by the empirical experiment under different scenarios.

Findings

The result from the experiment indicates that the proposed patrol planning outperforms other patrol path planning schemes in terms of the trespasser detection rate, when more environment-aware trespassers are in the region.

Research limitations/implications

The experiment was conducted through simulated agents in simulated environment, which were assumed to mimic real behavior and environment.

Originality/value

This research paper contributes a heuristic-based patrol path planning scheme that applies the environmental characteristics and dynamic statistic of the region, as well as a border surveillance problem model that would be useful for mobile sensor planning in a border surveillance application.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 13 no. 3
Type: Research Article
ISSN: 1756-378X

Keywords

Open Access
Article
Publication date: 18 April 2023

Patience Mpofu, Solomon Hopewell Kembo, Marlvern Chimbwanda, Saulo Jacques, Nevil Chitiyo and Kudakwashe Zvarevashe

In response to food supply constraints resulting from coronavirus disease 2019 (COVID-19) restrictions, in the year 2020, the project developed automated household Aquaponics…

Abstract

Purpose

In response to food supply constraints resulting from coronavirus disease 2019 (COVID-19) restrictions, in the year 2020, the project developed automated household Aquaponics units to guarantee food self-sufficiency. However, the automated aquaponics solution did not fully comply with data privacy and portability best practices to protect the data of household owners. The purpose of this study is to develop a data privacy and portability layer on top of the previously developed automated Aquaponics units.

Design/methodology/approach

Design Science Research (DSR) is the research method implemented in this study.

Findings

General Data Protection and Privacy Regulations (GDPR)-inspired principles empowering data subjects including data minimisation, purpose limitation, storage limitation as well as integrity and confidentiality can be implemented in a federated learning (FL) architecture using Pinecone Matrix home servers and edge devices.

Research limitations/implications

The literature reviewed for this study demonstrates that the GDPR right to data portability can have a positive impact on data protection by giving individuals more control over their own data. This is achieved by allowing data subjects to obtain their personal information from a data controller in a format that makes it simple to reuse it in another context and to transmit this information freely to any other data controller of their choice. Data portability is not strictly governed or enforced by data protection laws in the developing world, such as Zimbabwe's Data Protection Act of 2021.

Practical implications

Privacy requirements can be implemented in end-point technology such as smartphones, microcontrollers and single board computer clusters enabling data subjects to be incentivised whilst unlocking the value of their own data in the process fostering competition among data controllers and processors.

Originality/value

The use of end-to-end encryption with Matrix Pinecone on edge endpoints and fog servers, as well as the practical implementation of data portability, are currently not adequately covered in the literature. The study acts as a springboard for a future conversation on the topic.

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

1 – 10 of over 2000