Search results

1 – 10 of 19
To view the access options for this content please click here
Article
Publication date: 14 August 2017

Torsten Franzke, Eric H. Grosse, Christoph H. Glock and Ralf Elbert

Order picking is one of the most costly logistics processes in warehouses. As a result, the optimization of order picking processes has received an increased attention in…

Abstract

Purpose

Order picking is one of the most costly logistics processes in warehouses. As a result, the optimization of order picking processes has received an increased attention in recent years. One potential source for improving order picking is the reduction of picker blocking. The purpose of this paper is to investigate picker blocking under different storage assignment and order picker-route combinations and evaluate its effects on the performance of manual order picking processes.

Design/methodology/approach

This study develops an agent-based simulation model (ABS) for order picking in a rectangular warehouse. By employing an ABS, we are able to study the behaviour of individual order pickers and their interactions with the environment.

Findings

The simulation model determines shortest mean throughput times when the same routing policy is assigned to all order pickers. In addition, it evaluates the efficiency of alternative routing policies–storage assignment combinations.

Research limitations/implications

The paper implies that ABS is well-suited for further investigations in the field of picker blocking, for example, with respect to the individual behaviour of agents.

Practical implications

Based on the results of this paper, warehouse managers can choose an appropriate routing policy that best matches their storage assignment policy and the number of order pickers employed.

Originality/value

This paper is the first to comprehensively study the effects of different combinations of order picker routing and storage assignment policies on the occurrence of picker blocking.

Details

The International Journal of Logistics Management, vol. 28 no. 3
Type: Research Article
ISSN: 0957-4093

Keywords

To view the access options for this content please click here
Article
Publication date: 19 July 2013

Eric H. Grosse and Christoph H. Glock

The purpose of this paper is to study the prevalence of human learning in the order picking process in an experimental study. Further, it aims to compare alternative…

Abstract

Purpose

The purpose of this paper is to study the prevalence of human learning in the order picking process in an experimental study. Further, it aims to compare alternative learning curves from the literature and to assess which learning curves are most suitable to describe learning in order picking.

Design/methodology/approach

An experimental study was conducted at a manufacturer of household products. Empirical data was collected in the order picking process, and six learning curves were fitted to the data in a regression analysis.

Findings

It is shown that learning occurs in order picking, and that the learning curves of Wright, De Jong and Dar‐El et al. and the three‐parameter hyperbolic model are suitable to approximate the learning effect. The Stanford B model and the time constant model led to unrealistic results.

Practical implications

The results imply that human learning should be considered in planning the order picking process, for example in designing the layout of the warehouse or in setting up work schedules.

Originality/value

The paper is the first to study learning effects in order picking systems, and one of the few papers that use empirical data from an industrial application to study learning effects.

Details

Journal of Manufacturing Technology Management, vol. 24 no. 6
Type: Research Article
ISSN: 1741-038X

Keywords

To view the access options for this content please click here
Article
Publication date: 1 April 2003

Georgios I. Zekos

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination…

Abstract

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some legal aspects concerning MNEs, cyberspace and e‐commerce as the means of expression of the digital economy. The whole effort of the author is focused on the examination of various aspects of MNEs and their impact upon globalisation and vice versa and how and if we are moving towards a global digital economy.

Details

Managerial Law, vol. 45 no. 1/2
Type: Research Article
ISSN: 0309-0558

Keywords

To view the access options for this content please click here
Book part
Publication date: 4 April 2017

Patricia Owens

This article examines the multiple ways in which Hannah Arendt’s thought arose historically and in international context, but also how we might think about history and…

Abstract

This article examines the multiple ways in which Hannah Arendt’s thought arose historically and in international context, but also how we might think about history and theory in new ways with Arendt. It is commonplace to situate Arendt’s political and historical thought as a response to totalitarianism. However, far less attention has been paid to the significance of other specifically and irreducibly international experiences and events. Virtually, all of her singular contributions to political and international thought were influenced by her lived experiences of, and historical reflections on, statelessness and exile, imperialism, transnational totalitarianism, world wars, the nuclear revolution, the founding of Israel, war crimes trials, and the war in Vietnam. Yet, we currently lack a comprehensive reconstruction of the extent to which Arendt’s thought was shaped by the fact of political multiplicity, that there are not one but many polities existing on earth and inhabiting the world. This neglect is surprising in light of the significant “international turn” in the history of thought and intellectual history, the growing interest in Arendt’s thought within international theory and, above all, Arendt’s own unwavering commitment to plurality not simply as a characteristic of individuals but as an essential and intrinsically valuable effect of distinct territorial entities. The article examines the historical and international context of Arendt’s historical method, including her critique of process- and development-oriented histories that remain current in different social science fields, setting out and evaluating her alternative approach to historical writing.

Details

International Origins of Social and Political Theory
Type: Book
ISBN: 978-1-78714-267-1

Keywords

To view the access options for this content please click here
Article
Publication date: 1 February 1981

Hannelore B. Rader

The following annotated bibliography of materials on orienting users to the library and on instructing them in the use of reference and other resources covers publications…

Abstract

The following annotated bibliography of materials on orienting users to the library and on instructing them in the use of reference and other resources covers publications from 1980. Several items from 1979 were included because information about them had not been available in time for the 1980 listing. Some entries were not annotated because the compiler was unable to secure a copy of the item.

Details

Reference Services Review, vol. 9 no. 2
Type: Research Article
ISSN: 0090-7324

To view the access options for this content please click here
Book part
Publication date: 8 May 2019

Barrie Gunter

Abstract

Details

Children and Mobile Phones: Adoption, Use, Impact, and Control
Type: Book
ISBN: 978-1-78973-036-4

To view the access options for this content please click here
Case study
Publication date: 20 January 2017

R. Edward Freeman, Patricia H. Werhane, Andrew C. Wicks, Martin N. Davidson, Gerry Yemen, Jenny Mead and Bidhan L. Parmar

This series of diversity caselets is designed to present short, quick vignettes of different workplace situations involving issues of gender, sexual orientation, race…

Abstract

This series of diversity caselets is designed to present short, quick vignettes of different workplace situations involving issues of gender, sexual orientation, race, disability, age, religion, culture, and ethnicity.

To view the access options for this content please click here
Article
Publication date: 1 June 1963

AS J. L. Hobbs shows so clearly in his recent book, the interest in local history is growing enormously at present. The universities, training colleges and schools, as…

Abstract

AS J. L. Hobbs shows so clearly in his recent book, the interest in local history is growing enormously at present. The universities, training colleges and schools, as well as the institutions of further education, are all making more use of local studies—geographical, economic, social and historical—in their regular courses, in their advanced work, and in their publications.

Details

New Library World, vol. 64 no. 12
Type: Research Article
ISSN: 0307-4803

To view the access options for this content please click here
Article
Publication date: 1 February 1967

I HAVE sometimes been asked whether I am conscious, as the present editor of THE LIBRARY WORLD, of the spirit and influence of its founder, James Duff Brown, and of his…

Abstract

I HAVE sometimes been asked whether I am conscious, as the present editor of THE LIBRARY WORLD, of the spirit and influence of its founder, James Duff Brown, and of his editorial successors, who included J. D. Stewart and W. C. Berwick Sayers. The answer is that of course I am—how could it be otherwise?

Details

New Library World, vol. 68 no. 8
Type: Research Article
ISSN: 0307-4803

To view the access options for this content please click here
Article
Publication date: 9 March 2015

Eugene Ferry, John O Raw and Kevin Curran

The interoperability of cloud data between web applications and mobile devices has vastly improved over recent years. The popularity of social media, smartphones and…

Abstract

Purpose

The interoperability of cloud data between web applications and mobile devices has vastly improved over recent years. The popularity of social media, smartphones and cloud-based web services have contributed to the level of integration that can be achieved between applications. This paper investigates the potential security issues of OAuth, an authorisation framework for granting third-party applications revocable access to user data. OAuth has rapidly become an interim de facto standard for protecting access to web API data. Vendors have implemented OAuth before the open standard was officially published. To evaluate whether the OAuth 2.0 specification is truly ready for industry application, an entire OAuth client server environment was developed and validated against the speciation threat model. The research also included the analysis of the security features of several popular OAuth integrated websites and comparing those to the threat model. High-impacting exploits leading to account hijacking were identified with a number of major online publications. It is hypothesised that the OAuth 2.0 specification can be a secure authorisation mechanism when implemented correctly.

Design/methodology/approach

To analyse the security of OAuth implementations in industry a list of the 50 most popular websites in Ireland was retrieved from the statistical website Alexa (Noureddine and Bashroush, 2011). Each site was analysed to identify if it utilised OAuth. Out of the 50 sites, 21 were identified with OAuth support. Each vulnerability in the threat model was then tested against each OAuth-enabled site. To test the robustness of the OAuth framework, an entire OAuth environment was required. The proposed solution would compose of three parts: a client application, an authorisation server and a resource server. The client application needed to consume OAuth-enabled services. The authorisation server had to manage access to the resource server. The resource server had to expose data from the database based on the authorisation the user would be given from the authorisation server. It was decided that the client application would consume emails from Google’s Gmail API. The authorisation and resource server were modelled around a basic task-tracking web application. The client application would also consume task data from the developed resource server. The client application would also support Single Sign On for Google and Facebook, as well as a developed identity provider “MyTasks”. The authorisation server delegated authorisation to the client application and stored cryptography information for each access grant. The resource server validated the supplied access token via public cryptography and returned the requested data.

Findings

Two sites out of the 21 were found to be susceptible to some form of attack, meaning that 10.5 per cent were vulnerable. In total, 18 per cent of the world’s 50 most popular sites were in the list of 21 OAuth-enabled sites. The OAuth 2.0 specification is still very much in its infancy, but when implemented correctly, it can provide a relatively secure and interoperable authentication delegation mechanism. The IETF are currently addressing issues and expansions in their working drafts. Once a strict level of conformity is achieved between vendors and vulnerabilities are mitigated, it is likely that the framework will change the way we access data on the web and other devices.

Originality/value

OAuth is flexible, in that it offers extensions to support varying situations and existing technologies. A disadvantage of this flexibility is that new extensions typically bring new security exploits. Members of the IETF OAuth Working Group are constantly refining the draft specifications and are identifying new threats to the expanding functionality. OAuth provides a flexible authentication mechanism to protect and delegate access to APIs. It solves the password re-use across multiple accounts problem and stops the user from having to disclose their credentials to third parties. Filtering access to information by scope and giving the user the option to revoke access at any point gives the user control of their data. OAuth does raise security concerns, such as defying phishing education, but there are always going to be security issues with any authentication technology. Although several high impacting vulnerabilities were identified in industry, the developed solution proves the predicted hypothesis that a secure OAuth environment can be built when implemented correctly. Developers must conform to the defined specification and are responsible for validating their implementation against the given threat model. OAuth is an evolving authorisation framework. It is still in its infancy, and much work needs to be done in the specification to achieve stricter validation and vendor conformity. Vendor implementations need to become better aligned in order to provider a rich and truly interoperable authorisation mechanism. Once these issues are resolved, OAuth will be on track for becoming the definitive authentication standard on the web.

Details

Information & Computer Security, vol. 23 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of 19