Search results
1 – 10 of 456Risto Kärkkäinen, Rita Lavikka, Olli Seppänen and Antti Peltokorpi
Low productivity in construction is typically blamed on the seemingly complex and chaotic nature of construction, which emerges as the stakeholders do not have an adequate picture…
Abstract
Purpose
Low productivity in construction is typically blamed on the seemingly complex and chaotic nature of construction, which emerges as the stakeholders do not have an adequate picture of the evolving situation. The ever-increasing volume of situation data owing to the recent advances in IoT devices and reality capture platforms provide a unique opportunity to capture the actual situation data of construction projects accurately at a fraction of the cost compared to manual status tracking and reporting. This paper aims to investigate the concept of a situation picture, challenges in collecting situation data and its benefits.
Design/Methodology/Approach
Empirical data is collected through interviews in California and Finland, and by organizing workshops.
Findings
We contribute to literature on managing operational information by defining the concept of a situation picture in the context of construction, specifically from the blue-collar’s perspective during on-site activities. We present the key components of a conceptual information model that represents a situation picture in construction.
Research limitations/implications
The applicability of conceptual information model of situation picture is not tested in practice, but the model will provide a starting point for research to comprehensively integrate social and digital information exchange for improving workflow.
Practical implications
The paper claims that designing and building comprehensive information management infrastructure would contribute to solving the problems of low productivity, quality and safety in construction projects.
Originality/value
Research on situation picture and situation awareness is scarce in the context of construction. The study links various information management technologies and practices to actual construction productivity.
Details
Keywords
In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson…
Abstract
In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson, 2015). Traditionally, such security domains are often focussed on mainstream public safety within crowded spaces and border controls, through to identifying suspicious behaviours, hostile reconnaissance and implementing counter-terrorism initiatives. More recently, with growing insecurity around the world, organisations have looked to improve their security risk management frameworks, developing concepts which originated in the health and safety field to deal with more pressing risks such as terrorist acts, abduction and piracy (Paul, 2018). In these instances, security is usually the specific responsibility of frontline personnel with defined roles and responsibilities operating in accordance with organisational protocols (Saikayasit, Stedmon, Lawson, & Fussey, 2012; Stedmon, Saikayasit, Lawson, & Fussey, 2013). However, understanding the knowledge that frontline security workers might possess and use requires sensitive investigation in equally sensitive security domains.
This chapter considers how to investigate knowledge elicitation in these sensitive security domains and underlying ethics in research design that supports and protects the nature of investigation and end-users alike. This chapter also discusses the criteria used for ensuring trustworthiness as well as assessing the relative merits of the range of methods adopted.
Details
Keywords
Della-Maria M. Marinova and Svetla T. Marinova
This chapter critically evaluates opportunities and challenges associated with developing diversity and embracing inclusion of cyber security talent in a multinational consultancy…
Abstract
This chapter critically evaluates opportunities and challenges associated with developing diversity and embracing inclusion of cyber security talent in a multinational consultancy firm and offers recommendations on how to optimize inclusion of young talent in this sensitive business area within a multinational company. Drawing on one of the author's experience as a young cyber security professional with a non-technical background, entering the profession through a consultancy graduate development programme, this paper offers a unique perspective on how to enhance cohesion in diversity across linear and non-linear routes into cyber security.
While the scope is limited to cyber security talent in early careers, the competency-based approach means that recommendations around developing diversity and embracing inclusion can be applied to young talent in other business competence areas. Each recommendation can be used as a building block to influence and shape future equality, diversity and inclusion (ED&I) strategy in consultancy.
Details
Keywords
Ayşen Akbaş Tuna and Zafer Türkmendağ
Cyber management of organizations includes eliminating security gaps, ensuring information confidentiality, and protecting customers' data. In addition, production and planning…
Abstract
Cyber management of organizations includes eliminating security gaps, ensuring information confidentiality, and protecting customers' data. In addition, production and planning, protecting cyber and digital infrastructure are included in the chapter. The chapter deals with these issues in the context of strategy and management. In addition, the conflicts arising from competitors to access the tacit knowledge (confidential information, commercial secrets, commercial relations, customers, and tenders) of the businesses are discussed in the chapter. Cyber conflicts have now turned into a business-to-business war. Businesses have become targets in cyberwars. This chapter, therefore, examines these issues in depth.
Details
Keywords
Julia Slupska and Leonie Maria Tanczer
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…
Abstract
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.
Details
Keywords
In recent years, there has been a growing dialogue around community-based and systems-based approaches to security risk management through the introduction of top-down and…
Abstract
In recent years, there has been a growing dialogue around community-based and systems-based approaches to security risk management through the introduction of top-down and bottom-up knowledge acquisition. In essence, this relates to knowledge elicited from academic experts, or security subject-matter experts, practitioner experts, or field workers themselves and how much these disparate sources of knowledge may converge or diverge. In many ways, this represents a classic tension between organisational and procedural perspectives of knowledge management (i.e. top-down) versus more pragmatic and experience focussed perspectives (i.e. bottom-up).
This chapter considers these approaches and argues that a more consistent approach needs to address the conflict between procedures and experience, help convert field experience into knowledge, and ultimately provide effective training that is relevant to those heading out into demanding work situations. Ultimately, ethics and method are intricately bound together in whichever approach is taken and the security of both staff and at-risk populations depends upon correctly managing the balance between systems and communities.
Details
Keywords
Advances in Artificial Intelligence (AI) technologies and Autonomous Unmanned Vehicles are shaping our daily lives, society, and will continue to transform how we will fight…
Abstract
Advances in Artificial Intelligence (AI) technologies and Autonomous Unmanned Vehicles are shaping our daily lives, society, and will continue to transform how we will fight future wars. Advances in AI technologies have fueled an explosion of interest in the military and political domain. As AI technologies evolve, there will be increased reliance on these systems to maintain global security. For the individual and society, AI presents challenges related to surveillance, personal freedom, and privacy. For the military, we will need to exploit advances in AI technologies to support the warfighter and ensure global security. The integration of AI technologies in the battlespace presents advantages, costs, and risks in the future battlespace. This chapter will examine the issues related to advances in AI technologies, as we examine the benefits, costs, and risks associated with integrating AI and autonomous systems in society and in the future battlespace.
Details
Keywords
Harry K. Pedersen, Nancy J. Cooke, Heather Pringle and Olena Connor
The Cognitive Engineering Research Institute's First Annual Human Factors of unmanned aerial vehicles (UAVs) Workshop, held on May 24–25, 2004 in Chandler Arizona, and Second…
Abstract
The Cognitive Engineering Research Institute's First Annual Human Factors of unmanned aerial vehicles (UAVs) Workshop, held on May 24–25, 2004 in Chandler Arizona, and Second Annual Human Factors of UAVs Workshop, held on May 25–26, 2005 in Mesa Arizona, brought to light many human factors issues regarding the technology and operation of UAVs. An integral part of the event was the involvement of military UAV operators from the U.S. Air Force (USAF), U.S. Navy, and U.S. Army. The involvement of UAV operators in the workshops was valuable in linking developers and human factors researchers in the improvement of UAV systems and operations – a practice that is too often implemented only after a system is deployed and the problems are found. The experience of operators serves as a “user's account” of the issues and problems concerning the operation of UAVs. The fact that operators have had first hand experience in operating UAVs provides a unique perspective to the problem of identifying the most pressing human factors issues. The purpose of this chapter is to highlight the perspectives of two UAV operators that helped to set the tone for the entire First Annual Human Factors of UAVs Workshop.