Search results

1 – 10 of 456
Open Access
Book part
Publication date: 1 May 2019

Risto Kärkkäinen, Rita Lavikka, Olli Seppänen and Antti Peltokorpi

Low productivity in construction is typically blamed on the seemingly complex and chaotic nature of construction, which emerges as the stakeholders do not have an adequate picture…

Abstract

Purpose

Low productivity in construction is typically blamed on the seemingly complex and chaotic nature of construction, which emerges as the stakeholders do not have an adequate picture of the evolving situation. The ever-increasing volume of situation data owing to the recent advances in IoT devices and reality capture platforms provide a unique opportunity to capture the actual situation data of construction projects accurately at a fraction of the cost compared to manual status tracking and reporting. This paper aims to investigate the concept of a situation picture, challenges in collecting situation data and its benefits.

Design/Methodology/Approach

Empirical data is collected through interviews in California and Finland, and by organizing workshops.

Findings

We contribute to literature on managing operational information by defining the concept of a situation picture in the context of construction, specifically from the blue-collar’s perspective during on-site activities. We present the key components of a conceptual information model that represents a situation picture in construction.

Research limitations/implications

The applicability of conceptual information model of situation picture is not tested in practice, but the model will provide a starting point for research to comprehensively integrate social and digital information exchange for improving workflow.

Practical implications

The paper claims that designing and building comprehensive information management infrastructure would contribute to solving the problems of low productivity, quality and safety in construction projects.

Originality/value

Research on situation picture and situation awareness is scarce in the context of construction. The study links various information management technologies and practices to actual construction productivity.

Open Access
Book part
Publication date: 9 December 2021

Alex Stedmon and Daniel Paul

In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson

Abstract

In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson, 2015). Traditionally, such security domains are often focussed on mainstream public safety within crowded spaces and border controls, through to identifying suspicious behaviours, hostile reconnaissance and implementing counter-terrorism initiatives. More recently, with growing insecurity around the world, organisations have looked to improve their security risk management frameworks, developing concepts which originated in the health and safety field to deal with more pressing risks such as terrorist acts, abduction and piracy (Paul, 2018). In these instances, security is usually the specific responsibility of frontline personnel with defined roles and responsibilities operating in accordance with organisational protocols (Saikayasit, Stedmon, Lawson, & Fussey, 2012; Stedmon, Saikayasit, Lawson, & Fussey, 2013). However, understanding the knowledge that frontline security workers might possess and use requires sensitive investigation in equally sensitive security domains.

This chapter considers how to investigate knowledge elicitation in these sensitive security domains and underlying ethics in research design that supports and protects the nature of investigation and end-users alike. This chapter also discusses the criteria used for ensuring trustworthiness as well as assessing the relative merits of the range of methods adopted.

Book part
Publication date: 5 September 2022

Della-Maria M. Marinova and Svetla T. Marinova

This chapter critically evaluates opportunities and challenges associated with developing diversity and embracing inclusion of cyber security talent in a multinational consultancy…

Abstract

This chapter critically evaluates opportunities and challenges associated with developing diversity and embracing inclusion of cyber security talent in a multinational consultancy firm and offers recommendations on how to optimize inclusion of young talent in this sensitive business area within a multinational company. Drawing on one of the author's experience as a young cyber security professional with a non-technical background, entering the profession through a consultancy graduate development programme, this paper offers a unique perspective on how to enhance cohesion in diversity across linear and non-linear routes into cyber security.

While the scope is limited to cyber security talent in early careers, the competency-based approach means that recommendations around developing diversity and embracing inclusion can be applied to young talent in other business competence areas. Each recommendation can be used as a building block to influence and shape future equality, diversity and inclusion (ED&I) strategy in consultancy.

Open Access
Book part
Publication date: 9 December 2021

Abstract

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Book part
Publication date: 15 September 2022

Ayşen Akbaş Tuna and Zafer Türkmendağ

Cyber management of organizations includes eliminating security gaps, ensuring information confidentiality, and protecting customers' data. In addition, production and planning…

Abstract

Cyber management of organizations includes eliminating security gaps, ensuring information confidentiality, and protecting customers' data. In addition, production and planning, protecting cyber and digital infrastructure are included in the chapter. The chapter deals with these issues in the context of strategy and management. In addition, the conflicts arising from competitors to access the tacit knowledge (confidential information, commercial secrets, commercial relations, customers, and tenders) of the businesses are discussed in the chapter. Cyber conflicts have now turned into a business-to-business war. Businesses have become targets in cyberwars. This chapter, therefore, examines these issues in depth.

Content available
Book part
Publication date: 31 July 2023

Michael Nizich

Abstract

Details

The Cybersecurity Workforce of Tomorrow
Type: Book
ISBN: 978-1-80382-918-0

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 9 December 2021

Daniel Paul and Alex Stedmon

In recent years, there has been a growing dialogue around community-based and systems-based approaches to security risk management through the introduction of top-down and…

Abstract

In recent years, there has been a growing dialogue around community-based and systems-based approaches to security risk management through the introduction of top-down and bottom-up knowledge acquisition. In essence, this relates to knowledge elicited from academic experts, or security subject-matter experts, practitioner experts, or field workers themselves and how much these disparate sources of knowledge may converge or diverge. In many ways, this represents a classic tension between organisational and procedural perspectives of knowledge management (i.e. top-down) versus more pragmatic and experience focussed perspectives (i.e. bottom-up).

This chapter considers these approaches and argues that a more consistent approach needs to address the conflict between procedures and experience, help convert field experience into knowledge, and ultimately provide effective training that is relevant to those heading out into demanding work situations. Ultimately, ethics and method are intricately bound together in whichever approach is taken and the security of both staff and at-risk populations depends upon correctly managing the balance between systems and communities.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Book part
Publication date: 15 July 2020

Yvonne R. Masakowski

Advances in Artificial Intelligence (AI) technologies and Autonomous Unmanned Vehicles are shaping our daily lives, society, and will continue to transform how we will fight…

Abstract

Advances in Artificial Intelligence (AI) technologies and Autonomous Unmanned Vehicles are shaping our daily lives, society, and will continue to transform how we will fight future wars. Advances in AI technologies have fueled an explosion of interest in the military and political domain. As AI technologies evolve, there will be increased reliance on these systems to maintain global security. For the individual and society, AI presents challenges related to surveillance, personal freedom, and privacy. For the military, we will need to exploit advances in AI technologies to support the warfighter and ensure global security. The integration of AI technologies in the battlespace presents advantages, costs, and risks in the future battlespace. This chapter will examine the issues related to advances in AI technologies, as we examine the benefits, costs, and risks associated with integrating AI and autonomous systems in society and in the future battlespace.

Details

Artificial Intelligence and Global Security
Type: Book
ISBN: 978-1-78973-812-4

Keywords

Book part
Publication date: 2 May 2006

Harry K. Pedersen, Nancy J. Cooke, Heather Pringle and Olena Connor

The Cognitive Engineering Research Institute's First Annual Human Factors of unmanned aerial vehicles (UAVs) Workshop, held on May 24–25, 2004 in Chandler Arizona, and Second…

Abstract

The Cognitive Engineering Research Institute's First Annual Human Factors of unmanned aerial vehicles (UAVs) Workshop, held on May 24–25, 2004 in Chandler Arizona, and Second Annual Human Factors of UAVs Workshop, held on May 25–26, 2005 in Mesa Arizona, brought to light many human factors issues regarding the technology and operation of UAVs. An integral part of the event was the involvement of military UAV operators from the U.S. Air Force (USAF), U.S. Navy, and U.S. Army. The involvement of UAV operators in the workshops was valuable in linking developers and human factors researchers in the improvement of UAV systems and operations – a practice that is too often implemented only after a system is deployed and the problems are found. The experience of operators serves as a “user's account” of the issues and problems concerning the operation of UAVs. The fact that operators have had first hand experience in operating UAVs provides a unique perspective to the problem of identifying the most pressing human factors issues. The purpose of this chapter is to highlight the perspectives of two UAV operators that helped to set the tone for the entire First Annual Human Factors of UAVs Workshop.

Details

Human Factors of Remotely Operated Vehicles
Type: Book
ISBN: 978-0-76231-247-4

1 – 10 of 456