Search results

1 – 10 of 326
Content available
Book part
Publication date: 5 October 2017

Abstract

Details

Custard, Culverts and Cake
Type: Book
ISBN: 978-1-78743-285-7

Content available
Book part
Publication date: 22 April 2024

Rob Noonan

Abstract

Details

Capitalism, Health and Wellbeing
Type: Book
ISBN: 978-1-83797-897-7

Content available
Article
Publication date: 31 July 2009

J. Buckley, B. O'Flynn, J. Barton and S.C. O'Mathuna

The purpose of this paper is to develop a highly miniaturized wireless inertial sensor system based on a novel 3D packaging technique using a flexible printed circuit (FPC). The…

5159

Abstract

Purpose

The purpose of this paper is to develop a highly miniaturized wireless inertial sensor system based on a novel 3D packaging technique using a flexible printed circuit (FPC). The device is very suitable for wearable applications in which small size and lightweight are required such as body area network, medical, sports and entertainment applications.

Design/methodology/approach

Modern wireless inertial measurement units are typically implemented on a rigid 2D printed circuit board (PCB). The design concept presented here is based around the use of a novel planar, six‐faceted, crucifix or cross‐shaped FPC instead of a rigid PCB. A number of specific functional blocks (such as microelectromechanical systems gyroscope and accelerometer sensors, microcontroller (MCU), radio transceiver, antenna, etc.) are first assigned to each of the six faces which are each 1 cm2 in area. The FPC cross is then developed into a 1 cm3, 3D configuration by folding the cross at each of five bend planes. The result is a low‐volume and lightweight, 1 cm3 wireless inertial sensor that can sense and send motion sensed data wirelessly to a base station. The wireless sensor device has been designed for low power operation both at the hardware and software levels. At the base station side, a radio receiver is connected to another MCU unit, which sends received data to a personal computer (PC) and graphical user interface. The industrial, scientific and medical band (2.45 GHz) is used to achieve half duplex communication between the two sides.

Findings

A complete wireless sensor system has been realized in a 3D cube form factor using an FPC. The packaging technique employed during the work is shown to be efficient in fabricating the final cubic system and resulted in a significant saving in the final size and weight of the system. A number of design issues are identified regarding the use of FPC for implementing the 3D structure and the chosen solutions are shown to be successful in dealing with these issues.

Research limitations/implications

Currently, a limitation of the system is the need for an external battery to power the sensor system. A second phase of development would be required to investigate the possibility of the integration of a battery and charging system within the cube structure. In addition, the use of flexible substrate imposes a number of restrictions in terms of the ease of manufacturability of the final system due to the requirement of the required folding step.

Practical implications

The small size and weight of the developed system is found to be extremely useful in different deployments. It would be useful to further explore the system performance in different application scenarios such as wearable motion tracking applications. In terms of manufacturability, component placement needs to be carefully considered, ensuring that there is sufficient distance between the components, bend planes and board edges and this leads to a slightly reduced usable area on the printed circuit.

Originality/value

This paper provides a novel and useful method for realizing a wireless inertial sensor system in a 3D package. The value of the chosen approach is that a significant reduction in the required system volume is achieved. In particular, a 78.5 per cent saving in volume is obtained in decreasing the module size from a 25 to a 15 mm3 size.

Details

Microelectronics International, vol. 26 no. 3
Type: Research Article
ISSN: 1356-5362

Keywords

Content available
Article
Publication date: 21 March 2023

Abel Yeboah-Ofori and Francisca Afua Opoku-Boateng

Various organizational landscapes have evolved to improve their business processes, increase production speed and reduce the cost of distribution and have integrated their…

Abstract

Purpose

Various organizational landscapes have evolved to improve their business processes, increase production speed and reduce the cost of distribution and have integrated their Internet with small and medium scale enterprises (SMEs) and third-party vendors to improve business growth and increase global market share, including changing organizational requirements and business process collaborations. Benefits include a reduction in the cost of production, online services, online payments, product distribution channels and delivery in a supply chain environment. However, the integration has led to an exponential increase in cybercrimes, with adversaries using various attack methods to penetrate and exploit the organizational network. Thus, identifying the attack vectors in the event of cyberattacks is very important in mitigating cybercrimes effectively and has become inevitable. However, the invincibility nature of cybercrimes makes it challenging to detect and predict the threat probabilities and the cascading impact in an evolving organization landscape leading to malware, ransomware, data theft and denial of service attacks, among others. The paper explores the cybercrime threat landscape, considers the impact of the attacks and identifies mitigating circumstances to improve security controls in an evolving organizational landscape.

Design/methodology/approach

The approach follows two main cybercrime framework design principles that focus on existing attack detection phases and proposes a cybercrime mitigation framework (CCMF) that uses detect, assess, analyze, evaluate and respond phases and subphases to reduce the attack surface. The methods and implementation processes were derived by identifying an organizational goal, attack vectors, threat landscape, identification of attacks and models and validation of framework standards to improve security. The novelty contribution of this paper is threefold: first, the authors explore the existing threat landscapes, various cybercrimes, models and the methods that adversaries are deploying on organizations. Second, the authors propose a threat model required for mitigating the risk factors. Finally, the authors recommend control mechanisms in line with security standards to improve security.

Findings

The results show that cybercrimes can be mitigated using a CCMF to detect, assess, analyze, evaluate and respond to cybercrimes to improve security in an evolving organizational threat landscape.

Research limitations/implications

The paper does not consider the organizational size between large organizations and SMEs. The challenges facing the evolving organizational threat landscape include vulnerabilities brought about by the integrations of various network nodes. Factor influencing these vulnerabilities includes inadequate threat intelligence gathering, a lack of third-party auditing and inadequate control mechanisms leading to various manipulations, exploitations, exfiltration and obfuscations.

Practical implications

Attack methods are applied to a case study for the implementation to evaluate the model based on the design principles. Inadequate cyber threat intelligence (CTI) gathering, inadequate attack modeling and security misconfigurations are some of the key factors leading to practical implications in mitigating cybercrimes.

Social implications

There are no social implications; however, cybercrimes have severe consequences for organizations and third-party vendors that integrate their network systems, leading to legal and reputational damage.

Originality/value

The paper’s originality considers mitigating cybercrimes in an evolving organization landscape that requires strategic, tactical and operational management imperative using the proposed framework phases, including detect, assess, analyze, evaluate and respond phases and subphases to reduce the attack surface, which is currently inadequate.

Details

Continuity & Resilience Review, vol. 5 no. 1
Type: Research Article
ISSN: 2516-7502

Keywords

Content available
Book part
Publication date: 24 February 2022

Ayodeji E. Oke, Seyi S. Stephen and Clinton O. Aigbavboa

Abstract

Details

Value Management Implementation in Construction
Type: Book
ISBN: 978-1-80262-407-6

Content available
Book part
Publication date: 25 July 2019

Abstract

Details

Strategies for Facilitating Inclusive Campuses in Higher Education: International Perspectives on Equity and Inclusion
Type: Book
ISBN: 978-1-78756-065-9

Content available
Book part
Publication date: 29 November 2014

Abstract

Details

Inquiry-based Learning for Faculty and Institutional Development: A Conceptual and Practical Resource for Educators
Type: Book
ISBN: 978-1-78441-235-7

Open Access
Article
Publication date: 26 May 2022

James Lappeman, Michaela Franco, Victoria Warner and Lara Sierra-Rubia

This study aims to investigate the factors that influence South African customers to potentially switch from one bank to another. Instead of using established models and survey…

2587

Abstract

Purpose

This study aims to investigate the factors that influence South African customers to potentially switch from one bank to another. Instead of using established models and survey techniques, the research measured social media sentiment to measure threats to switch.

Design/methodology/approach

The research involved a 12-month analysis of social media sentiment, specifically customer threats to switch banks (churn). These threats were then analysed for co-occurring themes to provide data on the reasons customers were making these threats. The study used over 1.7 million social media posts and focused on all five major South African retail banks (essentially the entire sector).

Findings

This study concluded that seven factors are most significant in understanding the underlying causes of churn. These are turnaround time, accusations of unethical behaviour, billing or payments, telephonic interactions, branches or stores, fraud or scams and unresponsiveness.

Originality/value

This study is unique in its measurement of unsolicited social media sentiment as opposed to most churn-related research that uses survey- or customer-data-based methods. In addition, this study observed the sentiment of customers from all major retail banks across 12 months. To date, no studies on retail bank churn theory have provided such an extensive perspective. The findings contribute to Susan Keaveney’s churn theory and provide a new measurement of switching threat through social media sentiment analysis.

Details

Journal of Consumer Marketing, vol. 39 no. 5
Type: Research Article
ISSN: 0736-3761

Keywords

Open Access
Book part
Publication date: 29 July 2019

Isabel Fróes

Abstract

Details

Young Children’s Play Practices with Digital Tablets
Type: Book
ISBN: 978-1-78756-705-4

Content available
Book part
Publication date: 21 July 2022

Ian Ruthven

Abstract

Details

Dealing With Change Through Information Sculpting
Type: Book
ISBN: 978-1-80382-047-7

1 – 10 of 326