Search results
1 – 10 of over 18000Alan D. Smith and John S. Clark
To provide practitioners of information management with an overview and framework to explore the various controversies associated with the methods of traditional methods of voting…
Abstract
Purpose
To provide practitioners of information management with an overview and framework to explore the various controversies associated with the methods of traditional methods of voting with electronically enhanced voting via the internet (I‐voting). The current paper is centered on the assumption that I‐voting is the next logical step in applying online information‐gathering and retrieval technologies to the field of e‐government.
Design/methodology/approach
A review of the applied literature on electronically enhanced voting methods with potentials associated with internet voting, as well as from practical experience, resulted in a basic model for discussion of the emergent nature of I‐voting.
Findings
I‐voting would reduce the cost for staffing polling stations, and also the funds needed to pay for voting machines. I‐voting could also reduce the number of errors made by both the voters and the electoral administrators, and allow for easier adoption of uniform standards in the ballot format, since it could be transmitted via the internet from a central election agency to all local and regional polling places. Bridging the digital divide and internet security issues may be the most important barriers that must be overcome if I‐voting becomes a viable option in the USA.
Research limitations/implications
It may be years, if ever, before a truly secure, relatively risk‐free internet service, such as I‐voting, is developed. However, despite the controversies associated with election fraud, the numerous current voting systems that are in place suffer from the same problems associated with online informational exchanges; but, for the most part, nations still conduct their businesses and the political systems are still relatively stable.
Practical implications
Owing to recent voting débâcles in the USA, the public is demanding a more reliable and secure method of voting. Currently, many nations are moving more toward electronically enhanced voting methods with the long‐term goal being internet voting. Unfortunately, there are heated debates about the pros and cons of handing over the right to vote, using a system that is prone to security risks from outside sources.
Originality/value
In the short term, there should be increased interest in establishing national and international standards for testing and certification of electronic and I‐voting systems and their IT‐infrastructure. It is a basic premise of the present study that voting online increases voter participation, which can only be viewed in a positive light.
Details
Keywords
Abstract
Details
Keywords
Sang‐Hoon Kong, Jaehong Park, Young‐Geun Han, Gibom Kim and Kyo‐Il Lee
This paper presents an Internet‐based virtual machining system which applies virtual manufacturing technology to machining processes of CNC machining center. The system is…
Abstract
This paper presents an Internet‐based virtual machining system which applies virtual manufacturing technology to machining processes of CNC machining center. The system is implemented to execute digital machining and verification, to transmit the NC code data to related machining centers after confirming the properness of virtual machining, and to manipulate the machine through the Internet. Also, this research proposes a basic structure that can monitor the status of machines via the Internet. By applying simulation techniques for machining processes, a simple manipulation and monitoring system of machining centers is realized. This entire system is constructed by adopting the latest information technology such as object‐oriented method, middleware, Internet programming, and client‐server structure.
Details
Keywords
Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange…
Abstract
Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange for Auto Parts procurement by GM, Ford, Daimler‐Chrysler and Renault‐Nissan. Provides many case studies with regards to the adoption of technology and describes seven chief technology officer characteristics. Discusses common errors when companies invest in technology and considers the probabilities of success. Provides 175 questions and answers to reinforce the concepts introduced. States that this substantial journal is aimed primarily at the present and potential chief technology officer to assist their survival and success in national and international markets.
Details
Keywords
Elham Ali Shammar and Ammar Thabit Zahary
Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by…
Abstract
Purpose
Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by enabling connections between smart objects and humans, and also between smart objects themselves, which leads to anything, anytime, anywhere, and any media communications. IoT allows objects to physically see, hear, think, and perform tasks by making them talk to each other, share information and coordinate decisions. To enable the vision of IoT, it utilizes technologies such as ubiquitous computing, context awareness, RFID, WSN, embedded devices, CPS, communication technologies, and internet protocols. IoT is considered to be the future internet, which is significantly different from the Internet we use today. The purpose of this paper is to provide up-to-date literature on trends of IoT research which is driven by the need for convergence of several interdisciplinary technologies and new applications.
Design/methodology/approach
A comprehensive IoT literature review has been performed in this paper as a survey. The survey starts by providing an overview of IoT concepts, visions and evolutions. IoT architectures are also explored. Then, the most important components of IoT are discussed including a thorough discussion of IoT operating systems such as Tiny OS, Contiki OS, FreeRTOS, and RIOT. A review of IoT applications is also presented in this paper and finally, IoT challenges that can be recently encountered by researchers are introduced.
Findings
Studies of IoT literature and projects show the disproportionate importance of technology in IoT projects, which are often driven by technological interventions rather than innovation in the business model. There are a number of serious concerns about the dangers of IoT growth, particularly in the areas of privacy and security; hence, industry and government began addressing these concerns. At the end, what makes IoT exciting is that we do not yet know the exact use cases which would have the ability to significantly influence our lives.
Originality/value
This survey provides a comprehensive literature review on IoT techniques, operating systems and trends.
Details
Keywords
Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some…
Abstract
Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some legal aspects concerning MNEs, cyberspace and e‐commerce as the means of expression of the digital economy. The whole effort of the author is focused on the examination of various aspects of MNEs and their impact upon globalisation and vice versa and how and if we are moving towards a global digital economy.
Details
Keywords
Internet‐based robotic systems have received much attention in recent years. A number of design issues are essential for designing this new type of robotic systems. This paper…
Abstract
Internet‐based robotic systems have received much attention in recent years. A number of design issues are essential for designing this new type of robotic systems. This paper addresses the Internet time delay, the user interface design and concurrent user access for an Internet‐enabled arm robot. The implementation and application of the Internet‐enabled arm robot in an open control laboratory has been illustrated as a case study.
Details
Keywords
Allen Y. Chang, Yu-Yung Li, Min-Hsiung Hung and Ting-Fan Yen
The purpose of this paper is to describe the development of a novel mobile monitoring and control (MC) framework with active-push and plug-and-play capabilities. This proposed…
Abstract
Purpose
The purpose of this paper is to describe the development of a novel mobile monitoring and control (MC) framework with active-push and plug-and-play capabilities. This proposed framework is particularly designed to addresses the shortcomings of the traditional factory MC systems in sharing information over the internet, protecting the system security, delivering warning messages, and deploying monitoring points.
Design/methodology/approach
By leveraging web service technology, mobile devices, and wireless communication, this paper describes the methodology and approach for designing a MC server, a wireless monitoring module (WMM), an intelligent v-Machine, two active-push mechanisms, a pocket PC application, and a smart phone application.
Findings
The designed WMM enables the monitoring points to be deployed in a mobile manner. The proposed mobile MC framework (MMCF) can timely detect abnormalities of appliances and equipment and turn off appliances in dangerous situations through WMM. It can also instantly deliver various warning contents to the mobile devices carried by the responsible persons. The v-Machine is built based on virtual metrology (VM) technology and can predict production precision of machined workpieces.
Research limitations/implications
With the successful design and testing of the novel MMCF, this framework can obviously be used for many more applications and developments.
Practical implications
The authors' implement a factory MC system based on the proposed framework and conduct various integration tests on two electric appliances and a practical CNC machine tool in a factory. Testing results shows that the factory MC system works smoothly according the design goals and can overcome the shortcomings of traditional factory MC systems. The MC system also presents good performances, instantly delivering warning contents with a size ranging from 1K bytes to 10M bytes to the users within few seconds.
Social implications
The proposed MMCF exploits various automation technologies to detect equipment's abnormalities, reduce the rate of product defects caused by human errors, reinforce security, prevent accidents, and ensure the safety of operations.
Originality/value
The proposed MMCF can effectively promote existing factory MC systems to achieve the merits of mobile MC, which is a unique contribution of this work, compared to previous studies. The results of this study can be applied to a variety of industrial automation applications, including factory automation and assembly automation.
Details