Search results

1 – 10 of 47
Article
Publication date: 1 June 2008

Guy Daly, Annette Roebuck, Jennifer Dean, Fiona Goff, Martin Bollard and Clare Taylor

This article presents the findings of an evaluation of the impact on service users of a local authority's individual budgets pilot. The local authority has pursued an…

Abstract

This article presents the findings of an evaluation of the impact on service users of a local authority's individual budgets pilot. The local authority has pursued an outcomes‐focused approach to care planning. The research findings suggest that these service users and their families see individual budgets as a very positive development. Service users have been able to gain greater control over their lives, not least in that they are able to determine to a much greater extent how they have their needs met. This facilitates service users' general growth and development, such that they are able to engage more fully and on a more equal footing as part of their families and communities. However, there remain a number of challenges that need to be addressed if individual budgets, or personal budgets generally, are to be rolled out successfully across adult social and health care.

Details

Journal of Integrated Care, vol. 16 no. 3
Type: Research Article
ISSN: 1476-9018

Keywords

Article
Publication date: 28 December 2021

Craig Proctor-Parker and Riaan Stopforth

The purpose of the research has been the primary consideration and evaluation of a cost effective, reliable, robust and simple process of radio frequency identification…

139

Abstract

Purpose

The purpose of the research has been the primary consideration and evaluation of a cost effective, reliable, robust and simple process of radio frequency identification (RFID)-based stock control, asset management and monitoring of concrete safety bollards used in the road environment. Likewise, the consideration of the use of the same system and technology to other items in and around the general road infrastructure.

Design/methodology/approach

The research approach undertaken has been an evaluation of the use of currently available RFID technology, with a key emphasis on low cost, ease of use, reliability and convenience. Practical field exercises completed in considering the relevant RFID tags and readers and associated software and apps and necessary software integration and development have been undertaken. At the same time, evaluating the specific limits created in the specific environment is being applied. Of particular interest has been the use of a moving scan in a vehicle drive-through or pass-bye, type reading system. This has been determined to be viable and completely practical, drastically reducing the key issue of time-taken. Practical application of the system from idea to real life application has been undertaken. The integration of the use of the RFID tag and reader system with necessary and related software to database upload and storage has been established. The creation of an online facility to allow the appropriate use of the data and to include the convenient output of an asset report has been undertaken.

Findings

The findings have provided the necessary insight confirming the use of RFID technology as a simple yet reliable, cost effective and adaptable stock control, asset management and geo-locating system in the road environment. The use of such systems in this particular environment is in its infancy, and is perhaps novel and original in the specific aspect of using the system to stock control, manage and monitor road safety concrete bollards and other roadside objects in the road environment.

Originality/value

To establish if in fact, stock control geo-locating can be reliably undertaken with the use of RFID tags and readers in the specific road and road construction environment, particularly with the use of moving RFID reading of passive tags. To establish the minimum requirements of a field usable RFID tag and reader, specifically applicable to the concrete safety bollards, however to other roadside furniture. To identify the minimum requirements of a function, simple app to minimise general requirements of the overall stock control and monitoring of the RFID-tagged objects. To establish the possibility of reading the tag data, global positioning system (GPS) location and video imaging footage as a single operation function. To determine the basic parameters or limits of the GPS geo-locating, on the proposed products selected and overall system. To determine the current best practice in respect of reasonable accuracy and detail in relation to price considerations to a fully function stock control and monitoring system. To identify the minimum requirements of an online database to receive, house and provide ongoing access to and report on the data. To identify the key differences and benefits between traditional stock control and monitoring systems, against that of proposed RFID tag, read and geo-locating system.

Details

Journal of Engineering, Design and Technology , vol. 22 no. 1
Type: Research Article
ISSN: 1726-0531

Keywords

Abstract

Details

Learning from International Public Management Reform: Part A
Type: Book
ISBN: 978-0-7623-0759-3

Abstract

Details

Public Policy and Governance Frontiers in New Zealand
Type: Book
ISBN: 978-1-83867-455-7

Book part
Publication date: 19 March 2024

Noah McClain

In the mid-2000s, the operator of New York City’s mass transit network committed more than a half-billion dollars to military contractor Lockheed Martin for a security technology…

Abstract

In the mid-2000s, the operator of New York City’s mass transit network committed more than a half-billion dollars to military contractor Lockheed Martin for a security technology capable, in part, of inferring threats based on analysis of data streams, of developing response strategies, and taking automated action toward alerts and calamities in light of evolving circumstances. The project was a failure. This chapter explores the conceptualization and development of this technology – rooted in cybernetics – and compares its conceptual underpinnings with some situated problems of awareness, communication, coordination, and action in emergencies as they unfold in one of the busiest transport systems in the world, the New York subway. The author shows how the technology, with all the theatrical trappings of a “legitimate” security solution, was apparently conceived without a grounded understanding of actual use-cases, and the degree to which the complex interactions which give rise to subway emergency can be anticipated in – and therefore managed through – a technological system. As a case-study, the chapter illustrates the pitfalls of deploying technology against problems which are not well-defined in the first place, to the neglect of investments against much more fundamental problems – such as inadequate communication systems, and unstable relationships with emergency response agencies – which might offer guaranteed benefits, and indeed lay a firm groundwork for future deployment of more ambitious technology.

Details

Technology vs. Government: The Irresistible Force Meets the Immovable Object
Type: Book
ISBN: 978-1-83867-951-4

Keywords

Book part
Publication date: 12 September 2017

Margaret Arblaster

The concept of light-handed regulation, including light-handed approaches to the regulation of airport services, is discussed. The rationale for the economic regulation of airport…

Abstract

The concept of light-handed regulation, including light-handed approaches to the regulation of airport services, is discussed. The rationale for the economic regulation of airport services and the traditional approaches used for economic regulation of airport charges are summarized. The evolution of international practice of light-handed regulation is outlined, including the experience with minimal regulation across monopoly industries in New Zealand and the acceptance of “negotiated settlements” in utility industries in North America. General reasons for moving to light-handed regulation of airports include the disadvantages of the price cap approach in practice and the benefits of facilitating greater negotiation between airports and users. Comparisons are made between alternative approaches to light-handed regulation of airport services, including price and quality of service monitoring, information disclosure regulation and negotiate-arbitrate regulation, approaches that have been applied to airport services in Australia and New Zealand. The role and nature of the incentives under each approach are discussed. The chapter concludes that whether light-handed regulation provides a suitable alternative approach to direct regulation depends on the market circumstances and the design characteristics of the light-handed approach.

Details

The Economics of Airport Operations
Type: Book
ISBN: 978-1-78714-497-2

Keywords

Article
Publication date: 1 January 1996

John E. White, Matthew J. Gorton and Ian Chaston

The growing importance of small‐ and medium‐sized enterprises (SMEs) in high‐technology innovation and the importance of innovation in maintaining competitive advantage has been…

Abstract

The growing importance of small‐ and medium‐sized enterprises (SMEs) in high‐technology innovation and the importance of innovation in maintaining competitive advantage has been acknowledged. The possibilities of co‐operation between high‐technology SMEs as a mechanism for enhancing individual firm growth is considered. The current stock of empirical evidence on high‐technology SMEs is outlined and the fact that few small firms achieve substantial growth highlighted. The major barriers to growth which lie behind this outcome are considered. The possibilities of networking, in its various forms, are considered as a facilitating medium for aiding business growth, with particular attention paid to high intensity co‐operative arrangements. The need for heterogeneous skill possession is emphasized, and how environments comprising homogeneous core competencies make networking an inappropriate solution for business growth. The existing empirical data on SME networking is considered and the relative costs and benefits of membership tabulated on the basis of network type. This leads on to an analysis of how beneficial, long‐term arrangements between actors may not occur in the market because of short‐term risks associated with other party(ies) defecting, as can be modelled within a prisoner's dilemma game theory structure. The final section discusses the possible role for network brokers in lessening these risks and aiding the development of mutually beneficial, growth‐oriented relationships between high‐technology SMEs.

Details

Journal of Small Business and Enterprise Development, vol. 3 no. 1
Type: Research Article
ISSN: 1462-6004

Article
Publication date: 14 July 2023

Gazi Mahabubul Alam and Md. Abdur Rahman Forhad

This study examines whether education in developing countries directly impacts their foreign income from the top export sector.

Abstract

Purpose

This study examines whether education in developing countries directly impacts their foreign income from the top export sector.

Design/methodology/approach

As most developing countries follow developed nations to shape their development, this study assumes developing countries as education-follower and developed countries as education-leader countries. Considering selected countries from the South Asian Regional Cooperation (SAARC) and African countries as follower countries and Group of Seven (G7) as leader countries, this study employs Dumitrescu-Hurlin Granger non-causality tests.

Findings

This study finds that education-follower countries' achievements do not directly impact foreign earnings from their leading export sectors. However, findings also confirm that leader countries have a bidirectional causal relationship between tertiary education and earnings from high technology exports.

Originality/value

To the best of the authors' knowledge, this is the first study urging research-intensive education with comparative advantages in international trade. Using educational attainment on export earnings from the leading sector, findings support dependency theory in education is still existed.

Details

International Journal of Comparative Education and Development, vol. 25 no. 2
Type: Research Article
ISSN: 2396-7404

Keywords

Article
Publication date: 1 February 2013

Alexandros Paraskevas

Although the threat of terrorist attacks is not a new phenomenon for hotels, limited literature exists on measures that hotels can take to prevent them or limit their damage. The…

4410

Abstract

Purpose

Although the threat of terrorist attacks is not a new phenomenon for hotels, limited literature exists on measures that hotels can take to prevent them or limit their damage. The purpose of this paper is to propose a baseline strategy to address this threat.

Design/methodology/approach

Using the terrorist attack cycle and the security function models introduced in this paper, 19 hotel security experts, members of an international working group on terrorism, were tasked to reach consensus on a baseline anti‐terrorist strategy for a hotel. To reach this consensus, the study employed the Nominal Group Technique.

Findings

The study presents a six‐step baseline anti‐terrorism strategy and a series of measures and actions under each step. In the centre of this strategy lies the disruption of the terrorist attack cycle.

Research limitations/implications

There are limitations inherent to the Nominal Group Technique which may not allow the generalizability of the findings. However, every effort was made to ensure the reliability and validity of the study.

Practical implications

The study suggests a shift from physical protection alone to a more intelligence‐led approach. Counter‐surveillance, terrorist behavioral analysis, higher visibility of security measures, stronger relationships with local community leaders, collaborative relationships with emergency response agencies and strategic use of risk intelligence providers will have to take a higher place in the agendas of hotel security departments.

Originality/value

The paper presents, for the first time, two models that industry practitioners will find useful when designing security policies: the terrorist attack cycle and the security function model. Each component of the proposed strategy provides a starting point for the design of security strategies tailored on the security needs and budget of any hotel property.

Details

International Journal of Contemporary Hospitality Management, vol. 25 no. 1
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 1 November 2001

Ross Prizzia

Provides a synthesis and critical evaluation of the results of existing research on privatization utilizing an international review and comparative analysis of relevant factors of…

3132

Abstract

Provides a synthesis and critical evaluation of the results of existing research on privatization utilizing an international review and comparative analysis of relevant factors of economic and social performance. Based on the results of this analysis, it appears that the economic benefits of privatization activities promoted as a panacea by many public and private sector managers, are on average modest at best, while the social benefits are often mixed and uneven. Moreover, it seems that the role of privatization as a means of reforming the public sector has expanded internationally in scope and at such a rapid pace, that in many cases, the importance of objective and balanced measures of its overall effectiveness and impact on the affected communities need to be reexamined. Recommends that those responsible for planning of future privatization activities should refocus the present economic emphasis and strive for a balance of economic and social performance to improve long‐term benefits for all sectors of the affected communities.

Details

International Journal of Public Sector Management, vol. 14 no. 6
Type: Research Article
ISSN: 0951-3558

Keywords

1 – 10 of 47