Search results

1 – 10 of 586

Abstract

Details

Information Services for Innovative Organizations
Type: Book
ISBN: 978-0-12465-030-5

Abstract

Details

Airport Design and Operation
Type: Book
ISBN: 978-1-78441-869-4

Book part
Publication date: 13 January 2010

Tony Kazda and Bob Caves

Abstract

Details

Airport Design and Operation
Type: Book
ISBN: 978-0-08-054643-8

Book part
Publication date: 20 November 2023

Surjeet Dalal, Bijeta Seth and Magdalena Radulescu

Customers today expect businesses to cater to their individual needs by tailoring the products they purchase to their own preferences. The term “Industry 5.0” refers to a new wave…

Abstract

Customers today expect businesses to cater to their individual needs by tailoring the products they purchase to their own preferences. The term “Industry 5.0” refers to a new wave of manufacturing that aims to meet each customer's unique demands. Even while Industry 4.0 allowed for mass customization, that wasn't good enough before, customers today demand individualized products at scale, and Industry 5.0 is driving the transition from mass customization to mass personalization to meet these demands. It caters to the individual needs of each consumer by meeting their demands. More specialized components for use in medicine are made possible by the widespread customization made possible by Industry 5.0. These individualized parts are included into the medical care of the patient to meet their specific needs and preferences. In the current medical revolution, an enabling technology of Industry 5.0 can produce medical implants, artificial organs, bodily fluids, and transplants with pinpoint accuracy. With the advent of AI-enabled sensors, we now live in a world where data can be swiftly analyzed. Machines may be programmed to make complex choices on the fly. In the medical field, these innovations allow for exact measurement and monitoring of human body variables according to the individual's needs. They aid in monitoring the body's response to training for peak performance. It allows for the digital dissemination of accurate healthcare data networks. In order to collect and exchange relevant patient data, every equipment is online.

Details

Digitalization, Sustainable Development, and Industry 5.0
Type: Book
ISBN: 978-1-83753-191-2

Keywords

Book part
Publication date: 3 November 2014

Daniel Trottier

Social media platforms, along with networked devices and applications, enable their user base to produce, access and circulate large volumes of data. On the one hand, this…

Abstract

Purpose

Social media platforms, along with networked devices and applications, enable their user base to produce, access and circulate large volumes of data. On the one hand, this development contains an empowering potential for users, who can make otherwise obscured aspects of social life visible, and coordinate social action in accordance. Yet the preceding activities in turn render these users visible to governments as well as the multinational companies that operate these services. Between these two visions lie more nuanced accounts of individuals coordinating via social data for reactionary purposes, as well as policing and intelligence agencies struggling with the affordances of big data.

Design/methodology/approach

This chapter considers how individual users as well as police agencies respectively actualise the supposedly revolutionary and repressive potentials associated with big data. It briefly considers the broader social context in which ‘big data’ is situated, which includes the hardware, software, individuals and cultural values that render big data meaningful and useful. Then, in contrast to polarising visions of the social impact of big data, it considers two sets of practices that speak to a more ambivalent potentiality. First, recent examples suggest a kind of crowd-sourced vigilantism, where individuals rely on ubiquitous data and devices in order to reproduce law and order politics. Second, police agencies in various branches of European governments report a sense of obligation to turn to social data as a source of intelligence and evidence, yet attempts to do so are complicated by both practical and procedural challenges. A combination of case studies and in-depth interviews offers a grounded understanding of big data in practice, in contrast to commonly held visions of these technologies.

Findings

First, big data is only ever meaningful in use. While they may be contained in databases in remote locations, big data do not exist in a social vacuum. Their impact cannot be fully understood in the context of newly assembled configurations or ‘game-changing’ discourses. Instead, they are only knowable in the context of existing practices. These practices can initially be the sole remit of public discourse shaped by journalists, tech-evangelists and even academics. Yet embodied individual and institutional practices also emerge, and this may contradict or at least complicate discursive assertions. Secondly, the range of devices and practices that make up big data are engaged in a bilateral relation with these practices. They may be a platform to further reproduce relations of information exchange and power relations. Yet they may also reconfigure these relations.

Research limitations/implications

This research is limited to a sample of respondents based in the European Union, and based at a particular stage of big data and social media monitoring uptake. Subsequent research should look at how this uptake is occurring elsewhere, along with the medium to long-term implications of big data monitoring. Finally, subsequent research should consider how citizens and other social actors are coping with these emerging practices.

Originality/value

This chapter considers practices associated with big data monitoring and draws from cross-national empirical data. It stands in contrast to overly optimistic as well as well as totalising accounts of the social costs and consequences of big data. For these reasons, this chapter will be of value to scholars in internet studies, as well as privacy advocates and policymakers who are responsive to big data developments.

Details

Big Data? Qualitative Approaches to Digital Research
Type: Book
ISBN: 978-1-78441-050-6

Keywords

Book part
Publication date: 1 November 2007

Irina Farquhar and Alan Sorkin

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative…

Abstract

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative information technology open architecture design and integrating Radio Frequency Identification Device data technologies and real-time optimization and control mechanisms as the critical technology components of the solution. The innovative information technology, which pursues the focused logistics, will be deployed in 36 months at the estimated cost of $568 million in constant dollars. We estimate that the Systems, Applications, Products (SAP)-based enterprise integration solution that the Army currently pursues will cost another $1.5 billion through the year 2014; however, it is unlikely to deliver the intended technical capabilities.

Details

The Value of Innovation: Impact on Health, Life Quality, Safety, and Regulatory Research
Type: Book
ISBN: 978-1-84950-551-2

Book part
Publication date: 22 August 2022

Emily S. Miles and Kellee J. Cole

In March 2020, we opened our classrooms to students, parents, and the world. Zoom and Google Meet became the new spaces to gather as regular check-ins with students and families…

Abstract

In March 2020, we opened our classrooms to students, parents, and the world. Zoom and Google Meet became the new spaces to gather as regular check-ins with students and families became the norm. Educators served students through a two-way window where we previously only saw them in the school setting and now with the use of technology, could literally see into their homes. It is evident to many that inequities exist among the students and families that we serve, and our efforts to care them focused on social-emotional learning and supporting their well-being. While many see the challenges that the pandemic brought, there were also many opportunities that came about, including the use of core values which helped guide us through uncertainty. The need for human connection became a clear factor when we were not able to be together physically. Connecting with students and families on an authentic, deeper level, shifted how we think about school leadership and improving schools. The mindset transitioning to our ability to teach in schools and communities, not just in a physical classroom, became one of our guiding principles. Across the United States, school districts’ instructional directives varied greatly. In our district, leaders came together to create virtual lessons to be available for all students. Our focus was to support educational equity and to give students opportunities to engage with grade level curriculum at any time of day (or night).

Details

Schoolchildren of the COVID-19 Pandemic: Impact and Opportunities
Type: Book
ISBN: 978-1-80262-742-8

Keywords

Abstract

Details

Occupational Therapy With Older People into the Twenty-First Century
Type: Book
ISBN: 978-1-83753-043-4

Book part
Publication date: 19 July 2023

Samrat Ray, Elena Viktorovna Korchagina, Rohini U. Nikam and Roop Kishore Singhal

This chapter proposes a new architecture to address challenges to security and the privacy in e-healthcare under Industry 5.0. With the growing needs for high-quality medical…

Abstract

This chapter proposes a new architecture to address challenges to security and the privacy in e-healthcare under Industry 5.0. With the growing needs for high-quality medical treatment and the continuously growing costs of treating global medical problems, systems and web-based medical care are regarded as innovative solutions. In particular, the new progress in Internet of Things (IoT) has led to the development of Internet of Medical Things (IoMT). The patient history data is handled and processed remotely in real-time rather than visiting any clinic and then having that data transferred for subsequent use to third parties, such as data that gets saved in the cloud. This patient data faced security threats and it is observed as major limitations of using such systems in Industry 5.0. This chapter analyzes the security and secrecy challenges, together with the necessities, the danger involved and proposed secured blockchain-based framework which is capable of future research scope in Industry 5.0. The study has described an Eye Hospital case study that stores the eye donors’ details. With such critical scenario, this study addresses healthcare scenario with poverty-led agenda and social developmental features.

Details

Inclusive Developments Through Socio-economic Indicators: New Theoretical and Empirical Insights
Type: Book
ISBN: 978-1-80455-554-5

Keywords

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

1 – 10 of 586