Search results

1 – 10 of over 14000
Article
Publication date: 17 September 2019

Jeong Hoon Jo, Shailendra Rathore, Vincenzo Loia and Jong Hyuk Park

The purpose of this paper is to propose a trusted security zone architecture that uses a blockchain technology to provide secure sharing of data in the security zone while…

532

Abstract

Purpose

The purpose of this paper is to propose a trusted security zone architecture that uses a blockchain technology to provide secure sharing of data in the security zone while maintaining the integrity, confidentiality and availability of data. The blockchain uses a distributed network to ensure data availability and uses public ledgers to ensure the integrity and confidentiality of data.

Design/methodology/approach

The proposed architecture uses a blockchain technology to provide secure sharing of data in the security zone while maintaining the integrity, confidentiality and availability of data. The blockchain uses a distributed network to ensure data availability and uses public ledgers to ensure the integrity and confidentiality of data.

Findings

Analysis of the proposed architecture with a use case scenario demonstrates that it provides a robust security measure against unauthorized network intrusions.

Originality/value

Unlike the existing security zone, this paper adopts a method of storing data by using blockchain. It meets the need to study integrated authentication management methods of future research.

Details

The Electronic Library, vol. 37 no. 5
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 13 December 2017

Philip Long, Christine Chevallereau, Damien Chablat and Alexis Girin

The installation of industrial robots requires security barriers, a costly, time-consuming exercise. Collaborative robots may offer a solution; however, these systems only comply…

Abstract

Purpose

The installation of industrial robots requires security barriers, a costly, time-consuming exercise. Collaborative robots may offer a solution; however, these systems only comply with safety standards if operating at reduced speeds. The purpose of this paper is to describe the development and implementation of a novel security system that allows human–robot coexistence while permitting the robot to execute much of its task at nominal speed.

Design/methodology/approach

The security system is defined by three modes: a nominal mode, a coexistence mode and a gravity compensation mode. Mode transition is triggered by three lasers, two of which are mechanically linked to the robot. These scanners create a dynamic envelope around the robot and allow the detection of operator presence or environmental changes. To avoid velocity discontinuities between transitions, the authors propose a novel time scaling method.

Findings

The paper describes the system’s mechanical, software and control architecture. The system is demonstrated experimentally on a collaborative robot and is compared with the performance of a state-of-art security system. Both a qualitative and quantitative analysis of the new system is carried out.

Practical implications

The mode transition method is easily implemented, requires little computing power and leaves the trajectories unchanged. As velocity discontinuities are avoided, motor wear is reduced. The execution time is substantially less than a commercial alternative. These advantages can lead to economic benefits in high-volume manufacturing environments.

Originality/value

This paper proposes a novel system that is based on industrial material but can generate dynamic safety zones for a collaborative robot.

Details

Industrial Robot: An International Journal, vol. 45 no. 2
Type: Research Article
ISSN: 0143-991X

Keywords

Article
Publication date: 3 October 2019

Cagri Sanliturk

The purpose of this paper is to use Foucault’s genealogical analysis to problematise the influence of political agreements and resolutions on Cypriots’ social life and to examine…

Abstract

Purpose

The purpose of this paper is to use Foucault’s genealogical analysis to problematise the influence of political agreements and resolutions on Cypriots’ social life and to examine spatial practices. At the same time, this paper deals with the implications of the UN’s vision for Pyla in Cyprus as a prototype of integrity and bi-communality. Furthermore, it analyses and problematises the UN mandate system in order to challenge “peace-keeping” strategies.

Design/methodology/approach

This investigation has been achieved through the author’s experience of situating and being in the site as well as through conducting site-specific interventions, performances, walking, observations, writing and interviews. Adding to these analytical methods, the involvement of the feminist theories in different ways allowed author to be more critical, reflexive and personal. In addition, the author critically analyses legal documents such as the Cyprus Constitution and the UN’s reports, documents and resolutions in order to understand the connection between politics and accordingly the creation of space.

Findings

This embedded critical spatial research into the in-between village Pyla establishes a new methodological understanding for design interventions that do not target a solution but, by implementing a reflexive practice, they create resistance practices. Focusing on these practices should allow a critical reflection on the previously applied urban development programs and their impact on Pyla and other cities and villages in Cyprus. The findings and outcomes that are presented through this research can be used by different powers for a critical reflection on the role of design in conflict situations.

Research limitations/implications

One of the limitations of this research has been the lack of direct contact with the Greek Cypriot inhabitants of the village in order to understand their specific views on the conflict and their participation in the everyday life of the village. One of the reasons for this has been the differences in language which has made it difficult to approach the citizens and discuss their struggles as they would not necessarily confine in an outsider. Nonetheless, the author has tried to capture Greek Cypriot views in the circumstances of the UN and authorities meeting and, where possible has relied on literature to guide the understanding of the village life and Greek Cypriot role in it.

Originality/value

The author’s critical reflection on the unification-focused resolution strategies for the divided Cyprus (created by the UN, academics and architects) established the unique strength of this research paper. This research does not perceive the Cyprus conflict and its division as a problem, instead, it recognises the conflict and works within its division in order to understand the hidden political transformations, powers, appreciations and practices which become subordinate to the conflict. Different practices challenge the idea behind the normalisation processes that the UN aimed to achieve and reacts to those who came up with unification strategies; nonetheless, this should open new visions in the negotiations between the different powers.

Details

Archnet-IJAR: International Journal of Architectural Research, vol. 13 no. 3
Type: Research Article
ISSN: 2631-6862

Keywords

Article
Publication date: 10 July 2020

Hafize Yılmaz and Özgür Kabak

Locating disaster response centers is one of the key elements of efficient relief operations. The location and infrastructure of the candidate facilities usually conform to the…

Abstract

Purpose

Locating disaster response centers is one of the key elements of efficient relief operations. The location and infrastructure of the candidate facilities usually conform to the required criteria at different levels. This study aims to identify the criteria for the main and local distribution center location problem separately and prioritize each candidate distribution center using a hybrid multiple criteria decision-making approach.

Design/methodology/approach

The proposed model incorporates analytic hierarchy process (AHP) and Technique for Order Preference by Similarity to Ideal Solutions (TOPSIS) under interval type-2 fuzzy sets (IT2FSs) to overcome the uncertainty of experts` judgments and expressions in the evaluations of candidate distribution centers. In the proposed approach, weights of the criteria are determined using type-2 fuzzy AHP and the candidate distribution centers are prioritized using type-2 fuzzy TOPSIS.

Findings

Transportation, cost, infrastructure and security are determined as the main criteria for the main distribution center location criteria. Cost, warehouse facilities and security are the main criteria for local distribution center location selection. Prioritization enables decision-makers to assess each alternative accordingly to be able to select the best locations/facilities for efficient disaster response operations.

Originality/value

This study proposes new multi-criteria decision support models for prioritizing disaster response distribution centers. IT2FSs are used to be able to reflect both the complexity and vagueness of disaster environment and expert opinions. Different support models are suggested for main and local distribution centers considering their different missions. The proposed methodology is applied in Istanbul city, Turkey, where a high-magnitude earthquake is expected.

Details

Journal of Enterprise Information Management, vol. 33 no. 5
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 2 July 2020

Asif Iqbal Dawar

The purpose of this paper is to explain the significance of contextually localized strategies and to engage researchers in critical reflection about the ethical dilemmas of…

Abstract

Purpose

The purpose of this paper is to explain the significance of contextually localized strategies and to engage researchers in critical reflection about the ethical dilemmas of researching in volatile situations.

Design/methodology/approach

Based on 14 months of research experience, the paper reflects on the challenges and difficulties in qualitative data collection through conventional methodology in dangerous fields.

Findings

The paper argues that conventional methodology and the established codes of ethics and their guidelines certainly provide a useful starting point but each dangerous setting requires different localized approaches whereas ethics need to be considered as a process approach.

Practical implications

This paper not only suggests the significance of “intermittent interview method” and its effectivity but also the importance of “respondent pyramiding” and “mutual confidentiality” in a dangerous field.

Originality/value

The paper reflects on the original 14 months of ethnographic accounts which will add value to the existing literature on qualitative research in dangerously hazardous fields.

Article
Publication date: 15 November 2018

Ahmed Alnaggar and Michael Pitt

The purpose of this paper is to investigate a systematic methodology to manage asset data flow between building stakeholders throughout building life cycle using the Construction…

1737

Abstract

Purpose

The purpose of this paper is to investigate a systematic methodology to manage asset data flow between building stakeholders throughout building life cycle using the Construction Operation Building Information Exchange (COBie) standard.

Design/methodology/approach

A literature review of the relevant building information modelling (BIM) for facilities management (FM) studies including the gaps and challenges of producing COBie data is analysed. Then a standard project management methodology by Project Management Institute (PMI) is introduced as a theoretical framework to map the different areas of managing COBie data as a project in coordination with Royal Institute of British Architects (RIBA) Plan of work. This theoretical background is coupled with an inductive approach through the placement within a construction company (Bouygues, UK) in the UCLH construction project to produce the conceptual framework that is aligned with industry needs.

Findings

The lack of well-structured approach to manage COBie data throughout building life cycle causes many problems and confusions about the roles and responsibilities of different stakeholders in creating and managing asset data. This confusion in turn results in incomplete and low-quality COBie data at the handover phase which hinders the ability of facility managers to use these data effectively in the operations phase. The proposed conceptual framework provides a standard project management process to systemise the data flow among all stakeholders.

Practical implications

The proposed framework is developed in liaison with a large construction company, so it is well aligned with an actual industry approach to managing COBie data. Furthermore, it provides a systematic step-by-step approach to managing COBie as a project that could be easily implemented in actual construction projects.

Originality/value

The paper introduced a novel approach to manage COBie data using a standard project management methodology based on an actual live construction project perspective coupled with project management theory.

Expert briefing
Publication date: 10 May 2018

Despite frequent exchanges of fire, the conflict lines in eastern Ukraine remain static as the two sides hold entrenched military positions and are approximately evenly matched…

Details

DOI: 10.1108/OXAN-DB233596

ISSN: 2633-304X

Keywords

Geographic
Topical
Article
Publication date: 1 September 2005

Justin B. Hollander and Crofton Whitfield

To review the development of the security zone concept and introduce an approach for transforming these spaces into more effective public places.

1077

Abstract

Purpose

To review the development of the security zone concept and introduce an approach for transforming these spaces into more effective public places.

Design/methodology/approach

The literature review was conducted by examining major books and journal articles in the urban planning, urban design, and landscape architecture literature (1970‐2004).

Findings

The review found that an effective response to security zones is to initiate a strategic planning process utilizing local knowledge and design expertise.

Practical implications

Security zones have numerous negative socio‐cultural and aesthetic impacts on their neighborhoods. The findings of the literature review and the new approach introduced can be a good way to strike a delicate balance between providing for necessary security and mitigating against those negative impacts.

Originality/value

This paper fulfills a need in the property management community to understand and manage the openness/security dilemma.

Details

Property Management, vol. 23 no. 4
Type: Research Article
ISSN: 0263-7472

Keywords

Book part
Publication date: 29 February 2008

Fabien Jobard and Dominique Linhardt

This chapter approaches the question of government and surveillance through a comparison between the control practices observable in two types of places. First, we focus on…

Abstract

This chapter approaches the question of government and surveillance through a comparison between the control practices observable in two types of places. First, we focus on international airports, specifically the French international airport of Orly. Airports are maximum security zones where persons perceived as having no legitimate business are expelled and where suspicious objects are destroyed. The second kind of places are the ones labeled as “no-go areas”, violent pockets within urban space. Social housing projects located in the bleak suburbs of French cities are such dangerous zones. Both kinds of places – airports and no-go areas – have very different time and space features: people briefly pass through anonymous airports where relationships are kept at an impersonal minimum, whereas the population of a housing estate area is made of “permanent transients” pinned down by a shared fate of which there seems no escape.

Details

Surveillance and Governance: Crime Control and Beyond
Type: Book
ISBN: 978-0-7623-1416-4

Content available
Article
Publication date: 22 December 2020

Kambiz Mokhtari, Noorul Shaiful Fitri Abdul Rahman, Hamid Reza Soltani, Salim Ahmed Al Rashdi and Kawkab Abdul Aziz Mohammed Al Balushi

At the substantive level, there exists a gap in knowledge about the position of security risk management (i.e. SRM) during the terminals’ operations and management; particularly…

1388

Abstract

Purpose

At the substantive level, there exists a gap in knowledge about the position of security risk management (i.e. SRM) during the terminals’ operations and management; particularly when there is potential for deliberate anti-security acts. Correspondingly, the purpose of this paper is a need for more practical research to find out the justification for the existence of the SRM and different techniques for its appropriate execution on these logistics infrastructures principally with due regard to the potential requirements in the near future.

Design/methodology/approach

Both qualitative and quantitative techniques are used in this study incorporating fuzzy set theory and risk assessment matrix to achieve the research objective.

Findings

A designed SRM framework tailored for Qalhat liquefied petroleum gas (LNG) terminal in Sultanate of Oman was established to manage the security threats which can be resulted from any probable terrorist attacks.

Research limitations/implications

The limited numbers of experts for the purpose of the addressed SRM are causing challenges in data collection.

Practical implications

The pressures for enhanced attention to critical infrastructure security have fostered new challenges for petrochemical seaports and terminals (PSTs). These tendencies dictate to maintain comprehensive security regimens that can be integrated with national and international strategies to support the country’s security against terrorism.

Originality/value

The development of the security risk factor table model in the case of Qalhat LNG Terminal.

1 – 10 of over 14000