Search results

1 – 10 of over 10000
Content available
Article
Publication date: 1 June 2021

Albert Vasso, Richard Cobb, John Colombi, Bryan Little and David Meyer

The US Government is challenged to maintain pace as the world’s de facto provider of space object cataloging data. Augmenting capabilities with nontraditional sensors present an…

949

Abstract

Purpose

The US Government is challenged to maintain pace as the world’s de facto provider of space object cataloging data. Augmenting capabilities with nontraditional sensors present an expeditious and low-cost improvement. However, the large tradespace and unexplored system of systems performance requirements pose a challenge to successful capitalization. This paper aims to better define and assess the utility of augmentation via a multi-disiplinary study.

Design/methodology/approach

Hypothetical telescope architectures are modeled and simulated on two separate days, then evaluated against performance measures and constraints using multi-objective optimization in a heuristic algorithm. Decision analysis and Pareto optimality identifies a set of high-performing architectures while preserving decision-maker design flexibility.

Findings

Capacity, coverage and maximum time unobserved are recommended as key performance measures. A total of 187 out of 1017 architectures were identified as top performers. A total of 29% of the sensors considered are found in over 80% of the top architectures. Additional considerations further reduce the tradespace to 19 best choices which collect an average of 49–51 observations per space object with a 595–630 min average maximum time unobserved, providing redundant coverage of the Geosynchronous Orbit belt. This represents a three-fold increase in capacity and coverage and a 2 h (16%) decrease in the maximum time unobserved compared to the baseline government-only architecture as-modeled.

Originality/value

This study validates the utility of an augmented network concept using a physics-based model and modern analytical techniques. It objectively responds to policy mandating cataloging improvements without relying solely on expert-derived point solutions.

Details

Journal of Defense Analytics and Logistics, vol. 5 no. 1
Type: Research Article
ISSN: 2399-6439

Keywords

Article
Publication date: 8 August 2023

Larissa Statsenko, Ruchini Senarath Jayasinghe and Claudine Soosay

This study aims to investigate supply network (SN) resilience capabilities across the organizational, supply chain (SC) and industry levels by drawing on the complex adaptive…

Abstract

Purpose

This study aims to investigate supply network (SN) resilience capabilities across the organizational, supply chain (SC) and industry levels by drawing on the complex adaptive systems (CASs) theory and the social–ecological perspective of resilience. An empirically grounded framework operationalizes the concept of social–ecological resilience by expounding resilience capabilities across phases of the CAS adaptive cycle.

Design/methodology/approach

This research uses a qualitative multiple case study approach. It draws on the case of the Australian Defence Manufacturing SN (ADM SN) during COVID-19 disruptions. A total of 28 interviews with senior decision makers from 17 companies, complemented by 5 interviews with the Australian Defence SC organizations and secondary data analysis, support the findings.

Findings

Individual organizations’ SC visibility and flexibility enabled by effective risk management and collaboration enhance the ability of the SN to anticipate and prepare for disruption. At the same time, the strength of SC relationships reduces resilience. SN disruption response velocity is enabled by inventory redundancy, process flexibility at the organizational level and visibility and collaboration at the SC level. Institutional support at the national industry level, development of value-adding capabilities and manufacturing process flexibility at the organizational level enhances the SN’s ability to re-organize. The transition from hierarchical to decentralized collaborative governance enhances SN resilience.

Practical implications

From a practitioner’s perspective, the findings highlight the need to embrace a broader view of SC beyond immediate tiers. Decision-makers in multinational companies must recognize the long-term impact of their procurement decisions on the supplier ecosystem. Developing local supplier capabilities rather than relying on established global SCs will pay off with future resilience. It, however, demands substantial investment and radical changes across all SC tiers. The lesson for smaller firms is not to over-rely on the existing relationships with supply partners. Although trust-based relationships and collaboration are essential, over-commitment can be counterproductive during global disruptions. With a lack of visibility and control over the SC, operational flexibility is critical for small firms to adapt to shifts in supply and demand.

Originality/value

To the best of the authors’ knowledge, this empirical research is one of the first attempts to operationalize the social–ecological perspective of SN resilience. Evidence-based theoretical propositions contribute to the emerging conversation about the CAS nature of resilience by demonstrating the multi-level effects of resilience capabilities.

Details

Supply Chain Management: An International Journal, vol. 29 no. 1
Type: Research Article
ISSN: 1359-8546

Keywords

Article
Publication date: 1 January 2005

Humberto Maturana Romesín

To reflect on the matter of self‐consciousness.

Abstract

Purpose

To reflect on the matter of self‐consciousness.

Design/methodology/approach

The purpose is achieved through the process of answering four questions presented to me by Heinz von Foerster in the course of our many conversations.

Findings

It is not possible to understand the nature of self‐consciousness without understanding the operation of human beings as living systems that exist as emotional languaging living systems: self‐consciousness is a manner of living.

Practical implications

We human beings can become more aware of our responsibility in the design of robots that imitate us.

Originality/value

Reflects on what makes us humans special, on subjective experience, and on the world we bring forth.

Details

Kybernetes, vol. 34 no. 1/2
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 6 April 2010

Evi Syukur and Seng Wai Loke

Pervasive computing environments such as a pervasive campus domain, shopping, etc. will become commonplaces in the near future. The key to enhance these system environments with…

Abstract

Purpose

Pervasive computing environments such as a pervasive campus domain, shopping, etc. will become commonplaces in the near future. The key to enhance these system environments with services relies on the ability to effectively model and represent contextual information, as well as spontaneity in downloading and executing the service interface on a mobile device. The system needs to provide an infrastructure that handles the interaction between a client device that requests a service and a server which responds to the client's request via Web service calls. The system should relieve end‐users from low‐level tasks of matching services with locations or other context information. The mobile users do not need to know or have any knowledge of where the service resides, how to call a service, what the service API detail is and how to execute a service once downloaded. All these low‐level tasks can be handled implicitly by a system. The aim of this paper is to investigate the notion of context‐aware regulated services, and how they should be designed, and implemented.

Design/methodology/approach

The paper presents a detailed design, and prototype implementation of the system, called mobile hanging services (MHS), that provides the ability to execute mobile code (service application) on demand and control entities' behaviours in accessing services in pervasive computing environments. Extensive evaluation of this prototype is also provided.

Findings

The framework presented in this paper enables a novel contextual services infrastructure that allows services to be described at a high level of abstraction and to be regulated by contextual policies. This contextual policy governs the visibility and execution of contextual services in the environment. In addition, a range of contextual services is developed to illustrate different types of services used in the framework.

Originality/value

The main contribution of this paper is a high‐level model of a system for context‐aware regulated services, which consists of environments (domains and spaces), contextual software components, entities and computing devices.

Details

International Journal of Pervasive Computing and Communications, vol. 6 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 21 September 2015

Anika Meyer and Ina Fourie

The purpose of this paper is to explore the value of utilising a holistic ergonomic approach, covering engineering, cognitive and social perspectives, to cultivate beneficial and…

1147

Abstract

Purpose

The purpose of this paper is to explore the value of utilising a holistic ergonomic approach, covering engineering, cognitive and social perspectives, to cultivate beneficial and productive collaborative information seeking (CIS) systems and environments, specifically with regard to three main CIS pillars (control, communication and awareness).

Design/methodology/approach

A qualitative research approach, based on a selective corpus of CIS literature, was utilised to perform a content analysis to note if terms and concepts normally associated with engineering, cognitive and social ergonomics can be used to eliminate terms reflecting issues related to three CIS pillars (control, communication and awareness) that can benefit from a holistic ergonomic approach.

Findings

The content analysis revealed that a fairly extensive amount of holistic ergonomic terminology is prominent within the CIS literature, therefore establishing a connection between the two disciplines: CIS and ergonomics. This suggests that CIS system issues could benefit from the insights of a holistic ergonomic approach.

Research limitations/implications

Since this is an exploratory study the scope of CIS literature utilised in the content analysis was limited to a selection considered most important by the authors; this should be supplemented by further research.

Practical implications

Intended to instigate interest in further exploration of the beneficial and productive implications and practical application of holistic ergonomics in designing CIS systems and environments.

Originality/value

This is the first research paper in the Library and Information Science literature that explores the potential of utilising holistic ergonomics to cultivate CIS systems and environments.

Details

Library Hi Tech, vol. 33 no. 3
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 10 July 2017

Noluxolo Gcaza, Rossouw von Solms, Marthie M. Grobler and Joey Jansen van Vuuren

The purpose of this paper is to define and delineate cyber security culture. Cyber security has been a concern for many years. In an effort to mitigate the cyber security risks…

1627

Abstract

Purpose

The purpose of this paper is to define and delineate cyber security culture. Cyber security has been a concern for many years. In an effort to mitigate the cyber security risks, technology-centred measures were deemed to be the ultimate solution. Nowadays, however, it is accepted that the process of cyber security requires much more than mere technical controls. On the contrary, it now demands a human-centred approach, including a cyber security culture. Although the role of cultivating a culture in pursuing cyber security is well appreciated, research focusing intensely on cyber security culture is still in its infancy. Additionally, knowledge on the subject is not clearly bounded and defined.

Design/methodology/approach

General morphological analysis (GMA) is used to define, structure and analyse the cyber security environment culture.

Findings

This paper identifies the most important variables in cultivating a cyber security culture.

Research implications

The delineation of the national cyber security domain will contribute to the relatively new domain of cyber security culture. They contribute to the research community by means of promoting a shared and common understanding of terms. It is a step in the right direction towards eliminating the ambiguity of domain assumptions.

Practical implications

Practically, the study can assist developing nations in constructing strategies that addresses the key factors that need to be apparent in lieu to cultivating its envisaged national culture of cyber security. Additionally, the GMA will contribute to the development of solutions or means that do not overlook interrelations of such factors.

Originality/value

Delineating and defining the cyber security culture domain more precisely could greatly contribute to realizing the elements that collectively play a role in cultivating such a culture for a national perspective.

Details

Information & Computer Security, vol. 25 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 May 2002

David Snowden

We are reaching the end of the second generation of knowledge management, with its focus on tacit‐explicit knowledge conversion. Triggered by the SECI model of Nonaka, it replaced…

13368

Abstract

We are reaching the end of the second generation of knowledge management, with its focus on tacit‐explicit knowledge conversion. Triggered by the SECI model of Nonaka, it replaced a first generation focus on timely information provision for decision support and in support of BPR initiatives. Like BPR it has substantially failed to deliver on its promised benefits. The third generation requires the clear separation of context, narrative and content management and challenges the orthodoxy of scientific management. Complex adaptive systems theory is used to create a sense‐making model that utilises self‐organising capabilities of the informal communities and identifies a natural flow model of knowledge creation, disruption and utilisation. However, the argument from nature of many complexity thinkers is rejected given the human capability to create order and predictability through collective and individual acts of freewill. Knowledge is seen paradoxically, as both a thing and a flow requiring diverse management approaches.

Details

Journal of Knowledge Management, vol. 6 no. 2
Type: Research Article
ISSN: 1367-3270

Keywords

Article
Publication date: 22 June 2012

Penghe Chen, Shubhabrata Sen, Hung Keng Pung, Wenwei Xue and Wai Choong Wong

The rapid proliferation of mobile context aware applications has resulted in an increased research interest towards developing specialized context data management strategies for…

Abstract

Purpose

The rapid proliferation of mobile context aware applications has resulted in an increased research interest towards developing specialized context data management strategies for mobile entities. The purpose of this paper is to aim to develop a new way to model mobile entities and manage their contexts accordingly.

Design/methodology/approach

This paper proposes the concept of “Mobile Space” to model mobile entities and presents strategies to manage the various contexts associated therein. To handle availability related issues, two system services are designed: the “Availability Updating Service” which is an identifier based mechanism and is designed to keep track of mobile objects and handle availability related issues, and the “Application Callback Service” which is a publish/subscribe based mechanism to handle application disruptions and interruptions arising due to mobility.

Findings

The paper presents a detailed study of the proposed framework and a description of the underlying services and the components therein to validate the framework. Experimental results carried out in WiFi and 3G environments indicate that the proposed techniques can support mobile applications and minimize application disruptions with minimal overhead.

Originality/value

The proposed context management framework is generic in nature and is not designed for a specific class of applications. Any mobile context aware application can leverage on the framework and utilize the provided functionalities to manage application disruptions. Also, the decoupling of mobile application layer and the underlying context data management layer renders context data management layer transparent to the application design.

Details

International Journal of Pervasive Computing and Communications, vol. 8 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 February 2005

Andreas Zimmermann and Andreas Lorenz

The paper deals with the design and creation of an intelligent user interface augmenting the user experience in everyday environments, by providing an immersive audio environment…

Abstract

The paper deals with the design and creation of an intelligent user interface augmenting the user experience in everyday environments, by providing an immersive audio environment. We highlight the potential of augmenting the visual real environment in a personalized way, thanks to context modeling techniques. The LISTEN project, a system for an immersive audio augmented environment applied in the art exhibition domain, provides an example of modeling and personalization methods affecting the audio interface in terms of content and organization. In addition, the different evolution steps of the system and the outcomes of the accompanying user tests are here reported.

Details

International Journal of Pervasive Computing and Communications, vol. 1 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 22 June 2012

A.J. Masys

The emergence of “black swans” represents (according to Taleb) “[…] our misunderstanding of the likelihood of surprises”. The purpose of this paper is to study accidents and…

3333

Abstract

Purpose

The emergence of “black swans” represents (according to Taleb) “[…] our misunderstanding of the likelihood of surprises”. The purpose of this paper is to study accidents and disasters and the inherent misunderstanding and absence of awareness associated with the existence of black swans and their complex aetiology. Red teaming and scenario planning provide a methodology to explore the uncertainties and challenge of the mental models associated with accident and disaster aetiology.

Design/methodology/approach

The argument draws upon the successful application of red teaming and scenario planning in various domains noted in the literature and lessons learned from the failure to recognize black swans. An analysis of the literature illustrates how the salient characteristics of red teaming and scenario planning can be applied to the illumination of black swans to support risk, crisis and disaster management.

Findings

Recognizing the uncertainty resident within the safety and security problem space opens up the notion that more than one future is potentially open. It is argued that the inherent properties of red teaming, within the context of scenario planning, facilitates an effective approach to bring risk, crisis and disaster planners/managers together to discuss their concerns and explore the factors creating uncertainty and the emergence of black swans.

Originality/value

The value of red teaming (scenario planning) to challenge linear thinking and recognize the inherent uncertainty in the space of possibilities is well supported. Applied to the risk, crisis and disaster management domain, red teaming and scenario planning can provide insights into the emergence of black swans and thereby shape mitigation strategies.

Details

Disaster Prevention and Management: An International Journal, vol. 21 no. 3
Type: Research Article
ISSN: 0965-3562

Keywords

1 – 10 of over 10000