Search results
1 – 10 of over 10000Albert Vasso, Richard Cobb, John Colombi, Bryan Little and David Meyer
The US Government is challenged to maintain pace as the world’s de facto provider of space object cataloging data. Augmenting capabilities with nontraditional sensors present an…
Abstract
Purpose
The US Government is challenged to maintain pace as the world’s de facto provider of space object cataloging data. Augmenting capabilities with nontraditional sensors present an expeditious and low-cost improvement. However, the large tradespace and unexplored system of systems performance requirements pose a challenge to successful capitalization. This paper aims to better define and assess the utility of augmentation via a multi-disiplinary study.
Design/methodology/approach
Hypothetical telescope architectures are modeled and simulated on two separate days, then evaluated against performance measures and constraints using multi-objective optimization in a heuristic algorithm. Decision analysis and Pareto optimality identifies a set of high-performing architectures while preserving decision-maker design flexibility.
Findings
Capacity, coverage and maximum time unobserved are recommended as key performance measures. A total of 187 out of 1017 architectures were identified as top performers. A total of 29% of the sensors considered are found in over 80% of the top architectures. Additional considerations further reduce the tradespace to 19 best choices which collect an average of 49–51 observations per space object with a 595–630 min average maximum time unobserved, providing redundant coverage of the Geosynchronous Orbit belt. This represents a three-fold increase in capacity and coverage and a 2 h (16%) decrease in the maximum time unobserved compared to the baseline government-only architecture as-modeled.
Originality/value
This study validates the utility of an augmented network concept using a physics-based model and modern analytical techniques. It objectively responds to policy mandating cataloging improvements without relying solely on expert-derived point solutions.
Details
Keywords
Larissa Statsenko, Ruchini Senarath Jayasinghe and Claudine Soosay
This study aims to investigate supply network (SN) resilience capabilities across the organizational, supply chain (SC) and industry levels by drawing on the complex adaptive…
Abstract
Purpose
This study aims to investigate supply network (SN) resilience capabilities across the organizational, supply chain (SC) and industry levels by drawing on the complex adaptive systems (CASs) theory and the social–ecological perspective of resilience. An empirically grounded framework operationalizes the concept of social–ecological resilience by expounding resilience capabilities across phases of the CAS adaptive cycle.
Design/methodology/approach
This research uses a qualitative multiple case study approach. It draws on the case of the Australian Defence Manufacturing SN (ADM SN) during COVID-19 disruptions. A total of 28 interviews with senior decision makers from 17 companies, complemented by 5 interviews with the Australian Defence SC organizations and secondary data analysis, support the findings.
Findings
Individual organizations’ SC visibility and flexibility enabled by effective risk management and collaboration enhance the ability of the SN to anticipate and prepare for disruption. At the same time, the strength of SC relationships reduces resilience. SN disruption response velocity is enabled by inventory redundancy, process flexibility at the organizational level and visibility and collaboration at the SC level. Institutional support at the national industry level, development of value-adding capabilities and manufacturing process flexibility at the organizational level enhances the SN’s ability to re-organize. The transition from hierarchical to decentralized collaborative governance enhances SN resilience.
Practical implications
From a practitioner’s perspective, the findings highlight the need to embrace a broader view of SC beyond immediate tiers. Decision-makers in multinational companies must recognize the long-term impact of their procurement decisions on the supplier ecosystem. Developing local supplier capabilities rather than relying on established global SCs will pay off with future resilience. It, however, demands substantial investment and radical changes across all SC tiers. The lesson for smaller firms is not to over-rely on the existing relationships with supply partners. Although trust-based relationships and collaboration are essential, over-commitment can be counterproductive during global disruptions. With a lack of visibility and control over the SC, operational flexibility is critical for small firms to adapt to shifts in supply and demand.
Originality/value
To the best of the authors’ knowledge, this empirical research is one of the first attempts to operationalize the social–ecological perspective of SN resilience. Evidence-based theoretical propositions contribute to the emerging conversation about the CAS nature of resilience by demonstrating the multi-level effects of resilience capabilities.
Details
Keywords
To reflect on the matter of self‐consciousness.
Abstract
Purpose
To reflect on the matter of self‐consciousness.
Design/methodology/approach
The purpose is achieved through the process of answering four questions presented to me by Heinz von Foerster in the course of our many conversations.
Findings
It is not possible to understand the nature of self‐consciousness without understanding the operation of human beings as living systems that exist as emotional languaging living systems: self‐consciousness is a manner of living.
Practical implications
We human beings can become more aware of our responsibility in the design of robots that imitate us.
Originality/value
Reflects on what makes us humans special, on subjective experience, and on the world we bring forth.
Details
Keywords
Pervasive computing environments such as a pervasive campus domain, shopping, etc. will become commonplaces in the near future. The key to enhance these system environments with…
Abstract
Purpose
Pervasive computing environments such as a pervasive campus domain, shopping, etc. will become commonplaces in the near future. The key to enhance these system environments with services relies on the ability to effectively model and represent contextual information, as well as spontaneity in downloading and executing the service interface on a mobile device. The system needs to provide an infrastructure that handles the interaction between a client device that requests a service and a server which responds to the client's request via Web service calls. The system should relieve end‐users from low‐level tasks of matching services with locations or other context information. The mobile users do not need to know or have any knowledge of where the service resides, how to call a service, what the service API detail is and how to execute a service once downloaded. All these low‐level tasks can be handled implicitly by a system. The aim of this paper is to investigate the notion of context‐aware regulated services, and how they should be designed, and implemented.
Design/methodology/approach
The paper presents a detailed design, and prototype implementation of the system, called mobile hanging services (MHS), that provides the ability to execute mobile code (service application) on demand and control entities' behaviours in accessing services in pervasive computing environments. Extensive evaluation of this prototype is also provided.
Findings
The framework presented in this paper enables a novel contextual services infrastructure that allows services to be described at a high level of abstraction and to be regulated by contextual policies. This contextual policy governs the visibility and execution of contextual services in the environment. In addition, a range of contextual services is developed to illustrate different types of services used in the framework.
Originality/value
The main contribution of this paper is a high‐level model of a system for context‐aware regulated services, which consists of environments (domains and spaces), contextual software components, entities and computing devices.
Details
Keywords
The purpose of this paper is to explore the value of utilising a holistic ergonomic approach, covering engineering, cognitive and social perspectives, to cultivate beneficial and…
Abstract
Purpose
The purpose of this paper is to explore the value of utilising a holistic ergonomic approach, covering engineering, cognitive and social perspectives, to cultivate beneficial and productive collaborative information seeking (CIS) systems and environments, specifically with regard to three main CIS pillars (control, communication and awareness).
Design/methodology/approach
A qualitative research approach, based on a selective corpus of CIS literature, was utilised to perform a content analysis to note if terms and concepts normally associated with engineering, cognitive and social ergonomics can be used to eliminate terms reflecting issues related to three CIS pillars (control, communication and awareness) that can benefit from a holistic ergonomic approach.
Findings
The content analysis revealed that a fairly extensive amount of holistic ergonomic terminology is prominent within the CIS literature, therefore establishing a connection between the two disciplines: CIS and ergonomics. This suggests that CIS system issues could benefit from the insights of a holistic ergonomic approach.
Research limitations/implications
Since this is an exploratory study the scope of CIS literature utilised in the content analysis was limited to a selection considered most important by the authors; this should be supplemented by further research.
Practical implications
Intended to instigate interest in further exploration of the beneficial and productive implications and practical application of holistic ergonomics in designing CIS systems and environments.
Originality/value
This is the first research paper in the Library and Information Science literature that explores the potential of utilising holistic ergonomics to cultivate CIS systems and environments.
Details
Keywords
Noluxolo Gcaza, Rossouw von Solms, Marthie M. Grobler and Joey Jansen van Vuuren
The purpose of this paper is to define and delineate cyber security culture. Cyber security has been a concern for many years. In an effort to mitigate the cyber security risks…
Abstract
Purpose
The purpose of this paper is to define and delineate cyber security culture. Cyber security has been a concern for many years. In an effort to mitigate the cyber security risks, technology-centred measures were deemed to be the ultimate solution. Nowadays, however, it is accepted that the process of cyber security requires much more than mere technical controls. On the contrary, it now demands a human-centred approach, including a cyber security culture. Although the role of cultivating a culture in pursuing cyber security is well appreciated, research focusing intensely on cyber security culture is still in its infancy. Additionally, knowledge on the subject is not clearly bounded and defined.
Design/methodology/approach
General morphological analysis (GMA) is used to define, structure and analyse the cyber security environment culture.
Findings
This paper identifies the most important variables in cultivating a cyber security culture.
Research implications
The delineation of the national cyber security domain will contribute to the relatively new domain of cyber security culture. They contribute to the research community by means of promoting a shared and common understanding of terms. It is a step in the right direction towards eliminating the ambiguity of domain assumptions.
Practical implications
Practically, the study can assist developing nations in constructing strategies that addresses the key factors that need to be apparent in lieu to cultivating its envisaged national culture of cyber security. Additionally, the GMA will contribute to the development of solutions or means that do not overlook interrelations of such factors.
Originality/value
Delineating and defining the cyber security culture domain more precisely could greatly contribute to realizing the elements that collectively play a role in cultivating such a culture for a national perspective.
Details
Keywords
We are reaching the end of the second generation of knowledge management, with its focus on tacit‐explicit knowledge conversion. Triggered by the SECI model of Nonaka, it replaced…
Abstract
We are reaching the end of the second generation of knowledge management, with its focus on tacit‐explicit knowledge conversion. Triggered by the SECI model of Nonaka, it replaced a first generation focus on timely information provision for decision support and in support of BPR initiatives. Like BPR it has substantially failed to deliver on its promised benefits. The third generation requires the clear separation of context, narrative and content management and challenges the orthodoxy of scientific management. Complex adaptive systems theory is used to create a sense‐making model that utilises self‐organising capabilities of the informal communities and identifies a natural flow model of knowledge creation, disruption and utilisation. However, the argument from nature of many complexity thinkers is rejected given the human capability to create order and predictability through collective and individual acts of freewill. Knowledge is seen paradoxically, as both a thing and a flow requiring diverse management approaches.
Details
Keywords
Penghe Chen, Shubhabrata Sen, Hung Keng Pung, Wenwei Xue and Wai Choong Wong
The rapid proliferation of mobile context aware applications has resulted in an increased research interest towards developing specialized context data management strategies for…
Abstract
Purpose
The rapid proliferation of mobile context aware applications has resulted in an increased research interest towards developing specialized context data management strategies for mobile entities. The purpose of this paper is to aim to develop a new way to model mobile entities and manage their contexts accordingly.
Design/methodology/approach
This paper proposes the concept of “Mobile Space” to model mobile entities and presents strategies to manage the various contexts associated therein. To handle availability related issues, two system services are designed: the “Availability Updating Service” which is an identifier based mechanism and is designed to keep track of mobile objects and handle availability related issues, and the “Application Callback Service” which is a publish/subscribe based mechanism to handle application disruptions and interruptions arising due to mobility.
Findings
The paper presents a detailed study of the proposed framework and a description of the underlying services and the components therein to validate the framework. Experimental results carried out in WiFi and 3G environments indicate that the proposed techniques can support mobile applications and minimize application disruptions with minimal overhead.
Originality/value
The proposed context management framework is generic in nature and is not designed for a specific class of applications. Any mobile context aware application can leverage on the framework and utilize the provided functionalities to manage application disruptions. Also, the decoupling of mobile application layer and the underlying context data management layer renders context data management layer transparent to the application design.
Details
Keywords
Andreas Zimmermann and Andreas Lorenz
The paper deals with the design and creation of an intelligent user interface augmenting the user experience in everyday environments, by providing an immersive audio environment…
Abstract
The paper deals with the design and creation of an intelligent user interface augmenting the user experience in everyday environments, by providing an immersive audio environment. We highlight the potential of augmenting the visual real environment in a personalized way, thanks to context modeling techniques. The LISTEN project, a system for an immersive audio augmented environment applied in the art exhibition domain, provides an example of modeling and personalization methods affecting the audio interface in terms of content and organization. In addition, the different evolution steps of the system and the outcomes of the accompanying user tests are here reported.
Details
Keywords
The emergence of “black swans” represents (according to Taleb) “[…] our misunderstanding of the likelihood of surprises”. The purpose of this paper is to study accidents and…
Abstract
Purpose
The emergence of “black swans” represents (according to Taleb) “[…] our misunderstanding of the likelihood of surprises”. The purpose of this paper is to study accidents and disasters and the inherent misunderstanding and absence of awareness associated with the existence of black swans and their complex aetiology. Red teaming and scenario planning provide a methodology to explore the uncertainties and challenge of the mental models associated with accident and disaster aetiology.
Design/methodology/approach
The argument draws upon the successful application of red teaming and scenario planning in various domains noted in the literature and lessons learned from the failure to recognize black swans. An analysis of the literature illustrates how the salient characteristics of red teaming and scenario planning can be applied to the illumination of black swans to support risk, crisis and disaster management.
Findings
Recognizing the uncertainty resident within the safety and security problem space opens up the notion that more than one future is potentially open. It is argued that the inherent properties of red teaming, within the context of scenario planning, facilitates an effective approach to bring risk, crisis and disaster planners/managers together to discuss their concerns and explore the factors creating uncertainty and the emergence of black swans.
Originality/value
The value of red teaming (scenario planning) to challenge linear thinking and recognize the inherent uncertainty in the space of possibilities is well supported. Applied to the risk, crisis and disaster management domain, red teaming and scenario planning can provide insights into the emergence of black swans and thereby shape mitigation strategies.
Details