Search results

1 – 10 of 87
Article
Publication date: 16 February 2010

T. Boult, A. Chamillard, R. Lewis, N. Polok, G. Stock and D. Wortman

This article focuses on university education in innovation. We examine and present a novel system we have developed that is achieving our vision of instantiating a robust…

162

Abstract

This article focuses on university education in innovation. We examine and present a novel system we have developed that is achieving our vision of instantiating a robust education that teaches, develops, and grades innovation in the education system. This paper is discussing a paradigm shift, offering new degrees with a common core focused on innovation, with teams of students learning and practicing the key elements of the innovation process. First we examine the motivation and need for a radically new approach, not a new major or a course, that is based upon a new common core and family of degrees. We describe how we knew that to effectively reach our goals the program had to span across departments, college boundaries, and beyond the very core of the university. Second, we show how in doing so we created a family of degrees that moved us beyond the centuries-old B.S. and B.A. educational constraints with a new, innovative "Bachelor of Innovation" (B.I.) family of degrees that includes a core built around multi-disciplinary multi-year innovation partnering with real companies. Lastly we summarize the unique aspects of the program and the rationale behind them, from the 3-year multi-disciplinary team experience to the trademarked name. We present our B.I. program as its own case study in innovation within higher education, reviewing the key challenges we faced so that other innovative institutions and departments may learn from our experience. We conclude with lessons learned and the future of the B.I. family of degrees.

Details

International Journal of Innovation Science, vol. 1 no. 4
Type: Research Article
ISSN: 1757-2223

Article
Publication date: 1 September 1929

7. The cowsheds in Denmark are very similar in design to the more modern cowsheds in this country. They are, however, in general structurally superior to the average English…

Abstract

7. The cowsheds in Denmark are very similar in design to the more modern cowsheds in this country. They are, however, in general structurally superior to the average English cowshed and even to the Dutch cowsheds. In Denmark the flooring, standings, mangers, water supply, electric lighting, drainage from the cowsheds and devices for securing the cows are similar to what we observed in Nederland and equally satisfactory, but the Danish cowsheds were superior in respect of air space, windows and ventilation. In all the cowsheds which we visited the ceilings were high, the air space was ample, lighting by means of windows was good and adequate, cross ventilation was invariably provided. The gutters in Danish sheds are, however, much shallower than those in Dutch sheds, and are consequently not so effective, though movement of the cows is easier and safer.

Details

British Food Journal, vol. 31 no. 9
Type: Research Article
ISSN: 0007-070X

Article
Publication date: 1 June 2015

Wilson Abel Alberto Torres, Nandita Bhattacharjee and Bala Srinivasan

The purpose of this paper is to determine the effectiveness of using fully homomorphic encryption (FHE) to preserve the privacy of biometric data in an authentication system…

1364

Abstract

Purpose

The purpose of this paper is to determine the effectiveness of using fully homomorphic encryption (FHE) to preserve the privacy of biometric data in an authentication system. Biometrics offers higher accuracy for personal recognition than traditional methods because of its properties. Biometric data are permanently linked with an individual and cannot be revoked or cancelled, especially when biometric data are compromised, leading to privacy issues.

Design/methodology/approach

By reviewing current approaches, FHE is considered as a promising solution for the privacy issue because of its ability to perform computations in the encrypted domain. The authors studied the effectiveness of FHE in biometric authentication systems. In doing so, the authors undertake the study by implementing a protocol for biometric authentication system using iris.

Findings

The security analysis of the implementation scheme demonstrates the effectiveness of FHE to protect the privacy of biometric data, as unlimited operations can be performed in the encrypted domain, and the FHE secret key is not shared with any other party during the authentication protocol.

Research limitations/implications

The use of malicious model in the design of the authentication protocol to improve the privacy, packing methods and use of low-level programming language to enhance performance of the system needs to be further investigated.

Originality/value

The main contributions of this paper are the implementation of a privacy-preserving iris biometric authentication protocol adapted to lattice-based FHE and a sound security analysis of authentication and privacy.

Details

International Journal of Pervasive Computing and Communications, vol. 11 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 August 1955

Under this heading are published regularly abstracts of all Reports and Memoranda of the Aeronautical Research Council, Reports and Technical Memoranda of the United States…

Abstract

Under this heading are published regularly abstracts of all Reports and Memoranda of the Aeronautical Research Council, Reports and Technical Memoranda of the United States National Advisory Committee for Aeronautics and publications of other similar Research Bodies as issued.

Details

Aircraft Engineering and Aerospace Technology, vol. 27 no. 8
Type: Research Article
ISSN: 0002-2667

Article
Publication date: 1 September 1961

Under this heading are published regularly abstracts of all Reports and Memoranda of the Aeronautical Research Council, Technical Reports and Translations of the United States…

Abstract

Under this heading are published regularly abstracts of all Reports and Memoranda of the Aeronautical Research Council, Technical Reports and Translations of the United States National Aeronautics and Space Administration and publications of other similar Research Bodies as issued.

Details

Aircraft Engineering and Aerospace Technology, vol. 33 no. 9
Type: Research Article
ISSN: 0002-2667

Article
Publication date: 1 June 2000

Sibylle H. Lob and Neal D. Kohatsu

Case management has been widely used with the intent of improving clinical outcomes while reducing medical costs. Studies of case management, however, have shown variable…

Abstract

Case management has been widely used with the intent of improving clinical outcomes while reducing medical costs. Studies of case management, however, have shown variable effectiveness. This study assessed the impact of a state health department case management program on hospitalizations, emergency department (ED) visits, and preventive services among persons with diabetes receiving Medicaid fee‐for‐service health care. The patients enrolled in the non‐disease‐specific case management program were low‐income, chronically ill and medically complex. Nurse case managers authorized and coordinated services in the home for these patients and established links to health‐care professionals and community resources. A retrospective, non‐randomized, controlled time series design using paid claims files was employed. Case management reduced admissions and hospital days but did not significantly impact ED visits or use of preventive services.

Details

British Journal of Clinical Governance, vol. 5 no. 2
Type: Research Article
ISSN: 1466-4100

Keywords

Article
Publication date: 13 June 2008

Belinda Parke and Jane McCusker

The purpose of this paper is to establish policy recommendations to address service and care delivery challenges facing hospital emergency departments (EDs) responding to the…

659

Abstract

Purpose

The purpose of this paper is to establish policy recommendations to address service and care delivery challenges facing hospital emergency departments (EDs) responding to the needs of increasing numbers of older adults.

Design/methodology/approach

The consensus development process used an international expert interdisciplinary panel, convened at an international conference. Following a round table discussion and think‐tank session, a nominal group method with constant comparative analysis and coding techniques was used to identify policy recommendations. Two rounds of electronic input followed the face‐to‐face meeting to reach consensus on priority ranking of the policy recommendations. Findings underwent an external review by four independent experts.

Findings

A total of seven categories of policy recommendations were developed: education, integration and coordination of care, resources, ED physical environment, evidence‐based practice, research and evaluation, and advocacy.

Research limitations/implications

The consensus development process did not include a systematic literature review on the topic. However, participants included experts in their disciplines.

Practical implications

The recommendations may assist administrators, policy makers, clinicians, and researchers on future directions for improving emergency care and service delivery for older adults.

Originality/value

The paper describes the process and results of a consensus development activity for ED care and services of older adults.

Details

International Journal of Health Care Quality Assurance, vol. 21 no. 4
Type: Research Article
ISSN: 0952-6862

Keywords

Article
Publication date: 6 December 2017

Fabio Bacchini and Ludovica Lorusso

This study aims to explore the ethical and social issues of tattoo recognition technology (TRT) and tattoo similarity detection technology (TSDT), which are expected to be…

Abstract

Purpose

This study aims to explore the ethical and social issues of tattoo recognition technology (TRT) and tattoo similarity detection technology (TSDT), which are expected to be increasingly used by state and local police departments and law enforcement agencies.

Design/methodology/approach

The paper investigates the new ethical concerns raised by tattoo-based biometrics on a comparative basis with face-recognition biometrics.

Findings

TRT raises much more ethically sensitive issues than face recognition, because tattoos are meaningful biometric traits, and tattoo identification is tantamount to the identification of many more personal features that normally would have remained invisible. TSDT’s assumption that classifying people in virtue of their visible features is useful to foretell their attitudes and behaviours is dangerously similar to racist thought.

Practical implications

The findings hope to promote an active debate on the ethical and social aspects of tattoo-based biometrics before it is intensely implemented by law enforcement agencies.

Social implications

Tattooed individuals – inasmuch as they are more controlled and monitored – are negatively discriminated in comparison to un-tattooed individuals. As tattooing is not uniformly distributed among population, many demographic groups like African–Americans will be overrepresented in tattoos databases used by TRT and TSDT, thus being affected by disproportionately higher risk to be found as a match for a given suspect.

Originality/value

TRT and TSDT represent one of the new frontiers of biometrics. The ethical and social issues raised by TRT and TSDT are currently unexplored.

Details

Journal of Information, Communication and Ethics in Society, vol. 16 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 14 October 2021

Masike Malatji, Annlizé L. Marnewick and Suné Von Solms

For many innovative organisations, Industry 4.0 paves the way for significant operational efficiencies, quality of goods and services and cost reductions. One of the ways to…

1958

Abstract

Purpose

For many innovative organisations, Industry 4.0 paves the way for significant operational efficiencies, quality of goods and services and cost reductions. One of the ways to realise these benefits is to embark on digital transformation initiatives that may be summed up as the intelligent interconnectivity of people, processes, data and cyber-connected things. Sadly, this interconnectivity between the enterprise information technology (IT) and industrial control systems (ICS) environment introduces new attack surfaces for critical infrastructure (CI) operators. As a result of the ICS cybersecurity risk introduced by the interconnectivity between the enterprise IT and ICS networks, the purpose of this study is to identify the cybersecurity capabilities that CI operators must have to attain good cybersecurity resilience.

Design/methodology/approach

A scoping literature review of best practice international CI protection frameworks, standards and guidelines were conducted. Similar cybersecurity practices from these frameworks, standards and guidelines were grouped together under a corresponding National Institute of Standards and Technology (NIST) cybersecurity framework (CF) practice. Practices that could not be categorised under any of the existing NIST CF practices were considered new insights, and therefore, additions.

Findings

A CI cybersecurity capability framework comprising 29 capability domains (cybersecurity focus areas) was developed as an adaptation of the NIST CF with an added dimension. This added dimension emphasises cloud computing and internet of things (IoT) security. Each of the 29 cybersecurity capability domains is executed through various capabilities (cybersecurity processes and procedures). The study found that each cybersecurity capability can further be operationalised by a set of cybersecurity controls derived from various frameworks, standards and guidelines, such as COBIT®, CIS®, ISA/IEC 62443, ISO/IEC 27002 and NIST Special Publication 800-53.

Practical implications

CI sectors are immediately able to adopt the CI cybersecurity capability framework to evaluate their levels of resilience against cyber-attacks, given new attack surfaces introduced by the interconnectivity of cyber-connected things between the enterprise and ICS levels.

Originality/value

The authors present an added dimension to the NIST framework for CI cyber protection. In addition to emphasising cryptography, IoT and cloud computing security aspects, this added dimension highlights the need for an integrated approach to CI cybersecurity resilience instead of a piecemeal approach.

Details

Information & Computer Security, vol. 30 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 December 1931

A resemblance not merely superficial exists between August, 1914, and November, 1931. A rapid orientation in our national outlook marks both dates. Imminence of national disaster…

Abstract

A resemblance not merely superficial exists between August, 1914, and November, 1931. A rapid orientation in our national outlook marks both dates. Imminence of national disaster was and is the cause in both cases. The analogy may perhaps be pressed a step further if the quickness and the certainty of national response be considered. The introduction by a National Government of universal military service in 1914 has an analogue in the introduction by a National Government of the Abnormal Imports Act of 1931. At this point the analogy would seem to end. The crisis of 1914 demanded the mobilisation of the man power of the country in many fields of activity to prevent the threat to our existence as a nation from being put into execution. In 1931 with a similar threat to our existence the strongest government of all time is content to avail itself of only part of the power that would willingly be placed at its disposal and to discourage the rest. Perhaps we may be permitted to express the hope that so far as duration may be concerned the analogy will also fail. We cannot afford to take four years over this matter. For some time past the nation has been “a beggar on horseback,” and during the last ten years it has made a considerable amount of progress in the direction towards which beggars in that position are popularly supposed to be riding. Progress in this direction has been much aided, if not accelerated, by means of a strong and increasingly developed inferiority complex whereby it appeared to us that anyone could do anything much better than we could do it ourselves, and we were, under its influence, rapidly becoming on the one hand merely agents for foreign manufacturers, the products of whose fields or factories were being distributed on the other hand to people whose purchasing power, owing to excessive taxation and other causes, was rapidly diminishing. In spite of the results of the general election we still seem to be in a large measure deficient in healthy optimism, that belief in our own powers which is usually a condition of success. It has apparently become necessary to assure an English audience that an English hen can lay as good an egg as a Russian or Chinese hen. May we add the further information that English bacon is the best in the world. That plums are grown best at Pershore and strawberries in Kent and Hampshire. That we thoroughly despise the fear that was publicly and gravely expressed by a public man that if we attempted to set our house in order by means of a protective tariff the dreadful foreigner would retaliate and even go to war with us over the matter.

Details

British Food Journal, vol. 33 no. 12
Type: Research Article
ISSN: 0007-070X

1 – 10 of 87