Search results

1 – 10 of 38
Article
Publication date: 26 February 2021

Willem D. Pieters and Raynitchka Tzoneva

This paper aims to focus on the implementation of the International Electrotechnical Commission (IEC) 61850–9-2 standard based process bus with merging units (MUs) and sampled…

Abstract

Purpose

This paper aims to focus on the implementation of the International Electrotechnical Commission (IEC) 61850–9-2 standard based process bus with merging units (MUs) and sampled values (SV) to improve the protection and control systems. The digital process interface is important to be included on the process bus level.

Design/methodology/approach

The IEC 61850–9-2 process bus standard is not extensively used in regard to SV when the IEC 61850 standard is implemented by power utilities. Many protection and control intelligent electronic devices (IEDs) are connected to a substation communication network, routers and switches using fibre-optic linked Ethernet. However, inductive current transformers (CTs) and voltage transformers (VTs) secondary circuits are still hardwired to the IEDs. The paper highlight issues with the copper wires for currents signals and how these issues can be eliminated by using the MUs and the SV protocol. The voltage regulator control IED of each transformer is required to regulate the voltage level of the secondary side bus bar it is connected to. All the regulating IEDs of parallel-connected transformers are required to communicate with each other to share information. They collectively control the bus bar voltage depending on the switching configuration of the parallel transformers.

Findings

It is shown that process bus information such as the high voltage switchgear status information of primary plant in the yard, can be used to improve the substation protection and control systems. The power transformer protection and voltage regulator control are focused on.

Research limitations/implications

The deliverables of the research work can be applied in: The Centre for Substation Automation and Energy Management systems of the Department of Electrical Engineering, power utilities and other establishments using power systems and digital substations in the electrical supply industry. The research work on the thesis led to the development of a laboratory test-bench where students can learn and understand the basics of the IEC 61850–9-2 SVs principles. The test-bench components such as the IEDs, real-time digital simulator, standalone MUs and Ethernet equipment can be used for future research applications. The test-bench can be used to demonstrate during course work for students at the University, the basics of digital substations using a process bus network with IEDs, MUs and Ethernet equipment.

Practical implications

The research work showed where lab equipment is getting outdated and future equipment will be required for research work in IEC 61850–9-2 process bus.

Originality/value

Power utilities can benefit from implementing the IEC 61850 part 9–2 of the standard and by using MUs and other process interface information in substations. A cost reduction in high voltage equipment, substation installation and commissioning costs and better performance of protection and control system can be achieved.

Book part
Publication date: 18 December 2003

John Michael Montias

Abstract

Details

Economics of Art and Culture Invited Papers at the 12th International Conference of the Association of Cultural Economics International
Type: Book
ISBN: 978-0-44450-995-6

Article
Publication date: 4 January 2021

Simon Levinson, Pieter Willem Nel and Louise-Margaret Conlan

There is a gap in the literature regarding the experiences of newly qualified Clinical Psychologists (NQCPs) working within Child and Adolescent Mental Health Services (CAMHS) in…

Abstract

Purpose

There is a gap in the literature regarding the experiences of newly qualified Clinical Psychologists (NQCPs) working within Child and Adolescent Mental Health Services (CAMHS) in the National Health Service (NHS). This paper aims to explore three aspects of newly qualified Clinical Psychologists’ experiences: their transition and development; working in multi-disciplinary teams located in large organisations; and support and coping in the role.

Design/methodology/approach

Seven participants each engaged in one semi-structured interview, and an interpretative phenomenological analysis was conducted.

Findings

Three super-ordinate themes emerged from the analysis: A big jump, the transition from trainee to NQCP; The support of home comforts, old and new; and Acknowledging and desiring ongoing development.

Originality/value

Implications and recommendations for both Clinical Psychology training programmes and NHS employers are discussed, to support the development and wellbeing of this staff group, and in turn the clinical population they serve. These include gradually increasing caseloads on training, a staggered workload at the outset of the transition, and CAMHS teams ensuring appropriate supervision for NQCPs.

Details

The Journal of Mental Health Training, Education and Practice, vol. 16 no. 3
Type: Research Article
ISSN: 1755-6228

Keywords

Article
Publication date: 1 January 1947

ALFRED LOEWENBERG

The following list is a first attempt to catalogue and describe systematically the British Museum's extensive holdings of early opera librettos and related plays. The great…

Abstract

The following list is a first attempt to catalogue and describe systematically the British Museum's extensive holdings of early opera librettos and related plays. The great importance of these unpretentious booklets as supplementary and, more often than not, even primary sources for the history and bibliography of dramatic music, besides or instead of the scores, was already clearly recognized in the eighteenth century by Dr. Burney and other scholars. But it is only since 1914, the year in which O. G. T. Sonneck's Library of Congress Catalogue of opera librettos printed before 1800 appeared, that their documentary value could to any greater extent be put to general use in international musicological research. A similar bibliography of the British Museum librettos, while naturally duplicating many Washington entries, would produce a great number of additional tides, not a few of them otherwise unrecorded; it would provide the musical scholar with the key to a collection unequalled elsewhere in Europe, which owing to the peculiar nature of the material is not easily accessible by means of the General Catalogue.

Details

Journal of Documentation, vol. 2 no. 4
Type: Research Article
ISSN: 0022-0418

Book part
Publication date: 23 September 2019

Yael Frish

The chapter presents an analysis of the decision-making process of leaders on issues of nuclear armament and nuclear disarmament, through four case studies. The first, pertaining…

Abstract

The chapter presents an analysis of the decision-making process of leaders on issues of nuclear armament and nuclear disarmament, through four case studies. The first, pertaining armament, is South Africa, with a focus on Pieter Willem Botha, former prime minister and president of South Africa. The second deals with former Libyan President Muammar Gaddafi’s nuclear armament decision. The third case study investigates the decision of former president of South Africa, F. W. De Klerk, on nuclear disarmament. The fourth and final case study uncovers Colonel Muammar Gaddafi’s nuclear disarmament decision.

Using the Applied Decision Analysis (ADA) method historical decisions have been analyzed in this chapter for the purpose of identifying each leader’s ‘decision code’. Specifically, were these decisions based on rational calculations or were they influenced more by cognitive decision processes?

By revealing a ‘decision code’ using a reverse engineering of the decision processes, I conclude that the three leaders placed high importance on security and geopolitics. By analyzing different dimensions and processes that impacted their decision processes, it is evident that while armament decision utilizes the poliheuristic decision rule, disarmament decisions abide by rational calculations.

Details

How Do Leaders Make Decisions?
Type: Book
ISBN: 978-1-78743-394-6

Keywords

Article
Publication date: 21 August 2021

Oktofa Yudha Sudrajad

The purpose of this paper is to examine to what extent is the impact of Basel II adoption on bank business models in the emerging market of selected ASEAN member states.

Abstract

Purpose

The purpose of this paper is to examine to what extent is the impact of Basel II adoption on bank business models in the emerging market of selected ASEAN member states.

Design/methodology/approach

To evaluate the impact of the Basel II regulation on banking business models, a difference-in-differences estimation approach is used. This study defines bank business models using diversification index of a modified Herfindahl–Hirschman Index.

Findings

The findings suggest that the Basel II framework only affects banks’ income diversification, while there is no evidence that it leads to funding and asset diversification. Under the Basel II accord, banks have adjusted their business models by diversifying their sources of income to avoid the obligation for keeping more capital; in contrast, a less developed financial market structure and a dependency on customer deposits are creating difficulties for banks in diversifying their funding and asset structure.

Research limitations/implications

The banking sample are taken only from ASEAN countries.

Practical implications

The findings provide important implication on the regulatory perspective, which is the implementation of Basel II framework induces higher intensity for the use of non-interest income activities. Including in these activities are trading and derivatives. Accordingly, the financial authorities should take with care the use of trading and derivatives products in the banking industry which is already embedded in current Basel framework, the Basel III Accord.

Originality/value

The paper provides direct evidence on the impact of Basel II on bank business models in the emerging markets of ASEAN banking sectors.

Details

Journal of Financial Regulation and Compliance, vol. 29 no. 5
Type: Research Article
ISSN: 1358-1988

Keywords

Open Access
Article
Publication date: 14 May 2018

Jan-Willem Bullee, Lorena Montoya, Marianne Junger and Pieter Hartel

When security managers choose to deploy a smart lock activation system, the number of units needed and their location needs to be established. This study aims to present the…

1575

Abstract

Purpose

When security managers choose to deploy a smart lock activation system, the number of units needed and their location needs to be established. This study aims to present the results of a penetration test involving smart locks in the context of building security. The authors investigated how the amount of effort an employee has to invest in complying with a security policy (i.e. walk from the office to the smart key activator) influences vulnerability. In particular, the attractiveness of a no-effort alternative (i.e. someone else walking from your office to the key activators to perform a task on your behalf) was evaluated. The contribution of this study relates to showing how experimental psychology can be used to determine the cost-benefit analysis (CBA) of physical building security measures.

Design/methodology/approach

Twenty-seven different “offenders” visited the offices of 116 employees. Using a script, each offender introduced a problem, provided a solution and asked the employee to hand over their office key.

Findings

A total of 58.6 per cent of the employees handed over their keys to a stranger; no difference was found between female and male employees. The likelihood of handing over the keys for employees close to a key activator was similar to that of those who were further away.

Research limitations/implications

The results suggest that installing additional key activators is not conducive to reducing the building’s security vulnerability associated with the handing over of keys to strangers.

Originality/value

No research seems to have investigated the distribution of smart key activators in the context of a physical penetration test. This research highlights the need to raise awareness of social engineering and of the vulnerabilities introduced via smart locks (and other smart systems).

Details

Journal of Corporate Real Estate, vol. 20 no. 2
Type: Research Article
ISSN: 1463-001X

Keywords

Article
Publication date: 1 June 1990

Pieter J.A. Nagel and Willem W. Cilliers

In recognising the need to research the conceptof customer satisfaction the study aims to developa strategic approach to measuring a customer′ssatisfaction with a particular…

6229

Abstract

In recognising the need to research the concept of customer satisfaction the study aims to develop a strategic approach to measuring a customer′s satisfaction with a particular enterprise. The study is an attempt to (1) develop an overall concept of customer satisfaction; (2) provide a detailed relationship structure for implementation within a company; and (3) identify potential research areas. A basic premiss of the study is that the focus should be on maximising total product value to the customer; and then, second, that customer satisfaction of external customers is inter‐dependent on the satisfaction of internal customers. The framework of the research centres on a proposed model which integrates all aspects so as to maximise the potential of the organisation and all its subsystems to create and sustain satisfied customers. The approach begins with a conceptualisation phase in which the concept of customer satisfaction is explored. Attributes are then classified into services and this is then extended to integrate the internal customer into a total service model; applying gap‐analysis to this model. Enterprise satisfaction provides the basis for extending the total service model; positioning is applied to the customer satisfaction strategy; and operationalising of this strategy is proposed through an implementation model.

Details

International Journal of Physical Distribution & Logistics Management, vol. 20 no. 6
Type: Research Article
ISSN: 0960-0035

Keywords

Article
Publication date: 13 November 2017

Jan-Willem Bullee, Lorena Montoya, Marianne Junger and Pieter Hartel

The purpose of this study is to explore how the opening phrase of a phishing email influences the action taken by the recipient.

1924

Abstract

Purpose

The purpose of this study is to explore how the opening phrase of a phishing email influences the action taken by the recipient.

Design/methodology/approach

Two types of phishing emails were sent to 593 employees, who were asked to provide personally identifiable information (PII). A personalised spear phishing email opening was randomly used in half of the emails.

Findings

Nineteen per cent of the employees provided their PII in a general phishing email, compared to 29 per cent in the spear phishing condition. Employees having a high power distance cultural background were more likely to provide their PII, compared to those with a low one. There was no effect of age on providing the PII requested when the recipient’s years of service within the organisation is taken into account.

Practical implications

This research shows that success is higher when the opening sentence of a phishing email is personalised. The resulting model explains victimisation by phishing emails well, and it would allow practitioners to focus awareness campaigns to maximise their effect.

Originality/value

The innovative aspect relates to explaining spear phishing using four socio-demographic variables.

Details

Information & Computer Security, vol. 25 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Book part
Publication date: 30 September 2021

Peter Theodore Veru

One of the most important, least-known documents of the American Revolution was a 25-page pamphlet published in Amsterdam early in 1787: An Explanatory Message Concerning the Funds

Abstract

One of the most important, least-known documents of the American Revolution was a 25-page pamphlet published in Amsterdam early in 1787: An Explanatory Message Concerning the Funds by Pieter Stadnitski. 1 Within a year of its publication Peter Stadnitski's Message quite literally revolutionized American sovereign finance. My paper will summarize in detail the report's content and analyze its arguments in light of Dutch archival materials including deeds, newspaper reports, and letters, as well as congressional records from American sources. It will describe what Dutch investors knew (and did not know) of the state of American public finance and American political landscape, and the Dutch financial community's view of the American future. Its essential argument is that thanks initially to Stadnitski's persuasive case and ultimately to the success of the trusts he pioneered, Dutch investment specialists came to see the American republic as a safe haven at a time that Dutch Republic's own future seemed increasingly perilous. If their dream of achieving a new Golden Age through trade and investment with the new nation ultimately proved illusory, the effects of Dutch capital in creating financial stability for the United States government and igniting the first peacetime economic expansion in American history were revolutionary indeed.

Details

Research in Economic History
Type: Book
ISBN: 978-1-80071-880-7

Keywords

1 – 10 of 38