Search results

1 – 10 of over 17000
Book part
Publication date: 1 November 2007

Irina Farquhar and Alan Sorkin

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative…

Abstract

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative information technology open architecture design and integrating Radio Frequency Identification Device data technologies and real-time optimization and control mechanisms as the critical technology components of the solution. The innovative information technology, which pursues the focused logistics, will be deployed in 36 months at the estimated cost of $568 million in constant dollars. We estimate that the Systems, Applications, Products (SAP)-based enterprise integration solution that the Army currently pursues will cost another $1.5 billion through the year 2014; however, it is unlikely to deliver the intended technical capabilities.

Details

The Value of Innovation: Impact on Health, Life Quality, Safety, and Regulatory Research
Type: Book
ISBN: 978-1-84950-551-2

Content available
Book part
Publication date: 1 January 1991

Abstract

Details

Operations Research for Libraries and Information Agencies: Techniques for the Evaluation of Management Decision Alternatives
Type: Book
ISBN: 978-0-12424-520-4

Book part
Publication date: 7 October 2015

Azizah Ahmad

The strategic management literature emphasizes the concept of business intelligence (BI) as an essential competitive tool. Yet the sustainability of the firms’ competitive…

Abstract

The strategic management literature emphasizes the concept of business intelligence (BI) as an essential competitive tool. Yet the sustainability of the firms’ competitive advantage provided by BI capability is not well researched. To fill this gap, this study attempts to develop a model for successful BI deployment and empirically examines the association between BI deployment and sustainable competitive advantage. Taking the telecommunications industry in Malaysia as a case example, the research particularly focuses on the influencing perceptions held by telecommunications decision makers and executives on factors that impact successful BI deployment. The research further investigates the relationship between successful BI deployment and sustainable competitive advantage of the telecommunications organizations. Another important aim of this study is to determine the effect of moderating factors such as organization culture, business strategy, and use of BI tools on BI deployment and the sustainability of firm’s competitive advantage.

This research uses combination of resource-based theory and diffusion of innovation (DOI) theory to examine BI success and its relationship with firm’s sustainability. The research adopts the positivist paradigm and a two-phase sequential mixed method consisting of qualitative and quantitative approaches are employed. A tentative research model is developed first based on extensive literature review. The chapter presents a qualitative field study to fine tune the initial research model. Findings from the qualitative method are also used to develop measures and instruments for the next phase of quantitative method. The study includes a survey study with sample of business analysts and decision makers in telecommunications firms and is analyzed by partial least square-based structural equation modeling.

The findings reveal that some internal resources of the organizations such as BI governance and the perceptions of BI’s characteristics influence the successful deployment of BI. Organizations that practice good BI governance with strong moral and financial support from upper management have an opportunity to realize the dream of having successful BI initiatives in place. The scope of BI governance includes providing sufficient support and commitment in BI funding and implementation, laying out proper BI infrastructure and staffing and establishing a corporate-wide policy and procedures regarding BI. The perceptions about the characteristics of BI such as its relative advantage, complexity, compatibility, and observability are also significant in ensuring BI success. The most important results of this study indicated that with BI successfully deployed, executives would use the knowledge provided for their necessary actions in sustaining the organizations’ competitive advantage in terms of economics, social, and environmental issues.

This study contributes significantly to the existing literature that will assist future BI researchers especially in achieving sustainable competitive advantage. In particular, the model will help practitioners to consider the resources that they are likely to consider when deploying BI. Finally, the applications of this study can be extended through further adaptation in other industries and various geographic contexts.

Details

Sustaining Competitive Advantage Via Business Intelligence, Knowledge Management, and System Dynamics
Type: Book
ISBN: 978-1-78441-764-2

Keywords

Book part
Publication date: 15 October 2008

Uroš Svete

Technology has always been one of the decisive factors, by which the outcome of conflict or war ought to be influenced without any doubt. But with Information-Communication…

Abstract

Technology has always been one of the decisive factors, by which the outcome of conflict or war ought to be influenced without any doubt. But with Information-Communication Technology (ICT) appearance it seems the revolutionary changes began concerning conflict perception, the organisation of actors waging a war and (spatial) spheres where conflicts are taking place. The case of last Iraqi war should confirm this thesis. The main purpose of my research paper is therefore to prove that ICT has really multidimensional impacts regarding recent conflicts and wars and these impacts should be analysed with interdisciplinary approach in any case.

So my research paper based especially on strategic (defence) studies as well as on communication and sociological theory guidelines, what actually ensures a real interdisciplinary approach. Within these three basic theoretical approaches the concepts such as propaganda, perception management and information operations/warfare as well as asymmetric warfare, have also been used.

Regarding research limitations and future work to do, my proposal is focusing towards information theory and informatics science, which should also be incorporated in modern conflict analysis. Without very good knowledge of how Internet is working and what are its technical possibilities there is no change, virtual part of recent conflicts is being treated properly.

Practical implications of the paper are visible especially in the proposal (model) how recent conflicts should be treated and understood and this is not important just for strategists and intelligence personal but also for journalists, academics etc. And practical implications as well as methodology approach based on the interdisciplinary has also added the main value and originality of the paper. It must be clear that the way how reality is constructed through the ICT (what is actually the point of constructivism theory) has tremendous importance also within conflict and strategic studies.

Details

Armed Forces and Conflict Resolution: Sociological Perspectives
Type: Book
ISBN: 978-1-8485-5122-0

Book part
Publication date: 27 June 2014

Andrew H. Chen, James A. Conover and John W. Kensinger

Analysis of Information Options offers new tools for evaluating investments in research, mineral exploration, logistics, energy transmission, and other information operations…

Abstract

Analysis of Information Options offers new tools for evaluating investments in research, mineral exploration, logistics, energy transmission, and other information operations. With Information Options, the underlying assets are information assets and the rules governing exercise are based on the realities of the information realm (infosphere). Information Options can be modeled as options to “purchase” information assets by paying the cost of the information operations involved. Information Options arise at several stages of value creation. The initial stage involves observation of physical phenomena with accompanying data capture. The next refinement is to organize the data into structured databases. Then bits of information are selected from storage and synthesized into an information product (such as a management report). Next, the information product is presented to the user via an efficient interface that does not require the user to be a field expert. Information Options are similar in concept to real options but substantially different in their details, since real options have physical objects as the underlying assets and the rules governing exercise are based on the realities of the physical world. Also, while exercising a financial option typically kills the option, Information Options may include multiple exercises. Information Options may involve high volatility or jump processes as well, further enhancing their value. This chapter extends several important real option applications into the information realm, including jump process models and models for valuing options to synthesize any of n information items into any of m output assets.

Book part
Publication date: 6 September 2021

Eileen M. Decker, Matthew Morin and Eric M. Rosner

Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a…

Abstract

Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a constant stream of cyberattacks through varied methods by actors with myriad motivations. These threats are not expected to diminish in the near future. As a result, homeland security and national security professionals at all levels of government must understand the unique motivations and capabilities of malicious cyber actors in order to better protect against and respond to cyberattacks. This chapter outlines the most common cyberattacks; explains the motivations behind these attacks; and describes the federal, state, and local efforts to address these threats.

Details

The Role of Law Enforcement in Emergency Management and Homeland Security
Type: Book
ISBN: 978-1-78769-336-4

Keywords

Book part
Publication date: 13 December 2017

Qiongwei Ye and Baojun Ma

Internet + and Electronic Business in China is a comprehensive resource that provides insight and analysis into E-commerce in China and how it has revolutionized and continues to…

Abstract

Internet + and Electronic Business in China is a comprehensive resource that provides insight and analysis into E-commerce in China and how it has revolutionized and continues to revolutionize business and society. Split into four distinct sections, the book first lays out the theoretical foundations and fundamental concepts of E-Business before moving on to look at internet+ innovation models and their applications in different industries such as agriculture, finance and commerce. The book then provides a comprehensive analysis of E-business platforms and their applications in China before finishing with four comprehensive case studies of major E-business projects, providing readers with successful examples of implementing E-Business entrepreneurship projects.

Internet + and Electronic Business in China is a comprehensive resource that provides insights and analysis into how E-commerce has revolutionized and continues to revolutionize business and society in China.

Details

Internet+ and Electronic Business in China: Innovation and Applications
Type: Book
ISBN: 978-1-78743-115-7

Book part
Publication date: 30 December 2004

Elizabeth S. Redden, James B. Sheehy and Eileen A. Bjorkman

This chapter provides an overview of the Department of Defense (DoD) laboratory structure to help equipment designers, modelers, and manufacturers determine where research…

Abstract

This chapter provides an overview of the Department of Defense (DoD) laboratory structure to help equipment designers, modelers, and manufacturers determine where research, testing programs, or relevant findings can be found. The chapter includes a discussion of the performance measures and metrics typically used in DoD laboratories and concludes by considering the current state-of-the-art as well as the state-of-the-possible for human performance measurement.

Details

The Science and Simulation of Human Performance
Type: Book
ISBN: 978-1-84950-296-2

Content available
Book part
Publication date: 31 July 2023

Michael Nizich

Abstract

Details

The Cybersecurity Workforce of Tomorrow
Type: Book
ISBN: 978-1-80382-918-0

Book part
Publication date: 6 December 2018

James Giordano and Kathinka Evers

Extant and newly developing techniques and technologies generated by research in brain sciences are characteristically employed in clinical medicine. However, the increasing…

Abstract

Extant and newly developing techniques and technologies generated by research in brain sciences are characteristically employed in clinical medicine. However, the increasing capabilities conferred by these approaches to access, assess and affect cognition, emotion and behavior render them viable and attractive for engagement beyond the clinical realm, in what are referred to as “dual-use” applications. Definitions of what constitutes dual-use research and applications can vary so as to include utilization in the public sector for lifestyle or wellness purposes – with growing participation of a do-it-yourself (i.e., biohacking) community, and an iterative interest and use in military and warfare operations. Such uses can pose risks to public safety, and challenge research ethics’ principled imperative for non-harm (although while complete avoidance of any harm may be in reality impossible, certainly any/all harms incurred should be minimized). Thus, it is important to both clarify the construct of dual-use brain research and address the ethical issues that such research fosters. This chapter provides a review and clarification of the concept of dual-use brain science, and describes how current and emerging tools and techniques of brain research are actually or potentially employed in settings that threaten public health and incur ethical concerns. Key ethical issues are addressed, and recommendations for ethical guidance of potentially dual-use research are proposed.

Details

Ethics and Integrity in Health and Life Sciences Research
Type: Book
ISBN: 978-1-78743-572-8

Keywords

1 – 10 of over 17000