71,726 research outputs found
Recommended from our members
A survey of simulation techniques in commerce and defence
Despite the developments in Modelling and Simulation (M&S) tools and techniques over the past years, there has been a gap in the M&S research and practice in healthcare on developing a toolkit to assist the modellers and simulation practitioners with selecting an appropriate set of techniques. This study is a preliminary step towards this goal. This paper presents some results from a systematic literature survey on applications of M&S in the commerce and defence domains that could inspire some improvements in the healthcare. Interim results show that in the commercial sector Discrete-Event Simulation (DES) has been the most widely used technique with System Dynamics (SD) in second place. However in the defence sector, SD has gained relatively more attention. SD has been found quite useful for qualitative and soft factors analysis. From both the surveys it becomes clear that there is a growing trend towards using hybrid M&S approaches
Collaborative improvement as an inspiration for supply chain collaboration
The battlefield of competition is today moving from the level of\ud
individual firms to the one of the extended enterprises, that is, networks of customers and their suppliers. This paper discusses how learning and continuous improvement today take place in processes based on daily collaboration at intercompany level, i.e. Extended Manufacturing Enterprises (EMEs). The purpose of the paper is to present a preliminary theory on Collaborative Improvement (CoI), i.e. continuous improvement at the EME level. Based on a literature review on Supply Networks, and Continuous Improvement and on evidence from two explorative case studies, the paper proposes a model for Collaborative Improvement in EMEs and discusses a research approach based on Action Research and Action Learning to further develop preliminary theory and actionable knowledge on how to foster and sustain CoI in EMEs
Recommended from our members
Police Knowledge Exchange: Full Report 2018
[Executive Summary]
This report was commissioned to explore the enablers and barriers to sharing within and between police forces and between police forces and partners, including the public. This was completed from an interdisciplinary review of international literature covering sharing, knowledge exchange, learning and organisational learning. The literature broke down into four main factors; who, why, what and how. An introduction to the literature is presented with âWhoâ is sharing which considers both personal identity and different institutional issues. The âWhyâ literature covers issues of cultural and community motivators and barriers. The âWhatâ segment reviews concepts of data, information and knowledge and related legislative issues. Finally, the âhowâ section spans face to face sharing approaches to technologies that produce both enablers and barriers. A series of 42 in-depth interviews and focus groups were completed and combined with 47 survey responses . The aim of the interviews, focus groups and survey was to show perceptions and beliefs around knowledge sharing from a small sample across policing in order to complement the findings from the literature review.
The survey was adapted from a standardised questionnaire (Biggs, 1987). The Biggs questionnaire focused on what motivated students to learn and how they approached their learning. Our adapted survey looked at what motivated police to share, and how they approached sharing. The responses showed a trend, across the police, towards a motivation for sharing to develop a deeper understanding of issues. However, the approaches and the strategies they used to share with others, which were primarily driven by achieving and surface approaches (to get promoted and get the job done). According to Biggs (1987) this could leave them discontented as they never progress to a deeper understanding of issues. Scaffolding sharing within the police through processes that are clearly defined, effective and valued could help to overcome these issues.
Within the interviews and focus group findings a similar structured approach to sharing was adopted. Within the âwhoâ section some key aspects around personal relationships, reciprocity and reputation were identified. The âwhyâ the police share was one of the largest discussion points. Not only was there a deep motivation to solve key policing issues there was an approach of reciprocity. Police sharing was deeply motivated to support âgood practiceâ in the prevention and detection of crime. However, a sharing barrier was identified in the parity of value given to different types of knowledge for example between professional judgement and research evidence knowledge. Sharing was achieved when there were reciprocal benefits, in particular with personal networks or face to face sharing which was noted as âsafeâ. Again, this was inhibited by misunderstandings around the ârisksâ of sharing, frequently attributed to data protection legislation; producing cautious reactions and as an avoidance tactic to save time and effort sharing. However, a divide was noted between technical users and those who avoided any online systems for sharing; often due to poorly designed systems and a lack of confidence in how to use systems. The police culture was identified as being risk-adverse, and competitive due to multiple factors, a lack of supported time to share, Her Majestyâs Inspectorate of Constabulary (HMIC) reviews and promotion criteria. The result was perceived to be a poor cultural ability to learn from mistakes and a likelihood to repeat errors.
A set of strategic recommendations are given and include the use of a sharing authorised professional practice for HMIC reviews, sharing networks and training. A further set of operational recommendations are given such as; sharing impact cases for evidence based practice, data sharing officers and evaluating mechanisms for sharing.
This full report is supported by the Police Knowledge Exchange Summary Report 2018 which gives an overview of the findings and recommendations
Expert Elicitation for Reliable System Design
This paper reviews the role of expert judgement to support reliability
assessments within the systems engineering design process. Generic design
processes are described to give the context and a discussion is given about the
nature of the reliability assessments required in the different systems
engineering phases. It is argued that, as far as meeting reliability
requirements is concerned, the whole design process is more akin to a
statistical control process than to a straightforward statistical problem of
assessing an unknown distribution. This leads to features of the expert
judgement problem in the design context which are substantially different from
those seen, for example, in risk assessment. In particular, the role of experts
in problem structuring and in developing failure mitigation options is much
more prominent, and there is a need to take into account the reliability
potential for future mitigation measures downstream in the system life cycle.
An overview is given of the stakeholders typically involved in large scale
systems engineering design projects, and this is used to argue the need for
methods that expose potential judgemental biases in order to generate analyses
that can be said to provide rational consensus about uncertainties. Finally, a
number of key points are developed with the aim of moving toward a framework
that provides a holistic method for tracking reliability assessment through the
design process.Comment: This paper commented in: [arXiv:0708.0285], [arXiv:0708.0287],
[arXiv:0708.0288]. Rejoinder in [arXiv:0708.0293]. Published at
http://dx.doi.org/10.1214/088342306000000510 in the Statistical Science
(http://www.imstat.org/sts/) by the Institute of Mathematical Statistics
(http://www.imstat.org
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
Automatic dependent surveillance-broadcast (ADS-B) is the communications
protocol currently being rolled out as part of next generation air
transportation systems. As the heart of modern air traffic control, it will
play an essential role in the protection of two billion passengers per year,
besides being crucial to many other interest groups in aviation. The inherent
lack of security measures in the ADS-B protocol has long been a topic in both
the aviation circles and in the academic community. Due to recently published
proof-of-concept attacks, the topic is becoming ever more pressing, especially
with the deadline for mandatory implementation in most airspaces fast
approaching.
This survey first summarizes the attacks and problems that have been reported
in relation to ADS-B security. Thereafter, it surveys both the theoretical and
practical efforts which have been previously conducted concerning these issues,
including possible countermeasures. In addition, the survey seeks to go beyond
the current state of the art and gives a detailed assessment of security
measures which have been developed more generally for related wireless networks
such as sensor networks and vehicular ad hoc networks, including a taxonomy of
all considered approaches.Comment: Survey, 22 Pages, 21 Figure
Exploiting Qualitative Information for Decision Support in Scenario Analysis
The development of scenario analysis (SA) to assist decision makers and stakeholders has been growing over the last few years through mainly exploiting qualitative information provided by experts. In this study, we present SA based on the use of qualitative data for strategy planning. We discuss the potential of SA as a decision-support tool, and provide a structured approach for the interpretation of SA data, and an empirical validation of expert evaluations that can help to measure the consistency of the analysis. An application to a specific case study is provided, with reference to the European organic farming business
A New Role for Human Resource Managers: Social Engineering Defense
[Excerpt] The general risk of social engineering attacks to organizations has increased with the rise of digital computing and communications, while for an attacker the risk has decreased. In order to counter the increased risk, organizations should recognize that human resources (HR) professionals have just as much responsibility and capability in preventing this risk as information technology (IT) professionals.
Part I of this paper begins by defining social engineering in context and with a brief history pre-digital age attacks. It concludes by showing the intersection of HR and IT through examples of operational attack vectors. In part II, the discussion moves to a series of measures that can be taken to help prevent social engineering attacks
The Industry and Policy Context for Digital Games for Empowerment and Inclusion:Market Analysis, Future Prospects and Key Challenges in Videogames, Serious Games and Gamification
The effective use of digital games for empowerment and social inclusion (DGEI) of people and communities at risk of exclusion will be shaped by, and may influence the development of a range of sectors that supply products, services, technology and research. The principal industries that would appear to be implicated are the 'videogames' industry, and an emerging 'serious games' industry. The videogames industry is an ecosystem of developers, publishers and other service providers drawn from the interactive media, software and broader ICT industry that services the mainstream leisure market in games, The 'serious games' industry is a rather fragmented and growing network of firms, users, research and policy makers from a variety of sectors. This emerging industry is are trying to develop knowledge, products, services and a market for the use of digital games, and products inspired by digital games, for a range of non-leisure applications. This report provides a summary of the state of play of these industries, their trajectories and the challenges they face. It also analyses the contribution they could make to exploiting digital games for empowerment and social inclusion. Finally, it explores existing policy towards activities in these industries and markets, and draws conclusions as to the future policy relevance of engaging with them to support innovation and uptake of effective digital game-based approaches to empowerment and social inclusion.JRC.J.3-Information Societ
- âŠ