19,117 research outputs found
Safety management theory and the military expeditionary organization: A critical theoretical reflection
Management of safety within organizations has become a key topic within safety science. Theorizing on this subject covers a diverse pallet of concepts such as âresilienceâ and âsafety management systemsâ. Recent studies indicate that safety management theory has deficiencies. Our interpretation of these deficiencies is that much confusion originates from the issue that crucial meta-theoretical assumptions are mostly implicit or applied inconsistently. In particular, we argue that these meta-theoretical assumptions are of a systems theoretical nature. Therefore, we provide a framework that will be able to explicate and reflect on systems theoretical assumptions. With this framework, we analyze the ability of two frequently used safety management theories to tackle the problem of managing safety of Dutch military expeditionary organizations. This paper will show that inconsistent and implicit application of systems theoretical assumptions in these safety management theories results in problems to tackle such a practical problem adequately. We conclude with a reflection on the pros and cons of our framework. Also, we suggest particular meta-theoretical aspects that seem to be essential for applying safety management theory to organizations
Recommended from our members
Exploiting tacit knowledge through knowledge management technologies
The purpose of this paper is to examine the contributions and suitability of the available knowledge management (KM) technologies, including the Web 2.0 for exploiting tacit knowledge. It proposes an integrated framework for extracting tacit knowledge in organisations, which includes Web 2.0 technologies, KM tools, organisational learning (OL) and Community of Practice (CoP). It reviews a comprehensive literature covering overview of KM theories, KM technologies and OL and identifies the current state of knowledge relating to tacit knowledge exploitation. The outcomes of the paper indicate that Internet and Web 2.0 technologies have stunning prospects for creating learning communities where tacit knowledge can be extracted from people. The author recommends that organisations should design procedures and embed them in their Web 2.0 collaborative platforms persuading employees to record their ideas and share them with other members. It is also recommended that no idea should be taken for granted in a learning community where tacit knowledge exploitation is pursued. It is envisaged that future research should adopt empirical approach involving Complex Adaptive Model for Tacit Knowledge Exploitation (CAMTaKE) and the Theory of Deferred Action in examining the effectiveness of KM technologies including Web 2.0 tools for tacit knowledge exploitation
Detection of Non-Technical Losses in Smart Distribution Networks: a Review
With the advent of smart grids, distribution utilities have
initiated a large deployment of smart meters on the premises of the
consumers. The enormous amount of data obtained from the consumers
and communicated to the utility give new perspectives and possibilities
for various analytics-based applications. In this paper the current
smart metering-based energy-theft detection schemes are reviewed and
discussed according to two main distinctive categories: A) system statebased,
and B) arti cial intelligence-based.ComisiĂłn Europea FP7-PEOPLE-2013-IT
- âŠ