282 research outputs found

    Dynamics in Logistics

    Get PDF
    This open access book highlights the interdisciplinary aspects of logistics research. Featuring empirical, methodological, and practice-oriented articles, it addresses the modelling, planning, optimization and control of processes. Chiefly focusing on supply chains, logistics networks, production systems, and systems and facilities for material flows, the respective contributions combine research on classical supply chain management, digitalized business processes, production engineering, electrical engineering, computer science and mathematical optimization. To celebrate 25 years of interdisciplinary and collaborative research conducted at the Bremen Research Cluster for Dynamics in Logistics (LogDynamics), in this book hand-picked experts currently or formerly affiliated with the Cluster provide retrospectives, present cutting-edge research, and outline future research directions

    Essential Speech and Language Technology for Dutch: Results by the STEVIN-programme

    Get PDF
    Computational Linguistics; Germanic Languages; Artificial Intelligence (incl. Robotics); Computing Methodologie

    Dynamics in Logistics

    Get PDF
    This open access book highlights the interdisciplinary aspects of logistics research. Featuring empirical, methodological, and practice-oriented articles, it addresses the modelling, planning, optimization and control of processes. Chiefly focusing on supply chains, logistics networks, production systems, and systems and facilities for material flows, the respective contributions combine research on classical supply chain management, digitalized business processes, production engineering, electrical engineering, computer science and mathematical optimization. To celebrate 25 years of interdisciplinary and collaborative research conducted at the Bremen Research Cluster for Dynamics in Logistics (LogDynamics), in this book hand-picked experts currently or formerly affiliated with the Cluster provide retrospectives, present cutting-edge research, and outline future research directions

    Proceedings of the VIIth GSCP International Conference

    Get PDF
    The 7th International Conference of the Gruppo di Studi sulla Comunicazione Parlata, dedicated to the memory of Claire Blanche-Benveniste, chose as its main theme Speech and Corpora. The wide international origin of the 235 authors from 21 countries and 95 institutions led to papers on many different languages. The 89 papers of this volume reflect the themes of the conference: spoken corpora compilation and annotation, with the technological connected fields; the relation between prosody and pragmatics; speech pathologies; and different papers on phonetics, speech and linguistic analysis, pragmatics and sociolinguistics. Many papers are also dedicated to speech and second language studies. The online publication with FUP allows direct access to sound and video linked to papers (when downloaded)

    UTB/TSC Legacy Degree Programs and Courses 2012 – 2013

    Get PDF
    https://scholarworks.utrgv.edu/brownsvillelegacycatalogs/1028/thumbnail.jp

    A tool to measure engineering students' design strategies and abilities

    Get PDF
    Malaysia is moving from service-based industries to knowledge-based industries to achieve Vision 2020. This is also in line with innovation-led economy and globalization. Hence, there is a pressing need to transform the current engineering education system to meet the ever-growing roles and responsibilities of contemporary engineers. Design is central to engineering activity because students can apply the theoretical knowledge into practice. Students' engineering design knowledge and abilities are unknown when they enroll into the engineering programs. These engineering programs are either too low or too advanced for the students' design abilities. Hence, dropout rates in the engineering programs escalate each year. The invention is an online questionnaire which will assist in determining students' engineering design knowledge and abilities. It will guide engineering faculties in identifying suitable candidates for their engineering program through the scores obtained by the students. The scores will determine the students' level of engineering design knowledge. This will function as a mechanism for the faculties to filter the candidates' knowledge of engineering design and reduce the number of dropouts from the engineering program

    Responsible AI and Analytics for an Ethical and Inclusive Digitized Society

    Get PDF
    publishedVersio

    Bringing light into the dark side of digitalization : consequences, antecedents, and mitigation mechanisms

    Get PDF
    As digital technologies permeate all aspects of our professional and private lives, digitalization causes profound changes for individuals, organizations, and societies. The use of digital technologies makes many activities easier, safer, faster, or more comfortable. In addition to many positive changes, digital technologies are also associated with numerous risks and side effects. The use of digital technologies might come along with severe negative consequences for individuals, organizations, and societies. The negative consequences can be triggered by various antecedents. In addition to identifying the negative consequences of digitalization and their antecedents, it is particularly important to develop appropriate mitigation mechanisms. This dissertation provides novel insights for IS researchers to better understand the negative consequences of using digital technologies. It contains a broad overview of the risks and side effects of digitalization and investigates related antecedents and mitigation mechanisms. To reach this goal, regarding research methods, this dissertation relies on the structured analysis of (scientific) literature and (expert) interviews as well as the analysis and interpretation of empirical data. Chapter 2 contributes to the research on the negative consequences of digitalization. Section 2.1 provides a comprehensive multi-level taxonomy of the risks and side effects of digitalization (RSEDs). Section 2.2 builds on Section 2.1 and is a substantial expansion and improvement of Section 2.1. The iterative taxonomy development process was complemented by four additional cycles. The final taxonomy comprises 11 RSEDs and their 39 subtypes. Both articles show that there is a wide range of risks and side effects of digitalization that need to be explored in more detail in the future. Chapter 3 focuses on the antecedents of digitalizations negative consequences. Section 3.1 sheds light on individuals concerns towards automated decision-making. The concerns are derived from academic literature and semi-structured interviews with potential users of algorithm-based technologies. Section 3.2 focuses on the evaluation of specific mHealth app features by potential users in Germany and Denmark. The study draws on survey data from both countries analyzed using the Kano method. Further, it comprises a quartile-based sample split approach to identify the underlying relationships between users characteristics and their perceptions of the mHealth app features. The results show significant differences between Germans and Danes in the evaluation of the app features and demonstrate which of the user characteristics best explain these differences. Both articles shed light on possible antecedents of negative consequences (i.e., user dissatisfaction, non-use) and thus contribute to a better understanding of the occurrence of negative consequences. Chapter 4 shows exemplary mitigation mechanisms to cope with the negative consequences of digitalization. Section 4.1 takes an organizational perspective and identifies data privacy measures that can be implemented by organizations to protect the personal data of their customers and address their privacy concerns. These measures were evaluated by analyzing data from two independent online surveys with the help of the Kano method. Section 4.2 focuses on an individual perspective by presenting the concept of a privacy bot that contributes to strengthening the digital sovereignty of internet users. With the help of the privacy bot, page-long privacy statements can be checked against previously stored individual data protection preferences. Both articles provide appropriate mitigation mechanisms to cope with users privacy concerns. These two examples show that there are a variety of ways to counter the risks and side effects of digitalization. The research articles included in this dissertation identify various risks and side effects of digitalization that need to be explored in more detail in future research. The two articles on antecedents help to better understand the occurrence of negative consequences of digitalization. The development of appropriate countermeasures, two of which are exemplified in this dissertation, should result in the benefits of digital technologies outweighing their risks.Da digitale Technologien alle Bereiche unseres beruflichen und privaten Lebens durchdringen, bewirkt die Digitalisierung tiefgreifende Veränderungen für Individuen, Organisationen und Gesellschaften. Viele Aktivitäten werden durch den Einsatz digitaler Technologien einfacher, sicherer, schneller oder bequemer. Neben vielen positiven Veränderungen sind digitale Technologien aber auch mit zahlreichen Risiken und Nebenwirkungen verbunden. Der Einsatz digitaler Technologien kann mit schwerwiegenden negativen Folgen für Individuen, Organisationen und Gesellschaften einhergehen. Diese negativen Folgen können durch verschiedene Einflussfaktoren ausgelöst werden. Zusätzlich zur Identifizierung der negativen Folgen der Digitalisierung und ihrer Ursachen ist es besonders wichtig, geeignete Schutzmaßnahmen zu entwickeln. Diese Dissertation liefert neue Erkenntnisse für IS-Forscher:innen, um die negativen Folgen der Nutzung digitaler Technologien besser zu verstehen. Sie enthält einen breiten Überblick über die Risiken und Nebenwirkungen der Digitalisierung und untersucht die damit verbundenen Ursachen und Schutzmaßnahmen. Um dieses Ziel zu erreichen, stützt sich die Dissertation forschungsmethodisch auf die strukturierte Analyse von (wissenschaftlicher) Literatur und (Expert:innen-)Interviews sowie auf die Auswertung und Interpretation empirischer Daten. Kapitel 2 leistet einen Beitrag zur Forschung über die negativen Folgen der Digitalisierung. Abschnitt 2.1 liefert eine umfassende mehrstufige Taxonomie der Risiken und Nebenwirkungen der Digitalisierung (RSEDs). Abschnitt 2.2 baut auf Abschnitt 2.1 auf und ist eine wesentliche Erweiterung und Verbesserung von Abschnitt 2.1. Der iterative Taxonomieentwicklungsprozess wurde durch vier weitere Zyklen ergänzt. Die endgültige Taxonomie umfasst 11 RSED und 39 Untertypen. Beide Artikel zeigen, dass es ein breites Spektrum an Risiken und Nebenwirkungen der Digitalisierung gibt, das in Zukunft noch genauer erforscht werden muss. Kapitel 3 befasst sich mit den Ursachen der negativen Folgen der Digitalisierung. Abschnitt 3.1 beleuchtet die Bedenken von Individuen gegenüber automatisierten Entscheidungen. Die Bedenken wurden aus wissenschaftlicher Literatur und halbstrukturierten Interviews mit potenziellen Nutzer:innen algorithmusbasierter Technologien abgeleitet. Abschnitt 3.2 konzentriert sich auf die Bewertung spezifischer Funktionen von mHealth-Apps durch potenzielle Nutzer in Deutschland und Dänemark. Die Studie basiert auf Umfragedaten aus beiden Ländern, die mit der Kano-Methode analysiert wurden. Darüber hinaus umfasst sie einen quartil-basierten Stichproben-Split-Ansatz, um die zugrundeliegenden Beziehungen zwischen den Merkmalen der Nutzer (z.B. Bedenken hinsichtlich des Datenschutzes) und ihrer Wahrnehmung der Funktionen von mHealth-Apps zu ermitteln. Die Ergebnisse zeigen signifikante Unterschiede zwischen Deutschen und Dänen bei der Bewertung der App-Funktionen und zeigen, welche der Nutzermerkmale diese Unterschiede am besten erklären. Beide Artikel beleuchten mögliche Ursachen negativer Folgen (z.B. Unzufriedenheit der Nutzer, Nichtnutzung) und tragen so zu einem besseren Verständnis des Auftretens negativer Folgen bei. Kapitel 4 zeigt beispielhafte Schutzmaßnahmen zur Bewältigung der negativen Folgen der Digitalisierung. Abschnitt 4.1 nimmt eine organisationale Perspektive ein und identifiziert Datenschutzmaßnahmen, die von Unternehmen umgesetzt werden können, um die personenbezogenen Daten ihrer Kund:innen zu schützen und deren Datenschutzbedenken zu berücksichtigen. Diese Maßnahmen wurden durch die Analyse von Daten aus zwei unabhängigen Online-Umfragen mit Hilfe der Kano-Methode evaluiert. In Abschnitt 4.2 wird eine individuelle Perspektive eingenommen, indem das Konzept eines Privacy Bots vorgestellt wird, der zur Stärkung der digitalen Souveränität von Internetnutzer:innen beiträgt. Mithilfe des Privacy Bots können seitenlange Datenschutzerklärungen mit zuvor gespeicherten individuellen Datenschutzpräferenzen abgeglichen werden. Beide Artikel beschreiben geeignete Schutzmaßnahmen, um den Datenschutzbedenken der Nutzer:innen gerecht zu werden. Diese beiden Beispiele zeigen, dass es eine Vielzahl von Möglichkeiten gibt, den Risiken und Nebenwirkungen der Digitalisierung zu begegnen. Die in dieser Dissertation enthaltenen Forschungsartikel zeigen verschiedene Risiken und Nebenwirkungen der Digitalisierung auf, die in der zukünftigen Forschung noch genauer untersucht werden müssen. Die beiden Artikel zu den Ursachen helfen, das Auftreten von negativen Konsequenzen der Digitalisierung besser zu verstehen. Die Entwicklung geeigneter Schutzmaßnahmen, von denen zwei in dieser Dissertation beispielhaft vorgestellt werden, sollte dazu führen, dass die Vorteile der digitalen Technologien ihre Risiken überwiegen

    Selective Outsourcing in Global IT Services : Operational Level Challenges and Opportunities

    Get PDF
    Companies need to answer and react timely and efficiently to their customers’ perception in order to stay in business. Companies are finding ways to control and reduce costs. Increasingly, internal IT development and service delivery activities are outsourced to external suppliers. The most common outsourcing forms are total and selective outsourcing, which are produced in nearshore and/or offshore mode. In this dissertation, the case units are two global units in Nokia Devices: IT unit and Delivery Quality and Corrective Action Preventive Action (DQ and CAPA) unit. This dissertation consists of five publications and five research questions. The motives for the research questions originate from the case units’ real-life needs and challenges. The research approach used is qualitative. Action research was conducted during years 2009-2013. This research gives focus on the global IT service delivery, although the case company’s core-competence was to produce end-consumer products. The target was to get operational level knowledge from the case units’ outsourcing operation and practices in a Global Selective Outsourcing Environment (GSOE). This dissertation addresses the opportunities and challenges of outsourcing faced by the operational level personnel. In the GSOE, the service purchasing company’s personnel and the supplier’s personnel jointly cooperate to produce the expected outcomes and IT services. This research found that the GSOE-based operation includes multi-level customer- and supplier-ships. In order to answer the customers’ perception, the operation included quality and customer-centric practices. This research found that defining and implementing customer centricity is challenging. Unclear definitions, requirements, roles, responsibilities, and activities can negatively affect the operational level implementation. The GSOEbased operation includes also contract negotiations among the GSOE parties. Successful IT outsourcing is not built only on formal contracts. Focus is needed also on building trust, commitment, communication, and mutual cooperation and dependence. This study found that retaining operational level progress and information visibility inside the service purchasing company made it possible to hold the ownership and avoid getting into a “supplier trap.” The operational level cooperation, interaction and quality management practices affected the service purchasing company’s trust and satisfaction. The trust in the case units was found to exist among people, and this trust was formed based on an individual’s knowledge, capabilities, behavior, and performance. Quality management practices played a significant role in building trust that added to the credibility of the operation
    corecore