370 research outputs found
Co-creating the cities of the future
In recent years, the evolution of urban environments, jointly with the progress of the Information and Communication sector, have enabled the rapid adoption of new solutions that contribute to the growth in popularity of Smart Cities. Currently, the majority of the world population lives in cities encouraging different stakeholders within these innovative ecosystems to seek new solutions guaranteeing the sustainability and efficiency of such complex environments. In this work, it is discussed how the experimentation with IoT technologies and other data sources form the cities can be utilized to co-create in the OrganiCity project, where key actors like citizens, researchers and other stakeholders shape smart city services and applications in a collaborative fashion. Furthermore, a novel architecture is proposed that enables this organic growth of the future cities, facilitating the experimentation that tailors the adoption of new technologies and services for a better quality of life, as well as agile and dynamic mechanisms for managing cities. In this work, the different components and enablers of the OrganiCity platform are presented and discussed in detail and include, among others, a portal to manage the experiment life cycle, an Urban Data Observatory to explore data assets, and an annotations component to indicate quality of data, with a particular focus on the city-scale opportunistic data collection service operating as an alternative to traditional communications.This work has been partially funded by the research project OrganiCity, under the grant agreement No. 645198 of the European Union’s Horizon 2020 research and innovation program
Reconfiguring the city in the global South: rationalities, techniques and subjectivities in the local governance of energy
Debates around climate change and resource security are reshaping the way cities conceive and develop their infrastructures. Electricity systems play a key role in this transformation, as cities across the world set out to implement local energy strategies via decentralised and low carbon energy systems. Such transformation is of particular relevance for cities in the global South, where rapid economic growth and an increase in energy consumption coexist with acute social needs and unmet infrastructure provision. Through a comparative study of two cities (Thane, in the Mumbai Metropolitan Region, India, and São Paulo, in Brazil) this thesis evaluates the way in which public and private stakeholders are implementing a new form of local energy generation through the use of domestic solar hot water (SHW) systems as a mechanism for reducing electricity consumption. By focusing on the governing mechanisms involved in scaling-up solar technologies and the ways by which these are mobilised to serve contrasting interests in the city, the thesis examines the emerging local governance of energy in the global South.
The thesis uses Foucault’s analytics of governmentality as a conceptual tool aimed at unpacking the different ways by which energy in the city, in its material and socio-political formations, is thought of, mobilised, and transformed. Through a combination of interviews, site visits, and ethnographic techniques, it examines how this transformation in urban infrastructures is changing the manner in which energy is governed, the spatial and socio-political implications of this transformation, and the way in which the material dimensions of SHW systems influence the transformation process. The thesis discusses the governmental rationales involved in the making of a local governance of energy, the key governmental techniques involved in operationalizing a solar energy regime, and the multiple ways in which energy subjects are imagined within this process
Exploring Cyber-Physical Systems’ Security Governance in the Oil and Gas Industry
The Fourth Industrial Revolution, which utilizes modern communication-dependent technologies, including cyber-physical systems (CPS), has made exploration and production operations more efficient in the oil and gas industry. CPS in this industry should be secured against operational threats to prevent interruption of critical oil and gas supplies and services. However, these systems are vulnerable to cyberattacks, and many oil and gas companies have not incorporated effective cybersecurity measures into their corporate management strategies. This qualitative, multiple-case study, which was guided by the routine activity theory, explored how cybersecurity governance was applied to develop controls that stopped or mitigated the consequences of cyberattacks against the CPS. Interview-based data were obtained through Zoom meetings with 20 global cybersecurity experts selected from cybersecurity-specialized groups on LinkedIn. These data were then triangulated with global CPS cybersecurity governance standards and methods. The data analysis resulted in nine themes, including CPS vulnerabilities and failure consequences, predominant cybersecurity governance, the efficiency of cybersecurity governance, governance challenges, offenders and motives, cybersecurity enhancement, CPS governance endorsement, cybersecurity performance assessment, and governance mandate. This study’s implications for positive social change include recommendations for applying cybersecurity governance strategies that reduce health and environmental incidents and prevent interruption of critical oil and gas deliveries due to cyberattacks. These results may also help improve the living conditions of the communities surrounding oil and gas fields and similar CPS-based industries worldwide
A Case Study Exploring Organizational Development and Performance Management in the Operational Infrastructure of a Professional Working Organization, Using Academic Constructs
Curriculum, as a concept, has been historically associated with traditional schooling, but the reality is that its application extends to many arenas beyond academia. Through the case study lens, this dissertation utilized the ideologies of curricular theorists John Dewey, John Franklin Bobbitt, and Ralph Tyler to explore how intended, enacted, and assessed curricula phases can integrate into a professional working organization’s comprehensive functionality and materialize into the planning and implementation of its operational infrastructure. Following content analysis of a selected institution’s operational system, using closed codes, a descriptive comprehensive curriculum was designed to address the research purpose of understanding employee performance and organizational outcomes. Findings indicated that curricular phases are inherently embedded into the organizational development and performance management of nonacademic spaces; moreover, the framework of an organization’s operational infrastructure consists largely of curriculum elements. The primary research implication invokes being able to manage the efficiency and effectiveness levels of (a) personnel unit performance and (b) the workplace environment, through curriculum analysis and prescription
Recommended from our members
24/7: Drone Operations and the Distributed Work of War
How does waging war effectively fade into the background for most Americans, even as it is one of the most defining aspects of the United States’ actions and priorities, both domestically and internationally? This dissertation takes up one dimension of this question by ethnographically engaging with a particular mode of contemporary US war making that involves the deployment of drones, large and high-altitude aerial vehicles, remotely controlled from within the United States. Based on fieldwork conducted over fourteen months between 2010 and 2015 within the US with communities involved in the deployment, planning, or assessment of Air Force drone operations, a primary contribution of the dissertation is to refocus critical discourses around drones through the lens of labor and the work entailed in war. By examining the divisions of labor implicated in ongoing drone warfare, a wider set of questions and implications takes shape about the nature of contemporary American war and where different kinds of responsibilities and modes of normalization lie.
The dissertation begins by arguing that the distributions of action and control that characterize drone operations are neither obvious nor necessary, but rather have taken hold only in the context of specific historical conditions of possibility. These conditions are what enable drone operations to be seen as an effective and ideal form of US military engagement, and involve interwoven developments in post-World War II military command and control theory, digital data, global information networks, and a reliance on legal frameworks that render state violence justified. The dissertation also examines the discrepancies between the imagined capacities of “unmanned” and “autonomous” drones and the current practices that constitute and maintain these technologies, which must be continually managed and constructed as effective and legitimate actors through professionalized military discourses and practices.
The second half of the dissertation, more ethnographic in focus, examines how drone operations are implicated in changing conceptions of military service and military-civilian distinctions. Through an examination of the tensions and controversies that have arisen around drone pilots, the dissertation presents how Air Force pilots and commanders involved in drone operations construct and position the value of drone operations as meaningful and honorable military service. The analysis demonstrates that while officers put forward the value of their work as professional and altruistic service, at the same time, an irreconcilable tension exists because the military labor of drone operations bears increasing similarity to other forms of contemporary civilian work, characterized by the language of compensation, flexibility, and in/security. The dissertation concludes by proposing the concept of the warzone as a way to encompass all the places in which war occurs, its consequences on the battlefield, but also its sites of execution and the range of people, places, and practices that are implicated in the ongoing conduct of war. The dissertation demonstrates that the increasing deployment of drone operations is a contributing factor to the seeming invisible state of war for the majority of Americans. However, this is not necessarily because war is being conducted at a distance, as most journalists and scholars propose. Rather it is because war is being conducted, sometimes literally, in Americans’ backyards, close-by in the United States, in ways that are obfuscated or rendered merely mundane
Technical Strategies Database Managers use to Protect Systems from Security Breaches
Healthcare organizations generate massive amounts of data through their databases that may be vulnerable to data breaches due to extensive user privileges, unpatched databases, standardized query language injections, weak passwords/usernames, and system weaknesses. The purpose of this qualitative multiple case study was to explore technical strategies database managers in Southeast/North Texas used to protect database systems from data breaches. The target population consisted of database managers from 2 healthcare organizations in this region. The integrated system theory of information security management was the conceptual framework. The data collection process included semistructured interviews with 9 database managers, including a review of 14 organizational documents. Data were put into NVivo 12 software for thematic coding. Coding from interviews and member checking was triangulated with corporate documents to produce 5 significant themes and 1 subtheme: focus on verifying the identity of users, develop and enforce security policies, implement efficient encryption, monitor threats posed by insiders, focus on safeguards against external threats, and a subtheme derived from vulnerabilities caused by weak passwords. The findings from the study showed that the implementation of security strategies improved organizations\u27 abilities to protect data from security incidents. Thus, the results may be applied to create social change, decreasing the theft of confidential data, and providing knowledge as a resource to accelerate the adoption of technical approaches to protect database systems rom security incidents
Cross Domain IW Threats to SOF Maritime Missions: Implications for U.S. SOF
As cyber vulnerabilities proliferate with the expansion of connected devices, wherein security is often forsaken for ease of use, Special Operations Forces (SOF) cannot escape the obvious, massive risk that they are assuming by incorporating emerging technologies into their toolkits. This is especially true in the maritime sector where SOF operates nearshore in littoral zones. As SOF—in support to the U.S. Navy— increasingly operate in these contested maritime environments, they will gradually encounter more hostile actors looking to exploit digital vulnerabilities. As such, this monograph comes at a perfect time as the world becomes more interconnected but also more vulnerable
Semantic discovery and reuse of business process patterns
Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse
An Evaluation of the Effectiveness of the MCA Rural Banks Computerization and Interconnectivity Project Implementation: A Comparative Case Study of Amanano and Odotobri Rural Bank Limited
The aim of this research project is to addresses the effectiveness of the MCA Rural Banks Computerization and Interconnectivity project to the rural banks. This study will provide an exploratory look at the challenges surrounding the computerization project implementation and how the system administrators, Managers and staff of Amanano and Odotobri Rural Bank in particular perceive them.Collation of the relevant data is followed by a discussion of the challenges emanating from the computerization project that impedes on the effectiveness of the process. After analyzing the relevant information, it became apparent that there are three primary results, which are shown here. The first is that, strategic planning for the computerization project is fundamental and key to the ultimate effectiveness of MCA computerization project. Planning with regard to the acquisition of equipment for the computerization project has proven to be a difficult accomplishment regardless of the type of rural bank. Secondly, training and sensitization of the staff on information technology has proven to be a major factor in effective implementation of the project. This trend speaks directly to the lack of training and the difficulties rural banks face during the computerization of their banks. Finally, it is shown that the expertise level of staff with regard to Information Technology has proven to be a contributing factor to the effectiveness of the computerization implementation process. Keywords: Information and Communication Technology, IT Planning, Millennium Challenge Account (MCA), IT Procurement, IT implementation, RCB, ARP Apex Ban
- …