370 research outputs found

    Co-creating the cities of the future

    Get PDF
    In recent years, the evolution of urban environments, jointly with the progress of the Information and Communication sector, have enabled the rapid adoption of new solutions that contribute to the growth in popularity of Smart Cities. Currently, the majority of the world population lives in cities encouraging different stakeholders within these innovative ecosystems to seek new solutions guaranteeing the sustainability and efficiency of such complex environments. In this work, it is discussed how the experimentation with IoT technologies and other data sources form the cities can be utilized to co-create in the OrganiCity project, where key actors like citizens, researchers and other stakeholders shape smart city services and applications in a collaborative fashion. Furthermore, a novel architecture is proposed that enables this organic growth of the future cities, facilitating the experimentation that tailors the adoption of new technologies and services for a better quality of life, as well as agile and dynamic mechanisms for managing cities. In this work, the different components and enablers of the OrganiCity platform are presented and discussed in detail and include, among others, a portal to manage the experiment life cycle, an Urban Data Observatory to explore data assets, and an annotations component to indicate quality of data, with a particular focus on the city-scale opportunistic data collection service operating as an alternative to traditional communications.This work has been partially funded by the research project OrganiCity, under the grant agreement No. 645198 of the European Union’s Horizon 2020 research and innovation program

    Reconfiguring the city in the global South: rationalities, techniques and subjectivities in the local governance of energy

    Get PDF
    Debates around climate change and resource security are reshaping the way cities conceive and develop their infrastructures. Electricity systems play a key role in this transformation, as cities across the world set out to implement local energy strategies via decentralised and low carbon energy systems. Such transformation is of particular relevance for cities in the global South, where rapid economic growth and an increase in energy consumption coexist with acute social needs and unmet infrastructure provision. Through a comparative study of two cities (Thane, in the Mumbai Metropolitan Region, India, and São Paulo, in Brazil) this thesis evaluates the way in which public and private stakeholders are implementing a new form of local energy generation through the use of domestic solar hot water (SHW) systems as a mechanism for reducing electricity consumption. By focusing on the governing mechanisms involved in scaling-up solar technologies and the ways by which these are mobilised to serve contrasting interests in the city, the thesis examines the emerging local governance of energy in the global South. The thesis uses Foucault’s analytics of governmentality as a conceptual tool aimed at unpacking the different ways by which energy in the city, in its material and socio-political formations, is thought of, mobilised, and transformed. Through a combination of interviews, site visits, and ethnographic techniques, it examines how this transformation in urban infrastructures is changing the manner in which energy is governed, the spatial and socio-political implications of this transformation, and the way in which the material dimensions of SHW systems influence the transformation process. The thesis discusses the governmental rationales involved in the making of a local governance of energy, the key governmental techniques involved in operationalizing a solar energy regime, and the multiple ways in which energy subjects are imagined within this process

    Exploring Cyber-Physical Systems’ Security Governance in the Oil and Gas Industry

    Get PDF
    The Fourth Industrial Revolution, which utilizes modern communication-dependent technologies, including cyber-physical systems (CPS), has made exploration and production operations more efficient in the oil and gas industry. CPS in this industry should be secured against operational threats to prevent interruption of critical oil and gas supplies and services. However, these systems are vulnerable to cyberattacks, and many oil and gas companies have not incorporated effective cybersecurity measures into their corporate management strategies. This qualitative, multiple-case study, which was guided by the routine activity theory, explored how cybersecurity governance was applied to develop controls that stopped or mitigated the consequences of cyberattacks against the CPS. Interview-based data were obtained through Zoom meetings with 20 global cybersecurity experts selected from cybersecurity-specialized groups on LinkedIn. These data were then triangulated with global CPS cybersecurity governance standards and methods. The data analysis resulted in nine themes, including CPS vulnerabilities and failure consequences, predominant cybersecurity governance, the efficiency of cybersecurity governance, governance challenges, offenders and motives, cybersecurity enhancement, CPS governance endorsement, cybersecurity performance assessment, and governance mandate. This study’s implications for positive social change include recommendations for applying cybersecurity governance strategies that reduce health and environmental incidents and prevent interruption of critical oil and gas deliveries due to cyberattacks. These results may also help improve the living conditions of the communities surrounding oil and gas fields and similar CPS-based industries worldwide

    A Case Study Exploring Organizational Development and Performance Management in the Operational Infrastructure of a Professional Working Organization, Using Academic Constructs

    Get PDF
    Curriculum, as a concept, has been historically associated with traditional schooling, but the reality is that its application extends to many arenas beyond academia. Through the case study lens, this dissertation utilized the ideologies of curricular theorists John Dewey, John Franklin Bobbitt, and Ralph Tyler to explore how intended, enacted, and assessed curricula phases can integrate into a professional working organization’s comprehensive functionality and materialize into the planning and implementation of its operational infrastructure. Following content analysis of a selected institution’s operational system, using closed codes, a descriptive comprehensive curriculum was designed to address the research purpose of understanding employee performance and organizational outcomes. Findings indicated that curricular phases are inherently embedded into the organizational development and performance management of nonacademic spaces; moreover, the framework of an organization’s operational infrastructure consists largely of curriculum elements. The primary research implication invokes being able to manage the efficiency and effectiveness levels of (a) personnel unit performance and (b) the workplace environment, through curriculum analysis and prescription

    Technical Strategies Database Managers use to Protect Systems from Security Breaches

    Get PDF
    Healthcare organizations generate massive amounts of data through their databases that may be vulnerable to data breaches due to extensive user privileges, unpatched databases, standardized query language injections, weak passwords/usernames, and system weaknesses. The purpose of this qualitative multiple case study was to explore technical strategies database managers in Southeast/North Texas used to protect database systems from data breaches. The target population consisted of database managers from 2 healthcare organizations in this region. The integrated system theory of information security management was the conceptual framework. The data collection process included semistructured interviews with 9 database managers, including a review of 14 organizational documents. Data were put into NVivo 12 software for thematic coding. Coding from interviews and member checking was triangulated with corporate documents to produce 5 significant themes and 1 subtheme: focus on verifying the identity of users, develop and enforce security policies, implement efficient encryption, monitor threats posed by insiders, focus on safeguards against external threats, and a subtheme derived from vulnerabilities caused by weak passwords. The findings from the study showed that the implementation of security strategies improved organizations\u27 abilities to protect data from security incidents. Thus, the results may be applied to create social change, decreasing the theft of confidential data, and providing knowledge as a resource to accelerate the adoption of technical approaches to protect database systems rom security incidents

    Cross Domain IW Threats to SOF Maritime Missions: Implications for U.S. SOF

    Get PDF
    As cyber vulnerabilities proliferate with the expansion of connected devices, wherein security is often forsaken for ease of use, Special Operations Forces (SOF) cannot escape the obvious, massive risk that they are assuming by incorporating emerging technologies into their toolkits. This is especially true in the maritime sector where SOF operates nearshore in littoral zones. As SOF—in support to the U.S. Navy— increasingly operate in these contested maritime environments, they will gradually encounter more hostile actors looking to exploit digital vulnerabilities. As such, this monograph comes at a perfect time as the world becomes more interconnected but also more vulnerable

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    An Evaluation of the Effectiveness of the MCA Rural Banks Computerization and Interconnectivity Project Implementation: A Comparative Case Study of Amanano and Odotobri Rural Bank Limited

    Get PDF
    The aim of this research project is to addresses the effectiveness of the MCA Rural Banks Computerization and Interconnectivity project to the rural banks. This study will provide an exploratory look at the challenges surrounding the computerization project implementation and how the system administrators, Managers and staff of Amanano and Odotobri Rural Bank in particular perceive them.Collation of the relevant data is followed by a discussion of the challenges emanating from the computerization project that impedes on the effectiveness of the process. After analyzing the relevant information, it became apparent that there are three primary results, which are shown here. The first is that, strategic planning for the computerization project is fundamental and key to the ultimate effectiveness of MCA computerization project. Planning with regard to the acquisition of equipment for the computerization project has proven to be a difficult accomplishment regardless of the type of rural bank. Secondly, training and sensitization of the staff on information technology has proven to be a major factor in effective implementation of the project. This trend speaks directly to the lack of training and the difficulties rural banks face during the computerization of their banks. Finally, it is shown that the expertise level of staff with regard to Information Technology has proven to be a contributing factor to the effectiveness of the computerization implementation process. Keywords: Information and Communication Technology, IT Planning, Millennium Challenge Account (MCA), IT Procurement, IT implementation, RCB, ARP Apex Ban
    corecore