335 research outputs found

    Data: the weakest link or the core strength in CRM strategy

    Get PDF

    Smart Stories - Implementing Smart Specialisation across Europe

    Get PDF
    The insight that this booklet provides - thanks to the precious contribution of national and regional authorities - shows that smart specialisation has gone far beyond the mere fulfilment of the ex-ante conditionality criteria linked to Cohesion policy allocations. It has triggered a change in the way innovation-driven regional development policies are dealt with across Europe, confirming the outcome of a number of surveys recently run on this topic. These 'Smart Stories' will drive the reader through the features of smart specialisation as it has been applied in a number of EU countries and regions, with a view to stimulating to further explore the concept and its policy implications, to identify complementarities and potential for mutual learning and collaboration. The period of strategy development has in one sense finished; however, the process of implementing and monitoring S3 will hopefully lead to many more 'Smart Stories' to be shared across all territories of the European Union.JRC.J.2-Knowledge for Growt

    CAFCASS operating framework

    Get PDF

    Security Audit Compliance for Cloud Computing

    Get PDF
    Cloud computing has grown largely over the past three years and is widely popular amongst today's IT landscape. In a comparative study between 250 IT decision makers of UK companies they said, that they already use cloud services for 61% of their systems. Cloud vendors promise "infinite scalability and resources" combined with on-demand access from everywhere. This lets cloud users quickly forget, that there is still a real IT infrastructure behind a cloud. Due to virtualization and multi-tenancy the complexity of these infrastructures is even increased compared to traditional data centers, while it is hidden from the user and outside of his control. This makes management of service provisioning, monitoring, backup, disaster recovery and especially security more complicated. Due to this, and a number of severe security incidents at commercial providers in recent years there is a growing lack of trust in cloud infrastructures. This thesis presents research on cloud security challenges and how they can be addressed by cloud security audits. Security requirements of an Infrastructure as a Service (IaaS) cloud are identified and it is shown how they differ from traditional data centres. To address cloud specific security challenges, a new cloud audit criteria catalogue is developed. Subsequently, a novel cloud security audit system gets developed, which provides a flexible audit architecture for frequently changing cloud infrastructures. It is based on lightweight software agents, which monitor key events in a cloud and trigger specific targeted security audits on demand - on a customer and a cloud provider perspective. To enable these concurrent cloud audits, a Cloud Audit Policy Language is developed and integrated into the audit architecture. Furthermore, to address advanced cloud specific security challenges, an anomaly detection system based on machine learning technology is developed. By creating cloud usage profiles, a continuous evaluation of events - customer specific as well as customer overspanning - helps to detect anomalies within an IaaS cloud. The feasibility of the research is presented as a prototype and its functionality is presented in three demonstrations. Results prove, that the developed cloud audit architecture is able to mitigate cloud specific security challenges

    Values and value in design

    Get PDF
    Relatively little is known about how concepts of human values and value interact during the construction design process. Whilst researchers of value management have expounded in this context upon the complexity of the design process, problem-solving and sense-making, little is said about the alignment and reconciliation of multiple-stakeholder values and value judgements. An abductive reasoning and a grounded theory approach was adopted that iterated between literature and empirical observation to obtain new insights. The initial phase created a values and value framework and Value in Design (VALiD) approach through seven unstructured interviews, a design workshop, four Schwartz Values Surveys (with 545 participants) and 55 semi-structured interviews. The values and value parts were then separately implemented, developed and validated through action research on five live education capital projects, involving over 250 participants. Subsequently, a middle-range theory of values and value is proposed through theoretical triangulation. This draws on seven related theories to provide greater explanatory pluralism, uncover hidden phenomena and enable convergence. The research findings are significant in focusing soft value management on underlying stakeholder values and subjective value judgements. A more nuanced and intertwined relationship between stakeholder values, attitudes, behaviours and qualities during the design process is offered that promotes compromise and sense-making

    Higgins quality process improvement

    Get PDF
    This report details a quality process improvement project undertaken for Higgins Group Holdings Limited (Higgins). Quality management at Higgins is a compliance-based activity at best, with variations between branch practices throughout the country. Interviews with current Higgins employees, clients and consulting engineers identified issues with current quality processes. Further consultation with other civil and construction companies in New Zea land , Australia and the United Kingdom combined with a review of academic literature, identified a best practice for construction quality management. Research was conducted into emerging software solutions in order to identify current and future technology enablers for quality process improvement within the construction sector. The recommendations made should result in a decrease in the amount of rework required, adding further improvements to the organisation’s bottom-line. This leads to increased competitiveness through the ability to bid lower due to reduced risk, and increased repeat business due to improved client satisfaction

    Research Evidence on the Use of Learning Analytics: Implications for Education Policy

    Get PDF
    The evidence shows that the use of learning analytics to improve and to innovate learning and teaching in Europe is still in its infancy. The high expectations have not yet been realised. Though early adopters are already taking a lead in research and development, the evidence on practice and successful implementation is still scarce. Furthermore, though the work across Europe on learning analytics is promising, it is currently fragmented. This underlines the need for a careful build-up of research and experimentation, with both practice and policies that have a unified European vision. Therefore, the study suggests that work is needed to make links between learning analytics, the beliefs and values that underpin this field, and European priority areas for education and training 2020. As a way of guiding the discussion about further development in this area, the Action List for Learning Analytics is proposed. The Action List for Learning Analytics focuses on seven areas of activity. It outlines a set of actions for educators, researchers, developers and policymakers in which learning analytics are used to drive work in Europe’s priority areas for education and training. Strategic work should take place to ensure that each area is covered, that there is no duplication of effort, that teams are working on all actions and that their work proceeds in parallel. Policy leadership and governance practices •Develop common visions of learning analytics that address strategic objectives and priorities •Develop a roadmap for learning analytics within Europe •Align learning analytics work with different sectors of education •Develop frameworks that enable the development of analytics •Assign responsibility for the development of learning analytics within Europe •Continuously work on reaching common understanding and developing new priorities Institutional leadership and governance practices •Create organisational structures to support the use of learning analytics and help educational leaders to implement these changes •Develop practices that are appropriate to different contexts •Develop and employ ethical standards, including data protection Collaboration and networking •Identify and build on work in related areas and other countries •Engage stakeholders throughout the process to create learning analytics that have useful features •Support collaboration with commercial organisations Teaching and learning practices •Develop learning analytics that makes good use of pedagogy •Align analytics with assessment practices Quality assessment and assurance practices •Develop a robust quality assurance process to ensure the validity and reliability of tools •Develop evaluation checklists for learning analytics tools Capacity building •Identify the skills required in different areas •Train and support researchers and developers to work in this field •Train and support educators to use analytics to support achievement Infrastructure •Develop technologies that enable development of analytics •Adapt and employ interoperability standard

    The making of smart cities : borders, security and value in New Town Kolkata and Cape Town

    Get PDF
    The making of smart cities transforms not only infrastructures and practices but also the techniques of urban government and security, and economic processes. This thesis draws on analysis conducted in two research sites: Cape Town, in South Africa and New Town Rajarhat, a satellite township on the outskirts of Kolkata, to present three key arguments. Firstly, and as opposed to mainstream narratives that describe smart cities as seamlessly connected environments, this thesis suggests that urban digitalisation is linked to bordering processes. Whereas critical literature has comprehensively discussed the political implications and risks associated with smart city projects, such as corporatisation and technocratic governance, the specific relations between digital infrastructures and borders, within the urban space, have not yet been discussed. Secondly, this thesis argues that smart cities are inherently security projects, insofar as the deployment of a computing infrastructure of sensing initiates a preemptive apparatus. In security systems, such as the Emergency Policing and Incident Command (EPIC) program in Cape Town, or the Xpresso software for social media monitoring in New Town, algorithms are continuously modelling and acting upon future scenarios; from traffic jams to wildfires, from crime hotspots to citizens’ moods. My third argument is that the computing apparatus of security also serves as an infrastructure of value extraction. Recently, there has been much theorising and debate about security platforms’ economic operations, but the situated modalities in which they extract value from the urban environment remain to be examined. Overall, this thesis points to the socio-spatial, governmental and economic relations that computing infrastructures are generating, or reconfiguring, in the urban environment. These relations articulate distinct processes, including the hierarchisation and control of the urban space, preemptive policies and extractive strategies. Critically analysing these processes allows the registration of the political implications of smart city projects

    Exploring the Use of Web 2.0 Tools to Support Knowledge Sharing Within the Non-Profit Sector

    Get PDF
    This project will investigate the challenges of knowledge sharing and communication in non-profit organizations with a high dependence on volunteers. Projects of this type typically rely heavily on the knowledge of the volunteers for success and while many projects have some mechanisms through which they communicate and share knowledge such as a web presence, typically the knowledge is disparate, highly tacit, embedded in the people involved. A scattered approach is typical with knowledge and information on several different forums managed by several different people with no obvious connection. There is unlikely to be a cohesive, coherent approach in place to retain volunteer knowledge, facilitate knowledge sharing and make use of valuable knowledge to improve current and future projects. This project will focus on identifying how such projects store, communicate and facilitate sharing of necessary knowledge between the project and its volunteers and among volunteers themselves, use the knowledge of its volunteers and manage such knowledge to support current and future activities. The project will identify and implement appropriate mechanisms, to enhance the capture and recording of knowledge, the transfer of knowledge from person to person, the exploitation of knowledge and stimulate the generation of new knowledge within the project. A light-weight open-source knowledge sharing and communication tool-kit will be designed and implemented. Particularly, Web 2.0 technologies will be investigated. Existing tools may be leveraged however, tools will be selected to support the types of knowledge identified and communication and sharing mechanisms identified as most effective. A range of volunteer dependent projects will be used to conduct the required knowledge acquisition and elicitation to identify the knowledge needs of such projects. The processes and toolkit designed will be implemented in a specific project, the desireland project, to test and evaluate their effectiveness
    • …
    corecore