12 research outputs found

    An investigation into whether total productive maintenance is effectively applied at an automotive plant

    Get PDF
    For many manufacturing companies, equipment is the largest capital investment andeffective maintenance of these assets can impact on profitability. It extends equipment life, improves equipment availability and retains equipment in proper condition. Conversely, poorly maintained equipment may lead to more frequent equipment failures, poor utilisation of equipment and delayed production schedules. Malfunctioning equipment may result in scrap or products of poor quality. Total productive maintenance (TPM) is one of the most popular concepts for improving process dependability (Nakajima 1988). It focuses on increasing the effectiveness of maintenance which is commonly measured by the overall equipment effectiveness (OEE). Ford Struandale Engine Plant (FSEP) applies lean manufacturing through its Ford Production System (FPS) which consists of twelve elements. One element of FPS is Ford Total Productive Maintenance (FTPM) with the objective to maximise the overall effectiveness of plant facilities, equipment, processes and tooling through the focused efforts of work groups and the elimination of the major losses associated with manufacturing equipment. The concern for FSEP management was that although FTPM is implemented, the OEE data revealed that equipment availability targets are not achieved. The researcher identified a gap to investigate the reasons for the poor performance. A literature study was conducted to search for relevant information on the subject. A questionnaire was constructed from the theoretical information and a survey was conducted. After data collection the results were captured and analysed. The researcher made conclusions based on the data and made recommendations. The main findings were that autonomous maintenance is not functioning well, spares management is not good and the Computerised Maintenance Management System is underutilised. The recommendations were that these issues must be addressed

    Knowledge Sharing Processes for Identity Theft Prevention within Online Retail Organisations

    Get PDF
    The occurrence of identity theft has increased dramatically in recent times, becoming one of the fastest-growing crimes in the world. Major challenges associated with identity theft related offences include problems of consumers with credit, such as: aggravation by debt collectors; rejection of loans; disturbance in normal lives such as reputation damage; and the psychological disruption of providing personal data to organisations and banks during the investigation. For these reasons, and with the ready access of identity thieves to the retail industry, this problem is acute in the online retail industry, yet there has been insufficient research undertaken in this domain. This research investigated knowledge sharing processes for identity theft prevention within online retail organisations. An analysis of how individual staff and teams share their knowledge for identity theft prevention in organisations is presented, which includes the investigation of existing barriers in knowledge sharing for identity theft prevention in organisations. A qualitative case study research approach, using the guiding framework proposed by Salleh (2010), was adopted and extended to improve knowledge sharing processes for identity theft prevention in online retail organisations. Three case studies were conducted with leading online retailers in the UK. Data collection included one-to- one semi-structured interviews, internal documents from the researched companies and external documents from various secondary sources. The researcher used the thematic analysis approach using the NVivo software tool and a manual coding process. The total number of interviews was 34 across 3 case studies, with each interview lasting between 45 and 75 minutes. The participants were selected according to their experience, knowledge and involvement in solving identity theft issues and knowledge sharing. Investigation of internal documents included email conversations, policy documents and internal conversations such as emails and memos from the researched companies. This study found that knowledge of identity theft prevention is not being shared within online retail organisations. Individual staff members are learning from their experiences, which is time-consuming. Existing knowledge sharing barriers within the organisations were identified, and improvements in knowledge sharing processes in the online retail industry of the UK using the extended framework are proposed. This research contributes to existing research by providing new insights into knowledge sharing for identity theft prevention. It extends an existing framework proposed by Salleh (2010) in the new context of knowledge sharing processes for ID theft prevention in the retail industry by simplifying the model and combining elements into a more coherent framework. The present study also contributes by investigating the online retail sector for knowledge sharing for ID theft prevention. The empirical research identifies the barriers to knowledge sharing for ID theft prevention and the weaknesses of knowledge sharing in online retail organisations relevant to ID theft prevention. Finally, this study provides managers with useful guidelines for developing appropriate knowledge sharing processes for ID theft prevention in their organisation, and to educate staff in effective knowledge sharing

    Web 2.0 for social learning in higher education

    Get PDF

    An Information Security Policy Compliance Reinforcement and Assessment Framework

    Get PDF
    The majority of SMEs have adopted the use of information communication and technology (ICT) services. However, this has exposed their systems to new internal and external security vulnerabilities. These SMEs seem more concerned with external threat related vulnerabilities rather than those from internal threats, although researchers and industry are suggesting a substantial proportion of security incidents to be originating from insiders. Internal threat is often addressed by, firstly, a security policy in order to direct activities and, secondly, organisational information security training and awareness programmes. These two approaches aim to ensure that employees are proficient in their roles and that they know how to carry out their responsibilities securely. There has been a significant amount of research conducted to ensure that information security programmes communicate the information security policy effectively and reinforce sound security practice. However, an assessment of the genuine effectiveness of such programmes is seldom carried out. The purposes of this research study were, firstly, to highlight the flaws in assessing behavioural intentions and equating such behavioural intentions with actual behaviours in information security; secondly, to present an information security policy compliance reinforcement and assessment framework which assists in promoting the conversion of intentions into actual behaviours and in assessing the behavioural change. The approach used was based on the Theory of Planned Behaviour, knowledge, attitude and behaviour theory and Deterrence Theory. Expert review and action research methods were used to validate and refine the framework. The action research was rigorously conducted in four iterations at an SME in South Africa and involved 30 participating employees. The main findings of the study revealed that even though employees may have been well trained and are aware of information security good practice, they may be either unable or unwilling to comply with such practice. The findings of the study also revealed that awareness drives which lead to secure behavioural intents are merely a first step in information security compliance. The study found that not all behavioural intentions converted to actual secure behaviours and only 64% converted. However, deterrence using rewards for good behaviour and punishment for undesirable behaviour was able to increase the conversion by 21%

    Proceedings of 31st Annual ARCOM Conference, vol 1

    Get PDF

    The measurement of information flow efficiency in supply chain management

    Get PDF
    Characteristics such as speed of reaction, order accuracy, operational flexibility and sustained quality have become fundamental in successful business today. The success of aligning a supply chain to attain these characteristics depends largely on the use of efficient communication and information technology. Communication between supply chain members requires that relevant information is transferred from its point of inception to the next point(s) of use. The transfer of information entails an efficient flow of information between systems, between systems and humans and between humans, which is directly associated with the effective interoperability between the various entities handling the relevant information. Accordingly, the realisation of interoperability will mean a faster information flow and, thus, an effective decision-making process. This research, therefore, will propose indicators and metrics for the assessment of the information flow efficiency of a business and, in particular, of a supply chain, examine the existing techniques of information flow measurement, and identify inherent weaknesses. New information flow efficiency metrics are developed and categorised into different indicators, which are based on the quality of the information as it is applied in finance, information technology and the principles of business performance measurements. This research will illustrate that these quality characteristics drive an effective and efficient information flow which, in turn, enables them to be used both as indicators and as associated metrics of information flow efficiency. Explorative analysis and statistical cluster analysis identified the most important indicators and associated metrics based on the results of a survey instrument designed specifically for this purpose. Scales were developed to facilitate the numeric assessment of the metrics and indicators. In order to prove the ability of the new indicators and associated metrics to differentiate between different levels of information flow efficiency, the new metrics were applied in sample organisations and the responses evaluated. This research lays an important foundation in terms of the ability to assess information flow efficiency which is, in turn, necessary in order to gain a better understanding of the performance of supply chains in a time where real-time information flow and electronic integration are becoming strategic business success factors.Business ManagementD. Com. (Business Management
    corecore