7,846 research outputs found

    Cyborgs as Frontline Service Employees: A Research Agenda

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Purpose This paper identifies and explores potential applications of cyborgian technologies within service contexts and how service providers may leverage the integration of cyborgian service actors into their service proposition. In doing so, the paper proposes a new category of ‘melded’ frontline service employees (FLEs), where advanced technologies become embodied within human actors. The paper presents potential opportunities and challenges that may arise through cyborg technological advancements and proposes a future research agenda related to these. Design/methodology This study draws on literature in the fields of services management, Artificial Intelligence [AI], robotics, Intelligence Augmentation [IA] and Human Intelligence [HIs] to conceptualise potential cyborgian applications. Findings The paper examines how cyborg bio- and psychophysical characteristics may significantly differentiate the nature of service interactions from traditional ‘unenhanced’ service interactions. In doing so, we propose ‘melding’ as a conceptual category of technological impact on FLEs. This category reflects the embodiment of emergent technologies not previously captured within existing literature on cyborgs. We examine how traditional roles of FLEs will be potentially impacted by the integration of emergent cyborg technologies, such as neural interfaces and implants, into service contexts before outlining future research directions related to these, specifically highlighting the range of ethical considerations. Originality/Value Service interactions with cyborg FLEs represent a new context for examining the potential impact of cyborgs. This paper explores how technological advancements will alter the individual capacities of humans to enable such employees to intuitively and empathetically create solutions to complex service challenges. In doing so, we augment the extant literature on cyborgs, such as the body hacking movement. The paper also outlines a research agenda to address the potential consequences of cyborgian integration

    Data mining and fusion

    No full text

    Review on Application of Data Mining Educational Big Data

    Get PDF
    In recent years, research on Educational Data Mining (EDM) has developed rapidly. However, most researches focus on data source issues, and ignore the importance of data preprocessing and data mining algorithms. This paper has studied EDM, with a special focus on educational big data mining algorithms. Firstly, it analyzed the relevant elements of EDM and introduces big data technology based on the requirements of educational data application. Then it introduced the common educational big data mining algorithms and their applications, and finally discussed the development trend of educational big data mining algorithms

    Guest Editorial Special Issue on: Big Data Analytics in Intelligent Systems

    Get PDF
    The amount of information that is being created, every day, is quickly growing. As such, it is now more common than ever to deal with extremely large datasets. As systems develop and become more intelligent and adaptive, analysing their behaviour is a challenge. The heterogeneity, volume and speed of data generation are increasing rapidly. This is further exacerbated by the use of wireless networks, sensors, smartphones and the Internet. Such systems are capable of generating a phenomenal amount of information and the need to analyse their behaviour, to detect security anomalies or predict future demands for example, is becoming harder. Furthermore, securing such systems is a challenge. As threats evolve, so should security measures develop and adopt increasingly intelligent security techniques. Adaptive systems must be employed and existing methods built upon to provide well-structured defence in depth. Despite the clear need to develop effective protection methods, the task is a difficult one, as there are significant weaknesses in the existing security currently in place. Consequently, this special issue of the Journal of Computer Sciences and Applications discusses big data analytics in intelligent systems. The specific topics of discussion include the Internet of Things, Web Services, Cloud Computing, Security and Interconnected Systems
    • …
    corecore