923 research outputs found

    The Pragmatic Development of a Carbon Management Framework for UK SMEs

    Get PDF
    The UK's commitment to net-zero emissions by 2050 is challenged by critics citing current government strategies as inadequate, marked by a lack of concrete action and aspirational guidelines. Notably, businesses, including small and medium-sized enterprises (SMEs) which constitute about half of all business emissions, are pivotal to this goal. Yet, existing policies and standards often neglect the significant role of SMEs, who face barriers such as limited knowledge and resources in implementing carbon management practices. This thesis explores the development of a novel carbon management framework specifically designed for medium-sized organisations in the UK to address these problems. The research adopts a practical approach through collaboration with an industry partner, facilitating a case study for real-world application. Adopting a mixed-methods research design grounded in pragmatism, the study commenced with a qualitative study in the form of a focus group. This exploratory phase, critical for understanding SME challenges, yielded rich data revealing key management themes in strategy, energy, and data. The framework design was supported by a materiality assessment and input from key stakeholders on three major iterations. The final framework comprises three phases: establishing a baseline carbon footprint, creating a carbon reduction plan, and strategically implementing this plan. The validation process, conducted at Knowsley Safari, successfully tested the initial two phases but faced constraints in fully assessing the third phase due to time limitations. While the research achieved its primary aim of developing a novel carbon management framework for SMEs, it encountered limitations, notably in time and the generalisability of findings due to reliance on a single case study. Future research could test the framework across diverse SME settings to establish its broader applicability and effectiveness in aiding the UK's net-zero emission goals

    LIPIcs, Volume 251, ITCS 2023, Complete Volume

    Get PDF
    LIPIcs, Volume 251, ITCS 2023, Complete Volum

    Informationsströme in digitalen Kulturen

    Get PDF
    Wir sind umgeben von einer Vielzahl an Informationsströmen, die uns selbstverständlich erscheinen. Um diese digitalen Kulturen zu beschreiben, entwickeln medienwissenschaftliche Arbeiten Theorien einer Welt im Fluss. Dabei erliegen ihre Diagnosen oftmals einem Technikfetisch und vernachlässigen gesellschaftliche Strukturen. Mathias Denecke legt eine systematische Kritik dieser Theoriebildung vor. Dazu zeichnet er die Geschichte der Rede von strömenden Informationen in der Entwicklung digitaler Computer nach und diskutiert, wie der Begriff für Gegenwartsbeschreibungen produktiv gemacht werden kann

    Data ethics : building trust : how digital technologies can serve humanity

    Get PDF
    Data is the magic word of the 21st century. As oil in the 20th century and electricity in the 19th century: For citizens, data means support in daily life in almost all activities, from watch to laptop, from kitchen to car, from mobile phone to politics. For business and politics, data means power, dominance, winning the race. Data can be used for good and bad, for services and hacking, for medicine and arms race. How can we build trust in this complex and ambiguous data world? How can digital technologies serve humanity? The 45 articles in this book represent a broad range of ethical reflections and recommendations in eight sections: a) Values, Trust and Law, b) AI, Robots and Humans, c) Health and Neuroscience, d) Religions for Digital Justice, e) Farming, Business, Finance, f) Security, War, Peace, g) Data Governance, Geopolitics, h) Media, Education, Communication. The authors and institutions come from all continents. The book serves as reading material for teachers, students, policy makers, politicians, business, hospitals, NGOs and religious organisations alike. It is an invitation for dialogue, debate and building trust! The book is a continuation of the volume “Cyber Ethics 4.0” published in 2018 by the same editors

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks

    Comprehensive analysis of security issues in cloud-based Internet of Things: A survey

    Get PDF
    The Internet of Things (IoT )has emerged as the largest computing platform, enabling IoT devices to sense real-world conditions such as temperature, humidity, pressure, and cloud prediction. However, the security of IoT systems is crucial due to their direct impact on human life. With the expansion of processing and communication capabilities to numerous devices, IoT has become a vast network where connectivity is ubiquitous. This paper focuses on the security issues of cloud-based IoT, specifically access control, network security, data security, and privacy, which are the four main components of cloud-based IoT. By analyzing and comparing existing research papers on security in cloud IoT and IoT in general, we identify proposed solutions. Most researchers have concentrated on a single component, while only a few have addressed two components. Consequently, our research aims to bridge the gap in Cloud IoT security by focusing on more than two components. We propose the utilization of methods such as Machine Learning and blockchain to enhance security, drawing on the strengths highlighted in previous works. Our future focus will involve exploring potential attacks in cloud IoT and developing a comprehensive method that encompasses atleast three security components of cloud IoT security

    Efficiency and Sustainability of the Distributed Renewable Hybrid Power Systems Based on the Energy Internet, Blockchain Technology and Smart Contracts-Volume II

    Get PDF
    The climate changes that are becoming visible today are a challenge for the global research community. In this context, renewable energy sources, fuel cell systems, and other energy generating sources must be optimally combined and connected to the grid system using advanced energy transaction methods. As this reprint presents the latest solutions in the implementation of fuel cell and renewable energy in mobile and stationary applications, such as hybrid and microgrid power systems based on the Energy Internet, Blockchain technology, and smart contracts, we hope that they will be of interest to readers working in the related fields mentioned above

    Situating Data: Inquiries in Algorithmic Culture

    Get PDF
    Taking up the challenges of the datafication of culture, as well as of the scholarship of cultural inquiry itself, this collection contributes to the critical debate about data and algorithms. How can we understand the quality and significance of current socio-technical transformations that result from datafication and algorithmization? How can we explore the changing conditions and contours for living within such new and changing frameworks? How can, or should we, think and act within, but also in response to these conditions? This collection brings together various perspectives on the datafication and algorithmization of culture from debates and disciplines within the field of cultural inquiry, specifically (new) media studies, game studies, urban studies, screen studies, and gender and postcolonial studies. It proposes conceptual and methodological directions for exploring where, when, and how data and algorithms (re)shape cultural practices, create (in)justice, and (co)produce knowledge
    • …
    corecore