19,463 research outputs found

    Contextual impacts on industrial processes brought by the digital transformation of manufacturing: a systematic review

    Get PDF
    The digital transformation of manufacturing (a phenomenon also known as "Industry 4.0" or "Smart Manufacturing") is finding a growing interest both at practitioner and academic levels, but is still in its infancy and needs deeper investigation. Even though current and potential advantages of digital manufacturing are remarkable, in terms of improved efficiency, sustainability, customization, and flexibility, only a limited number of companies has already developed ad hoc strategies necessary to achieve a superior performance. Through a systematic review, this study aims at assessing the current state of the art of the academic literature regarding the paradigm shift occurring in the manufacturing settings, in order to provide definitions as well as point out recurring patterns and gaps to be addressed by future research. For the literature search, the most representative keywords, strict criteria, and classification schemes based on authoritative reference studies were used. The final sample of 156 primary publications was analyzed through a systematic coding process to identify theoretical and methodological approaches, together with other significant elements. This analysis allowed a mapping of the literature based on clusters of critical themes to synthesize the developments of different research streams and provide the most representative picture of its current state. Research areas, insights, and gaps resulting from this analysis contributed to create a schematic research agenda, which clearly indicates the space for future evolutions of the state of knowledge in this field

    Policy Analysis for Natural Hazards: Some Cautionary Lessons From Environmental Policy Analysis

    Get PDF
    How should agencies and legislatures evaluate possible policies to mitigate the impacts of earthquakes, floods, hurricanes and other natural hazards? In particular, should governmental bodies adopt the sorts of policy-analytic and risk assessment techniques that are widely used in the area of environmental hazards (chemical toxins and radiation)? Environmental hazards policy analysis regularly employs proxy tests, in particular tests of technological feasibility, rather than focusing on a policy\u27s impact on well-being. When human welfare does enter the analysis, particular aspects of well-being, such as health and safety, are often given priority over others. Individual risk tests and other features of environmental policy analysis sometimes make policy choice fairly insensitive to the size of the exposed population. Seemingly arbitrary numerical cutoffs, such as the one-in-one million incremental risk level, help structure policy evaluation. Risk assessment techniques are often deterministic rather than probabilistic, and in estimating point values often rely on conservative rather than central-tendency estimates. The Article argues that these sorts of features of environmental policy analysis may be justifiable, but only on institutional grounds-if they sufficiently reduce decision costs or bureaucratic error or shirking-and should not be reflexively adopted by natural hazards policymakers. Absent persuasive. institutional justification, natural hazards policy analysis should be welfare-focused, multidimensional, and sensitive to population size, and natural hazards risk assessment techniques should provide information suitable for policy-analytic techniques of this sort

    Privacy, Ideology, and Technology: A Response to Jeffrey Rosen

    Get PDF
    This essay reviews Jeffrey Rosen’s The Unwanted Gaze: The Destruction of Privacy in America (2000). Rosen offers a compelling (and often hair-raising) account of the pervasive dissolution of the boundary between public and private information. This dissolution is both legal and social; neither the law nor any other social institution seems to recognize many limits on the sorts of information that can be subjected to public scrutiny. The book also provides a rich, evocative characterization of the dignitary harms caused by privacy invasion. Rosen’s description of the sheer unfairness of being “judged out of context” rings instantly true. Privacy, Rosen concludes, is indispensable to human well-being and is at risk of being destroyed unless we act fast. The book is far less convincing, however, when it moves beyond description and attempts to identify the causes of the destruction of privacy and propose solutions. Why is privacy under siege today? The incidents that Rosen chooses as illustrations both reveal and obscure. From Monica Lewinsky’s unsent, deleted e-mails to the private online activities of corporate employees and the Dean of the Harvard Divinity School, the examples offer a rich stew of technology, corporate mind control, public scapegoating, and political intrigue. But for the most part, Rosen seems to think that it is sex that is primarily to blame for these developments—though how, exactly, Rosen cannot seem to decide. He suggests, variously, that we seek private information out of prurient fascination with other people’s intimate behavior, or to enforce upon others authoritarian notions of “correct” interpersonal behavior, or to inform moral judgments about others based on a hasty and ill-conceived equivalence between the personal and the political. Or perhaps Rosen is simply upset about the loss of privacy for a specific sort of (sexual or intimate) behavior, whatever the origin of society’s impulse to pry. Yet there are puzzling anomalies in Rosen’s account. Most notably, appended to Rosen’s excavation of recent sex-related privacy invasions is a chapter on privacy in cyberspace. This chapter sits uneasily in relation to the rest of the book. Its focus is not confined to sex-related privacy, and Rosen does not explain how the more varied information-gathering activities chronicled there bear on his earlier analysis. Rosen acknowledges as much and offers, instead, the explanation that intimate privacy and cyberspace privacy are simply two examples of the same problem: the risk of being judged out of context in a world of short attention spans, and the harms to dignity that follow. This explanation seems far too simple, and more than a bit circular. Why this rush to judge others out of context? Necessity is one answer—if attention spans are limited, we cannot avoid making decisions based on incomplete information—but where does the necessity to judge come from? And what do computers and digital networking technologies—factors that recur not only in the chapter on cyberspace privacy, but also in most of Rosen’s other examples—have to do with it? This Review Essay argues, first, that the use of personal information to sort and classify individuals is inextricably bound up with the fabric of our political economy. As Part II explains, the unfettered use of “true” information to predict risk and minimize uncertainty is a hallmark of the liberal state and its constituent economic and political markets. Not sex, but money, and more broadly an ideology about the predictive power of isolated facts, generate the perceived necessity to judge individuals based on incomplete profiles. The harms of this rush to judgment—harms not only to dignity, but also to economic welfare and more fundamentally to individual autonomy—may undermine liberal individualism (as Rosen argues), but they are products of it as well. Part III argues, further, that the problem of vanishing informational privacy in digital networked environments is not sui generis, but rather is central to understanding the destruction of privacy more generally. This is not simply because new technologies reduce the costs of collecting, exchanging, and processing the traditional sorts of consumer information. The profit-driven search for personal information via digital networks is also catalyzing an erosion of the privacy that individuals have customarily enjoyed in their homes, their private papers, and even their thoughts. This process is transforming not only the way we experience privacy, but also the way we understand it. Privacy is becoming not only harder to protect, but also harder to justify protecting. Part IV concludes that shifting these mutually reinforcing ideological and technological vectors will require more drastic intervention than Rosen suggests

    A TRAGEDY OF THE PUBLIC KNOWLEDGE ‘COMMONS’? Global Science, Intellectual Property and the Digital Technology Boomerang

    Get PDF
    Radical legal innovations in intellectual property protection have been introduced by the little noticed European Database Directive of March 1996. This initiative, part of the larger institutional transformations initiated in response to the economic ramifications of rapid progress in digital information technologies, poses numerous contentious issues in law and economics. These are likely to create ambiguities for business and non-profit activities in this area for years to come, and the terms on which those issues are resolved will materially affect the costs and organizational feasibility of scientific projects that are of global reach and significance. This is the case especially in fields such as geology, oceanography and climatology, which depend heavily upon the collection, management and analysis of large volumes of observational data that cannot be regenerated. More generally the conduct of open, collaborative science – along with many of the benefits that flow from it for the developed and the developing economies alike – may be seriously jeopardized by the consequences of the new database protections. This raises the spectre of a new and different “tragedy of the commons,” one created by continuing the unbalanced pressure to extract greater economic rents by means of controlling access to information. “Over-fencing,” which is to say, the erection of artificial cost barriers to the production of reliable public knowledge by means of reliable public knowledge, threatens the future of “the public knowledge commons” that historically has proved critically important for rapid advance in science and technology. The paper sets out the economic case for the effectiveness of open, collaborative research, and the forces behind the recent, countervailing rush to strengthen and expand the scope of intellectual property rights protection. Focusing upon innovations in copyright law and the sui generis protection of hitherto unprotected content, it documents the genesis and analyzes the economic implications of the EC’s Database Directive, and related legislative proposals (H.R. 3125, H.R. 354 and H.R. 1858) in the US. The discussion concludes by advancing a number of modest remedial proposals that are intended to promoted greater efforts to arrive at satisfactory policy solutions for this aspect of “the digital dilemma.”intellectual property rights, copyright, sui generis protection of expressive material, economics of information-goods, open science, “fair use,” scientific databases.

    The Unresolved Tension Between Trademark Protection and Free Movement of Goods in the European Community

    Get PDF
    Developments in computer-aided engineering and the rapid growth of computational power have made simulation-driven process and product development efficient and useful since it enables detailed evaluation of product designs and their manufacturing processes. In the context of a sheet metal component, it is vital to predict possible failure both during its forming process and its subsequent usage. Accurate numerical models are needed in order to obtain trustworthy simulation results. Furthermore, the increasing demands imposed on improved weight-to-performance ratio for many products endorse the use of high-strength steels. These steels often show anisotropic behaviour and more complex hardening and fracturing compared to conventional steels. Consequently, demand for research on material and failure models suitable for these steels has increased. In this work, the mechanical and fracture behaviour of two high-strength steels, Docol 600DP and Docol 1200M, have been studied under various deformation processes. Experimental results have been used both for material characterisation and for calibration of fracture criteria. One major requirement as concerns the fracture criteria studied is that they should be simple to apply in industrial applications, i.e. it should be possible to easily calibrate the fracture criteria in simple mechanical experiments and they should be efficient and accurate. Consequently, un-coupled phenomenological damage models have been the main focus throughout this work. Detailed finite element models including accurate constitutive laws have be used to predict and capture material instabilities. Most of the fracture criteria studied are modifications of the plastic work to fracture. Ductile tensile and ductile shear types of fracture are of particular interest in sheet metal applications. For these fractures the modification of the plastic work relates to void coalescence and void collapse, respectively. Anisotropy in fracture behaviour can be captured by the introduction of a material directional function. The dissertation consists of two parts. The first part contains theory and background. The second consists of five papers
    • 

    corecore