435 research outputs found

    An aesthetic for sustainable interactions in product-service systems?

    Get PDF
    Copyright @ 2012 Greenleaf PublishingEco-efficient Product-Service System (PSS) innovations represent a promising approach to sustainability. However the application of this concept is still very limited because its implementation and diffusion is hindered by several barriers (cultural, corporate and regulative ones). The paper investigates the barriers that affect the attractiveness and acceptation of eco-efficient PSS alternatives, and opens the debate on the aesthetic of eco-efficient PSS, and the way in which aesthetic could enhance some specific inner qualities of this kinds of innovations. Integrating insights from semiotics, the paper outlines some first research hypothesis on how the aesthetic elements of an eco-efficient PSS could facilitate user attraction, acceptation and satisfaction

    Cognitive Hyperconnected Digital Transformation

    Get PDF
    Cognitive Hyperconnected Digital Transformation provides an overview of the current Internet of Things (IoT) landscape, ranging from research, innovation and development priorities to enabling technologies in a global context. It is intended as a standalone book in a series that covers the Internet of Things activities of the IERC-Internet of Things European Research Cluster, including both research and technological innovation, validation and deployment. The book builds on the ideas put forward by the European Research Cluster, the IoT European Platform Initiative (IoT-EPI) and the IoT European Large-Scale Pilots Programme, presenting global views and state-of-the-art results regarding the challenges facing IoT research, innovation, development and deployment in the next years. Hyperconnected environments integrating industrial/business/consumer IoT technologies and applications require new IoT open systems architectures integrated with network architecture (a knowledge-centric network for IoT), IoT system design and open, horizontal and interoperable platforms managing things that are digital, automated and connected and that function in real-time with remote access and control based on Internet-enabled tools. The IoT is bridging the physical world with the virtual world by combining augmented reality (AR), virtual reality (VR), machine learning and artificial intelligence (AI) to support the physical-digital integrations in the Internet of mobile things based on sensors/actuators, communication, analytics technologies, cyber-physical systems, software, cognitive systems and IoT platforms with multiple functionalities. These IoT systems have the potential to understand, learn, predict, adapt and operate autonomously. They can change future behaviour, while the combination of extensive parallel processing power, advanced algorithms and data sets feed the cognitive algorithms that allow the IoT systems to develop new services and propose new solutions. IoT technologies are moving into the industrial space and enhancing traditional industrial platforms with solutions that break free of device-, operating system- and protocol-dependency. Secure edge computing solutions replace local networks, web services replace software, and devices with networked programmable logic controllers (NPLCs) based on Internet protocols replace devices that use proprietary protocols. Information captured by edge devices on the factory floor is secure and accessible from any location in real time, opening the communication gateway both vertically (connecting machines across the factory and enabling the instant availability of data to stakeholders within operational silos) and horizontally (with one framework for the entire supply chain, across departments, business units, global factory locations and other markets). End-to-end security and privacy solutions in IoT space require agile, context-aware and scalable components with mechanisms that are both fluid and adaptive. The convergence of IT (information technology) and OT (operational technology) makes security and privacy by default a new important element where security is addressed at the architecture level, across applications and domains, using multi-layered distributed security measures. Blockchain is transforming industry operating models by adding trust to untrusted environments, providing distributed security mechanisms and transparent access to the information in the chain. Digital technology platforms are evolving, with IoT platforms integrating complex information systems, customer experience, analytics and intelligence to enable new capabilities and business models for digital business

    Learning outcomes of classroom research

    Get PDF

    Learning Outcomes of Classroom Research

    Get PDF
    Personal pronouns are a linguistic device that is used to engage students at various educational levels. Personal pronouns are multifunctional, and their functions range from inclusion to exclusion, and include establishing of rapport with students. In this chapter, we compare the use of personal pronouns at university and secondary school levels. Our previous study (Yeo & Ting, 2014) showed the frequent use of you in lecture introductions (2,170 instances in the 37,373-word corpus) to acknowledge the presence of students. The arts lecturers were more inclusive than the science lecturers, reflected in the less frequent use of exclusive-we and we for one, as well as the frequent use of you-generalised. We have also compiled and analysed a 43,511-word corpus from 15 English lessons in three Malaysian secondary schools. This corpus yielded 2,019 instances of personal pronoun use. The results showed that you was the most frequently used personal pronoun, followed by we and I. You-audience was used more than you-generalised, and the main function was to give instructions to students. The teachers appeared to be more directive than the lecturers in the previous study, who sometimes used the inclusive-we for you and I and we for I to lessen the social distance with students, indicating that the discourse functions of personal pronouns vary with the educational context. The findings suggest that educators can be alerted to the versatility of personal pronouns, for example, for engaging students in the lesson and for asserting authority in the subject matter. Keywords: student engagement; personal pronouns; lecture; classroom; teache

    Cognitive Hyperconnected Digital Transformation

    Get PDF
    Cognitive Hyperconnected Digital Transformation provides an overview of the current Internet of Things (IoT) landscape, ranging from research, innovation and development priorities to enabling technologies in a global context. It is intended as a standalone book in a series that covers the Internet of Things activities of the IERC-Internet of Things European Research Cluster, including both research and technological innovation, validation and deployment. The book builds on the ideas put forward by the European Research Cluster, the IoT European Platform Initiative (IoT-EPI) and the IoT European Large-Scale Pilots Programme, presenting global views and state-of-the-art results regarding the challenges facing IoT research, innovation, development and deployment in the next years. Hyperconnected environments integrating industrial/business/consumer IoT technologies and applications require new IoT open systems architectures integrated with network architecture (a knowledge-centric network for IoT), IoT system design and open, horizontal and interoperable platforms managing things that are digital, automated and connected and that function in real-time with remote access and control based on Internet-enabled tools. The IoT is bridging the physical world with the virtual world by combining augmented reality (AR), virtual reality (VR), machine learning and artificial intelligence (AI) to support the physical-digital integrations in the Internet of mobile things based on sensors/actuators, communication, analytics technologies, cyber-physical systems, software, cognitive systems and IoT platforms with multiple functionalities. These IoT systems have the potential to understand, learn, predict, adapt and operate autonomously. They can change future behaviour, while the combination of extensive parallel processing power, advanced algorithms and data sets feed the cognitive algorithms that allow the IoT systems to develop new services and propose new solutions. IoT technologies are moving into the industrial space and enhancing traditional industrial platforms with solutions that break free of device-, operating system- and protocol-dependency. Secure edge computing solutions replace local networks, web services replace software, and devices with networked programmable logic controllers (NPLCs) based on Internet protocols replace devices that use proprietary protocols. Information captured by edge devices on the factory floor is secure and accessible from any location in real time, opening the communication gateway both vertically (connecting machines across the factory and enabling the instant availability of data to stakeholders within operational silos) and horizontally (with one framework for the entire supply chain, across departments, business units, global factory locations and other markets). End-to-end security and privacy solutions in IoT space require agile, context-aware and scalable components with mechanisms that are both fluid and adaptive. The convergence of IT (information technology) and OT (operational technology) makes security and privacy by default a new important element where security is addressed at the architecture level, across applications and domains, using multi-layered distributed security measures. Blockchain is transforming industry operating models by adding trust to untrusted environments, providing distributed security mechanisms and transparent access to the information in the chain. Digital technology platforms are evolving, with IoT platforms integrating complex information systems, customer experience, analytics and intelligence to enable new capabilities and business models for digital business

    Staring down the lion: Uncertainty avoidance and operational risk culture in a tourism organisation

    Get PDF
    The academic literature is not clear about how uncertainty influences operational risk decision-making. This study, therefore, investigated operational risk-based decision-making in the face of uncertainty in a large African safari tourism organisation by exploring individual and perceived team member approaches to uncertainty. Convenience sampling was used to identify 15 managers across three African countries in three domains of work: safari camp; regional office; and head office. Semi-structured interviews were conducted in which vignettes were incorporated, to which participants responded with their own reactions and decisions to the situations described, as well as with ways they thought other managers would react to these specific operational contexts. The data were transcribed and qualitatively analysed through thematic coding processes. The findings indicated that approaches to uncertainty were influenced by factors including situational context, the availability and communication of information, the level of operational experience, and participants’ roles. Contextual factors alongside diverse individual emotional and cognitive influences were shown to require prudent consideration by safari tourism operators in understanding employee behavioural reactions to uncertain situations. A preliminary model drawn from the findings suggests that, in practice, decision-making in the face of uncertainty is more complex than existing theoretical studies propose. Specifically, the diverse responses anticipated by staff in response to the vignettes could guide safari tourism management towards better handling of risk under uncertainty in remote locations

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    An investigation of the mirroring of supply chain configuration modularity, and product modularity in contemporary supply chains

    Get PDF
    The introduction of new to market products is a challenge, in high technology markets, where speed and product variation are key considerations. High technology companies require the ability to simultaneously combine operational excellence, customer intimacy and product leadership. A lack of coordination between new product development (NPD), product planning and supply chain configuration (SCC) is a recognised cause of many early-life product failures. This research has one objective: to increase our understanding of the role of modularity in linking SCC and NPD decisions. The research incorporates general systems theory (GST) and knowledge-based theory (KBT), in mirroring product modularity (PM) and SCC modularity (SCCM) within contemporary supply networks. A systematic literature review (SLR) advocates the use of modular design, in linking these concepts and boosting the rate of innovation. The literature indicates that product architecture (PA) and SCC tend to be mirrored in modularity levels, post product launch, and this mirroring is desirable. The literature identified a gap in how SCCM is conceptualised, and how this mirroring manifests itself. These gaps are addressed in the empirical research conducted in project two, where the SCCM construct was developed and used to assess the manifestation and benefits of PM and SCCM mirroring across ten products (UoA) in five case companies across four industry sectors. Mirroring is evident, in six of the UoA, the remaining four UoA exhibit a medium level of mirroring, post product launch. The contribution to theory is a conceptualisation of SCCM where supply chain tiering is a main indicator. Propensity for modules to decouple; early supplier involvement, and a mirrored product and SCC life cycle perspective are the three causal linkages which enable mirroring of PM and SCCM post product launch. The SLR identified the use of co-development (CD), feedback (FC) and feedforward anticipatory control (FAC) at concept design to increase the mirroring of PM and SCCM, post product launch. In project three hypotheses were tested which advocate the use of these mechanisms, and the associated underlying mechanisms were investigated. The findings indicate use of CD and FAC, but a lack of FC, and mirroring support for platform design. The contribution to practice is an intervention framework applied at the concept stage that improves the coordination between NPD, SCC and product planning for new to market products
    • 

    corecore