16 research outputs found

    Emerging Informatics

    Get PDF
    The book on emerging informatics brings together the new concepts and applications that will help define and outline problem solving methods and features in designing business and human systems. It covers international aspects of information systems design in which many relevant technologies are introduced for the welfare of human and business systems. This initiative can be viewed as an emergent area of informatics that helps better conceptualise and design new world-class solutions. The book provides four flexible sections that accommodate total of fourteen chapters. The section specifies learning contexts in emerging fields. Each chapter presents a clear basis through the problem conception and its applicable technological solutions. I hope this will help further exploration of knowledge in the informatics discipline

    Disruption to Destruction: Exploring the Effects of Digital Disruption on the Value Creation Processes within the Field of Fashion through the lens of Service Dominant Logic

    Get PDF
    Digital platforms have democratised the fashion industry; once notoriously shielded by gatekeepers. Today, fashion’s end consumers rely less on such gatekeepers who hold industry specific knowledge, but instead, “follow” social media influencers who have shifted control from the sender (e.g. fashion brand) to the receiver (e.g. consumer). Together with a growing dependence on other boundary breaking technologies, the relevance of traditional gatekeepers is questioned, as is the holistic process of value creation within this ecosystem. Building upon contemporary service dominant logic (SDL) literature on service ecosystems, as well as the composition of value codestruction, this thesis zooms into the empirical context of the global fashion industry. To capture the complexity of individual and group behaviours within micro, meso and macro network contexts, an ethnographic research strategy was conducted, spanning over 18 months and including participant observations and self-reflexivity, a focus group, and 17 semi-structured interviews with influential fashion intermediaries. Through thematic analysis, results were presented in a series of narrative stories, which ultimately, help shine a new light on how we view SDL in regard to operant resources, the complexities of diverse ecosystem actors, and value extraction. Our theoretical contribution is to add to SDL literature with what we call the co-abduction of value and the democratisation of primary value creation. The importance of this finding is to highlight how the micro and macro level processes of a field can lead industry actors to manipulate value creation in what was previously a highly territorial industry. Our contribution highlights the mechanisms through which value creation can be appropriated, destroyed and reconfigured

    Sustainability in design: now! Challenges and opportunities for design research, education and practice in the XXI century

    Get PDF
    Copyright @ 2010 Greenleaf PublicationsLeNS project funded by the Asia Link Programme, EuropeAid, European Commission

    Law and Policy for the Quantum Age

    Get PDF
    Law and Policy for the Quantum Age is for readers interested in the political and business strategies underlying quantum sensing, computing, and communication. This work explains how these quantum technologies work, future national defense and legal landscapes for nations interested in strategic advantage, and paths to profit for companies

    The Mighty Oak: How the National Trust creates visitor experience

    Get PDF
    The National Trust is a heritage and environmental conservation organisation. Managing over 500 heritage properties that are open to visitors presents challenges to ensure a quality visitor experience. Key themes in the literature concern the management of space, authenticity and the skills and experience of managers and visitors. The current literature is about professional practice but what the conversations collected as data uncovered was that we have several different types of professional practice working in conjunction with each other, often not recognising the differences in approach and validity of the varying positions. How does the National Trust create visitor experience? By examining stories collected from within the National Trust, we can understand how the National Trust creates visitor experience. A greater understanding of how the National Trust works to create visitor experience leads to a breaking through the postmodern veneer of the corporate National Trust. The data for this thesis has been collected through a series of conversations with senior managers, specialists, property managers, visitor facing staff and volunteers at a range of National Trust properties. This research is being undertaken to better understand the organisation and to enhance the visitor experience. Deconstruction has been used for the analysis of this data to investigate the internal workings of the NT, power relationships and positions and how this creates the visitor experience. There is agreement within the National Trust about what constitutes a good experience for visitors and about key messages that visitors should take away, but there is not always agreement about how this should be achieved. There is also a question about who visitors are and diversity of visitors and within the trust, this is manifested in the question whose story is being told? This research suggests the following implications for professional practice, the need to define success to develop key performance indicators, the need for the National Trust to address issues of inclusion and representation, review of management and recruitment of future volunteers, introducing a standard approach to curation. The research also suggests the following academic contribution, development of the concept of the servicescape and the contribution of volunteers

    Contested Majority: The Representation Of The White Working Class In Us Politics From The 1930s To The 1990s

    Get PDF
    This dissertation examines the representation of the white working class in US politics from the 1930s to the 1990s: how politicians, journalists, pollsters, pundits, political commentators, social movement groups, and others have studied, written about, and claimed to speak for white working class people and how this work has shaped American politics. Most existing literature on the role of the white working class in American politics has examined political opinion and political identity formation among white working class people, too often treating the “white working class” as a homogenous group with uniform political views. This project takes a different approach, focused on elite engagement with the white working class as a social and political category. It traces how prominent elite-level understandings of white working class identity, politics, and culture—from progressive workers combating economic elites to culturally conservative “Middle Americans” opposed to liberalism—emerged and impacted political contestation. In doing so, it stresses the importance of the white working class as a political symbol, one that has consistently been at the center of conflict around fundamental issues in US politics, including the nature of privilege and disadvantage, challenges to racial, gender, and class inequality, the state’s sphere of responsibility, and the contours of national identity

    Ethical and Unethical Hacking

    Get PDF
    The goal of this chapter is to provide a conceptual analysis of ethical, comprising history, common usage and the attempt to provide a systematic classification that is both compatible with common usage and normatively adequate. Subsequently, the article identifies a tension between common usage and a normativelyadequate nomenclature. ‘Ethical hackers’ are often identified with hackers that abide to a code of ethics privileging business-friendly values. However, there is no guarantee that respecting such values is always compatible with the all-things-considered morally best act. It is recognised, however, that in terms of assessment, it may be quite difficult to determine who is an ethical hacker in the ‘all things considered’ sense, while society may agree more easily on the determination of who is one in the ‘business-friendly’ limited sense. The article concludes by suggesting a pragmatic best-practice approach for characterising ethical hacking, which reaches beyond business-friendly values and helps in the taking of decisions that are respectful of the hackers’ individual ethics in morally debatable, grey zones

    Best Practices and Recommendations for Cybersecurity Service Providers

    Full text link
    This chapter outlines some concrete best practices and recommendations for cybersecurity service providers, with a focus on data sharing, data protection and penetration testing. Based on a brief outline of dilemmas that cybersecurity service providers may experience in their daily operations, it discusses data handling policies and practices of cybersecurity vendors along the following five topics: customer data handling; information about breaches; threat intelligence; vulnerability-related information; and data involved when collaborating with peers, CERTs, cybersecurity research groups, etc. There is, furthermore, a discussion of specific issues of penetration testing such as customer recruitment and execution as well as the supervision and governance of penetration testing. The chapter closes with some general recommendations regarding improving the ethical decision-making procedures of private cybersecurity service providers

    The Ethics of Cybersecurity

    Get PDF
    This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies
    corecore