30,608 research outputs found

    Special Session on Industry 4.0

    Get PDF
    No abstract available

    Eco‐Holonic 4.0 Circular Business Model to  Conceptualize Sustainable Value Chain Towards  Digital Transition 

    Get PDF
    The purpose of this paper is to conceptualize a circular business model based on an Eco-Holonic Architecture, through the integration of circular economy and holonic principles. A conceptual model is developed to manage the complexity of integrating circular economy principles, digital transformation, and tools and frameworks for sustainability into business models. The proposed architecture is multilevel and multiscale in order to achieve the instantiation of the sustainable value chain in any territory. The architecture promotes the incorporation of circular economy and holonic principles into new circular business models. This integrated perspective of business model can support the design and upgrade of the manufacturing companies in their respective industrial sectors. The conceptual model proposed is based on activity theory that considers the interactions between technical and social systems and allows the mitigation of the metabolic rift that exists between natural and social metabolism. This study contributes to the existing literature on circular economy, circular business models and activity theory by considering holonic paradigm concerns, which have not been explored yet. This research also offers a unique holonic architecture of circular business model by considering different levels, relationships, dynamism and contextualization (territory) aspects

    Synergistic literacies: Fostering critical and technological literacies in teaching legal research methods at the University of Waikato

    Get PDF
    Nowadays, new law courses are not approved unless both the "needs analysis" is convincing and the "consumer demand" is certain. Needs and demands today are driven by new pressures for technological literacy accelerated by globalisation and the current revolution in information and communication technologies (ICTs). The popular logic is that new global "knowledge economies" need "knowledge workers" or "wired workers" to labour in the new e-markets for goods and services and to use the burgeoning number and high quality of electronic information databases now essential to legal research. Students are acutely aware of these developments as well as of the highly competitive nature of the contemporary labour market for law graduates. Consequently, students are demanding more "how to" research skills training. This article puts in context the reasons why, at the University of Waikato, we regard creating synergy between critical and technological literacy as essential for teaching and learning law-in-context research methods, and then describes the curriculum we designed for a legal research methods course in order to trial this approach. From the start we have been clear that the new course was not just to be a "how to" course, and that we would be concentrating on critical literacy as much as technological literacy. For us, critical literacy is fundamental because it relates to the way in which one analyses the world, a process described as "becoming aware of the underlying structure of conceptions".1 This awareness includes the politics in the architectures that constitute the Internet and the assembly of information accessible on it. We designed our curriculum for critical literacy around five types of analysis. Our shorthand for this is to call these "the five 'Cs'". Our five interrelated categories for analysis focus on: Change - in society, economy and culture Concepts - legal and sociological concepts and analytical frameworks Critique (and standpoint or perspective) Comparisons (and Contrasts) Contexts. We argue that, at a minimum, these are the conceptual tools necessary to critique and engage the operation of the law in the context of society, noting especially inequalities and injustices. Throughout the course students are encouraged to harness technological literacy to each dimension of their analysis. This article consists of two main parts. The first part ("Context and Assumptions") explores in some depth the reasons for the need to teach critical literacy alongside technological literacy. The second part ("The Legal Research Methods Course") describes our efforts to promote the synergy between critical and technological literacies in the context of a fourth year optional course, Legal Research Methods 2000, at the University of Waikato School of Law

    Кибербезопасность в образовательных сетях

    Get PDF
    The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”. “A Human” is considered in general meaning, mainly as a learner. The analysis is provided on the basis of experience of hybrid war in Ukraine that have demonstrated the change of the target of military operations from military personnel and critical infrastructure to a human in general. Young people are the vulnerable group that can be the main goal of cognitive operations in long-term perspective, and they are the weakest link of the System.У статті обговорюється можливий вплив цифрового простору на людину, а також пов'язані з людиною напрямки кібербезпеки в освіті: рівні кібербезпеки, роль соціального інжинірингу в кібербезпеці освіти, «когнітивна вакцинація». «Людина» розглядається в загальному значенні, головним чином як та, що навчається. Аналіз надається на основі досвіду гібридної війни в Україні, яка продемонструвала зміну цілей військових операцій з військовослужбовців та критичної інфраструктури на людину загалом. Молодь - це вразлива група, яка може бути основною метою таких операцій в довгостроковій перспективі, і вони є найслабшою ланкою системи.В документе обсуждается возможное влияние цифрового пространства на человека, а также связанные с ним направления в анализе кибербезопасности в образовании: уровни кибербезопасности, роль социальной инженерии в кибербезопасности образования, «когнитивная вакцинация». «Человек» рассматривается в общем смысле, в основном как ученик. Анализ представлен на основе опыта гибридной войны в Украине, которая продемонстрировала изменение цели военных действий с военного персонала и критической инфраструктуры на человека в целом. Молодые люди являются уязвимой группой, которая может быть главной целью когнитивных операций в долгосрочной перспективе, и они являются самым слабым звеном Систем

    ADAPTS: An Intelligent Sustainable Conceptual Framework for Engineering Projects

    Get PDF
    This paper presents a conceptual framework for the optimization of environmental sustainability in engineering projects, both for products and industrial facilities or processes. The main objective of this work is to propose a conceptual framework to help researchers to approach optimization under the criteria of sustainability of engineering projects, making use of current Machine Learning techniques. For the development of this conceptual framework, a bibliographic search has been carried out on the Web of Science. From the selected documents and through a hermeneutic procedure the texts have been analyzed and the conceptual framework has been carried out. A graphic representation pyramid shape is shown to clearly define the variables of the proposed conceptual framework and their relationships. The conceptual framework consists of 5 dimensions; its acronym is ADAPTS. In the base are: (1) the Application to which it is intended, (2) the available DAta, (3) the APproach under which it is operated, and (4) the machine learning Tool used. At the top of the pyramid, (5) the necessary Sensing. A study case is proposed to show its applicability. This work is part of a broader line of research, in terms of optimization under sustainability criteria.Telefónica Chair “Intelligence in Networks” of the University of Seville (Spain

    Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use

    Full text link
    A challenge is to develop cyber-physical system scenarios that reflect the diversity and complexity of real-life cyber-physical systems in the research questions that they address. Time-bounded collaborative events, such as hackathons, jams and sprints, are increasingly used as a means of bringing groups of individuals together, in order to explore challenges and develop solutions. This paper describes our experiences, using a science hackathon to bring individual researchers together, in order to develop a common use-case implemented on a shared CPS testbed platform that embodies the diversity in their own security research questions. A qualitative study of the event was conducted, in order to evaluate the success of the process, with a view to improving future similar events
    corecore