149 research outputs found

    Distributed design information and knowledge : storage and strategy

    Get PDF
    This paper discusses the storage and strategy of distributed design information and knowledg

    The Role of Referrals in New Client Capture Within the Field of Independent Financial Advice

    Get PDF
    The field of regulated financial services has been ill-served by marketing theory. As a consequence: (1) the nature of marketing in this sector has been misunderstood; (2) the key mechanism for generating new business in the field, namely, referrals, has been the subject of serious misapprehension; and, (3) the guidance offered to practitioners has been negligible. In particular, the role of the independent financial advisor (IFA) appears to have been conceptualised as a sales role, and the nature of the relationship between the IFA and the client has been addressed as though it were a straightforward buyer-seller relationship, with the IFA selling products to the client. It is unlikely that these conceptualisations were ever satisfactory and following recent regulatory changes in the sector they have become even less relevant. Since January 1st 2013 commission-based selling of financial investment products to consumers has been prohibited so that independent financial advice has become largely a fee-based service. The focus of this research is on referrals as a method of generating new business; the research context is the UK independent financial advice industry. The objectives of the study are to: (1) define and conceptualise referrals in the context of the financial advice industry; (2) develop a framework of the referral process; (3) provide practitioners with empirical evidence in connection with their embedded beliefs about referrals in this industry; (4) explore whether (as many practitioner believe) it is possible to actively manage referral generation within a financial advice business; and, (5) to investigate the importance of referrals as a means of generating new business for advisors. It was found that practitioners believe they influence referrals in four main ways: excellent service, higher qualifications, contact frequency and speed of response. However the results of this study clearly indicate that referrals are not the outcome of agency; they are a random occurrence, determined by happenstance and the result of an opportunist conversation between a prospect and a client. In turn, contrary to the advice of consultancy providers, asking for referrals was found to be ineffective and not welcomed by consumers. While word-of-mouth (WOM) often instigates referral generation, the value of WOM, needs be treated with caution, since consumers were found to have limited understanding of the service provided by independent advisors. Despite the importance consumers attribute to investment performance practitioners do not, commonly, provide investment benchmarks nor do consumers use analytical tools to assess the performance of their advisor. The absence of performance measures connects with the finding that practitioners have difficulty in describing what they do hence consumers are uncertain how to describe the service and what to say about it when asked

    Towards Principles and Project Memories for Distributed-Design Information Storing in Engineering Design Education

    Get PDF
    The issues of distributed working are many, with problems relating to information access and information acquisition the most common (Crabtree et al., 1997). Little prescription or guidance on information management exists for designers (Culley et al., 1999). This thesis examines how engineering design students store information in distributed team-based project work. From these findings a set of guiding Principles for distributed-design information storing (d-DIS) are developed to support students undertaking distributed project work and to better prepare them for their role as graduate engineers in an ever increasingly international and globalised market. The thesis also presents the development of the concept of Project Memories, shared information spaces. It is crucial to provide an archive or repository that functions as a collective memory in order to support distributed design collaboration

    A framework for design engineering education in a global context

    Get PDF
    This paper presents a framework for teaching design engineering in a global context using innovative technologies to enable distributed teams to work together effectively across international and cultural boundaries. The DIDET Framework represents the findings of a 5-year project conducted by the University of Strathclyde, Stanford University and Olin College which enhanced student learning opportunities by enabling them to partake in global, team based design engineering projects, directly experiencing different cultural contexts and accessing a variety of digital information sources via a range of innovative technology. The use of innovative technology enabled the formalization of design knowledge within international student teams as did the methods that were developed for students to store, share and reuse information. Coaching methods were used by teaching staff to support distributed teams and evaluation work on relevant classes was carried out regularly to allow ongoing improvement of learning and teaching and show improvements in student learning. Major findings of the 5 year project include the requirement to overcome technological, pedagogical and cultural issues for successful eLearning implementations. The DIDET Framework encapsulates all the conclusions relating to design engineering in a global context. Each of the principles for effective distributed design learning is shown along with relevant findings and suggested metrics. The findings detailed in the paper were reached through a series of interventions in design engineering education at the collaborating institutions. Evaluation was carried out on an ongoing basis and fed back into project development, both on the pedagogical and the technological approaches

    A task based approach to global design education

    Get PDF
    This paper provides a new perspective for managing and delivering a global design class, and a clear alternative to the traditional joint project for participating institutes. The ‘task-based approach’ used to structure a Global Design class at the University of Strathclyde is described. This entailed the creation of a series of short design exercises to be run in conjunction with three partner institutions: the University of Malta in Msida, Malta; Swinburne University of Technology in Melbourne, Australia; and Stanford University in Palo Alto, USA. These exercises focussed on specific aspects of distributed working, including synchronous working, asynchronous working and digital library support, according to the location and facilities afforded by each institution. This provides a number of pedagogical and organisation benefits. Students are required to take a more strategic approach to their design work, developing a higher evaluative understanding of the tools and processes required to produce a successful design. Staff members have a greater level of control afforded by a shared collaborative class component, including assessment, timetabling and learning objectives, rather than simply having a joint project. This potentially makes global design classes a more flexible and viable option for institutions interested in participating in such programme

    Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations

    Full text link
    EdDSA is a standardised elliptic curve digital signature scheme introduced to overcome some of the issues prevalent in the more established ECDSA standard. Due to the EdDSA standard specifying that the EdDSA signature be deterministic, if the signing function were to be used as a public key signing oracle for the attacker, the unforgeability notion of security of the scheme can be broken. This paper describes an attack against some of the most popular EdDSA implementations, which results in an adversary recovering the private key used during signing. With this recovered secret key, an adversary can sign arbitrary messages that would be seen as valid by the EdDSA verification function. A list of libraries with vulnerable APIs at the time of publication is provided. Furthermore, this paper provides two suggestions for securing EdDSA signing APIs against this vulnerability while it additionally discusses failed attempts to solve the issue

    A reflective approach to learning in a global design project

    Get PDF
    This paper describes a three-week project run jointly between the University of Strathclyde, Scotland, Franklin W. Olin College of Engineering, MA and Stanford University, CA. The purpose of this class was to provide students with an understanding of the technological and organisational issues involved in global product development teams, and to provide an experience which would prepare them for work in such environments. Reflective learning techniques were applied, including reviews of relevant literature, analyses of case studies, and a critical review of the completed project. The main result of this approach was that students had a more considered attitude towards the project process than in typical, more output-focussed student design assignments. This was crucial given the cultural and pedagogical variations across institutions. The Global Team Design Project was successful, particularly for the first year of implementation, and provides a potential framework that other institutions could employ in similar project classe

    Scalable Multi-domain Trust Infrastructures for Segmented Networks

    Full text link
    Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the authenticity of the public key. However, what happens when external entities are not trusted to verify the public key or in cases where there is no Internet connection within an isolated or autonomously acting collection of devices? For this, a trusted entity can be elected to generate a key pair and then split the private key amongst trusted devices. Each node can then sign part of the transaction using their split of the shared secret. The aggregated signature can then define agreement on a consensus within the infrastructure. Unfortunately, this process has two significant problems. The first is when no trusted node can act as a dealer of the shares. The second is the difficulty of scaling the digital signature scheme. This paper outlines a method of creating a leaderless approach to defining trust domains to overcome weaknesses in the scaling of the elliptic curve digital signature algorithm. Instead, it proposes the usage of the Edwards curve digital signature algorithm for the definition of multiple trust zones. The paper shows that the computational overhead of the distributed key generation phase increases with the number of nodes in the trust domain but that the distributed signing has a relatively constant computational overhead

    Terrestrial arachnids

    Get PDF
    74 p. : ill. ; 26 cm.Includes bibliographical references (p. 72-74)."Three new genera and seven new species of the arachnid order Trigonotarbida are described based on remarkably well preserved fossils from the late Middle Devonian (Givetian) of Gilboa, New York: Gilboarachne griersoni, Gelasinotarbus reticulatus, G. bonamoae, G. bifidus, G. heptops, G.? fimbriunguis, and Aculeatarbus depressus. A brief review of other known Devonian trigonotarbids is presented, and certain misconceptions about the order are rectified, including the nature of the eyes, chelicerae, claws, and abdominal segmentation. Trigonotarbida is shown by cladistic analysis to be the plesiomorphic sister-group of Araneae + Amblypygi + Uropygi + Schizomida"--P. 2
    corecore