1,735 research outputs found

    Supply chain integration in New Zealand: benchmark comparisons with the UK automotive sector

    Get PDF
    Supply chain integration is a promising approach to cross-enterprise process improvement that is still not well understood. This research investigates the level of sophistication (maturity) of supply chain integration in New Zealand from the systems uncertainty perspective. Uncertainty levels of value streams are evaluated using the 'uncertainty circle' concept, thereby enabling benchmark comparisons of value stream performance. A sample of 21 NZ process industry value streams is assessed using a so-called Quick Scan Audit Methodology (QSAM). and the uncertainty results compared with those obtained from 21 value streams in the UK automotive sector. This benchmarking revealed that value streams in New Zealand are weakly integrated and have control mechanisms which are significantly looser than those of the UK sample, even though they face higher uncertainty on the control and demand sides. In contrast, crosscountry differences in supply and process uncertainty are marginal. While providing insights into the general health of New Zealand value streams, the authors acknowledge that the sample is not a comprehensive representation of every NZ value stream

    The economics of mandatory security breach reporting to authorities

    Full text link
    Legislators in many countries enact security breach notification regulation to address a lack of information security. The laws designate authorities to collect breach reports and advise firms. We devise a principal–agent model to analyze the economic effect of mandatory security breach reporting to authorities. The model assumes that firms (agents) have few incentives to unilaterally report breaches. To enforce the law, regulators (principals) can introduce security audits and sanction noncompliance. However, audits cannot differentiate between concealment and nescience of the agents. Even under optimistic assumptions regarding the effectiveness of mandatory security breach reporting to authorities in reducing individual losses, our model predicts that it may be difficult to adjust the sanction level such that breach notification laws generate social benefit

    XWeB: the XML Warehouse Benchmark

    Full text link
    With the emergence of XML as a standard for representing business data, new decision support applications are being developed. These XML data warehouses aim at supporting On-Line Analytical Processing (OLAP) operations that manipulate irregular XML data. To ensure feasibility of these new tools, important performance issues must be addressed. Performance is customarily assessed with the help of benchmarks. However, decision support benchmarks do not currently support XML features. In this paper, we introduce the XML Warehouse Benchmark (XWeB), which aims at filling this gap. XWeB derives from the relational decision support benchmark TPC-H. It is mainly composed of a test data warehouse that is based on a unified reference model for XML warehouses and that features XML-specific structures, and its associate XQuery decision support workload. XWeB's usage is illustrated by experiments on several XML database management systems

    Is it COVID or a Cold? An Investigation of the Role of Social Presence, Trust, and Persuasiveness for Users\u27 Intention to Comply with COVID-19 Chatbots

    Get PDF
    The COVID-19 pandemic challenged the existing healthcare system by demanding potential patients to self-diagnose and self-test a potential virus contraction. In this process, some individuals need help and guidance. However, the previous modus-operandi to go to a physician is no longer viable because of the limited capacity and danger of spreading the virus. Hence, digital means had to be developed to help and inform individuals at home, such as conversational agents (CA). The human-like design and perceived social presence of such a CA are central to attaining users’ compliance. Against this background, we surveyed 174 users of a commercial COVID-19 chatbot to investigate the role of perceived social presence. Our results provide support that the perceived social presence of chatbots leads to higher levels of trust, which are a driver of compliance. In contrast, perceived persuasiveness seems to have no significant effect

    The economic benefit of timely, adequate, and adherence to Parkinson's disease treatment: the Value of Treatment Project 2

    Get PDF
    Background: Parkinson's disease (PD) is a chronic progressive neurological disorder with a high psychosocial and economic burden. As part of the European Brain Council (EBC)-led Value of Treatment project, this study aimed to capture the economic benefit of timely, adequate, and adherence to PD treatment. Methods: The EBC Value of Treatment Initiative combined different stakeholders to identify unmet needs in the patients’ journey according to Rotterdam methodology. The economic evaluation focused on three major topics identified as major gaps: start of treatment; best treatment for advanced disease; and adherence to treatment. Two separate healthcare systems (Germany and the UK) were chosen. Cost-effectiveness was determined by using decision-analytical modelling approaches. Effectiveness was expressed as quality-adjusted life-years (QALYs) gained and incremental cost-effectiveness ratio (ICER). Results: Treatment intervention in PD was found to be cost-effective regardless of the initial health state of the patient receiving the treatment. Cost savings were between -€1000 and −€5400 with 0.10 QALY gain and -€1800 and -€7600 with 0.10 QALY gain for Germany and the UK, respectively. Treatment remains cost-effective within the National Institute for Health and Care Excellence thresholds. Availability of adequate treatment to more patients was also found to be cost-effective, with an ICER of €15,000–€32,600 across country settings. Achieving the target adherence to treatment would generate cost-savings of €239,000–€576,000 (Germany) and €917,000–€2,980.000 (UK) for every 1,000 patients treated adequately. Conclusions: The analyses confirmed that timely, adequate, and adherence to PD treatment will not only improve care of the patients but is also cost-effective across healthcare systems. Further studies with a distinct identification of gaps in care are necessary to develop better and affordable care

    Are We Compromised? Modelling Security Assessment Games

    Get PDF
    Abstract. Security assessments are an integral part of organisations’ strategies for protecting their digital assets and critical IT infrastructure. In this paper we propose a game-theoretic modelling of a particular form of security assessment – one which addresses the question “are we compromised?”. We do so by extending the recently proposed game “FlipIt”, which itself can be used to model the interaction between defenders and attackers under the Advanced Persistent Threat (APT) scenario. Our extension gives players the option to “test ” the state of the game before making a move. This allows one to study the scenario in which organisations have the option to perform periodic security assessments of such nature, and the benefits they may bring.

    A Survey of Satisfiability Modulo Theory

    Full text link
    Satisfiability modulo theory (SMT) consists in testing the satisfiability of first-order formulas over linear integer or real arithmetic, or other theories. In this survey, we explain the combination of propositional satisfiability and decision procedures for conjunctions known as DPLL(T), and the alternative "natural domain" approaches. We also cover quantifiers, Craig interpolants, polynomial arithmetic, and how SMT solvers are used in automated software analysis.Comment: Computer Algebra in Scientific Computing, Sep 2016, Bucharest, Romania. 201

    Functionalisation of bolaamphiphiles with mononuclear bis(2,2'-bipyridyl)ruthenium(II) complexes for application in self assembled monolayers

    Get PDF
    A novel ruthenium(II) polypyridyl complex connected competently to a bolaamphiphile, containing amide linkages to provide rigidity via hydrogen bonding in the monolayer, has been prepared. The ruthenium(II) complexes of this ligand and of the intermediates in the synthesis were prepared by modification of the coordinated ligands, demonstrating the synthetic versatility and robustness of this family of complexes. All ruthenium complexes were characterised by electrochemical and spectroscopic techniques and were found to have similar properties to the parent complex [Ru(bipy)[3]][2][+], and remain versatile photosensitisers, with well-defined properties, despite extensive substitution of the bipy ligand

    Detection and localization of double compression in MP3 audio tracks

    Get PDF
    In this work, by exploiting the traces left by double compression in the statistics of quantized modified discrete cosine transform coefficients, a single measure has been derived that allows to decide whether an MP3 file is singly or doubly compressed and, in the last case, to devise also the bit-rate of the first compression. Moreover, the proposed method as well as two state-of-the-art methods have been applied to analyze short temporal windows of the track, allowing the localization of possible tampered portions in the MP3 file under analysis. Experiments confirm the good performance of the proposed scheme and demonstrate that current detection methods are useful for tampering localization, thus offering a new tool for the forensic analysis of MP3 audio tracks
    corecore