265 resultados para Social systems
Resumo:
The construction industry has an obligation to respond to sustainability expectations of our society. Solutions that integrate innovative, intelligent and sustainability deliverables are vital for us to meet new and emerging challenges. Industrialised Building Systems (IBS), or known otherwise as prefabrication, employs a combination of ready-made components in the construction of buildings. They promote quality of production, enhance simplification of construction processes and minimise waste. The unique characteristics of this construction method respond well to sustainability. Despite the promises however, IBS has yet to be effectively implemented in Malaysia. There are often misconceptions among key stakeholders about IBS applications. The existing rating schemes fail to assess IBS against sustainability measures. To ensure the capture of full sustainability potential in buildings developed, the critical factors and action plans agreeable to all participants in the development processes need to be identified. Through questionnaire survey, eighteen critical factors relevant to IBS sustainability were identified and encapsulated into a conceptual framework to coordinate a systematic IBS decision making approach. Five categories were used to separate the critical factors into: ecological performance; economic value; social equity and culture; technical quality; and implementation and enforcement. This categorisation extends the "Triple Bottom Lines" to include social, economic, environmental and institutional dimensions. Semi-structured interviews help identify strategies of actions and solutions of potential problems through a SWOT analysis framework. These tools help the decision-makers maximise the opportunities by using available strengths, avoid weaknesses, and diagnose possible threats in the examined issues. The recommendations formed an integrated action plan to present information on what and how to improve sustainability through tackling each critical factor during IBS development. It can be used as part of the project briefing documents for IBS designers. For validation and finalisation the research deliverables, three case studies were conducted. The research fills a current gap by responding to IBS project scenarios in developing countries. It also provides a balanced view for designers to better understand sustainability potential and prioritize attentions to manage sustainability issues in IBS applications.
Of dogs, fish, birds and turds : the social construction of sewage pollution by recreational boaters
Resumo:
Animals are often used as ‘evidence’ of marine pollution. Take for instance the ubiquitous images of miserable oil-soaked marine birds following high profile oil spills such as the Exxon Valdez, Pacific Adventurer and Deepwater Horizon incidents or the images of bloated floating fish carcasses which are used to signal the presence of toxic pollutants. In recent years waste discharges from vessels have come under increased public and regulatory scrutiny both in Australia and around the world. International, regional, national and local restrictions are becoming more stringent for high profile marine pollutants such as oil as well as previously overlooked vessel-sourced pollutants such as sewage. Drawing upon media reports and recreational boater responses to government attempts to regulate the discharge of sewage from recreational vessels, this paper considers the important role played by animals in constructions of marine pollution by sewage and attributions of blame for this pollution. Specifically, this study found that recreational boat owners disputed claims their sewage management practices posed an environmental threat arguing that the sewage discharged was readily and eagerly consumed by fish in the receiving environment. Boat owners also argued that increased levels of bacteria which indicate the presence of faeces within the marine environment could be directly attributed to the excrement of marine mammals and birds or were the result of dog faeces being washed through municipal storm water systems rather than the result of vessel discharges. By contrast the contamination of oysters was provided as evidence of sewage pollution by other stakeholders.
Resumo:
Digital Human Models (DHM) have been used for over 25 years. They have evolved from simple drawing templates, which are nowadays still used in architecture, to complex and Computer Aided Engineering (CAE) integrated design and analysis tools for various ergonomic tasks. DHM are most frequently used for applications in product design and production planning, with many successful implementations documented. DHM from other domains, as for example computer user interfaces, artificial intelligence, training and education, or the entertainment industry show that there is also an ongoing development towards a comprehensive understanding and holistic modeling of human behavior. While the development of DHM for the game sector has seen significant progress in recent years, advances of DHM in the area of ergonomics have been comparatively modest. As a consequence, we need to question if current DHM systems are fit for the design of future mobile work systems. So far it appears that DHM in Ergonomics are rather limited to some traditional applications. According to Dul et al. (2012), future characteristics of Human Factors and Ergonomics (HFE) can be assigned to six main trends: (1) global change of work systems, (2) cultural diversity, (3) ageing, (4) information and communication technology (ICT), (5) enhanced competiveness and the need for innovation, and; (6) sustainability and corporate social responsibility. Based on a literature review, we systematically investigate the capabilities of current ergonomic DHM systems versus the ‘Future of Ergonomics’ requirements. It is found that DHMs already provide broad functionality in support of trends (1) and (2), and more limited options in regards to trend (3). Today’s DHM provide access to a broad range of national and international databases for correct differentiation and characterization of anthropometry for global populations. Some DHM explicitly address social and cultural modeling of groups of people. In comparison, the trends of growing importance of ICT (4), the need for innovation (5) and sustainability (6) are addressed primarily from a hardware-oriented and engineering perspective and not reflected in DHM. This reflects a persistent separation between hardware design (engineering) and software design (information technology) in the view of DHM – a disconnection which needs to be urgently overcome in the era of software defined user interfaces and mobile devices. The design of a mobile ICT-device is discussed to exemplify the need for a comprehensive future DHM solution. Designing such mobile devices requires an approach that includes organizational aspects as well as technical and cognitive ergonomics. Multiple interrelationships between the different aspects result in a challenging setting for future DHM. In conclusion, the ‘Future of Ergonomics’ pose particular challenges for DHM in regards to the design of mobile work systems, and moreover mobile information access.
Resumo:
Enterprise Social Networks continue to be adopted by organisations looking to increase collaboration between employees, customers and industry partners. Offering a varied range of features and functionality, this technology can be distinguished by the underlying business models that providers of this software deploy. This study identifies and describes the different business models through an analysis of leading Enterprise Social Networks: Yammer, Chatter, SharePoint, Connections, Jive, Facebook and Twitter. A key contribution of this research is the identification of consumer and corporate models as extreme approaches. These findings align well with research on the adoption of Enterprise Social Networks that has discussed bottom-up and top-down approaches. Of specific interest are hybrid models that wrap a corporate model within a consumer model and may, therefore, provide synergies on both models. From a broader perspective, this can be seen as the merging of the corporate and consumer markets for IT products and services.
Much ado about nothing? Tracing the progress of innovations borne on enterprise social network sites
Resumo:
Enterprise social networks are organizationally bounded online platforms for users to interact with another and maintain interpersonal relationships. The allure of these technologies is often seen in intra-organizational communication, collaboration and innovation. How these technologies actually support organizational innovation efforts remains unclear. A specific challenge is whether digital content on these platforms converts to actual innovation development efforts. In this study we set out to examine innovation-centric content flows on enterprise social networking platforms, and advance a conceptual model that seeks to explain which innovation conveyed in the digital content will traverse from the digital platform into regular processes. We describe important constructs of our model and offer strategies for the operationalization of the constructs. We conclude with an outlook to our ongoing empirical study that will explore and validate the key propositions of our model, and we sketch some potential implications for industry and academia.
Resumo:
Organizations employ Enterprise Social Networks (ESNs) (e.g., Yammer) expecting better intra-organizational communication, effective knowledge sharing and, in general, greater collaboration. Despite their similarities with Public Social Networks (PSNs) (e.g., Twitter), ESNs are struggling to gain credence with employees. This paper is part of a larger research project that investigates mechanisms to enhance employees’ engagement in the ESNs. Through the lens of Control Theory, this paper reports preliminary findings of a pilot case study aimed to propose formal and informal mechanisms that impact employees’ intrinsic and extrinsic motivations to encourage their use of ESNs. The study results highlight (i) the need to better understand employees’ extrinsic and intrinsic motivations to use Social Networks, and (ii) that unlike a PSN which acts as a hedonic system, an ESN acts as a utilitarian system, highlighting the importance of supporting intrinsic motivations in its implementation.
Resumo:
Increasingly, organizations are looking to employ Social Technology (ST) to enhance their capability with Business Process Improvement (BPI). However, little is known about how the characteristics or qualities of ST actually influence an organizations' capability at Business Process Improvement (BPI). This paper discusses the potential role of ST in process improvement by presenting an a-priory model derived by an investigation of extant research. First, the qualities of social technology that potentially support high level action possibilities related to BPI are presented (we refer to these as affordances), next these affordances are mapped to the De Bruin (2009) BPM Maturity model as a first step to understanding how ST influences BPI. This work is expected to contribute to our knowledge and understanding of the relationship between ST and BPI, and will extend existing theory on Business Process Management capability and maturity.
Resumo:
Digital human modeling (DHM) systems underwent significant development within the last years. They achieved constantly growing importance in the field of ergonomic workplace design, product development, product usability, ergonomic research, ergonomic education, audiovisual marketing and the entertainment industry. They help to design ergonomic products as well as healthy and safe socio-technical work systems. In the domain of scientific DHM systems, no industry specific standard interfaces are defined which could facilitate the exchange of 3D solid body data, anthropometric data or motion data. The focus of this article is to provide an overview of requirements for a reliable data exchange between different DHM systems in order to identify suitable file formats. Examples from the literature are discussed in detail. Methods: As a first step a literature review is conducted on existing studies and file formats for exchanging data between different DHM systems. The found file formats can be structured into different categories: static 3D solid body data exchange, anthropometric data exchange, motion data exchange and comprehensive data exchange. Each file format is discussed and advantages as well as disadvantages for the DHM context are pointed out. Case studies are furthermore presented, which show first approaches to exchange data between DHM systems. Lessons learnt are shortly summarized. Results: A selection of suitable file formats for data exchange between DHM systems is determined from the literature review.
Resumo:
Australia's systems for protecting children from child abuse and neglect are undergoing reform in light of the National Framework for Protecting Australia's Children and innumerable judicial and other inquiries into their operations and outcomes. This article examines the current context for child protection practice and critically examines the dominant policy and practice frameworks, highlighting issues confronting policy makers and practitioners. Within the current systematic reform agendas, it is posited, there are key priorities that must be attended to in order to bring about necessary change, workforce support and a renewed emphasis on quality professional practice and re-orientation of practice approaches. Also required is the embedding of ethics into a relationship-based practice framework, and revitalising localised community involvement in a protective web of care that provides practical, compassionate and accessible help to needy and vulnerable children and families.
Resumo:
The fastest-growing segment of jobs in the creative sector are in those firms that provide creative services to other sectors (Hearn, Goldsmith, Bridgstock, Rodgers 2014, this volume; Cunningham 2014, this volume). There are also a large number of Creative Services (Architecture and Design, Advertising and Marketing, Software and Digital Content occupations) workers embedded in organizations in other industry sectors (Cunningham and Higgs 2009). Ben Goldsmith (2014, this volume) shows, for example, that the Financial Services sector is the largest employer of digital creative talent in Australia. But why should this be? We argue it is because ‘knowledge-based intangibles are increasingly the source of value creation and hence of sustainable competitive advantage (Mudambi 2008, 186). This value creation occurs primarily at the research and development (R and D) and the marketing ends of the supply chain. Both of these areas require strong creative capabilities in order to design for, and to persuade, consumers. It is no surprise that Jess Rodgers (2014, this volume), in a study of Australia’s Manufacturing sector, found designers and advertising and marketing occupations to be the most numerous creative occupations. Greg Hearn and Ruth Bridgstock (2013, forthcoming) suggest ‘the creative heart of the creative economy […] is the social and organisational routines that manage the generation of cultural novelty, both tacit and codified, internal and external, and [cultural novelty’s] combination with other knowledges […] produce and capture value’. 2 Moreover, the main “social and organisational routine” is usually a team (for example, Grabher 2002; 2004).
Resumo:
This study presents the unique benevolent and malevolent nature of social media, intertwined to its capabilities, which influences its role as a benefactor and a competitor. We conceptualize this phenomenon as the competing-complementarity of social media. We explain competing-complementarity using Teece’s (1986) concept of complementary assets and Porter’s (2001) work on competitive forces shaping strategy and business on the Internet. We observe this phenomenon of competing-complementarity of social media on news firms and offer its evidence through opinionated data analysis.
Resumo:
Social networking sites (SNSs), with their large numbers of users and large information base, seem to be perfect breeding grounds for exploiting the vulnerabilities of people, the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” While technology-based security has been addressed by research and may be well understood, social engineering is more challenging to understand and manage, especially in new environments such as SNSs, owing to some factors of SNSs that reduce the ability of users to detect the attack and increase the ability of attackers to launch it. This work will contribute to the knowledge of social engineering by presenting the first two conceptual models of social engineering attacks in SNSs. Phase-based and source-based models are presented, along with an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.
Resumo:
While social engineering represents a real and ominous threat to many organizations, companies, governments, and individuals, social networking sites (SNSs), have been identified as among the most common means of social engineering attacks. Owing to factors that reduce the ability of users to detect social engineering tricks and increase the ability of attackers to launch them, SNSs seem to be perfect breeding ground for exploiting the vulnerabilities of people, and the weakest link in security. This work will contribute to the knowledge of social engineering by identifying different entities and subentities that affect social engineering based attacks in SNSs. Moreover, this paper includes an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.
Resumo:
There is no doubt that social engineering plays a vital role in compromising most security defenses, and in attacks on people, organizations, companies, or even governments. It is the art of deceiving and tricking people to reveal critical information or to perform an action that benefits the attacker in some way. Fraudulent and deceptive people have been using social engineering traps and tactics using information technology such as e-mails, social networks, web sites, and applications to trick victims into obeying them, accepting threats, and falling victim to various crimes and attacks such as phishing, sexual abuse, financial abuse, identity theft, impersonation, physical crime, and many other forms of attack. Although organizations, researchers, practitioners, and lawyers recognize the severe risk of social engineering-based threats, there is a severe lack of understanding and controlling of such threats. One side of the problem is perhaps the unclear concept of social engineering as well as the complexity of understand human behaviors in behaving toward, approaching, accepting, and failing to recognize threats or the deception behind them. The aim of this paper is to explain the definition of social engineering based on the related theories of the many related disciplines such as psychology, sociology, information technology, marketing, and behaviourism. We hope, by this work, to help researchers, practitioners, lawyers, and other decision makers to get a fuller picture of social engineering and, therefore, to open new directions of collaboration toward detecting and controlling it.
Resumo:
The Chinese government should be commended for its open, concerted, and rapid response to the recent H7N9 influenza outbreak. However, the first known case was not reported until 48 days after disease onset.1 Although the difficulties in detecting the virus and the lack of suitable diagnostic methods have been the focus of discussion,2 systematic limitations that may have contributed to this delay have hardly been discussed. The detection speed of surveillance systems is limited by the highly structured nature of information flow and hierarchical organisation of these systems. Flu surveillance usually relies on notification to a central authority of laboratory confirmed cases or presentations to sentinel practices for flu-like illness. Each step in this pathway presents a bottleneck at which information and time can be lost; this limitation must be dealt with...