scholarly journals Co-emergence of Institutional Innovation Navigates the New Normal in Growing Economies

2013 ◽  
Vol 4 (1) ◽  
pp. 69-81 ◽  
Author(s):  
Weilin Zhao ◽  
Chihiro Watanabe ◽  
Yuji Tou

Increasing fear of the global simultaneous stagnation derived from the Euro-crisis together with the New Normal in growing economies reveals the limit of individual strength leading to the significance of fusion with global best practices. Dramatic advancement of the Internet has enabled consumers in any nation to choose and learn from world’s strongest suppliers. Both trends inevitably necessitate co-emergence of institutional innovation between suppliers and consumers for sustainability. On the basis of an empirical analysis comparing institutional systems in 100 nations, this paper demonstrates the significance of this co-emergence thereby navigating the New Normal in growing economies.

Author(s):  
Petar Radanliev ◽  
David De Roure ◽  
Pete Burnap ◽  
Omar Santos

AbstractThe Internet-of-Things (IoT) triggers data protection questions and new types of cyber risks. Cyber risk regulations for the IoT, however, are still in their infancy. This is concerning, because companies integrating IoT devices and services need to perform a self-assessment of its IoT cyber security posture. At present, there are no self-assessment methods for quantifying IoT cyber risk posture. It is considered that IoT represent a complex system with too many uncontrollable risk states for quantitative risk assessment. To enable quantitative risk assessment of uncontrollable risk states in complex and coupled IoT systems, a new epistemological equation is designed and tested though comparative and empirical analysis. The comparative analysis is conducted on national digital strategies, followed by an empirical analysis of cyber risk assessment approaches. The results from the analysis present the current and a target state for IoT systems, followed by a transformation roadmap, describing how IoT systems can achieve the target state with a new epistemological analysis model. The new epistemological analysis approach enables the assessment of uncontrollable risk states in complex IoT systems—which begin to resemble artificial intelligence—and can be used for a quantitative self-assessment of IoT cyber risk posture.


GigaScience ◽  
2021 ◽  
Vol 10 (5) ◽  
Author(s):  
Neil Davies ◽  
John Deck ◽  
Eric C Kansa ◽  
Sarah Whitcher Kansa ◽  
John Kunze ◽  
...  

Abstract Sampling the natural world and built environment underpins much of science, yet systems for managing material samples and associated (meta)data are fragmented across institutional catalogs, practices for identification, and discipline-specific (meta)data standards. The Internet of Samples (iSamples) is a standards-based collaboration to uniquely, consistently, and conveniently identify material samples, record core metadata about them, and link them to other samples, data, and research products. iSamples extends existing resources and best practices in data stewardship to render a cross-domain cyberinfrastructure that enables transdisciplinary research, discovery, and reuse of material samples in 21st century natural science.


Author(s):  
P. Boonyathan ◽  
L. Al-Hakim

Today’s managers are turning to the functions of the supply chain to improve margins and gain competitive advantage. The explosion of the Internet and other e-business technologies has made real-time, online communication throughout the entire supply chain a reality. Electronic supply chain management (e-SCM) is a reference to the supply chain that is structured via electronic technology-enabled relationships. This chapter concentrates on the development of a procedure referred to as eSCM-I for e-SCM process improvement. The procedure focuses on process mapping and relies on principles of coordination theory. It is based on SCOR to standardize the process and take advantage of this technique of benchmarking/best practices potential. The procedure employs IDEF0 technique for mapping the processes.


2019 ◽  
Vol 65 (2) ◽  
pp. 132
Author(s):  
Herispon Herispon

This study identifies the determinants of debt behaviors and their effects on household consumption. We surveyed households in Riau, particularly in Pekanbaru and its neighboring areas, using purposive sampling and collected 390 useable responses. Our findings show that of the ten determinants considered, debt behavior can be explained by five determinants: (i) imitated lifestyle and consumerism, (ii) ability to manage money from debt, (iii) effects of promotion on the internet and visual media, (iv) monthly income, and (v) increasing household expenses and dependants. Implications of the findings are discussed. 


2021 ◽  
Vol 10 (1) ◽  
pp. 1
Author(s):  
Kohar Sulistyadi ◽  
Zallerene Anggiet ◽  
M. Tomy Haryanto ◽  
P. U. Pandi ◽  
R. M Pasaribu

n protecting workers from the corona virus: COVID-19, the employment preparedness for preventive action must be carried out in accordance with health protocol. Preventive efforts are best practices to reduce the impact of COVID-19 at XX Hotels. Hotel XX has conducted a feasibility evaluation of the health protocol for the employment preparedness. This protocol aims to handle the prevention of Covid-19, especially for workers, guests and stakeholders. While the vaccine has not been given to the public/workers, the prevention of positive cases of Covid-19 expects all parties to implement the health protocol. The health protocol assessment results in XX Hotel show that the assessment achievement was 97% above the minimum 90%. Therefore, workers can be feasible to work according to the implementation of the health protocol and work with WFO (work from the office) in a new normal and get a certificate of eligibility for the health protocol.


Author(s):  
David Ison

This chapter provides a general background on the problem of plagiarism, how the Internet has been implicated as a negative influence on Academic Integrity (AI), empirical study data on the influences of the Internet on plagiarism, reasons why students may conduct plagiarism, and best practices in the use of plagiarism detection. Within the first section, three empirical studies are highlighted to indicate the actual occurrence of plagiarism in graduate education and the role the Internet may play in influencing AI. In the second section, a description of both how and why students conduct plagiarism is presented. Existing literature on the topic is explored to better inform stakeholders on the ‘why' component with suggestions for potential mitigating solutions. The subsequent section describes plagiarism detection software that is commonly in use across the globe including best practices on how to interpret detection results. Lastly, recommendations and calls for future research are provided.


2010 ◽  
pp. 2298-2309
Author(s):  
Justin Meza ◽  
Qin Zhu

Knowledge is the fact or knowing something from experience or via association. Knowledge organization is the systematic management and organization of knowledge (Hodge, 2000). With the advent of Web 2.0, Mashups have become a hot new thing on the Web. A mashup is a Web site or a Web application that combines content from more than one source and delivers it in an integrated way (Fichter, 2006). In this article, we will first explore the concept of mashups and look at the components of a mashup. We will provide an overview of various mashups on the Internet. We will look at literature about knowledge and the knowledge organization. Then, we will elaborate on our experiment of a mashup in an enterprise environment. We will describe how we mixed the content from two sets of sources and created a new source: a novel way of organizing and displaying HP Labs Technical Reports. The findings from our project will be included and some best practices for creating enterprise mashups will be given. The future of enterprise mashups will be discussed as well.


Sensors ◽  
2020 ◽  
Vol 20 (17) ◽  
pp. 4806
Author(s):  
Naor Kalbo ◽  
Yisroel Mirsky ◽  
Asaf Shabtai ◽  
Yuval Elovici

Over the last decade, video surveillance systems have become a part of the Internet of Things (IoT). These IP-based surveillance systems now protect industrial facilities, railways, gas stations, and even one’s own home. Unfortunately, like other IoT systems, there are inherent security risks which can lead to significant violations of a user’s privacy. In this review, we explore the attack surface of modern surveillance systems and enumerate the various ways they can be compromised with real examples. We also identify the threat agents, their attack goals, attack vectors, and the resulting consequences of successful attacks. Finally, we present current countermeasures and best practices and discuss the threat horizon. The purpose of this review is to provide researchers and engineers with a better understanding of a modern surveillance systems’ security, to harden existing systems and develop improved security solutions.


Sign in / Sign up

Export Citation Format

Share Document