Building Business Relationships through Product Information Assets

2002 ◽  
Author(s):  
Geoffrey Bock
Automation ◽  
2021 ◽  
Vol 2 (3) ◽  
pp. 202-219
Author(s):  
Jan Pennekamp ◽  
Roman Matzutt ◽  
Salil S. Kanhere ◽  
Jens Hiller ◽  
Klaus Wehrle

The Internet of Things provides manufacturing with rich data for increased automation. Beyond company-internal data exploitation, the sharing of product and manufacturing process data along and across supply chains enables more efficient production flows and product lifecycle management. Even more, data-based automation facilitates short-lived ad hoc collaborations, realizing highly dynamic business relationships for sustainable exploitation of production resources and capacities. However, the sharing and use of business data across manufacturers and with end customers add requirements on data accountability, verifiability, and reliability and needs to consider security and privacy demands. While research has already identified blockchain technology as a key technology to address these challenges, current solutions mainly evolve around logistics or focus on established business relationships instead of automated but highly dynamic collaborations that cannot draw upon long-term trust relationships. We identify three open research areas on the road to such a truly accountable and dependable manufacturing enabled by blockchain technology: blockchain-inherent challenges, scenario-driven challenges, and socio-economic challenges. Especially tackling the scenario-driven challenges, we discuss requirements and options for realizing a blockchain-based trustworthy information store and outline its use for automation to achieve a reliable sharing of product information, efficient and dependable collaboration, and dynamic distributed markets without requiring established long-term trust.


2019 ◽  
Vol 1 (2) ◽  
pp. 25-33
Author(s):  
Mei Ling Phang ◽  
Swee Huay Heng

Information sharing has become prevalent due to the expansion of social networking in this 21st century. However, electronic devices are vulnerable to various kinds of attacks. Information might be disclosed, modified and accessed by an unauthorised third party which consequently leads to the breach of confidentiality, integrity and availability of the information. Therefore, it is of utmost importance to employ the technology of cryptography and steganography to protect information assets. Cryptography and steganography have weaknesses when they are working alone. Therefore, crypto-steganography, the combination of cryptography and steganography are introduced to overcome the weaknesses in order to provide a double layer of security and protection. This paper provides a general overview of steganography and cryptography as well as a comparison analysis of different crypto-steganographic schemes. A secure crypto-steganographic system for healthcare is then developed with the implementation and integration of the secure crypto-steganographic scheme proposed by Juneja and Sandhu. This healthcare system enables users to store and deliver message in a more secure way while achieving the main goals of both cryptography and steganography.


Author(s):  
Judith Barlaan

Information security is imperative for state colleges and universities (SUCs) to have a sound information security in protecting their information assets, enhancing institutional reputation and ensuring compliance with the law. This paper presents the level of implementation of information security in the state colleges and universities (SUCs) in the Philippines. Data  used  was  based  on questionnaire adapted from the Information Security Governance (ISG) Assessment Tool for Higher Education(EDUCAUSE/Internet2 Security Task 2004) and was  distributed  to  a  total  of  30  individuals  who  are  responsible  in managing and keeping  the  information assets of the SUCS. Findings revealed that information security is not yet fully implemented among the SUCS, this is a clear indication of failure or disaster, and these institutions are vulnerable to information security threats. SUCs are encouraged to implement comprehensive information security program at a strategic level involving the board of regents and top executives for safety and security.


2020 ◽  
Vol 01 (01) ◽  
pp. 05-14
Author(s):  
M.G.K.M. Fernando ◽  
K.I.J. Priyadarshi ◽  
L.G.T. Shanika ◽  
N.R. Samaranayake

Introduction: Modified release tablets (MRTs) are developed to achieve different therapeutic outcomes and are frequently prescribed. This study aims to evaluate the knowledge, perceptions and practices on using MRTs among a selected cohort of prescribers. Methods: A self administered online survey was conducted using a pre-validated questionnaire, prepared in-house to assess knowledge, perceptions and practices on using MRTs, among academics with an MBBS degree in medical faculties of State universities in Sri Lanka. Results: The response rate was 15.5% among 375 prescribers. Most were females (53.4%) and were 46-55 years (29.3%). Over 50% correctly expanded abbreviations related to MRTs. Most defined enteric coated (87.9%) and targeted release (77.6%) forms accurately. However, 87.0% mixed-up definitions of sustained release with controlled release. Most believed that inability to split tablets (70.7%) and high cost (70.7%), as disadvantages of MRTs. Nearly half did not identify the risk of dose dumping (53.5%) and inflexible dosing schedule (44.8%) as disadvantages. For frequency of administering MRTs, 86.2% referred the product information leaflet (PIL) while 29.0% depended on the frequency of the corresponding immediate release tablet. Most (79.3%) prescribed MRTs to increase patient compliance while 12.1% prescribed them to reduce cost. When problems regarding MRTs were encountered, most referred PILs (81.0%) and clarified with experts (75.9%). Conclusions: Although the response rate was low, a clear gap in knowledge, perceptions and practices on using MRTs were identified among prescribers who responded. Interventions are needed to improve the knowledge, perceptions, and practices on using MRTs among prescribers.


2015 ◽  
Vol 10 (2) ◽  
pp. 103-113
Author(s):  
Ewa Hajduk-Kasprowicz ◽  
Lech Nieżurawski

The paper discusses the problems of fading and ending of business relationships in the sphere of professional services i.e. the phase of a relationship dissolution resulting from a client's or a firm's decision to end it. This phase includes, among others, determining the causes of the relationship dissolution and drawing conclusions for the future in order to prevent losing the most lucrative clients. Both in theory and in practice, relationship ending is perceived as something stretched in time i.e. consisting of numerous stages and influenced by numerous factors and events.The aim of the present paper is an analysis of the modern literature on the causes and mechanisms of business relationships termination in the sphere of professional services as well as indicating some possibilities of a more effective and efficient management of these relations. 


Sign in / Sign up

Export Citation Format

Share Document