scholarly journals Smart Products Enable Smart Regulations—Optimal Durability Requirements Facilitated by the IoT

2021 ◽  
Vol 13 (8) ◽  
pp. 4395
Author(s):  
Moritz-C. Schlegel ◽  
Claudia Koch ◽  
Mona Mirtsch ◽  
Andrea Harrer

The challenges and opportunities linked with IoT have been intensively discussed in recent years. The connectivity of things over their entire life cycle and the smart properties associated with it provide new functionalities and unprecedented availability of (usage) data. This offers huge opportunities for manufacturers, service providers, users, and also policymakers. The latter may impact policy areas such as the regulations on resource and materials efficiency under the Ecodesign Directive 2009/125/EC. With the general approach as it is practiced today, legal requirements are usually set for entire product groups without considering the products individually, including user behavior and environmental conditions. The increasing number of smart products and the growing availability of product data are sparking a discussion on whether these requirements could be more product and application-specific. This paper presents a method for calculating the economically and ecologically optimal durability of a product. It allows determining the point in time when a product should be replaced by combining consumer data with product design data. This novel approach could contribute to making product regulation more flexible and possibly more efficient. In this context, fundamental challenges associated with smart products in policymaking are also discussed.

2021 ◽  
Vol 13 (3) ◽  
pp. 63
Author(s):  
Maghsoud Morshedi ◽  
Josef Noll

Video conferencing services based on web real-time communication (WebRTC) protocol are growing in popularity among Internet users as multi-platform solutions enabling interactive communication from anywhere, especially during this pandemic era. Meanwhile, Internet service providers (ISPs) have deployed fiber links and customer premises equipment that operate according to recent 802.11ac/ax standards and promise users the ability to establish uninterrupted video conferencing calls with ultra-high-definition video and audio quality. However, the best-effort nature of 802.11 networks and the high variability of wireless medium conditions hinder users experiencing uninterrupted high-quality video conferencing. This paper presents a novel approach to estimate the perceived quality of service (PQoS) of video conferencing using only 802.11-specific network performance parameters collected from Wi-Fi access points (APs) on customer premises. This study produced datasets comprising 802.11-specific network performance parameters collected from off-the-shelf Wi-Fi APs operating at 802.11g/n/ac/ax standards on both 2.4 and 5 GHz frequency bands to train machine learning algorithms. In this way, we achieved classification accuracies of 92–98% in estimating the level of PQoS of video conferencing services on various Wi-Fi networks. To efficiently troubleshoot wireless issues, we further analyzed the machine learning model to correlate features in the model with the root cause of quality degradation. Thus, ISPs can utilize the approach presented in this study to provide predictable and measurable wireless quality by implementing a non-intrusive quality monitoring approach in the form of edge computing that preserves customers’ privacy while reducing the operational costs of monitoring and data analytics.


Author(s):  
Martin Hardwick ◽  
Blair R. Downie

Abstract Concurrent engineering seeks to reduce the length of the design life cycle by allowing multiple engineers to work on a design concurrently using their different design tools. A major stumbling block in achieving this goal is that most design tools use different file formats. Emerging standards such as STEP/PDES/EXPRESS reduce this barrier, but conformance to standards is not enough. One reason design tools have different file formats is because each tool requires a different perspective or view of the design. Engineering databases must provide designers with the ability to define application specific views of design data, and the ability to propagate changes among those related views. In this paper, we examine how an object-oriented database system can support the definition of application views using a class hierarchy and multiple inheritance.


2021 ◽  
pp. 178359172110553
Author(s):  
Ishani Patharia ◽  
Anjana Pandey ◽  
Sanjay Gupta

Technological developments have a major impact on user behavior. The rapidly evolving communication system and technology have provided numerous choices for people. The ever-shifting changes in the generation of communication networks have posed challenges for mobile network service providers to attract and retain customers. This study aims to prioritize the determinants of the adoption of mobile network service providers using the unified theory of acceptance and use of technology (UTAUT-2). In this study, data were collected from 660 mobile phone users in Haryana, India. A fuzzy analytical hierarchy process (F-AHP) was applied to arrange the priority or rank the factors based on the significance of the factors in explaining the adoption of mobile network service providers. Results of the study reveal that efforts expectancy is the highest-ranked and prioritized factor for the adoption of mobile network service providers followed by performance expectancy and facilitating conditions. However, social influence emerged as the least important factor. The present study provides theoretical implications for future researchers by synthesizing and prioritizing the important factors affecting technology acceptance. The practical implications offer a clearer insight to marketers for developing focused pragmatic strategies to retain customer loyalty. The study has considered only UTAUT-2 model constructs and used the F-AHP technique. Other factors may be considered in future studies. Other priority analysis techniques can also be used such as ISM and MICMAC analysis for further study. The research has been conducted in Haryana, India, and therefore, it needs to be tested in other areas/countries for generalizability. JEL Classification: O1, O2, O4


2018 ◽  
Vol 36 (6) ◽  
pp. 1114-1134 ◽  
Author(s):  
Xiufeng Cheng ◽  
Jinqing Yang ◽  
Lixin Xia

PurposeThis paper aims to propose an extensible, service-oriented framework for context-aware data acquisition, description, interpretation and reasoning, which facilitates the development of mobile applications that provide a context-awareness service.Design/methodology/approachFirst, the authors propose the context data reasoning framework (CDRFM) for generating service-oriented contextual information. Then they used this framework to composite mobile sensor data into low-level contextual information. Finally, the authors exploited some high-level contextual information that can be inferred from the formatted low-level contextual information using particular inference rules.FindingsThe authors take “user behavior patterns” as an exemplary context information generation schema in their experimental study. The results reveal that the optimization of service can be guided by the implicit, high-level context information inside user behavior logs. They also prove the validity of the authors’ framework.Research limitations/implicationsFurther research will add more variety of sensor data. Furthermore, to validate the effectiveness of our framework, more reasoning rules need to be performed. Therefore, the authors may implement more algorithms in the framework to acquire more comprehensive context information.Practical implicationsCDRFM expands the context-awareness framework of previous research and unifies the procedures of acquiring, describing, modeling, reasoning and discovering implicit context information for mobile service providers.Social implicationsSupport the service-oriented context-awareness function in application design and related development in commercial mobile software industry.Originality/valueExtant researches on context awareness rarely considered the generation contextual information for service providers. The CDRFM can be used to generate valuable contextual information by implementing more reasoning rules.


2020 ◽  
Vol S.I. (1) ◽  
pp. 33-45
Author(s):  
Tsitsi Chirombe ◽  
◽  
Sharon Benza ◽  
Epiphania Munetsi ◽  
Herbert Zirima ◽  
...  

In response to the outbreak of COVID 19 cases in Zimbabwe, the government declared a twenty-one-day lockdown beginning the 30th of March 2020. This study sought to analyse the coping mechanisms that people adopted to survive the lockdown. Specifically, the study explored the social, psychological, religious and physical coping mechanisms adopted by Zimbabweans. A qualitative approach was taken in doing this study, specifically making use of the document analysis design. Data was then collected from a social media platform which is WhatsApp. Forty WhatsApp messages and status updates were analyzed in this research. The lockdown presented challenges and opportunities; some people were struggling to cope yet some saw this as an opportunity to do things that they had no time for. The study revealed that people resorted to WhatsApp groups to connect with workmates, friends, schoolmates and relatives. Most Zimbabweans resorted to indoor games with their family members, exercise, listening to music and gardening. With the restricted movement imposed as a result of lockdown, people had to engage in prayer and other religious activities in their homes. Students found the lockdown as a good opportunity to engage in research and also made use of platforms such as the Google Classroom to continue learning. The study recommends that Zimbabweans should follow government regulations in order to curb the spread of COVID 19 and similar pandemics in the future.


2021 ◽  
Vol 14 (1) ◽  
pp. 410-419
Author(s):  
Mohammed Jabardi ◽  
◽  
Asaad Hadi ◽  

One of the most popular social media platforms, Twitter is used by millions of people to share information, broadcast tweets, and follow other users. Twitter is an open application programming interface and thus vulnerable to attack from fake accounts, which are primarily created for advertisement and marketing, defamation of an individual, consumer data acquisition, increase fake blog or website traffic, share disinformation, online fraud, and control. Fake accounts are harmful to both users and service providers, and thus recognizing and filtering out such content on social media is essential. This study presents a new approach to detect fake Twitter accounts using ontology and Semantic Web Rule Language (SWRL) rules. SWRL rules-based reasoner is utilized under predefined rules to infer whether the profile is trust or fake. This approach achieves a high detection accuracy of 97%. Furthermore, ontology classifier is an interpretable model that offers straightforward and human-interpretable decision rules.


2003 ◽  
Vol 28 (3) ◽  
pp. 83-100 ◽  
Author(s):  
K V Kamath ◽  
S S Kohli ◽  
P S Shenoy ◽  
Ranjana Kumar ◽  
R M Nayak ◽  
...  

A distinguished panel of managing directors and chief executive officers of some of the well-known banks in the country responded to the theme on the challenges and opportunities faced by the Indian banking sector in the liberalized environment. The contributors addressed the following issues: Financial reforms with specific reference to Indian banking industry focusing on implications to the existing players, new entrants, multinationals, and consumer behaviour. New and emerging opportunities: consumer and commercial banking. Competition: players, intensity, market size, profitability, and growth. Responses to challenges with reference to restructuring, automation, product delivery, and process reengineering. Issues related to governance, regulation, and audit. Product engineering, product design, and product delivery. Consumer expectations, feedback, cross-selling, customer relationship management(CRM), market segmentation, marketing, branding, and new products introduction. HR related issues: VR5, compensation, education and training, empowerment, and career plan. Future scenario: Broad trends in the next five years and the expected position. E-banking and its importance. Salient features of the responses included: The Indian banking sector is at an exciting point in its evolution. The opportu- nities to enter new business and new markets and to deliver higher levels of customer service are immense. As the Indian banks position themselves as financial service providers, banking business is getting redefined. Technology is unsettling the earlier business processes and customer behaviour is undergoing change. These have enhanced the forces of competition. Competitive advantage can be achieved through harnessing the potentialavailable in the employees by creating a positive work culture and enlisting the support of all the employees to the organizational goals. Indian banks have adopted better operational strategies and upgraded their skills. They have withstood the initial challenges and have become more adaptive to the changing environment. In the complex and fast changing environment, the only sustainable competitive advantage for banks is to give the customer an optimum blend of technology and traditional service. Four trends are fundamentally altering the banking industry: consolidation, globalization of operations, development of new technologies, and universali- zation of banking.


2018 ◽  
Vol 21 (3) ◽  
pp. 353-374 ◽  
Author(s):  
Nilanjana Sinha ◽  
Himadri Roy Chaudhuri ◽  
Jie G. Fowler ◽  
Sitanath Mazumdar

PurposeThis paper aims to explore authenticity as a multidimensional construct from both consumer and service provider perspectives in the context of culturally themed restaurants in Kolkata, India.Design/methodology/approachUtilizing a phenomenological design, data have been collected through participant observation, photographs and semi-structured interviews in Bengali-themed restaurants over a two-year period.FindingsBy articulating the processes and dimensions that operate behind the narrative of authenticity, the findings display the interaction between market/cultural forces and the perception of authenticity. These reveal that authenticity embraces four major categories, namely, traditional, staged-form, postmodern and constructivist.Research limitations/implicationsThis study provides insights into the collective role of both consumers and service providers in mediating perceptions of authenticity. Theoretically, this study contributes to the literature by articulating four dimensions of authenticity.Practical implicationsPractically, this study assists marketers with insights into the balance of authenticity and the commoditization of culture.Originality/valueAs globalization weakens cultural boundaries and jeopardizes regional identities, there is a need for reassuring cultural continuity that upholds ethnic legacy for local consumers. Thus, this study provides theoretical and practical insights for both researchers and practitioners concerned about maintaining authenticity in a global marketplace.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Sheshadri Chatterjee ◽  
Ranjan Chaudhuri ◽  
Demetris Vrontis ◽  
Zahid Hussain

Purpose This study aims to empirically examine how consumer privacy concerns (CPC) impact smartphone usage for financial transactions. The study also investigates the moderating impact of regulations on this action. Design/methodology/approach With the inputs from literature and related privacy theories, a theoretical model was developed. The model was later empirically validated using the partial least squares structural equation modeling technique with 367 respondents from India. Findings The study finds that CPC significantly impacts on consumer behavior in using smartphones for financial transactions. The study also highlights that regulation has a moderating impact on consumer usage of smartphones for financial transactions. Research limitations/implications This study provides valuable inputs to smartphone service providers, practitioners, regulatory authorities and policymakers on appropriate and secure usage of smartphones by consumers, ensuring privacy protection while making financial transactions. Originality/value This study provides a unique model showing the antecedents of CPC to impact the behavioral reaction of smartphone users mediated through the ingredients of privacy calculus theory. Besides, this study analyzes the moderating effects of regulation on the use of smartphones for financial transactions. This is also a novel approach of this study.


Author(s):  
Lizette Solis-Cortes ◽  
Falu Rami

This chapter focuses on the impact of the COVID-19 pandemic, it's disproportionate impact on immigrants' careers and employment opportunities, and the dire need to address inequitable career development opportunities. COVID-19 has also highlighted the anti-immigrant sentiment and structural barriers that impact immigrant career experiences and outcomes. A second interrelated obstacle to immigrant career development paths are recent executive orders signed by Donald Trump in the United States against immigrants and refugees as well as global anti-immigrant and refugee policies such as Brexit and the Citizenship Amendment Act. Immigrant workers require advocacy, protection, and avenues to receive continued support during and post-pandemic. Resources for immigrant employers and employees including international resources, avenues for advocacy, and recommendations to service providers are discussed.


Sign in / Sign up

Export Citation Format

Share Document