This paper deals with the development of participatory methods in visual management (VM) when investigating parts and system/s related to VM devices in organisational contexts. Four theoretical perspectives – sociocultural theory, boundary objects, diagrams, maps and models, and visual rhetoric – have been applied to gain an overall understanding of the participants’ collective investigation of the system/s. Managers and co-workers in five Lean-inspired organisations have used the method Multimodal Origami (MO) to design their VM devices, in this case the VM boards and associated meetings.
This article examines information source selection behavior among maintenance technicians and how this behavior might influence the design of technical information. For this entry, "maintenance technicians" are individuals who maintain machine equipment (e.g., generators or bearings) in industrial enterprises, and this process includes the troubleshooting of problems and the repairing of machine equipment. In this entry, the authors use a review of the literature on information source selection behavior to discuss core concepts within the field of source selection behavior. Three of the main concepts examined are "information," "information source," and "source preference criteria." These core concepts function as a frame of reference for discussing how maintenance technicians might select information sources to perform maintenance activities. The authors also use these concepts to review why certain sources are selected for use over others. The results tentatively suggest maintenance technicians prefer information sources that can be adapted to specific workplace contexts.
This mintrack explores the pressing issues surrounding the intersection of cybersecurity and government spheres of influence. Whether technical or policy, from information sharing to new analytical methods of detection of threats, this minitrack casts a wide net to cross disciplinary thinking to problems with far-reaching implications. The cybersecurity aspects of critical infrastructure systems has become a hot topic for countries all across the globe. Information Technology has become pervasive in all aspects of our lives and this includes elements referred to as critical infrastructures. The minitrack examines aspects associated with the security of information technology (IT) and operational technology (OT) used by governments and critical infrastructures and explores ways that IT can enhance the ability of governments to ensure the safety and security of its citizens. Governments have embraced IT to interface with citizens in a more efficient manner. Security issues have risen to the forefront as a result of data disclosures and identity theft incidents discussed in mainstream media. Other critical issues include intellectual property theft and criminal acts involving computers. Many foreign governments have more control over their infrastructure, but in the end, security is still an important topic that needs to be addressed. Information security is an area where policy has not kept up with technology, placing nations and their relations over this topic into uncharted territories. This year's submissions cover a broad spectrum of security topics illustrating just how wide the area is. Five papers were chosen from the submissions which included several international papers. We express our sincere appreciation to those authors that took the time to submit a paper for our consideration and our congratulations to those that were accepted. The first paper, presented in a half-session, is An Optimization Framework for Generalized Relevance Learning Vector Quantization with Application to Z-Wave Device Fingerprinting by Trevor Bihl, Michael Temple, and Kenneth Bauer which discusses improving Z-Wave device discrimination using RF-DNA Fingerprints. The second paper in the same session is Securing Birth Certificate Documents with DNA Profiles by Mark Tannian, Christina Schweikert, and Ying Liu. The paper discusses the benefits and potential for using DNA profiling as a means of birth certificate authentication. The second session starts off with State and Community Information Sharing and Analysis Organizations by Gregory White, Keith Harrison and discusses information sharing, the development of the Information Sharing and Analysis Organization program, and the need for state and community information sharing and analysis. The next paper Proper incentives for proper IT security management-A system dynamics approach by Jose J. Gonzalez and Denis Trcek argues that system dynamics models of security systems can improve the security management situation by increasing the awareness that misaligned incentives can backfir...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.