首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
4.
The rate of digital disruption is escalating and placing increasing pressure on organisations to adopt emerging technologies in order to improve their productivity and bottom-lines. Unfortunately, however, many organisations are often being seduced by the purported benefits of disruptive technologies often based on embellished or even falsified claims. This is particularly true in construction, where organisations are being required to embrace disruptive technologies (e.g. Building Information Modelling and Industry 4.0) to address performance and productivity issues. Unsubstantiated claims about expected benefits subvert the justification and benefits realisation process as the change management that is required is downplayed or ignored. It is, therefore, imperative that the business case as part of the process of evaluation, is based on evidence to enable the development of a change management and implementation strategy. In this paper, we present an overview of a longitudinal line of inquiry that sought to examine the benefits of disruptive technology, namely Systems Information Modelling (SIM). Our research revealed that more than a 90 % cost reduction to document electrical systems and a corresponding improvement in productivity was achieved. We suggest that engaging in the process of critical thinking, possessing a conscious awareness and healthy scepticism of technology places organisations in a position of control. As a consequence, organisations are better-positioned to understand the nature of technology and ‘how’ value can be generated from potential new ways of working.  相似文献   

5.
Modern public transportation companies often record large amounts of information. Privacy can be safeguarded by discarding nominal tickets, or introducing anonymization techniques. But is anonymity at all possible when everything is recorded? In this paper we discuss travel information management in the public transport scenario and we present a revealing case study (relative to the city of Cesena, Italy), showing that even anonymous 10-ride bus tickets may betray a user's privacy expectations. We also propose a number of recommendations for the design and management of public transport information systems, aimed at preserving the users’ privacy, while retaining the useful analysis features enabled by the e-ticketing technology.  相似文献   

6.
7.
8.
<正>The 2020 TKK Science Award in Technological Sciences went to CAS Member Prof. LUO Jianbin for his contribution to tribology, particularly in the field of nano-tribology and nanofabrication. Friction is the reason why automobiles can move when we press on the gas, and stop as we hit the brake. However, friction also accounts for, reportedly,  相似文献   

9.
10.
Several studies of Web server workloads have hypothesized that these workloads are self-similar. The explanation commonly advanced for this phenomenon is that the distribution of Web server requests may be heavy-tailed. However, there is another possible explanation: self-similarity can also arise from deterministic, chaotic processes. To our knowledge, this possibility has not previously been investigated, and so existing studies on Web workloads lack an adequate comparison against this alternative. We conduct an empirical study of workloads from two different Web sites: one public university, and one private company, using the largest datasets that have been described in the literature. Our study employs methods from nonlinear time series analysis to search for chaotic behavior in the web logs of these two sites. While we do find that the deterministic components (i.e. the well-known “weekend effect”) are significant components in these time series, we do not find evidence of chaotic behavior. Predictive modeling experiments contrasting heavy-tailed with deterministic models showed that both approaches were equally effective in modeling our datasets.  相似文献   

11.
12.
Can we trust robots? Responding to the literature on trust and e-trust, this paper asks if the question of trust is applicable to robots, discusses different approaches to trust, and analyses some preconditions for trust. In the course of the paper a phenomenological-social approach to trust is articulated, which provides a way of thinking about trust that puts less emphasis on individual choice and control than the contractarian-individualist approach. In addition, the argument is made that while robots are neither human nor mere tools, we have sufficient functional, agency-based, appearance-based, social-relational, and existential criteria left to evaluate trust in robots. It is also argued that such evaluations must be sensitive to cultural differences, which impact on how we interpret the criteria and how we think of trust in robots. Finally, it is suggested that when it comes to shaping conditions under which humans can trust robots, fine-tuning human expectations and robotic appearances is advisable.  相似文献   

13.
Currently, the central questions in the philosophical debate surrounding the ethics of automated warfare are (1) Is the development and use of autonomous lethal robotic systems for military purposes consistent with (existing) international laws of war and received just war theory?; and (2) does the creation and use of such machines improve the moral caliber of modern warfare? However, both of these approaches have significant problems, and thus we need to start exploring alternative approaches. In this paper, I ask whether autonomous robots ought to be programmed to be pacifists. The answer arrived at is “Yes”, if we decide to create autonomous robots, they ought to be pacifists. This is to say that robots ought not to be programmed to willingly and intentionally kill human beings, or, by extension, participate in or promote warfare, as something that predictably involves the killing of humans. Insofar as we are the ones that will be determining the content of the robot’s value system, then we ought to program robots to be pacifists, rather than ‘warists’. This is (in part) because we ought to be pacifists, and creating and programming machines to be “autonomous lethal robotic systems” directly violates this normative demand on us. There are no mitigating reasons to program lethal autonomous machines to contribute to or participate in warfare. Even if the use of autonomous lethal robotic systems could be consistent with received just war theory and the international laws of war, and even if their involvement could make warfare less inhumane in certain ways, these reasons do not compensate for the ubiquitous harms characteristic of modern warfare. In this paper, I provide four main reasons why autonomous robots ought to be pacifists, most of which do not depend on the truth of pacifism. The strong claim being argued for here is that automated warfare ought not to be pursued. The weaker claim being argued for here is that automated warfare ought not to be pursued, unless it is the most pacifist option available at the time, and other alternatives have been reasonably explored, and we are simultaneously promoting a (long term) pacifist agenda in (many) other ways. Thus, the more ambitious goal of this paper is to convince readers that automated warfare is something that we ought not to promote or pursue, while the more modest—and I suspect, more palatable—goal is to spark sustained critical discussion about the assumptions underlying the drive towards automated warfare, and to generate legitimate consideration of its pacifist alternatives,in theory, policy, and practice.  相似文献   

14.
Cyberchondria is conceptualized as excessive online searches for medical information, which is typically accompanied by feelings of emotional distress or anxiety. While previous studies in this nascent area have identified various psychological predictors of cyberchondria, a relative dearth of research has explored the role of different online information sources in its development. Informed by the stimulus-organism-response (SOR) model and the literature on cyberchondria, this study proposes a theoretical framework to explain why people develop cyberchondria when seeking medical information via different online sources. Based on a three-wave panel survey (N = 654), our findings suggest that health information seeking via online search engines increases online information overload (β = 0.11, p = .02), while health information seeking via social media platforms and health-specific websites increases online information trust (β = 0.13, p = .005; β = 0.25, p < .001). Additionally, online information overload is negatively related to online information trust (β = -0.39, p < .001). Subsequently, both online information overload and online information trust trigger cyberchondria (β = 0.73, p < .001; β = 0.15, p < .001). This study can contribute to the literature by expanding and deepening our understanding of cyberchondria developmental trajectory as well as emphasizing the pivotal role of online information sources in this complicated and dynamic process.  相似文献   

15.
This paper investigates the rationale for choosing franchising rather than independent activity, arguing that this choice may be motivated by knowledge and competence considerations. We consider the franchise chain as a specific learning organizational form and explore whether this structure handles knowledge and builds competences according to an idiosyncratic pattern. Concretely, we empirically identify differences in the architecture of competences of franchised vs independent shops in the car maintenance industry in France, and analyse some causes for those differences. Thanks to in depth interviews coupled with lexical and quantitative analyses we find that franchised shops do master specific competences. However, the distinctive competences held by franchisees do not necessarily reflect franchisors’ knowledge, and are not exclusively the consequences of a shared identity in the franchise chain. We conclude that the development of franchise cannot be explained by competence-related arguments only, knowledge and competences being managed in distinctive ways within different franchising networks.  相似文献   

16.
17.
18.
This paper investigates an application of a ball-screw inerter for mitigation of impact loadings. The problem of impact absorption is to provide a minimum reaction force that optimally decelerates and eventually stops an impacting object within the available absorber stroke. It significantly differs from vibration mitigation problems which are typical application of inerters. The paper demonstrates that the optimum absorption can be achieved by fully passive means. For known values of the object mass and inerter parameters, the obtained solution is independent of the impact velocity. The optimum passive absorption is achieved by employing a variable thread lead. As a result, two force components emerge, the typical inertance-related force and a damping-like term, and sum up to provide the optimum constant deceleration force. This result is relatively unique: conventional absorbers do not provide a constant force even with complex active control systems. Finally, an optimization problem is formulated to reduce the influence of process uncertainties (range of possible mass values, unknown friction). The results are verified and analyzed in a numerical example.  相似文献   

19.
In this paper, a critique will be developed and an alternative proposed to Luciano Floridi’s approach to Information Ethics (IE). IE is a macroethical theory that is to both serve as a foundation for computer ethics and to guide our overall moral attitude towards the world. The central claims of IE are that everything that exists can be described as an information object, and that all information objects, qua information objects, have intrinsic value and are therefore deserving of moral respect. In my critique of IE, I will argue that Floridi has presented no convincing arguments that everything that exists has some minimal amount of intrinsic value. I will argue, however, that his theory could be salvaged in large part if it were modified from a value-based into a respect-based theory, according to which many (but not all) inanimate things in the world deserve moral respect, not because of intrinsic value, but because of their (potential) extrinsic, instrumental or emotional value for persons.  相似文献   

20.
In spite of often compelling reasons for why people should seek information, they persistently engage in lower levels of it than might be expected, at times seeking no information at all. The idealized model reflecting dogged persistence, pursuing rational search strategies, until a high-quality answer is found is often assumed in the design of information systems. However, many people confronted with health problems engage in avoidance and denial, making a health care system dependent on proactivity problematic. This essay explores six conditions, the idealized model, avoidance, bewilderment, serendipity, ignorance is bliss, and indolence, that arise from low and high effort strategies when typed by good, contingent, and bad health outcomes. Since a substantial proportion of the population does not act in accordance with our assumptions, it may be time for policy makers, system designers and researchers to revisit their approaches to facilitating health-related information seeking.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号