KEITH POTTS and MIKE WALL
The commissioning of building services is very much the ‘Cinderella’ activity in the construction cycle, many complaints are heard but few praises sung. This paper examines the…
Abstract
The commissioning of building services is very much the ‘Cinderella’ activity in the construction cycle, many complaints are heard but few praises sung. This paper examines the current process of commissioning building services within the traditional procurement route. A literature review is presented followed by the results of a two‐stage structured survey from a broad spectrum of participants. A best practice flow chart for managing the commissioning process is presented, tested and confirmed, identifying an auditable chain of responsibilities in the commissioning process. Key conclusions include the need to recognize that the commissioning process requires planning and managing from the earliest possible stage; the need to appoint a commissioning manager — preferable someone in‐house, or a member of the design team; the need for better end‐user documentation and training; the requirement for a more formalized approach and the requirement for clarification on the terms of engagement for the services designer.
Details
Keywords
Robert Stevenson, Keith Potts and Loraine Houlton
Joint ventures in property development can bring considerable benefitsto the parties. For example, in a joint venture involving a localauthority the authority will be able to play…
Abstract
Joint ventures in property development can bring considerable benefits to the parties. For example, in a joint venture involving a local authority the authority will be able to play a positive role in urban regeneration while the developer will gain credibility and hopefully obtain a smoother planning process. Examines the strengths and weaknesses of the three classic joint venture arrangements: joint venture companies; partnerships; and “contractual” joint ventures.
Details
Keywords
Melissa G. Keith, Peter D. Harms and Alexander C. Long
Despite widespread interest in the gig economy, academic research on the topic has lagged behind. The present chapter applies organizational theory and research to compose a…
Abstract
Despite widespread interest in the gig economy, academic research on the topic has lagged behind. The present chapter applies organizational theory and research to compose a working model for understanding participation in the gig economy and how gig work may impact worker health and well-being. Drawing from past research this chapter defines the gig economy in all its diversity and advances a framework for understanding why individuals enter into gig economy. Next, the authors discuss how various characteristics of the gig economy and gig workers can be understood as both demands and resources that influence how gig work is likely to be experienced by the individual. To understand how these characteristics are likely to influence worker health and well-being, we draw from past research on alternative work arrangements and entrepreneurship, as well as the limited extant research on the gig economy. Finally, a research agenda is proposed to spur much needed research on the gig economy and its workers.
Details
Keywords
Bhaveer Bhana and Stephen Vincent Flowerday
The average employee spends a total of 18.6 h every two months on password-related activities, including password retries and resets. The problem is caused by the user forgetting…
Abstract
Purpose
The average employee spends a total of 18.6 h every two months on password-related activities, including password retries and resets. The problem is caused by the user forgetting or mistyping the password (usually because of character switching). The source of this issue is that while a password containing combinations of lowercase characters, uppercase characters, digits and special characters (LUDS) offers a reasonable level of security, it is complex to type and/or memorise, which prolongs the user authentication process. This results in much time being spent for no benefit (as perceived by users), as the user authentication process is merely a prerequisite for whatever a user intends to accomplish. This study aims to address this issue, passphrases that exclude the LUDS guidelines are proposed.
Design/methodology/approach
To discover constructs that create security and to investigate usability concerns relating to the memory and typing issues concerning passphrases, this study was guided by three theories as follows: Shannon’s entropy theory was used to assess security, chunking theory to analyse memory issues and the keystroke level model to assess typing issues. These three constructs were then evaluated against passwords and passphrases to determine whether passphrases better address the security and usability issues related to text-based user authentication. A content analysis was performed to identify common password compositions currently used. A login assessment experiment was used to collect data on user authentication and user – system interaction with passwords and passphrases in line with the constructs that have an impact on user authentication issues related to security, memory and typing. User–system interaction data was collected from a purposeful sample size of 112 participants, logging in at least once a day for 10 days. An expert review, which comprised usability and security experts with specific years of industry and/or academic experience, was also used to validate results and conclusions. All the experts were given questions and content to ensure sufficient context was provided and relevant feedback was obtained. A pilot study involving 10 participants (experts in security and/or usability) was performed on the login assessment website and the content was given to the experts beforehand. Both the website and the expert review content was refined after feedback was received from the pilot study.
Findings
It was concluded that, overall, passphrases better support the user during the user authentication process in terms of security, memory issues and typing issues.
Originality/value
This research aims at promoting the use of a specific type of passphrase instead of complex passwords. Three core aspects need to be assessed in conjunction with each other (security, memorisation and typing) to determine whether user-friendly passphrases can support user authentication better than passwords.
Details
Keywords
Compiled by K.G.B. Bakewell covering the following journals published by MCB University Press: Facilities Volumes 8‐18; Journal of Property Investment & Finance Volumes 8‐18;…
Abstract
Compiled by K.G.B. Bakewell covering the following journals published by MCB University Press: Facilities Volumes 8‐18; Journal of Property Investment & Finance Volumes 8‐18; Property Management Volumes 8‐18; Structural Survey Volumes 8‐18.
Compiled by K.G.B. Bakewell covering the following journals published by MCB University Press: Facilities Volumes 8‐17; Journal of Property Investment & Finance Volumes 8‐17;…
Abstract
Compiled by K.G.B. Bakewell covering the following journals published by MCB University Press: Facilities Volumes 8‐17; Journal of Property Investment & Finance Volumes 8‐17; Property Management Volumes 8‐17; Structural Survey Volumes 8‐17.
Index by subjects, compiled by K.G.B. Bakewell covering the following journals: Facilities Volumes 8‐18; Journal of Property Investment & Finance Volumes 8‐18; Property Management…
Abstract
Index by subjects, compiled by K.G.B. Bakewell covering the following journals: Facilities Volumes 8‐18; Journal of Property Investment & Finance Volumes 8‐18; Property Management Volumes 8‐18; Structural Survey Volumes 8‐18.