Guy Daly, Annette Roebuck, Jennifer Dean, Fiona Goff, Martin Bollard and Clare Taylor
This article presents the findings of an evaluation of the impact on service users of a local authority's individual budgets pilot. The local authority has pursued an…
Abstract
This article presents the findings of an evaluation of the impact on service users of a local authority's individual budgets pilot. The local authority has pursued an outcomes‐focused approach to care planning. The research findings suggest that these service users and their families see individual budgets as a very positive development. Service users have been able to gain greater control over their lives, not least in that they are able to determine to a much greater extent how they have their needs met. This facilitates service users' general growth and development, such that they are able to engage more fully and on a more equal footing as part of their families and communities. However, there remain a number of challenges that need to be addressed if individual budgets, or personal budgets generally, are to be rolled out successfully across adult social and health care.
Details
Keywords
Craig Proctor-Parker and Riaan Stopforth
The purpose of the research has been the primary consideration and evaluation of a cost effective, reliable, robust and simple process of radio frequency identification…
Abstract
Purpose
The purpose of the research has been the primary consideration and evaluation of a cost effective, reliable, robust and simple process of radio frequency identification (RFID)-based stock control, asset management and monitoring of concrete safety bollards used in the road environment. Likewise, the consideration of the use of the same system and technology to other items in and around the general road infrastructure.
Design/methodology/approach
The research approach undertaken has been an evaluation of the use of currently available RFID technology, with a key emphasis on low cost, ease of use, reliability and convenience. Practical field exercises completed in considering the relevant RFID tags and readers and associated software and apps and necessary software integration and development have been undertaken. At the same time, evaluating the specific limits created in the specific environment is being applied. Of particular interest has been the use of a moving scan in a vehicle drive-through or pass-bye, type reading system. This has been determined to be viable and completely practical, drastically reducing the key issue of time-taken. Practical application of the system from idea to real life application has been undertaken. The integration of the use of the RFID tag and reader system with necessary and related software to database upload and storage has been established. The creation of an online facility to allow the appropriate use of the data and to include the convenient output of an asset report has been undertaken.
Findings
The findings have provided the necessary insight confirming the use of RFID technology as a simple yet reliable, cost effective and adaptable stock control, asset management and geo-locating system in the road environment. The use of such systems in this particular environment is in its infancy, and is perhaps novel and original in the specific aspect of using the system to stock control, manage and monitor road safety concrete bollards and other roadside objects in the road environment.
Originality/value
To establish if in fact, stock control geo-locating can be reliably undertaken with the use of RFID tags and readers in the specific road and road construction environment, particularly with the use of moving RFID reading of passive tags. To establish the minimum requirements of a field usable RFID tag and reader, specifically applicable to the concrete safety bollards, however to other roadside furniture. To identify the minimum requirements of a function, simple app to minimise general requirements of the overall stock control and monitoring of the RFID-tagged objects. To establish the possibility of reading the tag data, global positioning system (GPS) location and video imaging footage as a single operation function. To determine the basic parameters or limits of the GPS geo-locating, on the proposed products selected and overall system. To determine the current best practice in respect of reasonable accuracy and detail in relation to price considerations to a fully function stock control and monitoring system. To identify the minimum requirements of an online database to receive, house and provide ongoing access to and report on the data. To identify the key differences and benefits between traditional stock control and monitoring systems, against that of proposed RFID tag, read and geo-locating system.
Details
Keywords
In the mid-2000s, the operator of New York City’s mass transit network committed more than a half-billion dollars to military contractor Lockheed Martin for a security technology…
Abstract
In the mid-2000s, the operator of New York City’s mass transit network committed more than a half-billion dollars to military contractor Lockheed Martin for a security technology capable, in part, of inferring threats based on analysis of data streams, of developing response strategies, and taking automated action toward alerts and calamities in light of evolving circumstances. The project was a failure. This chapter explores the conceptualization and development of this technology – rooted in cybernetics – and compares its conceptual underpinnings with some situated problems of awareness, communication, coordination, and action in emergencies as they unfold in one of the busiest transport systems in the world, the New York subway. The author shows how the technology, with all the theatrical trappings of a “legitimate” security solution, was apparently conceived without a grounded understanding of actual use-cases, and the degree to which the complex interactions which give rise to subway emergency can be anticipated in – and therefore managed through – a technological system. As a case-study, the chapter illustrates the pitfalls of deploying technology against problems which are not well-defined in the first place, to the neglect of investments against much more fundamental problems – such as inadequate communication systems, and unstable relationships with emergency response agencies – which might offer guaranteed benefits, and indeed lay a firm groundwork for future deployment of more ambitious technology.
Details
Keywords
The concept of light-handed regulation, including light-handed approaches to the regulation of airport services, is discussed. The rationale for the economic regulation of airport…
Abstract
The concept of light-handed regulation, including light-handed approaches to the regulation of airport services, is discussed. The rationale for the economic regulation of airport services and the traditional approaches used for economic regulation of airport charges are summarized. The evolution of international practice of light-handed regulation is outlined, including the experience with minimal regulation across monopoly industries in New Zealand and the acceptance of “negotiated settlements” in utility industries in North America. General reasons for moving to light-handed regulation of airports include the disadvantages of the price cap approach in practice and the benefits of facilitating greater negotiation between airports and users. Comparisons are made between alternative approaches to light-handed regulation of airport services, including price and quality of service monitoring, information disclosure regulation and negotiate-arbitrate regulation, approaches that have been applied to airport services in Australia and New Zealand. The role and nature of the incentives under each approach are discussed. The chapter concludes that whether light-handed regulation provides a suitable alternative approach to direct regulation depends on the market circumstances and the design characteristics of the light-handed approach.
Details
Keywords
Although the threat of terrorist attacks is not a new phenomenon for hotels, limited literature exists on measures that hotels can take to prevent them or limit their damage. The…
Abstract
Purpose
Although the threat of terrorist attacks is not a new phenomenon for hotels, limited literature exists on measures that hotels can take to prevent them or limit their damage. The purpose of this paper is to propose a baseline strategy to address this threat.
Design/methodology/approach
Using the terrorist attack cycle and the security function models introduced in this paper, 19 hotel security experts, members of an international working group on terrorism, were tasked to reach consensus on a baseline anti‐terrorist strategy for a hotel. To reach this consensus, the study employed the Nominal Group Technique.
Findings
The study presents a six‐step baseline anti‐terrorism strategy and a series of measures and actions under each step. In the centre of this strategy lies the disruption of the terrorist attack cycle.
Research limitations/implications
There are limitations inherent to the Nominal Group Technique which may not allow the generalizability of the findings. However, every effort was made to ensure the reliability and validity of the study.
Practical implications
The study suggests a shift from physical protection alone to a more intelligence‐led approach. Counter‐surveillance, terrorist behavioral analysis, higher visibility of security measures, stronger relationships with local community leaders, collaborative relationships with emergency response agencies and strategic use of risk intelligence providers will have to take a higher place in the agendas of hotel security departments.
Originality/value
The paper presents, for the first time, two models that industry practitioners will find useful when designing security policies: the terrorist attack cycle and the security function model. Each component of the proposed strategy provides a starting point for the design of security strategies tailored on the security needs and budget of any hotel property.
Details
Keywords
Gazi Mahabubul Alam and Md. Abdur Rahman Forhad
This study examines whether education in developing countries directly impacts their foreign income from the top export sector.
Abstract
Purpose
This study examines whether education in developing countries directly impacts their foreign income from the top export sector.
Design/methodology/approach
As most developing countries follow developed nations to shape their development, this study assumes developing countries as education-follower and developed countries as education-leader countries. Considering selected countries from the South Asian Regional Cooperation (SAARC) and African countries as follower countries and Group of Seven (G7) as leader countries, this study employs Dumitrescu-Hurlin Granger non-causality tests.
Findings
This study finds that education-follower countries' achievements do not directly impact foreign earnings from their leading export sectors. However, findings also confirm that leader countries have a bidirectional causal relationship between tertiary education and earnings from high technology exports.
Originality/value
To the best of the authors' knowledge, this is the first study urging research-intensive education with comparative advantages in international trade. Using educational attainment on export earnings from the leading sector, findings support dependency theory in education is still existed.
Details
Keywords
John E. White, Matthew J. Gorton and Ian Chaston
The growing importance of small‐ and medium‐sized enterprises (SMEs) in high‐technology innovation and the importance of innovation in maintaining competitive advantage has been…
Abstract
The growing importance of small‐ and medium‐sized enterprises (SMEs) in high‐technology innovation and the importance of innovation in maintaining competitive advantage has been acknowledged. The possibilities of co‐operation between high‐technology SMEs as a mechanism for enhancing individual firm growth is considered. The current stock of empirical evidence on high‐technology SMEs is outlined and the fact that few small firms achieve substantial growth highlighted. The major barriers to growth which lie behind this outcome are considered. The possibilities of networking, in its various forms, are considered as a facilitating medium for aiding business growth, with particular attention paid to high intensity co‐operative arrangements. The need for heterogeneous skill possession is emphasized, and how environments comprising homogeneous core competencies make networking an inappropriate solution for business growth. The existing empirical data on SME networking is considered and the relative costs and benefits of membership tabulated on the basis of network type. This leads on to an analysis of how beneficial, long‐term arrangements between actors may not occur in the market because of short‐term risks associated with other party(ies) defecting, as can be modelled within a prisoner's dilemma game theory structure. The final section discusses the possible role for network brokers in lessening these risks and aiding the development of mutually beneficial, growth‐oriented relationships between high‐technology SMEs.