Wallis has a chain of some 70 fashion shops in the UK and Europe, through which they sell clothes they manufacture themselves. Robin Happe joined Wallis some three years ago, and…
Abstract
Wallis has a chain of some 70 fashion shops in the UK and Europe, through which they sell clothes they manufacture themselves. Robin Happe joined Wallis some three years ago, and this paper outlines the methods which the company uses to furnish the data necessary for the reporting system around which merchandising procedures revolve. He describes how these methods have evolved over the years to keep pace with the general growth in the company's activities, using, currently, sophisticated data entry techniques. This paper was originally presented at the Information Studies conference ‘Data communications for retail management’, in London in March. Robin Happe is no longer with Wallis, having taken up a post in the West Indies.
The application of electronic data processing at point of sale has been one of the most impact‐full events on the retail scene in the western world. Many retailers are still…
Abstract
The application of electronic data processing at point of sale has been one of the most impact‐full events on the retail scene in the western world. Many retailers are still anxiously assessing the likely benefits — both soft and hard — while at the same time calculating the costs. Meanwhile they are watching with interest the progress of retail companies in America who, after initial setbacks and long delays, now seem to be experiencing positive advantages in POS developments. How much help have retailers had from the suppliers of POS equipment in guiding them through this dilemma? Not very much, asserts Gil Jones in this exclusive RDM feature. In particular he suggests that suppliers have not been sufficiently aware of the differing needs of retailers, and that there has been too little willingness to co‐operate with retailers in the development of systems on a co‐operative basis. But this feature is not to be taken simply as criticism; it is intended as constructive comment and even as a guide for suppliers in their future strategy. As Gil Jones writes — “The challenge … is immense, but the rewards are great.”
Grace Trundle, Leam A. Craig and Ian Stringer
The purpose of this paper is to explore the different clinical features of pathological demand avoidance (PDA) and antisocial personality disorder (ASPD) presented in the form of…
Abstract
Purpose
The purpose of this paper is to explore the different clinical features of pathological demand avoidance (PDA) and antisocial personality disorder (ASPD) presented in the form of a single case study. The study highlights the potential of misdiagnosis and conceptual confusions to practitioners in forensic settings between the two conditions when working with offenders with personality disorders.
Design/methodology/approach
A case formulation using the “five Ps” method based on the personal history of an incarcerated male is presented and the clinical similarities and differences between PDA and ASPD are delineated. These differences and similarities are evaluated and applied to offender management including intervention options.
Findings
There are considerable similarities between ASPD and PDA making the two conditions difficult to separate. Both diagnostic criteria identify childhood behavioural problems, aggression, destructiveness, conduct disorder (CD), manipulation and non-compliance as indications of the disorder. For example, the criteria for later adult ASPD are the presence of childhood antisocial behaviour and CD. However, these behaviours may also be suggestive of the attention deficit hyperactivity disorder and non-compliance that are part of PDA. Violent behaviours and aggression can also be perceived in a similar way. Misdiagnosis of PDA as ASPD reduces the efficiency of treatment programmes.
Originality/value
The implications of these findings could prove useful in the successful risk management of offenders with PDA. Given the similar behavioural characteristics between PDA and ASPD, the prevalence of PDA among offenders may be higher than observed. The aim of this study is to raise awareness of potential conceptual complications and clinical confusions between the two conditions with a view to aid offender management through case formulation. A large scale study into offenders with PDA would draw attention to the prevalence of the condition as well as its association with offending behaviour.
Details
Keywords
Megan Davis, Kerstin Dautenhahn, Stuart Powell and Chrystopher Nehaniv
This article presents practical guidelines for the design of interactive software for children with autism. Many existing software design techniques rely on social interaction and…
Abstract
This article presents practical guidelines for the design of interactive software for children with autism. Many existing software design techniques rely on social interaction and so are not appropriate for this group, and little practical guidance is available. The guidelines presented are based on research experiences during the development of an interactive software game called TouchStory, which was designed to promote an understanding of narrative structure while adapting to the learning needs of individual children with autism. Our results indicate that some children with autism were actively engaged in self‐directed, curiosity‐driven learning, and found TouchStory enjoyable, even after repeated exposures on as many as 20 occasions. The guidelines are not limited to the appearance and behaviour of the software system, and may be fundamental to the research questions asked and the approach adopted. They provide a useful basis for furthering our understanding of the provision of assistive technology for children with autism.
Details
Keywords
The purpose of this paper is to discuss the possible explanations for deficits in social understanding evident in individuals with autism spectrum disorder (ASD). A potential…
Abstract
Purpose
The purpose of this paper is to discuss the possible explanations for deficits in social understanding evident in individuals with autism spectrum disorder (ASD). A potential intervention technique is proposed that has not yet been examined in this population: viewing and drawing portraits. This portraiture-based intervention seeks to address some of the core issues set forth in each of the theories explaining impaired social functioning. Furthermore, this intervention is intended to specifically increase exposure to facial stimuli in a safe and controlled environment. Instructions about how to look closely at a social partner’s face and how to glean salient emotional information from the facial expression displayed can be developed through a focused exploration of drawing and viewing portraits. Current techniques such as eye tracking and fMRI are discussed in the context of this proposed intervention.
Design/methodology/approach
This paper reviews existing research about ASD and seeks to present a new proposal for an intervention using portraiture. First the paper discusses existing interventions and reviews the current research about potential causes/areas of deficiency in individuals on the spectrum. This paper subsequently proposes a new type of intervention and discusses the reasons underpinning its potential success in the context of existing research.
Findings
This was a proposed study so no empirical findings have been reported. However, observations of individuals on the spectrum engaging with artwork are discussed in this paper.
Originality/value
No other research or study has been proposed in current literature relating specifically to the use of portraits (looking at and creating) to help individuals with ASD.
Details
Keywords
Freya Rumball, Rachel Parker, Ailbhe Elizabeth Madigan, Francesca Happe and Debbie Spain
Autistic individuals are at increased risk of trauma exposure and post-traumatic stress disorder (PTSD). Diagnostic overshadowing, however, often results in PTSD symptoms being…
Abstract
Purpose
Autistic individuals are at increased risk of trauma exposure and post-traumatic stress disorder (PTSD). Diagnostic overshadowing, however, often results in PTSD symptoms being mislabelled as autistic traits. This study aims to develop professional consensus on the identification and assessment of co-occurring PTSD in autistic adults.
Design/methodology/approach
An online modified Delphi design was used to gather professionals’ perspectives on key aspects of the identification and assessment of PTSD in autistic adults. Data were gathered qualitatively in Round 1 and then synthesised using content analysis into a list of statements that were rated in Round 2. Statements reaching 60–79% consensus and additional suggestions were sent out for rating in Round 3. Consensus for the final statement list was set at 80% agreement.
Findings
Overall, 108 statements reached consensus. These form the basis of professional-informed recommendations to facilitate the identification and assessment of PTSD symptoms in autistic adults.
Practical implications
The final Delphi statements provide a framework to assist with the assessment and recognition of traumatic stress reactions in autistic adults presenting to mental health, diagnostic or social services.
Originality/value
To the best of the authors’ knowledge, this is the first study to explore the presentation and identification of PTSD in autistic adults (with and without intellectual disability), using a bottom-up approach informed by professional consensus.
Details
Keywords
Lantian Li and Bahareh Pahlevanzadeh
Cloud eases information processing, but it holds numerous risks, including hacking and confidentiality problems. It puts businesses at risk in terms of data security and…
Abstract
Purpose
Cloud eases information processing, but it holds numerous risks, including hacking and confidentiality problems. It puts businesses at risk in terms of data security and compliance. This paper aims to maximize the covered human resource (HR) vulnerabilities and minimize the security costs in the enterprise cloud using a fuzzy-based method and firefly optimization algorithm.
Design/methodology/approach
Cloud computing provides a platform to improve the quality and availability of IT resources. It changes the way people communicate and conduct their businesses. However, some security concerns continue to derail the expansion of cloud-based systems into all parts of human life. Enterprise cloud security is a vital component in ensuring the long-term stability of cloud technology by instilling trust. In this paper, a fuzzy-based method and firefly optimization algorithm are suggested for optimizing HR vulnerabilities while mitigating security expenses in organizational cloud environments. MATLAB is employed as a simulation tool to assess the efficiency of the suggested recommendation algorithm. The suggested approach is based on the firefly algorithm (FA) since it is swift and reduces randomization throughout the lookup for an optimal solution, resulting in improved performance.
Findings
The fuzzy-based method and FA unveil better performance than existing met heuristic algorithms. Using a simulation, all the results are verified. The study findings showed that this method could simulate complex and dynamic security problems in cloud services.
Practical implications
The findings may be utilized to assist the cloud provider or tenant of the cloud infrastructure system in taking appropriate risk mitigation steps.
Originality/value
Using a fuzzy-based method and FA to maximize the covered HR vulnerabilities and minimize the security costs in the enterprise cloud is the main novelty of this paper.
Sarah Talari, Kanmani Balaji and Alison Jane Stansfield
The diagnosis of autism in adults often involves the use of tools recommended by NICE guidance but which are validated in children. The purpose of the paper is to establish the…
Abstract
Purpose
The diagnosis of autism in adults often involves the use of tools recommended by NICE guidance but which are validated in children. The purpose of the paper is to establish the strength of the association between the Autism Diagnostic Interview-Revised (ADI-R) scores and the final clinical outcome in an all intellectual quotients adult autism diagnostic service and to establish if this in any way relates with gender and intellectual ability.
Design/methodology/approach
The sample includes referrals to Leeds Autism Diagnostic Service in 2015 that received a clinical outcome. Sensitivity, specificity and positive and negative predictive values were calculated to evaluate ADI-R and final clinical outcomes. Logistic regression model was used to predict the effect of the scores in all the domains of ADI-R and the two-way interactions with gender and intellectual ability.
Findings
ADI-R has a high sensitivity and low specificity and is useful to rule out the presence of autism, but if used alone, it can over diagnose. Restricted stereotyped behaviours are the strongest predictor for autism and suggests that the threshold should be increased to enhance its specificity.
Research limitations/implications
This is a single site study with small effect size, so results may not be replicable. It supports the combined use of ADI-R and Autism Diagnostic Observation Schedule and suggests increasing ADI-R cut-offs to increase the specificity.
Practical implications
The clinical team may consider piloting a modified ADI-R as suggested by the results.
Originality/value
To the authors’ knowledge this is the only study of ADI-R in an adult population of all intellectual abilities.
Details
Keywords
Gonzalo Lorenzo, Juan Antonio López-Núñez, Alejandro Lorenzo-Lledó and Jesús López-Belmonte
The aim of the study is to conduct a thematic review of assessment tools and types of activities in the application of robotics to autistic students during the period 1996–2021…
Abstract
Purpose
The aim of the study is to conduct a thematic review of assessment tools and types of activities in the application of robotics to autistic students during the period 1996–2021 using Web of Science and Scopus. The sample consisted of 119 documents.
Design/methodology/approach
Nowadays, emerging technologies have become increasingly prevalent across various fields of knowledge. In this regard, robotics is being increasingly applied in the educational environment. The characteristics of this tool are the ones that best suit the needs of autistic students.
Findings
Results reveal that 16.80% of the studies used automatic measurement systems, whilst 15.96% of the studies used user observation and recording techniques. As for the tasks, 37.80% were focussed on imitation tasks. Amongst the practical implications is the need to include tasks that could be developed collaboratively in the regular classroom.
Originality/value
With this research, it is intended to disseminate in the scientific community what are the characteristics that should have the interaction activities between a robot and autistic students. In addition, the type of tool needed to evaluate the improvements in the interaction is proposed.