Willem D. Pieters and Raynitchka Tzoneva
This paper aims to focus on the implementation of the International Electrotechnical Commission (IEC) 61850–9-2 standard based process bus with merging units (MUs) and sampled…
Abstract
Purpose
This paper aims to focus on the implementation of the International Electrotechnical Commission (IEC) 61850–9-2 standard based process bus with merging units (MUs) and sampled values (SV) to improve the protection and control systems. The digital process interface is important to be included on the process bus level.
Design/methodology/approach
The IEC 61850–9-2 process bus standard is not extensively used in regard to SV when the IEC 61850 standard is implemented by power utilities. Many protection and control intelligent electronic devices (IEDs) are connected to a substation communication network, routers and switches using fibre-optic linked Ethernet. However, inductive current transformers (CTs) and voltage transformers (VTs) secondary circuits are still hardwired to the IEDs. The paper highlight issues with the copper wires for currents signals and how these issues can be eliminated by using the MUs and the SV protocol. The voltage regulator control IED of each transformer is required to regulate the voltage level of the secondary side bus bar it is connected to. All the regulating IEDs of parallel-connected transformers are required to communicate with each other to share information. They collectively control the bus bar voltage depending on the switching configuration of the parallel transformers.
Findings
It is shown that process bus information such as the high voltage switchgear status information of primary plant in the yard, can be used to improve the substation protection and control systems. The power transformer protection and voltage regulator control are focused on.
Research limitations/implications
The deliverables of the research work can be applied in: The Centre for Substation Automation and Energy Management systems of the Department of Electrical Engineering, power utilities and other establishments using power systems and digital substations in the electrical supply industry. The research work on the thesis led to the development of a laboratory test-bench where students can learn and understand the basics of the IEC 61850–9-2 SVs principles. The test-bench components such as the IEDs, real-time digital simulator, standalone MUs and Ethernet equipment can be used for future research applications. The test-bench can be used to demonstrate during course work for students at the University, the basics of digital substations using a process bus network with IEDs, MUs and Ethernet equipment.
Practical implications
The research work showed where lab equipment is getting outdated and future equipment will be required for research work in IEC 61850–9-2 process bus.
Originality/value
Power utilities can benefit from implementing the IEC 61850 part 9–2 of the standard and by using MUs and other process interface information in substations. A cost reduction in high voltage equipment, substation installation and commissioning costs and better performance of protection and control system can be achieved.
Details
Keywords
The following list is a first attempt to catalogue and describe systematically the British Museum's extensive holdings of early opera librettos and related plays. The great…
Abstract
The following list is a first attempt to catalogue and describe systematically the British Museum's extensive holdings of early opera librettos and related plays. The great importance of these unpretentious booklets as supplementary and, more often than not, even primary sources for the history and bibliography of dramatic music, besides or instead of the scores, was already clearly recognized in the eighteenth century by Dr. Burney and other scholars. But it is only since 1914, the year in which O. G. T. Sonneck's Library of Congress Catalogue of opera librettos printed before 1800 appeared, that their documentary value could to any greater extent be put to general use in international musicological research. A similar bibliography of the British Museum librettos, while naturally duplicating many Washington entries, would produce a great number of additional tides, not a few of them otherwise unrecorded; it would provide the musical scholar with the key to a collection unequalled elsewhere in Europe, which owing to the peculiar nature of the material is not easily accessible by means of the General Catalogue.
Simon Levinson, Pieter Willem Nel and Louise-Margaret Conlan
There is a gap in the literature regarding the experiences of newly qualified Clinical Psychologists (NQCPs) working within Child and Adolescent Mental Health Services (CAMHS) in…
Abstract
Purpose
There is a gap in the literature regarding the experiences of newly qualified Clinical Psychologists (NQCPs) working within Child and Adolescent Mental Health Services (CAMHS) in the National Health Service (NHS). This paper aims to explore three aspects of newly qualified Clinical Psychologists’ experiences: their transition and development; working in multi-disciplinary teams located in large organisations; and support and coping in the role.
Design/methodology/approach
Seven participants each engaged in one semi-structured interview, and an interpretative phenomenological analysis was conducted.
Findings
Three super-ordinate themes emerged from the analysis: A big jump, the transition from trainee to NQCP; The support of home comforts, old and new; and Acknowledging and desiring ongoing development.
Originality/value
Implications and recommendations for both Clinical Psychology training programmes and NHS employers are discussed, to support the development and wellbeing of this staff group, and in turn the clinical population they serve. These include gradually increasing caseloads on training, a staggered workload at the outset of the transition, and CAMHS teams ensuring appropriate supervision for NQCPs.
Details
Keywords
The chapter presents an analysis of the decision-making process of leaders on issues of nuclear armament and nuclear disarmament, through four case studies. The first, pertaining…
Abstract
The chapter presents an analysis of the decision-making process of leaders on issues of nuclear armament and nuclear disarmament, through four case studies. The first, pertaining armament, is South Africa, with a focus on Pieter Willem Botha, former prime minister and president of South Africa. The second deals with former Libyan President Muammar Gaddafi’s nuclear armament decision. The third case study investigates the decision of former president of South Africa, F. W. De Klerk, on nuclear disarmament. The fourth and final case study uncovers Colonel Muammar Gaddafi’s nuclear disarmament decision.
Using the Applied Decision Analysis (ADA) method historical decisions have been analyzed in this chapter for the purpose of identifying each leader’s ‘decision code’. Specifically, were these decisions based on rational calculations or were they influenced more by cognitive decision processes?
By revealing a ‘decision code’ using a reverse engineering of the decision processes, I conclude that the three leaders placed high importance on security and geopolitics. By analyzing different dimensions and processes that impacted their decision processes, it is evident that while armament decision utilizes the poliheuristic decision rule, disarmament decisions abide by rational calculations.
Details
Keywords
Noel Scott, Brent Moyle, Ana Cláudia Campos, Liubov Skavronskaya and Biqiang Liu
The purpose of this paper is to examine to what extent is the impact of Basel II adoption on bank business models in the emerging market of selected ASEAN member states.
Abstract
Purpose
The purpose of this paper is to examine to what extent is the impact of Basel II adoption on bank business models in the emerging market of selected ASEAN member states.
Design/methodology/approach
To evaluate the impact of the Basel II regulation on banking business models, a difference-in-differences estimation approach is used. This study defines bank business models using diversification index of a modified Herfindahl–Hirschman Index.
Findings
The findings suggest that the Basel II framework only affects banks’ income diversification, while there is no evidence that it leads to funding and asset diversification. Under the Basel II accord, banks have adjusted their business models by diversifying their sources of income to avoid the obligation for keeping more capital; in contrast, a less developed financial market structure and a dependency on customer deposits are creating difficulties for banks in diversifying their funding and asset structure.
Research limitations/implications
The banking sample are taken only from ASEAN countries.
Practical implications
The findings provide important implication on the regulatory perspective, which is the implementation of Basel II framework induces higher intensity for the use of non-interest income activities. Including in these activities are trading and derivatives. Accordingly, the financial authorities should take with care the use of trading and derivatives products in the banking industry which is already embedded in current Basel framework, the Basel III Accord.
Originality/value
The paper provides direct evidence on the impact of Basel II on bank business models in the emerging markets of ASEAN banking sectors.
Details
Keywords
Jan-Willem Bullee, Lorena Montoya, Marianne Junger and Pieter Hartel
When security managers choose to deploy a smart lock activation system, the number of units needed and their location needs to be established. This study aims to present the…
Abstract
Purpose
When security managers choose to deploy a smart lock activation system, the number of units needed and their location needs to be established. This study aims to present the results of a penetration test involving smart locks in the context of building security. The authors investigated how the amount of effort an employee has to invest in complying with a security policy (i.e. walk from the office to the smart key activator) influences vulnerability. In particular, the attractiveness of a no-effort alternative (i.e. someone else walking from your office to the key activators to perform a task on your behalf) was evaluated. The contribution of this study relates to showing how experimental psychology can be used to determine the cost-benefit analysis (CBA) of physical building security measures.
Design/methodology/approach
Twenty-seven different “offenders” visited the offices of 116 employees. Using a script, each offender introduced a problem, provided a solution and asked the employee to hand over their office key.
Findings
A total of 58.6 per cent of the employees handed over their keys to a stranger; no difference was found between female and male employees. The likelihood of handing over the keys for employees close to a key activator was similar to that of those who were further away.
Research limitations/implications
The results suggest that installing additional key activators is not conducive to reducing the building’s security vulnerability associated with the handing over of keys to strangers.
Originality/value
No research seems to have investigated the distribution of smart key activators in the context of a physical penetration test. This research highlights the need to raise awareness of social engineering and of the vulnerabilities introduced via smart locks (and other smart systems).
Details
Keywords
Pieter J.A. Nagel and Willem W. Cilliers
In recognising the need to research the conceptof customer satisfaction the study aims to developa strategic approach to measuring a customer′ssatisfaction with a particular…
Abstract
In recognising the need to research the concept of customer satisfaction the study aims to develop a strategic approach to measuring a customer′s satisfaction with a particular enterprise. The study is an attempt to (1) develop an overall concept of customer satisfaction; (2) provide a detailed relationship structure for implementation within a company; and (3) identify potential research areas. A basic premiss of the study is that the focus should be on maximising total product value to the customer; and then, second, that customer satisfaction of external customers is inter‐dependent on the satisfaction of internal customers. The framework of the research centres on a proposed model which integrates all aspects so as to maximise the potential of the organisation and all its subsystems to create and sustain satisfied customers. The approach begins with a conceptualisation phase in which the concept of customer satisfaction is explored. Attributes are then classified into services and this is then extended to integrate the internal customer into a total service model; applying gap‐analysis to this model. Enterprise satisfaction provides the basis for extending the total service model; positioning is applied to the customer satisfaction strategy; and operationalising of this strategy is proposed through an implementation model.
Details
Keywords
Jan-Willem Bullee, Lorena Montoya, Marianne Junger and Pieter Hartel
The purpose of this study is to explore how the opening phrase of a phishing email influences the action taken by the recipient.
Abstract
Purpose
The purpose of this study is to explore how the opening phrase of a phishing email influences the action taken by the recipient.
Design/methodology/approach
Two types of phishing emails were sent to 593 employees, who were asked to provide personally identifiable information (PII). A personalised spear phishing email opening was randomly used in half of the emails.
Findings
Nineteen per cent of the employees provided their PII in a general phishing email, compared to 29 per cent in the spear phishing condition. Employees having a high power distance cultural background were more likely to provide their PII, compared to those with a low one. There was no effect of age on providing the PII requested when the recipient’s years of service within the organisation is taken into account.
Practical implications
This research shows that success is higher when the opening sentence of a phishing email is personalised. The resulting model explains victimisation by phishing emails well, and it would allow practitioners to focus awareness campaigns to maximise their effect.
Originality/value
The innovative aspect relates to explaining spear phishing using four socio-demographic variables.