Publikacje
Filtry
wszystkich: 140
Katalog Publikacji
-
Usprawnienie procesu produkcyjnego groszku konserwowego w przedsiębiorstwie X.
PublikacjaW artykule zaprezentowano koncepcję usprawnienia w procesie przetwórstwa groszku konserwowego polegają na skróceniu czasu produkcji poprzez wprowadzenie nowej maszyny- depaletyzatora. Zainstalowanie depaletyzatora skróci czas realizacji produkcji o 20 minut a w zestawieniu dziennym pozwoli na zwiększenie produkcji nawet o 1 partię.
-
Logistyka składowania odpadów w procesie produkcyjnym statków typu offshore
PublikacjaW niniejszym artykule autor przedstawił najistotniejsze problemy dotyczące logistyki odpadów, z którymi na co dzień boryka się jedna z polskich stoczni, podczas produkcji statków typu offshore - wraz z możliwymi rozwiązaniami
-
Zastosowanie audytu wewnętrznego u operatorów produkcyjnych w zapobieganiu kryzysom-studium przypadku
PublikacjaGłównym tematem artykułu była analiza badań przeprowadzonych u producenta farb proszkowych przedsiębiorstwa X, w zakresie zastosowania audytu wewnętrznego, jako metody pozwalającej na zapobieganie pojawienia się kryzysu. Właściwa współpraca operatorów produkcyjnych z menedżerami ma kluczowe zna-czenie dla budowy właściwej pozycji audytu wewnętrznego w przedsiębiorstwie X. Brak należytej współpracy na etapie badań, przy braku...
-
Handel targowy jako faux pas
PublikacjaWspółcześnie występujący handel targowy w przestrzeni publicznej posiada dwoisty charakter, polegający na niejednoznacznej odpowiedzi na pytanie czy powinno się ingerować współczesną architekturę w organizację targowisk czy jarmarków. Może tego rodzaju wydarzenia stanowią pewnego rodzaju nostalgię za tą pierwotną żywiołową formą handlu, której już się nie odnajdzie w galeriach handlowych, hipermarketach, gdzie rzesze ludzi pracują...
-
e-Learning in Tourism Education
Publikacja -
The concept of improving warehouse management in the X production company
PublikacjaThe article aims at the presentation of a concept referring to the improvement of warehouse management in the X production plant. The authors suggest two solutions: using storage racks at the picking process site and warehouse automation. Ultimately, the authors of the article present their basic calculation of the costs, indicating the increase in efficiency after the implementation of the discussed...
-
Metrisability of managing of stream-systemic processes
PublikacjaTo achieve the planned goal, in order to properly describe the manufacturing system management, six process stream functions were introduced. Non-dimensional flows of these functions in time can be empirically defined during the manufacturing process. They are interpreted as non-dimensional expenses. Maximum values for these functions in properly-managed processes equal one. Also, a global management function was introduced, being...
-
Concept of managing quality in baking industry, in vector representation
PublikacjaThe author introduced an innovative metrisable method of describing a manufacturing process. The idea of vector structure of a manufacturing process allows to formulate quantitative relations between the activity of input streams, elements of product quality, and measurable effects of losses. The structure was basis for the formulation of the concept of the process of managing product quality in the baking industry in a vector...
-
Digital Innovations and Smart Solutions for Society And Economy: Pros and Cons
PublikacjaRecent developments in artificial intelligence (AI) may involve significant potential threats to personal data privacy, national security, and social and economic stability. AI-based solutions are often promoted as “intelligent” or “smart” because they are autonomous in optimizing various processes. Be-cause they can modify their behavior without human supervision by analyzing data from the environ-ment, AI-based systems may be...
-
The Waiter Game: Structure and Development of an Hospitality Training Game
Publikacja -
Digital Fashion Competences: A Longitudinal Study
Publikacja -
The Digital Birth of an African City
Publikacja -
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublikacjaThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures
PublikacjaIn the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...
-
Performance analysis of untraceability protocols for mobile agents using an adaptable framework
PublikacjaArtykuł przedstawia środowisko oceny wydajności protokołów ochrony przed tropieniem agentów mobilnych oraz wyniki analiz przeprowadzonych za jego pomocą. Chociaż środowisko projektowano i implementowano z myślą o ewaluacji zaproponowanych przez nas protokołów ochrony przed tropieniem, w trakcie badań okazało się, że może ono zostać również wykorzystane do badań całej klasy protokołów bezpieczeństwa dla agentów mobilnych. Chodzi...
-
HCI and the economics of user experience
PublikacjaRodział przezentuje możliwości rozwinięcia zakresu tradycyjnych badań HCI (Human-Computer Interaction) o zagadnienia ekonomiczne, związane z jakością usług on-line, postrzeganą przez użytkownika/klienta. Praca zawiera modele jakości usług on-line oparte na elementach marketingu relacji i na wykorzystaniu ekonomicznych determinant zachowań konsumenckich w usługach on-line. Rozdział prezentuje modele projektowania i rozwoju przykładowych...
-
The use of eLearning strategies among travel agents in the United Kingdom, India and New Zealand
Publikacja -
Metrisable assessment of the course of stream‑systemic processes in vector form in industry 4.0
PublikacjaThe goal of this paper is to present an innovative conception how to use metrisable vector structure of a manufacturing process, based on quantitative relations between the activity of input streams, features of the product, and effect of losses; all of which are excellent practical solution for Industry 4.0, and in turn intelligent factories. This solution can be a usefull way in the process of building sustainable organization....
-
Security information sharing for smart grids: Developing the right data model
PublikacjaThe smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...
-
Security Information Sharing for the Polish Power System
PublikacjaThe Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...
-
Travel agents and destination management organizations: eLearning as a strategy to train tourism trade partners.
PublikacjaThis article offers an overview of the existing online courses run by national destination management organizations (DMOs) in order to better equip travel agents and tour operators in the sales activities of the tourism destinations. These online courses represent one of the B2B offers by DMOs and an interesting opportunity for travel agents, who are trying to find their identity and competitive advantage within the context of...
-
What do hashtags afford in digital fashion communication? An exploratory study on Gucci-related hashtags on Twitter and Instagram.
PublikacjaBeing enmeshed in a digital environment, we daily produce internet-mediated texts – encompassing several different semiotic codes – accessible on a global scale. Posts on different networks usually contain hashtags, which can be understood as affordances or behavior opportunities. These affordances allow specific actions both from the part of the writer and the reader. They can also be “behavior triggers,” which invite certain...
-
Massive Open Online Courses: strategies and research areas
PublikacjaThe latest education revolution, the massive open online courses (MOOCs), is gaining momentum, accolades, and participation across industry and academia. These learning laboratory behemoths host and assess tens to hundreds of thousands of students in a single class, for free. Similar to their scope, MOOCs’ short- and long-term educational implications seem massive. Immediate MOOC educational outcomes vary widely from roaring successes...
-
UK travel agents’ evaluation of eLearning courses offered by destinations: an exploratory study.
PublikacjaThis study aims to develop an understanding of the use of e-learning courses created for travel agents by Destination Management Organizations (DMOs). It explores agents’ perceptions of such courses. The research examines the views of 304 UK-based travel agents using online survey and investigates whether age, sex, type of agency, work experience, and educational level have influence on e-learning uptake. The satisfaction of travel...
-
MAlSim - Mobile Agent Malware Simulator
PublikacjaOne of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...
-
Security Evaluation of IT Systems Underlying Critical Networked Infrastructures
PublikacjaCritical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...
-
eVisa’s impacts on travel and tourism: the case of Turkey.
Publikacjahe purpose of this study was to investigate eVisa applications. eVisa is a service that falls under eTourism, whose growing use can be attributed to its ability to simplify the process of obtaining a visa. The objectives of this study were twofold: to explore the eVisa experience of tourists who have previously visited Turkey by using the service and to analyse the perceptions of stakeholders who have contributed to eVisa.
-
Mapping of the Covid-19 Vaccine Uptake Determinants From Mining Twitter Data
PublikacjaOpinion polls on vaccine uptake clearly show that Covid-19 vaccine hesitancy is increasing worldwide. Thus, reaching herd immunity not only depends on the efficacy of the vaccine itself, but also on overcoming this hesitancy of uptake in the population. In this study, we revealed the determinants regarding vaccination directly from people’s opinions on Twitter, based on the framework of the 6As taxonomy. Covid-19 vaccine acceptance...
-
Approaching Secure Industrial Control Systems
PublikacjaThis study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...
-
Assessment of E-government inclusion policies toward seniors: A framework and case study
PublikacjaDigital exclusion of seniors covers both social and technical drivers that affect the magnitude of this phenomenon. It arises from the fear of technology, reduced manual and mental abilities, socio-economic status, and also the mismatch between the technological environment and the needs of the elderly. The consideration of the needs of seniors are mainly implemented through social policies while the provision of government services...
-
Fashion communication research: A way ahead
Publikacja -
Online representation of Switzerland as a tourism destination: An exploratory research on a Chinese microblogging platform
Publikacja -
Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment
PublikacjaThe smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...
-
Digital Public Service Innovation: Framework Proposal
PublikacjaThis paper proposes the Digital Public Service Innovation Framework that extends the "standard" provision of digital public services according to the emerging, enhanced, transactional and connected stages underpinning the United Nations Global e-Government Survey, with seven example "innovations" in digital public service delivery -- transparent, participatory, anticipatory, personalized, co-created, context-aware and context-smart....
-
A review of digital fashion research: before and beyond communication and marketing
Publikacja -
Digital Government and Administrative Burden Reduction
PublikacjaAdministrative burden represents the costs to businesses, citizens and the administration itself of complying with government regulations and procedures. The burden tends to increase with new forms of public governance that rely less on direct decisions and actions undertaken by traditional government bureaucracies, and more on government creating and regulating the environment for other, non-state actors to jointly address public...
-
Trust Case: justifying trust in an IT solution
PublikacjaW artykule prezentujemy podejście wykorzystane przy budowie dowodu zaufania (ang. trust case) do DRIVE, infrastruktury informatycznej wspomagającej dystrybucję i podawanie leków. Cele DRIVE obejmowały bezpieczniejszą i mniej kosztowną dystrybucję leków. Dowód zaufania reprezentuje argumentację przemawiającą za tym, że DRIVE jest godne zaufania. Składa się on z żądań (ang. claims) postulujących pewne związane z zaufaniem własności...
-
E-learning in tourism and hospitality: A map
PublikacjaThe impact of information and communication technologies (ICT) on tourism and hospitality industries has been widely recognized and investigated as a one of the major changes within the domains in the last decade: new ways of communicating with prospective tourists and new ways of purchasing products arisen are now part of the industries’ everyday life. Poor attention has been paid so far to the role played by new media in education...
-
Digital Fashion: A systematic literature review. A perspective on marketing and communication
Publikacja -
Universal and contextualized public services: Digital public service innovation framework
PublikacjaIn view of the rising social and economic inequalities, public service delivery should be both universal, i.e. independent of the recipients' social or economic status, and contextualized, i.e. able to compensate for different local needs and conditions. Reconciling both properties requires various forms of innovations, chief among them innovations in digital public services. Building upon the four-stage model underpinning the...