Fault detection in the software of control systems is a difficult task. In largely interconnected systems, not only the individual performance of one channel, but also its interaction with other components, must be considered. In this conceptual paper, we outline a new maintenance concept for the detection of software faults in control systems. The concept includes two approaches, morning gymnastics test and envelope analysis. The morning gymnastics test generates data for a baseline of the current operational abilities in contrast to the specified abilities and should be applied when feasible in continuous production systems. The test integrates historical and new sets of data to track degradation trends. Envelope analysis can be performed to detect operational anomalies and is based on subsequent deep analysis to distinguish software and hardware faults from each other. By using the envelope analysis it is possible to identify failures and disturbances affecting the control system. Thus, the proposed maintenance concept may facilitate detection and identification of potential failures in critical automated system.
In the context of situated elderly care this paper discusses the intertwined relationship between organizational security objectives, technology, and employees' security behavior. We use findings from a single case study to aid in our understanding of how managers sought to create a secure work environment by introducing behavioral security technology, and how employees appreciated the new security software in everyday routines. Theoretically the case study is informed by sociomateriality in that it employs the notion of technological affordances of behavioral security technology. Findings show that security technology material is an integral part of security management and security in use, and that both the technical actor and human actors contributed to cultivation of the information security practice in the elderly care center
Purpose: The purpose of this paper is to broaden the understanding about security behaviour by developing a security behavior typology based on the concepts of discipline and agility.
Design/methodology/approach: A case study was designed to analyze security behaviours in one public nursing centre. The inquiry was organized around the themes discipline and agility, culture,and security processes in order to get an in-depth understanding of the complex relationship between security management, referred to as discipline, and security in use, referred to as agility.
Findings: The paper shows that security behaviour can be shaped by discipline and agility and that both can exist collectively if organizations consider the constitutional and existential aspects of information security management.
Practical implications: This research makes a pivotal stand for the issue how security behaviours narrate a broad picture to enhance information security management. In particular, this will improve design of information security training and awareness programs.
Originality/value: This research is relevant to information security management in organizations, particularly as behavioural and cultural aspects are becoming increasingly significant for maintaining and also designing systemic information security management.
This article describes research in progress of a design approach for crisis management information systems. A qualitative study was designed to gather data from four municipalities in northern Sweden, which all have responsibility for crisis management in each local environment. The purpose with the article is to discuss broad but strongly related information issues to crisis management and from that suggest a socio-technical oriented approach for crisis management information systems design. The preliminary design approach suggests that a network of knowledge, IT management and information integration is a promising base for design in the area. Considering that responsible actors in crisis environments have great knowledge in crisis planning and operation indicate that such an environment can be understood as a network of knowledge that account for both the social and technical dimension during crises. Theories from IT management and information integration provide input to the technical dimension of the suggested design approach.
The purpose of this paper is to describe the development of a regional crisis competence centre in Sweden. The overall research approach utilizes action research methodology to support the development process. The overall development process is divided into three steps; early need finding, the organizational platform, and business development. This paper is devoted to the first phase - early need finding - which deals with the specific needs and demand of four municipality organizations and how these requirements can be converged into a organizational setting that correspond to national crisis management strategies as well as regional responsibilities in crisis management. The research approach is action based and the theoretical considerations to support progress in development activities are from the Actor Network Theory (ANT). The main conclusion from the research is that the formation of a crisis competence centre revolves around sharing competences, and compromising between internal and external objectives in the progress towards a common goal.
This publication ‘Process-SME Project – Exceeded Expectations’ introduces a Nordic project Process-SME, which main objective is to improve the competitiveness of SMEs whose customers are found within the process, mining, energy, oil, and gas industries. The project supports these SMEs by identifying their needs and potential opportunities, developing new business models, building European partnerships and applying for EU-level funding for project proposals on SMEs’ business behalf. Furthermore, the Process-SME project aims to develop SMEs’ products, services and other offerings.
As more features are added to the heavy duty construction equipment, its complexity increases and early fault detection of certain components becomes more challenging due to too many fault codes generated when a failure occurs. Hence, the need to complement the present onboard diagnostic methods with more sophisticated diagnostic methods for adequate condition monitoring of the heavy duty construction equipment in order to improve uptime. Major components of the driveline (such as the gearbox, torque converter, bearings and axles) are such components. Failure of these major components of the driveline may results in the machine standing still until a repair is scheduled. In this paper, vibration based condition monitoring methods are presented with the purpose to provide a diagnostic framework possible to implement onboard for monitoring of critical driveline parts in order to reduce service cost and improve uptime. For the development of this diagnostic framework, sensor data from the gearbox, torque converter, bearings and axles are considered. Further, the feature extraction of the data collected has been carried out using adequate signal processing methods, which includes, Adaptive Line Enhancer, Order Power Spectrum respectively. In addition, Bayesian learning was utilized for adaptively learning of the extracted features for deviation detection. Bayesian learning is a powerful prediction method as it combines the prior information with knowlegde measured to make update. The results indicate that the vibration properties of the gearbox, torque converter, bearings and axle are relevant for early fault detection of the driveline. Furthermore, vibration provide information about the internal features of these components for detecting deviations from normal behavior.
In this way, the developed methods may be implemented onboard for the continuous monitoring of these critical driveline parts of the heavy duty construction equipment so that if their health starts to degrade a service and/or repair may be scheduled well in advance of a potential failure and in that way the downtime of a machine may be reduced and costly replacements and repairs avoided.
With increasing complexities in the heavy duty construction equipment, early fault detection of certain components in the machine becomes more and more challenging due to too many fault code generated when a failure occurs. The axle is one of such component. The axle transfers driving torque from the transmission to the wheels and axle failure may result in costly downtime of construction equipment. To reduce service cost and to improve uptime, adequate condition monitoring based on sensor data from the axle is considered. Vibration is measured on the axle. Analysis of the data has been carried out using adequate signal processing methods. The results indicate that the vibration properties of the axle are relevant for early fault detection of the axle. In this way; the health of the axle may be continuously monitored on-board using the vibration information and if the axle health starts to degrade a service and/or repair may be scheduled well in advance of a potential axle failure and in that way the downtime of a machine may be reduced.
In order to reduce costly downtime, adequate condition monitoring of the automatic transmission components in heavy duty construction equipment is necessary. The transmission in such equipment enables to change the gear ratio automatically. Further, the bearings in an automatic transmission provide low friction support to its rotating parts and act as an interface separating stationary from rotating components. Wear or other bearing faults may lead to an increase in energy consumption as well as failure of other related components in the automatic transmission, and thus costly downtime. In this study, different sensor data (particularly vibration) was collected on the automatic transmission during controlled test cycles in an automatic transmission test rig to enable adequate condition monitoring.
An analysis of the measured vibration data was carried out using signal processing methods. The results indicate that predictive maintenance information related to the automatic transmission bearings may be extracted from vibrations measured on an automatic transmission. This information may be used for early fault detection, thus improving uptime and availability of heavy duty construction equipment.
Improving uptime is paramount in the heavy duty construction equipment business. Failure ofcritical components in the heavy duty machine may lead to unnecessary stops and expensive downtime. The torque converter, a complex omponent of the driveline, transmits and multiplies torque from the engine to the gearbox, and its failure may not only lead to the machine standing still but may also lead to damage of other parts of the automatic transmission. For adequate condition monitoring of the torque converter, different sensor data are measured on a construction equipment machine during controlled driving sessions. Vibration has been measured on the torque converter. An initial investigation of the vibration measured on the torque converter has been carried out to identify its vibration properties in order to enable its health monitoring to prevent failure. Initial signal analysis of the data have been carried out using Order Power Spectrum and Order Modulation Spectrum methods. The results indicate that the torque converter vibration properties contain information relevant for early fault detection.
In order to reduce unnecessary stops and expensive downtime originating from clutch failure of construction equipment machines; adequate real time sensor data measured on the machinein combination with feature extraction and classification methods may be utilized.
This paper, based on a study at Volvo Construction Equipment,presents a framework with feature extraction methods and an anomaly detection module combined with Case-Based Reasoning (CBR) for on-board clutch slippage detection and diagnosis in a heavy duty equipment. The feature extraction methods used are Moving Average Square Value Filtering (MASVF) and a measure of the fourth order statistical properties of the signals implemented as continuous queries over data streams. The anomaly detection module has two components,the Gaussian Mixture Model (GMM) and the Logistics Regression classifier. CBR is a learning approach that classifies faults by creating a new solution for a new fault case from the solution of the previous fault cases. Through use of a data stream management system and continuous queries (CQs), the anomaly detection module continuously waits for a clutch slippage event detected by the feature extraction methods, the query returns a set of features which activates the anomaly detection module. The first component of the anomaly detection module trains a GMM to extracted features while the second component uses a Logistic Regression classifier for classifying normal and anomalous data. When an anomalyis detected, the Case-Based diagnosis module is activated for fault severity estimation.
The paper addresses machine learning methods, utilizing data from industrial control systems, that are suitable for detecting anomalies in the press-hardening process of automotive components. The paper is based on a survey of methods for anomaly detection in various applications. Suitable methods for the press-hardening process are implemented and evaluated. The result shows that it is possible to implement machine learning for anomaly detection by non-machine learning experts utilizing readily available programming libraries/APIs. The three evaluated methods for anomaly detection in the press-hardening process all perform well, with the autoencoder neural network scoring highest in the evaluation.
The paper introduces a tested and verified model for value-based selling, based on an action research approach spanning multiple business models during five cases in a sequence at different corporations. The sales model has been verified to support sales of products, services, solutions and Functional Products, enabling corporations to add additional and more complex business models by being able to quantify and visualize the perceived customer value created/captured. Thus, the sales model can further facilitate a transition from sales of products or services towards sales of offers, based on further complex business models, where customer values created increasingly originate from intangibles that are part of the offer. Such a transition may be necessary for corporations acting on global markets to achieve sustainable competiveness and profitability
Purpose - The purpose of this paper is to present a model to explain a business contingency process to senior management and other employees in organizations during educations or trainings on business continuity planning.Design/methodology/approach - The model has been developed, evaluated/tested in three comprehensive cases. Senior management, IT managers and employees in the three case organizations have participated in this action research effort during the development, implementations, educations or training on business continuity plans and planning. Findings - The model has been evaluated/tested, and is suitable for explaining what may characterize a business contingency process to senior managements and employees in both public and private sector organizations.Practical implications - The model can be used for explaining the issues to senior managements and form the fundament to build a business continuity plan upon, which is part of an organization’s IT- and information security program. It may also be used to explain what a business contingency process is to other staff in an organization. The model can also be used to model parts of business continuity planning, as a basis for training planning, and as support in different training contexts to achieve individual and organizational learning on business continuity plans and activities.Originality/value - The model is graphically visualized and the concept can be adapted to any organization.
The paper provides a comprehensive overview on which through-life cycle aspects of Functional Products (FP) are relevant to consider during development and later operation until end of life. The aspects, which are already proposed as part of the current definition of FP, are corroborated, and the additional new aspects found are proposed to extend the current definition of FP. An additional eight new aspects have been found, spanning, e.g., asset management, business model and research collaboration. Some of these new aspects may be relevant for the concepts of servitisation, through-life engineering services, product-service systems and industrial product-service systems as well. The practical implications of the results are that FP customers can improve their reasoning and requirement engineering together with FP providers. FP providers can, on the other hand, use the results to improve their long-term planning and activities from initial development activities (i.e. business case and requirement engineering) to operation at customer sites. The theoretical implications are that the additional new aspects and the proposed extended FP definition provide a foundation for researchers as well as indicating aspects/areas to further explore.
The paper, based on an empirical study involving five companies, concerns software-related measures that are planned and taken by providers together with their customers to improve the availability of Functional Products (FP) or similar offers. The manufacturing industry is showing an increasing interest in adding offerings based on additionally complex business models, as opposed to merely offering products and services. This supports innovation and helps companies to stay competitive and profitable. Considerable focus is placed on performance- or result-based business models. Functional Products (FP) is one such business model, where the provider offers a function to customers at an agreed-upon level of availability, productivity or efficiency. FP comprise four main constituents: hardware, software, service-support system and management of operation, which together deliver value to customers on a long-term basis. The paper highlights nine software-related availability measures planned and taken by manufacturing companies and proposes additional potential software-related availability measures.
Based on an empirical study including 3 companies, the paper addresses, problems and issues that have been encountered when introducing, and later using, Functional Products in production systems. The purpose of a Functional Product is to provide a function to customers with a specified or agreed-upon level of availability or productivity. Both operational and management-level problems and issues have been investigated. The study focuses on the customer side, involving both manufacturing and process industry companies. A set of problems and issues has been identified. The problems and issues found during the literature review have been largely corroborated, and the new problems and issues found are highlighted.
The work in this thesis is based on an interest for strategic information security, and in particular business continuity planning, in combination with own experiences from strategic management of corporations. Information security policy- and education, practice and awareness issues have also been part of my focus. Strategic information security is the part of information security that senior managements (top managements) should own and care for, like for any other strategic area in an organization. One problem is that this is often not the case as the senior management attention and awareness is focused on other areas instead. The work has mainly addressed explanatory models and methodology to explain what strategic information security including business continuity planning is to senior management teams and a training concept. It has also high-lighted challenges from current and future technology, and terminology problems affecting business continuity planning in a direct or indirect way. The purpose of the thesis was broken down into six objectives matching identified knowledge gaps. These resulted in the research question "How to improve the senior management own and care process for strategic information security, and in particular business continuity planning?" The results from the empirical studies are two models and one methodology to be used when targeting strategic information security issues like modeling and implementations of business continuity planning, security policies and security education, practice and awareness during the own and care process. A further result is a training concept for organizational crisis management. In addition, the results also indicate challenges that need to be addressed during work with security policies and business continuity planning. The thesis further contributes with a framework for business continuity planning guiding how the models and methodology, together with the training concept and challenges should be used together in the own and care process, to resolve problems and achieve organizational change. The contribution is of a general nature and is suitable to use in both private and public sector organizations.
This paper discusses IT- and information security and legal challenges for wearable computing encountered during the wearIT@work project. The following novel ideas are introduced in this paper: authorization by proximity using dynamic context information to enable transfer of authorization from one party to another, using dynamic context information to enable transfer of authorization from one party to another,a wearable pairing mechanism to use devices on other wearables, and a more intelligent management of dynamic IT-security policies to reduce computational overhead on wearable devices having limited to reduce computational overhead on wearable devices having limited capabilities. The last idea includes the importance of having a dynamic security baseline adapted to wearables to maintain the integrity and confidentiality of the body network as well as the privacy of the wearers´ personal and biometric information.
This paper discusses IT- and information security challenges for wearable computing encountered during the WearIT@work project. The following novel ideas are introduced in this paper: authorization by proximity using dynamic context information to enable transfer of authorization from one party to another, using dynamic context information to enable transfer of authorization from one party to another, a wearable pairing mechanism to use devices on other wearables, and a more intelligent management of dynamic IT-security policies to reduce computational overhead on wearable devices having limited to reduce computational overhead on wearable devices having limited capabilities. The last idea includes the importance of having a dynamic security baseline adapted to wearables to maintain the integrity and confidentiality of the body network as well as the privacy of the wearers´ personal and biometric information.
The paper, which is based on a literature review, concerns which potential through-lifecycle aspects are relevant to consider for Functional Products during development and later operation until end-of-life. The aspects which are already proposed as part of the current definition of Functional Products are corroborated. Additionally, the additional new potential aspects found should be further verified prior to being proposed to extend the Functional Products definition—and in particular the service-support system and management of operation constituents. An additional seven potential new aspects have been found, whereof some may be relevant for the concepts of Through-life Engineering Services, Product-Service Systems and Industrial Product-Service Systems as well.
The paper concerns which sustainability-oriented Functional Products (FP) customer values companies, who also provide products and services, consider as important to communicate to customers when offering or planning to offer FP. Currently, the manufacturing industry is showing increasing interest in adding offerings based on additionally complex business models as opposed to merely offering products and services. This is considered necessary if companies are to continue to be able to innovate and stay competitive and profitable in global competition. A considerable focus is directed towards performance- or result-based business models. FP is one such business model, where the provider offers a function to customers at an agreed-upon level of availability, productivity or efficiency. FP comprise the following four main constituents: hardware, software, service support system and management of operation, which together deliver value to customers on a long-term basis. The paper proposes a set of FP sustainability-oriented customer values which are categorized according to the sustainability aspects: economic, ecological and societal, and the set is further analyzed from a regulatory and legal perspective
The paper proposes a Functional Products (FP) lifecycle viewed from economic, ecologic and societal perspectives. The overall FP lifecycle is further discussed from the viewpoint of its technical and economic lifecycles. The paper suggests that the overall FP lifecycle is governed by a sustainable win-win situation between the provider and customer sides, and thus that there needs to be a balance regarding the perceived value for both parties
The paper provides a further verification of the Functional Products (FP) technical lifecycle and additional details regarding its four sub-lifecycles concerning: hardware, software, service-support system and management of operation. Outlined, in a novel way, is how the four sub-lifecycles may be embodied in order to manage and keep the FP technical lifecycle running at an agreed-upon level of availability. The FP technical lifecycle is further analyzed from the viewpoint of its supporting role to the FP economic lifecycle, as well as compliance, regulatory and commercial aspects.
The paper addresses, based on an empirical study, what impact the use of recent complex business models, in particular, Functional Products, may have on production systems in terms of the explicit and tacit knowledge that is required. Requirements for new knowledge currently lacking or in the process of being acquired have been of specific interest for the study. The study focuses on the customer side, involving both manufacturing and process industry companies. A set of explicit and tacit knowledge aspects has been identified. The current set of knowledge aspects found during the literature review has largely been corroborated and the new specific knowledge identified is highlighted.
In a case study comprising two SMEs offering Industrial Product-Service Systems (IPS2) based on the industrial internet the paper addresses the current cybersecurity level of the two SMEs and the perceived need for added cybersecurity features. Cybersecurity is of crucial importance for most IPS2-offerings if they involve data communications, data collection and storage, and are also part of the customers’ critical processes (i.e., the core processes that always need to work with a high level of availability). The case study reveals that both IPS2-offerings have a basic level of core security spanning IoT-devices, IoT-networks, cloud services and users as well as administrators. Further, of interest is that the SMEs would like to add security cloud services with advanced security functionality in order to achieve scalability and efficiency regarding security- and general management as well as lifecycle management functionality. However, most of the security cloud services are mainly aimed at larger companies and not adapted for SMEs in terms of required knowledge, time and effort required to keep the security configurations up-to-date.
The paper addresses the first one-and-a-half cycles, out of four planned, in an action research effort concerned with predictive maintenance of walls and ceilings in tunnels of hard rock underground facilities by using Internet-of-Things-enabled Rock Bolts (IoTeRB). The IoTeRB concept is developed together with a consortium of companies ranging from rock bolt manufacturers, sensor specialists, researchers, and cloud-service providers to data analysts. Thus, the action research effort is a multi-disciplinary endeavor. The result of the paper is an action plan for the second cycle concerning technology and business development which, according to the design criterion, will move the IoTeRB toward commercialization.
This paper discusses information security challenges encountered during the wearIT@work project and selected legal aspects of wearable computing. Wearable computing will offer interesting opportunities to improve and reengineer work processes in organizations, but can at the same introduce alignment problems as users in organizations may adopt the new technology before organizations are prepared. In addition, needed supportive legal frameworks have not yet fully addressed the new wearable computing technology. Different alignment concepts for how such challenges can be managed are discussed in the paper.
Wearable computing is gaining more and more interest as new 'wearables,' intended for both work and leisure, are introduced. This trend brings benefits and challenges; for instance, the potential to improve work processes and issues related to IT management and privacy. The introduction and use of wearable computing provides opportunities to improve and reengineer work processes in organizations but can at the same time introduce alignment problems, as users in organizations may adopt the new technology before organizations are prepared. Further, alignment problems posed by the emerging trend, 'Bring Your Own Device' (BYOD), are discussed. In addition, as in the cloud computing area, needed and necessary supportive legal frameworks have not yet fully addressed the new wearable computing technology. In the light of recent developments regarding global intelligence gathering, security and privacy concerns must be given careful consideration. Different alignment concepts for managing security challenges and legal aspects related to wearable computing, such as cultivation, care, hospitality, and care with hospitality, are discussed in the chapter.
Wearable computing is gaining more and more interest as new "wearables," intended for both work and leisure, are introduced. This trend brings benefits and challenges; for instance, the potential to improve work processes and issues related to IT management and privacy. The introduction and use of wearable computing provides opportunities to improve and reengineer work processes in organizations but can at the same time introduce alignment problems, as users in organizations may adopt the new technology before organizations are prepared. Further, alignment problems posed by the emerging trend, "Bring Your Own Device" (BYOD), are discussed. In addition, as in the cloud computing area, needed and necessary supportive legal frameworks have not yet fully addressed the new wearable computing technology. In the light of recent developments regarding global intelligence gathering, security and privacy concerns must be given careful consideration. Different alignment concepts for managing security challenges and legal aspects related to wearable computing, such as cultivation, care, hospitality, and care with hospitality, are discussed in the chapter. © 2018 by IGI Global. All rights reserved.
This paper extends emergency management literature by developing a methodology for emergency management continuity planning (EmCP). In particular, the methodology focuses on inter-organizational continuous and coordinated planning among emergency management organizations. The authors draw on Soft Systems Methodology (Checkland & Scholes, 1999; Checkland, 2000), using it as a base for better understanding of EmCP. Barriers that must be overcome before the methodology can be introduced and established, as well as potential benefits, are also discussed.
The case study, spanning three contexts, concerns a multi-usable cloud service platform for big data collection and analytics and how the development pace and efficiency of it has been improved by 50–75% by using the Arrowhead framework and changing development processes/practices. Furthermore, additional results captured during the case study are related to technology, competencies and skills, organization, management, infrastructure, and service and support. A conclusion is that when offering a complex offer such as an Industrial Product-Service System, comprising sensors, hardware, communications, software, cloud service platform, etc., it is necessary that the technology, business model, business setup, and organization all go hand in hand during the development and later operation, as all ‘components’ are required for a successful result.
The paper concerns a case study about optimizing recycling management in terms of emptying containers holding, for instance, glass, paper, plastics or metal waste collected, thus supporting sustainability of natural resources and the circular economy. The case has been followed from the very start all the way to the current transformation into an IPS2 sold on a subscription basis. The main results of the case study suggest that the provider side must change considerably in terms of the business and organizational set-up, which has been challenging compared to the necessary, though more easily implemented, technological changes. Further, the IPS2 customers foresee improved efficiency and a decrease in unnecessary work if containers are emptied on time. In addition, the core of the IPS2 seems generalizable and transferable to other applications where collection and analysis of data are needed to support decision-making.
The case study, spanning three contexts, concerns a multi-usable cloud service platform for big data collection and analytics and how the development pace and efficiency of it has been improved 50-75% by using the Arrowhead framework and changing development processes/practices. Further, additional results captured during the case study are related to technology, competencies and skills, organization, management, infrastructure, and service and support. A conclusion is that when offering a complex offer such as an Industrial Product-Service System, comprising sensors, hardware, communications, software, cloud service platform, etc., it is necessary that the technology, business model, business set up and organization all go hand in hand during the development and later operation, as all “components” are required for a successful result.
Awareness and understanding of strategic IT- and information security appears to be a low priority amongst senior managers although this falls within their responsibilities. In this paper a tested and confirmed model used to explain strategic IT- and information security is described. The model has been iteratively developed and applied in development, implementation or training in five different organizations. In these five cases, senior management awareness and understanding of strategic IT- and information security was verified as being very low. The model was originally developed to explain IT- and information security to corporate senior management. It has been adapted for use in the public sector by changing some of the terminology to match that used within the public sector. The model may also be used for training purposes, with regards to senior management or personnel in strategic IT- and information security. The importance of senior management ownership and care for strategic elements of the organization's security programme is also discussed and the conclusion drawn is that the operative levels should be coordinated by one or a few members of the senior management team.
Currently, industry is showing increasing interest in performance-based business models. Functional Products is one such business model, where the provider offers a function to customers at an agreed-upon level of availability, productivity or efficiency, etc. A Functional Product comprises the following four main constituents: hardware, software, service support system and management of operation, which together deliver value to customers on a long-term basis. This paper, based on empirical data, provides an outline and starts the verification of a proposed overall Functional Product lifecycle combining and coordinating its economic- and technical perspectives. The perspectives are combined and the key aspects of the necessary coordination between and within the perspectives, i.e., sustainable win-win situations and coordination of sub-lifecycles for the economic perspective, and the need for coordination between the Functional Products’ technical perspective's four sub-lifecycles (hardware, software, service-support system and management of operation), are elaborated and discussed. Further, addition of new functionality, contract management, and long-term management of operation are discussed in the light of managing fleets/individual customers, assets and availability. The proposed overall Functional Product lifecycle is further analyzed from a number of views and aspects.