54,01 €
This research book compiles concise reviews on business trends that drive innovation and competitive advantages. The book includes 15 referenced chapters covering topics in advertising, agriculture, digital marketing, human resource management, healthcare and sustainability. Chapters focus on the use of disruptive technologies such as virtual reality, artificial intelligence and Internet of Things that harness the power of big data and visualizations to provide a framework for insightful analytics. Readers will be able to understand the practical applications and implications of these technologies so that they can apply them to their businesses. Special topics of interest are highlighted, including industry 4.0, women empowerment for industry 5.0, sustainability models for achieving UN SDG 9, over the top media platforms, and more.
Readership
Business students, researchers, managers and entrepreneurs.
Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:
Seitenzahl: 476
Veröffentlichungsjahr: 2024
This is an agreement between you and Bentham Science Publishers Ltd. Please read this License Agreement carefully before using the book/echapter/ejournal (“Work”). Your use of the Work constitutes your agreement to the terms and conditions set forth in this License Agreement. If you do not agree to these terms and conditions then you should not use the Work.
Bentham Science Publishers agrees to grant you a non-exclusive, non-transferable limited license to use the Work subject to and in accordance with the following terms and conditions. This License Agreement is for non-library, personal use only. For a library / institutional / multi user license in respect of the Work, please contact: [email protected].
Bentham Science Publishers does not guarantee that the information in the Work is error-free, or warrant that it will meet your requirements or that access to the Work will be uninterrupted or error-free. The Work is provided "as is" without warranty of any kind, either express or implied or statutory, including, without limitation, implied warranties of merchantability and fitness for a particular purpose. The entire risk as to the results and performance of the Work is assumed by you. No responsibility is assumed by Bentham Science Publishers, its staff, editors and/or authors for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products instruction, advertisements or ideas contained in the Work.
In no event will Bentham Science Publishers, its staff, editors and/or authors, be liable for any damages, including, without limitation, special, incidental and/or consequential damages and/or damages for lost data and/or profits arising out of (whether directly or indirectly) the use or inability to use the Work. The entire liability of Bentham Science Publishers shall be limited to the amount actually paid by you for the Work.
Bentham Science Publishers Pte. Ltd. 80 Robinson Road #02-00 Singapore 068898 Singapore Email: [email protected]
Industry 4.0 is built on a foundation of Big Data Analytics (BDA). It has become a practical tool for enhancing businesses' competitive advantages through better data-driven performance. While this is happening, firms are being forced to prioritize performance that is sustainable. The evidence also shows that BDA and innovation can boost business performance, giving it a competitive edge. This book makes the claim that big data analytics capabilities (BDAC) may increase innovation capabilities (IC) and, as a result, help create a sustainable competitive advantage (SCA) when combined with a high degree of data availability (DA). It serves as a comprehensive manual for exploring numerous dimensions with the aid of theories and models in order to gain a practical understanding from several varying points of view for its potential in society.The book employs a methodologically rigorous approach while ensuring that the content is understandable to all readers.
This book provides useful insight into the intellectual and practical effort and emphasizes the importance of re-thinking while analyzing the effects. It covers important topics like Big Data for Smart Cities, Sustainable Environmental Science and Technology, the Global Energy Crisis, Digital Manufacturing Support Processes, Digital Entrepreneurship, Workers' Healthcare using Big data Repository, the Internet of Things (IoT) in the Agriculture Sector toward Urban Greening, and Recent Advances and Perspectives in the Big Data Era.
This book, I believe, will be extremely valuable for a wide range of readers, corporate executives, entrepreneurs, and other professionals and masses in all sectors who want to expand their knowledge by learning about the underlying trends and activities in this book; it is not just for academics, postgraduate students, and research associates. Big data analytics is a novel topic with the ability to revolutionize entire industries; as a result, it will have an impact on everyone in the world in the next years.
It gives me great pleasure to write this foreword because the book's editors have worked tirelessly to find excellent answers and creativity. The chapters in this book were all chosen based on peer reviews by reviewers who were quite knowledgeable about the field.
In the twenty-first century, digitization and the outcomes it produces hasten social change and the creation of sustainable societies. Our digital activities, judgments, and mere presence generate data, which opens up immense prospects for modifying present company procedures and practices. As a result, new theories, such as big data analytics, are desperately needed. The term “big data” refers to the process of creating increasing amounts of data in real time from several sources using modern industrial systems and advanced technology. To generate large volumes of data, modern enterprises increasingly rely on cutting-edge technology, which boosts a company's competitive advantage by extracting value from data and is based on rapidly developing digital technology research and the strengths that the information systems bring to the field. What it takes to achieve digital transformation is described in this book. An extraordinary rate of the adoption of big data analytics (BDA) is being observed in businesses in various nations looking for a competitive edge. This book's goal is to offer a conceptual framework based on resource-based theory (RBT) and dynamic capacity theory (DCT) that may be used to pinpoint the sources of competitive advantages, the interdependence of their constituent parts, and the methods for gaining competitive advantage.
The most recent results of the field's empirical study are presented in this book, along with important theoretical frameworks. In order to increase economic efficiency at the micro and macro levels, it reveals new and novel elements of big data analytics as well as how it might support industry competition. It is the perfect resource for academics, policymakers, businesspeople, organizations, and students. Big data has a variety of useful applications that are advancing both decision-making and industrial capabilities. However, for practitioners engaged in the study of stakeholders and their strategies, this book will be a valuable source of reference.
Further, this book has been organized in a reader-friendly way that makes it easy to understand the content. Important information that has been properly analyzed is underlined. The reader's access to materials in the book creates the possibility for more in-depth research. The case studies will offer a tried-and-true method for resolving typical issues in the subject area. The reader will be able to quickly grasp the chapters' major ideas and content.
Chapter I talks about the Risk Analysis of Implementing Immersive Technology in the Healthcare SystemPeople can engage with a virtual environment in immersive situations. This technique has several medical applications. In medical applications, the use of immersive technology is still relatively new. Immersive technologies like virtual reality, augmented reality, and mixed reality have a variety of medical uses, including improving vision, treating behavioral disorders, rehabilitating patients, and developing personalized workout regimens. This chapter's goal is to evaluate the dangers of a technology-based healthcare system that is advantageous to both patients and professionals. Immersive training systems for the medical field are used to offer instruction and enhance patient care. We give a brief summary of the functional aspects of the system before doing risk analyses using Ishikawa, Fault Tree Analysis (FTA), and Causal Loop Diagram (CLD) to draw attention to three key system concerns. This chapter will also go over risk management and monitoring procedures.
Chapter II talks about the Internet of Things (IoT) in the Agriculture sector toward Urban GreeningBy boosting production and efficiency, Internet of Things (IoT) technology utilization has the potential to significantly improve agriculture and farming operations. The most prevalent sub-verticals in IoT applications for agriculture and farming, according to this report, were crop management and water management. The study also found that sensor data for soil moisture was a common area of attention. The study also discovered that Wi-Fi, followed by mobile technology, was the most often employed technology in the creation of IoT applications. When compared to the farming industry, it was discovered that the agricultural sector received greater research focus. These results can serve as a reference for others in the farming sector who wish to enhance and broaden their usage of IoT in order to raise productivity. The paper also identifies key topics for further investigation, including scalability, heterogeneity, the architecture of IoT systems, data processing methodology, the size of the test site or agricultural area, and IoT security.
Chapter III talks about Embodied Immersion: Exploring the Convergence of Haptic VR and Pervasive Visual SensorsIn recent years, Virtual Reality (VR) technology has rapidly increased in importance and esteem. It offers users a virtual world in which they can form virtual habits or manage the objects in the scene with their limb movements. Users are looking for novel Human-Computer Interaction strategies as computers and information technology develop to offer a richer experience. In contrast, research on virtual scene modeling might make it easier for customers to access and have a more realistic experience. The intended article primarily focuses on the perspectives on AR and VR in the future on a global scale, taking VR strategies that depend on Scene Modelling, Statistical Analysis, and Sensor Networking and taking into consideration the research methods by examining the interactive VR technology from the perception of Visual Sensor Network (VSN), which tends to provide visual information to VR systems and also offers succinct and effective image data to aid in the creation of AR and VR. In addition, a wide range of uses tends to give the burgeoning VR business the assurance it needs to add greater value. A tried-and-true interaction mode is suggested that can significantly enhance user experiences, hence improving VR goods.
Chapter IV talks about Post-Pandemic OTT Media Hegemony in India: A Socio-Economic PerspectiveAs OTT media consumption spread to India after the COVID-19 pandemic, it revolutionized the entertainment market and changed how consumers watched entertainment. Customers were compelled to stay at home due to the lockdown. A paradigm shift in consumer behavior has been brought about by it. The ease of using OTT platforms for content consumption is fuelling this industry's expansion. As smartphone technology advances and internet usage rises, OTT services are benefiting the entertainment industry. The abundance of free time and thirst for entertainment during the pandemic have influenced the demand for OTT services. The study shows that during the pandemic, data usage, internet subscribers, and the proportion of internet subscribers all increased. Cheap data plans, a growing number of people using broadband, and rising smartphone sales are the major factors fueling OTT growth. It tries to evaluate the socioeconomic engagement of OTT media firms in their promotion and strategies.
Chapter V talks about the Digital Disruption Model: Redefining the Healthcare Sector with InnovationHealthcare executives are gaining the necessary benefits for patients thanks to innovations like the combination of artificial intelligence and machine learning, advancements in virtual reality, robotic process automation, and the use of bio-sensors in mobile devices, among others. With startups introducing new business models, key disruptive innovation is occurring, and the future appears promising, with investments totaling US$ 679 million in 2018. However, there is a dearth of literature on this phenomenon in the context of India. The current chapter aims to spark discussion within the Indian healthcare industry about disruptive and digital innovation to identify what types of disruption agents, such as technological enablers, business models, and value networks, appear to be emerging from various innovation clusters in relation to their digital transformational efforts and to assist policymakers in making informed decisions.
Chapter VI talks about a Study on Digital Transformation Empowering Human Resource ManagementBusinesses and employees are under pressure to adapt as a result of quick globalization and expansion of digital technology. In the business world, the phrase “digitalization” today refers to the need for organizations to adopt it if they want to stay updated. Prior studies have focused on the impact of digitalization on marketing and organizational success, including consumer preferences, buying patterns, and customer relationship management. Academic research, particularly that on HRM, tends to give less weight to how it affects internal business. Consequently, the goal of this research is to learn more about human resource management in the digital age. The goal of this study is to show how digital HRM can improve organizational effectiveness.
Chapter VII talks about an Investigation of Industry 4.0 with Client Value Added in the Business IndustryIndustry 4.0, which was established in 2011, refers to a more advanced level of industrialization in which the entire process is managed by automatic or artificial intelligence-enabled machinery with very little room for human interaction. With the help of this technology, a networked channel for continuous data flow has been established between the production unit's machines and electronic retailers (E-retailers). Based on the data these retailers receive from the production unit's machines over the network, they offer services like cloud computing and other services. Data from customers, manufacturers, and workers, among others, is shared among machines via the internet; these machines send data via sensors from client machines/computer systems to service provider organizations, and these service providers analyze massive amounts of data using high-tech computer systems. The rationale behind this is to provide more customized services as well as add more value for clients; this will establish trustworthy relationships between clients and service providers, enhancing client loyalty towards the e-retailer and consumer loyalty towards the manufacturing unit at the same time.
Chapter VIII talks about the Innovations in Environment and Science: A Study on Models of Sustainable Environment across the World to Achieve SDG-9In today's society, digitalization is an instrument, but it is also a means of survival that opens up new options, such as knowledge without time constraints through continuous education. This current study delves in to the unique ideas, practical examples, and models that have been adopted globally as disruptive technologies of their outcomes and related problems, thus demonstrating the fundamentals of sustainability with its implementation in modern society. The study critically assesses the benefits and challenges of contemporary transformation as well as the effectiveness of these technical processes. The aspect of UN SDG-9 has also been discussed in the study that how current technologies are working towards achieving this digitalization in industries to satisfy this United Nations target.
Chapter IX talks about the Understanding of General Population toward Global Energy Crisis: A Qualitative StudyWhen it comes to global energy requirements, consumption, and energy sources, the last century and recent past were heavily reliant on various types of fossil fuels. These fossil fuel energy sources have long served humans, powering the Industrial Revolution in the 17th and 18th centuries. However, like other natural resources, fossil fuel supplies are rapidly declining and are anticipated to run out in the near future. The world is currently experiencing its worst energy crisis in history. In recent years, important events like the COVID-19 pandemic, the post-pandemic economic recovery, the recent Russia-Ukraine war, and harsh weather conditions caused by greenhouse gas emissions and global warming have resulted in a severe energy crunch in terms of fossil fuels. This has had a significant impact on the lives of the common populace. As a result, an attempt has been made to ascertain the general population's comprehension of numerous ideas linked to energy and its sources, problems and solutions in terms of the global energy crisis.
Chapter X talks about Changing Competitive Business Dynamics of OTT Platforms’ Viewership for Transformational Digital Engagement: Post-Pandemic Entrepreneurship.This chapter seeks to comprehend the potential factors that influenced the audience and acceptability of OTT platforms during the COVID-19 pandemic. The general public's consumption of entertainment, as well as their perception of it, has grown rapidly over the years. The demand for such services is growing all the time, resulting in high acceptance rates among the general public. The onset of the COVID-19 pandemic has favorably impacted the OTT landscape in terms of consumer viewership, content generation and distribution across OTT platforms, and customer involvement on the part of service providers. In comparison to the previous year, the subscription growth rate for OTT Service providers surged seven times around March 2020. It might be assumed that OTT platforms have inexorably become a part of the common person's life. Many factors have influenced the inclusion and expansion of this service, including Intention of Use, Accessibility, Content Quality, and Free Time, to name a few.
Chapter XI talks about Women-Driven Innovation in Industry 5.0 Post PandemicWomen have disproportionately been affected by the COVID-19 outbreak, undoing decades of progress toward gender equality. Women-led firms have suffered badly economically, particularly in the pandemic-affected industries. The Sustainable Development Goals (SDGs) are a call to action in the United Nations 2030 Agenda to foster prosperity by addressing global challenges such as poverty and inequality (SDGs 5 and 9), with a special emphasis on catalyzing women's innovation-led entrepreneurship, resulting in economic empowerment for the world's future. Recent research has revealed the type of assistance that women-owned businesses require the most in order to recover and continue operation. These include government grants and stimulus funding, as well as private sector capital and financing, innovation assets for implementing cutting-edge technology and participating in technology-intensive activities, programs and trainings to advance digital and entrepreneurial skills. It is critical to actively support and promote public-private initiatives that assist women entrepreneurs in adapting to new technologies, innovating, developing digital skills, and improving access to financing and financial support. In light of Industry 5.0, the goal of this research is to identify the crucial characteristics that can support innovation driven by female entrepreneurs.
Chapter XII talks about Managing Knowledge Processes and Conceptual Review for Higher Education InstitutionsHigher education is the backbone of any country, determining where we stand and where we wish to go. The goal of higher education is to offer students a platform to improve their knowledge, skills, and attitude in their chosen field of study. Each course has its own set of objectives and learning outcomes that should be expected upon completion. Despite these attempts, there is a significant gap in terms of the skill set required to make a student employable. This is one of the bottlenecks in the overall teaching-learning system. Through this research chapter, the author seeks to identify systemic gaps and proposes a redesigned approach to achieving higher education's goals.
Chapter XIII talks about the Implementation of the Internet of Things (IoT) in Human Resource Management: An OverviewOne of the most important technological developments in recent years is the idea of the Internet of Things (IoT). The Internet of Things, to put it simply, is a system whereby all people, organizations, and objects are connected to one another across a network segment to continuously exchange data without the need for human involvement, fully stoking business. The ease of tracking efficiency has never been greater, thanks to technology. More than ever, communication tools, wearable computing devices, trackers, and other technologies are influencing business and daily life. This chapter tries to provide a history of IoT deployment in HRM. The emergence of mobile job seekers and the use of microchips to manage personnel are just two examples of how the expansion of the Internet of Things (IoT) is expected to change the way businesses and human resources departments function.
Chapter XIV talks about Artificial Intelligence (AI): A Metamorphic Transformation in Healthcare ServicesAll facets of human existence are significantly influenced by artificial intelligence, and technology is supposed to enhance human welfare. Healthcare is a significant area in this regard, and artificial intelligence is accelerating development. With the help of smart gadgets, AI can deliver improved healthcare services. Using the Internet of Things (IoT) and artificial intelligence, small, portable gadgets are now improving the quality of life for people. These tools are used to diagnose and treat a variety of brain illnesses in addition to assisting in the diagnosis of diseases like Alzheimer's disease. The survey is conducted to better understand how patients and healthcare professionals (doctors and nursing staff) feel about artificial intelligence. Super specialty private hospitals in Vizag, Andhra Pradesh, and the capital region of Odisha are included in the study's scope.
Thus, the goal of this book is to provide a high-quality publication with unique insights and techniques of application for current scholars and readers. This book provides an excellent summary of how Big Data analytics transforms organizations and organizes long-term competitive innovation.
First and foremost, we would like to express our gratitude to our Almighty God. We became more conscious of how genuine this writing ability is while putting this book together. You gave us the confidence to chase our dreams and pursue our passions. We would not have succeeded if you had not believed in us. We owe a debt of gratitude to our family members, who have been staunch supporters of our efforts to complete this book.
The editors would like to thank everyone who is associated with this book project, especially the writers and reviewers who participated in the assessment process. This book would not have been possible without their cooperation. The editors take the time to thank everyone who has contributed. We are grateful to the chapter writers who generously contributed their time and abilities to this publication. The editors are thankful to the reviewers for their considerable, unceasing contributions to the quality, coherence, and structuring of the information in the chapters.
We were inspired to provide explanations, investigate particular insight work components, and provide evidence for particular ideas by those who provided extensive and incisive criticism on a few chapters. We also want to express our gratitude to everyone who has helped us learn about and use the science and art of networking throughout the years.
An immersive environment allows people to interact with a virtual environment. Despite its relatively short history, immersive technology still finds applications in medicine. There are numerous medical applications of immersive technologies like virtual reality, augmented reality, and mixed reality, including the improvement of vision, treatment of behavioral disorders, rehabilitating patients, and creating customized fitness routines. The objective of this chapter is to assess the risks associated with a technology-based healthcare system that benefits both patients and professionals. In addition to delivering training and improving patient care, immersive healthcare training systems help facilitate the delivery of training. Our first step is to describe how the system functions, followed by risk analysis, such as Ishikawa, Fault Tree Analysis (FTA), and Causal Loop Diagram (CLD), to highlight the three biggest risks associated with the system. Further, this chapter will discuss the monitoring and management of risks.
Immersive technology allows for the rendering of a computer-created environment immersively. Medical sciences is among the fields in which immersive technology is most useful. Immersive technology is still in its early developmental stages in the medical field. It has already been reported that VR systems have been introduced to aid doctors and medical staff in their learning process. In addition to training and rehabilitation, immersive technologies like VR are also helpful for visually impaired people, people suffering from psychiatric disorders, and amblyopia sufferers. At the moment, there are no technology-based immersive experiences that are suitable for both patients and healthcare professionals. The focus of this chapter will be on an immersive and interactive
digital healthcare system. A variety of devices and sensors are incorporated into this system, as well as immersive gadgets. Consequently, users can use it anytime throughout the day. This chapter also discusses several important aspects of the immersive technology-based medical system.
• Describe immersive technologies.
• Discuss how immersive technologies are used in medical sciences.
• How can immersive technologies be used in medical education?
It is possible to use this technology with a variety of devices, including immersive glasses, wrist watches, and sensors. Users can access the system according to their needs. By using this system, educators can upload content according to their preferred time. On the other hand, learners can access this content according to their needs. Furthermore, clients can seek medical providers based on their specific requirements. Clients may also trade data with them, receive comments, contact specialists, obtain surgical aid, exchange psychological information, and ultimately, access an emergency system.
The first step in understanding this system is to examine its background. In the next section, we discuss how the system operates, revealing its working process. Next, we use different risk assessment procedures to reduce the chance of failure using risk assessment techniques. This section discusses and explains the processes for handling risk and maintaining it.
To create new experiences, immersive technology combines the physical world with a virtual or simulated one. There are two main types of immersive technologies: augmented reality (AR) and virtual reality (VR).
The concept of virtual reality is a computer-generated simulation of a three-dimensional environment. VR technology allows users to experience a virtual world using a computer-based operating system and other technologies. This alternate world is simulated using different devices, which enhances the sense of realism in people.The use of VR technology has transformed the way students are trained and how teachers learn. Instead of focusing on teaching, teachers can focus on learning.Multimedia Cone of Abstraction (MCoA), a model of active learning based on Dale's Cone of Experience (CoE), occurs as learners engage in activities within a virtual world. As a replacement for the CoE's foundation level, “Direct Purposeful Experiences” demonstrate how students can interact with and benefit from highly realistic representations. The student may be able to gain a better understanding of work or concepts if he or she receives timely feedback and can improve at their own pace. In addition, patients can directly contact medical professionals to receive fast and rapid responses.The server can also be used by medical professionals for data collection and feedback.
AR continues to be the most popular technology trend due to the availability of handheld devices that show AR. It is an interactive multi-media technology that combines virtual and real elements, enables real-time interaction, and creates three-dimensional maps. First, AR and VR are contrasted, then computer-generated models in live-action movies are discussed, and annotations and overlays on videos are shown.
To design and develop technologies that mediate human communication, it is useful to have a theory of human communication behavior. Due to the lack of appropriate technology, social acceptance, usability, money, and time, as well as a lack of knowledge of what can be achieved with AR in medical sciences, augmented reality technology has yet to gain traction even though it has been on the market since the 1980s. Additionally, traditional augmented reality applications must also combine virtual and real-world information, be interactive, and support 3D registration.
In healthcare education, simulation training has been shown to improve knowledge acquisition and competency. VR training can help healthcare professionals teach medical students to avoid situations that could lead to poor outcomes in a patient-practitioner relationship. For medical students, VR technology has the potential to be a valuable interactive, experiential tool that can help them develop the skills needed in a real-life scenario, as well as a cost-effective approach to repeatedly practicing simulated clinical scenarios in healthcare. By using VR, students can practice without fear of making real-life mistakes, prepare for diagnosing sickness indicators, and even perform complicated procedures.
By providing a suitable training method, VR simulations eliminate the need for cadavers or animals to gain professional knowledge and create crucial practical skills in medicine. While there is still room for improvement in the haptic (touch) sense, procedural, visual, and aural senses can be trained by using this method. Trainee surgeons can experience a variety of surgeries and procedures through the virtual reality system, including endoscopic surgery, laparoscopic surgery, neurosurgery, and epidural injections. According to Vaughan et al., orthopedic VR training simulators provide surgeons with an excellent platform to develop and improve their skills in a safe, risk-free, realistic operating room.
For doctors with less experience in surgery, VR simulations may be an effective tool to teach essential procedures for orthopedics and other types of surgery. Patients and their primary caregivers may respond better to traditional instructional approaches, such as giving a verbal presentation of information or providing written materials. Interacting with a patient should be tailored to their language ability, ethnicity, socio-economic background, level of education, and cognitive ability. There is evidence that these patient characteristics influence risk factors and patient outcomes.
For relevant and understandable patient knowledge, education must be designed to meet the specific needs of patients who experience acute or chronic conditions.To reduce recurrent strokes and maximize rehabilitation, Thompson-Butel et al. developed customized virtual reality rehabilitation sessions for stroke survivors and their primary caregivers. In their study, the researchers assessed whether VR sessions were effective in providing post-stroke education.This study found that using VR sessions resulted in “various significant improvements in technical expertise in areas such as neurodevelopment and physiology, cognitive impairment and healing, and stroke-specific instructions such as personalized stroke risk factors, as well as acute therapy advantages” for the victim and their caregivers.
Several studies have examined the current state of virtual reality simulations in dentistry training.Their research suggests that VR equipment can be used in dentistry education to provide opportunities for flexibility and self-learning. VR devices enable learners to participate in their education in a variety of ways: They can perform simulations whenever and wherever they want, and they can keep track of and re-visit their work after they have completed it. Moreover, incorporating virtual reality technology into the classroom reduces anxiety and boredom and enhances student engagement and retention. Additionally, students from all dental disciplines may benefit from more efficient and realistic pre-clinical practices with VR due to its rapid technological advancements.
Technological advancements enable the improvement of all aspects of human life, but health will suffer the greatest consequences. There is a need to re-think healthcare studies due to the healthcare crisis. Effective use of technology can improve the efficiency of healthcare organizations. Augmented reality has proven to be effective in providing enhanced healthcare to patients. This technology is expected to have a significant effect on the healthcare field.The reason for this is that augmented reality makes use of sensors, displays, and embedded electronics.
There are various CONOPS guidelines, models, and methodologies that can be used depending on the situation or environment. The risks associated with the system will be discussed in this section. According to the Whiting School of Engineering at Johns Hopkins University, this decision can be made based on a set of criteria derived from SE analysis:
Risks associated with programsDesigned to meet the needs of customersConstraints on fundingConsidering the marketAspects of technologySystem's environmentFig. (1)) An activity diagram of the proposed system.Fig. (1) illustrates a simplified activity diagram of the proposed system, which illustrates how it will operate. Immersive devices used by educators, learners, patients, and medical professionals are linked to smartphones that must be registered before use. To access a particular area of medical sciences, users can log in as either an educator, learner, patient, or medical professional. After choosing certain options and following the instructions, using the system is straight forward. Through this system, patients can pick the specific specialists and services they need. Medical professionals such as doctors have access to the data of their patients 24/7 and can provide healthcare-related support. Meanwhile, educators and learners can easily communicate through a virtual environment created by the system. Students and educators can also easily assess each other using this system.
Fig. (2)) A mind map of the proposed system.Next, we mapped out our ideas regarding the recommended system in a mind map (Fig. 2), which helped us visualize them. The mind map visually organizes information into a hierarchy, with representations of links between pieces of the whole. It is often made around a single concept, which is drawn as a center image on a blank page. The images, words, and parts of the words are added as representations of the concept. Major ideas are connected directly to the central concept, and other ideas branch out from those major ideas.Drawing mind maps by hand or using a computer is an effective way to follow lectures, participate in meetings, or prepare for planning sessions. Our system's mind map states that the funding organization will fund hardware and software development while developers will create it. Additionally, they will provide maintenance to ensure the system operates efficiently. To promote and deliver the system to specific consumers, it is necessary to engage a group of vendors.
The stakeholders of the system are listed in this section. The system of interests considers two types of stakeholders: active and passive. As soon as the system is operational and in use, users, companies, and other systems will engage in active interactions with it. Several factors can influence a system's success, such as individuals, organizations, policies, procedures, and guidelines, which can be considered passive stakeholders. A user group involves learners and educators, management (funding and management authority), experts, and technical support staff, as well as those involved in hardware and software maintenance. The state government plays a passive role in the development and research of immersive and portable devices, as do developers and researchers, and consumers and users.
Fig. (3)) Lists of active stakeholders.A passive stakeholder is represented in Fig. 4, while an active stakeholder is represented in Fig. (3). The three categories of active or involved stakeholders are organizations, users, and maintenance.
Fig. (4)) Lists of passive stakeholders. Fig. (5)) The desirements diagram of the system.Developing a new system begins with a stakeholder's desire or need that a current system cannot meet. These expectations are called stakeholder desirements when they are merely wanted rather than required. It has been shown through research that stakeholders looking for immersive medical systems seek specific features that pertain to their preconceived notions. This section assesses and represents stakeholder expectations, desires, and requirements as the basis for system validation - what stakeholders want the system to accomplish.
An example of the stakeholder’s desires is shown in Fig. (5). The implementation of immersive technologies involves multiple sensors and devices to implement certain desires. The applications include therapeutic solutions, healthcare for children, surgical aid, pre-medication, robotic surgery, psychiatric counseling, and autism therapy. The concern for patient differences is expressed in the cultural requirement. In addition to the system requirements listed here, data security and privacy considerations also need to be considered.
Determining risks begins with outlining goals and objectives so that all project members are aware of what matters most for success. The identification and assessment of risks are enabled because of the creation of the necessary knowledge and scope. In this article, a series of techniques will be examined for identifying risk.
Systematic and effective risk management is essential for preventing and minimizing accidents. ISO 31000 defines risk management as the process of identifying, analyzing, managing and controlling risks. The process is as follows:
To conduct a risk assessment, you must understand and evaluate the context. There are different perspectives on what the most important assets are from different roles and departments, so it is a good idea to get input from more than one source. The most important asset in a virtual environment is the server, while the most essential asset in this proposal is data sharing. Virtual environments would benefit most from immersive technology, whereas the proposed system would benefit most from sharing data.
Our next step will be to classify our contextual assets and key stakeholders within each department. It is necessary to consider their sensitivity and strategic significance. To get accurate and complete information, all major sub-systems must be aligned across all departments.
Considering the risk of hackers to private data security, the risks associated with sharing data are usually at the top of the list, but threats come in many shapes and sizes. While breaches exploiting weaknesses in a business' firewalls or website security programs were very common in 2019, there were many other types of threats that led to data breaches in 2019. While compiling the list of all the unique threats your business faces, it is important to take into account many different types of threats.
Taking into account not only malicious but also accidental human actions, such as users accidentally deleting data or clicking on malicious links, is crucial. It may also be necessary to take into account the risk of system failure based on the quality of the hardware and information systems.
Natural catastrophes and power outages can also cause havoc in the same way humans can, so we should also take these kinds of threats into account. By the end of this step, we should have compiled a comprehensive list of assets that might be at risk.
After identifying risks and estimating levels of uncertainty, we now have the basic framework for how to conduct a risk analysis. All our inputs are users' uncertainties, and we can build a complete model based on them. Next, we evaluate the outputs, which are the outcomes of the uncertainties and the probability of them occurring during the project. In this case, our outputs will be ranges rather than exact outcomes since users have provided estimated input values.
With the use of a computer program, we can investigate the outputs further. An algorithm can calculate the probability of each outcome by identifying each risk and its probability. Using the uncertain inputs as a starting point, each program calculates the model's outputs using the input value. The goal of the simulation is to produce an average value, but they may also be used to examine the range of possible outcomes, especially when there are different sources of uncertainty that might interact unexpectedly during the simulation.
Depending on the type of risk we are assessing, we can determine what interpretation is best based on the results. Make a chart or graph that summarizes the potential outcomes. Charts and graphs make complex statistical information easier to understand.
Analyzing the results of a risk analysis model using sensitivity analysis involves using mathematical software to assign different levels of uncertainty to the input assumptions of the model.
Fig. (6)) Risk Identification and Management Process.The solution with the least level of risk should be implemented. If that is the case, then the project might be limited by certain conditions or the project might not be initiated because the risks are greater than the rewards. During the process, there are likely to be other challenges that we did not manage to account for in our analysis. The project should be reviewed regularly so we can make sure we are staying on track with the proposed solution and make adjustments if any changes occur.
Fig. (6) shows a system's risk management process. This process makes use of brainstorming to identify potential risks. Furthermore, we employ several methods of risk assessment, including the FTA, the Ishikawa Diagram, and the CLD.
Risk analysis identifies and analyzes potential issues that could adversely affect key business initiatives or major projects. These analyses are performed to help organizations manage or mitigate those risks. The following methods are widely used to assess the risks in a project.
Risk assessments are done by engineering professionals in several different ways. Depending on the function, professionals may use only one or several of these types. Multiple risk assessment approaches can be implemented simultaneously. An analysis of this system's risks could be conducted using some risk analysis techniques. Some of these techniques include FMEA, CLD, and FTA.
The FMEA method is a risk assessment tool that can be applied to a variety of environments, such as medical devices, machinery, automotive, and so on, but it is most appropriate when utilized in component-based projects. There are different ways that products and processes can fail. A failure can have many effects, including waste, defects, or harmful outcomes for the customer. An FMEA identifies, prioritizes, and limits these failure modes. The FMEA is not a substitute for engineering quality.
By assessing a product or process' risk of failure, the knowledge and experience of a Cross-Functional Team (CFT) enhance good engineering. FMEA has two broad categories: Design FMEA (DFMEA) and Process FMEA (PFMEA). Nevertheless, we did not apply this method to this situation since we lacked sufficient data to conduct an FMEA.
A CLD illustrates cause-and-effect patterns from a system's perspective (also known as a system thinking diagram). The fishbone diagram may assist in revealing the categories of causes behind a problem. The causal loops indicate the interrelationship between causes and their effects. After completing the diagram, the positive and negative reinforcements that describe the system of behavior are identified. A good characteristic of causal loops is they depersonalize learning. It may be wise to point out the arrows that are reinforcing the problem instead of pointing at individuals.
Fig. (7)) CLD for Ignoring Instruction while using the system.The model becomes a model of the system behaviors that produce the system's outcomes. A CLD provides a visual representation of how different variables in a system interrelate. There are nodes and edges in the diagram. There are nodes corresponding to variables, and edges corresponding to links connecting the two variables. The link with a positive marking indicates a positive relationship, while the link with a negative marking indicates a negative relationship. An example of a positive causal link is when both nodes of a graph move in the same direction, so if the node in which the link starts decreases, the other node decreases as well. In the same way, if the node from which the link starts increases, the other node does too. Negative causal links refer to changes that occur in the opposite direction of the node in which the link originates, i.e., if the node in which the link starts increases, the other node decreases, and vice versa.
As illustrated in Fig. (7), CLDs result from the possible consequences of ignoring instructions while using a system. This diagram illustrates how, if a user is not trained and ignores the instructions, there is a risk of a wrong diagnosis, which can cause severe health complications.
System failures can be explored graphically by using FTA. It combines a series of lower-level events using boolean logic and is a top-down approach to identifying failures at component levels (basic events) that cause system-level failures (top events). There are two main components of fault tree analysis: “events” and “logic gates” related to the top undesired event. In comparison to FMEA, fault tree analysis takes into account all possible failures of a top event within the system. In contrast, FMEA analyzes all possible modes of failure, regardless of severity.
Fig. (8)) FTA to assess the risk of the proposed system.To identify the root cause of an undesired state that exists in a system using the FTA method (Fig. 8), multiple events are combined at lower levels. As a result of this section, we will attempt to assess the risks associated with using data. Risks associated with data management are classified into three categories. These include data safety, data storage, and data sortation.