This survey article provides a synopsis on some of the engineering problems, technological innovations, robotic development and automation efforts encountered in the mining industry -- particularly in the Pilbara iron-ore region of Western Australia. The goal is to paint the technology landscape and highlight issues relevant to an engineering audience to raise awareness of AI and automation trends in mining. It assumes the reader has no prior knowledge of mining and builds context gradually through focused discussion and short summaries of common open-pit mining operations. The principal activities that take place may be categorized in terms of resource development, mine-, rail- and port operations. From mineral exploration to ore shipment, there are roughly nine steps in between. These include: geological assessment, mine planning and development, production drilling and assaying, blasting and excavation, transportation of ore and waste, crush and screen, stockpile and load-out, rail network distribution, and ore-car dumping. The objective is to briefly describe what each of these processes involves and identify some of the challenges/opportunities from the perspective of a decade-long industry-university R&D collaboration.
{"title":"Automation and AI Technology in Surface Mining With a Brief Introduction to Open-Pit Operations in the Pilbara","authors":"Raymond Leung, Andrew J Hill, Arman Melkumyan","doi":"arxiv-2301.09771","DOIUrl":"https://doi.org/arxiv-2301.09771","url":null,"abstract":"This survey article provides a synopsis on some of the engineering problems,\u0000technological innovations, robotic development and automation efforts\u0000encountered in the mining industry -- particularly in the Pilbara iron-ore\u0000region of Western Australia. The goal is to paint the technology landscape and\u0000highlight issues relevant to an engineering audience to raise awareness of AI\u0000and automation trends in mining. It assumes the reader has no prior knowledge\u0000of mining and builds context gradually through focused discussion and short\u0000summaries of common open-pit mining operations. The principal activities that\u0000take place may be categorized in terms of resource development, mine-, rail-\u0000and port operations. From mineral exploration to ore shipment, there are\u0000roughly nine steps in between. These include: geological assessment, mine\u0000planning and development, production drilling and assaying, blasting and\u0000excavation, transportation of ore and waste, crush and screen, stockpile and\u0000load-out, rail network distribution, and ore-car dumping. The objective is to\u0000briefly describe what each of these processes involves and identify some of the\u0000challenges/opportunities from the perspective of a decade-long\u0000industry-university R&D collaboration.","PeriodicalId":501533,"journal":{"name":"arXiv - CS - General Literature","volume":"123 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138544621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This chapter makes needed corrections to an unduly negative scholarly view of Ada Lovelace. Credit between Lovelace and Babbage is not a zero-sum game, where any credit added to Lovelace somehow detracts from Babbage. Ample evidence indicates Babbage and Lovelace each had important contributions to the famous 1843 Sketch of Babbage's Analytical Engine and the accompanying Notes. Further, Lovelace's correspondence with two highly accomplished figures in 19th century mathematics, Charles Babbage and Augustus De Morgan, establish her mathematical background and sophistication. Babbage and Lovelace's treatment of the Bernoulli numbers in Note 'G' spotlights this aspect of their collaboration. Finally, while acknowledging significant definitional problems in calling Lovelace the world's "first computer programmer," I affirm that Lovelace created an elemental sequence of instructions -- that is, an algorithm -- for computing the series of Bernoulli numbers.
{"title":"Charles Babbage, Ada Lovelace, and the Bernoulli Numbers","authors":"Thomas J. Misa","doi":"arxiv-2301.02919","DOIUrl":"https://doi.org/arxiv-2301.02919","url":null,"abstract":"This chapter makes needed corrections to an unduly negative scholarly view of\u0000Ada Lovelace. Credit between Lovelace and Babbage is not a zero-sum game, where\u0000any credit added to Lovelace somehow detracts from Babbage. Ample evidence\u0000indicates Babbage and Lovelace each had important contributions to the famous\u00001843 Sketch of Babbage's Analytical Engine and the accompanying Notes. Further,\u0000Lovelace's correspondence with two highly accomplished figures in 19th century\u0000mathematics, Charles Babbage and Augustus De Morgan, establish her mathematical\u0000background and sophistication. Babbage and Lovelace's treatment of the\u0000Bernoulli numbers in Note 'G' spotlights this aspect of their collaboration.\u0000Finally, while acknowledging significant definitional problems in calling\u0000Lovelace the world's \"first computer programmer,\" I affirm that Lovelace\u0000created an elemental sequence of instructions -- that is, an algorithm -- for\u0000computing the series of Bernoulli numbers.","PeriodicalId":501533,"journal":{"name":"arXiv - CS - General Literature","volume":"126 1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138544233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Petar Radanliev, David De Roure, Pete Burnap, Omar Santos
To enable quantitative risk assessment of uncontrollable risk states in complex and coupled IoT systems, a new epistemological equation is designed and tested though comparative and empirical analysis. The comparative analysis is conducted on national digital strategies, followed by an empirical analysis of cyber risk assessment approaches. The new epistemological analysis approach enables the assessment of uncontrollable risk states in complex IoT systems, which begin to resemble artificial intelligence, and can be used for a quantitative self-assessment of IoT cyber risk posture.
{"title":"Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things","authors":"Petar Radanliev, David De Roure, Pete Burnap, Omar Santos","doi":"arxiv-2212.08141","DOIUrl":"https://doi.org/arxiv-2212.08141","url":null,"abstract":"To enable quantitative risk assessment of uncontrollable risk states in\u0000complex and coupled IoT systems, a new epistemological equation is designed and\u0000tested though comparative and empirical analysis. The comparative analysis is\u0000conducted on national digital strategies, followed by an empirical analysis of\u0000cyber risk assessment approaches. The new epistemological analysis approach\u0000enables the assessment of uncontrollable risk states in complex IoT systems,\u0000which begin to resemble artificial intelligence, and can be used for a\u0000quantitative self-assessment of IoT cyber risk posture.","PeriodicalId":501533,"journal":{"name":"arXiv - CS - General Literature","volume":"37 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138544619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mike Thelwall, Kayvan Kousha, Mahshid Abdoli, Emma Stuart, Meiko Makita, Paul Wilson, Jonathan Levitt
This document describes strategies for using Artificial Intelligence (AI) to predict some journal article scores in future research assessment exercises. Five strategies have been assessed.
本文档描述了在未来的研究评估练习中使用人工智能(AI)预测一些期刊文章分数的策略。评估了五种策略。
{"title":"Can REF output quality scores be assigned by AI? Experimental evidence","authors":"Mike Thelwall, Kayvan Kousha, Mahshid Abdoli, Emma Stuart, Meiko Makita, Paul Wilson, Jonathan Levitt","doi":"arxiv-2212.08041","DOIUrl":"https://doi.org/arxiv-2212.08041","url":null,"abstract":"This document describes strategies for using Artificial Intelligence (AI) to\u0000predict some journal article scores in future research assessment exercises.\u0000Five strategies have been assessed.","PeriodicalId":501533,"journal":{"name":"arXiv - CS - General Literature","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138544615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The future wireless communication system faces the bottleneck of the shortage of traditional spectrum resources and the explosive growth of the demand for wireless services. Millimeter-wave communication with spectral resources has become an effective choice for the next generation of wireless broadband cellular communication. However, the transmission path loss is large and oxygen and water molecules absorb Characteristics such as seriousness have brought great challenges to millimeter wave communication, and it is necessary to seek a technical approach different from low-frequency wireless communication. In the analysis of millimeter wave transmission characteristics After the analysis, the research progress of millimeter wave communication technology and the RF front-end is comprehensively analyzed, and the technology of millimeter wave communication is thoroughly analyzed with technical challenges and proposed corresponding research directions.
{"title":"Development of Millimeter Wave Wireless Communication","authors":"Quanda Zhang, Hudi Wang","doi":"arxiv-2211.14728","DOIUrl":"https://doi.org/arxiv-2211.14728","url":null,"abstract":"The future wireless communication system faces the bottleneck of the shortage\u0000of traditional spectrum resources and the explosive growth of the demand for\u0000wireless services. Millimeter-wave communication with spectral resources has\u0000become an effective choice for the next generation of wireless broadband\u0000cellular communication. However, the transmission path loss is large and oxygen\u0000and water molecules absorb Characteristics such as seriousness have brought\u0000great challenges to millimeter wave communication, and it is necessary to seek\u0000a technical approach different from low-frequency wireless communication. In\u0000the analysis of millimeter wave transmission characteristics After the\u0000analysis, the research progress of millimeter wave communication technology and\u0000the RF front-end is comprehensively analyzed, and the technology of millimeter\u0000wave communication is thoroughly analyzed with technical challenges and\u0000proposed corresponding research directions.","PeriodicalId":501533,"journal":{"name":"arXiv - CS - General Literature","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138544243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
It is essential to discuss the role, difficulties, and opportunities concerning people of different gender in the field of software engineering research, education, and industry. Although some literature reviews address software engineering and gender, it is still unclear how research and practices in Asia exist for handling gender aspects in software development and engineering. We conducted a systematic literature review to grasp the comprehensive view of gender research and practices in Asia. We analyzed the 32 identified papers concerning countries and publication years among 463 publications. Researchers and practitioners from various organizations actively work on gender research and practices in some countries, including China, India, and Turkey. We identified topics and classified them into seven categories varying from personal mental health and team building to organization. Future research directions include investigating the synergy between (regional) gender aspects and cultural concerns and considering possible contributions and dependency among different topics to have a solid foundation for accelerating further research and getting actionable practices.
{"title":"Systematic Literature Review of Gender and Software Engineering in Asia","authors":"Hironori Washizaki","doi":"arxiv-2211.09554","DOIUrl":"https://doi.org/arxiv-2211.09554","url":null,"abstract":"It is essential to discuss the role, difficulties, and opportunities\u0000concerning people of different gender in the field of software engineering\u0000research, education, and industry. Although some literature reviews address\u0000software engineering and gender, it is still unclear how research and practices\u0000in Asia exist for handling gender aspects in software development and\u0000engineering. We conducted a systematic literature review to grasp the\u0000comprehensive view of gender research and practices in Asia. We analyzed the 32\u0000identified papers concerning countries and publication years among 463\u0000publications. Researchers and practitioners from various organizations actively\u0000work on gender research and practices in some countries, including China,\u0000India, and Turkey. We identified topics and classified them into seven\u0000categories varying from personal mental health and team building to\u0000organization. Future research directions include investigating the synergy\u0000between (regional) gender aspects and cultural concerns and considering\u0000possible contributions and dependency among different topics to have a solid\u0000foundation for accelerating further research and getting actionable practices.","PeriodicalId":501533,"journal":{"name":"arXiv - CS - General Literature","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138544307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Digital literacy is the skill of finding, evaluating, consuming, and generating information using digital technologies. The study attempted to comprehend university students' digital reading habits and skills. It also provides a glimpse of the pupils' favorite reading materials, including physical and digital sources. We examined BSc and BE Computer Science students of DMI-St. Eugene University, Zambia. The tool was a structured questionnaire that was distributed through WhatsApp. The study's findings revealed that most students thoroughly understand digital tools and how to use them but lack the skills to build their websites and portfolio. Out of 115 students, all agreed they used computers for learning purposes. Usage of digital environments, generally, they used the World Wide Web for searching for information. Additionally, most students have medium digital application skills, despite their preference for reading electronic books. The results indicate that students' gender and level of education had a statistically significant link with their digital literacy, whereas age wasn't shown to be a statistically relevant predictor. The findings show that, in terms of education, especially reading, students' or readers' top priorities are electronic resources; print book preferences are reduced.
{"title":"Digital Literacy and Reading Habits of The DMI-St. Eugene University Students","authors":"Subaveerapandiyan A, Priyanka Sinha","doi":"arxiv-2211.05831","DOIUrl":"https://doi.org/arxiv-2211.05831","url":null,"abstract":"Digital literacy is the skill of finding, evaluating, consuming, and\u0000generating information using digital technologies. The study attempted to\u0000comprehend university students' digital reading habits and skills. It also\u0000provides a glimpse of the pupils' favorite reading materials, including\u0000physical and digital sources. We examined BSc and BE Computer Science students\u0000of DMI-St. Eugene University, Zambia. The tool was a structured questionnaire\u0000that was distributed through WhatsApp. The study's findings revealed that most\u0000students thoroughly understand digital tools and how to use them but lack the\u0000skills to build their websites and portfolio. Out of 115 students, all agreed\u0000they used computers for learning purposes. Usage of digital environments,\u0000generally, they used the World Wide Web for searching for information.\u0000Additionally, most students have medium digital application skills, despite\u0000their preference for reading electronic books. The results indicate that\u0000students' gender and level of education had a statistically significant link\u0000with their digital literacy, whereas age wasn't shown to be a statistically\u0000relevant predictor. The findings show that, in terms of education, especially\u0000reading, students' or readers' top priorities are electronic resources; print\u0000book preferences are reduced.","PeriodicalId":501533,"journal":{"name":"arXiv - CS - General Literature","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138544306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Humor is an inherently social phenomenon, with humorous utterances shaped by what is socially and culturally accepted. Understanding humor is an important NLP challenge, with many applications to human-computer interactions. In this work we explore humor in the context of Cards Against Humanity -- a party game where players complete fill-in-the-blank statements using cards that can be offensive or politically incorrect. We introduce a novel dataset of 300,000 online games of Cards Against Humanity, including 785K unique jokes, analyze it and provide insights. We trained machine learning models to predict the winning joke per game, achieving performance twice as good (20%) as random, even without any user information. On the more difficult task of judging novel cards, we see the models' ability to generalize is moderate. Interestingly, we find that our models are primarily focused on punchline card, with the context having little impact. Analyzing feature importance, we observe that short, crude, juvenile punchlines tend to win.
{"title":"Cards Against AI: Predicting Humor in a Fill-in-the-blank Party Game","authors":"Dan Ofer, Dafna Shahaf","doi":"arxiv-2210.13016","DOIUrl":"https://doi.org/arxiv-2210.13016","url":null,"abstract":"Humor is an inherently social phenomenon, with humorous utterances shaped by\u0000what is socially and culturally accepted. Understanding humor is an important\u0000NLP challenge, with many applications to human-computer interactions. In this\u0000work we explore humor in the context of Cards Against Humanity -- a party game\u0000where players complete fill-in-the-blank statements using cards that can be\u0000offensive or politically incorrect. We introduce a novel dataset of 300,000\u0000online games of Cards Against Humanity, including 785K unique jokes, analyze it\u0000and provide insights. We trained machine learning models to predict the winning\u0000joke per game, achieving performance twice as good (20%) as random, even\u0000without any user information. On the more difficult task of judging novel\u0000cards, we see the models' ability to generalize is moderate. Interestingly, we\u0000find that our models are primarily focused on punchline card, with the context\u0000having little impact. Analyzing feature importance, we observe that short,\u0000crude, juvenile punchlines tend to win.","PeriodicalId":501533,"journal":{"name":"arXiv - CS - General Literature","volume":"74 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138544237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Understanding the landscape of potential harms from algorithmic systems enables practitioners to better anticipate consequences of the systems they build. It also supports the prospect of incorporating controls to help minimize harms that emerge from the interplay of technologies and social and cultural dynamics. A growing body of scholarship has identified a wide range of harms across different algorithmic technologies. However, computing research and practitioners lack a high level and synthesized overview of harms from algorithmic systems arising at the micro-, meso-, and macro-levels of society. We present an applied taxonomy of sociotechnical harms to support more systematic surfacing of potential harms in algorithmic systems. Based on a scoping review of computing research ($n=172$), we identified five major themes related to sociotechnical harms - representational, allocative, quality-of-service, interpersonal harms, and social system/societal harms - and sub-themes. We describe these categories and conclude with a discussion of challenges and opportunities for future research.
{"title":"Sociotechnical Harms: Scoping a Taxonomy for Harm Reduction","authors":"Renee Shelby, Shalaleh Rismani, Kathryn Henne, AJung Moon, Negar Rostamzadeh, Paul Nicholas, N'Mah Yilla, Jess Gallegos, Andrew Smart, Emilio Garcia, Gurleen Virk","doi":"arxiv-2210.05791","DOIUrl":"https://doi.org/arxiv-2210.05791","url":null,"abstract":"Understanding the landscape of potential harms from algorithmic systems\u0000enables practitioners to better anticipate consequences of the systems they\u0000build. It also supports the prospect of incorporating controls to help minimize\u0000harms that emerge from the interplay of technologies and social and cultural\u0000dynamics. A growing body of scholarship has identified a wide range of harms\u0000across different algorithmic technologies. However, computing research and\u0000practitioners lack a high level and synthesized overview of harms from\u0000algorithmic systems arising at the micro-, meso-, and macro-levels of society.\u0000We present an applied taxonomy of sociotechnical harms to support more\u0000systematic surfacing of potential harms in algorithmic systems. Based on a\u0000scoping review of computing research ($n=172$), we identified five major themes\u0000related to sociotechnical harms - representational, allocative,\u0000quality-of-service, interpersonal harms, and social system/societal harms - and\u0000sub-themes. We describe these categories and conclude with a discussion of\u0000challenges and opportunities for future research.","PeriodicalId":501533,"journal":{"name":"arXiv - CS - General Literature","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138544300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As businesses get more sizable and more mature they now, inevitably accrete more and more software systems. This estate expansion leads not only to greater complexity and expense for the enterprise, but also to fragmentation, inconsistency and siloing of business processes. Because platform rationalisation and system decommissioning never happens spontaneously, a perennial problem for the enterprise then becomes how to simplify their corporate software platforms. Recently, Curlew Research personnel were involved in a software rationalisation program within a large global life sciences company and this paper describes an approach to decommissioning which we developed as part of that project, and which we feel could be of use more widely to help with objective more user-centric system rationalisation. The method derives from a model developed by Noriaki Kano et al to help with determining customer satisfaction and loyalty, and the prioritisation of new, additional functionality, features or "products", for example when looking to enhance software applications. Using a blueprint process for rationalisation, the Curlew-Kano method enables each application to be placed efficiently and objectively into one of four categories - Retain; Review; Remove; Research - thus allowing the enterprise to identify and prioritise quickly those systems which warrant further investigation as part of a decommissioning activity. The key difference of the Curlew-Kano method compared to other application rationalisation methodologies is the fundamental involvement of users in the identification of systems more suitable for rationalisation and possible decommissioning. In our view involving users more fully in system rationalisation leads to better outcomes for the enterprise.
{"title":"Software system rationalisation: How to get better outcomes through stronger user engagement","authors":"Richard Shute, Nick Lynch","doi":"arxiv-2210.00236","DOIUrl":"https://doi.org/arxiv-2210.00236","url":null,"abstract":"As businesses get more sizable and more mature they now, inevitably accrete\u0000more and more software systems. This estate expansion leads not only to greater\u0000complexity and expense for the enterprise, but also to fragmentation,\u0000inconsistency and siloing of business processes. Because platform\u0000rationalisation and system decommissioning never happens spontaneously, a\u0000perennial problem for the enterprise then becomes how to simplify their\u0000corporate software platforms. Recently, Curlew Research personnel were involved\u0000in a software rationalisation program within a large global life sciences\u0000company and this paper describes an approach to decommissioning which we\u0000developed as part of that project, and which we feel could be of use more\u0000widely to help with objective more user-centric system rationalisation. The\u0000method derives from a model developed by Noriaki Kano et al to help with\u0000determining customer satisfaction and loyalty, and the prioritisation of new,\u0000additional functionality, features or \"products\", for example when looking to\u0000enhance software applications. Using a blueprint process for rationalisation,\u0000the Curlew-Kano method enables each application to be placed efficiently and\u0000objectively into one of four categories - Retain; Review; Remove; Research -\u0000thus allowing the enterprise to identify and prioritise quickly those systems\u0000which warrant further investigation as part of a decommissioning activity. The\u0000key difference of the Curlew-Kano method compared to other application\u0000rationalisation methodologies is the fundamental involvement of users in the\u0000identification of systems more suitable for rationalisation and possible\u0000decommissioning. In our view involving users more fully in system\u0000rationalisation leads to better outcomes for the enterprise.","PeriodicalId":501533,"journal":{"name":"arXiv - CS - General Literature","volume":"123 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138544612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}