{"id":"https://openalex.org/W85981371","doi":"https://doi.org/10.1007/978-3-642-36818-9_18","title":"Mobile Collaboration Technology in Engineering Asset Maintenance \u2013 What Technology, Organisation and People Approaches Are Required?","display_name":"Mobile Collaboration Technology in Engineering Asset Maintenance \u2013 What Technology, Organisation and People Approaches Are Required?","publication_year":2013,"publication_date":"2013-01-01","ids":{"openalex":"https://openalex.org/W85981371","doi":"https://doi.org/10.1007/978-3-642-36818-9_18","mag":"85981371"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-36818-9_18","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-36818-9_18","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://inria.hal.science/hal-01480172","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083373672","display_name":"Faisal Syafar","orcid":"https://orcid.org/0000-0003-0374-1085"},"institutions":[{"id":"https://openalex.org/I170239107","display_name":"University of South Australia","ror":"https://ror.org/01p93h210","country_code":"AU","type":"education","lineage":["https://openalex.org/I170239107"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Faisal Syafar","raw_affiliation_strings":["School of Information Technology and Mathematical Sciences, University of South Australia, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology and Mathematical Sciences, University of South Australia, Australia","institution_ids":["https://openalex.org/I170239107"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034294229","display_name":"Jing Gao","orcid":"https://orcid.org/0000-0002-2857-5266"},"institutions":[{"id":"https://openalex.org/I170239107","display_name":"University of South Australia","ror":"https://ror.org/01p93h210","country_code":"AU","type":"education","lineage":["https://openalex.org/I170239107"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jing Gao","raw_affiliation_strings":["School of Information Technology and Mathematical Sciences, University of South Australia, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology and Mathematical Sciences, University of South Australia, Australia","institution_ids":["https://openalex.org/I170239107"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5083373672"],"corresponding_institution_ids":["https://openalex.org/I170239107"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.05860277,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"173","last_page":"182"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11912","display_name":"Outsourcing and Supply Chain Management","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11912","display_name":"Outsourcing and Supply Chain Management","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10003","display_name":"Innovation and Knowledge Management","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1408","display_name":"Strategy and Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11572","display_name":"Information Technology Governance and Strategy","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.7367980480194092},{"id":"https://openalex.org/keywords/asset-management","display_name":"Asset management","score":0.6516427993774414},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5910472869873047},{"id":"https://openalex.org/keywords/engineering-management","display_name":"Engineering management","score":0.5353366136550903},{"id":"https://openalex.org/keywords/delphi","display_name":"Delphi","score":0.49399667978286743},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.4171217083930969},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.38946038484573364},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3794998824596405},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.21888014674186707},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.20047956705093384},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15161851048469543}],"concepts":[{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.7367980480194092},{"id":"https://openalex.org/C2776517139","wikidata":"https://www.wikidata.org/wiki/Q873442","display_name":"Asset management","level":2,"score":0.6516427993774414},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5910472869873047},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.5353366136550903},{"id":"https://openalex.org/C2779495148","wikidata":"https://www.wikidata.org/wiki/Q487378","display_name":"Delphi","level":2,"score":0.49399667978286743},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.4171217083930969},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.38946038484573364},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3794998824596405},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.21888014674186707},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.20047956705093384},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15161851048469543},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-642-36818-9_18","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-36818-9_18","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:eprints.unm.ac.id:27684","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400247","display_name":"Eprints (Universitas Negeri Makassar)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4429535","host_organization_name":"State University of Makassar","host_organization_lineage":["https://openalex.org/I4429535"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Book Section"},{"id":"pmh:oai:HAL:hal-01480172v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01480172","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.173-182, &#x27E8;10.1007/978-3-642-36818-9_18&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:HAL:hal-01480172v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01480172","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.173-182, &#x27E8;10.1007/978-3-642-36818-9_18&#x27E9;","raw_type":"Conference papers"},"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.4699999988079071,"id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W102868166","https://openalex.org/W123596473","https://openalex.org/W1501466435","https://openalex.org/W1502151749","https://openalex.org/W1969695144","https://openalex.org/W1981322468","https://openalex.org/W1984365387","https://openalex.org/W1994324487","https://openalex.org/W2007148346","https://openalex.org/W2007367842","https://openalex.org/W2020403048","https://openalex.org/W2037529100","https://openalex.org/W2075112592","https://openalex.org/W2122857949","https://openalex.org/W2144997486","https://openalex.org/W2148277253","https://openalex.org/W2918529900","https://openalex.org/W3015205468","https://openalex.org/W3121175530","https://openalex.org/W4239884418"],"related_works":["https://openalex.org/W1494844823","https://openalex.org/W2883251465","https://openalex.org/W3009911173","https://openalex.org/W1990141680","https://openalex.org/W2811483426","https://openalex.org/W2384042486","https://openalex.org/W2898593553","https://openalex.org/W2899535352","https://openalex.org/W4280648890","https://openalex.org/W4387459160"],"abstract_inverted_index":{"Engineering":[0],"asset":[1,61,66,79],"maintenance":[2,33,69,85,106,124],"consists":[3],"of":[4,15,40,49,92,99,117],"coordinated":[5],"activities":[6],"and":[7,46,53,68,140],"practices":[8],"for":[9,88,111],"retaining":[10],"or":[11,18],"restoring":[12],"a":[13,108],"piece":[14],"equipment,":[16],"machine,":[17],"system":[19],"to":[20,24,63,102,115,130],"specified":[21],"operable":[22],"conditions":[23],"achieve":[25],"its":[26],"maximum":[27],"useful":[28],"life.":[29],"An":[30],"integrated":[31],"high-level":[32],"comprising":[34],"multiple":[35,44],"sub-systems":[36],"requires":[37],"the":[38,97],"collaboration":[39,125,135],"many":[41],"stakeholders":[42],"including":[43],"systems":[45,55],"departments.":[47],"Several":[48],"specialised":[50],"technical,":[51],"operational":[52],"administrative":[54],"have":[56],"been":[57],"invested":[58],"by":[59],"engineering":[60,78,113],"organisations":[62,80],"enhancing":[64],"their":[65],"management":[67],"systems,":[70],"however":[71],"there":[72],"is":[73],"no":[74],"common":[75],"ground":[76],"among":[77],"about":[81],"what":[82],"are":[83,86],"collaborative":[84,105],"required":[87],"adoption/implementation.":[89],"The":[90],"lack":[91,98],"systematic":[93],"approach,":[94],"together":[95],"with":[96],"specific":[100],"requirements":[101],"implement":[103,116],"mobile":[104,119,134],"requests":[107],"comprehensive":[109],"framework":[110,136],"guiding":[112],"organisation":[114],"new":[118],"technologies":[120],"that":[121],"meet":[122],"all":[123],"requirements.":[126],"This":[127],"research":[128],"proposes":[129],"develop":[131],"an":[132],"appropriate":[133],"based":[137],"on":[138],"Delphi":[139],"Case":[141],"Study":[142],"investigation.":[143]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
