=Paper= {{Paper |id=Vol-2348/paper19 |storemode=property |title=E-Waste & the Circular Economy: An Irish Sme Context |pdfUrl=https://ceur-ws.org/Vol-2348/paper19.pdf |volume=Vol-2348 |authors=Tom O’Farrell,Angela Wright |dblpUrl=https://dblp.org/rec/conf/cerc/OFarrellW19 }} ==E-Waste & the Circular Economy: An Irish Sme Context== https://ceur-ws.org/Vol-2348/paper19.pdf
Smart Factory and Robotics




         E-Waste & the Circular Economy: An Irish SME Context


                          Tom O’Farrell & Dr Angela Wright
                     Cork Institute of Technology/CIT, Cork - Ireland
                       tgofarrell@outlook.com      angela.wright@cit.ie
            Dept. of OPD, School of Business, CIT, Bishopstown, Cork. Ireland.


          Abstract. E-waste is a term given to waste generated by electrical and electronic
          equipment (WEEE). It is one the fastest growing waste streams in the EU, and it
          is expected to grow to more than 12 million tonnes by 2020. WEEE raises a dual
          problem for the environment; on the one hand, the composition of WEEE is
          highly toxic and represents a serious threat to the environment, and on the other,
          there are precious materials that can be recovered from WEEE; materials that can
          be used in the production of other goods. Reverse logistics is mainly the back-
          ward flow of used products from consumers to producers. Remanufacturing
          brings the benefits of availability, economics and security, energy savings, and
          reduction in the need for dirty processes. The estimated value for all manufac-
          tured products in the remanufacturing intensive sectors is €1.5 trillion.
          The growing problem of E-waste is defined in this research, and the benefits of
          the services that ‘Wisetek’, (the company at the core of this research) offer for
          managing this E-waste issue are outlined. E-waste is a solution for data centres
          and Wisetek are leaders in the circular economy. Their services include remanu-
          facturing IT equipment and then remarketing to approved buyers. This research
          study recommends that Wisetek adopt an innovative approach through their stra-
          tegic decision making to transfer their competencies into the EU. The strong pres-
          ence that Wisetek have in other key global regions must be enhanced into the
          European market.
          Keywords: E-waste, Circular Economy, Reverse Logistics, Remanufacturing,
          Data Centres, GDPR.
          Keywords: First Keyword, Second Keyword, Third Keyword.


 1        Introduction

    Wisetek are IT asset disposal (ITAD), reuse and data destruction services providers.
 Leaders in the circular economy, their services to clients include global site audits of
 IT equipment and providing their clients tailored reports. Wisetek’s TotalRMA™ web
 portal provides data centres with secure and easy to use online system, that allows data
 centre personnel to register redundant product details. Wisetek provide remanufactur-
 ing services of IT equipment. This involves dismantling IT equipment and any recov-
 ered components are tested. Components that are reusable are then re-marketed to ap-
 proved buyers, defective or non-usable components are responsibly recycled to the R2
 standard (Wisetek.net). This research study is an empirical investigation into the im-
 portance of reverse logistics, remanufacturing and electronic recycling in data centres,
 in particular a focus on the data centre hubs in Germany and The Netherlands. Western

                                                  257
                                                                        Smart Factory and Robotics
2


Europe has established a number of technology hubs in major cities including Dublin,
London, Amsterdam and Frankfurt, that are growing rapidly. The study examines a
range of topical issues in cloud computing and data centres. The issues of remanufac-
turing and reverse logistics, along with recycling of electronic waste (E-waste) with
regard to current legislation, cyber security, corporate social responsibility (CSR) and
efficiencies in data centre infrastructure management are investigated. The next section
presents the research context and research question.


1.1    1.1 Research Context

   The circular economy is perhaps the biggest revolution for the global economy in
the last 250 years and is gaining momentum (Timmermans, 2016); in 15 years from
now, it could be worth $4.5 trillion. Geissdoerfer et al., (2017) define the Circular Econ-
omy as a regenerative system in which resource input, waste emission and energy leak-
age are minimised by slowing, closing and narrowing material and energy loops. A
circular economy requires a transformation of both production and consumption sys-
tems; the standard approach for creation, fabrication and commerce of products is chal-
lenged (De los Rios and Charnley, 2016). The concept of the circular economy is, to an
increasing extent, treated as a solution to a series of challenges, (Lieder and Rashid,
2016) such as waste generation, resource scarcity and sustaining economic benefits.
Switching from the current linear model of economy to a circular one, has recently
attracted increased attention from major global companies e.g., Google, Unilever, Re-
nault, noted by Lewandowski, (2016) and policymakers attending the World Economic
Forum. The reasons for this are very significant financial, social and environmental
benefits (Lewandowski, 2016). Reverse logistics, indicating the process of this return
flow highlighted by Olariu (2014) encompasses such activities as the movement of re-
turned products, facilities to accommodate returned items and overall remedy process
for returned items. The area of reverse logistics has recently received considerable at-
tention, due to a combination of environmental, economic and social factors (Olariu,
2014). Reverse logistics refers to the series of operations as articulated by Alshamsi
and Diabat (2015) that initiate at the consumer level with the collection of products and
terminate with the re-processing of these products at remanufacturing facilities. Re-
verse logistics, which is mainly the backward flows of used products from consumers
to producers, is an important stage while constructing a recovery system (Alshamsi and
Diabat, 2015). A remanufactured component is, by definition, (Robinson, 2014) going
to provide the same service as the original, so that the original component or system
considerably extends its life, therefore, end-of-life scrapping is postponed. Remanufac-
turing and refurbishing activities also may be included in the definition of reverse lo-
gistics (Robinson, 2014). The development of remanufacturing highlighted by Xiong
et al., (2016) in many industries where high-profile manufacturers like Boeing, Cater-
pillar, General Electric, IBM, Kodak, Volkswagen and Xerox initiate a business model
in which remanufacturing is an integral part (Xiong et al., 2016). Remanufacturing
makes up a small share of European manufacturing output, accounting for an estimated
1.9 % of total production value in these sectors. The four key regions estimated to ac-
count for some 70 % of remanufacturing value in Europe are, Germany, the UK,

                                             258
Smart Factory and Robotics
                                                                                        3


 Ireland, France and Italy. Germany undertakes most remanufacturing by a significant
 margin, making up almost a third of the European market (Remanufacturing.eu). E-
 waste is a term given to waste generated by electrical and electronic equipment (WEEE)
 (Heacock et al., 2016). This comprises of equipment such as televisions, mobile phones,
 computers, IT equipment and household appliances. E-waste is produced in staggering
 quantities, estimated globally to be 41.8 million tonnes in 2014 (Heacock et al., 2016).
 It is one the fastest growing waste streams in the EU, with some 9 million tonnes gen-
 erated in 2005 and expected to grow to more than 12 million tonnes by 2020 (Ec.eu-
 ropa.eu). Baldé et al., (2014) note that in Europe, the total E-waste generation was 11.6
 million metric tonnes in 2014. The European countries with the highest E-waste gener-
 ation in absolute quantities are, Germany (1.8 million metric tonnes), The United King-
 dom (1.5 million metric tonnes) and France (1.4 million metric tonnes) (Baldé et al.,
 2014). Recycling for E-waste will be a necessity, not only to address the shortage of
 mineral resources for the electronics industry, but also to decline the environmental
 pollution and human health risk (Zeng et al., 2017). The rapid consumption of new
 electronic devices has expanded the volume of E-waste, Gonul Kochan et al., (2016)
 and this has created a potential threat to the environment. Recycling of E-waste can
 help stem the proliferation of E-waste and its environmental threat (Gonul Kochan et
 al., 2016). In Europe, manual dismantling as a first treatment step has been gradually
 replaced by mechanical break up of appliances, (Salhofer et al., 2016) followed by sort-
 ing out of hazardous and valuable components (Salhofer et al., 2016). Recycling of
 electronics is good for the environment when done in an appropriate manner as it re-
 covers materials for reuse and reduces waste in landfills (Ceballos and Dong, 2016).
 Cloud computing has become the next logical step for the IT industry. It's the new stra-
 tegic weapon in enterprise computing and the new norm in every sector of society.
 Businesses, educational institutions, governments, community organizations and indi-
 viduals are looking at cloud offerings to manage information, instead of infrastructure
 (Bojanova et al., 2013). The cloud computing paradigm has sustained its growth, which
 has led to increase an in size and the number of data centres. Data centres with thou-
 sands of computing devices are deployed as back end to provide cloud services (Shuja
 et al., 2016). Data centres are physical infrastructures that are used for housing and
 operating servers, routers, switches and networking systems, along with, storing and
 processing a large amount of data belong to an organisation (Sapdatacentre.com). These
 new data centres are the physical manifestation Katz (2009) of what Internet companies
 are calling cloud computing. The physical environment of data centres are strictly reg-
 ulated and air conditioning is used to control both the temperature and humidity, Jones
 et al., (2013) and data centres also have water and smoke detection systems and sprin-
 kler systems. Powerful cooling systems are required to offset the heat produced by the
 servers and more energy is needed for cooling, than for data storage and processing
 (Jones et al., 2013). Data centres must provide not only performance guarantees, but
 reliability ones as well (Wood, 2011). Disaster recovery services attempt to protect ap-
 plications by continuously replicating to a secondary data centre, that can be switched
 to, in the event of catastrophic data centre failure (Wood, 2011). The aims of this re-
 search study are to provide an analysis of reverse logistics, remanufacturing and elec-
 tronic recycling in the data centre hubs of Frankfurt and Amsterdam and how likely is


                                             259
                                                                         Smart Factory and Robotics
4


it that the service offerings of Wisetek will fit into these markets in the future. The next
section presents the literature review for this research study.


2      Literature Review

2.1     Data Centres

    A data centre (or datacentre) is a facility composed of networked computers and
storage that businesses or other organizations use (Rouse, 2010). Data centres are de-
scribed by Flucker and Tozer (2013) as mission critical facilities; they are essential for
the business to carry out its mission and hence any interruption in service, downtime or
unavailability usually has a significant cost impact (Flucker and Tozer, 2013). The con-
cept of data centres has been around since the late 1950s, when American Airlines and
IBM partnered to create a passenger reservations system, automating one of its key
business areas (Woods, 2014). Server virtualization technologies first appeared in the
1960s to enable timesharing of expensive hardware between multiple users (Dasgupta
et al., 2011). Carcary et al., (2013) note that by 2011, it had become the top technology
priority for organizations worldwide to reach $241 billion by 2020. Hao et al., (2010)
state that today’s large data centres are the computational hubs of the next generation
of IT services (Hao et al., 2010). This is disputed by Fulton III (2016) stating that the
Internet of Things (IoT) would be a cleverer architecture than a colossal hub-and-spoke
topology that testifies to its power to change the landscape of data centres. IoT could,
if it continues to develop the way it has, draw more compute, storage and bandwidth
power towards the edge away from centralized facilities and closer to where these var-
ious streams of data are being gathered (Fulton III, 2016). A data centre typically houses
a large number of computing and storage nodes, interconnected by a specially designed
network, namely, data centre network (DCN) (Xia et al., 2016). Data centres that house
the cloud systems, revealed by Preimesberger (2015) that serve up the apps used on
connected devices, are popping up all over the globe and often in cities away from the
traditional core markets (Preimesberger, 2015). Yesilyurt and Yalman (2016) suggest
that this model has become more desirable for all institutions, organizations and for
personal use thanks to the storage of ‘valuable information’ at low costs, access to such
information from anywhere in the world, as well as its ease of use and low cost (Ye-
silyurt and Yalman, 2016). The proprietary rating system begins with Tier 1 data cen-
tres, which are basically warehouses with power and ends with Tier 4 data centres,
which offer 2N redundant power and cooling in addition to a 99.99% uptime guarantee
(Colocationamerica.com). Arno et al., (2012) state that the Tier classifications provide
guidelines and a gradient scale of data centre designs, that can be used in conjunction
with reliability engineering to design or evaluate an existing critical facility (Arno et
al., 2012).




                                             260
Smart Factory and Robotics
                                                                                         5


 2.2      Types of Data Centres

     Data Centre Hosting is provided by a facility that stores and maintains servers and
 applications for clients and it can help companies reduce capital expenditures and ac-
 celerate the implementation of technology with on-demand services (Cyrusone.com).
 Guo et al., (2017) outline that colocation data centres who rent out spaces to multiple
 tenants to house their servers, are another important but under-explored type of data
 centre (Guo et al., 2017). Masoud et al., (2017) state that internet exchange points
 (IXPs) emerged to remedy the deficiency of peering connections among autonomous
 systems (ASes) and play an important role in reducing the cost of transit connections
 over the Internet (Masoud et al., 2017). It is outlined by Benson et al., (2010) that as
 data centres become increasingly central in Internet communications, both research and
 operations communities have begun to explore how to better design and manage them
 (Benson et al., 2010). Security and privacy of data are some of the most important issues
 of cloud data services (Tang et al., 2016). It is noted by Silverman (2016) that in No-
 vember 2015, Target settled with the consumer class for $10 million plus $6.75 million
 in attorney's fees. In May 2016, it settled with the last third of the issuing banks for
 nearly $60 million, with just under $20 million in fees and expenses for plaintiffs' coun-
 sel following their data breach. Silverman (2016) further notes that Home Depot settled
 its consumer claims at $19.5 million for damages and prevention plus around $8.5 mil-
 lion in fees and costs (Silverman, 2016).


 2.3      E-Waste

     As of 2010, the Environmental Protection Agency, according to Dewey (2013) re-
 ported that of the 2,440,000 tons of disposed of technology waste which included com-
 puters, monitors, hard copy devices, keyboards and mice, televisions, mobile devices
 and TV peripherals, 1,790,000 tons were sent to landfill and only 649,000 tons, or 27%,
 was recycled (Dewey, 2013). Rosenfeld and Feng (2011) convey that electronic waste
 is responsible for 70% of the heavy metals (including mercury and chromium) found
 in landfills (Rosenfeld and Feng, 2011). In January 2003, the EU issued a directive on
 E-waste to deal with increasing quantities and the included hazardous components (Fa-
 vot and Marini, 2013). It is claimed by Peagam et al., (2013) that very little business to
 business WEEE is reported as collected in the EU in compliance with the WEEE Di-
 rective, which uses the policy principle of extended producer responsibility (EPR) to
 ensure that WEEE is managed correctly (Peagam et al., 2013). A series of reports re-
 vealed that such major E-waste flows reach China, India, Pakistan, Ghana and Nigeria,
 outlined by Kuper and Hojsik (2008) that in these countries, refurbishment and recy-
 cling activities are mostly carried out by the informal E-waste sector, which is charac-
 terized by poor working conditions with insufficient management of hazardous sub-
 stances leading to adverse impacts on human health and the environment (Kuper and
 Hojsik, 2008). As the world’s largest dumping ground for E-waste, much of the popu-
 lation in Guiyu, China is exposed to heavy metals due to informal E-waste recycling
 processes (Song and Li, 2015). Vick (2016) notes that data centre decommissioning has
 recently become an evolving function that is more than just IT Asset. Remanufacturing,


                                             261
                                                                           Smart Factory and Robotics
6


by taking back used products, can help firms meet environmental regulations and im-
prove economic benefits (Han et al., 2016). Ruth (2009) concludes that significant new
regulations for IT equipment disposal to stringent energy-efficiency specifications for
PCs and monitors to national standards for data centre power savings, Green IT is an
"in" topic (Ruth, 2009).


2.4    E-Waste Legislation

    Abu Bakar and Rahimifard (2008) explain that in Europe, 7.3 million tonnes of
WEEE were created in 2002 and the growth rate of WEEE is 3 to 5% per annum, with
a significant amount of this waste used to be dumped into landfills without any pre-
treatment, has resulted in the introduction of a European WEEE directive (Abu Bakar
and Rahimifard, 2008). Manhart (2011) records that in the last decade, electrical and
electronic equipment (EEE) such as computers, mobile phones and DVD players, in-
creasingly became mass products in emerging economies and even developing coun-
tries (Manhart, 2011).


2.5    IT Asset Disposition (ITAD)

    Disposal or Excess Inventory Management (including Remarketing and Consign-
ment), is about closing or merging a data centre without a huge loss to your company’s
revenue (Vick, 2016). IT asset disposal is getting rid of personal computers, servers and
other obsolete or unneeded devices in a secure and environmentally sound manner
(Carr, 2007). Haas et al., (2015) outline that the circular economy is a simple, but con-
vincing, strategy, which aims at reducing both input of virgin materials and output of
wastes by closing economic and ecological loops of resource flows (Haas et al., 2015).
There is a window of opportunity to escape the “dump regime”, dumps are being chal-
lenged by the circular economy, which has established instability in the “dump regime”,
(Johansson et al., 2012). Diabat et al., (2013) outline that remanufacturing is the basis
of profit-oriented reverse logistics in which recovered products are restored to a mar-
ketable condition in order to be resold to the primary or secondary market (Diabat et
al., 2013). Paterson et al., (2017) state that remanufacturing is a product recovery strat-
egy resulting in end of life products being returned to as new condition or better and
receiving a warranty at least equivalent to the original (Paterson et al., 2017). It is stated
by McKeen and Smith (2010) that Total Cost of Ownership (TCO) advocates for a
holistic view of IT costs across the enterprise over time, grouped into a series of direct
and indirect cost. Knowing the full costs allows organizations to make optimal deci-
sions regarding the enhancement, retirement, renewal and/or replacement of critical IT
assets (McKeen and Smith, 2010). Shin et al., (2013) state that conventional data cen-
tres, based on wired networks, entail high wiring costs, suffer from performance bot-
tlenecks and have low resilience to network failures (Shin et al., 2013). Saran (2013)
outlines that tackling energy efficiency in a datacentre’s operations is the main way to
limit its carbon footprint and the cooling system is the biggest culprit in terms of inef-
ficiency (Saran, 2013). Hou et al., (2013) conclude that many IT service providers are


                                              262
Smart Factory and Robotics
                                                                                            7


 in dire need of new servers that can support their applications/services efficiently while
 keeping the cost of their data centres under control (Hou et al., 2013).


 2.6      Frankfurt and Amsterdam Data Centres

    The combined material weight of the servers, networks and storage systems in the
 German data centres is 37,500 tonnes, whereas the total product weight of all terminals
 comes to 134,300 tonnes (Fichter and Hintemann, 2014). Frankfurt data centres are
 among the world’s most carrier-dense with DE-CIX Frankfurt, the largest Internet ex-
 change point in the world (Equinix.com). DE-CIX Frankfurt, the flagship in a family
 that includes facilities in New York, Istanbul and Dubai is the No.1 Internet traffic hub
 on the continent, during peak traffic times, the exchange can move data at a rate equiv-
 alent to processing 4 billion emails per second (Hackett, 2015). Telecomworldwire.com
 claim that Amsterdam is a digital gateway, allowing businesses to reach 80% of Europe
 within 50 milliseconds (Telecomworldwire.com). Hackett (2015) concludes that geo-
 graphically situated, between several important digital destinations, Frankfurt, London
 and Paris, the Amsterdam Internet Exchange serves as one of the biggest traffic routers
 in the world, channelling roughly 700,000 terabytes a month (Hackett, 2015).


 2.7      General Data Protection Regulations (GDPR)

    Directive 95/46/EC on the protection of individuals with regard to the processing of
 personal data and on the free movement of such data (the “Data Protection Directive”
 or the “Directive”) was adopted as a legislative measure in October 1995 (Carey, 2010).
 The Federal Data Protection Commissioners (2017) notes that the current European
 Data Protection Directive will be replaced in May 2018 (Ec.europa.eu). Zhang and
 Dong (2016) remark that to ensure the security of the outsourced data, data users need
 to periodically check data integrity (Zhang and Dong, 2016). It is explained by Rasheed
 (2014) that for many companies the remaining barriers to adopting cloud computing
 services are related to security and one of these security issues is the lack of auditability
 for various aspects of security in the cloud computing environment (Rasheed, 2014).
 That concludes the Literature Review and the next section presents the Methodology
 for this research study.


 3        Methodology

 3.1      Case Study Research
    Yin (2009: 18) defines a case study as “an empirical inquiry that investigates a con-
 temporary phenomenon in depth and within its real-life context, especially when the
 boundaries between phenomenon and context are not clearly evident”, (Yin, 2009: 18).
 There is a need to clarify and unify the understanding of what is meant by a case study
 pointed out by Runeson et al., (2012) and how a good case study is conducted and
 reported (Runeson et al., 2012).

                                               263
                                                                      Smart Factory and Robotics
8


3.2    The Methodology and Strategy for this Research Study

   This study was exploratory in nature and after an extensive review of the existing
work in the area, in was believed that a post-positivistic approach was the best method
that would afford the most integral range of new data to develop new findings for this
research study. A qualitative research approach was considered as the best way to ac-
complish the research objectives outlined earlier in this paper. Given the research ob-
jectives and the research question that needed to be addressed, the researchers believed
however, that a quantitative approach would not generate the rich quality of data re-
quired for this research study, hence, the qualitative path. A thorough review of sec-
ondary research through peer review academic journals, books, newspaper articles, in-
dustry specific magazines, official government statistics, doctorate dissertations, con-
ference publications and internet websites were undertaken. From this, to create a pro-
cess of gathering information from the primary sources, semi structure interviews were
undertaken. First, five semi structured face to face interviews were undertaken with
the board of management of the company at the core of this study – Wisetek, and then,
twelve semi-structured face to face interviews with senior executives in data centres
who had significant experience in the filed were completed. A pilot interview was
conducted first to check for any research issues and to illuminate biased and ensure
reliability and validity.


3.3    The Data Collection Process

   A list of interviewees was developed that would best provide the primary data results
needed to achieve the objectives of this research study. The sample of the interviewees
was purposely selected and directed at senior management in relation to their academic
qualifications and business experience within data centres specifically. The interview-
ees were geographically located in the data centre hubs of Frankfurt and Amsterdam
and in Boston, Massachauttes in the USA. An interview guide consisting of four ques-
tions was prepared for the management of Wisetek to obtain a macroenvironmental
overview of the services of Wisetek for data centres and microenvironmental overview
of Wisetek. The questions were discussed in detail and then pilot tested with a business
advisor in the field. From the results of the pilot test, there was obvious ambiguity in
one of the questions that was asked. The questions were then adjusted to allow the
participants a clear understanding of how to answer. These researchers then proceeded
to carry out the interviews with the management of Wisetek. The same process was
followed for the twelve other participants from the data centres. A test was undertaken
with an expert in the field to gains insights and to improve the guide. A concluding
interview guide of 10 questions was finalised after the pilot process. The researchers
believed that these questions were clear and easy to understand and would provide val-
uable primary data for this research study.




                                           264
Smart Factory and Robotics
                                                                                         9


 3.4      Data Analysis

    There are seven key methods of analysis, four of which are the pattern-based meth-
 ods of thematic analysis, interpretative phenomenological analysis, grounded theory
 and pattern-based discourse analysis (Braun, 2013). Coding and categorising are ways
 of analysing that can be applied to all sorts of data and are not focused on a specific
 method of data collection as pointed out by (Flick, 2007a). This is not the only way of
 analysing data, but it is the most prominent one, if the data result comes from inter-
 views, focus groups or observations. The main activities are to search for relevant parts
 of the data and to analyse them by comparing them with other data and by naming and
 classifying them (Flick, 2007a). Thematic analysis focuses on the data at hand (Rosen-
 blatt, 2015) rather than demanding a process of repeated analysis, repeated grounds of
 data gathering and multiple stages of theory development. Flick (2007b) notes that for
 the design of case study triangulation, similar questions arise as for designs in qualita-
 tive research in general. Triangulation can be used in the context of one of the basic
 designs in qualitative research. You can plan a case study using a variety of data sorts
 or different methods or theoretical approaches.


 4        Main Findings and Discussion

 4.1      Competitive Edge

    Supporting (Han et al., 2016; Paterson et al., 2017), this current research has found
 that Wiseteks’ services provide a competitive edge for data centres from their quality,
 efficiency, innovation and customer responsiveness in services of data sanitisation and
 remanufacturing. This current research has found that 83% of respondents determine
 that the circular economy and remanufacturing provide a competitive edge to data cen-
 tres through providing end of life value to the IT assets, converting end of life assets
 into revenue and decreasing the cost of replacement assets. Similar to Jayaram and Xu
 (2016) who found that firms that have a closer alignment between external and internal
 knowledge appear to excel in both quality and efficiency (Jayaram and Xu, 2016).


 4.2      Influencers of Change
    In support of (Favot and Marini, 2013; Peagam et al., 2013) this current research
 study has found that the key core influencers of change for data centres are from the
 changes in technology and legislation. There exists an environment of responsible re-
 cycling and of green IT and green computing in companies. This current research has
 found that 66% of respondents determine that legislation is the key core influencer of
 change while 33% of respondents believe that with the growth of data centres, scaling,
 cost reduction and getting value is the key core influencer of change. Seeberger et al.,
 (2016) previously found that the USA is a major producer of E-waste, although its man-
 agement practice and policy regulation are not sufficient to meet the challenge.



                                             265
                                                                       Smart Factory and Robotics
10


4.3    Exporting of Competency

   In line with (Clegg, 2011; Eicher, 2016; Joardar et al., 2014), this current research
study has found that the exporting of competency as assessed in Wisetek is through
auditing the standards set by Wisetek and the consistency in the facilities in geographic
regions. This current research has found that 66% of respondents believe that auditing
of facilities is how the exporting of competency is viewed. Hillier (2016) previously
outlined that the acquisition of one firm by another is, of course, an investment made
under uncertainty and the basic principles of valuation apply. One firm should acquire
another only if doing so generates a positive net present value for the acquiring firm
(Hillier, 2016).


4.4    Competency Assessment

    In line with (Cadle et al., 2014; Gander, 2017; Gębczyńska, 2016), this current re-
search study has found that competency is assessed in Wisetek internally and externally
through their critical success factors (CSF’s), key performance indicators (KPI’s), Lean
manufacturing and certification programmes. This research found that 60% of partici-
pants believe that Wisetek’s competency is assessed through their certification and
manufacturing. It has been previously highlighted by Zhang et al., (2016) that Lean
Manufacturing has a higher implementation rate than Six Sigma in the logistics indus-
try. This is because process variations, what Six Sigma tackles, are often not a main
concern in logistics processes due to the absence of physical transformation (Zhang et
al., 2016).


4.5    Understanding of IT Asset Disposition

   Supporting (Carr, 2007; Haas et al., 2015; Johansson et al., 2012) this current re-
search has found that IT Asset Disposition is understood as the disposal of switches and
servers other unwanted IT equipment from data centres. This current research has found
that 100% of respondents in Germany and The Netherlands determine that the IT Assets
need to have their data shredded before disposal to eliminate the risk of data breaches.
It has been outlined by Lowe (2011) that a critically important part of data lifecycle
management is destroying data at the end of a medium's useful life. If this step is over-
looked, it can lead to disastrous results. Recommended methods for destroying data on
magnetic media are shredding, degaussing, department of defence level data overwrite,
smelting and encryption from the beginning (Lowe, 2011).


4.6    The Services Expected from an IT Asset Disposition Services Company

   In support of (Tang et al., 2016; Silverman, 2016;) this current research found that
services expected from an IT Asset Disposition Services Company are a full service of
in house certified data destruction of sensitive equipment containing private and pro-
tected data. This current research found that 100% of respondents from Germany and
50% of respondents from The Netherlands believe that destruction of data and handling

                                            266
Smart Factory and Robotics
                                                                                       11


 of private and protected data is the top priority. It is stated by Salisch and Mayfield
 (2017) that the financial, operational and reputational damage from a data breach can
 be enormous and can imperil the very existence of a breached organisation (Salisch and
 Mayfield, 2017).


 4.7      Capital expenditure v running cost expenditure

    In support of (Hou et al., 2013; McKeen and Smith, 2010; Saran, 2010), another
 finding of this current research is the importance of capital expenditure v running cost
 expenditure in decision making, when evaluating IT Asset purchase provides variable
 information. This current research has found that 40% of respondents in Germany and
 100% of respondents in The Netherlands believe that OPEX and total cost of ownership
 (TCO) is becoming more important in evaluating IT Assets. According to Gendron
 (2014) when IT infrastructure are acquired, they are traditionally treated as CAPEX.
 They are recorded as an asset on the balance sheet and depreciated over time. Buying
 infrastructure for in-house installation is CAPEX and buying services from a cloud
 vendor is OPEX. There is a trade-off between CAPEX and OPEX that occurs when
 moving applications to an external cloud (Gendron, 2014).


 4.8      Corporate Social Responsibility

    In support of (Dewey, 2013; Favot and Marini, 2013; Rosenfeld and Feng, 2011),
 this current research found that Green IT is what companies want to be part of. It is
 outlined by Dalvi-Esfahani et al., (2017) that some suggestions are made to foster and
 enhance psychological drivers in order to motivate managers to adopt Green IT in or-
 ganisations, though there is a need to formulate proper strategies and educational meth-
 ods to reinforce individual factors of decision-makers more towards environmental sus-
 tainability (Dalvi-Esfahani et al., 2017).


 4.9      Benefits for the Data Centre Market
    In support of (Carr, 2007; Johansson et al., 2012), this current research found that
 the benefits to the data centre market, from and ITAD services company are, that it
 generates value and provides a competitive advantage to data centres. Contrary to Shin
 et al., (2013) noting that data centres have performance bottlenecks and have low resil-
 ience to network failures. This current research has found that 40% of participants from
 Germany and 50% of participants from The Netherlands believe that income from the
 disposal of E-waste is a benefit for the data centre market. It was previously stated by
 Shuva et al., (2016) that E-waste can be viewed as a resource for metals, as it does not
 only contain the common metals like iron (Fe), aluminium (Al), lead (Pb) and copper
 (Cu) but also traces of precious and rare elements such as gold (Au), silver (Ag), tin
 (Sn), selenium (Se), tellurium (Te), platinum (Pt), palladium (Pd), tantalum (Ta), cobalt
 (Co) and indium (In). The recovery of these trace elements is vital, not just because it
 has high commercial values, but also for resource efficiency (Shuva et al., 2016).


                                             267
                                                                           Smart Factory and Robotics
12


4.10   Certification Programme

    In line with Peagam et al., (2013) and Ruth (2009) another important finding of the
current research is the value of a certification programme. It provides assurance that
compliance with regulations is met. This current research has found that 100% of par-
ticipants from Germany and The Netherlands believe that a certificate programme will
motivate and help the industry as long as the certification has meaning and will add
value. Renckens (2015) that non-state certification programmes can emerge as a result
of both failed or absent governmental regulation and international cooperation, the case
of E-waste recycling certification shows that even when an international agreement
with widespread membership exists, non-state regulation covering problems dealt with
under the agreement can still emerge. Established to be used globally, these pro-
grammes do add important elements to existing public E-waste legislation in countries
that have ratified the Basel Convention or which have promulgated legislation dealing
with collection and take-back of E-waste, hazardous content of electronic devices, or
recycling practices (Renckens, 2015).


4.11   Services to build on WEEE

    In support of Abu Bakar and Rahimifard (2008) and Manhart (2011), this current
research found that 100% of participants from Germany and 50% of participants from
The Netherlands believe that services who build on the existing WEEE requirements
are to provide transparency and a clearer framework of the regulations along with inte-
grating the certificates with ISO standards. “It has been previously highlighted by Khan
et al., (2014) that key players particularly the developing countries, should have a voice
in the decision of WEEE management. It is important to have a neutral arena where the
solution for WEEE management can be achieved by mutual consultation (Khan et al.,
2014).


4.12   Changes and trends in collection targets
   Contrary to (Favot and Marini, 2013; Peagam et al., 2013; Ruth, 2009), this current
research has found that 60% of participants from Germany and 25% of participants
from The Netherlands are aware of focus groups that are working on E-waste legislation
and they are unaware of any lobby groups that are dedicated to collection targets. It has
been previously stated by Atasu et al., (2016) that the issue of the disposal of waste
electrical and electronic equipment (WEEE), firms are frequently unaware of the threats
posed by such legislation, poor at anticipating its provisions and effects, and generally
not very skilful at representing their interests in the political process (Atasu et al., 2016).


4.13   Data protection for end of life equipment

  In support of (Carey, 2010; Ec.europa.eu; Rasheed, 2014; Zhang and Dong, 2016),
another important finding of this current research is the stringent controls and rigorous
audits of returned material to protect against data breaches. This current research found

                                               268
Smart Factory and Robotics
                                                                                         13


 that 60% of participants from Germany and 75% of participants from The Netherlands
 have procedures in place to prevent data breaches of end of life equipment. It is stated
 by Martin et al., (2017) that transparency and control in a firms’ data management prac-
 tices can suppress the negative effects of customer data vulnerability. Mere access to
 personal data inflates feelings of violation and reduces trust. The negative effects, as
 well as spillover vulnerabilities from rival firms’ breaches, on firm performance. The
 severity of the breach hurts the local firm but helps the rival firm (Martin et al., 2017).


 4.14     Remanufacturing as a Key Business Driver

    In support of (Han et al., 2016; Paterson et al., 2017; Robinson, 2014; Xiong et al.,
 2016), another important finding of this current research is that remanufacturing is a
 key business driver. This current research found that 60% of participants from Germany
 and 25% of participants from The Netherlands believe that remanufacturing is a cost
 driver that facilitates pricing models. It is stated by Kwak and Kim (2017) that the po-
 tential of generating green profits through remanufacturing needs to be supported by
 optimal pricing and production planning. Potential concerns and barriers to OEM re-
 manufacturing, which include unproven economic profitability and the environmental
 sustainability of remanufacturing, imbalance between the supply of end-of-life prod-
 ucts and demand for remanufactured products and the risk of cannibalizing new product
 sales (Kwak and Kim, 2017). This concludes the discussion of the main findings. The
 next section presents the recommendations and final comments.


 5        Conclusion

    This research study has evaluated Wisetek as an international organisation operating
 in different key geographic regions. The operational excellence has been the most dis-
 tinct value associated with the success of the company to date, however, as an interna-
 tional organisation, there are many challenges for Wisetek operating in a global market,
 with significant competition from other large players. This research study has deter-
 mined that it is imperative for the future success of Wisetek to expand and enhance its
 shareholder value. There is an immense opportunity to develop innovative strategies
 that will enhance the ability for Wisetek to grow in Europe and Wisetek should com-
 mence a plan to transfer their competencies into Germany and The Netherlands. The
 marketing of Wisetek needs to focus on becoming more visual in these geographic re-
 gions and not, however, just during times when organisations require their services.
 The marketing expertise and budgets that larger competitors of Wisetek possess sug-
 gests that these competitors will continue to be a visual presence in the target markets
 and on a global stage. Wisetek cannot underestimate the influence that high profile or-
 ganisations can have on the market of the country that they are operating in.




                                              269
                                                                              Smart Factory and Robotics
14


6      References
 1. Abu Bakar, M. S. and Rahimifard, S. (2008) “An integrated framework for planning of re-
    cycling activities in electrical and electronic sector”, International Journal of Computer In-
    tegrated Manufacturing, 21(6), pp. 617-630.
 2. Alshamsi, A. and Diabat, A. (2015) “A reverse logistics network design”, Journal of Manu-
    facturing Systems, pp. 589-598.
 3. Arno, R., Friedl, A., Gross, P. and Schuerger, R. J. (2012) “Reliability of Data Centers by
    Tier Classification”, IEEE Transactions on Industry Applications, 48(2), pp. 777-783.
 4. Atasu, A., van Wassenhove, L. N. and Webber, D. (2016) “Owls, Sheep and Dodos: Coping
    with Environmental Legislation”, in Atasu, A. (ed) Environmentally Responsible Supply
    Chains, Cham, Switzerland: Springer, pp. 179-197.
 5. Baldé, C., Wang, F., Kuehr, R. and Huisman, J. (2014) The global E-waste monitor, Bonn,
    Germany: United Nations University.
 6. Benson, T., Anand, A., Akella, A. and Zhang, M. (2010) “Understanding data centre traffic
    characteristics”, SIGCOMM Computer Communications, 40(1), pp. 92-99.
 7. Bojanova, I., Zhang, J. and Voas, J. (2013) “Cloud Computing”, IT Professional, 15(2), pp.
    12-14.
 8. Braun, V. (2013) Successful qualitative research: a practical guide for beginners, California,
    USA: SAGE.
 9. Cadle, J., Paul, D. and Turner, P. (2014) Business Analysis Techniques: 99 essential tools
    for success, Swindon UK: British Computer Society.
10. Carcary, M., Doherty, E. and Conway, G. (2013) “The Adoption of Cloud Computing by
    Irish SMEs - an Exploratory Study”, Electronic Journal of Information Systems Evaluation,
    16(4), pp. 258-269.
11. Carey, P. (2010) Data Protection: A Practical Guide to Irish and EU Law, Dublin: Round
    Hall.
12. Carr, D. F. (2007) “I.T. Asset Disposal”, Baseline, (76), pp. 61-61, available at
    http://search.ebscohost.com/login.aspx?di-
    rect=true&db=bch&AN=26451857& site=ehost-live&scope=site, ac-
    cessed at 12:14, 12th February.
13. Ceballos, D. M. and Dong, Z. (2016) “The formal electronic recycling industry: Challenges
    and opportunities in occupational and environmental health research”, Environment Inter-
    national, 95, pp. 157-166.
14. Clegg, S. (2011) Strategy: theory & practice, London, UK: SAGE.
15. Colocationamerica.com “Data Center Tier Rating Breakdown - Tier 1, 2, 3, 4 – CLA”, avail-
    able at https://www.colocationamerica.com/data-centre/tier-standards-overview.htm, ac-
    cessed at 18:50, 6th June.
16. 16. Cyrusone.com “Data Center Hosting - Definition of Data Center Hosting”, available at
    https://cyrusone.com/resources/glossary/data-centre-hosting/, accessed at 14:29, 23rd April.
17. 17. Dalvi-Esfahani, M., Ramayah, T. and Nilashi, M. (2017) “Modelling upper echelons’
    behavioural drivers of Green IT/IS adoption using an integrated Interpretive Structural Mod-
    elling – Analytic Network Process approach”, Telematics and Informatics, 34(2), pp. 583-
    603.
18. Dasgupta, G., Sharma, A., Verma, A., Neogi, A. and Kothari, R. (2011) “Workload Man-
    agement for Power Efficiency in Virtualized Data Centres”, Communications of the ACM,
    54(7), pp. 131-141.




                                                270
Smart Factory and Robotics
                                                                                                 15


 19. De los Rios, I. C. and Charnley, F. J. S. (2016) “Skills and capabilities for a sustainable and
     circular economy: The changing role of design”, Journal of Cleaner Production, available at
     https://cit.summon.serialssolutions.com
 20. Dewey, C. (2013) “Coping with technology graveyards”, Grand Rapids Business Journal,
     31(15), pp. 15-15.
 21. Diabat, A., Abdallah, T., Al-Refaie, A., Svetinovic, D. and Govindan, K. (2013) “Strategic
     Closed-Loop Facility Location Problem with Carbon Market Trading”, IEEE Transactions
     on Engineering Management, 60(2), pp. 398-408.
 22. Eicher, S. (2016) Corruption in International Business: The Challenge of Cultural and Legal
     Diversity, London, UK: Gower.
 23. Favot, M. and Marini, A. (2013) “A Statistical Analysis of Prices of Electrical and Electronic
     Equipment after the Introduction of the WEEE Directive”, Journal of Industrial Ecology,
     17(6), pp. 827-834.
 24. Fichter, K. and Hintemann, R. (2014) “Beyond Energy”, Journal of Industrial Ecology,
     18(6), pp. 846-858.
 25. Flick, U. (2007a) Designing qualitative research, London, UK: SAGE.
 26. Flick, U. (2007b) Managing quality in qualitative research, London, UK: SAGE.
 27. Flucker, S. and Tozer, R. (2013) “Data Centre Energy Efficiency Analysis to minimize total
     cost of ownership”, Building Services Engineering Research & Technology, 34(1), pp.
     103117.
 28. Fulton III, S. (2016) “IoT Could Drive Micro Data Centers for Telcos”, Data Centre
     Knowledge,            available          at        http://www.datacentreknowledge.com/ar-
     chives/2016/08/29/iotcould-drive-micro-data-centres-for-telcos/, accessed at 12:13, 12th
     April.
 29. Gander, J. (2017) Strategic analysis: a creative and cultural industries perspective, Abing-
     don, Oxon, UK: Routledge.
 30. Gębczyńska, A. (2016) “Strategy implementation efficiency on the process level”, Business
     Process Management Journal, 22(6), pp. 1079-1098.
 31. Geissdoerfer, M., Savaget, P., Bocken, N. M. P. and Hultink, E. J. (2017) “The Circular
     Economy – A new sustainability paradigm?”, Journal of Cleaner Production, 143, pp.
     757768.
 32. Gendron, M. S. (2014) Wiley and SAS Business Series: Business Intelligence and the Cloud:
     Strategic Implementation Guide, New Jersey, USA: Wiley.
 33. Gonul Kochan, C., Pourreza, S., Tran, H. and Prybutok, V. R. (2016) “Determinants and
     logistics of E-waste recycling”, The International Journal of Logistics Management, 27(1),
     pp. 52-70.
 34. Guo, Y., Li, H. and Pan, M. (2017) “Colocation Data Centre Demand Response using Nash
     Bargaining Theory”, IEEE Transactions on Smart Grid, pp. (99), pp. 1-1, available at
     http://ieeexplore.ieee.org.cit.idm.oclc.org/document/7803550/, accessed at 12:12, 11th Feb-
     ruary.
 35. Haas, W., Krausmann, F., Wiedenhofer, D. and Heinz, M. (2015) “How Circular is the
     Global Economy?: An Assessment of Material Flows, Waste Production and Recycling in
     the European Union and the World in 2005”, Journal of Industrial Ecology, 19(5), pp. 765-
     777.
 36. Hackett, R. (2015) “International Internet Hubs”, Fortune, 171(8), pp. 265-265.
 37. Han, X., Wu, H., Yang, Q. and Shang, J. (2016) “Reverse channel selection under remanu-
     facturing risks: Balancing profitability and robustness”, International Journal of Production
     Economics, 182, pp. 63-72.



                                                  271
                                                                            Smart Factory and Robotics
16


38. Hao, M. C., Sharma, R. K., Keim, D. A., Dayal, U., Patel, C. and Vennelakanti, R. (2010)
    “Application of Visual Analytics for Thermal State Management in Large Data Centres”,
    Computer Graphics Forum, 29(6), pp. 1895-1904.
39. Heacock, M., Kelly, C. B., Kwadwo Ansong, A., Birnbaum, L. S., Bergman, Å. L., Bruné,
    M.N., Buka, I., Carpenter, D. O., Aimin, C., Xia, H., Kamel, M., Landrigan, P. J., Magalini,
    F., Diaz-Barriga, F., Neira, M., Omar, M., Pascale, A., Ruchirawat, M., Sly, L. and Sly, P.
    D. (2016) “E-waste and Harm to Vulnerable Populations: A Growing Global Problem”, En-
    vironmental Health Perspectives, 124(5), pp. 550-555.
40. Hillier, D. (2016) Corporate finance, New York, USA: McGraw-Hill Education.
41. Hou, R., Jiang, T., Zhang, L., Qi, P., Dong, J., Wang, H., Gu, X. and Zhang, S. (2013) “Cost
    effective data centre servers”. IEEE 19th International Symposium on High Performance
    Computer Architecture (HPCA), 23-27 Feb. 2013, 179-187.
42. Huff, A. S. (2009) Designing research for publication, California, USA: SAGE, p. 348.
43. Jayaram, J. and Xu, K. (2016) “Determinants of quality and efficiency performance in ser-
    vice operation”, International Journal of Operations & Production Management, 36(3), pp.
    265
44. Joardar, A., Kostova, T. and Wu, S. (2014) “Expanding international business research on
    foreignness”, Management Research Review, 37(12), pp. 1018-1025.
45. 45. Johansson, N., Krook, J., Eklund, M., Linköpings, U. and Tekniska, H., (2012). “Trans-
    forming dumps into gold mines. Experiences from Swedish case studies”, Environmental
    Innovation and Societal Transitions, 5, pp. 33-48.
46. Jones, P., Hillier, D., Comfort, D. and Clarke-Hill, C. (2013) “Towards sustainable data
    centre operations in the UK”, Journal of Property Investment & Finance, 31(1), pp. 89-100.
47. Katz, R. H. (2009) “Tech Titans Building Boom” IEEE Spectrum, available at http://spec-
    trum.ieee.org/green-tech/buildings/tech-titans-building-boom, accessed at 17:03, 7th Febru-
    ary.
48. Khan, S. S., Lodhi, S. A., Akhtar, F. and Khokar, I. (2014) “Challenges of waste of electric
    and electronic equipment (WEEE): Toward a better management in a global scenario”, Man-
    agement of Environmental Quality: An International Journal, 25(2), pp. 166-185.
49. Kuper, J. and Hojsik, M. (2008) Poisoning the poor: electronic waste in Ghana, Amsterdam:
    Greenpeace.
50. Kwak, M. and Kim, H. (2017) “Green profit maximization through integrated pricing and
    production planning for a line of new and remanufactured products”, Journal of Cleaner
    Production, 142, pp. 3454-3470.
51. Lewandowski, M. (2016) “Designing the Business Models for Circular Economy - Towards
    the Conceptual Framework”, Sustainability, 8(1), pp. 43.
52. Lieder, M. and Rashid, A. (2016) “Towards circular economy implementation: a compre-
    hensive review in context of manufacturing industry”, Journal of Cleaner Production, 115,
    pp. 36-51.
53. Lowe, S. (2011a) “Five ways to intentionally destroy your data” TechRepublic, available at
    http://www.techrepublic.com/blog/the-enterprise-cloud/five-ways-to-intentionally-destroy-
    your-data/, accessed at 20:40, 18th May.
54. Martin, K. D., Borah, A. and Palmatier, R. W. (2017) “Data Privacy: Effects on Customer
    and Firm Performance”, Journal of Marketing, 81(1), pp. 36-58.
55. Masoud, M., Jaradat, Y. and Jannoud, I. (2017) “A measurement study of internet exchange
    points (IXPs): history and future prediction”, Turkish Journal of Electrical Engineering &
    Computer Sciences, 25, pp. 376-389.
56. Manhart, A. (2011) “International Cooperation for Metal Recycling from Waste Electrical
    and Electronic Equipment”, Journal of Industrial Ecology, 15(1), pp. 13-30.


                                               272
Smart Factory and Robotics
                                                                                              17


 57. McGaughey, S. L., Kumaraswamy, A. and Liesch, P. W. (2016) “Institutions, entrepreneur-
     ship and co-evolution in international business”, Journal of World Business, 51(6), pp. 871-
     881.
 58. McKeen, J. D. and Smith, H. A. (2010) “Developments in Practice XXXVII: Total Cost of
     Ownership”, Communications of the Association for Information Systems, 27, pp. 627-636.
 59. Olariu, I. (2014) “An Overview on Retail Reverse Logistics”, Studies and Scientific Re-
     searches. Economics Edition, (19).
 60. Olufowote, J. (2017) “Limitations of Research”, in Allen, M. (ed) The SAGE Encyclopaedia
     of Communication Research Methods, California, USA: SAGE.
 61. Paterson, D. A. P., Ijomah, W. L. and Windmill, J. F. C. (2017) “End-of-Life decision tool
     with emphasis on Remanufacturing”, Journal of Cleaner Production, available at
     http://dx.doi.org.cit.idm.oclc.org/10.1016/j.jclepro.2017.02.011, accessed at 18:57, 20th
     February.
 62. Peagam, R., McIntyre, K., Basson, L. and France, C. (2013) “Business-to-Business Infor-
     mation Technology User Practices at End of Life in The United Kingdom, Germany and
     France”, Journal of Industrial Ecology, 17(2), pp. 224-237.
 63. Preimesberger, C. (2015) “Why Edge Data Centres Play an Increased Role in Global Con-
     nectivity”, eWeek, pp. 1-1.
 64. Rasheed, H. (2014) “Data and infrastructure security auditing in cloud computing environ-
     ments”, International Journal of Information Management, 34(3), pp. 364.
 65. Remanufacturing.eu “The European Remanufacturing Network – ERN”, available at
     https://www.remanufacturing.eu/wp-content/uploads/2016/01/study.pdf, accessed at 14:40,
     25th February.
 66. Renckens, S. (2015) “The Basel Convention, US politics and the emergence of non-state E-
     waste recycling certification” International Environmental Agreements: Politics, Law and
     Economics, 15(2), pp. 141-158.
 67. Robinson, A. (2014) “What is Reverse Logistics? Is It Different than Traditional Logis-
     tics?”, available at http://cerasis.com/2014/02/19/what-is-reverse-logistics/, accessed at
     16:45, 23rd February.
 68. Rosenfeld, P. E. and Feng, L. (2011) The Risks of Hazardous Wastes, Oxford, UK: William
     Andrew.
 69. Rouse, M. (2010) “What is data centre?”, Techtarget, available at http://searchdatacen-
     tre.techtarget.com/definition/data-centre, accessed at 13:05, 9th February.
 70. Runeson, P., Host, M., Rainer, A., Regnell, B. (2012) Case Study Research in Software
     Engineering: Guidelines and Examples, New Jersey, USA: Wiley.
 71. Ruth, S. (2009) “Green IT More Than a Three Percent Solution?”, IEEE Internet Computing,
     13(4), pp. 74-78.
 72. Salhofer, S., Steuer, B., Ramusch, R. and Beigl, P. (2016) “WEEE management in Europe
     and China – A comparison”, Waste Management, 57, pp. 27-35.
 73. Salisch, W. J. and Mayfield, M. (2017) “Multi-layered security: ten important steps to pro-
     tect your business data”, Film Journal International, 120(4), pp. 88 – 90.
 74. Sapdatacentre.com “How a Data Centre Works”, available at http://www.sapdatacen-
     tre.com/article/data_centre_functionality/, accessed at 17:18, 6th February.
 75. Saran, C. (2013) “Driving Datacentre Efficiency to Meet Future Demand”, Computer
     Weekly, pp. 16-19.
 76. Seeberger, J., Grandhi, R., Kim, S. S., Mase, W. A., Reponen, T., Ho, S.-m. and Chen, A.
     (2016) “E-waste management in the United States and public health implications”, Journal
     of Environmental Health, 79(3), pp. 8.



                                                273
                                                                             Smart Factory and Robotics
18


77. Shin, J. Y., Sirer, E., Weatherspoon, H. and Kirovski, D. (2013) “On the feasibility of com-
    pletely wireless datacentres”, IEEE/ACM Transactions on Networking (TON), 21(5), pp.
    1666-1679.
78. Shuja, J., Madani, S., Bilal, K., Hayat, K., Khan, S. and Sarwar, S. (2012) “Energy-efficient
    data centres”, Computing, 94(12), pp. 973-994.
79. Shuva, M. A. H., Rhamdhani, M. A., Brooks, G. A., Masood, S. and Reuter, M. A. (2016)
    “Thermodynamics data of valuable elements relevant to E-waste processing through primary
    and secondary copper production: a review”, Journal of Cleaner Production, 131, pp. 795-
    809.
80. Silverman, D. L. (2016) “Developments in data security breach liability”, Business Lawyer,
    72(1), pp. 185.
81. Song, Q. and Li, J. (2015) “A review on human health consequences of metals exposure to
    E-waste in China”, Environmental Pollution, 196, pp. 450-461.
82. Tang, J., Cui, Y., Li, Q., Ren, K., Liu, J. and Buyya, R. (2016) “Ensuring Security and Pri-
    vacy Preservation for Cloud Data Services”, ACM Computing Surveys, 49(1), pp. 1-39.
83. Timmermans, K. (2016) “Digital supply chains connect circular economy”, Logistics Man-
    agement, 55(5), pp. 18-19.
84. Telecomworldwire.com “Equinix invests USD113 million in new Amsterdam data centre”,
    available             at          http://search.ebscohost.com.cit.idm.oclc.org/login.aspx?di-
    rect=true&db=bwh&AN= 6DUU2825201956&site=ehost-live, accessed at
    18:33, 25th January.
85. Vick, J. (2016) “Data Centre Decommissioning - AER Worldwide Aftermarket, ITAD and
    Reverse Logistics services”, available at http://www.aerworldwide.com/datacentredecom-
    missioning/, accessed at 15:21, 30th January.
86. Wang, G. T. and Park, K. (2015) Student Research and Report Writing: From Topic Selec-
    tion to the Complete Paper, Chichester, UK: Wiley-Blackwell.
87. Wiles, R. (2012) What are Qualitative Research Ethics?, London, UK: Bloomsbury Publish-
    ing, p. 4.
88. Wood, T. (2011) Improving data centre resource management, deployment and availability
    with virtualization, Doctor of Philosophy (PhD), Massachusetts, USA: University of Mas-
    sachusetts Amherst.
89. Woods, J. (2014) “The evolution of the data centre: Timeline from the Mainframe to the
    Cloud”, Silicone Angle, available at http://siliconangle.com/blog/2014/03/05/the-evolution-
    ofthe-data-centre-timeline-from-the-mainframe-to-the-cloud-tc0114/, accessed at 16:59,
    2nd February.
90. Wisetek.net “Corporate Profile - Wisetek”, available at http://www.wisetek.net/corpo-
    rateprofile, accessed at 12:22, 25th February.
91. Xia, W., Zhao, P., Wen, Y. and Xie, H. (2016) “A Survey on Data Centre Networking
    (DCN): Infrastructure and Operations”, IEEE Communications Surveys and Tutorials, pp.
    1-1.
92. Xiong, Y., Zhao, Q. and Zhou, Y. (2016) “Manufacturer-remanufacturing vs supplier re-
    manufacturing in a closed-loop supply chain”, International Journal of Production Econom-
    ics, 176, pp. 21-28.
93. Yesilyurt, M. and Yalman, Y. (2016) “New approach for ensuring cloud computing security:
    using data hiding methods”, Sardana, 41(11), pp. 1289-1298.
94. Yin, R. K. (2009) Case study research: design and methods. Applied social research meth-
    ods, California, USA: SAGE, p. 18.
95. Zeng, X., Yang, C., Chiang, J. F. and Li, J. (2017) “Innovating E-waste management: From
    macroscopic to microscopic scales”, Science of The Total Environment, 575, pp. 1-5.


                                                274
Smart Factory and Robotics
                                                                                           19


 96. Zhang, D., Guo, H., Yang, T. and Wu, J. (2016) “Optical switching based small-world data
     centre network”, Computer Communications, available at http://www.sciencedi-
     rect.com.cit.idm.oclc.org/science/article/pii/S0140366417300051, accessed at 12:04, 11th
     February.
 97. Zhang, J. and Dong, Q. (2016) “Efficient ID-based public auditing for the outsourced data
     in cloud storage”, Information Sciences, 343-344, pp. 1-14.




                                               275