406 resultados para Conceptual-semantic relations
Resumo:
Purpose: Important performance objectives manufacturers sought can be achieved through adopting the appropriate manufacturing practices. This paper presents a conceptual model proposing relationship between advanced quality practices, perceived manufacturing difficulties and manufacturing performances. Design/methodology/approach: A survey-based approach was adopted to test the hypotheses proposed in this study. The selection of research instruments for inclusion in this survey was based on literature review, the pilot case studies and relevant industrial experience of the author. A sample of 1000 manufacturers across Australia was randomly selected. Quality managers were requested to complete the questionnaire, as the task of dealing with the quality and reliability issues is a quality manager’s major responsibility. Findings: Evidence indicates that product quality and reliability is the main competitive factor for manufacturers. Design and manufacturing capability and on time delivery came second. Price is considered as the least important factor for the Australian manufacturers. Results show that collectively the advanced quality practices proposed in this study neutralize the difficulties manufacturers face and contribute to the most performance objectives of the manufacturers. The companies who have put more emphasize on the advanced quality practices have less problem in manufacturing and better performance in most manufacturing performance indices. The results validate the proposed conceptual model and lend credence to hypothesis that proposed relationship between quality practices, manufacturing difficulties and manufacturing performances. Practical implications: The model shown in this paper provides a simple yet highly effective approach to achieving significant improvements in product quality and manufacturing performance. This study introduces a relationship based ‘proactive’ quality management approach and provides great potential for managers and engineers to adopt the model in a wide range of manufacturing organisations. Originality/value: Traditional ways of checking product quality are different types of testing, inspection and screening out bad products after manufacturing them. In today’s manufacturing where product life cycle is very short, it is necessary to focus on not to manufacturing them first rather than screening out the bad ones. This study introduces, for the first time, the idea of relationship based advanced quality practices (AQP) and suggests AQPs will enable manufacturers to develop reliable products and minimize the manufacturing anomalies. This paper explores some of the attributes of AQP capable of reducing manufacturing difficulties and improving manufacturing performances. The proposed conceptual model contributes to the existing knowledge base of quality practices and subsequently provides impetus and guidance towards increasing manufacturing performance.
Resumo:
Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.
Resumo:
Although Design Led Innovation activities aim to raise the value of design within the business, knowledge about which tools are available to support companies and how to apply them to make the connection between design for new product development and design as a strategic driver of growth is needed. This paper presents a conceptual method to supplement existing process and tools to assist companies to grow through design. The model extends the authors’ previous work to explore how through storytelling, customer observation can be captured and translated into new meaning, then creating new design propositions shaped into product needs, which can drive internal business activities, brand and the strategic vision. The paper contributes to a gap in the theoretical frameworks and literature by highlighting the need to align and scale design processes which match the needs of SME’s as they transition along a trajectory to become design led businesses.
Resumo:
A new relationship type of social networks - online dating - are gaining popularity. With a large member base, users of a dating network are overloaded with choices about their ideal partners. Recommendation methods can be utilized to overcome this problem. However, traditional recommendation methods do not work effectively for online dating networks where the dataset is sparse and large, and a two-way matching is required. This paper applies social networking concepts to solve the problem of developing a recommendation method for online dating networks. We propose a method by using clustering, SimRank and adapted SimRank algorithms to recommend matching candidates. Empirical results show that the proposed method can achieve nearly double the performance of the traditional collaborative filtering and common neighbor methods of recommendation.
Resumo:
Power relations and small and medium-sized enterprise strategies for capturing value in global production networks: visual effects (VFX) service firms in the Hollywood film industry, Regional Studies. This paper provides insights into the way in which non-lead firms manoeuvre in global value chains in the pursuit of a larger share of revenue and how power relations affect these manoeuvres. It examines the nature of value capture and power relations in the global supply of visual effects (VFX) services and the range of strategies VFX firms adopt to capture higher value in the global value chain. The analysis is based on a total of thirty-six interviews with informants in the industry in Australia, the United Kingdom and Canada, and a database of VFX credits for 3323 visual products for 640 VFX firms.
Resumo:
BACKGROUND: Emergency departments (EDs) are critical to the management of acute illness and injury, and the provision of health system access. However, EDs have become increasingly congested due to increased demand, increased complexity of care and blocked access to ongoing care (access block). Congestion has clinical and organisational implications. This paper aims to describe the factors that appear to infl uence demand for ED services, and their interrelationships as the basis for further research into the role of private hospital EDs. DATA SOURCES: Multiple databases (PubMed, ProQuest, Academic Search Elite and Science Direct) and relevant journals were searched using terms related to EDs and emergency health needs. Literature pertaining to emergency department utilisation worldwide was identified, and articles selected for further examination on the basis of their relevance and significance to ED demand. RESULTS: Factors influencing ED demand can be categorized into those describing the health needs of the patients, those predisposing a patient to seeking help, and those relating to policy factors such as provision of services and insurance status. This paper describes the factors influencing ED presentations, and proposes a novel conceptual map of their interrelationship. CONCLUSION: This review has explored the factors contributing to the growing demand for ED care, the influence these factors have on ED demand, and their interrelationships depicted in the conceptual model.
Resumo:
For more than a decade research in the field of context aware computing has aimed to find ways to exploit situational information that can be detected by mobile computing and sensor technologies. The goal is to provide people with new and improved applications, enhanced functionality and better use experience (Dey, 2001). Early applications focused on representing or computing on physical parameters, such as showing your location and the location of people or things around you. Such applications might show where the next bus is, which of your friends is in the vicinity and so on. With the advent of social networking software and microblogging sites such as Facebook and Twitter, recommender systems and so on context-aware computing is moving towards mining the social web in order to provide better representations and understanding of context, including social context. In this paper we begin by recapping different theoretical framings of context. We then discuss the problem of context- aware computing from a design perspective.
Resumo:
The Texas Department of Transportation (TxDOT) is concerned about the widening gap between preservation needs and available funding. Funding levels are not adequate to meet the preservation needs of the roadway network; therefore projects listed in the 4-Year Pavement Management Plan must be ranked to determine which projects should be funded now and which can be postponed until a later year. Currently, each district uses locally developed methods to prioritize projects. These ranking methods have relied on less formal qualitative assessments based on engineers’ subjective judgment. It is important for TxDOT to have a 4-Year Pavement Management Plan that uses a transparent, rational project ranking process. The objective of this study is to develop a conceptual framework that describes the development of the 4-Year Pavement Management Plan. It can be largely divided into three Steps; 1) Network-Level project screening process, 2) Project-Level project ranking process, and 3) Economic Analysis. A rational pavement management procedure and a project ranking method accepted by districts and the TxDOT administration will maximize efficiency in budget allocations and will potentially help improve pavement condition. As a part of the implementation of the 4-Year Pavement Management Plan, the Network-Level Project Screening (NLPS) tool including the candidate project identification algorithm and the preliminary project ranking matrix was developed. The NLPS has been used by the Austin District Pavement Engineer (DPE) to evaluate PMIS (Pavement Management Information System) data and to prepare a preliminary list of candidate projects for further evaluation.
Resumo:
In maintaining quality of life, preventative health is an important area in which the performance of pro-social behaviours provides benefits to individuals who perform them as well as society. The establishment of the Preventative Health Taskforce in Australia demonstrates the significance of preventative health and aims to provide governments and health providers with evidence-based advice on preventative health issues (Preventative Health Taskforce, 2009). As preventative health behaviours are voluntary, for consumers to sustain this behaviour there needs to be a value proposition (Dann, 2008; Kotler and Lee, 2008). Customer value has been shown to influence repeat behaviour (McDougall and Levesque, 2000), word-of-mouth (Hartline and Jones, 1999), and attitudes (Dick and Basu, 2008). However to date there is little research that investigates the source of value for preventative health services. This qualitative study explores and identifies three categories of sources that influence four dimensions of value – functional, emotional, social and altruistic (Holbrook 2006). A conceptual model containing five propositions outlining these relationships is presented. This study provides evidence-based research that reveals sources of value that influence individuals’ decisions to perform pro-social behaviours in the long-term through their use of preventative health services. This research uses BreastScreen Queensland (BSQ), a cancer screening service, as the service context.
Resumo:
As technology extends further into consumer daily lives, consumers develop significant relationships with their technology, particularly mobile devices. This conceptual paper aims to investigate the merging of consumers and their technology, termed the cyborg consumer, which has been previously overlooked in the marketing literature. More specifically, this investigation extends the marketing theories of consumer psychological motivation and ersonality traits in examining the influence of these elements on cyborg consumer behaviour, such as intensive consumption of technology and construction of an important part of the self on the Internet. A conceptual framework of the cyborg consumer is presented, which will help marketers to better understand how consumers’ relationships with technology are changing and how marketing practices can be better targeted to the cyborg consumers.
Resumo:
Problem solving courts appear to achieve outcomes which are not common in mainstream courts. There are increasing calls for the adoption of more “therapeutic” and “problem solving” practices by mainstream judges in civil and criminal courts in a number of jurisdictions, most notably in the United States and Australia. Currently, a judge who sets out to exercise a significant therapeutic function is quite likely to be doing so in a specialist court or jurisdiction, outside the mainstream court system, and, arguably, from outside the adversarial paradigm itself. To some extent, his work is tolerated but marginalized. But do therapeutic and problem solving functions have the potential to define, rather than complement, the role of judicial officers? The basic question addressed in this paper is, therefore, whether the judicial role could evolve to be not just less adversarial, but fundamentally non-adversarial. In other words, could we see--or are we seeing--a paradigm shift not just in the colloquial, casual sense of the word, but in the strong, worldview changing sense meant by Thomas Kuhn?
Resumo:
Groundwater is a major resource on Bribie Island and its sustainable management is essential to maintain the natural and modified eco-systems, as well as the human population and the integrity of the island as a sand mass. An effective numerical model is essential to enable predictions, and to test various water use and rainfall/climate scenarios. Such a numerical model must, however, be based on a representative conceptual hydrogeological model to allow incorporation of realistic controls and processes. Here we discuss the various hydrogeological models and parameters, and hydrological properties of the materials forming the island. We discuss the hydrological processes and how they can be incorporated into these models, in an integrated manner. Processes include recharge, discharge to wetlands and along the coastline, abstraction, evapotranspiration and potential seawater intrusion. The types and distributions of groundwater bores and monitoring are considered, as are scenarios for groundwater supply abstraction. Different types of numerical models and their applicability are also considered
Resumo:
This chapter proposes a conceptual model for optimal development of needed capabilities for the contemporary knowledge economy. We commence by outlining key capability requirements of the 21st century knowledge economy, distinguishing these from those suited to the earlier stages of the knowledge economy. We then discuss the extent to which higher education currently caters to these requirements and then put forward a new model for effective knowledge economy capability learning. The core of this model is the development of an adaptive and adaptable career identity, which is created through a reflective process of career self-management, drawing upon data from the self and the world of work. In turn, career identity drives the individual’s process of skill and knowledge acquisition, including deep disciplinary knowledge. The professional capability learning thus acquired includes disciplinary skill and knowledge sets, generic skills, and also skills for the knowledge economy, including disciplinary agility, social network capability, and enterprise skills. In the final part of this chapter, we envision higher education systems that embrace the model, and suggest steps that could be taken toward making the development of knowledge economy capabilities an integral part of the university experience.