289 resultados para ERP implementation
Resumo:
The use of the Sengstaken–Blakemore tube as a life-saving treatment for bleeding oesophageal varices is slowly becoming the least preferred method possibly due to the potential complications associated with its placement. Nursing practice pertaining to the care of this patient group appears ad hoc and reliant on local knowledge and experience as opposed to recognised evidence of best practice. Therefore, this paper focuses on the application of Lewin's transitional change theory used to introduce a change in nursing practice with the application of a guideline to enhance the care of patients with a Sengstaken–Blakemore tube in situ within a general intensive care unit. This method identified some of the complexities surrounding the change process including the driving and restraining forces that must be harnessed and minimised in order for the adoption of change to be successful.
Resumo:
Enterprises, both public and private, have rapidly commenced using the benefits of enterprise resource planning (ERP) combined with business analytics and “open data sets” which are often outside the control of the enterprise to gain further efficiencies, build new service operations and increase business activity. In many cases, these business activities are based around relevant software systems hosted in a “cloud computing” environment. “Garbage in, garbage out”, or “GIGO”, is a term long used to describe problems in unqualified dependency on information systems, dating from the 1960s. However, a more pertinent variation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems, such as ERP and usage of open datasets in a cloud environment, the ability to verify the authenticity of those data sets used may be almost impossible, resulting in dependence upon questionable results. Illicit data set “impersonation” becomes a reality. At the same time the ability to audit such results may be an important requirement, particularly in the public sector. This paper discusses the need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment and analyses some current technologies that are offered and which may be appropriate. However, severe limitations to addressing these requirements have been identified and the paper proposes further research work in the area.
Resumo:
Enterprise resource planning (ERP) systems are rapidly being combined with “big data” analytics processes and publicly available “open data sets”, which are usually outside the arena of the enterprise, to expand activity through better service to current clients as well as identifying new opportunities. Moreover, these activities are now largely based around relevant software systems hosted in a “cloud computing” environment. However, the over 50- year old phrase related to mistrust in computer systems, namely “garbage in, garbage out” or “GIGO”, is used to describe problems of unqualified and unquestioning dependency on information systems. However, a more relevant GIGO interpretation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems based around ERP and open datasets as well as “big data” analytics, particularly in a cloud environment, the ability to verify the authenticity and integrity of the data sets used may be almost impossible. In turn, this may easily result in decision making based upon questionable results which are unverifiable. Illicit “impersonation” of and modifications to legitimate data sets may become a reality while at the same time the ability to audit any derived results of analysis may be an important requirement, particularly in the public sector. The pressing need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment is discussed in this paper. Some current and appropriate technologies currently being offered are also examined. However, severe limitations in addressing the problems identified are found and the paper proposes further necessary research work for the area. (Note: This paper is based on an earlier unpublished paper/presentation “Identity, Addressing, Authenticity and Audit Requirements for Trust in ERP, Analytics and Big/Open Data in a ‘Cloud’ Computing Environment: A Review and Proposal” presented to the Department of Accounting and IT, College of Management, National Chung Chen University, 20 November 2013.)
Resumo:
Change is something that both pre-service and practising teachers face regularly throughout their professional lives. Curriculum change and consequential implementation is a case in point. This paper investigates the perspectives of a number of school-based stakeholders in regard to the implementation of the C2C materials in Queensland schools and how this has potential consequences for teacher education programs. It shows that often contradictory spaces emerge in regard to curriculum enactment and argues that a ‘one size fits all’ approach is not the most effective way to implement new curriculum. A transformative third space is offered whereby teachers are accorded with a voice in the way in which implementation occurs; ultimately allowing pre-service teachers to learn important skills required to be effective teachers.
Resumo:
This paper makes a formal security analysis of the current Australian e-passport implementation using model checking tools CASPER/CSP/FDR. We highlight security issues in the current implementation and identify new threats when an e-passport system is integrated with an automated processing system like SmartGate. The paper also provides a security analysis of the European Union (EU) proposal for Extended Access Control (EAC) that is intended to provide improved security in protecting biometric information of the e-passport bearer. The current e-passport specification fails to provide a list of adequate security goals that could be used for security evaluation. We fill this gap; we present a collection of security goals for evaluation of e-passport protocols. Our analysis confirms existing security weaknesses that were previously identified and shows that both the Australian e-passport implementation and the EU proposal fail to address many security and privacy aspects that are paramount in implementing a secure border control mechanism. ACM Classification C.2.2 (Communication/Networking and Information Technology – Network Protocols – Model Checking), D.2.4 (Software Engineering – Software/Program Verification – Formal Methods), D.4.6 (Operating Systems – Security and Privacy Protection – Authentication)
Resumo:
Information and Communication Technology (ICT) has been embraced with hope and optimism in both developing and developed countries. While in the developed countries most citizens have access to one or many of the devices which utilize this technology (e.g. desktop, laptop, tablet, mobile phone), in developing countries this “luxury” can only be afforded by a privileged few. The use of these technologies in primary schools in developing countries is low. This is due to the fact that there are other bigger issues that some of these countries have to grapple with such as meeting the basic health and education needs of its citizens. Quality primary education and global development partnerships are two of the eight Millennium Development Goals of the United Nations (UNDP, 2012). Many Governments, NGO’s, service organizations, and individuals in developing countries are always looking at ways in which the disparity (not just in terms of ICT) can be narrowed. There has to be a greater collaboration between stakeholders in developing and developed countries (Mutonyi & Norton, 2007). How do stakeholders from developed countries engage with partners in developing countries to deliver meaningful and relevant outcomes for primary school students using ICT? As a first step getting the key stakeholders on side is critical. In the Fijian context, schools are managed and run by committees who are members of the community. Therefore, getting the committee on side together with the head-teachers and teachers is critical. Conversations about teaching and learning with technology can then follow with greater ease. The sustainability of any innovative approaches is also an essential element of this equation. Through this lens, this chapter investigates how ICT can be implemented in primary schools in Fiji. It proposes a three-layered approach which focuses on: (1) the community, school leadership, and teachers; (2) content, pedagogy, and technology, and (3) sustainability.
Resumo:
This study was a step forward in modeling, simulation and microcontroller implementation of a high performance control algorithm for the motor of a blood pump. The rotor angle is sensed using three Hall effect sensors and an algorithm is developed to obtain better angular resolution from the three signals for better discrete-time updates of the controller. The performance of the system was evaluated in terms of actual and reference speeds, stator currents and power consumption over a range of reference speeds up to 4000 revolutions per minute. The use of fewer low cost Hall effect sensors compared to expensive high resolution sensors could reduce the cost of blood pumps for total artificial hearts.
Resumo:
This paper provides a detailed description of the current Australian e-passport implementation and makes a formal verification using model checking tools CASPER/CSP/FDR. We highlight security issues present in the current e-passport implementation and identify new threats when an e-passport system is integrated with an automated processing systems like SmartGate. Because the current e-passport specification does not provide adequate security goals, to perform a rational security analysis we identify and describe a set of security goals for evaluation of e-passport protocols. Our analysis confirms existing security issues that were previously informally identified and presents weaknesses that exists in the current e-passport implementation.
Resumo:
Introduction Guidelines existed at the Royal Children’s Hospital (RCH) to direct preoperative/pre-procedural fasting in day patients undergoing general anaesthetic. However audit, risk analyses and a recent research project at the RCH identified prolonged pre-procedural fasting times in children undergoing day surgical and gastroenterology procedures. Aims 1. Reduce median fasting time to <8 hrs for children admitted for a day procedure under general anaesthetic; 2. Identify children at risk of perioperative hypoglycaemia. Methods The study was conducted in 4 phases: 1) revision and implementation of evidence-based perioperative fasting guidelines with staff education relating to these guidelines; 2) cross-sectional descriptive study with day surgical patients (n = 377) requiring preoperative fasting. ‘Normal risk’ and ‘High risk’ groups were identified for fasting hypoglycaemia using an ‘at risk’ checklist. Venous blood glucose (BGL) testing was performed at a) anaesthetic induction; b) prior to first caloric food/fluid postoperatively; 3) chart audit to evaluate efficacy of guidelines and parent information; 4) development of recommendations for clinical practice. Results The median fasting time for children having morning surgery (14 hrs, IQ range 5–22 hrs) was twice as long compared to afternoon lists (7 hrs, IQ range 6–22 hrs) (p < 0.001). Median fasting times were not significantly different between ‘at risk’ and control groups (p = 0.496). However the proportion of children who experienced hypoglycaemia (BGL <3 mmol/L) was greater in the ‘at risk’ group (5, 8%) compared to the control group (18, 4.3%). Although not statistically significant (x2 = 2.254, p = 0.133), ‘at risk’ children appear more likely to experience hypoglycaemia as children in the control group, constituting a clinically significant finding. Conclusion Appropriate identification and management of ‘high risk’ children, will reduce the risk of deleterious sequelae in children undergoing surgical or investigative procedures requiring general anaesthesia.
Resumo:
Improved public awareness of the environment and available technologies will continue to highlight the importance of sustainable housing in the coming years. Despite this potential, the majority of new housing development in Australia is still “project homes” with few tangible sustainability measures. Stakeholders tend to have different perceptions and priorities on sustainability. To promote the uptake of sustainable housing products, a study of the critical issues affecting the implementation of sustainable housing is necessary. This research investigates multiple factors that may influence key stakeholders’ decision-making towards sustainable housing adoption. Drawing insights from combined questionnaire and interview studies, 12 critical factors and their interrelationships are identified based on professional views in the Australian housing industry. The mutual influences, or driving force and dependency, of these factors are further investigated via Interpretive Structural Modelling (ISM) to distinguish those requiring prominent and immediate attention. A hierarchical model is developed to help key stakeholders prioritise actions when implementing sustainable housing.
Resumo:
As part of the introduction of a broader dance medicine and science related health and wellbeing program, a 9 week mindfulness-meditation ACT-based program was delivered to all students undertaking full-time University dance training (N = 106). The aim of the program was to assist students in the further development of performance psychology skills that could be applied in both performance and non-performance settings. Participant groups were comprised of both male (N = 12) and female (N = 94) students from across all three year levels of two undergraduate dance courses, divided into three groups by mixed year levels due to timetable scheduling requirements. Pre- and post-testing was undertaken utilising the Mindful Attention Awareness Scale (MAAS-15), a uni-dimensional measure of mindfulness, in addition to qualitative questions checking the current level of awareness and understanding of mindfulness practice and its application. Weekly sessions were conducted by qualified sport and exercise psychologists and covered key practices such as: Mindfulness of Body, Mindfulness of Breathing, Mindfulness of Sounds, ACT-based and general Imagery exercises, Developing Open Awareness, Mindfulness of Emotions, and Developing Inner Stillness. Students were required to maintain a reflective journal that was utilised at the end of each weekly session, in addition to completion of a mid-Semester reflective debrief. Teaching staff additionally attended the weekly sessions and linked the mindfulness practice learnings into the student’s practical dance and academic classes where appropriate. Anecdotal feedback indicates that participation in the mindfulness-meditation sessions and the development of these mental skills has resulted in positive performance and personal outcomes. Observations collated from staff and students, results from the data collection phases and recommendations regarding future applications within dance training settings will be discussed within the presentation.
Resumo:
The ineffectiveness of current design processes has been well studied and has resulted in widespread calls for the evolution and development of new management processes. Even following the advent of BIM, we continue to move from one stage to another without necessarily having resolved all the issues. CAD design technology, if well handled, could have significantly raised the level of quality and efficiency of current processes, but in practice this was not fully realized. Therefore, technology alone can´t solve all the problems and the advent of BIM could result in a similar bottleneck. For a precise definition of the problem to be solved we should start by understanding what are the main current bottlenecks that have yet to be overcome by either new technologies or management processes, and the impact of human behaviour-related issues which impact the adoption and utilization of new technologies. The fragmented and dispersed nature of the AEC sector, and the huge number of small organizations that comprise it, are a major limiting factor. Several authors have addressed this issue and more recently IDDS has been defined as the highest level of achievement. However, what is written on IDDS shows an extremely ideal situation on a state to be achieved; it shows a holistic utopian proposition with the intent to create the research agenda to move towards that state. Key to IDDS is the framing of a new management model which should address the problems associated with key aspects: technology, processes, policies and people. One of the primary areas to be further studied is the process of collaborative work and understanding, together with the development of proposals to overcome the many cultural barriers that currently exist and impede the advance of new management methods. The purpose of this paper is to define and delimit problems to be solved so that it is possible to implement a new management model for a collaborative design process.
Resumo:
Despite significant investment in school one-to-one device programs, little is known about which aspects of program implementation work and why. Through a comparison of two implementation models, adopter-diffusion and saturation, and using existing data from the One Laptop per Child Australia laptop program, we explored how factors of implementation may affect device diffusion, learning and educational outcomes, and program sustainability in schools. In this article we argue that more focused research into implementation of one-to-one device programs, moving beyond comparisons of “devices versus without devices,” is needed to provide reliable data to inform future program funding and advance this area of research.
Resumo:
Electronic Medical Record (EMR) systems are being implemented increasingly worldwide. Saudi Arabia is one of the developing countries that commenced implementing such systems in 1988. Whilst EMR uptake has been low in Saudi Arabia until now, a number of hospitals have implemented EMR systems successfully. This paper analyses available studies (n = 28) in the literature regarding EMR implementation in Saudi Arabia to identify the progress of EMR implementation to date and to identify the facilitators and barriers to implementation.
Resumo:
Purpose: The cytomegalovirus (CMV) promoter is one of the most commonly used promoters for expression of transgenes in mammalian cells. The aim of our study was to evaluate the role of methylation and upregulation of the CMV promoter by irradiation and the chemotherapeutic agent cisplatin in vivo using non-invasive fluorescence in vivo imaging. Procedures: Murine fibrosarcoma LPB and mammary carcinoma TS/A cells were stably transfected with plasmids encoding CMV and p21 promoter-driven green fluorescent protein (GFP) gene. Solid TS/A tumors were induced by subcutaneous injection of fluorescent tumor cells, while leg muscles were transiently transfected with plasmid encoding GFP under the control of the CMV promoter. Cells, tumors, and legs were treated either by DNA methylation inhibitor 5-azacytidine, irradiation, or cisplatin. GFP expression was determined using a fluorescence microplate reader in vitro and by non-invasive fluorescence imaging in vivo. Results: Treatment of cells, tumors, and legs with 5-azacytidine (re)activated the CMV promoter. Furthermore, treatment with irradiation or cisplatin resulted in significant upregulation of GFP expression both in vitro and in vivo. Conclusions: Observed alterations in the activity of the CMV promoter limit the usefulness of this widely used promoter as a constitutive promoter. On the other hand, inducibility of CMV promoters can be beneficially used in gene therapy when combined with standard cancer treatment, such as radiotherapy and chemotherapy. © 2010 The Author(s).