660 resultados para manage
Resumo:
How bloggers and other independent online commentators criticise, correct, and otherwise challenge conventional journalism has been known for years, but has yet to be fully accepted by journalists; hostilities between the media establishment and the new generation of citizen journalists continue to flare up from time to time. The old gatekeeping monopoly of the mass media has been challenged by the new practice of gatewatching: by individual bloggers and by communities of commentators which may not report the news first-hand, but curate and evaluate the news and other information provided by official sources, and thus provide an important service. And this now takes place ever more rapidly, almost in real time: using the latest social networks, which disseminate, share, comment, question, and debunk news reports within minutes, and using additional platforms that enable fast and effective ad hoc collaboration between users. When hundreds of volunteers can prove within a few days that a German minister has been guilty of serious plagiarism, when the world first learns of earthquakes and tsunamis via Twitter – how does journalism manage to keep up?
Resumo:
The exchange pavilion offers a dialogue between two Expositions: 1998 in Brisbane and 2010 in Shanghai; and a chance to examine the impact that climate change will have on urban best practice outcomes in cities of the future. The Exchange exhibits the proposition that environmentally sustainable buildings need to interact responsively with a range of technical innovations to enable communities (and hence cities) to control and better manage their immediate environment. The 'Exchange' pavilion is a design experiment that integrates 3 key research elements: * An interactive digital exchange * A living green system wall (vertical and temporal) * A public urban star (horizontal and spatial) The proposition argues that the environmentally sustainability of any city is reliant on harnessing the full spectrum of intellectual and creative capital of the winder community (from universities to Government bodies to citizens) - a true knowledge city.
Resumo:
To understand the nature of police organisations and their management in an Australian context it is necessary to appreciate the recent history of policing at least in the last 30 years. In doing so an overall perspective is gained on the various reform efforts and organisational changes that have taken place in Australian policing. With this police reform perspective clearly in mind it then becomes possible to appreciate that the organization and management of the institution of policing in Australia is nested within the larger framework of ‘governance’. Hence, this notion of governance will be used as the key focal point around which to understand how police organizations manage their mission in the Australian context. Finally, the chapter discusses the inevitable ‘tension spaces’ that arise in policing and the need for police organizations to better manage such complexities.
Resumo:
This book is literally the A to Z of techniques to help parents manage their anxious children. It is easy to read and based on proven principles for reducing fears and worries. It can be used either alone or in conjunction with the Worrybuster's story books.
Resumo:
This study examined the everyday practices of families within the context of family mealtime to investigate how members accomplished mealtime interactions. Using an ethnomethodological approach, conversation analysis and membership categorization analysis, the study investigated the interactional resources that family members used to assemble their social orders moment by moment during family mealtimes. While there is interest in mealtimes within educational policy, health research and the media, there remain few studies that provide fine-grained detail about how members produce the social activity of having a family meal. Findings from this study contribute empirical understandings about families and family mealtime. Two families with children aged 2 to 10 years were observed as they accomplished their everyday mealtime activities. Data collection took place in the family homes where family members video recorded their naturally occurring mealtimes. Each family was provided with a video camera for a one-month period and they decided which mealtimes they recorded, a method that afforded participants greater agency in the data collection process and made available to the analyst a window into the unfolding of the everyday lives of the families. A total of 14 mealtimes across the two families were recorded, capturing 347 minutes of mealtime interactions. Selected episodes from the data corpus, which includes centralised breakfast and dinnertime episodes, were transcribed using the Jeffersonian system. Three data chapters examine extended sequences of family talk at mealtimes, to show the interactional resources used by members during mealtime interactions. The first data chapter explores multiparty talk to show how the uniqueness of the occasion of having a meal influences turn design. It investigates the ways in which members accomplish two-party talk within a multiparty setting, showing how one child "tells" a funny story to accomplish the drawing together of his brothers as an audience. As well, this chapter identifies the interactional resources used by the mother to cohort her children to accomplish the choralling of grace. The second data chapter draws on sequential and categorical analysis to show how members are mapped to a locally produced membership category. The chapter shows how the mapping of members into particular categories is consequential for social order; for example, aligning members who belong to the membership category "had haircuts" and keeping out those who "did not have haircuts". Additional interactional resources such as echoing, used here to refer to the use of exactly the same words, similar prosody and physical action, and increasing physical closeness, are identified as important to the unfolding talk particularly as a way of accomplishing alignment between the grandmother and grand-daughter. The third and final data analysis chapter examines topical talk during family mealtimes. It explicates how members introduce topics of talk with an orientation to their co-participant and the way in which the take up of a topic is influenced both by the sequential environment in which it is introduced and the sensitivity of the topic. Together, these three data chapters show aspects of how family members participated in family mealtimes. The study contributes four substantive themes that emerged during the analytic process and, as such, the themes reflect what the members were observed to be doing. The first theme identified how family knowledge was relevant and consequential for initiating and sustaining interaction during mealtime with, for example, members buying into the talk of other members or being requested to help out with knowledge about a shared experience. Knowledge about members and their activities was evident with the design of questions evidencing an orientation to coparticipant’s knowledge. The second theme found how members used topic as a resource for social interaction. The third theme concerned the way in which members utilised membership categories for producing and making sense of social action. The fourth theme, evident across all episodes selected for analysis, showed how children’s competence is an ongoing interactional accomplishment as they manipulated interactional resources to manage their participation in family mealtime. The way in which children initiated interactions challenges previous understandings about children’s restricted rights as conversationalists. As well as making a theoretical contribution, the study offers methodological insight by working with families as research participants. The study shows the procedures involved as the study moved from one where the researcher undertook the decisions about what to videorecord to offering this decision making to the families, who chose when and what to videorecord of their mealtime practices. Evident also are the ways in which participants orient both to the video-camera and to the absent researcher. For the duration of the mealtime the video-camera was positioned by the adults as out of bounds to the children; however, it was offered as a "treat" to view after the mealtime was recorded. While situated within family mealtimes and reporting on the experiences of two families, this study illuminates how mealtimes are not just about food and eating; they are social. The study showed the constant and complex work of establishing and maintaining social orders and the rich array of interactional resources that members draw on during family mealtimes. The family’s interactions involved members contributing to building the social orders of family mealtime. With mealtimes occurring in institutional settings involving young children, such as long day care centres and kindergartens, the findings of this study may help educators working with young children to see the rich interactional opportunities mealtimes afford children, the interactional competence that children demonstrate during mealtimes, and the important role/s that adults may assume as co-participants in interactions with children within institutional settings.
Resumo:
Objective. The Effective Consumer Scale (EC-17) comprises 17 items measuring the main skills and behaviors people need to effectively manage their healthcare. We tested the responsiveness of the EC-17. Methods. Participants, in 2 waves of a 6-week Arthritis Self-Management Program (ASMP) from Arthritis Ireland, received a questionnaire at the first and last week of the weekly ASMP. The questionnaire included the EC-17 and 10 other measures for arthritis. Deficits, mean change, and standard deviations were calculated at baseline and Week 6. The EC-17 scores were compared to the Arthritis Self-Efficacy (ASE) and Patient Activation Measure (PAM) scales. Results were presented at OMERACT 9. Results. There is some overlap between the EC-17 and the ASE and PAM; however, most items of greatest deficit in the EC-17 are not covered by those scales. In 327 participants representing both intervention waves (2006 and 2007), the EC-17 was more efficient than the ASE but less efficient than the PAM for detecting improvements after the ASMP, and was moderately correlated with the PAM. Conclusion. The EC-17 appears to measure different skills and attributes than the ASE and PAM. Discussions with participants at OMERACT 9 agreed that it is worthwhile to measure the skills and attributes of an effective consumer, and supported the development of an intervention (such as proposed online decision aids) that would include education in the categories in the EC-17.
Resumo:
This paper takes the establishment and demise of Manchester’s Creative Industries Development Service as an exemplary case study for the ways in which creative industry policy has intersected with urban economic policy over the last decade. It argues that the creative industries required specific kinds of economic development agencies which would be able to act as ‘intermediary’ between the distinct languages of policy makers and ‘creatives’. The paper discusses the tensions inherent in such an approach and how CIDS attempted to manage them. It suggests that which particular circumstances might have intervened the main reason for the demise of the CIDS was the domination of the ‘economic’ over the ‘cultural logic’ both of which are embedded within the creative industries policy discourse.
Resumo:
This paper explores how the design of creative clusters as a key strategy in promoting the urban creative economy has played out in Shanghai. Creative Clusters in Europe and North America context have emerged ‘organically’. They developed spontaneously in those cities which went through a period of post-industrial decline. Creative Industries grew up in these cities as part of a new urban economy in the wake of old manufacturing industries. Artists and creative entrepreneurs moved into vacant warehouses and factories and began the trend of ‘creative clusters’. Such clusters facilitate the transfer of tacit knowledge through informal learning, the efficient sourcing of skills and information, competition, collaboration and learning, inter-cluster trading and networking. This new urban phenomenon was soon targeted by local economic development policy in charge of re-generating and re-structuralizing industrial activities in cities. Rising interest from real estate and local economic development has led to more and more planned creative clusters. In the aim of catching up with the world’s creative cities, Shanghai has planned over 100 creative clusters since 2005. Along with these officially designed creative clusters, there are organically emerged creative clusters that are much smaller in scale and much more informal in terms of the management. And they emerged originally in old residential areas just outside the CBD and expand to include French concession the most sort after residential area at the edge of CBD. More recently, office buildings within CBD are made available for creative usages. From fringe to CBD, these organic creative clusters provide crucial evidences for the design of creative clusters. This paper will be organized in 2 parts. In the first part, I will present a case study of 8 ‘official’ clusters (title granted by local govenrment) in Shanghai through which I am hoping to develop some key indicators of the success/failure of creative clusters as well as link them with their physical, social and operational efficacies. In the second part, a variety of ‘alternative’ clusters (organicly formed clusters most of which are not recongnized by the government) supplies with us the possibilities of rethinking the so-called ‘cluster development strategy’ in terms of what kind of spaces are appropriate for use by clusters? Who should manage them and in what format? And ultimately what are their relationship with the rest of the city should be defined?
Resumo:
Previous research has indicated that road crashes are the most common form of work related fatalities (Haworth et al., 2000). Historically, industry has often taken a “silver bullet” approach developing and implementing a single countermeasure to address all their work related road safety issues, despite legislative requirements to discharge obligations through minimising risk and enhancing safety. This paper describes the results and implications from a series of work related road safety audits that were undertaken across five organisations to determine deficiencies in each organisation‟s safe driving management and practice. Researchers conducted a series of structured interviews, reviewed documentation relating to work related driving, and analysed vehicle related crash and incident records to determine each organisation‟s current situation in the management of work related road safety and driver behaviour. A number of consistent themes and issues across each organisation were identified relating to managing driver behaviour, organisational policies, incident recording and reporting, communication and education, and formalisation of key work related road safety strategies. Although organisations are required to undertake risk reduction strategies for all work related driving, the results of the research suggest that many organisations fail to systematically manage driver behaviour and mitigate work related road safety risk. Future improvements in work related road safety will require organisations to firstly acknowledge the high risk associated with drivers driving for work and secondly adopt comprehensive risk mitigation strategies in a similar manner to managing other workplace hazards.
Resumo:
The International Classification of Diseases (ICD) is used to categorise diseases, injuries and external causes, and is a key epidemiological tool enabling the storage and retrieval of data from health and vital records to produce core international mortality and morbidity statistics. The ICD is updated periodically to ensure the classification remains current and work is now underway to develop the next revision, ICD-11. There have been almost 20 years since the last ICD edition was published and over 60 years since the last substantial structural revision of the external causes chapter. Revision of such a critical tool requires transparency and documentation to ensure that changes made to the classification system are recorded comprehensively for future reference. In this paper, the authors provide a history of external causes classification development and outline the external cause structure. Approaches to manage ICD-10 deficiencies are discussed and the ICD-11 revision approach regarding the development of, rationale for and implications of proposed changes to the chapter are outlined. Through improved capture of external cause concepts in ICD-11, a stronger evidence base will be available to inform injury prevention, treatment, rehabilitation and policy initiatives to ultimately contribute to a reduction in injury morbidity and mortality.
Resumo:
Organizations today engage in various forms of alliances to manage their existing business processes or to diversify into new processes to sustain their competitive positions. Many of today’s alliances use the IT resources as their backbone. The results of these alliances are collaborative organizational structures with little or no ownership stakes between the parties. The emergence of Web 2.0 tools is having a profound effect on the nature and form of these alliance structures. These alliances heavily depend on and make radical use of the IT resources in a collaborative environment. This situation requires a deeper understanding of the governance of these IT resources to ensure the sustainability of the collaborative organizational structures. This study first suggests the types of IT governance structures required for collaborative organizational structures. Semi-structured interviews with senior executives who operate in such alliances reveal that co-created IT governance structures are necessary. Such structures include co-created IT-steering committees, co-created operational committees, and inter-organizational performance management and communication systems. The findings paved the way for the development of a model for understanding approaches to governing IT and evaluating the effectiveness for such governance mechanisms in today’s IT dependent alliances. This study presents a sustainable IT-related capabilities approach to assessing the effectiveness of suggested IT governance structures for collaborative alliances. The findings indicate a favourable association between organizations IT governance efforts and their ability to sustain their capabilities to leverage their IT resources. These IT-related capabilities also relate to measures business value at the process and firm level. This makes it possible to infer that collaborative organizations’ IT governance efforts contribute to business value.
Resumo:
Given the substantial investment in information technology (IT), and the significant impact IT has on organizational success, organizations consume considerable resources to manage acquisition and use of their IT resources. While various arguments proposed suggest which IT governance arrangements may work best, our understanding of the effectiveness of such initiatives is limited. We examine the relationship between the effectiveness of IT steering committee driven IT governance initiatives and firm's IT management and IT infrastructure related capabilities. We further propose that firm's ITrelated capabilities generated through IT governance initiatives should improve its business processes and firm-level performance. We test these relationships empirically by a field survey. Results suggest that firms' effectiveness of IT steering committee driven IT governance initiatives positively relates to the level of their IT-related capabilities. We also found positive relationships between IT-related capabilities and internal process-level performance. Our results also support that improvement in internal process-level performance positively relates to improvement in customer service and firm-level performance.
Resumo:
Purpose---The aim of this study is to identify complexity measures for building projects in the People’s Republic of China (PRC). Design/Methodology/Approach---A three-round of Delphi questionnaire survey was conducted to identify the key parameters that measure the degree of project complexity. A complexity index (CI) was developed based on the identified measures and their relative importance. Findings---Six key measures of project complexity have been identified, which include, namely (1) building structure & function; (2) construction method; (3) the urgency of the project schedule; (4) project size/scale; (5) geological condition; and (6) neighboring environment. Practical implications---These complexity measures help stakeholders assess degrees of project complexity and better manage the potential risks that might be induced to different levels of project complexity. Originality/Value---The findings provide insightful perspectives to define and understand project complexity. For stakeholders, understanding and addressing the complexity help to improve project planning and implementation.
Resumo:
Enterprise architecture (EA) management has be-come an intensively discussed approach to manage enterprise transformations. While there is a strong interest in EA frameworks and EA modeling, a lack of knowledge remains about the theoretical foundation of EA benefits. In this paper, we identify EA success factors and EA benefits through a literature review, and integrate these findings with the DeLone & McLean IS success model to propose a theoretical model explaining the realization of EA benefits. In addition, we con-ducted semi-structured interviews with EA experts for a preliminary validation and further exploration of the model. We see this model as a first step to gain insights in and start a discussion on the theory of EA benefit realization. In future research, we plan to empirically validate the proposed model.
Resumo:
It is not uncommon for enterprises today to be faced with the demand to integrate and incor- porate many different and possibly heterogeneous systems which are generally independently designed and developed, to allow seamless access. In effect, the integration of these systems results in one large whole system that must be able, at the same time, to maintain the local autonomy and to continue working as an independent entity. This problem has introduced a new distributed architecture called federated systems. The most challenging issue in federated systems is to find answers for the question of how to efficiently cooperate while preserving their autonomous characteristic, especially the security autonomy. This thesis intends to address this issue. The thesis reviews the evolution of the concept of federated systems and discusses the organisational characteristics as well as remaining security issues with the existing approaches. The thesis examines how delegation can be used as means to achieve better security, especially authorisation while maintaining autonomy for the participating member of the federation. A delegation taxonomy is proposed as one of the main contributions. The major contribution of this thesis is to study and design a mechanism to support dele- gation within and between multiple security domains with constraint management capability. A novel delegation framework is proposed including two modules: Delegation Constraint Man- agement module and Policy Management module. The first module is designed to effectively create, track and manage delegation constraints, especially for delegation processes which require re-delegation (indirect delegation). The first module employs two algorithms to trace the root authority of a delegation constraint chain and to prevent the potential conflict when creating a delegation constraint chain if necessary. The first module is designed for conflict prevention not conflict resolution. The second module is designed to support the first module via the policy comparison capability. The major function of this module is to provide the delegation framework the capability to compare policies and constraints (written under the format of a policy). The module is an extension of Lin et al.'s work on policy filtering and policy analysis. Throughout the thesis, some case studies are used as examples to illustrate the discussed concepts. These two modules are designed to capture one of the most important aspects of the delegation process: the relationships between the delegation transactions and the involved constraints, which are not very well addressed by the existing approaches. This contribution is significant because the relationships provide information to keep track and en- force the involved delegation constraints and, therefore, play a vital role in maintaining and enforcing security for transactions across multiple security domains.