797 resultados para Business Events
Resumo:
Purpose: Leadership styles are reviewed and reassessed given recent research that links destructive leadership behaviours exhibited by unscrupulous executives with traits commonly identified as indicators of corporate psychopathy. Method/approach: A review of the literature describing the various theories dealing with the nature of leadership styles and the rise of interest in corporate psychopathy and destructive leadership. Implications: This paper offers a psychological perspective for future research which provides both impetus and additional support for further analysis and exploration of such leadership styles in the business environment. One distinct advantage of this extrapolation is the articulation of insights into aspects of decision making by leaders, providing further insight into the formulation of leadership development programs in organisations and courses in business schools training future leaders.
Resumo:
Information Technology (IT) is an important resource that can facilitate growth and development in both the developed and developing economies. The forces of globalisation increase the digital divide between the developed and developing economies is increasing. The least developed economies (LDEs) are the most vulnerable within this environment. Intense competition for IT resources means that LDEs need a deeper understanding of how to source and evaluate their IT-related efforts. This effort puts LDEs in a better position to source funding from various stakeholders and promote localized investment in IT. This study presents a complementary approach to securing better IT-related business value in organizations in the LDEs. It further evaluates how IT and the complementaries need to managed within the LDEs. Analysis of data collected from five LDEs show that organizations that invest in IT and related complementaries are able to better their business processes. The data also suggest that improved business processes lead to overall business processes improvements. The above is only possible if organizations adopt IT and make related changes in the complementary resources within the established culture and localizing the required changes.
Resumo:
Developing economies accommodate more than three quarters of the world's population. This means understanding their growth and well-being is of critical importance. Information technology (IT) is one resource that has had a profound effect in shaping the global economy. IT is also an important resource for driving growth and development in developing economies. Investments in developing economies, however, have focused on the exploitation of labor and natural resources. Unlike in developed economies, focus on IT investment to improve efficiency and effectiveness of business process in developing economies has been sparse, and mechanisms for deriving better IT-related business value is not well understood. This study develops a complementarities-based business value model for developing economies, and tests the relationship between IT investments, IT-related complementarities, and business process performance. It also considers the relationship between business processes performance and firm-level performance. The results suggest that a coordinated investment in IT and IT-related complementarities related favorably to business process performance. Improvements in process-level performance lead to improvements in firm-level performance. The results also suggest that the IT-related complementarities are not only a source of business value on their own, but also enhance the IT resources' ability to contribute to business process performance. This study demonstrates that a coordinated investment approach is required in developing economies. With this approach, their IT resources and IT-related complementaries would help them significantly in improving their business processes, and eventually their firm-level performances.
Resumo:
Understanding how IT investments contribute to business value is an important issue, and this assists in the efficient use of technology resources in businesses. While there is an agreement that IT contributes to business value, we are unsure of how IT contributes to business value in the wider context, including developing countries. With the view that understanding the interaction between IT resources and the users may provide better insights on the potential of IT investments, this study investigates the businesses’ perception of the intangible benefits of their IT investments. The results indicate that businesses in developing countries perceive that their IT investments provide intangible benefits, especially at the process level, and this contributes to business value.
Resumo:
Discovering factors that help or impede business model change is an important quest, both for researchers and practitioners. In this study we present preliminary findings based on the CAUSEE survey of young and nascent firms in Australia. In particular, we seek to determine an association between business model adaptation and external orientation among young and nascent firms within the random sample and amongst an oversample of high potential firms. The concept of external orientation is made operational by asking respondents whether, and to what extent, they rely on certain sources of advice and information. We find that high potential firms are more likely to have made at least some change to their business model, that greater use of external sources of advice is generally significantly associated with business model adaptation, but also that there appear to be different patterns of behaviour between the random sample and the over sample.
Resumo:
The improvement and optimization of business processes is one of the top priorities in an organization. Although process analysis methods are mature today, business analysts and stakeholders are still hampered by communication issues. That is, analysts cannot effectively obtain accurate business requirements from stakeholders, and stakeholders are often confused about analytic results offered by analysts. We argue that using a virtual world to model a business process can benefit communication activities. We believe that virtual worlds can be used as an efficient model-view approach, increasing the cognition of business requirements and analytic results, as well as the possibility of business plan validation. A healthcare case study is provided as an approach instance, illustrating how intuitive such an approach can be. As an exploration paper, we believe that this promising research can encourage people to investigate more research topics in the interdisciplinary area of information system, visualization and multi-user virtual worlds.
Resumo:
These projects build on the research of Klaebe and Burgess into digital story-telling, specifically variable workshop scenarios, co-creative media, participatory public history, and the development of co-creative production processes for cultural institutions. The projects represented a partnership between QUT and the State Library of Queensland. The Five Senses project focused on the distributed digital storytelling workshop model and the development of audiences for digital storytelling. The team worked with regional artists whose work had been selected for inclusion in the Five Senses exhibition at the State Library of Queensland to produce stories about their work; these works were then integrated into the physical exhibition space. The Queensland Businesswomen project produced four digital stories profiling the lives of leading Queensland businesswomen. The digital story telling workshop model was disbanded and research teams worked individually with participants to create the digital stories. Academic research and oral history interviews were conducted initially to foreground these productions. This pilot led to a larger project, Business Leaders Hall of Fame, which now has a dedicated viewing room in the SLQ sponsored by an annual silver service dinner event. With the Responses to the Apology project, which stimulated similar projects in Mt Isa and Cairns, the research team worked with Indigenous facilitators, and the participants created their digital stories with assistance from these facilitators and the QUT research team using a mix of workshop and individual meetings. The research component of the work relates to the further development of co-creative production processes for cultural institutions, involving a wide range of institutional and individual partners, while authentically representing the intensely personal perspectives of each of the primary participants. The Queensland Business Leaders Hall of Fame was a research project that included interviews with eminent Queenslanders that produced oral history interviews and digital stories about the achievements of both Queensland personalities and businesses. This model was able to test and evaluate the use of oral history and digital storytelling for learning and community heritage purposes. Interviewees include; Sir John and Valmai Pidgeon, Joseph Saragossi, Robert Bryan, Clem Jones, Jim Kennedy, Sr Angela Mary, Castelmaine Perkins, Burns and Philp, Qantas, Don Argus & Steve Irwin All digital stories, oral history interviews and transcripts were accessioned into the library collection – an international first for digital stories. Two publications in refereed journals have resulted, and the digital stories are stored in the SLQ permanent collection for the benefit of national and international scholars and the general public.
Resumo:
The next-generation of service-oriented architecture (SOA) needs to scale for flexible service consumption, beyond organizational and application boundaries, into communities, ecosystems and business networks. In wider and, ultimately, global settings, new capabilities are needed so that business partners can efficiently and reliably enable, adapt and expose services. Those services can then be discovered, ordered, consumed, metered and paid for, through new applications and opportunities, driven by third-parties in the global “village”. This trend is already underway, in different ways, through different early adopter market segments. This paper proposes an architectural strategy for the provisioning and delivery of services in communities, ecosystems and business networks – a Service Delivery Framework (SDF). The SDF is intended to support multiple industries and deployments where a SOA platform is needed for collaborating partners and diverse consumers. Specifically, it is envisaged that the SDF allows providers to publish their services into network directories so that they can be repurposed, traded and consumed, and leveraging network utilities like B2B gateways and cloud hosting. To support these different facets of service delivery, the SDF extends the conventional service provider, service broker and service consumer of the Web Services Architecture to include service gateway, service hoster, service aggregator and service channel maker.
Resumo:
Companies and their services are being increasingly exposed to global business networks and Internet-based ondemand services. Much of the focus is on flexible orchestration and consumption of services, beyond ownership and operational boundaries of services. However, ways in which third-parties in the “global village” can seamlessly self-create new offers out of existing services remains open. This paper proposes a framework for service provisioning in global business networks that allows an open-ended set of techniques for extending services through a rich, multi-tooling environment. The Service Provisioning Management Framework, as such, supports different modeling techniques, through supportive tools, allowing different parts of services to be integrated into new contexts. Integration of service user interfaces, business processes, operational interfaces and business object are supported. The integration specifications that arise from service extensions are uniformly reflected through a kernel technique, the Service Integration Technique. Thus, the framework preserves coherence of service provisioning tasks without constraining the modeling techniques needed for extending different aspects of services.
Resumo:
The drive for comparability of financial information is to enable users to distinguish similarities and differences in economic activities for an entity over time and between entities so that their resource allocation decisions are facilitated. With the increased globalisation of economic activities, the enhanced international comparability of financial statements is often used as an argument to advance the convergence of local accounting standards to international financial reporting standards (IFRS). Differences in the underlying economic substance of transactions between jurisdictions plus accounting standards allowing alternative treatments may render this expectation of increased comparability unrealistic. Motivated by observations that, as a construct, comparability is under-researched and not well understood, we develop a comparability framework that distinguishes between four types of comparability. In applying this comparability framework to pension accounting in the Australian and USA contexts, we highlight a dilemma: while regulators seek to increase the likelihood that similar events are accounted for similarly, an unintended consequence may be that preparers are forced to apply similar accounting treatment to events that are, in substance, different.
Resumo:
Immigrant entrepreneurship, or, self-employment by immigrants (Light & Bonacich, 1988), has been of growing interest to researchers (Hosler, 1996). This is due in part to major immigrant receiving countries, such as Australia, the United States, Canada, the United Kingdom and Western Europe, experiencing a high growth rate in their immigrant populations, leading to a more visible presence of immigrant business in major cities (Woon, 2008). By starting their own businesses, immigrant entrepreneurs may circumvent some of the barriers and disadvantages encountered in looking for a job (Sequeira & Rasheed, 2006). Successful immigrant entrepreneurs will integrate into the economy by creating jobs, providing products and services for members of their own ethnic community and society, as well as introducing new products and services that expand consumers’ choices (Rath & Kloosterman, 2000). Immigrant entrepreneurs tend to start business within their ethnic enclave, as it is an integral part of their social and cultural context and the location where ethnic resources reside (Logan et al., 2002). An ethnic enclave is an interdependent network of social and business relationships that are geographically concentrated with its co-ethnic people (Portes & Bach, 1985).
Resumo:
As organizations reach higher levels of business process management maturity, they often find themselves maintaining very large process model repositories, representing valuable knowledge about their operations. A common practice within these repositories is to create new process models, or extend existing ones, by copying and merging fragments from other models. We contend that if these duplicate fragments, a.k.a. ex- act clones, can be identified and factored out as shared subprocesses, the repository’s maintainability can be greatly improved. With this purpose in mind, we propose an indexing structure to support fast detection of clones in process model repositories. Moreover, we show how this index can be used to efficiently query a process model repository for fragments. This index, called RPSDAG, is based on a novel combination of a method for process model decomposition (namely the Refined Process Structure Tree), with established graph canonization and string matching techniques. We evaluated the RPSDAG with large process model repositories from industrial practice. The experiments show that a significant number of non-trivial clones can be efficiently found in such repositories, and that fragment queries can be handled efficiently.
Resumo:
Evidence exists that repositories of business process models used in industrial practice contain significant amounts of duplication. This duplication may stem from the fact that the repository describes variants of the same pro- cesses and/or because of copy/pasting activity throughout the lifetime of the repository. Previous work has put forward techniques for identifying duplicate fragments (clones) that can be refactored into shared subprocesses. However, these techniques are limited to finding exact clones. This paper analyzes the prob- lem of approximate clone detection and puts forward two techniques for detecting clusters of approximate clones. Experiments show that the proposed techniques are able to accurately retrieve clusters of approximate clones that originate from copy/pasting followed by independent modifications to the copied fragments.
Resumo:
Comprehensive BCM plan testing for complex information systems is difficult and expensive, if not infeasible. This paper suggests that a simulator could be employed to ameliorate these problems. A general model for such a BCM simulator is presented, and the implementation of a prototype simulator is described. The simulator reacts to system disturbances by seeking alternative configurations provided within the BCM plan, reporting the resource availabilities in the updated system and identifying any failure to meet the requirements placed on the system. The simulator then explores any changes in data security introduced by the proposed post disturbance configuration and reports any enhanced risk.
Resumo:
With the large diffusion of Business Process Managemen (BPM) automation suites, the possibility of managing process-related risks arises. This paper introduces an innovative framework for process-related risk management and describes a working implementation realized by extending the YAWL system. The framework covers three aspects of risk management: risk monitoring, risk prevention, and risk mitigation. Risk monitoring functionality is provided using a sensor-based architecture, where sensors are defined at design time and used at run-time for monitoring purposes. Risk prevention functionality is provided in the form of suggestions about what should be executed, by who, and how, through the use of decision trees. Finally, risk mitigation functionality is provided as a sequence of remedial actions (e.g. reallocating, skipping, rolling back of a work item) that should be executed to restore the process to a normal situation.