258 resultados para IT related-capabilities
Resumo:
Retaining customers is a relevant topic throughout all service industries. However, only limited attention has been directed towards studying the antecedents of subscription renewal in the context of operational cloud enterprise systems. Cloud services have historically been offered as subscription-based services with the (theoretical) possibility of seamless service cancellation, in contrast to classical IT-Outsourcing contracts or license-based software installations of on-premise enterprise systems. In this work, we investigate the central concept of subscription renewal by focusing on different facets of IS success and their relevance for distinct employee cohorts. Analyzing inter-cohort differences has strong practical implications, as it helps IT vendors to focus on specific IT-related factors when trying to retain customers. Therefore an empirical study was undertaken. The hypotheses were developed on an individual level and tested using survey responses of IT decision makers within companies which adopted cloud enterprise systems. Gathered data was then analyzed using PLS. The results show that subscription renewal intention of the strategic cohort is mainly based on perceived system quality, whereas information quality explains most of the variance of subscription renewal in the management cohort. Beneath the cloud enterprise systems specific contributions, the work adds to the theoretical body of research related to IS success and IS continuation, as well as stakeholder perspectives.
Resumo:
Phenomenography has its roots in educational research (Marton and Booth, 1997), but has since been adopted in other domains including business (Sandberg, 1994), health (Barnard, McCosker and Gerber, 1999), information science (Bruce, 1999a,b) and information technology (Bruce and Pham, 2001) as well as information systems. Emerging phenomenographic research in areas other than education, has been interdisciplinary, often bringing together technology, education and a host discipline such as health or business. In Australia, phenomenography has been used in information technology (IT) related research primarily in Victoria and Queensland. These studies have pursued the latter two of three established lines of phenomenographic research: 1) the study of conceptions of learning; 2) the study of conceptions in specific disciplines of study and 3) the study of how people conceive of various aspects of their everyday world that have not, for them, been the object of formal studies (Marton 1988, p.189). Information Technology researchers have predominantly pursued the latter two lines of research.
Resumo:
The ‘Centro case’ confirmed that each individual director is responsible for financial governance and must be able to ‘read and understand’ financial statements. Despite the centrality of director financial literacy to directors duties, practitioner and academic literature have failed to clearly define or provide evidence-based reliable measures of director financial literacy. This paper seeks to address this weakness by presenting the initial results of a Delphi study on unpacking the conceptualisation of director financial literacy. We have found that director financial literacy involves more than reading and understanding financial statements. Rather, it encompasses capabilities in applying accounting concepts to the analysis and evaluation of financial statements. As such director financial literacy may be more accurately described as ‘director accounting literacy’.
Resumo:
In his book, The Emperor of All Maladies, Siddhartha Mukherjee writes a history of cancer — "It is a chronicle of an ancient disease — once a clandestine, 'whispered-about' illness — that has metamorphosed into a lethal shape-shifting entity imbued with such penetrating metaphorical, medical, scientific, and political potency that cancer is often described as the defining plague of our generation." Increasingly, an important theme in the history of cancer is the role of law, particularly in the field of intellectual property law. It is striking that a number of contemporary policy debates over intellectual property and public health have concerned cancer research, diagnosis, and treatment. In the area of access to essential medicines, there has been much debate over Novartis’ patent application in respect of Glivec, a treatment for leukaemia. India’s Supreme Court held that the Swiss company’s patent application violated a safeguard provision in India’s patent law designed to stop evergreening. In the field of tobacco control, the Australian Government introduced plain packaging for tobacco products in order to address the health burdens associated with the tobacco epidemic. This regime was successfully defended in the High Court of Australia. In the area of intellectual property and biotechnology, there have been significant disputes over the Utah biotechnology company Myriad Genetics and its patents in respect of genetic testing for BRCA1 and BRCA2, which are related to breast cancer and ovarian cancer. The Federal Court of Australia handed down a decision on the validity of Myriad Genetics’ patent in respect of genetic testing for BRCA1 in February 2013. The Supreme Court of the United States heard a challenge to the validity of Myriad Genetics’ patents in this area in April 2013, and handed down a judgment in July 2013. Such disputes have involved tensions between intellectual property rights, and public health. This article focuses upon one of these important test cases involving intellectual property, public health, and cancer research. In June 2010, Cancer Voices Australia and Yvonne D’Arcy brought an action in the Federal Court of Australia against the validity of a BRCA1 patent — held by Myriad Genetics Inc, the Centre de Recherche du Chul, the Cancer Institute of Japan and Genetic Technologies Limited. Yvonne D’Arcy — a Brisbane woman who has had treatment for breast cancer — maintained: "I believe that what they are doing is morally and ethically corrupt and that big companies should not control any parts of the human body." She observed: "For my daughter, I've had her have [sic] mammograms, etc, because of me but I would still like her to be able to have the test to see if the mutation gene is in there from me." The applicants made the following arguments: "Genes and the information represented by human gene sequences are products of nature universally present in each individual, and the information content of a human gene sequence is fixed. Genetic variations or mutations are products of nature. The isolation of the BRCA1 gene mutation from the human body constitutes no more than a medical or scientific discovery of a naturally occurring phenomenon and does not give rise to a patentable invention." The applicants also argued that "the alleged invention is not a patentable invention in that, so far as claimed in claims 1–3, it is not a manner of manufacture within the meaning of s 6 of the Statute of Monopolies". The applicants suggested that "the alleged invention is a mere discovery". Moreover, the applicants contended that "the alleged invention of each of claims 1-3 is not a patentable invention because they are claims for biological processes for the generation of human beings". The applicants, though, later dropped the argument that the patent claims related to biological processes for the generation of human beings. In February 2013, Nicholas J of the Federal Court of Australia considered the case brought by Cancer Voices Australia and Yvonne D’Arcy against Myriad Genetics. The judge presented the issues in the case, as follows: "The issue that arises in this case is of considerable importance. It relates to the patentability of genes, or gene sequences, and the practice of 'gene patenting'. Briefly stated, the issue to be decided is whether under the Patents Act 1990 (Cth) a valid patent may be granted for a claim that covers naturally occurring nucleic acid — either deoxyribonucleic acid (DNA) or ribonucleic acid (RNA) — that has been 'isolated'". In this context, the word "isolated" implies that naturally occurring nucleic acid found in the cells of the human body, whether it be DNA or RNA, has been removed from the cellular environment in which it naturally exists and separated from other cellular components also found there. The genes found in the human body are made of nucleic acid. The particular gene with which the patent in suit is concerned (BRCA1) is a human breast and ovarian cancer disposing gene. Various mutations that may be present in this gene have been linked to various forms of cancer including breast cancer and ovarian cancer.' The judge held in this particular case that Myriad Genetics’ patent claims were a "manner of manufacture" under s 6 of the Statute of Monopolies and s 18(1)(a) of the Patents Act 1990 (Cth). The matter is currently under appeal in the Full Court of the Federal Court of Australia. This article interprets the dispute over Myriad Genetics in light of the scholarly work of Nobel Laureate Professor Joseph Stiglitz on inequality. Such work has significant explanatory power in the context of intellectual property and biotechnology. First, Stiglitz has contended that "societal inequality was a result not just of the laws of economics, but also of how we shape the economy — through politics, including through almost every aspect of our legal system". Stiglitz is concerned that "our intellectual property regime … contributes needlessly to the gravest form of inequality." He maintains: "The right to life should not be contingent on the ability to pay." Second, Stiglitz worries that "some of the most iniquitous aspects of inequality creation within our economic system are a result of 'rent-seeking': profits, and inequality, generated by manipulating social or political conditions to get a larger share of the economic pie, rather than increasing the size of that pie". He observes that "the most iniquitous aspect of this wealth appropriation arises when the wealth that goes to the top comes at the expense of the bottom." Third, Stiglitz comments: "When the legal regime governing intellectual property rights is designed poorly, it facilitates rent-seeking" and "the result is that there is actually less innovation and more inequality." He is concerned that intellectual property regimes "create monopoly rents that impede access to health both create inequality and hamper growth more generally." Finally, Stiglitz has recommended: "Government-financed research, foundations, and the prize system … are alternatives, with major advantages, and without the inequality-increasing disadvantages of the current intellectual property rights system.’" This article provides a critical analysis of the Australian litigation and debate surrounding Myriad Genetics’ patents in respect of genetic testing for BRCA1. First, it considers the ruling of Nicholas J in the Federal Court of Australia that Myriad Genetics’ patent was a manner of manufacture as it related to an artificially created state of affairs, and not mere products of nature. Second, it examines the policy debate over gene patents in Australia, and its relevance to the litigation involving Myriad Genetics. Third, it examines comparative law, and contrasts the ruling by Nicholas J in the Federal Court of Australia with developments in the United States, Canada, and the European Union. Fourth, this piece considers the reaction to the decision of Nicholas at first instance in Australia. Fifth, the article assesses the prospects of an appeal to the Full Federal Court of Australia over the Myriad Genetics’ patents. Finally, this article observes that, whatever happens in respect of litigation against Myriad Genetics, there remains controversy over Genetic Technologies Limited. The Melbourne firm has been aggressively licensing and enforcing its related patents on non-coding DNA and genomic mapping.
Resumo:
With the level of digital disruption that is affecting businesses around the globe, you might expect high levels of Governance of Enterprise Information and Technology (GEIT) capability within boards. Boards and their senior executives know technology is important. More than 90% of boards and senior executives currently identify technology as essential to their current businesses, and to their organization’s future. But as few as 16% have sufficient GEIT capability. Global Centre for Digital Business Transformation’s recent research contains strong indicators of the need for change. Despite board awareness of both the likelihood and impact of digital disruption, things digital are still not viewed as a board-level matter in 45% of companies. And, it’s not just the board. The lack of board attention to technology can be mirrored at senior executive level as well. When asked about their organization’s attitude towards digital disruption, 43% of executives said their business either did not recognise it as a priority or was not responding appropriately. A further 32% were taking a “follower” approach, a potentially risky move as we will explain. Given all the evidence that boards know information and technology (I&T***) is vital, that they understand the inevitably, impact and speed of digital change and disruption, why are so many boards dragging their heels? Ignoring I&T disruption and refusing to build capability at board level is nothing short of negligence. Too many boards risk flying blind without GEIT capability [2]. To help build decision quality and I&T governance capability, this research: • Confirms a pressing need to build individual competency and cumulative, across-board capability in governing I&T • Identifies six factors that have rapidly increased the need, risk and urgency • Finds that boards may risk not meeting their duty of care responsibilities when it comes to I&T oversight • Highlights barriers to building capability details three GEIT competencies that boards and executives can use for evaluation, selection, recruitment and professional development.
Resumo:
Context The School of Information Technology at QUT has recently undertaken a major restructuring of their Bachelor of Information Technology (BIT) course. Some of the aims of this restructuring include a reduction in first year attrition and to provide an attractive degree course that meets both student and industry expectations. Emphasis has been placed on the first semester in the context of retaining students by introducing a set of four units that complement one another and provide introductory material on technology, programming and related skills, and generic skills that will aid the students throughout their undergraduate course and in their careers. This discussion relates to one of these four fist semester units, namely Building IT Systems. The aim of this unit is to create small Information Technology (IT) systems that use programming or scripting, databases as either standalone applications or web applications. In the prior history of teaching introductory computer programming at QUT, programming has been taught as a stand alone subject and integration of computer applications with other systems such as databases and networks was not undertaken until students had been given a thorough grounding in those topics as well. Feedback has indicated that students do not believe that working with a database requires programming skills. In fact, the teaching of the building blocks of computer applications have been compartmentalized and taught in isolation from each other. The teaching of introductory computer programming has been an industry requirement of IT degree courses as many jobs require at least some knowledge of the topic. Yet, computer programming is not a skill that all students have equal capabilities of learning (Bruce et al., 2004) and this is clearly shown by the volume of publications dedicated to this topic in the literature over a broad period of time (Eckerdal & Berglund, 2005; Mayer, 1981; Winslow, 1996). The teaching of this introductory material has been done pretty much the same way over the past thirty years. During this period of time that introductory computer programming courses have been taught at QUT, a number of different programming languages and programming paradigms have been used and different approaches to teaching and learning have been attempted in an effort to find the golden thread that would allow students to learn this complex topic. Unfortunately, computer programming is not a skill that can be learnt in one semester. Some basics can be learnt but it can take many years to master (Norvig, 2001). Faculty data typically has shown a bimodal distribution of results for students undertaking introductory programming courses with a high proportion of students receiving a high mark and a high proportion of students receiving a low or failing mark. This indicates that there are students who understand and excel with the introductory material while there is another group who struggle to understand the concepts and practices required to be able to translate a specification or problem statement into a computer program that achieves what is being requested. The consequence of a large group of students failing the introductory programming course has been a high level of attrition amongst first year students. This attrition level does not provide good continuity in student numbers in later years of the degree program and the current approach is not seen as sustainable.
Resumo:
Perceived impaired control over alcohol use is a key cognitive construct in alcohol dependence that has been related prospectively to treatment outcome and may mediate the risk for problem drinking conveyed by impulsivity in non-dependent drinkers. The aim of the current study was to investigate whether perceived impaired control may mediate the association between impulsivity-related measures (derived from the Short-form Eysenck Personality Questionnaire-Revised) and alcohol-dependence severity in alcohol-dependent drinkers. Furthermore, the extent to which this hypothesized relationship was moderated by genetic risk (Taq1A polymorphism in the DRD2/ANKK1 gene cluster) and verbal fluency as an indicator of executive cognitive ability (Controlled Oral Word Association Test) was also examined. A sample of 143 alcohol-dependent inpatients provided an extensive clinical history of their alcohol use, gave 10ml of blood for DNA analysis, and completed self-report measures relating to impulsivity, impaired control and severity of dependence. As hypothesized, perceived impaired control (partially) mediated the association between impulsivity-related measures and alcohol-dependence severity. This relationship was not moderated by the DRD2/ANKK1 polymorphism or verbal fluency. These results suggest that, in alcohol dependence, perceived impaired control is a cognitive mediator of impulsivity-related constructs that may be unaffected by DRD2/ANKK1 and neurocognitive processes underlying the retrieval of verbal information
Resumo:
Integrating Enterprise Systems solutions in the curriculum of not only universities but all types of institutes of higher learning has been a major challenge for nearly ten years. Enterprise Systems education is surprisingly well documented in a number of papers on Information Systems education. However, most publications in this area report on the individual experiences of an institution or an academic. This paper focuses on the most popular Enterprise System - SAP - and summarizes the outcomes of a global survey on the status quo of SAP-related education. Based on feedback of 305 lecturers and more than 700 students, it reports on the main factors of Enterprise Systems education including, critical success factors, alternative hosting models, and students’ perceptions. The results show among others an overall increasing interest in advanced SAP solutions and international collaboration, and a high satisfaction with the concept of using Application Hosting Centers.
Resumo:
This paper is a detailed case narrative on how a Faculty of a leading Australian University conducted a rigorous process improvement project, applying fundamental Business Process Management (BPM) concepts. The key goal was to increase the efficiency of the faculty’s service desk. The decrease of available funds due to reducing student numbers and the ever increasing costs associated with service desk prompted this project. The outcomes of the project presented a set of recommendations which leads to organizational innovation having information technology as an enabler for change. The target audience includes general BPM practitioners or academics who are interested in BPM related case studies, and specific organisations who might be interested in conducting BPM within their service desk processes.
Resumo:
Principal Topic: It is well known that most new ventures suffer from a significant lack of resources, which increases the risk of failure (Shepherd, Douglas and Shanley, 2000) and makes it difficult to attract stakeholders and financing for the venture (Bhide & Stevenson, 1999). The Resource-Based View (RBV) (Barney, 1991; Wernerfelt, 1984) is a dominant theoretical base increasingly drawn on within Strategic Management. While theoretical contributions applying RBV in the domain of entrepreneurship can arguably be traced back to Penrose (1959), there has been renewed attention recently (e.g. Alvarez & Busenitz, 2001; Alvarez & Barney, 2004). This said, empirical work is in its infancy. In part, this may be due to a lack of well developed measuring instruments for testing ideas derived from RBV. The purpose of this study is to develop a measurement scales that can serve to assist such empirical investigations. In so doing we will try to overcome three deficiencies in current empirical measures used for the application of RBV to the entrepreneurship arena. First, measures for resource characteristics and configurations associated with typical competitive advantages found in entrepreneurial firms need to be developed. These include such things as alertness and industry knowledge (Kirzner, 1973), flexibility (Ebben & Johnson, 2005), strong networks (Lee et al., 2001) and within knowledge intensive contexts, unique technical expertise (Wiklund and Shepard, 2003). Second, the RBV has the important limitations of being relatively static and modelled on large, established firms. In that context, traditional RBV focuses on competitive advantages. However, newly established firms often face disadvantages, especially those associated with the liabilities of newness (Aldrich & Auster, 1986). It is therefore important in entrepreneurial contexts to expand to an investigation of responses to competitive disadvantage through an RBV lens. Conversely, recent research has suggested that resource constraints actually have a positive effect on firm growth and performance under some circumstances (e.g., George, 2005; Katila & Shane, 2005; Mishina et al., 2004; Mosakowski, 2002; cf. also Baker & Nelson, 2005). Third, current empirical applications of RBV measured levels or amounts of particular resources available to a firm. They infer that these resources deliver firms competitive advantage by establishing a relationship between these resource levels and performance (e.g. via regression on profitability). However, there is the opportunity to directly measure the characteristics of resource configurations that deliver competitive advantage, such as Barney´s well known VRIO (Valuable, Rare, Inimitable and Organized) framework (Barney, 1997). Key Propositions and Methods: The aim of our study is to develop and test scales for measuring resource advantages (and disadvantages) and inimitability for entrepreneurial firms. The study proceeds in three stages. The first stage developed our initial scales based on earlier literature. Where possible, we adapt scales based on previous work. The first block of the scales related to the level of resource advantages and disadvantages. Respondents were asked the degree to which each resource category represented an advantage or disadvantage relative to other businesses in their industry on a 5 point response scale: Major Disadvantage, Slight Disadvantage, No Advantage or Disadvantage, Slight Advantage and Major Advantage. Items were developed as follows. Network capabilities (3 items) were adapted from (Madsen, Alsos, Borch, Ljunggren & Brastad, 2006). Knowledge resources marketing expertise / customer service (3 items) and technical expertise (3 items) were adapted from Wiklund and Shepard (2003). flexibility (2 items), costs (4 items) were adapted from JIBS B97. New scales were developed for industry knowledge / alertness (3 items) and product / service advantages. The second block asked the respondent to nominate the most important resource advantage (and disadvantage) of the firm. For the advantage, they were then asked four questions to determine how easy it would be for other firms to imitate and/or substitute this resource on a 5 point likert scale. For the disadvantage, they were asked corresponding questions related to overcoming this disadvantage. The second stage involved two pre-tests of the instrument to refine the scales. The first was an on-line convenience sample of 38 respondents. The second pre-test was a telephone interview with a random sample of 31 Nascent firms and 47 Young firms (< 3 years in operation) generated using a PSED method of randomly calling households (Gartner et al. 2004). Several items were dropped or reworded based on the pre-tests. The third stage (currently in progress) is part of Wave 1 of CAUSEE (Nascent Firms) and FEDP (Young Firms), a PSED type study being conducted in Australia. The scales will be tested and analysed with a random sample of approximately 700 Nascent and Young firms respectively. In addition, a judgement sample of approximately 100 high potential businesses in each category will be included. Findings and Implications: The paper will report the results of the main study (stage 3 – currently data collection is in progress) will allow comparison of the level of resource advantage / disadvantage across various sub-groups of the population. Of particular interest will be a comparison of the high potential firms with the random sample. Based on the smaller pre-tests (N=38 and N=78) the factor structure of the items confirmed the distinctiveness of the constructs. The reliabilities are within an acceptable range: Cronbach alpha ranged from 0.701 to 0.927. The study will provide an opportunity for researchers to better operationalize RBV theory in studies within the domain of entrepreneurship. This is a fundamental requirement for the ability to test hypotheses derived from RBV in systematic, large scale research studies.
Resumo:
The service-orientation paradigm has not only become prevalent in the software systems domain in recent years, but is also increasingly applied on the business level to restructure organisational capabilities. In this paper, we present the results of an extensive literature review of 30 approaches related to service identification and analysis for both domains. Based on the consolidation of a superset of comparison criteria for service-oriented methodologies found in related literature, we compare and evaluate the different characteristics of service engineering methods with a focus on service analysis. Although a close business and IT alignment is regarded as one of the core beneficial promises of service-orientation, our analysis suggests that there is a lack of unified, comprehensive methodology for service identification and analysis integrating and addressing both domains. Thus, we discuss how our results can inform directions for future research in this area.
Resumo:
Research Background : Young people with negative experiences of mainstream education often display low levels of traditional literacy. These young people tend to display considerable cultural and social resources developed through their repeated experiences of adversity. Education research has a duty to provide these young people with opportunities to showcase, assess and translate their social and cultural resources into symbolic forms of capital. This creative work addresses the following research question. How can educators encourage disengaged youth to showcase their social and cultural capital through non-traditional literacy practices?----- Research Contribution : This DVD production of a music video affords the young participants opportunities to display their artistic, technical, social and cultural resources through a popular cultural format. In doing so it requires education institutions to assess alternative student outputs that demonstrate the skills these young people acquire as they re-engage in flexible learning environments. The new knowledge derived from this research centres on the retention and certification benefits for disengaged young people using popular culture and social enterprise as authentic learning activities.----- Research Significance : This research is significant because it aims to maximise the number of tangible outcomes related to a school-based arts project. The young participants gained technical, artistic, social and commercial skills during this project. The video sold at numerous youth festivals in SE QLD. It was distributed and downloaded via creative commons licences at the Australian Creative Resource Archive. It also contributed to their certified qualifications and acted as pilot research data for two competitively funded ARC grants (DP0209421 & LP0883643)
Resumo:
The construction industry is categorised as being an information-intensive industry and described as one of the most important industries in any developed country, facing a period of rapid and unparalleled change (Industry Science Resources 1999) (Love P.E.D., Tucker S.N. et al. 1996). Project communications are becoming increasingly complex, with a growing need and fundamental drive to collaborate electronically at project level and beyond (Olesen K. and Myers M.D. 1999; Thorpe T. and Mead S. 2001; CITE 2003). Yet, the industry is also identified as having a considerable lack of knowledge and awareness about innovative information and communication technology (ICT) and web-based communication processes, systems and solutions which may prove beneficial in the procurement, delivery and life cycle of projects (NSW Government 1998; Kajewski S. and Weippert A. 2000). The Internet has debatably revolutionised the way in which information is stored, exchanged and viewed, opening new avenues for business, which only a decade ago were deemed almost inconceivable (DCITA 1998; IIB 2002). In an attempt to put these ‘new avenues of business’ into perspective, this report provides an overall ‘snapshot’ of current public and private construction industry sector opportunities and practices in the implementation and application of web-based ICT tools, systems and processes (e-Uptake). Research found that even with a reserved uptake, the construction industry and its participating organisations are making concerted efforts (fortunately with positive results) in taking up innovative forms of doing business via the internet, including e-Tendering (making it possible to manage the entire tender letting process electronically and online) (Anumba C.J. and Ruikar K. 2002; ITCBP 2003). Furthermore, Government (often a key client within the construction industry),and with its increased tendency to transact its business electronically, undoubtedly has an effect on how various private industry consultants, contractors, suppliers, etc. do business (Murray M. 2003) – by offering a wide range of (current and anticipated) e-facilities / services, including e-Tendering (Ecommerce 2002). Overall, doing business electronically is found to have a profound impact on the way today’s construction businesses operate - streamlining existing processes, with the growth in innovative tools, such as e-Tender, offering the construction industry new responsibilities and opportunities for all parties involved (ITCBP 2003). It is therefore important that these opportunities should be accessible to as many construction industry businesses as possible (The Construction Confederation 2001). Historically, there is a considerable exchange of information between various parties during a tendering process, where accuracy and efficiency of documentation is critical. Traditionally this process is either paper-based (involving large volumes of supporting tender documentation), or via a number of stand-alone, non-compatible computer systems, usually costly to both the client and contractor. As such, having a standard electronic exchange format that allows all parties involved in an electronic tender process to access one system only via the Internet, saves both time and money, eliminates transcription errors and increases speed of bid analysis (The Construction Confederation 2001). Supporting this research project’s aims and objectives, researchers set to determine today’s construction industry ‘current state-of-play’ in relation to e-Tendering opportunities. The report also provides brief introductions to several Australian and International e-Tender systems identified during this investigation. e-Tendering, in its simplest form, is described as the electronic publishing, communicating, accessing, receiving and submitting of all tender related information and documentation via the internet, thereby replacing the traditional paper-based tender processes, and achieving a more efficient and effective business process for all parties involved (NT Governement 2000; NT Government 2000; NSW Department of Commerce 2003; NSW Government 2003). Although most of the e-Tender websites investigated at the time, maintain their tendering processes and capabilities are ‘electronic’, research shows these ‘eTendering’ systems vary from being reasonably advanced to more ‘basic’ electronic tender notification and archiving services for various industry sectors. Research also indicates an e-Tender system should have a number of basic features and capabilities, including: • All tender documentation to be distributed via a secure web-based tender system – thereby avoiding the need for collating paperwork and couriers. • The client/purchaser should be able to upload a notice and/or invitation to tender onto the system. • Notification is sent out electronically (usually via email) for suppliers to download the information and return their responses electronically (online). • During the tender period, updates and queries are exchanged through the same e-Tender system. • The client/purchaser should only be able to access the tenders after the deadline has passed. • All tender related information is held in a central database, which should be easily searchable and fully audited, with all activities recorded. • It is essential that tender documents are not read or submitted by unauthorised parties. • Users of the e-Tender system are to be properly identified and registered via controlled access. In simple terms, security has to be as good as if not better than a manual tender process. Data is to be encrypted and users authenticated by means such as digital signatures, electronic certificates or smartcards. • All parties must be assured that no 'undetected' alterations can be made to any tender. • The tenderer should be able to amend the bid right up to the deadline – whilst the client/purchaser cannot obtain access until the submission deadline has passed. • The e-Tender system may also include features such as a database of service providers with spreadsheet-based pricing schedules, which can make it easier for a potential tenderer to electronically prepare and analyse a tender. Research indicates the efficiency of an e-Tender process is well supported internationally, with a significant number, yet similar, e-Tender benefits identified during this investigation. Both construction industry and Government participants generally agree that the implementation of an automated e-Tendering process or system enhances the overall quality, timeliness and cost-effectiveness of a tender process, and provides a more streamlined method of receiving, managing, and submitting tender documents than the traditional paper-based process. On the other hand, whilst there are undoubtedly many more barriers challenging the successful implementation and adoption of an e-Tendering system or process, researchers have also identified a range of challenges and perceptions that seem to hinder the uptake of this innovative approach to tendering electronically. A central concern seems to be that of security - when industry organisations have to use the Internet for electronic information transfer. As a result, when it comes to e-Tendering, industry participants insist these innovative tendering systems are developed to ensure the utmost security and integrity. Finally, if Australian organisations continue to explore the competitive ‘dynamics’ of the construction industry, without realising the current and future, trends and benefits of adopting innovative processes, such as e-Tendering, it will limit their globalising opportunities to expand into overseas markets and allow the continuation of international firms successfully entering local markets. As such, researchers believe increased knowledge, awareness and successful implementation of innovative systems and processes raises great expectations regarding their contribution towards ‘stimulating’ the globalisation of electronic procurement activities, and improving overall business and project performances throughout the construction industry sectors and overall marketplace (NSW Government 2002; Harty C. 2003; Murray M. 2003; Pietroforte R. 2003). Achieving the successful integration of an innovative e-Tender solution with an existing / traditional process can be a complex, and if not done correctly, could lead to failure (Bourn J. 2002).
Resumo:
It has been proposed that body image disturbance is a form of cognitive bias wherein schemas for self-relevant information guide the selective processing of appearancerelated information in the environment. This threatening information receives disproportionately more attention and memory, as measured by an Emotional Stroop and incidental recall task. The aim of this thesis was to expand the literature on cognitive processing biases in non-clinical males and females by incorporating a number of significant methodological refinements. To achieve this aim, three phases of research were conducted. The initial two phases of research provided preliminary data to inform the development of the main study. Phase One was a qualitative exploration of body image concerns amongst males and females recruited through the general community and from a university. Seventeen participants (eight male; nine female) provided information on their body image and what factors they saw as positively and negatively impacting on their self evaluations. The importance of self esteem, mood, health and fitness, and recognition of the social ideal were identified as key themes. These themes were incorporated as psycho-social measures and Stroop word stimuli in subsequent phases of the research. Phase Two involved the selection and testing of stimuli to be used in the Emotional Stroop task. Six experimental categories of words were developed that reflected a broad range of health and body image concerns for males and females. These categories were high and low calorie food words, positive and negative appearance words, negative emotion words, and physical activity words. Phase Three addressed the central aim of the project by examining cognitive biases for body image information in empirically defined sub-groups. A National sample of males (N = 55) and females (N = 144), recruited from the general community and universities, completed an Emotional Stroop task, incidental memory test, and a collection of psycho-social questionnaires. Sub-groups of body image disturbance were sought using a cluster analysis, which identified three sub-groups in males (Normal, Dissatisfied, and Athletic) and four sub-groups in females (Normal, Health Conscious, Dissatisfied, and Symptomatic). No differences were noted between the groups in selective attention, although time taken to colour name the words was associated with some of the psycho-social variables. Memory biases found across the whole sample for negative emotion, low calorie food, and negative appearance words were interpreted as reflecting the current focus on health and stigma against being unattractive. Collectively these results have expanded our understanding of processing biases in the general community by demonstrating that the processing biases are found within non-clinical samples and that not all processing biases are associated with negative functionality