60 resultados para Outsourcing
Resumo:
Management of change in construction organisations to capture internal knowledge and maximise innovation is central to construction process re-engineering. Recent international trends toward privatisation and outsourcing of many government functions has seen wholesale changes to the role of government departments. In Brisbane, Australia, the Port of Brisbane Corporation has responsibilities for development and maintenance of all port and harbour facilities in the Brisbane region. The PBC is an acknowledged leader in encouraging internal technical development. Yet 20 years ago, this organisation operated as a small division within a large and bureaucratic Queensland Government public service department. This paper reviews construction project procurement strategies for the port’s civil and structural facilities since a separate organisational entity with responsibilities for Port of Brisbane was formed in 1976. The Port of Brisbane Corporation serves as an initial case study setting for a larger research project studying innovative practices in the context of the trend towards corporatising and privatising public sector organisations.
Resumo:
Purpose of this paper – The purpose of this investigation is to help establish: whether or not strong relationships between suppliers and customers improve performance; and if prescriptive frameworks on outsourcing radical innovations are dependent on industry clockspeed. Design/methodology/approach – A survey of UK-based manufacturers, followed by a statistical analysis. Findings – Long-term supplier links seem not to play a role in the development of radical innovations. Moreover, industry clockspeed has no significant bearing on the success or failure of any outsourcing strategy for radically new technologies. Research limitations/implications – Literature about outsourcing in the face of radical innovation can be more confidently applied to industries of all clockspeeds. Practical implications – Prescriptions for fast clockspeed industries should be applied more broadly: all industries should maintain a high degree of vertical integration in the early days of a radical innovation. Originality/value – Prior papers had explored whether or not a company should outsource radical innovations, but none had determined if this is equally true for slow industries and fast ones. Therein lies the original contribution of this paper.
Resumo:
Some evidence in the area of make-buy decisions for new technologies suggests that it is a good idea for a company to pursue a fairly rigorous ''make'' policy in the early days of a potentially disruptive innovation. Other studies prescribe exactly the opposite, promoting instead a ''buy'' strategy. This paper seeks to bridge the gap between these perspectives by suggesting that both strategies are valid, but that they are most successfully applied in different market environments. The ''make'' prescription may be more suited to either extremely fast or extremely slow rates of technological change, while a ''buy'' strategy might be more appropriate in market sectors where technologies evolve at a medium pace. This paper highlights the importance of industry clockspeed and supplier relationships in make-buy decisions for new technologies, and puts forward two new hypotheses that require empirical testing.
Resumo:
EMR (Electronic Medical Record) is an emerging technology that is highly-blended between non-IT and IT area. One methodology is to link the non-IT and IT area is to construct databases. Nowadays, it supports before and after-treatment for patients and should satisfy all stakeholders such as practitioners, nurses, researchers, administrators and financial departments and so on. In accordance with the database maintenance, DAS (Data as Service) model is one solution for outsourcing. However, there are some scalability and strategy issues when we need to plan to use DAS model properly. We constructed three kinds of databases such as plan-text, MS built-in encryption which is in-house model and custom AES (Advanced Encryption Standard) - DAS model scaling from 5K to 2560K records. To perform custom AES-DAS better, we also devised Bucket Index using Bloom Filter. The simulation showed the response times arithmetically increased in the beginning but after a certain threshold, exponentially increased in the end. In conclusion, if the database model is close to in-house model, then vendor technology is a good way to perform and get query response times in a consistent manner. If the model is DAS model, it is easy to outsource the database, however, some techniques like Bucket Index enhances its utilization. To get faster query response times, designing database such as consideration of the field type is also important. This study suggests cloud computing would be a next DAS model to satisfy the scalability and the security issues.
Resumo:
In the medical and healthcare arena, patients‟ data is not just their own personal history but also a valuable large dataset for finding solutions for diseases. While electronic medical records are becoming popular and are used in healthcare work places like hospitals, as well as insurance companies, and by major stakeholders such as physicians and their patients, the accessibility of such information should be dealt with in a way that preserves privacy and security. Thus, finding the best way to keep the data secure has become an important issue in the area of database security. Sensitive medical data should be encrypted in databases. There are many encryption/ decryption techniques and algorithms with regard to preserving privacy and security. Currently their performance is an important factor while the medical data is being managed in databases. Another important factor is that the stakeholders should decide more cost-effective ways to reduce the total cost of ownership. As an alternative, DAS (Data as Service) is a popular outsourcing model to satisfy the cost-effectiveness but it takes a consideration that the encryption/ decryption modules needs to be handled by trustworthy stakeholders. This research project is focusing on the query response times in a DAS model (AES-DAS) and analyses the comparison between the outsourcing model and the in-house model which incorporates Microsoft built-in encryption scheme in a SQL Server. This research project includes building a prototype of medical database schemas. There are 2 types of simulations to carry out the project. The first stage includes 6 databases in order to carry out simulations to measure the performance between plain-text, Microsoft built-in encryption and AES-DAS (Data as Service). Particularly, the AES-DAS incorporates implementations of symmetric key encryption such as AES (Advanced Encryption Standard) and a Bucket indexing processor using Bloom filter. The results are categorised such as character type, numeric type, range queries, range queries using Bucket Index and aggregate queries. The second stage takes the scalability test from 5K to 2560K records. The main result of these simulations is that particularly as an outsourcing model, AES-DAS using the Bucket index shows around 3.32 times faster than a normal AES-DAS under the 70 partitions and 10K record-sized databases. Retrieving Numeric typed data takes shorter time than Character typed data in AES-DAS. The aggregation query response time in AES-DAS is not as consistent as that in MS built-in encryption scheme. The scalability test shows that the DBMS reaches in a certain threshold; the query response time becomes rapidly slower. However, there is more to investigate in order to bring about other outcomes and to construct a secured EMR (Electronic Medical Record) more efficiently from these simulations.
Resumo:
Background Physical inactivity is a modifiable risk factor for many chronic conditions and a leading cause of premature mortality. An increasing proportion of adults worldwide are not engaging in a level of physical activity sufficient to prevent or alleviate these adverse effects. Medical professionals have been identified as potentially powerful sources of influence for those who do not meet minimum physical activity guidelines. Health professionals are respected and expected sources of advice and they reach a large and relevant proportion of the population. Despite this potential, health professionals are not routinely practicing physical activity promotion. Discussion Medical professionals experience several known barriers to physical activity promotion including lack of time and lack of perceived efficacy in changing physical activity behaviour in patients. Furthermore, evidence for effective physical activity promotion by medical professionals is inconclusive. To address these problems, new approaches to physical activity promotion are being proposed. These include collaborating with community based physical activity behaviour change interventions, preparing patients for effective brief counselling during a consultation with the medical professional, and use of interactive behaviour change technology. Summary It is important that we recognise the latent risk of physical inactivity among patients presenting in clinical settings. Preparation for improving patient physical activity behaviours should commence before the consultation and may include physical activity screening. Medical professionals should also identify suitable community interventions to which they can refer physically inactive patients. Outsourcing the majority of a comprehensive physical activity intervention to community based interventions will reduce the required clinical consultation time for addressing the issue with each patient. Priorities for future research include investigating ways to promote successful referrals and subsequent engagement in comprehensive community support programs to increase physical activity levels of inactive patients. Additionally, future clinical trials of physical activity interventions should be evaluated in the context of a broader framework of outcomes to inform a systematic consideration of broad strengths and weaknesses regarding not only efficacy but cost-effectiveness and likelihood of successful translation of interventions to clinical contexts.
Resumo:
In this issue of the Journal, the articles considered reflect the depth of research and practice that is unique to project management discipline. The range of topics addressed includes managing project contracts (Chan et al., “A Comparative Study of the Benefits of Applying Target Cost Contracts Between South Australia and Hong Kong”), managing project complexity (Chronéer and Bergquist, “Managerial Complexity in Process Industrial R&D Projects: A Swedish Study”), identifying early warning signs in complex projects (Williams et al., “Identifying and Acting on Early Warning Signs in Complex Projects”), project risk management (Krane, Olsson, and Rolstadås, “How Project Manager–Project Owner Interaction Can Work Within and Influence Project Risk Management”), exploring decisions regarding outsourcing and alignment of the project management office (Martins and Martins, “Outsourcing Operations in Project Management Offices: The Reality of Brazilian Companies”), and project management practices at strategic and tactical levels of the organization leading to sustainable development (Herazo, Lizarralde, and Paquin, “Sustainable Development in the Building Sector: A Canadian Case Study on the Alignment of Strategic and Tactical Management”).
Resumo:
New venture growth is a central topic in entrepreneurship research. Although sales growth is emerging as the most commonly used measure of growth for emerging ventures, employment growth has also been used frequently. However, empirical research demonstrates that there are only very low to moderately sized correlations between the two (Delmar et aL, 2003; Weinzimmer, et al., 1998). In addition) sales growth and employment growth respond differently to a wide variety of criteria (Baum et al., 2001; Delmar et al., 2003). In this study we use transaction cost economics (Williamson, 1996) as a theoretical base to examine transaction cost influences on the addition of new employees as emerging ventures experience sales growth. \\le theorize that transaction cost economics variables will moderate the relationship between sales growth and employment growth. W'e develop and test hypotheses related to asset specificity, behavioral uncertainty, and the influence of resource munificence on the strength of the sales growth/ employment growth relationship. Asset specificity is theorized to be a positive moderator of the relationship between sales growth and employment growth. When the behavioral uncertainty associated with adding new employees is greater than that of outsourcing or subcontracting, it is hypothesized to be a negative moderator of the sales growth/employment growth relationship. We also hypothesize that resource scarcity will strengthen those relationships.
Resumo:
Availability has become a primary goal of information security and is as significant as other goals, in particular, confidentiality and integrity. Maintaining availability of essential services on the public Internet is an increasingly difficult task in the presence of sophisticated attackers. Attackers may abuse limited computational resources of a service provider and thus managing computational costs is a key strategy for achieving the goal of availability. In this thesis we focus on cryptographic approaches for managing computational costs, in particular computational effort. We focus on two cryptographic techniques: computational puzzles in cryptographic protocols and secure outsourcing of cryptographic computations. This thesis contributes to the area of cryptographic protocols in the following ways. First we propose the most efficient puzzle scheme based on modular exponentiations which, unlike previous schemes of the same type, involves only a few modular multiplications for solution verification; our scheme is provably secure. We then introduce a new efficient gradual authentication protocol by integrating a puzzle into a specific signature scheme. Our software implementation results for the new authentication protocol show that our approach is more efficient and effective than the traditional RSA signature-based one and improves the DoSresilience of Secure Socket Layer (SSL) protocol, the most widely used security protocol on the Internet. Our next contributions are related to capturing a specific property that enables secure outsourcing of cryptographic tasks in partial-decryption. We formally define the property of (non-trivial) public verifiability for general encryption schemes, key encapsulation mechanisms (KEMs), and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption avors. We show that some generic transformations and concrete constructions enjoy this property and then present a new public-key encryption (PKE) scheme having this property and proof of security under the standard assumptions. Finally, we combine puzzles with PKE schemes for enabling delayed decryption in applications such as e-auctions and e-voting. For this we first introduce the notion of effort-release PKE (ER-PKE), encompassing the well-known timedrelease encryption and encapsulated key escrow techniques. We then present a security model for ER-PKE and a generic construction of ER-PKE complying with our security notion.
Resumo:
Retaining customers is a relevant topic throughout all service industries. However, only limited attention has been directed towards studying the antecedents of subscription renewal in the context of operational cloud enterprise systems. Cloud services have historically been offered as subscription-based services with the (theoretical) possibility of seamless service cancellation, in contrast to classical IT-Outsourcing contracts or license-based software installations of on-premise enterprise systems. In this work, we investigate the central concept of subscription renewal by focusing on different facets of IS success and their relevance for distinct employee cohorts. Analyzing inter-cohort differences has strong practical implications, as it helps IT vendors to focus on specific IT-related factors when trying to retain customers. Therefore an empirical study was undertaken. The hypotheses were developed on an individual level and tested using survey responses of IT decision makers within companies which adopted cloud enterprise systems. Gathered data was then analyzed using PLS. The results show that subscription renewal intention of the strategic cohort is mainly based on perceived system quality, whereas information quality explains most of the variance of subscription renewal in the management cohort. Beneath the cloud enterprise systems specific contributions, the work adds to the theoretical body of research related to IS success and IS continuation, as well as stakeholder perspectives.
Resumo:
Drawing on data from the Australian Business Assessment of Computer User Security (ABACUS) survey, this paper examines a range of factors that may influence businesses’ likelihood of being victimised by a computer security incident. It has been suggested that factors including business size, industry sector, level of outsourcing, expenditure on computer security functions and types of computer security tools and/or policies used may influence the probability of particular businesses experiencing such incidents. This paper uses probability modelling to test whether this is the case for the 4,000 businesses that responded to the ABACUS survey. It was found that the industry sector that a business belonged to, and business expenditure on computer security, were not related to businesses’ likelihood of detecting computer security incidents. Instead, the number of employees that a business has and whether computer security functions were outsourced were found to be key indicators of businesses’ likelihood of detecting incidents. Some of the implications of these findings are considered in this paper.
Resumo:
Make-buy decisions are an important aspect of the overall strategic plans for most firms, and the introduction of a new and potentially radical technology into an industry should therefore be a cue for managers to review their make-buy policies. Should a company make in-house the components and processes underpinning the technology, or should it buy them from an outside supplier? Earlier attempts to answer this question may have failed to agree on a single verdict because they have overlooked two important market forces: supplier relations and industry clockspeed. Based on an intensive three-year study at the University of Cambridge which analyzed supply chain management practices from a broad range of manufacturers around the world, this book helps to resolve this classic technology outsourcing dilemma and gives managers the tools they will need to determine if they should make or buy the components and processes that go into a potentially radical innovation.
Resumo:
The purpose of this paper is to empirically examine the state of cloud computing adoption in Australia. I specifically focus on the drivers, risks, and benefits of cloud computing from the perspective of IT experts and forensic accountants. I use thematic analysis of interview data to answer the research questions of the study. The findings suggest that cloud computing is increasingly gaining foothold in many sectors due to its advantages such as flexibility and the speed of deployment. However, security remains an issue and therefore its adoption is likely to be selective and phased. Of particular concern are the involvement of third parties and foreign jurisdictions, which in the event of damage may complicate litigation and forensic investigations. This is one of the first empirical studies that reports on cloud computing adoption and experiences in Australia.
Resumo:
The fifth edition of this text has been thoroughly updated, continuing its strong emphasis on the importance of the Asian region to contemporary Australian and New Zealand organisations. Many Asian case examples are featured to illustrate key management concepts, and these provide a useful basis for comparison with management practices in Australia and New Zealand. Numerous practical examples throughout the text highlight contemporary management issues, such as: •workplace diversity •sustainability •ethics/corporate social responsibility •the impact of technology •innovation in the workplace •globalisation •employee engagement •flexible working arrangements •work-life balance •generational issues in the workplace •skills shortages in various industries •the importance of effective employee recruitment and training •organisational culture •workforce flexibility and casualisation •the ‘24/7’ nature of contemporary communication technology, including social media •outsourcing Management, 5th Asia Pacific edition, has also retained the features that have made previous editions so popular with students and lecturers, including the Career Readiness Workbook activities at the end of the book, and the accompanying Interactive Study Guide with its vast array of multimedia resources.