723 resultados para digital business
Resumo:
The strategies of price discrimination engaged in by a number of international publishers, coupled with a lack of competition and restrictions on the ability of consumers to engage in arbitrage, is likely to undermine the legitimacy of copyright law in Australia. By increasing prices beyond a reasonable and fair level, these strategies also undermine the goal of copyright law to enhance access to cultural goods. Enhancing access – and therefore lowering prices – is crucial to enhancing Australia's innovative capacity and the ability of Australians to experience, learn, act, and grow through cultural works. We recommend that the committee investigates the following options: 1. Repeal parallel importation restrictions; 2. Fundamentally reconsider the operation of anti-circumvention law in the context of digital distribution models; 3. Prohibit and render unenforceable contractual restrictions on parallel importation; 4. Introduce a right of digital resale in Australia.
Resumo:
Automated process discovery techniques aim at extracting models from information system logs in order to shed light into the business processes supported by these systems. Existing techniques in this space are effective when applied to relatively small or regular logs, but otherwise generate large and spaghetti-like models. In previous work, trace clustering has been applied in an attempt to reduce the size and complexity of automatically discovered process models. The idea is to split the log into clusters and to discover one model per cluster. The result is a collection of process models -- each one representing a variant of the business process -- as opposed to an all-encompassing model. Still, models produced in this way may exhibit unacceptably high complexity. In this setting, this paper presents a two-way divide-and-conquer process discovery technique, wherein the discovered process models are split on the one hand by variants and on the other hand hierarchically by means of subprocess extraction. The proposed technique allows users to set a desired bound for the complexity of the produced models. Experiments on real-life logs show that the technique produces collections of models that are up to 64% smaller than those extracted under the same complexity bounds by applying existing trace clustering techniques.
Resumo:
Firms are moving away from decentralized regional offices. Last year the author spoke with a valuer working on the Sunshine Coast for a Brisbane firm. In years past this valuer would have left home in the morning to go to the office, as well as travelling during the day to client sites. Now they get up, have breakfast, change out of their pyjamas (if they have meetings!) and walk into their employer set-up home office to ‘punch-in’. Apart from travel for essential meetings at head office, or for the purpose of on-site inspections, they can attend work, engage with colleagues and clients and never leave home. While this practice may be a cost saving to the firm and a commuter-friendly way of working, it raises a range of issues to be managed.
Resumo:
In the corporate regulation landscape, 'meta-regulation' is a comparatively new legal approach. The sketchy role of state promulgated authoritative laws in pluralized society and scepticism in corporate self-regulation's role have resulted in the development of this legal approach. It has opened up possibilities to synthesize corporate governance to add social values in corporate self-regulation. The core of this approach is the fusion of responsive and reflexive legal strategies to combine regulators and regulatees for reaching a particular goal. This paper argues that it is a potential strategy that can be successfully deployed to develop a socially responsible corporate culture for the business enterprises, so that they will be able to acquire social, environmental and ethical values in their self-regulation sustainably. Taking Bangladeshi corporate laws as an instance, this paper also evaluates the scope of incorporating this approach in laws of the least developed common law countries in general.
Resumo:
The Australian Business Assessment of Computer User Security (ABACUS) survey is a nationwide assessment of the prevalence and nature of computer security incidents experienced by Australian businesses. This report presents the findings of the survey which may be used by businesses in Australia to assess the effectiveness of their information technology security measures.
Resumo:
The Queensland University of Technology (QUT) Library, like many other academic and research institution libraries in Australia, has been collaborating with a range of academic and service provider partners to develop a range of research data management services and collections. Three main strategies are being employed and an overview of process, infrastructure, usage and benefits is provided of each of these service aspects. The development of processes and infrastructure to facilitate the strategic identification and management of QUT developed datasets has been a major focus. A number of Australian National Data Service (ANDS) sponsored projects - including Seeding the Commons; Metadata Hub / Store; Data Capture and Gold Standard Record Exemplars have / will provide QUT with a data registry system, linkages to storage, processes for identifying and describing datasets, and a degree of academic awareness. QUT supports open access and has established a culture for making its research outputs available via the QUT ePrints institutional repository. Incorporating open access research datasets into the library collections is an equally important aspect of facilitating the adoption of data-centric eresearch methods. Some datasets are available commercially, and the library has collaborated with QUT researchers, in the QUT Business School especially strongly, to identify and procure a rapidly growing range of financial datasets to support research. The library undertakes licensing and uses the Library Resource Allocation to pay for the subscriptions. It is a new area of collection development for with much to be learned. The final strategy discussed is the library acting as “data broker”. QUT Library has been working with researchers to identify these datasets and undertake the licensing, payment and access as a centrally supported service on behalf of researchers.
Resumo:
Purpose – Business process management (BPM) requires a holistic perspective that includes managing the culture of an organization to achieve objectives of efficient and effective business processes. Still, the specifics of a BPM-supportive organizational culture have not been examined so far. Thus, the purpose of this paper is to identify the characteristics of a cultural setting supportive of BPM objectives. Design/methodology/approach – The paper examines the constituent values of a BPM-supportive cultural setting through a global Delphi study with BPM experts from academia and practice and explore these values in a cultural value framework. Findings – The paper empirically identifies and defines four key cultural values supporting BPM, viz., customer orientation, excellence, responsibility, and teamwork. The paper discusses the relationships between these values and identifies a particular challenge in managing these seemingly competing values. Research limitations/implications – The identification and definition of these values represents a first step towards the operationalization (and empirical analysis) of what has been identified as the concept of BPM culture, i.e. a culture supportive of achieving BPM objectives. Practical implications – Identifying these cultural values provides the basis for developing an instrument that can measure how far an existing cultural context is supportive of BPM. This, in turn, is fundamental for identifying measures towards achieving a BPM culture as a necessary, yet not sufficient means to obtain BPM success. Originality/value – The paper examines which cultural values create an environment receptive for BPM and, thus, specifies the important theoretical construct BPM culture. In addition, the paper raises awareness for realizing these values in a BPM context.
Resumo:
In power hardware in the loop (PHIL) simulations, a real-time simulated power system is interfaced to a piece of hardware, usually called hardware under test (HuT). A PHIL test can be realized using several simulation tools. Among them Real Time Digital Simulator (RTDS) is an ideal tool to perform complex power system simulations in near real-time. Stable operation of the entire system, along with the accuracy of simulation results are the main concerns regarding a PHIL simulation. In this paper, a simulated power network on RTDS will be interfaced to HuT through a voltage source converter (VSC). Issues around stability and other interface problems are studied and a new method to stabilize some unstable PHIL cases is proposed. PHIL simulation results in PSCAD and RSCAD are presented.
Resumo:
Norms regulate the behaviour of their subjects and define what is legal and what is illegal. Norms typically describe the conditions under which they are applicable and the normative effects as a results of their applications. On the other hand, process models specify how a business operation or service is to be carried out to achieve a desired outcome. Norms can have significant impact on how business operations are conducted and they can apply to the whole or part of a business process. For example, they may impose conditions on the different aspects of a process (e.g., perform tasks in a specific sequence (control-flow), at a specific time or within a certain time frame (temporal aspect), by specific people (resources)). We propose a framework that provides the formal semantics of the normative requirements for determining whether a business process complies with a normative document (where a normative document can be understood in a very broad sense, ranging from internal policies to best practice policies, to statutory acts). We also present a classification of normal requirements based on the notion of different types of obligations and the effects of violating these obligations.
Resumo:
The role of Information and Communications Technology (ICT) has been identified as an important factor by the United Nations in achieving the millennium development goals (UNAPCICT, 2012)1. The potential for ICT has been identified as a means to reducing poverty, creating global communities by providing access to the internet and mobile networks to rural communities, improving education services, medical services, and information availability. As of today, significant amounts of funds have been invested by the governments and donor organizations in ‘Information and Communication Technologies for Development (ICT4D)’projects by establishing telecenters, e-villages, e-health, electronic and mobile banking, and egovernment systems for citizens in general, and more specifically, rural communities to bridge the digital divide (Heeks & Molla, 2009).
Resumo:
An environmentally sustainable and thus green business process is one that delivers organizational value whilst also exerting a minimal impact on the natural environment. Recent works from the field of Information Systems (IS) have argued that information systems can contribute to the design and implementation of sustainable business processes. While prior research has investigated how information systems can be used in order to support sustainable business practices, there is still a void as to the actual changes that business processes have to undergo in order to become environmentally sustainable, and the specific role that information systems play in enabling this change. In this paper, we provide a conceptualization of environmentally sustainable business processes, and discuss the role of functional affordances of information systems in enabling both incremental and radical changes in order to make processes environmentally sustainable. Our conceptualization is based on (a) a fundamental definition of the concept of environmental sustainability, grounded in two basic components:the environmental source and sink functions of any project or activity, and (b) the concept of functional affordances, which describe the potential uses originating in the material properties of information systems in relation to their use context. In order to illustrate the application of our framework and provide a first evaluation, we analyse two examples from prior research where information systems impacted on the sustainability of business processes.
Resumo:
Enterprise Systems (ES) can be understood as the de facto standard for holistic operational and managerial support within an organization. Most commonly ES are offered as commercial off-the-shelf packages, requiring customization in the user organization. This process is a complex and resource-intensive task, which often prevents small and midsize enterprises (SME) from undertaking configuration projects. Especially in the SME market independent software vendors provide pre-configured ES for a small customer base. The problem of ES configuration is shifted from the customer to the vendor, but remains critical. We argue that the yet unexplored link between process configuration and business document configuration must be closer examined as both types of configuration are closely tied to one another.
Resumo:
Enterprise Systems (ES) provide standardized, off-theshelf support for operations and management within organizations. With the advent of ES based on a serviceoriented architecture (SOA) and an increasing demand of IT-supported interorganizational collaboration, implementation projects face paradigmatically new challenges. The configuration of ES is costly and error-prone. Dependencies between business processes and business documents are hardly explicit and foster component proliferation instead of reuse. Configurative modeling can support the problem in two ways: First, conceptual modeling abstracts from technical details and provides more intuitive access and overview. Second, configuration allows the projection of variants from master models providing manageable variants with controlled flexibility. We aim at tackling the problem by proposing an integrated model-based framework for configuring both, processes and business documents, on an equal basis; as together, they constitute the core business components of an ES.
Resumo:
Increasing awareness of the benefits of stimulating entrepreneurial behaviour in small and medium enterprises has fostered strong interest in innovation programs. Recently many western countries have invested in design innovation for better firm performance. This research presents some early findings from a study of companies that participated in a holistic approach to design innovation, where the outcomes include better business performance and better market positioning in global markets. Preliminary findings from in-depth semi-structured interviews indicate the importance of firm openness to new ways of working and to developing new processes of strategic entrepreneurship. Implications for theory and practice are discussed.