909 resultados para speed management
Resumo:
The management and improvement of business processes are a core topic of the information systems discipline. The persistent demand in corporations within all industry sectors for increased operational efficiency and innovation, an emerging set of established and evaluated methods, tools, and techniques as well as the quickly growing body of academic and professional knowledge are indicative for the standing that Business Process Management (BPM) has nowadays. During the last decades, intensive research has been conducted with respect to the design, implementation, execution, and monitoring of business processes. Comparatively low attention, however, has been paid to questions related to organizational issues such as the adoption, usage, implications, and overall success of BPM approaches, technologies, and initiatives. This research gap motivated us to edit a corresponding special focus issue for the journal BISE/WIRTSCHAFTSINFORMATIK. We are happy that we are able to present a selection of three research papers and a state-of-the-art paper in the scientific section of the issue at hand. As these papers differ in the topics they investigate, the research method they apply, and the theoretical foundations they build on, the diversity within the BPM field becomes evident. The academic papers are complemented by an interview with Phil Gilbert, IBM’s Vice President for Business Process and Decision Management, who reflects on the relationship between business processes and the data flowing through them, the need to establish a process context for decision making, and the calibration of BPM efforts toward executives who see processes as a means to an end, rather than a first-order concept in its own right.
Resumo:
Purpose – Within the construction industry there is a growing awareness of the need for linking knowledge management (KM) to business strategy, organisational objectives and existing performance measures. This study was undertaken within the context of construction organisations, and attempts to provide the empirical evidence about the relationships between KM activities and organisational business performance. Design/methodology/approach – A questionnaire survey was administered to a sample of construction contractors operating in Hong Kong to investigate the opinions of construction professionals regarding the intensity of KM activities and business performance within their organisations. In parallel to the survey, semi-structured interviews were undertaken to provide qualitative insights that helped to clarify and deepen understanding of the KM process within the context of the research target. Findings – The investigation shows that knowledge utilisation is the strongest contributor to general business performance. In addition, the impact of KM activities on the lagging performance indicators of the Balanced Scorecard (BSC), such as “financial performance”, is in an indirect manner, and through the leading indicators such as performance from “internal process” as well as “learning and growth” perspectives. Originality/value – The study empirically establishes the linkage between intensity of KM activities and business performance, and demonstrates that KM strategies need to be explicitly formulated and measured according to organisational business objectives.
Resumo:
In the modern connected world, pervasive computing has become reality. Thanks to the ubiquity of mobile computing devices and emerging cloud-based services, the users permanently stay connected to their data. This introduces a slew of new security challenges, including the problem of multi-device key management and single-sign-on architectures. One solution to this problem is the utilization of secure side-channels for authentication, including the visual channel as vicinity proof. However, existing approaches often assume confidentiality of the visual channel, or provide only insufficient means of mitigating a man-in-the-middle attack. In this work, we introduce QR-Auth, a two-step, 2D barcode based authentication scheme for mobile devices which aims specifically at key management and key sharing across devices in a pervasive environment. It requires minimal user interaction and therefore provides better usability than most existing schemes, without compromising its security. We show how our approach fits in existing authorization delegation and one-time-password generation schemes, and that it is resilient to man-in-the-middle attacks.
Resumo:
Purpose: Recent knowledge management (KM) literature suggests that KM activities are influenced by the elements of the internal business environment (BE) of organisations. This paper attempts to provide some unique insights into the contextual input of the KM process through empirically identifying the major factors (i.e. “forces”) within the internal BE of construction organisations operating in Hong Kong, and investigating their impact on the intensity of KM activities. Design/methodology/approach: A questionnaire survey was administered to a sample of construction contractors operating in Hong Kong to elicit opinions on the internal BE and intensity of KM activities as executed by targeted organisations. A total of 149 usable responses were received from 99 organisations representing about 38 percent of the research population. In parallel, to the survey, a total of 15 semi-structured interviews were undertaken to provide more insights into the phenomenon under investigation. Findings: Supported by the empirical and qualitative evidence, this study established that firstly, both organisational and technical environments have the capacity to either positively or negatively impact the intensity of KM activities, and both environments serve as stimuli in increasing each other's dynamism; secondly, certain types of KM activities are stronger “energy receivers” and easily to be “powered up” by manipulating factors representing these two environments. Then, through interactions between KM activities, the intensity of the whole strategic KM cycle will be increased thus helping to strengthen organisational competitive advantage.
Resumo:
Purpose – Recent knowledge management (KM) literature suggests that KM activities are not independent of each other, rather they interact with each other to form a process which receives input from both external and internal business environments, and then produces new knowledge for future utilisation. The purpose of this paper is to empirically investigate the relationships between KM activities within the construction business context in order to identify and map the pattern of their interactions. Design/methodology/approach – A questionnaire survey was administered to a sample of contracting organisations operating in Hong Kong to elicit opinions of construction professionals on the intensity of KM activities currently being executed by their organisations in order to facilitate knowledge capture, sharing and utilisation. More than 150 respondents from 99 organisations responded to the survey. Additionally, a total of 15 semi-structured interviews were undertaken to provide a unique perspective on many of the challenges facing local construction organisations when dealing with KM activities. Findings – Knowledge acquisition and utilisation play paramount roles in the development of the organisational knowledge asset. The higher the intensity of these two activities, the larger the organisational knowledge pool which, in turn, demands greater knowledge dissemination capacity. This dissemination capacity enables more active and intense responses to market changes and clients' needs, thus facilitating and stimulating acquisition and utilisation of new tacit knowledge, thus improving organisational business performance. Originality/value – Interactions between KM activities were empirically investigated, from a strategic perspective, in the construction business context.
Resumo:
Efficient state asset management is crucial for government departments that rely on the operations of their state assets in order to fulfil their public functions, which include public service provision and others. These assets may be expensive, extensive and or, complex, and can have a major impact on the ability of governments to perform its function over extended periods. Various governments around the world have increasingly recognised the importance of an efficient state asset management laws, policies, and practices; exemplified by the surge in state asset management reform. This phenomenon is evident in Indonesia, in particular through the establishment of the Directorate General of State Assets in 2006, who was appointed as the ultimate state asset manager (of Republic of Indonesia) and the proprietor of state asset management reform. The Directorate General of State Assets too has pledged its adherence to good governance principles within its state asset management laws and policies reform. However the degree that good governance principles are conceptualised is unknown, resulting in questions of how and to what extent is good governance principles evident within Indonesia's reformed state asset management laws and policies. This study seeks to understand the level of which good governance principles are conceptualised and understood within reformed state asset management policies in Indonesia (as a case study), and identify the variables that play a role in the implementation of said reform. Although good governance improvements has been a central tenet in Indonesian government agenda, and state asset management reform has propelled in priority due to found neglect and unfavourable audit results; there is ambiguity in regards to the extent that good governance is conceptualised within the reform, how and whether this relationship is understood by state asset managers (i.e government officials), and what (and how) other variables play a supporting and/or impeding role in the reform. Using empirical data involving a sample of four Indonesian regional governments and 70 interviews; discrepancy in which good governance principles are conceptualised, the level it is conceptualised, at which stage of state asset management practice it is conceptualised, and the level it is understood by state asset managers (i.e government officials) was found. Human resource capacity and capability, the notion of 'needing more time', low legality, infancy of reform, and dysfunctional sense of stewardship are identified as specific impeding variables to state asset management reform; whilst decentralisation and regional autonomy regime, political history, and culture play a consistent undercurrent key role in good governance related reforms within Indonesia. This study offers insights to Indonesian policy makers interested in ensuring the conceptualisation and full implementation of good governance in all areas of governing, particularly within state asset management practices. Most importantly, this study identifies an asymmetry in good governance understanding, perspective, and assumptions between policy maker (i.e high level government officials) and policy implementers (i.e low level government officials); to be taken into account for future policy evolvements and/or writing. As such, this study suggests the need for a modified perspective and approach to good governance conceptualisation and implementation strategies, one that acknowledges and incorporates a nation's unique characteristics and no longer denies the double-edged sword of simplified assumptions of governance.
Resumo:
Downtime (DT) caused by non-availability of equipment and equipment breakdown has non-trivial impact on the performance of construction projects. Earlier research has often addressed this fact, but it has rarely explained the causes and consequences of DT – especially in the context of developing countries. This paper presents a DT model to address this issue. Using this model, the generic factors and processes related to DT are identified, and the impact of DT is quantified. By applying the model framework to nine road projects in Nepal, the impact of DT is explored in terms of its duration and cost. The research findings highlight how various factors and processes interact with each other to create DT, and mitigate or exacerbate its impact on project performance. It is suggested that construction companies need to adopt proactive equipment management and maintenance programs to minimize the impact of DT.
Resumo:
Fruit flies require protein for reproductive development and actively feed upon protein sources in the field. Liquid protein baits mixed with insecticide are used routinely to manage pest fruit flies, such as Bactrocera tryoni (Froggatt). However, there are still some gaps in the underpinning science required to improve the efficacy of bait spray technology. The spatial and temporal foraging behaviour of B. tryoni in response to protein was investigated in the field. A series of linked trials using either wild flies in the open field or laboratory-reared flies in field cages and a netted orchard were undertaken using nectarines and guavas. Key questions investigated were the fly's response to protein relative to: height of protein within the canopy, fruiting status of the tree, time of day, season and size of the experimental arena. Canopy height had a significant response on B. tryoni foraging, with more flies foraging on protein in the mid to upper canopy. Fruiting status also had a significant effect on foraging, with most flies responding to protein when applied to fruiting hosts. B. tryoni demonstrated a repeatable diurnal response pattern to protein, with the peak response being between 12:00–16:00 h. Season showed significant but unpredictable effects on fruit fly response to protein in the subtropical environment where the work was undertaken. Relative humidity, but not temperature or rainfall, was positively correlated with protein response. The number of B. tryoni responding to protein decreased dramatically as the spatial scale increased from field cage through to the open field. Based on these results, it is recommend that, to be most effective, protein bait sprays should be applied to the mid to upper canopies of fruiting hosts. Overall, the results show that the protein used, an industry standard, has very low attractancy to B. tryoni and that further work is urgently needed to develop more volatile protein baits.
Resumo:
Convergence of pervasive technologies, techno-centric customers and the emergence of digitized channels, overabundance of user friendly retail applications are having a profound impact on retail experience, leading to the advent of ‘everywhere retailing’. With the rapid uptake of digital complimentary assets and smart mobile applications are revolutionizing the relationship of retailers with their customers and suppliers. Retail firms are increasingly investing substantial resources on dynamic Customer Relationship Management systems (D-CRM / U-CRM) to better engage with customers to sense and respond quickly (Agility of the firm) to their demands. However, unlike traditional CRM systems, engagement with U-CRM systems requires that firms be hyper sensitive to volatile customer needs and wants. Following the notions of firm agility, this study attempts to develop a framework to understand such unforeseen benefits and issues of U-CRM. This research-in-progress paper reports an a-priory framework including 62 U-CRM benefits derived through an archival analysis of literature.
Resumo:
Secure communications in distributed Wireless Sensor Networks (WSN) operating under adversarial conditions necessitate efficient key management schemes. In the absence of a priori knowledge of post-deployment network configuration and due to limited resources at sensor nodes, key management schemes cannot be based on post-deployment computations. Instead, a list of keys, called a key-chain, is distributed to each sensor node before the deployment. For secure communication, either two nodes should have a key in common in their key-chains, or they should establish a key through a secure-path on which every link is secured with a key. We first provide a comparative survey of well known key management solutions for WSN. Probabilistic, deterministic and hybrid key management solutions are presented, and they are compared based on their security properties and re-source usage. We provide a taxonomy of solutions, and identify trade-offs in them to conclude that there is no one size-fits-all solution. Second, we design and analyze deterministic and hybrid techniques to distribute pair-wise keys to sensor nodes before the deployment. We present novel deterministic and hybrid approaches based on combinatorial design theory and graph theory for deciding how many and which keys to assign to each key-chain before the sensor network deployment. Performance and security of the proposed schemes are studied both analytically and computationally. Third, we address the key establishment problem in WSN which requires key agreement algorithms without authentication are executed over a secure-path. The length of the secure-path impacts the power consumption and the initialization delay for a WSN before it becomes operational. We formulate the key establishment problem as a constrained bi-objective optimization problem, break it into two sub-problems, and show that they are both NP-Hard and MAX-SNP-Hard. Having established inapproximability results, we focus on addressing the authentication problem that prevents key agreement algorithms to be used directly over a wireless link. We present a fully distributed algorithm where each pair of nodes can establish a key with authentication by using their neighbors as the witnesses.
Resumo:
This study evaluated effects of defensive pressure on running velocity in footballers during the approach to kick a stationary football. Approach velocity and ball speed/accuracy data were recorded from eight football youth academy participants (15.25, SD=0.46 yrs). Participants were required to run to a football to cross it to a receiver to score against a goal-keeper. Defensive pressure was manipulated across three counterbalanced conditions: defender-absent (DA); defender-far (DF) and defender-near (DN). Pass accuracy (percentages of a total of 32 trials with 95% confidence limits in parenthesis) did not significantly reduce under changing defensive pressure: DA, 78% (55–100%); DF, 78% (61–96%); DN, 59% (40–79%). Ball speed (m·s−1) significantly reduced as defensive pressure was included and increased: DA, 23.10 (22.38–23.83); DF, 20.40 (19.69–21.11); DN, 19.22 (18.51–19.93). When defensive pressure was introduced, average running velocity of attackers did not change significantly: DA versus DF (m·s−1), 5.40 (5.30–5.51) versus 5.41 (5.34–5.48). Scaling defender starting positions closer to the start position of the attacker (DN) significantly increased average running velocity relative to the DA and DF conditions, 5.60 (5.50–5.71). In the final approach footfalls, all conditions significantly differed: DA, 5.69 (5.35–6.03); DF, 6 .22 (5.93–6.50); DN, 6.52 (6.23–6.80). Data suggested that approach velocity is constrained by both presence and initial distance of the defender during task performance. Implications are that the expression of kicking behaviour is specific to a performance context and some movement regulation features will not emerge unless a defender is present as a task constraint in practice.
Resumo:
Carbon taxation governance is becoming increasingly popular, further evolving the polluter pays concept already well established in the built environment as a mechanism to controlling and licensing waste generation. This paper presents an explanation of property asset ‘regeneration reuse’ principles following deconstruction, which reduce waste generation associated with the process of demolition, construction and operation. An analysis is made of strategies in Australia and the United Kingdom, comparing jurisdiction targets pertaining to construction and demolition waste that encourage ‘regeneration reuse’. From examination of applicable Australian and United Kingdom legislation, strategic, fiscal and policy that influence on the 'regeneration reuse' of property assets, an evaluation to the variety of issues relevant to waste and resource management practices is reached. The paper concludes that a systematic evaluation framework to selecting building components and structures suitable for reuse after deconstruction must be considered in legislation.
Resumo:
An increased interest in utilising groups of Unmanned Aerial Vehicles (UAVs) with heterogeneous capabilities and autonomy is presenting the challenge to effectively manage such during missions and operations. This has been the focus of research in recent years, moving from a traditional UAV management paradigm of n-to-1 (n operators for one UAV, with n being at least two operators) toward 1-to-n (one operator, multiple UAVs). This paper has expanded on the authors’ previous work on UAV functional capability framework, by incorporating the concept of Functional Level of Autonomy (F-LOA) with two configurations: The lower F-LOA configuration contains sufficient information for the operator to generate solutions and make decisions to address perturbation events. Alternatively, the higher F-LOA configuration presents information reflecting on the F-LOA of the UAV, allowing the operator to interpret solutions and decisions generated autonomously, and decide whether to veto from this decision.
Resumo:
The biosafety of carbon nanomaterial needs to be critically evaluated with both experimental and theoretical validations before extensive biomedical applications. In this letter, we present an analysis of the binding ability of two dimensional monolayer carbon nanomaterial on actin by molecular simulation to understand their adhesive characteristics on F-actin cytoskeleton. The modelling results indicate that the positively charged carbon nanomaterial has higher binding stability on actin. Compared to crystalline graphene, graphene oxide shows higher binding influence on actin when carrying 11 positive surface charge. This theoretical investigation provides insights into the sensitivity of actin-related cellular activities on carbon nanomaterial.