463 resultados para Shipping conferences
Resumo:
Services in the form of business services or IT-enabled (Web) Services have become a corporate asset of high interest in striving towards the agile organisation. However, while the design and management of a single service is widely studied and well understood, little is known about how a set of services can be managed. This gap motivated this paper, in which we explore the concept of Service Portfolio Management. In particular, we propose a Service Portfolio Management Framework that explicates service portfolio goals, tasks, governance issues, methods and enablers. The Service Portfolio Management Framework is based upon a thorough analysis and consolidation of existing, well-established portfolio management approaches. From an academic point of view, the Service Portfolio Management Framework can be positioned as an extension of portfolio management conceptualisations in the area of service management. Based on the framework, possible directions for future research are provided. From a practical point of view, the Service Portfolio Management Framework provides an organisation with a novel approach to managing its emerging service portfolios.
Resumo:
Information System (IS) success may be the most arguable and important dependent variable in the IS field. The purpose of the present study is to address IS success by empirically assess and compare DeLone and McLean’s (1992) and Gable’s et al. (2008) models of IS success in Australian Universities context. The two models have some commonalities and several important distinctions. Both models integrate and interrelate multiple dimensions of IS success. Hence, it would be useful to compare the models to see which is superior; as it is not clear how IS researchers should respond to this controversy.
Resumo:
In response to a range of contextual drivers, the worldwide adoption of ERP Systems in Higher Education Institutions (HEIs) has increased substantially over the past decade. Though this demand continues to grow, with HEIs now a main target market for ERP vendors, little has been published on the topic. This paper reports a sub-study of a larger research effort that aims to contribute to understanding the phenomenon of ERP adoption and evaluation in HEIs in the Australasian region. It presents a descriptive case study conducted at Queensland University of Technology (QUT) in Australia, with emphasis on challenges with ERP adoption. The case study provides rich contextual details about ERP system selection, customisation, integration and evaluation, and insights into the role of consultants in the HE sector. Through this analysis, the paper (a) provides evidence of the dearth of ERP literature pertaining to the HE sector; (b) yields insights into differentiating factors in the HE sector that warrants specific research attention, and (c) offers evidence of how key ERP decisions such as systems selection, customisation, integration, evaluation, and consultant engagement are influenced by the specificities of the HE sector.
Resumo:
One of the major challenges facing a present day game development company is the removal of bugs from such complex virtual environments. This work presents an approach for measuring the correctness of synthetic scenes generated by a rendering system of a 3D application, such as a computer game. Our approach builds a database of labelled point clouds representing the spatiotemporal colour distribution for the objects present in a sequence of bug-free frames. This is done by converting the position that the pixels take over time into the 3D equivalent points with associated colours. Once the space of labelled points is built, each new image produced from the same game by any rendering system can be analysed by measuring its visual inconsistency in terms of distance from the database. Objects within the scene can be relocated (manually or by the application engine); yet the algorithm is able to perform the image analysis in terms of the 3D structure and colour distribution of samples on the surface of the object. We applied our framework to the publicly available game RacingGame developed for Microsoft(R) Xna(R). Preliminary results show how this approach can be used to detect a variety of visual artifacts generated by the rendering system in a professional quality game engine.
Resumo:
Traditionally, conceptual modelling of business processes involves the use of visual grammars for the representation of, amongst other things, activities, choices and events. These grammars, while very useful for experts, are difficult to understand by naive stakeholders. Annotations of such process models have been developed to assist in understanding aspects of these grammars via map-based approaches, and further work has looked at forms of 3D conceptual models. However, no one has sought to embed the conceptual models into a fully featured 3D world, using the spatial annotations to explicate the underlying model clearly. In this paper, we present an approach to conceptual process model visualisation that enhances a 3D virtual world with annotations representing process constructs, facilitating insight into the developed model. We then present a prototype implementation of a 3D Virtual BPMN Editor that embeds BPMN process models into a 3D world. We show how this gives extra support for tasks performed by the conceptual modeller, providing better process model communication to stakeholders..
Resumo:
Networks form a key part of the infrastructure of contemporary governance arrangements and, as such, are likely to continue for some time. Networks can take many forms and be formed for many reasons. Some networks have been explicitly designed to generate a collective response to an issue; some arise from a top down perspective through mandate or coercion; while others rely more heavily on interpersonal relations and doing the right thing. In this paper, these three different perspectives are referred to as the “3I”s: Instrumental, Institutional or Interpersonal. It is proposed that these underlying motivations will affect the process dynamics within the different types of networks in different ways and therefore influence the type of outcomes achieved. This proposition is tested through a number of case studies. An understanding of these differences will lead to more effective design, management and clearer expectations of what can be achieved through networks.
Resumo:
The emergence of Enterprise Resource Planning systems and Business Process Management have led to improvements in the design, implementation, and overall management of business processes. However, the typical focus of these initiatives has been on internal business operations, assuming a defined and stable context in which the processes are designed to operate. Yet, a lack of context-awareness for external change leads to processes and supporting information systems that are unable to react appropriately and timely enough to change. To increase the alignment of processes with environmental change, we propose a conceptual framework that facilitates the identification of context change. Based on a secondary data analysis of published case studies about process adaptation, we exemplify the framework and identify four general archetypes of context-awareness. The framework, in combination with the learning from the case analysis, provides a first understanding of what, where, how, and when processes are subjected to change.
Resumo:
In a competitive environment, companies continuously innovate to offer superior services at lower costs. ‘Shared services’ have been extensively adopted in practice as one means for improving organisational performance. Shared services is considered most appropriate for support functions, and is widely adopted in Human Resource Management, Finance and Accounting; more recently being employed across the Information Systems function. IS applications and infrastructure are an important enabler and driver of shared services in all functional areas. As computer based corporate information systems have become de facto and the internet pervasive and increasingly the backbone of administrative systems, the technical impediments to sharing have come down dramatically. As this trend continues, CIOs and IT professionals will need a deeper understanding of the shared services phenomenon and its implications. The advent of shared services has consequential implications for the IS academic discipline. Yet, archival analysis of IS the academic literature reveals that shared services, though mentioned in more than 100 articles, has received little in depth attention. This paper is the first attempt to investigate and report on the current status of shared services in the IS literature. The paper presents detailed review of literature from main IS journals and conferences, findings evidencing a lack of focus and definitions and objectives lacking conceptual rigour. The paper concludes with a tentative operational definition, a list of perceived main objectives of shared services, and an agenda for related future research.
Resumo:
We consider a new form of authenticated key exchange which we call multi-factor password-authenticated key exchange, where session establishment depends on successful authentication of multiple short secrets that are complementary in nature, such as a long-term password and a one-time response, allowing the client and server to be mutually assured of each other's identity without directly disclosing private information to the other party. Multi-factor authentication can provide an enhanced level of assurance in higher-security scenarios such as online banking, virtual private network access, and physical access because a multi-factor protocol is designed to remain secure even if all but one of the factors has been compromised. We introduce a security model for multi-factor password-authenticated key exchange protocols, propose an efficient and secure protocol called MFPAK, and provide a security argument to show that our protocol is secure in this model. Our security model is an extension of the Bellare-Pointcheval-Rogaway security model for password-authenticated key exchange and accommodates an arbitrary number of symmetric and asymmetric authentication factors.
Resumo:
Success in modern business demands effective information literacy to address the ever-changing business context. This context includes changes in Government policy reflected through legislation and regulations, developments in case law and expectations of professional associations and the public. Students require the skills to continue their own learning beyond the completion of their degree, since learning the subject content of a course alone sufficient. This paper considers the methods utilised to embed information literacy, in the context of generic skills and graduate attributes, into a Business degree’s curriculum. The paper describes how information literacy has been embedded in two sequential third-year Taxation Law courses, allowing for the explicit development of information literacy. Through the development of legal reasoning and research skills, students are empowered to continue their lifelong learning, which successful professional practice demands. The study will draw upon the experience of the course convener in designing, teaching and evaluating the courses, and on students’ experiences as illustrated through evaluation questionnaire responses and interviews. The findings of this study could be relevant to other business courses, especially company law and auditing.
Resumo:
Globality generates increasingly diffuse networks of human and non-human innovators, carriers and icons of exotic, polyethnic cosmopolitan difference; and this diffusion is increasingly hard to ignore or police (Latour 1993). In fact, such global networks of material-symbolic exchange can frequently have the unintended consequence of promoting status systems and cultural relationships founded on uncosmopolitan values such as cultural appropriation and status-based social exclusion. Moreover, this materialsymbolic engagement with cosmopolitan difference could also be rather mundane, engaged in routinely without any great reflexive consciousness or capacity to destabilise current relations of cultural power, or interpreted unproblematically as just one component of a person’s social environment. Indeed, Beck’s (2006) argument is that cosmopolitanism, in an age of global risk, is being forced upon us unwillingly, so there should be no surprise if it is a bitter pill for some to swallow. Within these emergent cosmopolitan networks, which we call ‘cosmoscapes’, there is no certainty about the development of ethical or behavioural stances consistent with claims foundational to the current literature on cosmopolitanism. Reviewing historical and contemporary studies of globality and its dynamic generative capacity, this paper considers such literatures in the context of studies of cultural consumption and social status. When one positions these diverse bodies of literature against one another, it becomes clear that the possibility of widespread cosmopolitan cultural formations is largely unpromising.
Resumo:
New media, as a free and universal communication tool, has had an impact on the power of the general public to comment on a variety of issues. As the public can comment favourably or unfavourably on advertisements, such as on Youtube, the advertising industry must start using weblogs to research reaction to their advertising campaigns. This exploratory study examines the responses of some advertising industry practitioners, both advertisers and agencies, on the impact of new media, specifically weblogs, and the use of new media as a source of research on advertising campaigns.
Resumo:
Few frameworks exist for the teaching and assessment of programming subjects that are coherent and logical. Nor are they sufficiently generic and adaptable to be used outside the particular tertiary institutions in which they were developed. This paper presents the Teaching and Assessment of Software Development (TASD) frame-work. We describe its development and implementation at an Australian university and demonstrate, with examples, how it has been used, with supporting data. Extracts of criteria sheets (grading rubrics) for a variety of assessment tasks are included. The numerous advantages of this new framework are discussed with comparisons made to those reported in the published literature.