276 resultados para management earnings forecast, information disclosure, Australia, continuous disclosure, litigation risk


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Both Knowledge Management (KM) and Project Management (PM) are known as crucial factors to develop competitive advantage(CA). PM Office (PMO) is recognized as a strong solution to institutionalize PM practices in organization. However, according to the literature there is a significant gap in addressing KM practices in the PMO. In other words, existing PMO maturity models has not been addressed from KM perceptive. This paper discusses undertaken investigations of both KM and PM as an initial part of PhD research on the role of knowledge in PMO

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Health education in Western Countries has grown considerably in the last decade and this has occurred for a number of reasons. Specifically Universities actively recruit International students as the health workforce becomes global; also it is much easier for students to move and study globally. Internationally there is a health workforce shortage and if students gain a degree in a reputable university their ability to work globally is improved significantly. However, when studying to practice in the health care field the student must undertake clinical practice in an acute or aged care setting. This can be a significant problem for students who are culturally and linguistically diverse in an English speaking country such as Australia. The issues that can arise stem from the language differences where communication, interpretation understanding and reading the cultural norms of the health care setting are major challenges for International students. To assist international students to be successful in their clinical education, an extra curriculum workshop program was developed to provide additional support. The program which runs twice each year includes on-campus interactive workshops that are complemented by targeted support provided for students and clinical staff who are supervising students’ practice experience in the workplace. As this is an English speaking country the workshop is based on practicing reading, writing, listening and speaking, as well as exploring basic health care concepts and cultural differences. This enables students to gain knowledge of and practice interpretation of cultural norms and expectations in a safe environment. This innovative series of interactive workshops in a highly student-centred learning environment combine education with role play and discussion with peers who are supported by culturally aware and competent Educators. Over the years it has been running, the program has been undertaken by an increasing number of students. In 2011, more than 100 students are expected to participate. Student evaluation of the program has confirmed that it has assisted the majority of them to be successful in their clinical studies. Effectiveness of the project is measured throughout the program and in follow up sessions. This ongoing information allows for continuous development of the program that serves to meet individual needs of the International student, the University and Service providers such as the hospitals. This feedback from students regarding their increased comprehension of the Australian colloquial Language, healthcare terminology, critical thinking and clinical skill development and a cultural awareness also enables them to maintain their feelings of self confidence and self esteem.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper explores the nature of relationship management on construction projects in Australia and examines the effects of culture, by means of Schwarz’s value survey, on relationships under different contract strategies. The research was based on the view that the development of a sustainable supply chain depends on the transfer of knowledge and capabilities from the larger players in the supply chain through collaboration brought about by relationship management. The research adopted a triangulated approach in which quantitative data were collected by questionnaire, interviews were conducted to explore and enrich the quantitative data and case studies were undertaken in order to illustrate and validate the fi ndings. The aim was to investigate how values and attitudes enhance or reduce the incorporation of the supply chain into the project. From the research it was found that the degree of match and mismatch between values and contract strategy impacts commitment and the engagement and empowerment of the supply chain.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose - The purpose of this paper is to present a model for curricular integration of information literacy for undergraduate programs in higher education. Design/methodology/approach - Data are drawn from individual interviews at three universities in Australia and curricular integration working experience at a New Zealand university. Sociocultural theories are adopted in the research process and in the development of the model, Findings - Key characteristics of the curriculum integration of information literacy were identified and an information literacy integration model was developed. The S2J2 key behaviours for campus-wide multi-partner collaboration in information literacy integration were also identified. Research limitations/implications - The model was developed without including the employer needs. Through the process of further research, the point of view of the employer on how to provide information literacy education needs to be explored in order to strengthen the model in curricular design. Practical implications - The information literacy integration model was developed based on practical experience in higher education and has been applied in different undergraduate curricular programs. The model could be used or adapted by both librarians and academics when they integrate information literacy into an undergraduate curriculum from a lower level to a higher level. Originality/value - The information literacy integration model was developed based on recent PhD research. The model integrates curriculum, pedagogy and learning theories, information literacy theories, information literacy guidelines, people and collaborative together. The model provides a framework of how information literacy can be integrated into multiple courses across an undergraduate academic degree in higher education.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Foreword: In this paper I call upon a praxiological approach. Praxeology (early alteration of praxiology) is the study of human action and conduct. The name praxeology/praxiologyakes is root in praxis, Medieval Latin, from Greek, doing, action, from prassein to do, practice (Merriam-Webster Dictionary). Having been involved in project management education, research and practice for the last twenty years, I have constantly tried to improve and to provide a better understanding/knowledge of the field and related practice, and as a consequence widen and deepen the competencies of the people I was working with (and my own competencies as well!), assuming that better project management lead to more efficient and effective use of resources, development of people and at the end to a better world. For some time I have perceived a need to clarify the foundations of the discipline of project management, or at least elucidate what these foundations could be. An immodest task, one might say! But not a neutral one! I am constantly surprised by the way the world (i.e., organizations, universities, students and professional bodies) sees project management: as a set of methods, techniques, tools, interacting with others fields – general management, engineering, construction, information systems, etc. – bringing some effective ways of dealing with various sets of problems – from launching a new satellite to product development through to organizational change.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Enterprise architecture management (EAM) has become an intensively discussed approach to manage enterprise transformations. While many organizations employ EAM, a notable insecurity about the value of EAM remains. In this paper, we propose a model to measure the realization of benefits from EAM. We identify EAM success factors and EAM benefits through a comprehensive literature review and eleven explorative expert interviews. Based on our findings, we integrate the EAM success factors and benefits with the established DeLone & McLean IS success model resulting in a model that explains the realization of EAM benefits. This model aids organizations as a benchmark and framework for identifying and assessing the setup of their EAM initiatives and whether and how EAM benefits are materialized. We see our model also as a first step to gain insights in and start a discussion on the theory of EAM benefit realization.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Information communication and technology (ICT) systems are almost ubiquitous in the modern world. It is hard to identify any industry, or for that matter any part of society, that is not in some way dependent on these systems and their continued secure operation. Therefore the security of information infrastructures, both on an organisational and societal level, is of critical importance. Information security risk assessment is an essential part of ensuring that these systems are appropriately protected and positioned to deal with a rapidly changing threat environment. The complexity of these systems and their inter-dependencies however, introduces a similar complexity to the information security risk assessment task. This complexity suggests that information security risk assessment cannot, optimally, be undertaken manually. Information security risk assessment for individual components of the information infrastructure can be aided by the use of a software tool, a type of simulation, which concentrates on modelling failure rather than normal operational simulation. Avoiding the modelling of the operational system will once again reduce the level of complexity of the assessment task. The use of such a tool provides the opportunity to reuse information in many different ways by developing a repository of relevant information to aid in both risk assessment and management and governance and compliance activities. Widespread use of such a tool allows the opportunity for the risk models developed for individual information infrastructure components to be connected in order to develop a model of information security exposures across the entire information infrastructure. In this thesis conceptual and practical aspects of risk and its underlying epistemology are analysed to produce a model suitable for application to information security risk assessment. Based on this work prototype software has been developed to explore these concepts for information security risk assessment. Initial work has been carried out to investigate the use of this software for information security compliance and governance activities. Finally, an initial concept for extending the use of this approach across an information infrastructure is presented.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Information security has been recognized as a core requirement for corporate governance that is expected to facilitate not only the management of risks, but also as a corporate enabler that supports and contributes to the sustainability of organizational operations. In implementing information security, the enterprise information security policy is the set of principles and strategies that guide the course of action for the security activities and may be represented as a brief statement that defines program goals and sets information security and risk requirements. The enterprise information security policy (alternatively referred to as security policy in this paper) that represents the meta-policy of information security is an element of corporate ICT governance and is derived from the strategic requirements for risk management and corporate governance. Consistent alignment between the security policy and the other corporate business policies and strategies has to be maintained if information security is to be implemented according to evolving business objectives. This alignment may be facilitated by managing security policy alongside other corporate business policies within the strategic management cycle. There are however limitations in current approaches for developing and managing the security policy to facilitate consistent strategic alignment. This paper proposes a conceptual framework for security policy management by presenting propositions to positively affect security policy alignment with business policies and prescribing a security policy management approach that expounds on the propositions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Most current computer systems authorise the user at the start of a session and do not detect whether the current user is still the initial authorised user, a substitute user, or an intruder pretending to be a valid user. Therefore, a system that continuously checks the identity of the user throughout the session is necessary without being intrusive to end-user and/or effectively doing this. Such a system is called a continuous authentication system (CAS). Researchers have applied several approaches for CAS and most of these techniques are based on biometrics. These continuous biometric authentication systems (CBAS) are supplied by user traits and characteristics. One of the main types of biometric is keystroke dynamics which has been widely tried and accepted for providing continuous user authentication. Keystroke dynamics is appealing for many reasons. First, it is less obtrusive, since users will be typing on the computer keyboard anyway. Second, it does not require extra hardware. Finally, keystroke dynamics will be available after the authentication step at the start of the computer session. Currently, there is insufficient research in the CBAS with keystroke dynamics field. To date, most of the existing schemes ignore the continuous authentication scenarios which might affect their practicality in different real world applications. Also, the contemporary CBAS with keystroke dynamics approaches use characters sequences as features that are representative of user typing behavior but their selected features criteria do not guarantee features with strong statistical significance which may cause less accurate statistical user-representation. Furthermore, their selected features do not inherently incorporate user typing behavior. Finally, the existing CBAS that are based on keystroke dynamics are typically dependent on pre-defined user-typing models for continuous authentication. This dependency restricts the systems to authenticate only known users whose typing samples are modelled. This research addresses the previous limitations associated with the existing CBAS schemes by developing a generic model to better identify and understand the characteristics and requirements of each type of CBAS and continuous authentication scenario. Also, the research proposes four statistical-based feature selection techniques that have highest statistical significance and encompasses different user typing behaviors which represent user typing patterns effectively. Finally, the research proposes the user-independent threshold approach that is able to authenticate a user accurately without needing any predefined user typing model a-priori. Also, we enhance the technique to detect the impostor or intruder who may take over during the entire computer session.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

While business transformations often primarily focus on technological and methodological solutions, there is consensus that having the right organizational culture is critical for the successful change of business processes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Management of groundwater systems requires realistic conceptual hydrogeological models as a framework for numerical simulation modelling, but also for system understanding and communicating this to stakeholders and the broader community. To help overcome these challenges we developed GVS (Groundwater Visualisation System), a stand-alone desktop software package that uses interactive 3D visualisation and animation techniques. The goal was a user-friendly groundwater management tool that could support a range of existing real-world and pre-processed data, both surface and subsurface, including geology and various types of temporal hydrological information. GVS allows these data to be integrated into a single conceptual hydrogeological model. In addition, 3D geological models produced externally using other software packages, can readily be imported into GVS models, as can outputs of simulations (e.g. piezometric surfaces) produced by software such as MODFLOW or FEFLOW. Boreholes can be integrated, showing any down-hole data and properties, including screen information, intersected geology, water level data and water chemistry. Animation is used to display spatial and temporal changes, with time-series data such as rainfall, standing water levels and electrical conductivity, displaying dynamic processes. Time and space variations can be presented using a range of contouring and colour mapping techniques, in addition to interactive plots of time-series parameters. Other types of data, for example, demographics and cultural information, can also be readily incorporated. The GVS software can execute on a standard Windows or Linux-based PC with a minimum of 2 GB RAM, and the model output is easy and inexpensive to distribute, by download or via USB/DVD/CD. Example models are described here for three groundwater systems in Queensland, northeastern Australia: two unconfined alluvial groundwater systems with intensive irrigation, the Lockyer Valley and the upper Condamine Valley, and the Surat Basin, a large sedimentary basin of confined artesian aquifers. This latter example required more detail in the hydrostratigraphy, correlation of formations with drillholes and visualisation of simulation piezometric surfaces. Both alluvial system GVS models were developed during drought conditions to support government strategies to implement groundwater management. The Surat Basin model was industry sponsored research, for coal seam gas groundwater management and community information and consultation. The “virtual” groundwater systems in these 3D GVS models can be interactively interrogated by standard functions, plus production of 2D cross-sections, data selection from the 3D scene, rear end database and plot displays. A unique feature is that GVS allows investigation of time-series data across different display modes, both 2D and 3D. GVS has been used successfully as a tool to enhance community/stakeholder understanding and knowledge of groundwater systems and is of value for training and educational purposes. Projects completed confirm that GVS provides a powerful support to management and decision making, and as a tool for interpretation of groundwater system hydrological processes. A highly effective visualisation output is the production of short videos (e.g. 2–5 min) based on sequences of camera ‘fly-throughs’ and screen images. Further work involves developing support for multi-screen displays and touch-screen technologies, distributed rendering, gestural interaction systems. To highlight the visualisation and animation capability of the GVS software, links to related multimedia hosted online sites are included in the references.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Enterprise Systems (ES) provide standardized, off-theshelf support for operations and management within organizations. With the advent of ES based on a serviceoriented architecture (SOA) and an increasing demand of IT-supported interorganizational collaboration, implementation projects face paradigmatically new challenges. The configuration of ES is costly and error-prone. Dependencies between business processes and business documents are hardly explicit and foster component proliferation instead of reuse. Configurative modeling can support the problem in two ways: First, conceptual modeling abstracts from technical details and provides more intuitive access and overview. Second, configuration allows the projection of variants from master models providing manageable variants with controlled flexibility. We aim at tackling the problem by proposing an integrated model-based framework for configuring both, processes and business documents, on an equal basis; as together, they constitute the core business components of an ES.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Knowledge about customers is vital for supply chains in order to ensure customer satisfaction. In an ideal supply chain environment, supply chain partners are able to perform planning tasks collaboratively, because they share information. However, customers are not always able or willing to share information with their suppliers. End consumers, on the one hand, do not usually provide a retail company with demand information. On the other hand, industrial customers might consciously hide information. Wherever a supply chain is not provided with demand forecast information, it needs to derive these demand forecasts by other means. Customer Relationship Management provides a set of tools to overcome informational uncertainty. We show how CRM and SCM information can be integrated on the conceptual as well as technical levels in order to provide supply chain managers with relevant information.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Using a sample of 2,200 US listed firm year observations (2001-2007)this study shows a positive (negative) relation between female participation in corporate boards and analysts' earnings forecast accuracy (dispersion), after controlling for earnings quality, corporate governance, audit quality, stock price informativeness and potential endogeneity. Our findings are important as they suggest that board diversity adds to the transparency and accuracy of financial reports such that earnings expectations are likely to be more accurate for these firms.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Business process management systems (BPMS) belong to a class of enterprise information systems that are characterized by the dependence on explicitly modeled process logic. Through the process logic, it is relatively easy to manage explicitly the routing and allocation of work items along a business process through the system. Inspired by the DeLone and McLean framework, we theorize that these process-aware system features are important attributes of system quality, which in turn will elevate key user evaluations such as perceived usefulness, and usage satisfaction. We examine this theoretical model using data collected from four different, mostly mature BPM system projects. Our findings validate the importance of input quality as well as allocation and routing attributes as antecedents of system quality, which, in turn, determines both usefulness and satisfaction with the system. We further demonstrate how service quality and workflow dependency are significant precursors to perceived usefulness. Our results suggest the appropriateness of a multi-dimensional conception of system quality for future research, and provide important design-oriented advice for the design and configuration of BPMSs.