135 resultados para Communication in management.
Resumo:
The iPhone represents an important moment in both the short history of mobile media and the long history of cultural technologies. Like the Walkman of the 1980s, it marks a juncture in which notions about identity, individualism, lifestyle and sociality require rearticulation. This book explores not only the iPhone’s particular characteristics, uses and "affects," but also how the "iPhone moment" functions as a barometer for broader patterns of change. In the iPhone moment, this study considers the convergent trajectories in the evolution of digital and mobile culture, and their implications for future scholarship. Through the lens of the iPhone—as a symbol, culture and a set of material practices around contemporary convergent mobile media—the essays collected here explore the most productive theoretical and methodological approaches for grasping media practice, consumer culture and networked communication in the twenty-first century.
Resumo:
Recently, ‘business model’ and ‘business model innovation’ have gained substantial attention in management literature and practice. However, many firms lack the capability to develop a novel business model to capture the value from new technologies. Existing literature on business model innovation highlights the central role of ‘customer value’. Further, it suggests that firms need to experiment with different business models and engage in ‘trail-and-error’ learning when participating in business model innovation. Trial-and error processes and prototyping with tangible artifacts are a fundamental characteristic of design. This conceptual paper explores the role of design-led innovation in facilitating firms to conceive and prototype novel and meaningful business models. It provides a brief review of the conceptual discussion on business model innovation and highlights the opportunities for linking it with the research stream of design-led innovation. We propose design-led business model innovation as a future research area and highlight the role of design-led prototyping and new types of artifacts and prototypes play within it. We present six propositions in order to outline future research avenues.
Shifting meanings : The role of metaphors in collective meaning–making in complex project leadership
Resumo:
This paper examines the use of metaphors in collective meaning-making in the work of managers and leaders of megaprojects, drawing on interviews with thirty-three leaders of complex projects in a case study organisation responsible for the delivery of major acquisitions. Recognising the notion of both contextualised and decontextualised approaches to either seeking to elicit or project metaphors, the paper describes the various ways in practising project leaders describe their work and the synergies these metaphors have with the broader social discourse and theorisation around complexity and the language of complex adaptive systems. The paper presents our case study findings where we outline our typology of meta-metaphors describing project leaders’ multiple roles and our interpretation of the significance of these choices.
Resumo:
Background: Right-to-left shunting via a patent foramen ovale (PFO) has a recognized association with embolic events in younger patients. The use of agitated saline contrast imaging (ASCi) for detecting atrial shunting is well documented, however optimal technique is not well described. The purpose of this study is to assess the efficacy and safety of ASCi via TTE for assessment of right-to-left atrial communication in a large cohort of patients. Method: A retrospective review was undertaken of 1162 consecutive transthoracic (TTE) ASCi studies, of which 195 had also undergone clinically indicated transesophageal (TEE) echo. ASCi shunt results were compared with color flow imaging (CFI) and the role of provocative maneuvers (PM) assessed. Results: 403 TTE studies (35%) had paradoxical shunting seen during ASCi. Of these, 48% were positive with PM only. There was strong agreement between TTE ASCi and reported TEE findings (99% sensitivity, 85% specificity), with six false positive and two false negative results. In hindsight, the latter were likely due to suboptimal right atrial opacification, and the former due to transpulmonary shunting. TTE CFI was found to be insensitive (22%) for the detection of a PFO compared with TTE ASCi. Conclusions: TTE ASCi is minimally invasive and highly accurate for the detection of right-to-left atrial communication when PM are used. TTE CFI was found to be insensitive for PFO screening. It is recommended that TTE ASCi should be considered the initial diagnostic tool for the detection of PFO in clinical practice. A dedicated protocol should be followed to ensure adequate agitated saline contrast delivery and performance of provocative maneuvers.
Resumo:
This article investigates the ethnographic methodological question of how the researcher observes objectively while being part of the problem they are observing. It uses a case study of ABC Pool to argue a cooperative approach that combines the roles of the ethnographer with that of a community manager who assists in constructing a true representation of the researched environment. By using reflexivity as a research tool, the ethnographer engages in a process to self-check their personal presumptions and prejudices, and to strengthen the constructed representation of the researched environment. This article also suggests combining management and expertise research from the social sciences with ethnography, to understand and engage with the research field participants more intimately - which, ultimately, assists in gathering and analysing richer qualitative data.
Resumo:
Securing IT infrastructures of our modern lives is a challenging task because of their increasing complexity, scale and agile nature. Monolithic approaches such as using stand-alone firewalls and IDS devices for protecting the perimeter cannot cope with complex malwares and multistep attacks. Collaborative security emerges as a promising approach. But, research results in collaborative security are not mature, yet, and they require continuous evaluation and testing. In this work, we present CIDE, a Collaborative Intrusion Detection Extension for the network security simulation platform ( NeSSi 2 ). Built-in functionalities include dynamic group formation based on node preferences, group-internal communication, group management and an approach for handling the infection process for malware-based attacks. The CIDE simulation environment provides functionalities for easy implementation of collaborating nodes in large-scale setups. We evaluate the group communication mechanism on the one hand and provide a case study and evaluate our collaborative security evaluation platform in a signature exchange scenario on the other.
Resumo:
Most large cities around the world are undergoing rapid transport sector development to cater for increased urbanization. Subsequently the issues of mobility, access equity, congestion, operational safety and above all environmental sustainability are becoming increasingly crucial in transport planning and policy making. The popular response in addressing these issues has been demand management, through improvement of motorised public transport (MPT) modes (bus, train, tram) and non-motorized transport (NMT) modes (walk, bicycle); improved fuel technology. Relatively little attention has however been given to another readily available and highly sustainable component of the urban transport system, non-motorized public transport (NMPT) such as the pedicab that operates on a commercial basis and serves as an NMT taxi; and has long standing history in many Asian cities; relatively stable in existence in Latin America; and reemerging and expanding in Europe, North America and Australia. Consensus at policy level on the apparent benefits, costs and management approach for NMPT integration has often been a major transport planning problem. Within this context, this research attempts to provide a more complete analysis of the current existence rationale and possible future, or otherwise, of NMPT as a regular public transport system. The analytical process is divided into three major stages. Stage 1 reviews the status and role condition of NMPT as regular public transport on a global scale- in developing cities and developed cities. The review establishes the strong ongoing and future potential role of NMPT in major developing cities. Stage 2 narrows down the status review to a case study city of a developing country in order to facilitate deeper role review and status analysis of the mode. Dhaka, capital city of Bangladesh, has been chosen due to its magnitude of NMPT presence. The review and analysis reveals the multisectoral and dominant role of NMPT in catering for the travel need of Dhaka transport users. The review also indicates ad-hoc, disintegrated policy planning in management of NMPT and the need for a planning framework to facilitate balanced integration between NMPT and MT in future. Stage 3 develops an integrated, multimodal planning framework (IMPF), based on a four-step planning process. This includes defining the purpose and scope of the planning exercise, determining current deficiencies and preferred characteristics for the proposed IMPF, selection of suitable techniques to address the deficiencies and needs of the transport network while laying out the IMPF and finally, development of a delivery plan for the IMPF based on a selected layout technique and integration approach. The output of the exercise is a planning instrument (decision tool) that can be used to assign a road hierarchy in order to allocate appropriate traffic to appropriate network type, particularly to facilitate the operational balance between MT and NMT. The instrument is based on a partial restriction approach of motorised transport (MT) and NMT, structured on the notion of functional hierarchy approach, and distributes/prioritises MT and NMT such that functional needs of the network category is best complemented. The planning instrument based on these processes and principles offers a six-level road hierarchy with a different composition of network-governing attributes and modal priority, for the current Dhaka transport network, in order to facilitate efficient integration of NMT with MT. A case study application of the instrument on a small transport network of Dhaka also demonstrates the utility, flexibility and adoptability of the instrument in logically allocating corridors with particular positions in the road hierarchy paradigm. Although the tool is useful in enabling balanced distribution of NMPT with MT at different network levels, further investigation is required with reference to detailed modal variations, scales and locations of a network to further generalise the framework application.
Resumo:
Process models are often used to visualize and communicate workflows to involved stakeholders. Unfortunately, process modeling notations can be complex and need specific knowledge to be understood. Storyboards, as a visual language to illustrate workflows as sequences of images, provide natural visualization features that allow for better communication, to provide insight to people from non-process modelling expert domains. This paper proposes a visualization approach using a 3D virtual world environment to visualize storyboards for business process models. A prototype was built to present its applicability via generating output with examples of five major process model patterns and two non-trivial use cases. Illustrative results for the approach show the promise of using a 3D virtual world to visualize complex process models in an unambiguous and intuitive manner.
Resumo:
Whilst there is a growing body of research considering corporate social responsibility (CSR) communication, calls have been made to consider the ‘how’ of CSR communication (Maon, Lindgreen, & Swaen, 2010). The challenge with exploring this however, is that communication research has largely been criticised for failing to consider the macro-phenomena impacting communication (Jones, Watson, Gardner, & Gallois, 2004; Lammers & Barbour, 2006). As such, limited attention has been given to who organisations need to indicate their responsiveness to in relation to CSR, and in turn, why they communicate about certain activities in their CSR reports. Without exploring these ideas, and hence, gaining an understanding of the macro-phenomena impacting CSR communication, we limit our understanding of the ‘how’ of CSR communication. As such, this study sought to explore both the why of CSR communication, and in turn, the implications this may have for the how of CSR communication. To do this, this study drew on the notions of institutional theory, legitimacy, and rhetoric, and explored propositions drawn from these concepts to consider the why and how of CSR communication. Extended abstract attached
Resumo:
By presenting an overview of institutional theory, specifically the concepts of organizational fields, institutional pressures, and legitimacy, in addition to classical rhetoric, we have sought to highlight that there are links within the literature between the concepts of institutional theory and legitimacy, and also legitimacy and classical rhetoric. To date however, the three concepts – institutional pressures, legitimacy, and rhetoric – have not been explicitly linked. Through building on the current literature, and using the notion of legitimacy as the axis to connect institutional pressures with rhetoric, we argue that certain rhetorical devices may in fact be used to build and construct legitimacy in relation to the different institutional pressures an organization may face within a field. We believe that this preliminary framework may be useful to the field of CSR communication, whereby it may assist in constructing legitimate CSR communication in response to the various pressures an organization may face in relation to CSR.
Resumo:
This thesis explains how an organisation's relationships with its key stakeholders influence the public's view of its responsibility for a crisis event and how this subsequently influences the protective and reparative powers of its crisis response on its reputation and legitimacy. From the results, a continuum of the influencing effect of relationship history was developed which demonstrates the positive and negative frames through which stakeholders view an organisation in crisis and its response. Organisational age and the evaluative character of its relationships with key stakeholders were considered in the experimental design as descriptors of an organisation's relationship history. The findings provide guidance to crisis managers on effective crisis response selection.
Resumo:
Design and design thinking are identified as making valuable contributions to business and management. The numbers of higher education programs that teach design thinking to business students and executives are growing, however to date little information about the outcomes of these initiatives has emerged. This paper presents the findings from the incorporation of design thinking and methods in one unit of an MBA program. All 90 participants from three MBA classes wholeheartedly expressed their support for this initiative. An evaluation of this experiment found positive reactions, learning, changes in behaviour and positive results for their companies. The challenges and future directions for the inclusion of design thinking and design methods in management education programs are proposed.
Resumo:
This paper draws on comparative analyses of Twitter data sets – over time and across different kinds of natural disasters and different national contexts – to demonstrate the value of shared, cumulative approaches to social media analytics in the context of crisis communication.
Resumo:
This study drew on the notions of institutional theory, legitimacy, and rhetoric, and explored propositions drawn from these concepts to consider the why and how of corporate social responsibility (CSR) communication. In doing so, this thesis found that there was often a disconnect between why the organisations were communicating about CSR activities in their reports and how the organisations were communicating about these activities.
Resumo:
Cryptosystems based on the hardness of lattice problems have recently acquired much importance due to their average-case to worst-case equivalence, their conjectured resistance to quantum cryptanalysis, their ease of implementation and increasing practicality, and, lately, their promising potential as a platform for constructing advanced functionalities. In this work, we construct “Fuzzy” Identity Based Encryption from the hardness of the Learning With Errors (LWE) problem. We note that for our parameters, the underlying lattice problems (such as gapSVP or SIVP) are assumed to be hard to approximate within supexponential factors for adversaries running in subexponential time. We give CPA and CCA secure variants of our construction, for small and large universes of attributes. All our constructions are secure against selective-identity attacks in the standard model. Our construction is made possible by observing certain special properties that secret sharing schemes need to satisfy in order to be useful for Fuzzy IBE. We also discuss some obstacles towards realizing lattice-based attribute-based encryption (ABE).