270 resultados para COMPETITIVE WORLDVIEWS


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Teaching to an international audience online can be significantly different as compared to a traditional classroom setting. In a traditional classroom setting, the students are usually removed from their own cultural context and required to operate in the lecturer’s context. International students coming to Malaysia to study are implicitly expected to, and often do, become familiar with the Malaysian culture and style of education. The use of educational technologies as a blended strategy in higher education programs offers challenges and opportunities for all students but this may be different for international students who come from varied backgrounds. With an increasingly competitive global demand for higher education, Malaysian institutions strive to be the hub of educational excellence and a preferred option for international students in coping with the challenges of studying abroad in a different culture. This research will evaluate how undergraduate students perceive their online learning experiences in a Malaysian university. The OLES (Online Learning Environment Survey) will be used to explore the international and domestic students’ perception on e-learning and the findings of the first six OLES scales varying from (Computer Usage, Teacher Support, Student Interaction & Collaboration, Personal Relevance, Authentic Learning, and Student Autonomy) will be reported in this research. An in-depth study will be conducted to compare and contrast the challenges of international students with domestic students. Major difficulties encountered and how these students actually cope with e-learning, as well as the strategies and tools used to overcome the challenges will be investigated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Teaching to an international audience online can be significantly different as compared to a traditional classroom setting. In a traditional classroom setting, the students are usually removed from their own cultural context and required to operate in the lecturer’s context. International students coming to Malaysia to study are implicitly expected to, and often do, become familiar with the Malaysian culture and style of education. The use of educational technologies as a blended strategy in higher education programs offers challenges and opportunities for all students but this may be different for international students who come from varied backgrounds. With an increasingly competitive global demand for higher education, Malaysian institutions strive to be the hub of educational excellence and a preferred option for international students in coping with the challenges of studying abroad in a different culture. This research will evaluate how undergraduate students perceive their online learning experiences in a Malaysian institute. The OLES (Online Learning Environment Survey) will be used to explore the international and domestic students’ perception on e-learning and the findings of the last six OLES scales varying from (Equity, Enjoyment, Asychronocity, Evaluation & Assessments, Online Learning Tools, and Interface Design) will be reported in this research. An in-depth study will be conducted to compare and contrast the challenges of international students with domestic students. Major difficulties encountered and how these students actually cope with e-learning, as well as the strategies and tools used to overcome the challenges will be investigated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The execution of 'macro-adjustment' policies by the central government to cool down the overheated real estate market in the past few years has created an unfavourable operating environment for real estate developers in Mainland China. Developers need to rethink their business model and create a new form of competitive advantage in order to survive. Despite this, research into the factors that influence the competitiveness of the real estate market in China has been limited. Therefore, a survey of 58 real estate actitioners, experts and academics in China was conducted to probe opinion on the factors that influence competitiveness in real estate firms in China. Survey results suggest that the developer's financial competency, market coverage and management competencies are vital to its competitiveness. Findings also highlight the importance of industry ecognition/award, share in different types of property sales/development projects, profit after tax, growth rate of their securities price, and diversification of R&D in reflecting the competitiveness of real estate developers in China. The findings provide an insight into the factors that influence competitiveness in China's real estate market and also assist practitioners to formulate competitiveness improvement strategies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many cities around the globe are now considering tourism facilities and their remarkable revenues in order to become competitive in the global economy. In many of these cities a great emphasis is given to the cultural tourism as it plays an important role in the establishment of creative and knowledge-base of cities. The literature points out the importance of local community support in cultural tourism. In such context, the use of new approach and technologies in tourism planning in order to increase the community participation and competitiveness of cities’ cultural assets gains a great significance. This paper advocates a new planning approach for tourism planning, particularly for cultural tourism, to increase the competitiveness of cities. As part of this new approach, the paper introduces the joined up planning approach integrated with a collaborative decision support system: ‘the community-oriented decision support system’. This collaborative planning support system is an effective and efficient tool for cultural tourism planning, which provides a platform for local communities’ participation in the development decision process.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work presents an extended Joint Factor Analysis model including explicit modelling of unwanted within-session variability. The goals of the proposed extended JFA model are to improve verification performance with short utterances by compensating for the effects of limited or imbalanced phonetic coverage, and to produce a flexible JFA model that is effective over a wide range of utterance lengths without adjusting model parameters such as retraining session subspaces. Experimental results on the 2006 NIST SRE corpus demonstrate the flexibility of the proposed model by providing competitive results over a wide range of utterance lengths without retraining and also yielding modest improvements in a number of conditions over current state-of-the-art.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Youth sports teams are usually grouped into yearly age groups based on fixed cut-off date (September 1st in the UK and January 1st in Australia). Children born just after this cut-off will be the oldest and most mature in their age group. This gives them an advantage in competitive sport, an advantage which has persisted into adulthood as shown by seasonal patterns in the dates of birth of professional ice hockey, football and basketball players. We were interested in whether a similar seasonal pattern exists in professional Australian Football League (AFL) players. We examined all AFL players in the 2009 season excluding foreign-born players. We compared the observed number of players’ born in each month with the expected number based on national statistics. There was a marked and statistically significant seasonality in players’ dates of birth. There were 33% more players than expected with dates of birth in January, and 25% fewer in December. Players who are relatively older in youth AFL teams have a better chance of turning professional.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Schools have seldom been examined by scholars in studies of organizational sites. Yet schools and the educational context in which they operate, offer potentially important insights into how organizations use rhetoric in their communications to persuade audiences and leverage advantage in the marketplace. This study, which utilises rhetorical analysis to examine the persuasive, yet ambiguous strategies used in 65 school prospectuses in Australia, revealed six strategies consistently used by schools to leverage competitive advantage and persuade internal and external audiences: identification, juxtapositioning, bolstering or self-promotion, partial reporting, selfexpansion and reframing or reversal. As well as illustrating how schools operate in the context of marketisation and privatization discourses in 21st century education, the organizational theory and methods utilised for the research demonstrates how rhetorical strategies draw on, as well as reproduce, socio-political and cultural discourses around economic and social privilege.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A recognized brand name that provides a competitive advantage is considered one of a firm’s most valuable assets. Many firms have benefitted from their well-established brand name by adopting the strategy of brand extension (Aaker and Keller, 1990). Many academic studies have examined the methods used to introduce successful brand extensions, and analysed how consumers evaluate the brand extensions (Aaker and Keller, 1990; Barone, 2005; Bath, 1997; Bottomley and Holden, 2001; Edelman, 2003; Fedorikhin, Park and Thomson, 2008; Kwun, 2004; Lockhart and Ford, 2005). Some researchers have suggested that brand extension strategies may carry the risk of diluting important consumer trust in the parent brand (Martinez and Pina, 2003; C. W. Park, Milberg and Lawson, 1991). Furthermore, some studies have focused on the role of the parent brand in brand extensions (Apostolopoulou, 2002; Bath, 1997; Bhat and Reddy, 2001; Yeung and Wyer Jr, 2005). Brand extensions may have a positive or a negative influence on the parent brand, so it is important to understand the specific impact on dimensions such as brand image, brand awareness, and customer-brand relationships. This study will carry investigate the effects of brand extensions on the relationships customers have with the parent brand.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In a competitive environment, companies continuously innovate to offer superior services at lower costs. ‘Shared services’ have been extensively adopted in practice as one means for improving organisational performance. Shared services is considered most appropriate for support functions, and is widely adopted in Human Resource Management, Finance and Accounting; more recently being employed across the Information Systems function. IS applications and infrastructure are an important enabler and driver of shared services in all functional areas. As computer based corporate information systems have become de facto and the internet pervasive and increasingly the backbone of administrative systems, the technical impediments to sharing have come down dramatically. As this trend continues, CIOs and IT professionals will need a deeper understanding of the shared services phenomenon and its implications. The advent of shared services has consequential implications for the IS academic discipline. Yet, archival analysis of IS the academic literature reveals that shared services, though mentioned in more than 100 articles, has received little in depth attention. This paper is the first attempt to investigate and report on the current status of shared services in the IS literature. The paper presents detailed review of literature from main IS journals and conferences, findings evidencing a lack of focus and definitions and objectives lacking conceptual rigour. The paper concludes with a tentative operational definition, a list of perceived main objectives of shared services, and an agenda for related future research.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As a consequence of the increased incidence of collaborative arrangements between firms, the competitive environment characterising many industries has undergone profound change. It is suggested that rivalry is not necessarily enacted by individual firms according to the traditional mechanisms of direct confrontation in factor and product markets, but rather as collaborative orchestration between a number of participants or network members. Strategic networks are recognised as sets of firms within an industry that exhibit denser strategic linkages among themselves than other firms within the same industry. Based on this, strategic networks are determined according to evidence of strategic alliances between firms comprising the industry. As a result, a single strategic network represents a group of firms closely linked according to collaborative ties. Arguably, the collective outcome of these strategic relationships engineered between firms suggest that the collaborative benefits attributed to interorganisational relationships require closer examination in respect to their propensity to influence rivalry in intraindustry environments. Derived in large from the social sciences, network theory allows for the micro and macro examination of the opportunities and constraints inherent in the structure of relationships in strategic networks, establishing a relational approach upon which the conduct and performance of firms can be more fully understood. Research to date has yet to empirically investigate the relationship between strategic networks and rivalry. The limited research that has been completed utilising a network rationale to investigate competitive patterns in contemporary industry environments has been characterised by a failure to directly measure rivalry. Further, this prior research has typically embedded investigation in industry settings dominated by technological or regulatory imperatives, such as the microprocessor and airline industries. These industries, due to the presence of such imperatives, are arguably more inclined to support the realisation of network rivalry, through subscription to prescribed technological standards (eg., microprocessor industry) or by being bound by regulatory constraints dictating operation within particular market segments (airline industry). In order to counter these weaknesses, the proposition guiding research - Are patterns of rivalry predicted by strategic network membership? – is embedded in the United States Light Vehicles Industry, an industry not dominated by technological or regulatory imperatives. Further, rivalry is directly measured and utilised in research, thus distinguishing this investigation from prior research efforts. The timeframe of investigation is 1993 – 1999, with all research data derived from secondary sources. Strategic networks were defined within the United States Light Vehicles Industry based on evidence of horizontal strategic relationships between firms comprising the industry. The measure of rivalry used to directly ascertain the competitive patterns of industry participants was derived from the traditional Herfindahl Index, modified to account for patterns of rivalry observed at the market segment level. Statistical analyses of the strategic network and rivalry constructs found little evidence to support the contention of network rivalry; indeed, greater levels of rivalry were observed between firms comprising the same strategic network than between firms participating in opposing network structures. Based on these results, patterns of rivalry evidenced in the United States Light Vehicle Industry over the period 1993 – 1999 were not found to be predicted by strategic network membership. The findings generated by this research are in contrast to current theorising in the strategic network – rivalry realm. In this respect, these findings are surprising. The relevance of industry type, in conjunction with prevailing network methodology, provides the basis upon which these findings are contemplated. Overall, this study raises some important questions in relation to the relevancy of the network rivalry rationale, establishing a fruitful avenue for further research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dragon is a word-based stream cipher. It was submitted to the eSTREAM project in 2005 and has advanced to Phase 3 of the software profile. This paper discusses the Dragon cipher from three perspectives: design, security analysis and implementation. The design of the cipher incorporates a single word-based non-linear feedback shift register and a non-linear filter function with memory. This state is initialized with 128- or 256-bit key-IV pairs. Each clock of the stream cipher produces 64 bits of keystream, using simple operations on 32-bit words. This provides the cipher with a high degree of efficiency in a wide variety of environments, making it highly competitive relative to other symmetric ciphers. The components of Dragon were designed to resist all known attacks. Although the design has been open to public scrutiny for several years, the only published attacks to date are distinguishing attacks which require keystream lengths greatly exceeding the stated 264 bit maximum permitted keystream length for a single key-IV pair.