98 resultados para Resilient enterprise


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study aimed to evaluate whether an intervention prevented the development of depressive symptoms through the early years of secondary school (Grades 7 to 9 - mean ages 12.3 to 14.5 years) in Victoria, Australia. Twelve schools were randomized to a universal preventative intervention (including a student social relationship/emotional health curriculum, and parent/caregiver parenting education); 12 were randomized as control schools. Multivariate regression analyses used student self-report to predict depressive symptoms at 26-month follow-up (13-months after intervention completion) from baseline measures and intervention status (N = 2027). There was no overall intervention effect on depressive symptoms. However, intervention students with moderate symptoms whose parents attended parent education events had a significantly reduced risk of depressive symptoms at follow-up. Future evaluations of interventions of this type should investigate: therapeutic processes; methods to increase recruitment into effective parent education events; and the potential to target assistance to students with high depressive symptoms.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The lack of knowledge of how resilience management supports enterprise system (ES) projects accounts for the failure of firms to leverage their investments in costly ES implementations. Using a structured-pragmatic- situational (SPS) case study research approach, this paper reports on an investigation into the resilience management of a large utility company as it implemented an ES upgrade. Drawing on the literature and on the case study findings, we developed a process-based resilience management framework that involves three strategies (developing situation awareness, demystifying threats, and executing restoration plans) and four organisational capabilities that transform resilience management concepts into practices. We identified the crucial phases of ES upgrade implementation and developed indicators for how different strategies and capabilities of resilience management can assist managers at different stages of an ES upgrade. This research advances the state of existing knowledge by providing specific and verifiable propositions for attaining a state of resilience, the knowledge being grounded in the empirical reality of a case study. Moreover, the framework offers ES practitioners a roadmap to better identify appropriate responses and levels of preparedness.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective: We want to support enterprise service modelling and generation using a more end user-friendly metaphor than current approaches, which fail to scale to large organisations with key issues of "cobweb" and "labyrinth" problems and large numbers of hidden dependencies. Method: We present and evaluate an integrated visual approach for business process modelling using a novel tree-based overlay structure that effectively mitigate complexity problems. A tree-overlay based visual notation (EML) and its integrated support environment (MaramaEML) supplement and integrate with existing solutions. Complex business architectures are represented as service trees and business processes are modelled as process overlay sequences on the service trees. Results: MaramaEML integrates EML and BPMN to provide complementary, high-level business service modelling and supports automatic BPEL code generation from the graphical representations to realise web services implementing the specified processes. It facilitates generated service validation using an integrated LTSA checker and provides a distortion-based fisheye and zooming function to enhance complex diagram navigation. Evaluations of EML show its effectiveness. Conclusions: We have successfully developed and evaluated a novel tree-based metaphor for business process modelling and enterprise service generation. Practice implications: a more user-friendly modelling approach and support tool for business end users.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Enterprise security management requires capturing different security and IT systems' details, analyzing and enforcing these security details, and improving employed security to meet new risks. Adopting structured models greatly helps in simplifying and organizing security specification and enforcement processes. However, existing security models are generally limited to specific security details and do not deliver a comprehensive security model. They also often do not have user-friendly notations, being complicated extensions of existing modeling languages (such as UML). In this paper, we introduce a comprehensive Security Domain Specific Visual Language (SecDSVL), which enables capturing of key security details to support enterprise systems security management process. We discuss our SecDSVL, tool support and the model-based enterprise security management approach it supports, give a usage example, and present evaluation experiments of SecDSVL.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Certificate-based encryption (CBE) is an important class of public key encryption but the existing schemes are secure only under the premise that the decryption key (or private key) and master secret key are absolutely secret. In fact, a lot of side channel attacks and cold boot attacks can leak secret information of a cryptographic system. In this case, the security of the cryptographic system is destroyed, so a new model called leakage-resilient (LR) cryptography is introduced to solve this problem. While some traditional public key encryption and identity-based encryption with resilient-leakage schemes have been constructed, as far as we know, there is no leakage-resilient scheme in certificate-based cryptosystems. This paper puts forward the first certificate-based encryption scheme which can resist not only the decryption key leakage but also the master secret key leakage. Based on composite order bilinear group assumption, the security of the scheme is proved by using dual system encryption. The relative leakage rate of key is close to 1/3.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Article argues that courts confronting the effects of multinational enterprise insolvency must undertake a pragmatic incursion into the separate entity doctrine. This argument is premised on gaps in the current Model Law which confers significant discretion on the courts. Our research shows that courts have fashioned innovative solutions to fill the gaps and thatgreater recognition of the legitimacy of these judicial incursions into the separate entity doctrine would facilitate the reduction of transaction costs in the case of multinational group insolvencies. We identify criteriawhereby a court would be able to determine that the inherentseparateness of the corporate structure should be disregarded andthe group regarded as one.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose – The purpose of the paper is to use a case study setting involving the implementation of an enterprise resource planning (ERP) system to expose and analyze the conflicts in the characterizations of the post bureaucratic organisation (PBO) in the literature. ERP implementations are often accompanied by increasing levels of stress in organizations that place pressures on organizational relationships and structures. Additionally, ERPs are regarded as introducing their own techno-logic of centralization, standardization and formalization that provides an apparent contrast to the exhortations about employee empowerment.Design/methodology/approach – A case study of ERP implementation in a medium-sized entity is presented. The paper explores aspects of ERP and PBO from the context of postmodern organization theory.Findings – Some concerns about PBO identified in the literature are reflected in the case situation. For example, there is a commitment to give up private time and work flexibly by some employees. The paper also provides evidence of the way the management team substitute their reliance on a key individual knowledge worker for that of an ERP system and external vendor support. Paradoxically, trust in that same knowledge worker and between core users of the system is essential to enable the implementation of the system.