29 resultados para Managing Risk: Identifying and Controlling Losses and Assuming Risks from Perils
Resumo:
The enterprise management (EM) approach provides a holistic view of organizations and their related information systems. In order to align information technology (IT) innovation with global markets and volatile virtualization, traditional firms are seeking to reconstruct their enterprise structures alongside repositioning strategy and establish new information system (IS) architectures to transform from single autonomous entities into more open enterprises supported by new Enterprise Resource Planning (ERP) systems. This chapter shows how ERP engage-abilities cater to three distinctive EM patterns and resultant strategies. The purpose is to examine the presumptions and importance of combing ERP and inter-firm relations relying on the virtual value chain concept. From a review of the literature on ERP development and enterprise strategy, exploratory inductive research studies in Zoomlion and Lanye have been conducted. In addition, the authors propose a dynamic conceptual framework to demonstrate the adoption and governance of ERP in the three enterprise management forms and points to a new architectural type (ERPIII) for operating in the virtual enterprise paradigm. © 2012, IGI Global.
Resumo:
Enterprise Resource Planning (ERP) projects are strategic and capital intensive, so failure may be costly and even cause bankruptcy of companies. Previous studies have proposed ways for improving implementation, but they are mostly generic and follow standardized project management practices as specified in various standards (e.g. the “project management body of knowledge” of the Project Management Institute). Because ERP is interdisciplinary (involving change management, project management and information technology management), it warrants a customized approach to managing risks throughout the life cycle of implementation and operation. Through a practical case study, this paper demonstrates a qualitative, user friendly approach to ERP project risk management. Firstly, through a literature review it identifies various risk factors in ERP implementation. Secondly, the risk management practices of a UK-based multinational consulting company in one of its clients are evaluated. The risk factors from the case study organization and literature are then compared and discussed.
Resumo:
Age related macular degeneration (AMD) is the leading cause of blindness in individuals older than 65 years of age. It is a multifactorial disorder and identification of risk factors enables individuals to make lifestyle choices that may reduce the risk of disease. Collaboration between geneticists, ophthalmologists, and optometrists suggests that genetic risk factors play a more significant role in AMD than previously thought. The most important genes are associated with immune system modulation and the complement system, e.g., complement factor H (CFH), factor B (CFB), factor C3, and serpin peptidase inhibitor (SERPING1). Genes associated with membrane transport, e.g., ATP-binding cassette protein (ABCR) and voltage-dependent calcium channel gamma 3 (CACNG3), the vascular system, e.g., fibroblast growth factor 2 (FGF2), fibulin-5, lysyl oxidase-like gene (LOXL1) and selectin-P (SELP), and with lipid metabolism, e.g., apolipoprotein E (APOE) and hepatic lipase (LIPC) have also been implicated. In addition, several other genes exhibit some statistical association with AMD, e.g., age-related maculopathy susceptibility protein 2 (ARMS2) and DNA excision repair protein gene (ERCC6) but more research is needed to establish their significance. Modifiable risk factors for AMD should be discussed with patients whose lifestyle and/or family history place them in an increased risk category. Furthermore, calculation of AMD risk using current models should be recommended as a tool for patient education. It is likely that AMD management in future will be increasingly influenced by assessment of genetic risk as such screening methods become more widely available. © 2013 Spanish General Council of Optometry.
Resumo:
DUE TO COPYRIGHT RESTRICTIONS ONLY AVAILABLE FOR CONSULTATION AT ASTON UNIVERSITY LIBRARY AND INFORMATION SERVICES WITH PRIOR ARRANGEMENT
Resumo:
Oral presentation
Resumo:
Risk assessment is crucial for developing risk management plans to prevent or minimize mental health patients' risks that will impede their recovery. Risk assessments and risk management plans should be closely linked. Their content and the extent to which they are linked within one Trust is explored. There is a great deal of variability in the amount and detail of risk information collected by nurses and how this is used to develop risk management plans. Keeping risk assessment information in one place rather than scattered throughout patient records is important for ensuring it can be accessed easily and linked properly to risk management plans. Strengthening the link between risk assessment and management will help ensure interventions and care is tailored to the specific needs of individual patients, thus promoting their safety and well-being. Thorough risk assessment helps in developing risk management plans that minimize risks that can impede mental health patients' recovery. Department of Health policy states that risk assessments and risk management plans should be inextricably linked. This paper examines their content and linkage within one Trust. Four inpatient wards for working age adults (18-65 years) in a large mental health Trust in England were included in the study. Completed risk assessment forms, for all patients in each inpatient ward were examined (n= 43), followed by an examination of notes for the same patients. Semi-structured interviews took place with ward nurses (n= 17). Findings show much variability in the amount and detail of risk information collected by nurses, which may be distributed in several places. Gaps in the risk assessment and risk management process are evident, and a disassociation between risk information and risk management plans is often present. Risk information should have a single location so that it can be easily found and updated. Overall, a more integrated approach to risk assessment and management is required, to help patients receive timely and appropriate interventions that can reduce risks such as suicide or harm to others. © 2011 Blackwell Publishing.
Resumo:
The enterprise management (EM) approach provides a holistic view of organizations and their related information systems. In order to align information technology (IT) innovation with global markets and volatile virtualization, traditional firms are seeking to reconstruct their enterprise structures alongside repositioning strategy and establish new information system (IS) architectures to transform from single autonomous entities into more open enterprises supported by new Enterprise Resource Planning (ERP) systems. This chapter shows how ERP engage-abilities cater to three distinctive EM patterns and resultant strategies. The purpose is to examine the presumptions and importance of combing ERP and inter-firm relations relying on the virtual value chain concept. From a review of the literature on ERP development and enterprise strategy, exploratory inductive research studies in Zoomlion and Lanye have been conducted. In addition, the authors propose a dynamic conceptual framework to demonstrate the adoption and governance of ERP in the three enterprise management forms and points to a new architectural type (ERPIII) for operating in the virtual enterprise paradigm.
Resumo:
Motherhood and Priesthood are two roles that carry with them particular expectations and demands; both are premised on the notion of altruism and sacrifice, constant availability, and putting the needs of others before one’s own (Carroll et al. 1983; Hayes 1996; Peyton and Gatrell 2013; Thorne 2000). This has also been gendered; sacrifice and altruism have traditionally been connected with women (Hays 1996). This article will examine what happens when clergy mothers simultaneously enact the roles of priesthood and motherhood, and how this is managed in the context of ‘intensive’ motherhood and priesthood. Based on in-depth semi-structured interviews with 17 clergy mothers in the Anglican Church, it will highlight the contradictions, negotiations and interweaving which occurs for both roles to be concurrently enacted, offering a contextual insight into the management of motherhood vis-à-vis professional life.
Resumo:
BACKGROUND: Food allergy has been shown to have a significant impact on quality of life (QoL) and can be difficult to manage in order to avoid potentially life threatening reactions. Parental self-efficacy (confidence) in managing food allergy for their child might explain variations in QoL. This study aimed to examine whether self-efficacy in parents of food allergic children was a good predictor of QoL of the family. METHODS: Parents of children with clinically diagnosed food allergy completed the Food Allergy Self-Efficacy Scale for Parents (FASE-P), the Food Allergy Quality of Life Parental Burden Scale (FAQL-PB), the GHQ-12 (to measure mental health) and the Food Allergy Independent Measure (FAIM), which measures perceived likelihood of a severe allergic reaction. RESULTS: A total of 434 parents took part. Greater parental QoL was significantly related to greater self-efficacy for food allergy management, better mental health, lower perceived likelihood of a severe reaction, older age in parent and child and fewer number of allergies (all p<0.05). Food allergy self-efficacy explained more of the variance in QoL than any other variable and self-efficacy related to management of social activities and precaution and prevention of an allergic reaction appeared to be the most important aspects. CONCLUSIONS: Parental self-efficacy in management of a child's food allergy is important and is associated with better parental QoL. It would be useful to measure self-efficacy at visits to allergy clinic in order to focus support; interventions to improve self-efficacy in parents of food allergic children should be explored. This article is protected by copyright. All rights reserved.
Resumo:
Several parties (stakeholders) are involved in a construction project. The conventional Risk Management Process (RMP) manages risks from a single party perspective, which does not give adequate consideration to the needs of others. The objective of multi-party risk management is to assist decision-makers in managing risk systematically and most efficiently in a multi-party environment. Multi-party Risk Management Processes (MRMP) consist of risk identification, structuring, analysis and developing responses from all party perspectives. The MRMP has been applied to a cement plant construction project in Thailand to demonstrate its effectiveness.
Resumo:
Using a comprehensive firm-level data set from China spanning the period 1998–2005, this study investigates the relationship between firm size, financing sources, and total factor productivity growth. Controlling for the endogeneity of financing sources, we find that firm size plays an important role in the way financial structure affects the growth process. Domestic bank loans are more effective for bigger firms, while self-raised finance is more beneficial to smaller firms’ growth. We also uncover evidence that ownership mediates the relationship between firm size, finance, and growth.
Resumo:
In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book helps people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book is intended to help people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. Behind the doors of our own homes, we assume we are safe from predators, con artists, and other criminals wishing us harm. But the proliferation of personal computers and the growth of the Internet have invited these unsavory types right into our family rooms. With a little psychological knowledge a con man can start to manipulate us in different ways. A terrorist can recruit new members and raise money over the Internet. Identity thieves can gather personal information and exploit it for criminal purposes. Spammers can wreak havoc on businesses and individuals. Here, an expert helps readers recognize the signs of a would-be criminal in their midst. Focusing on the perpetrators, the author provides information about how they operate, why they do it, what they hope to do, and how to protect yourself from becoming a victim.