19 resultados para Information Management

em Aston University Research Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The recent global „credit crunch? has brought sharply into focus the need for better understanding of what it takes for organisations to survive. This research seeks to help organisations maintain their „viability? – the ability to maintain a separate existence and survive on their own. Whilst there are a multitude of factors that contribute to organisational viability, information can be viewed as the lifeblood of organisations. This research increases our understanding of how organisations can manage information effectively to help maintain their viability. The viable systems model (VSM) is an established modelling technique that enables the detailed analysis of organisational activity to examine how the structure and functions performed in an organisation contribute to its „viability?. The VSM has been widely applied, in small/large companies, industries and governments. However, whilst the VSM concentrates on the structure and functions necessary for an organisation to be viable, it pays much less attention to information deployment in organisations. Indeed, the VSM is criticised in the literature for being unable to provide much help with detailed information and communication structures and new theories are called for to explore the way people interact and what information they need in the VSM. This research analyses qualitative data collected from four case studies to contribute to our understanding of the role that information plays in organisational viability, making three key contributions to the academic literature. In the information management literature, this research provides new insight into the roles that specific information plays in organisations. In the systems thinking literature, this research extends our understanding of the VSM and builds on its powerful diagnostic capability to provide further criteria to aid in the diagnosis of viable organisations. In the information systems literature, this research develops a framework that can be used to help organisations design more effective information systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This research examines the role of the information management process within a process-oriented enterprise, Xerox Ltd. The research approach is based on a post-positive paradigm and has resulted in thirty-five idiographic statements. The three major outcomes are: 1. The process-oriented holistic enterprise is an organisation that requires a long-term management commitment to its development. It depends on the careful management of people, tasks, information and technology. A complex integration of business processes is required and this can be managed through the use of consistent documentation techniques, clarity in the definition of process responsibilities and management attention to the global metrics and the centralisation of the management of the process model are critical to its success. 2. The role of the information management process within the context of a process-oriented enterprise is to provide flexible and cost-effective applications, technological, and process support to the business. This is best achieved through a centralisation of the management of information management and of the process model. A business-led approach combined with the consolidation of applications, information, process, and data architectures is central to providing effective business and process-focused support. 3. In a process oriented holistic enterprise, process and information management are inextricably linked. The model of process management depends heavily on information management, whilst the model of information management is totally focused around supporting and creating the process model. The two models are mutually creating - one cannot exist without the other. There is a duality concept of process and information management.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis describes the development of an operational river basin water resources information management system. The river or drainage basin is the fundamental unit of the system; in both the modelling and prediction of hydrological processes, and in the monitoring of the effect of catchment management policies. A primary concern of the study is the collection of sufficient and sufficiently accurate information to model hydrological processes. Remote sensing, in combination with conventional point source measurement, can be a valuable source of information, but is often overlooked by hydrologists, due to the cost of acquisition and processing. This thesis describes a number of cost effective methods of acquiring remotely sensed imagery, from airborne video survey to real time ingestion of meteorological satellite data. Inexpensive micro-computer systems and peripherals are used throughout to process and manipulate the data. Spatial information systems provide a means of integrating these data with topographic and thematic cartographic data, and historical records. For the system to have any real potential the data must be stored in a readily accessible format and be easily manipulated within the database. The design of efficient man-machine interfaces and the use of software enginering methodologies are therefore included in this thesis as a major part of the design of the system. The use of low cost technologies, from micro-computers to video cameras, enables the introduction of water resources information management systems into developing countries where the potential benefits are greatest.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Continuing advances in digital image capture and storage are resulting in a proliferation of imagery and associated problems of information overload in image domains. In this work we present a framework that supports image management using an interactive approach that captures and reuses task-based contextual information. Our framework models the relationship between images and domain tasks they support by monitoring the interactive manipulation and annotation of task-relevant imagery. During image analysis, interactions are captured and a task context is dynamically constructed so that human expertise, proficiency and knowledge can be leveraged to support other users in carrying out similar domain tasks using case-based reasoning techniques. In this article we present our framework for capturing task context and describe how we have implemented the framework as two image retrieval applications in the geo-spatial and medical domains. We present an evaluation that tests the efficiency of our algorithms for retrieving image context information and the effectiveness of the framework for carrying out goal-directed image tasks. © 2010 Springer Science+Business Media, LLC.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

One dominant feature of the modern manufacturing chains is the movement of goods. Manufacturing companies would remain an unprofitable investment if the supplies/logistics of raw materials, semi-finished products or final goods are not handled in an effective way. Both levels of a modern manufacturing chain-actual production and logistics-are characterized by continuous data creation at a much faster rate than they can be meaningfully analyzed and acted upon manually. Often, instant and reliable decisions need to be taken based on huge, previously inconceivable amounts of heterogeneous, contradictory or incomplete data. The paper will highlight aspects of information flows related to business process data visibility and observability in modern manufacturing networks. An information management platform developed in the framework of the EU FP7 project ADVANCE will be presented.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The aim of this paper is to explore the management of information in an aerospace manufacturer's supply chain by analysing supply chain disruption risks. The social network perspective will be used to examine the flows of information in the supply chain. The examination of information flows will also be explored in terms of push and pull information management. The supply chain risk management (SCRM) strategy is to assess the management of information that allows companies to gather information which will allow them to mitigate that risk before any disruption to the supply chain occurs. There is a shortage of models in analysing the supply chain risk associated with information flows, possibly due to the omission of appropriate modelling techniques in this area (Tang and Nurmaya, 2011). This paper uses an exploratory case study consisting of a multi method qualitative approach using fifteen interviews and four focus groups.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This paper makes a case for taking a systems view of knowledge management within health-care provision, concentrating on the emergency care process in the UK National Health Service. It draws upon research in two casestudy organizations (a hospital and an ambulance service). The case-study organizations appear to be approaching knowledge (and information) management in a somewhat fragmented way. They are trying to think more holistically, but (perhaps) because of the ways their organizations and their work are structured, they cannot ‘see’ the whole of the care process. The paper explores the complexity of knowledge management in emergency health care and draws the distinction for knowledge management between managing local and operational knowledge, and global and clinical knowledge.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Emerging markets have recently been experiencing a dramatic increased in the number of mobile phone per capita. M-government has, hence, been heralded as an opportunity to leap-frog the technology cycle and provide cheaper and more inclusive and services to all. This chapter explores, within an emerging market context, the legitimacy and resistance facing civil servants’ at the engagement stage with m-government activities and the direct implication for resource management. Thirty in depth interview, in Turkey, are drawn-upon with key ICT civil servant in local organizations. The findings show that three types of resources are perceived as central namely: (i) diffusion of information management, (ii) operating system resource management and (iii) human resource management. The main evidence suggests that legitimacy for each resource management, at local level, is an ongoing struggle where all groups deploy multiples forms of resistance. Overall, greater attention in the resource management strategy for m-government application needs to be devoted to enablers such as civil servants rather than the final consumers or citizens.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

The CancerGrid consortium is developing open-standards cancer informatics to address the challenges posed by modern cancer clinical trials. This paper presents the service-oriented software paradigm implemented in CancerGrid to derive clinical trial information management systems for collaborative cancer research across multiple institutions. Our proposal is founded on a combination of a clinical trial (meta)model and WSRF (Web Services Resource Framework), and is currently being evaluated for use in early phase trials. Although primarily targeted at cancer research, our approach is readily applicable to other areas for which a similar information model is available.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

The research investigates the past, present and potential future role of Information Specialists (ISps) in process oriented companies. It tests the proposition that ISps in companies that have undertaken formal process reengineering exercises are likely to become more proactive and more business oriented (as opposed to technically oriented) than they had previously been when their organisations were organised along traditional, functional lines. A review of existing literature in the area of Business Process Reengineering and Information Management reveals a lack of consensus amongst researchers concerning the appropriate role for ISps during and after BPR. Opinion is divided as to whether IS professionals should reactively support BPR or whether IT/IS developments should be driving these initiatives. A questionnaire based ‘Descriptive Survey’ with 60 respondents is used as a first stage of primary data gathering. This is followed by follow-up interviews with 20 of the participating organisations to gather further information on their experiences. The final stage of data collection consists of further in-depth interview with four case study companies to provide an even richer picture of their experiences. The results of the questionnaire are analysed and displayed in the form of simple means, frequencies and bar graphs. The ‘NU-DIST’ computer based discourse analysis package was tried in relation to summarising the interview findings, but this proved cumbersome and a visual collation method is preferred. Overall, the researcher contends that the supposition outlined above is proven, and she concludes the research by suggesting the implications of these findings. In particular she offers a ‘Framework for Understanding and Action’ which is deemed to be relevant to both practitioners and future researchers.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Modern managers are under tremendous pressure in attempting to fulfil a profoundly complex managerial task, that of handling information resources. Information management, an intricate process requiring a high measure of human cognition and discernment, involves matching a manager's lack of information processing capacity against his information needs, with voluminous information at his disposal. The nature of the task will undoubtedly become more complex in the case of a large organisation. Management of large-scale organisations is therefore an exceedingly challenging prospect for any manager to be faced with. A system that supports executive information needs will help reduce managerial and informational mismatches. In the context of the Malaysian public sector, the task of overall management lies with the Prime Minister and the Cabinet. The Prime Minister's Office is presently supporting the Prime Minister's information and managerial needs, although not without various shortcomings. The rigid formalised structure predominant of the Malaysian public sector, so opposed to dynamic treatment of problematic issues as faced by that sector, further escalates the managerial and organisational problem of coping with a state of complexity. The principal features of the research are twofold: the development of a methodology for diagnosing the problem organisation' and the design of an office system. The methodological development is done in the context of the Malaysian public sector, and aims at understanding the complexity of its communication and control situation. The outcome is a viable model of the public sector. `Design', on the other hand, is developing a syntax or language for office systems which provides an alternative to current views on office systems. The design is done with reference to, rather than for, the Prime Minister's Office. The desirable outcome will be an office model called Office Communication and Information System (OCIS).

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Enterprise resource planning (ERP) projects are risky. But if they are implemented appropriately, they can provide competitive advantage to organisations. Therefore, ERP implementation has become one of the most critical aspects of today's information management research. The main purpose of this article is to describe a new ERP risk assessment framework (RAF) that can be used to increase the success of ERP implementation. In this article, through a case study based in a leading UK-based energy service provider, we demonstrate the new RAF, which has been shown to help identify and mitigate risks in ERP implementation. In contrast to other research, this RAF identifies risks hierarchically in external engagement, programme management, work stream and work package levels across technical, schedule, operational, business and organisational categories. This not only helped to develop responses to mitigate risks but also facilitates on-going risk control.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Increasingly users are seen as the weak link in the chain, when it comes to the security of corporate information. Should the users of computer systems act in any inappropriate or insecure manner, then they may put their employers in danger of financial losses, information degradation or litigation, and themselves in danger of dismissal or prosecution. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of inappropriate behaviours, and in so doing, protecting corporate information, is through the formulation and application of a formal ‘acceptable use policy (AUP). Whilst the AUP has attracted some academic interest, it has tended to be prescriptive and overly focussed on the role of the Internet, and there is relatively little empirical material that explicitly addresses the purpose, positioning or content of real acceptable use policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and composition of a sample of authentic policies – taken from the higher education sector – rather than simply making general prescriptions about what they ought to contain. There are two important conclusions to be drawn from this study: (1) the primary role of the AUP appears to be as a mechanism for dealing with unacceptable behaviour, rather than proactively promoting desirable and effective security behaviours, and (2) the wide variation found in the coverage and positioning of the reviewed policies is unlikely to be fostering a coherent approach to security management, across the higher education sector.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Ensuring the security of corporate information, that is increasingly stored, processed and disseminated using information and communications technologies [ICTs], has become an extremely complex and challenging activity. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of security breaches, and in so doing, protecting corporate information, is through the formulation and application of a formal information security policy (InSPy). Whilst a great deal has now been written about the importance and role of the information security policy, and approaches to its formulation and dissemination, there is relatively little empirical material that explicitly addresses the structure or content of security policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and content of authentic information security policies, rather than simply making general prescriptions about what they ought to contain. Having established the structure and key features of the reviewed policies, the paper critically explores the underlying conceptualisation of information security embedded in the policies. There are two important conclusions to be drawn from this study: (1) the wide diversity of disparate policies and standards in use is unlikely to foster a coherent approach to security management; and (2) the range of specific issues explicitly covered in university policies is surprisingly low, and reflects a highly techno-centric view of information security management.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

In this paper, we propose a text mining method called LRD (latent relation discovery), which extends the traditional vector space model of document representation in order to improve information retrieval (IR) on documents and document clustering. Our LRD method extracts terms and entities, such as person, organization, or project names, and discovers relationships between them by taking into account their co-occurrence in textual corpora. Given a target entity, LRD discovers other entities closely related to the target effectively and efficiently. With respect to such relatedness, a measure of relation strength between entities is defined. LRD uses relation strength to enhance the vector space model, and uses the enhanced vector space model for query based IR on documents and clustering documents in order to discover complex relationships among terms and entities. Our experiments on a standard dataset for query based IR shows that our LRD method performed significantly better than traditional vector space model and other five standard statistical methods for vector expansion.