8 resultados para information gap

em Aston University Research Archive


Relevância:

60.00% 60.00%

Publicador:

Resumo:

SMEs with a weak internal R&D capacity show the tendency to shy away from using external sources of technical expertise. The tendency deters providers of industrial modernization services from supporting such structurally weak SMEs. This paper examines how Japan's local technology centres - kosetsushi - remove the bottleneck and reach out to a significant proportion of SMEs with a weak R&D capacity in their localities. Kosetsushi centres sustain habitual interactions with client firms through 'low information gap' services solving immediate needs and lead the clients to a riskier and longer path toward innovation capacity building. This gives kosetsushi centres a position distinct from universities and consultancies in the regional innovation system. While long-term relationships between kosetsushi centres and their client firms can increase switching costs and produce lock-in effects, a case study of two kosetsushi centres illustrates the importance of 'low-information gap' services and relational assets created thereby to the modernization of SMEs with a weak internal R&D capacity. The paper calls for long-term commitment by the public sector if it addresses the issue through modernization services.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Access to external sources of technical knowledge is one of the keys to staying innovative for small and medium-sized enterprises (SMEs). The literature suggests that SMEs with a weak internal R&D capacity do not make much use of institutional sources like research institutes and universities. In this paper I investigate how trade associations can induce member SMEs to use a research institute. The case of a public research institute and SMEs in the textile industry in Kyoto, Japan is examined. Evidence from the case suggests that trade associations facilitate the use of the institute by expressing a collective `voice' to the management of the institute. The effect is evident among active members in the use of services involving a large information gap as to their benefits. I also consider a shortcoming of the collective approach and suggest some measures to be taken on the part of research institutes.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Recent studies of US industrial modernisation programmes argue that difficulties of establishing long-term relationships with users prevent them from facilitating development of innovation capabilities. The paper supports this argument through a survey of Japanese research institutes the US programmes were modelled on. In view of information asymmetries in their use, it tests the hypothesis that small and medium-sized firms start using the research institutes with ‘low information gap’ services and gradually move on to ‘high information gap’ services that often require more absorptive capacity. This is demonstrated both under one-to-one relationships and between groups of firms and a research institute.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Increasingly users are seen as the weak link in the chain, when it comes to the security of corporate information. Should the users of computer systems act in any inappropriate or insecure manner, then they may put their employers in danger of financial losses, information degradation or litigation, and themselves in danger of dismissal or prosecution. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of inappropriate behaviours, and in so doing, protecting corporate information, is through the formulation and application of a formal ‘acceptable use policy (AUP). Whilst the AUP has attracted some academic interest, it has tended to be prescriptive and overly focussed on the role of the Internet, and there is relatively little empirical material that explicitly addresses the purpose, positioning or content of real acceptable use policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and composition of a sample of authentic policies – taken from the higher education sector – rather than simply making general prescriptions about what they ought to contain. There are two important conclusions to be drawn from this study: (1) the primary role of the AUP appears to be as a mechanism for dealing with unacceptable behaviour, rather than proactively promoting desirable and effective security behaviours, and (2) the wide variation found in the coverage and positioning of the reviewed policies is unlikely to be fostering a coherent approach to security management, across the higher education sector.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Ensuring the security of corporate information, that is increasingly stored, processed and disseminated using information and communications technologies [ICTs], has become an extremely complex and challenging activity. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of security breaches, and in so doing, protecting corporate information, is through the formulation and application of a formal information security policy (InSPy). Whilst a great deal has now been written about the importance and role of the information security policy, and approaches to its formulation and dissemination, there is relatively little empirical material that explicitly addresses the structure or content of security policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and content of authentic information security policies, rather than simply making general prescriptions about what they ought to contain. Having established the structure and key features of the reviewed policies, the paper critically explores the underlying conceptualisation of information security embedded in the policies. There are two important conclusions to be drawn from this study: (1) the wide diversity of disparate policies and standards in use is unlikely to foster a coherent approach to security management; and (2) the range of specific issues explicitly covered in university policies is surprisingly low, and reflects a highly techno-centric view of information security management.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The impact of ICT (information and communications technology) on the logistics service industry is reshaping its organisation and structure. Within this process, the nature of changes resulting from ICT dissemination in small 3PLs (third party logistics providers) is still unclear, although a large number of logistics service markets, especially in the EU context, are populated by a high number of small 3PLs. In addition, there is still a gap in the literature where the role of technological capability in small 3PLs is seriously underestimated. This gives rise to the need to develop investigation in this area. The paper presents the preliminary results of a case study analysis on ICT usage in a sample of 7 small Italian 3PLs. The results highlight some of the barriers to effective ICT implementation, as well as some of the critical success factors.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent UK government initiatives aim to increase user involvement in the National Health Service (NHS) in two ways: by encouraging service users to take an active role in making decisions about their own care; and by establishing opportunities for wider public participation in service development. The purpose of this study was to examine how UK cancer service users understand and relate to the concept of user involvement. The data were collected through in-depth interviews, which were analysed for content according to the principles of grounded theory. The results highlight the role of information and communication in effective user involvement. Perhaps more importantly, this study suggests that the concept of user involvement is unclear to many cancer service users. This paper argues the need for increased awareness and understanding of what user involvement is and how it can work.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A rapid and efficient method to identify the weak points of the complex chemical structure of low band gap (LBG) polymers, designed for efficient solar cells, when submitted to light exposure is reported. This tool combines Electron Paramagnetic Resonance (EPR) using the 'spin trapping method' coupled with density functional theory modelling (DFT). First, the nature of the short life-time radicals formed during the early-stages of photo-degradation processes are determined by a spin-trapping technique. Two kinds of short life-time radical (R and R′O) are formed after 'short-duration' illumination in an inert atmosphere and in ambient air, respectively. Second, simulation allows the identification of the chemical structures of these radicals revealing the most probable photochemical process, namely homolytical scission between the Si atom of the conjugated skeleton and its pendent side-chains. Finally, DFT calculations confirm the homolytical cleavage observed by EPR, as well as the presence of a group that is highly susceptible to photooxidative attack. Therefore, the synergetic coupling of a spin trapping method with DFT calculations is shown to be a rapid and efficient method for providing unprecedented information on photochemical mechanisms. This approach will allow the design of LBG polymers without the need to trial the material within actual solar cell devices, an often long and costly screening procedure.