903 resultados para Business networks
Resumo:
Telematic tools are very important for our lives in the present era and moreover this idea is made more evident if we analyse young people behaviours. However, it seems that the possibilities that these tools allow subjects from a professional point of view, beyond the purely playful aspects, are still not fully exploited both by subjects, neither by educational institutions where they learn. Our work studies the uses of social media in the context of university students. In order to this we have designed a research based on quantitative methodology with a survey. We have applied a questionnaire to students in the University of Murcia. The questionnaire was answered by 487 students in the first half of 2014. The survey results confirm our hypothesis that social networks are part of the basic and habitual tools of communication between the youth of our university and eminently used for leisure purposes, and that the tools used for more academic activities are those allowing greater control of privacy.
Resumo:
The development of the Internet and in particular of social networks has supposedly given a new view to the different aspects that surround human behavior. It includes those associated with addictions, but specifically the ones that have to do with technologies. Following a correlational descriptive design we present the results of a study, which involved university students from Social and Legal Sciences as participants, about their addiction to the Internet and in particular to social networks. The sample was conformed of 373 participants from the cities of Granada, Sevilla, Málaga, and Córdoba. To gather the data a questionnaire that was design by Young was translated to Spanish. The main research objective was to determine if university students could be considered social network addicts. The most prominent result was that the participants don’t consider themselves to be addicted to the Internet or to social networks; in particular women reflected a major distance from the social networks. It’s important to know that the results differ from those found in the literature review, which opens the question, are the participants in a phase of denial towards the addiction?
Resumo:
The business angel market is usually identified as a local market, and the proximity of an investment has been shown to be key in the angel's investment preferences and an important filter at the screening stage of the investment decision. This is generally explained by the personal and localized networks used to identify potential investments, the hands-on involvement of the investor and the desire to minimize risk. However, a significant minority of investments are long distance. This paper is based on data from 373 investments made by 109 UK business angels. We classify the location of investments into three groups: local investments ( those made within the same county or in adjacent counties); intermediate investments ( those made in counties adjacent to the 'local' counties); and long-distance investments ( those made beyond this range). Using ordered logit analysis the paper develops and tests a number of hypotheses that relate long-distance investment to investment characteristics and investor characteristics. The paper concludes by drawing out the implications for entrepreneurs seeking business angel finance in investment-deficient regions, business angel networks seeking to match investors to entrepreneurs and firms ( which are normally their primary clients), and for policy-makers responsible for local and regional economic development.
Resumo:
MNCs have been conceptualized as differentiated networks that, in turn, are embedded in external networks. Previous research has predominantly focused on the embeddedness of established subsidiaries into their local environment, omitting to shed light on the phenomenon of headquarters linkages to the local context which creates embeddedness overlap. We develop a model of why MNCs develop overlapping linkages to local subsidiary networks even if the subsidiaries have grown out of the initial start-up phase. Using detailed information on 168 European subsidiaries, we find that MNCs build and maintain more overlapping network ties when subsidiaries are high performers, hold important resources, operate in turbulent environments, and are closely connected to multinational actors as opposed to purely domestic firms.
Resumo:
This paper explores a novel perspective on patient safety improvements, which draws on
contemporary social network and learning theories. A case study was conducted at a Portuguese
acute university hospital. Data collection followed a staged approach, whereby 46 interviews
were conducted involving 49 respondents from a broad array of departments and professional
backgrounds. This case study highlights the importance of two major interlinked factors in
contributing to patient safety improvements. The first of these is the crucial role of formal and
informal, internal and external social networks. The second is the importance and the possible
advantage of combining formal and informal learning. The analysis suggests that initiatives
rooted in formal learning approaches alone do not necessarily lead to the creation of long-term
grounded internal safety networks, and that patient safety improvements can crucially depend on
bottom-up initiatives of communities of practice and informal learning. Traditional research on
patient safety places a strong emphasis on top-down and managerialist approaches and is often
based on the assumption that „safety? learning is primarily formal and context-independent. This
paper suggests that bottom-up initiatives and a combination of formal and informal learning can
make a major contribute to patient safety improvements.
Resumo:
Within the management literature, there is an emergent discourse on horizontal collaboration among small and medium-sized enterprises (SMEs), whereby individual rivalries are overcome by the need for more resources and innovation, leading to increased competitiveness through joint product development. In particular, a number of these horizontal collaborations between SMEs have occurred within the agri-food sector. As a consequence, this article aims to explore the longitudinal development of horizontal innovation networks within an artisan bakers’ network as part of the UK SME agri-food sector. An interpretivist research approach was used, whereby the development and evolution of an artisan bakers’ horizontal network was studied over a 27-month period. The findings, as summarised in conceptual models which draw upon knowledge-based open innovation and social network constructs, illustrate that a complex three-stage life cycle development occurred within the bakers’ horizontal network.
Resumo:
Regional policy frameworks need to focus on strengthening the ICT infrastructure, clarifying market rules to build user confidence, developing networks, facilitating ICT-enabled clustering and infrastructure sharing.
Resumo:
We consider a multi-market framework where a set of firms compete on two oligopolistic markets. The cost of production of each firm allows for spillovers across markets, ensuring that output decisions for both markets have to be made jointly. Prior to competing in these markets, firms can establish links gathering business intelligence about other firms. A link formed by a firm generates two types of externalities for competitors and consumers. We characterize the business intelligence equilibrium networks and networks that maximize social welfare. By contrast with single market competition, we show that in multi-market competition there exist situations where intelligence gathering activities are underdeveloped with regard to social welfare and should be tolerated, if not encouraged, by public authorities.
Resumo:
The expectations of citizens from the Information Technologies (ITs) are increasing as the ITs have become integral part of our society, serving all kinds of activities whether professional, leisure, safety-critical applications or business. Hence, the limitations of the traditional network designs to provide innovative and enhanced services and applications motivated a consensus to integrate all services over packet switching infrastructures, using the Internet Protocol, so as to leverage flexible control and economical benefits in the Next Generation Networks (NGNs). However, the Internet is not capable of treating services differently while each service has its own requirements (e.g., Quality of Service - QoS). Therefore, the need for more evolved forms of communications has driven to radical changes of architectural and layering designs which demand appropriate solutions for service admission and network resources control. This Thesis addresses QoS and network control issues, aiming to improve overall control performance in current and future networks which classify services into classes. The Thesis is divided into three parts. In the first part, we propose two resource over-reservation algorithms, a Class-based bandwidth Over-Reservation (COR) and an Enhanced COR (ECOR). The over-reservation means reserving more bandwidth than a Class of Service (CoS) needs, so the QoS reservation signalling rate is reduced. COR and ECOR allow for dynamically defining over-reservation parameters for CoSs based on network interfaces resource conditions; they aim to reduce QoS signalling and related overhead without incurring CoS starvation or waste of bandwidth. ECOR differs from COR by allowing for optimizing control overhead minimization. Further, we propose a centralized control mechanism called Advanced Centralization Architecture (ACA), that uses a single state-full Control Decision Point (CDP) which maintains a good view of its underlying network topology and the related links resource statistics on real-time basis to control the overall network. It is very important to mention that, in this Thesis, we use multicast trees as the basis for session transport, not only for group communication purposes, but mainly to pin packets of a session mapped to a tree to follow the desired tree. Our simulation results prove a drastic reduction of QoS control signalling and the related overhead without QoS violation or waste of resources. Besides, we provide a generic-purpose analytical model to assess the impact of various parameters (e.g., link capacity, session dynamics, etc.) that generally challenge resource overprovisioning control. In the second part of this Thesis, we propose a decentralization control mechanism called Advanced Class-based resource OverpRovisioning (ACOR), that aims to achieve better scalability than the ACA approach. ACOR enables multiple CDPs, distributed at network edge, to cooperate and exchange appropriate control data (e.g., trees and bandwidth usage information) such that each CDP is able to maintain a good knowledge of the network topology and the related links resource statistics on real-time basis. From scalability perspective, ACOR cooperation is selective, meaning that control information is exchanged dynamically among only the CDPs which are concerned (correlated). Moreover, the synchronization is carried out through our proposed concept of Virtual Over-Provisioned Resource (VOPR), which is a share of over-reservations of each interface to each tree that uses the interface. Thus, each CDP can process several session requests over a tree without requiring synchronization between the correlated CDPs as long as the VOPR of the tree is not exhausted. Analytical and simulation results demonstrate that aggregate over-reservation control in decentralized scenarios keep low signalling without QoS violations or waste of resources. We also introduced a control signalling protocol called ACOR Protocol (ACOR-P) to support the centralization and decentralization designs in this Thesis. Further, we propose an Extended ACOR (E-ACOR) which aggregates the VOPR of all trees that originate at the same CDP, and more session requests can be processed without synchronization when compared with ACOR. In addition, E-ACOR introduces a mechanism to efficiently track network congestion information to prevent unnecessary synchronization during congestion time when VOPRs would exhaust upon every session request. The performance evaluation through analytical and simulation results proves the superiority of E-ACOR in minimizing overall control signalling overhead while keeping all advantages of ACOR, that is, without incurring QoS violations or waste of resources. The last part of this Thesis includes the Survivable ACOR (SACOR) proposal to support stable operations of the QoS and network control mechanisms in case of failures and recoveries (e.g., of links and nodes). The performance results show flexible survivability characterized by fast convergence time and differentiation of traffic re-routing under efficient resource utilization i.e. without wasting bandwidth. In summary, the QoS and architectural control mechanisms proposed in this Thesis provide efficient and scalable support for network control key sub-systems (e.g., QoS and resource control, traffic engineering, multicasting, etc.), and thus allow for optimizing network overall control performance.
Resumo:
An innovation network can be considered as a complex adaptive system with evolution affected by dynamic environments. This paper establishes a multi-agent-based evolution model of innovation networks under dynamic settings through computational and logical modeling, and a multi-agent system paradigm. This evolution model is composed of several sub-models of agents' knowledge production by independent innovations in dynamic situations, knowledge learning by cooperative innovations covering agents' heterogeneities, decision-making for innovation selections, and knowledge update considering decay factors. On the basis of above-mentioned sub-models, an evolution rule for multi-agent based innovation network system is given. The proposed evolution model can be utilized to simulate and analyze different scenarios of innovation networks in various dynamic environments and support decision-making for innovation network optimization.
Resumo:
The advantages of networking are widely known in many areas (from business to personal ones). One particular area where networks have also proved their benefits is education. Taking the secondary school education level into account, some successful cases can be found in literature. In this paper we describe a particular remote lab network supporting physical experiments accessible to students of institutions geographically separated. The network architecture and application examples of using some of the available remote experiments are illustrated in detail.
Resumo:
A Work Project, presented as part of the requirements for the Award of a Masters Degree in Management from the NOVA – School of Business and Economics
Resumo:
The present study explores relationships between project marketers and their customers in project marketing context. The purpose of the study is to increase the understanding on supplier’s position in project marketing networks. Project marketing is representing a high volume in the international business, and the industrial network approach and the project marketing research cannot fully explain a supplier’s position in project marketing networks. Increased knowledge on project networks can also contribute to industrial marketing research more generally. Data for the present study was collected firstly during the pilot case study from project buyers in the paper and the steel industry in interviews. Secondly an entire project marketing case concerning a steel industry case was used as a data source. The data included interviews, correspondence between the supplier and the buyer, and project documents. The data of the pilot case was analysed with contents analysis, and in the case a deeper analysis based on the developed Stage Dimension framework was used. Supplier’s position in project marketing networks is a hierarchical and dynamic concept including a supplier’s position on the highest level. The dimensions of the position concept are the intermediate level, and the dimensions are based on the underlying components. Supplier’s position is composed from four organization related dimensions, and two individual actor related dimensions. The composition of the supplier’s position varies during the project marketing process, and consequently the relative importance of the dimensions is changing over the process. Supplier’s position in project marketing networks is shaped by incremental and radical changes. Radical changes are initiated by critical events. The study contributes to the research of industrial networks and project marketing. The theoretical contribution of the study is threefold: firstly it proposes a structure of the position concept in project marketing networks, secondly it proposes the Position Stage Dimension Component (PSDC) model for the development of supplier’s position during the project marketing process, and thirdly the study widens the critical event concept to cover the project marketing process both on the organizational and individual level. In addition to the theoretical contributions there are several managerial implications for planning and implementing marketing strategies in the project context.
Resumo:
Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.