988 resultados para strategic interactions
Resumo:
The purpose of this paper is to provide some insights about P2M, and more specifically, to develop some thoughts about Project Management seen as a Mirror, a place for reflection…, between the Mission of organisation and its actual creation of Values (with s: a source of value for people, organisations and society). This place is the realm of complexity, of interactions between multiple variables, each of them having a specific time horizon and occupying a specific place, playing a specific role. Before developing this paper I would like to borrow to my colleague and friend, Professor Ohara, the following, part of a paper going to be presented at IPMA World Congress, in New Delhi later this year in November 2005. “P2M is the Japanese version of project & program management, which is the first standard guide for education and certification developed in 2001. A specific finding of P2M is characterized by “mission driven management of projects” or a program which harness complexity of problem solving observed in the interface between technical system and business model.” (Ohara, 2005, IPMA Conference, New Delhi) “The term of “mission” is a key word in the field of corporate strategy, where it expresses raison d’être or “value of business”. It is more specifically used for expressing “the client needs” in terms of a strategic business unit. The concept of mission is deemed to be a useful tool to share essential content of value and needs in message for complex project.” (Ohara, 2005, IPMA Conference, New Delhi) “Mission is considered as a significant “metamodel representation” by several reasons. First, it represents multiple values for aspiration. The central objective of mission initiative is profiling of ideality in the future from reality, which all stakeholders are glad to accept and share. Second, it shall be within a stretch of efforts, and not beyond or outside of the realization. Though it looks like unique, it has to depict a solid foundation. The pragmatic sense of equilibrium between innovation and adaptation is required for the mission. Third, it shall imply a rough sketch for solution to critical issues for problems in reality.” (Ohara, 2005, IPMA Conference, New Delhi) “Project modeling” idea has been introduced in P2M program management. A package of three project models of “scheme”, “system” and “service” are given as a reference type program. (Ohara, 2005, IPMA Conference, New Delhi) If these quotes apply to P2M, they are fully congruent with the results of the research undertaken and the resulting meta-model & meta-method developed by the CIMAP, ESC Lille Research Centre in Project & Program Management, since the 80’s. The paper starts by questioning the common Project Management (PM) paradigm. Then discussing the concept of Project, it argues that an alternative epistemological position should be taken to capture Page 2 / 11 the very nature of the PM field. Based on this, a development about “the need of modelling to understand” is proposed grounded on two theoretical roots. This leads to the conclusion that, in order to enables this modelling, a standard approach is necessary, but should be understood under the perspective of the Theory of Convention in order to facilitate a situational and contextual application.
Resumo:
This book is an empirical study of strategic management practices in the construction industry. It examines the dynamic capabilities paradigm within the context of the Indonesian construction industry. The characteristics of asset-capability combinations were found to be significant determinants of the competitive advantage of the Indonesian construction enterprises, and that such advantage sequentially contributes to organizational performance. In doing so, this study fills an important gap in the empirical literature and reinforces the dynamic capabilities framework’s recognition as a rigorous theory of strategic management. As the dynamic capabilities framework can work in the context of Indonesia, it suggests that the framework has potential applicability in other emerging and developing countries
Resumo:
Transnational Organised Crime (TOC) has become a focal point for a range of private and public stakeholders. While not a new phenomenon, the rapid expansion of TOC activities and interests, its increasingly complex structures and ability to maximise opportunity by employing new technologies at a rate impossible for law enforcement to match complicates law enforcement’s ability to develop strategies to detect, disrupt, prevent and investigate them. In an age where the role of police has morphed from simplistic response and enforcement activities to one of managing human security risk, it is argued that intelligence can be used to reduce the impact of strategic surprise from evolving criminal threats and environmental change. This review specifically focuses on research that has implications for strategic intelligence and strategy setting in a TOC context. The review findings suggest that current law enforcement intelligence literature focuses narrowly on the management concept of intelligence-led policing in a tactical, operational setting. As such the review identifies central issues surrounding strategic intelligence and highlights key questions that future research agendas must address to improve strategic intelligence outcomes, particularly in the fight against TOC.
Resumo:
In an age where the role of police has morphed from simplistic response and enforcement activities to one of managing human security risk, it is argued that intelligence can be used to reduce the impact of strategic surprise from evolving criminal threats and environmental change. This review specifically focusses on research that has implications for strategic intelligence in law enforcement. The review findings highlight the absence of detailed research of law enforcement strategic intelligence. Findings suggest that current law enforcement intelligence literature focuses narrowly on the management concept of intelligence-led policing in a tactical, operational setting. As a result there is little theory on how to improve strategic intelligence outcomes. This is despite the fact that intelligence –led policing is envisaged as a management tool to guide strategic decision making. the review identifies central issues surrounding strategic intelligence and highlights key questions that future research agendas must address to improve strategic intelligence outcomes
Resumo:
This article reviews four bodies of research that shed light on how to promote active care for the environment in children and youth: research on sources of proenvironmental behavior, socialization for democratic skills and values, the development of a personal sense of competence, and the development of collective competence. The article begins with an overview of studies of formative childhood experiences reported by environmental activists and educators, followed by correlational and experimental studies with young people regarding factors associated with their taking action for the environment. Because behaviors with the largest potential benefits for the environment require political engagement, the article also reviews experiences associated with young people’s interest and engagement in public issues. Action for the environment in the home or in public arena like schools and communities requires a personal sense of competence and a sense of collective competence, or confidence in one’s ability to achieve goals by working with a group. Therefore experiences that promote the development of these assets are summarized as well. The conclusion compares major findings in these different fields and discusses implications for environmental educators.
Resumo:
A holistic study of the composition of the basalt groundwaters of the Atherton Tablelands region in Queensland, Australia was undertaken to elucidate possible mechanisms for the evolution of these very low salinity, silica- and bicarbonate-rich groundwaters. It is proposed that aluminosilicate mineral weathering is the major contributing process to the overall composition of the basalt groundwaters. The groundwaters approach equilibrium with respect to the primary minerals with increasing pH and are mostly in equilibrium with the major secondary minerals (kaolinite and smectite), and other secondary phases such as goethite, hematite, and gibbsite, which are common accessory minerals in the Atherton basalts. The mineralogy of the basalt rocks, which has been examined using X-ray diffraction and whole rock geochemistry methods, supports the proposed model for the hydrogeochemical evolution of these groundwaters: precipitation + CO 2 (atmospheric + soil) + pyroxene + feldspars + olivine yields H 4SiO 4, HCO 3 -, Mg 2+, Na +, Ca 2+ + kaolinite and smectite clays + amorphous or crystalline silica + accessory minerals (hematite, goethite, gibbsite, carbonates, zeolites, and pyrite). The variations in the mineralogical content of these basalts also provide insights into the controls on groundwater storage and movement in this aquifer system. The fresh and weathered vesicular basalts are considered to be important in terms of zones of groundwater occurrence, while the fractures in the massive basalt are important pathways for groundwater movement.
Resumo:
Information security has been recognized as a core requirement for corporate governance that is expected to facilitate not only the management of risks, but also as a corporate enabler that supports and contributes to the sustainability of organizational operations. In implementing information security, the enterprise information security policy is the set of principles and strategies that guide the course of action for the security activities and may be represented as a brief statement that defines program goals and sets information security and risk requirements. The enterprise information security policy (alternatively referred to as security policy in this paper) that represents the meta-policy of information security is an element of corporate ICT governance and is derived from the strategic requirements for risk management and corporate governance. Consistent alignment between the security policy and the other corporate business policies and strategies has to be maintained if information security is to be implemented according to evolving business objectives. This alignment may be facilitated by managing security policy alongside other corporate business policies within the strategic management cycle. There are however limitations in current approaches for developing and managing the security policy to facilitate consistent strategic alignment. This paper proposes a conceptual framework for security policy management by presenting propositions to positively affect security policy alignment with business policies and prescribing a security policy management approach that expounds on the propositions.
Resumo:
The immune system plays an important role in defending the body against tumours and other threats. Currently, mechanisms involved in immune system interactions with tumour cells are not fully understood. Here we develop a mathematical tool that can be used in aiding to address this shortfall in understanding. This paper de- scribes a hybrid cellular automata model of the interaction between a growing tumour and cells of the innate and specific immune system including the effects of chemokines that builds on previous models of tumour-immune system interactions. In particular, the model is focused on the response of immune cells to tumour cells and how the dynamics of the tumour cells change due to the immune system of the host. We present results and predictions of in silico experiments including simulations of Kaplan-Meier survival-like curves.