985 resultados para Orlando Furioso
Resumo:
The aim of this study was to determine whether spatiotemporal interactions between footballers and the ball in 1 vs. 1 sub-phases are influenced by their proximity to the goal area. Twelve participants (age 15.3 ± 0.5 years) performed as attackers and defenders in 1 vs. 1 dyads across three field positions: (a) attacking the goal, (b) in midfield, and (c) advancing away from the goal area. In each position, the dribbler was required to move beyond an immediate defender with the ball towards the opposition goal. Interactions of attacker-defender dyads were filmed with player and ball displacement trajectories digitized using manual tracking software. One-way repeated measures analysis of variance was used to examine differences in mean defender-to-ball distance after this value had stabilized. Maximum attacker-to-ball distance was also compared as a function of proximity-to-goal. Significant differences were observed for defender-to-ball distance between locations (a) and (c) at the moment when the defender-to-ball distance had stabilized (a: 1.69 ± 0.64 m; c: 1.15 ± 0.59 m; P < 0.05). Findings indicate that proximity-to-goal influenced the performance of players, particularly when attacking or advancing away from goal areas, providing implications for training design in football. In this study, the task constraints of football revealed subtly different player interactions than observed in previous studies of dyadic systems in basketball and rugby union.
Resumo:
Effective enterprise information security policy management requires review and assessment activities to ensure information security policies are aligned with business goals and objectives. As security policy management involves the elements of policy development process and the security policy as output, the context for security policy assessment requires goal-based metrics for these two elements. However, the current security management assessment methods only provide checklist types of assessment that are predefined by industry best practices and do not allow for developing specific goal-based metrics. Utilizing theories drawn from literature, this paper proposes the Enterprise Information Security Policy Assessment approach that expands on the Goal-Question-Metric (GQM) approach. The proposed assessment approach is then applied in a case scenario example to illustrate a practical application. It is shown that the proposed framework addresses the requirement for developing assessment metrics and allows for the concurrent undertaking of process-based and product-based assessment. Recommendations for further research activities include the conduct of empirical research to validate the propositions and the practical application of the proposed assessment approach in case studies to provide opportunities to introduce further enhancements to the approach.
Resumo:
Information security has been recognized as a core requirement for corporate governance that is expected to facilitate not only the management of risks, but also as a corporate enabler that supports and contributes to the sustainability of organizational operations. In implementing information security, the enterprise information security policy is the set of principles and strategies that guide the course of action for the security activities and may be represented as a brief statement that defines program goals and sets information security and risk requirements. The enterprise information security policy (alternatively referred to as security policy in this paper) that represents the meta-policy of information security is an element of corporate ICT governance and is derived from the strategic requirements for risk management and corporate governance. Consistent alignment between the security policy and the other corporate business policies and strategies has to be maintained if information security is to be implemented according to evolving business objectives. This alignment may be facilitated by managing security policy alongside other corporate business policies within the strategic management cycle. There are however limitations in current approaches for developing and managing the security policy to facilitate consistent strategic alignment. This paper proposes a conceptual framework for security policy management by presenting propositions to positively affect security policy alignment with business policies and prescribing a security policy management approach that expounds on the propositions.
Resumo:
Crowdsourcing has become a popular approach for capitalizing on the potential of large and open crowds of people external to the organization. While crowdsourcing as a phenomenon is studied in a variety of fields, research mostly focuses on isolated aspects and little is known about the integrated design of crowdsourcing efforts. We introduce a socio-technical systems perspective on crowdsourcing, which provides a deeper understanding of the components and relationships in crowdsourcing systems. By considering the function of crowdsourcing systems within their organizational context, we develop a typology of four distinct system archetypes. We analyze the characteristics of each type and derive a number of design requirements for the respective system components. The paper lays a foundation for IS-based crowdsourcing research, channels related academic work, and helps guiding the study and design of crowdsourcing information systems.
Resumo:
Research on Enterprise Resource Planning (ERP) Systems is becoming a well-established research theme in Information Systems (IS) research. Enterprise Resource Planning Systems, given its unique differentiations with other IS applications, have provided an interesting backdrop to test and re-test some of the key and fundamental concepts in IS. While some researchers have tested well-established concepts of technology acceptance, system usage and system success in the context of ERP Systems, others have researched how new paradigms like cloud computing and social media integrate with ERP Systems. Moreover, ERP Systems provided the context for cross disciplinary research such as knowledge management, project management and business process management research. Almost after two-decades since its inception in IS research, this paper provides a critique of 198 papers published on ERP Systems since 2006-2012. We observe patterns on ES research, provide comparisons to past studies and provide future research directions.
Multi-level knowledge transfer in software development outsourcing projects : the agency theory view
Resumo:
In recent years, software development outsourcing has become even more complex. Outsourcing partner have begun‘re- outsourcing’ components of their projects to other outsourcing companies to minimize cost and gain efficiencies, creating a multi-level hierarchy of outsourcing. This research in progress paper presents preliminary findings of a study designed to understand knowledge transfer effectiveness of multi-level software development outsourcing projects. We conceptualize the SD-outsourcing entities using the Agency Theory. This study conceptualizes, operationalises and validates the concept of Knowledge Transfer as a three-phase multidimensional formative index of 1) Domain knowledge, 2) Communication behaviors, and 3) Clarity of requirements. Data analysis identified substantial, significant differences between the Principal and the Agent on two of the three constructs. Using Agency Theory, supported by preliminary findings, the paper also provides prescriptive guidelines of reducing the friction between the Principal and the Agent in multi-level software outsourcing.
Resumo:
The role of Information and Communications Technology (ICT) has been identified as an important factor by the United Nations in achieving the millennium development goals (UNAPCICT, 2012)1. The potential for ICT has been identified as a means to reducing poverty, creating global communities by providing access to the internet and mobile networks to rural communities, improving education services, medical services, and information availability. As of today, significant amounts of funds have been invested by the governments and donor organizations in ‘Information and Communication Technologies for Development (ICT4D)’projects by establishing telecenters, e-villages, e-health, electronic and mobile banking, and egovernment systems for citizens in general, and more specifically, rural communities to bridge the digital divide (Heeks & Molla, 2009).
Resumo:
The influence of different instructional constraints on movement organisation and performance outcomes of the penalty kick (PK) was investigated according to participant age. Sixty penalty takers and twelve goalkeepers from two age groups (under 15 and under 17) performed 300 PKs under five different task conditions, including: no explicit instructional constraints provided (Control); instructional constraints on immobility (IMMOBILE) and mobility (MOBILE) of goalkeepers; and, use of keeper-dependent (DEP) and independent (INDEP) strategies by penalty takers. Every trial was video recorded and digitised using motion analysis techniques. Dependent variables (DVs) were: movement speed of penalty takers and the angles between the goalkeeper's position and the goal line (i.e., diving angle), and between the penalty taker and a line crossing the penalty spot and the centre of the goal (i.e., run up angle). Instructions significantly influenced the way that goalkeepers (higher values in MOBILE relative to Control) and penalty takers (higher values in Control than in DEP) used movement speed during performance, as well as the goalkeepers' movements and diving angle (less pronounced dives in the MOBILE condition compared with INDEP). Results showed how different instructions constrained participant movements during performance, although players' performance efficacy remained constant, reflecting their adaptive variability.
Resumo:
Occupational stress research has consistently demonstrated many negative effects of work stressors on employee adjustment (i.e., job-related attitudes and health). Considerable literature also describes potential moderators of this relationship. While research has revealed that leader vision can have significant positive effects on employee adjustment it has neglected investigation of its potential stress buffering effects. Based on leadership and identification theories, it was predicted that stress buffering effects of leader vision would be more evident for distal versus proximal leaders and also when the distal or proximal leader vision was congruent with the employee adjustment outcome type (distal versus proximal). Predictions were tested with an employee sample from one large public sector organization (N = 519). Hierarchical multiple regression analyses revealed that main and moderated effects relating to leader vision supported the notion that occupational stress would be reduced when there was congruence of distal and proximal leader vision and distal and proximal outcome types. However, stress buffering effects were found for high and low perceivers of leader vision that were not in line with hypotheses posing questions for the definitions of distal and proximal identifications. Findings are discussed in terms of theoretical and practical implications.
Resumo:
Work design operates as the system of arrangements and procedures for organizing work to achieve organizational goals. These systems are commonly established in periods of environmental and organizational stability and formulated to achieve efficiencies in resources, employee and team configuration. However, organizations charged with responding to disasters need to be prepared to respond to unexpected events on a large scale, and disaster response planning needs to accommodate a broad range of possible disasters. When the disaster state occurs, enactment of the specific organizational response is devolved to group or individual level managers. While this enactment presents a range of risks, it also provides a potential avenue for innovation. Employees ultimately are the foundation of change and innovation, as it is people who develop, respond, change and implement new ideas. This study analyzes motivational characteristics of work design at an Australian humanitarian organization encompassing normal operations and periods of disaster activation. The study will identify the paradox of dual work designs and the implications for organizational innovation.
Resumo:
We support Shane and Venkataraman’s (2000) basic idea of an “entrepreneurship nexus” where characteristics of the actor as well as those of the “opportunity” they work on influence action and outcomes in the creation of new economic activities. However, a review of the literature reveals that very little progress has been made on the core issues pertaining to the nexus idea. We argue that this is rooted in fundamental and insurmountable problems with the “opportunity” construct itself. As an alternative, we suggest the admittedly subjective notion of New Venture Idea as a more workable alternative. We provide a comprehensive definition and explanation of this construct, and take steps towards improved conceptualization and operationalization of its subdimensions. With some further work on these conceptualizations and operationalizations it should be possible to implement a comprehensive research program that can finally deliver on the promise outlined by Shane and Venkataraman (2000).
Resumo:
While entrepreneurship research has taken firm formation to be the predominant mode of opportunity exploitation, entrepreneurship can take place through many other types of organizational arrangements. In the present article, we consider one such alternative arrangement, namely the formation of inter-organizational projects (IOPs). We propose a multi-level contingency model that suggests that uncertainty both at the level of the firm and at the level of the environment makes the exploitation of opportunities through IOPs more likely. The model is tested by telephone survey data collected amongst a panel of 1725 SMEs and longitudinal industry data. Our findings provide strong support for the industry-level part of the model, but interestingly, only partial support for the firm level part of the model. This indicates that the effects of uncertainty need to be dissected into different levels of analysis to understand the conditions under which alternative modes of opportunity exploitation can be a prominent entrepreneurial alternative to new firm formation.
Resumo:
In this paper, we investigate the ways HRM systems support development of intellectual capital in teams in three case studies of knowledge-intensive firms (KIFs) in Denmark. By focusing on team composition and structure, findings build on the rapidly growing body of literature on HRM’s role in supporting intellectual capital development. Specifically, we make a theoretical contribution to this literature by identifying three distinct ways KIFs develop intellectual capital: 1) through HRM development systems that build relationship-centric team-based intellectual capital by targeting development of social capital; 2) through HRM employee relations systems that build human-centric team based intellectual capital by targeting human capital; 3) through a balanced approach to HRM that builds polycentric team-based intellectual capital through focusing on all aspects of intellectual capital. The findings also have managerial implications regarding the need to align team composition and structure, HRM systems, and intellectual capital focus to support development of team-based intellectual capital.