997 resultados para urgency service
Resumo:
The purpose of this conceptual paper is to address the lack of consistent means through which strategies are identified and discussed across theoretical perspectives in the field of business strategy. A standardised referencing system is offered to codify the means by which strategies can be identified, from which new business services and information systems may be derived. This taxonomy was developed using qualitative content analysis study of government agencies’ strategic plans. This taxonomy is useful for identifying strategy formation and determining gaps and opportunities. Managers will benefit from a more transparent strategic design process that reduces ambiguity, aids in identifying and correcting gaps in strategy formulation, and fosters enhanced strategic analysis. Key benefits to academics are the improved dialogue in strategic management field and suggest that progress in the field requires that fundamentals of strategy formulation and classification be considered more carefully. Finally, the formalization of strategy can lead to the clear identification of new business services, which inform ICT investment decisions and shared service prioritisation.
Resumo:
During the last decade, globalisation and liberalisation of financial markets, changing societal expectations and corporate governance scandals have increased the attention for the fiduciary duties of non-executive directors. In this context, recent corporate governance reform initiatives have emphasised the control task and independence of non-executive directors. However, little attention has been paid to their impact on the external and internal service tasks of non-executive directors. Therefore, this paper investigates how the service tasks of non-executive directors have evolved in the Netherlands. Data on corporate governance at the top-100 listed companies in the Netherlands between 1997 and 2005 show that the emphasis on non-executive directors' external service task has shifted to their internal service task, i.e. from non-executive directors acting as boundary spanners to non-executive directors providing advice and counselling to executive directors. This shift in board responsibilities affects non-executive directors' ability to generate network benefits through board relationships and has implications for non-executive directors' functional requirements.
Resumo:
Pre-service teacher education is a spatialized enterprise. It operates across a number of spaces that may or may not be linked ideologically and/or physically. These spaces can include daily practices, locations, infrastructure, relationships and representations of power and ideology. The interrelationships between and within these (sometimes competing) spaces for pre-service teachers will influence their identities as teachers and learners across time and space. Pre-service teachers are expected to make the connections between these often-contradictory spaces with little or no guidance on how to negotiate such complex relationships. These are difficult spaces, yet the slippages and gaps between these spaces offer generative possibilities. This paper explores these spaces of possibility for pre-service teacher education, and uses the spatial theories of Lefebvre (1991) and Foucault (1977, 1980) to argue that critical reflective practice can be used to create a ‘thirdspace’ (Soja, 1996) for reconstructing future practice.
Resumo:
Distributed Denial-of-Service (DDoS) attacks continue to be one of the most pernicious threats to the delivery of services over the Internet. Not only are DDoS attacks present in many guises, they are also continuously evolving as new vulnerabilities are exploited. Hence accurate detection of these attacks still remains a challenging problem and a necessity for ensuring high-end network security. An intrinsic challenge in addressing this problem is to effectively distinguish these Denial-of-Service attacks from similar looking Flash Events (FEs) created by legitimate clients. A considerable overlap between the general characteristics of FEs and DDoS attacks makes it difficult to precisely separate these two classes of Internet activity. In this paper we propose parameters which can be used to explicitly distinguish FEs from DDoS attacks and analyse two real-world publicly available datasets to validate our proposal. Our analysis shows that even though FEs appear very similar to DDoS attacks, there are several subtle dissimilarities which can be exploited to separate these two classes of events.