860 resultados para Enterprise content management


Relevância:

40.00% 40.00%

Publicador:

Resumo:

VTT Jouni Meriluodon valtio-opin alaan kuuluva väitöskirja Systems between information and knowledge : in a memory management model of an extended enterprise tarkastettiin 21.6.2011 Helsingin yliopistossa.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Liiketoiminnan organisoiminen projekteiksi on erittäin yleistä nykyisin. Suuri osa projekteista erityisesti IT-alalla epäonnistuu kuitenkin saavuttamaan tavoitteensa. Projektin menestys on tyypillisesti mitattu budjetin, aikataulun, laadun ja sidosryhmien tyytyväisyyden perusteella. Tämän Pro Gradu -tutkielman tarkoituksena on etsiä tyypillisimpiä syitä projektien epäonnistumiseen ja löytää projektien seurannan ja mittaamisen avulla keinoja näiden epäonnistumisten ehkäisemiseen. Tutkimusmenetelmänä on laadullinen tapaustutkimus. Empiirinen aineisto on kerätty haastattelujen, eri materiaalien analysoinnin ja havainnoinnin avulla. Teoriaosuus tarjoaa kattavan yhteenvedon projektiliiketoiminnan ja yksittäisten projektien johtamiseen sekä projektien seurantaan ja mittaamiseen aikaisemman kirjallisuuden perusteella. Empiirisessä osiossa suoritetaan analyysi Case -yrityksen projektien seurantaan ja valittuihin projekteihin. Analyysien, haastattelujen ja havainnoinnin pohjalta tehdään johtopäätökset tyypillisimmistä, ongelmia projekteissa aiheuttavista tekijöistä sekä näiden esiintymisestä projektin elinkaaren eri vaiheissa. Mahdolliset ongelmia ehkäisevät keinot esitetään myös. Ehdotuksia kehityskohteiksi esitetään lopuksi teorian ja empirian pohjalta.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This thesis aims to provide insight into the social-business tensions the social enterprises face in their operation and how they manage them. The social-business tensions are examined from four theoretical perspectives using triangulation approach. The theoretical lenses chosen are organizational identity, stakeholder theory, paradox theory and institutional theory. The theories aim to clarify, how the tensions are formed, how they appear and how they are managed in social enterprises. One viewpoint of this thesis is to examine the competence of these theories in explaining the social-business tensions in practise. The qualitative data was collected by interviewing persons from the management of two social enterprises. The empirical evidence of this thesis suggests that the appearing of social-business tensions varies between the social enterprises and they can be seen both as an advantage and as a challenge. Most of the social-business tensions arise from the enterprise’s multiple incoherent objectives, their stakeholders’ various demands and the differing understanding of the company’s central operation among the members of the organization. According to this thesis, the theories of organizational identity, stakeholder, paradox and institution are all able to provide unique insight into the identification and management of the social-business tensions. However, the paradox theory turned out to be the most abstract of the theories and thus being the farthest from the practise.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Abstract 1: Social Networks such as Twitter are often used for disseminating and collecting information during natural disasters. The potential for its use in Disaster Management has been acknowledged. However, more nuanced understanding of the communications that take place on social networks are required to more effectively integrate this information into the processes within disaster management. The type and value of information shared should be assessed, determining the benefits and issues, with credibility and reliability as known concerns. Mapping the tweets in relation to the modelled stages of a disaster can be a useful evaluation for determining the benefits/drawbacks of using data from social networks, such as Twitter, in disaster management.A thematic analysis of tweets’ content, language and tone during the UK Storms and Floods 2013/14 was conducted. Manual scripting was used to determine the official sequence of events, and classify the stages of the disaster into the phases of the Disaster Management Lifecycle, to produce a timeline. Twenty- five topics discussed on Twitter emerged, and three key types of tweets, based on the language and tone, were identified. The timeline represents the events of the disaster, according to the Met Office reports, classed into B. Faulkner’s Disaster Management Lifecycle framework. Context is provided when observing the analysed tweets against the timeline. This illustrates a potential basis and benefit for mapping tweets into the Disaster Management Lifecycle phases. Comparing the number of tweets submitted in each month with the timeline, suggests users tweet more as an event heightens and persists. Furthermore, users generally express greater emotion and urgency in their tweets.This paper concludes that the thematic analysis of content on social networks, such as Twitter, can be useful in gaining additional perspectives for disaster management. It demonstrates that mapping tweets into the phases of a Disaster Management Lifecycle model can have benefits in the recovery phase, not just in the response phase, to potentially improve future policies and activities. Abstract2: The current execution of privacy policies, as a mode of communicating information to users, is unsatisfactory. Social networking sites (SNS) exemplify this issue, attracting growing concerns regarding their use of personal data and its effect on user privacy. This demonstrates the need for more informative policies. However, SNS lack the incentives required to improve policies, which is exacerbated by the difficulties of creating a policy that is both concise and compliant. Standardization addresses many of these issues, providing benefits for users and SNS, although it is only possible if policies share attributes which can be standardized. This investigation used thematic analysis and cross- document structure theory, to assess the similarity of attributes between the privacy policies (as available in August 2014), of the six most frequently visited SNS globally. Using the Jaccard similarity coefficient, two types of attribute were measured; the clauses used by SNS and the coverage of forty recommendations made by the UK Information Commissioner’s Office. Analysis showed that whilst similarity in the clauses used was low, similarity in the recommendations covered was high, indicating that SNS use different clauses, but to convey similar information. The analysis also showed that low similarity in the clauses was largely due to differences in semantics, elaboration and functionality between SNS. Therefore, this paper proposes that the policies of SNS already share attributes, indicating the feasibility of standardization and five recommendations are made to begin facilitating this, based on the findings of the investigation.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Security administrators face the challenge of designing, deploying and maintaining a variety of configuration files related to security systems, especially in large-scale networks. These files have heterogeneous syntaxes and follow differing semantic concepts. Nevertheless, they are interdependent due to security services having to cooperate and their configuration to be consistent with each other, so that global security policies are completely and correctly enforced. To tackle this problem, our approach supports a comfortable definition of an abstract high-level security policy and provides an automated derivation of the desired configuration files. It is an extension of policy-based management and policy hierarchies, combining model-based management (MBM) with system modularization. MBM employs an object-oriented model of the managed system to obtain the details needed for automated policy refinement. The modularization into abstract subsystems (ASs) segment the system-and the model-into units which more closely encapsulate related system components and provide focused abstract views. As a result, scalability is achieved and even comprehensive IT systems can be modelled in a unified manner. The associated tool MoBaSeC (Model-Based-Service-Configuration) supports interactive graphical modelling, automated model analysis and policy refinement with the derivation of configuration files. We describe the MBM and AS approaches, outline the tool functions and exemplify their applications and results obtained. Copyright (C) 2010 John Wiley & Sons, Ltd.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Existem diversos tipos de riscos que uma organização pode correr. Normalmente eles são gerenciados isoladamente em casa unidade ou divisão. Diante do cenário mais volátil da nova economia, é proposto um modelo de gerenciamento de risco que busca integrar todos os diferentes tipos de risco, chamado de Enterprise-Wide Risk Management (EWRM). O modelo organiza a gestão de riscos, sob a ótica de portfolio, interferindo na estratégia da empresa e criando valor ao acionista. O trabalho mostra a evolução dos modelos de gerenciamento de risco até o EWRM, propondo uma metodologia para sua implementação assim como os fatores chave para seu sucesso

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The aim of the work was to evaluate the productivity, leaf nutrient content and soil nutrient concentration in maize (Zea mays L.) grown in sequence with black oats (Avena strigosa Schreb.) under Leucaena diversifolia alley cropping agroforestry system (AFS) and traditional management system/sole crop (without trees-TS), after two years of cultivation following a randomized block design. The experiment was carried out in the Brazilian Association of Biodynamic Agriculture, in Botucatu—S?o Paulo, Brazil. Treatments were: control (C), chemical fertilizer application (F), biomass of L. diversifolia alley cropping application (B), biomass of L. diversifolia alley cropping + chemical fertilizer application (B + F). In the second year of management it was observed that black oat yield was higher in treatments B + F and F with significant difference in relation to the others treatments in both systems, followed by treatment B. Between systems, only treatment B showed significant difference, with higher yield value corresponding to AFS, reflecting the efficiency of AFS to promote soil fertility. Maize production presented the second year of cultivation an increasing trend in all treatments in both production systems. This result may be due to the cumulative effect of mineralization and maize straw and oats, along the experiment. How productivity was higher in the AFS system, could also be occurring effect of biological nitrogen fixation, water retention and reduction of extreme microclimate through the rows of L. diversifolia. Comparing the AFS and TS, it was observed that the concentration of N in leaf tissue was higher in the AFS treatments, probably due to nitrogen fixation performed through the rows of L. diversifolia, that is a nitrogen fixing tree species. After two years, carbon stocked in soil show higher values in the treatments biomass + fertilizer and biomass application, in both systems, AFS and TS.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Given the increasing interest in using social software for company-internal communication and collaboration, this paper examines drivers and inhibitors of micro-blogging adoption at the workplace. While nearly one in two companies is currently planning to introduce social software, there is no empirically validated research on employees’ adoption. In this paper, we build on previous focus group results and test our research model in an empirical study using Structural Equation Modeling. Based on our findings, we derive recommendations on how to foster adoption. We suggest that micro-blogging should be presented to employees as an efficient means of communication, personal brand building, and knowledge management. In order to particularly promote content contribution, privacy concerns should be eased by setting clear rules on who has access to postings and for how long they will be archived.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

BACKGROUND: We have carried out an extensive qualitative research program focused on the barriers and facilitators to successful adoption and use of various features of advanced, state-of-the-art electronic health records (EHRs) within large, academic, teaching facilities with long-standing EHR research and development programs. We have recently begun investigating smaller, community hospitals and out-patient clinics that rely on commercially-available EHRs. We sought to assess whether the current generation of commercially-available EHRs are capable of providing the clinical knowledge management features, functions, tools, and techniques required to deliver and maintain the clinical decision support (CDS) interventions required to support the recently defined "meaningful use" criteria. METHODS: We developed and fielded a 17-question survey to representatives from nine commercially available EHR vendors and four leading internally developed EHRs. The first part of the survey asked basic questions about the vendor's EHR. The second part asked specifically about the CDS-related system tools and capabilities that each vendor provides. The final section asked about clinical content. RESULTS: All of the vendors and institutions have multiple modules capable of providing clinical decision support interventions to clinicians. The majority of the systems were capable of performing almost all of the key knowledge management functions we identified. CONCLUSION: If these well-designed commercially-available systems are coupled with the other key socio-technical concepts required for safe and effective EHR implementation and use, and organizations have access to implementable clinical knowledge, we expect that the transformation of the healthcare enterprise that so many have predicted, is achievable using commercially-available, state-of-the-art EHRs.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Cloud Computing enables provisioning and distribution of highly scalable services in a reliable, on-demand and sustainable manner. However, objectives of managing enterprise distributed applications in cloud environments under Service Level Agreement (SLA) constraints lead to challenges for maintaining optimal resource control. Furthermore, conflicting objectives in management of cloud infrastructure and distributed applications might lead to violations of SLAs and inefficient use of hardware and software resources. This dissertation focusses on how SLAs can be used as an input to the cloud management system, increasing the efficiency of allocating resources, as well as that of infrastructure scaling. First, we present an extended SLA semantic model for modelling complex service-dependencies in distributed applications, and for enabling automated cloud infrastructure management operations. Second, we describe a multi-objective VM allocation algorithm for optimised resource allocation in infrastructure clouds. Third, we describe a method of discovering relations between the performance indicators of services belonging to distributed applications and then using these relations for building scaling rules that a CMS can use for automated management of VMs. Fourth, we introduce two novel VM-scaling algorithms, which optimally scale systems composed of VMs, based on given SLA performance constraints. All presented research works were implemented and tested using enterprise distributed applications.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The production of local fruit and vegetables is a rapidly expanding segment of Iowa agriculture. The new ISU AgEdS/Hort 465 class trains future growers in the management and operation of diversified horticultural enterprises on an Iowa farm situation. Management of the finances, production, and marketing is performed by the students. The course is structured as a business and is guided through decisions made by student committees (finance, operations, production, and marketing committees). Each committee investigates the feasibility of a desired enterprise before coming together to make a final decision. The course was offered for the first time in 2011.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Audit was conducted pursuant to Senate Resolution no. 102 (adopted April 21, 2005).