993 resultados para Christ Church (Boston, Mass.)
Resumo:
This article explores an important temporal aspect of the design of strategic alliances by focusing on the issue of time bounds specification. Time bounds specification refers to a choice on behalf of prospective alliance partners at the time of alliance formation to either pre-specify the duration of an alliance to a specific time window, or to keep the alliance open-ended (Reuer & Ariňo, 2007). For instance, Das (2006) mentions the example of the alliance between Telemundo Network and Mexican Argos Comunicacion (MAC). Announced in October 2000, this alliance entailed a joint production of 1200 hours of comedy, news, drama, reality and novella programs (Das, 2006). Conditioned on the projected date of completing the 1200 hours of programs, Telemundo Network and MAC pre-specified the time bounds of the alliance ex ante. Such time-bound alliances are said to be particularly prevalent in project-based industries, like movie production, construction, telecommunications and pharmaceuticals (Schwab & Miner, 2008). In many other instances, however, firms may choose to keep their alliances open-ended, not specifying a specific time bound at the time of alliance formation. The choice between designing open-ended alliances that are “built to last”, versus time bound alliances that are “meant to end” is important. Seminal works like Axelrod (1984), Heide & Miner (1992), and Parkhe (1993) demonstrated that the choice to place temporal bounds on a collaborative venture has important implications. More specifically, collaborations that have explicit, short term time bounds (i.e. what is termed a shorter “shadow of the future”) are more likely to experience opportunism (Axelrod, 1984), are more likely to focus on the immediate present (Bakker, Boros, Kenis & Oerlemans, 2012), and are less likely to develop trust (Parkhe, 1993) than alliances for which time bounds are kept indeterminate. These factors, in turn, have been shown to have important implications for the performance of alliances (e.g. Kale, Singh & Perlmutter, 2000). Thus, there seems to be a strong incentive for organizations to form open-ended strategic alliances. And yet, Reuer & Ariňo (2007), one of few empirical studies that details the prevalence of time-bound and open-ended strategic alliances, found that about half (47%) of the alliances in their sample were time bound, the other half were open-ended. What conditions, then, determine this choice?
Resumo:
Strategic renewal has received relatively little attention in the context of new ventures. We examine the relationship among strategic renewal, competitive advantage and performance in opportunity-driven and conservative new ventures. Based on longitudinal data of a random sample of almost 373 new ventures, the link between strategic renewal and performance can be better understood by adding the mediating role of competitive advantage. Our results indicate that increased levels of strategic renewal positively relate to competitive advantage in conservative ventures, but not in opportunity-driven ventures. These findings place a different perspective on the dominant view that entrepreneurs should be opportunity maximizers. It suggests that both conservative and opportunity-driven new ventures can be successful if they follow different paths of strategic renewal in shaping competitive advantage.
Resumo:
Professional service firms (PSFs) present HR professionals with a number of unique challenges, as they share characteristics of both service and knowledge intensive organizations. While many of these firms are relying on High Commitment Work Practices (HCWPs) to enhance critical employee behaviors such as service quality and turnover, the analysis presented in this paper raises questions about traditional understandings of commitment in professional service environments. In particular, data from three Danish financial investment PSFs suggest that employees are more committed to developing and promoting their own professions than to the organization itself, which has important implications for the way in which HCWPs are designed and utilized. In addition, the focus of HCWP research has favored the use of social exchange theory as an underpinning framework for considering the impact of HR practices on employee commitment. In the context of PSFs, we question the applicability of social exchange theory and instead draw upon the Ability-Motivation-Opportunity (AMO) framework (1982) to analyze how specific HRM practices contribute to the development of commitment, and to successful organizational outcomes in PSFs.
Resumo:
We argue that aesthetic knowledge, which is a form of tacit knowledge of beauty and related concepts, is an important, yet under-researched, topic in the study of organizational decision making processes. The significance of aesthetic knowledge for decision making processes is derived from its universal application by humans to commonplace practices; its use as the basis of decision criteria in complex situations to which the effective application of logic and reason is difficult; and its role both in assisting cognition in general and in enabling the choice of solutions generated from rational decision making processes. Despite its importance, the empirical research examining the application of aesthetic knowledge in organizational decision making processes is limited. Further detailed study of aesthetic knowledge in the context of organizational decision making processes is required to extend the recent movement in the field aimed at examining the role that extrarational, human-centered factors play in organizational decisions.
Resumo:
Theories of entrepreneurship have largely been informed by research in western contexts, and recent calls for research attention to entrepreneurship in developing countries highlight the need for accurate information about entrepreneurship in this field. In addition, some findings from such research have highlighted the critical research needs in this area (Bruton, Ahlstrom & Obloj, 2009). This paper reports early findings from one study of a longitudinal research program with entrepreneurs in an Eastern African context, in a society largely affected by colonization and a long-standing civil war. Entrepreneurs in this study are recipients of micro-credit loans as well as elementary business training. Findings from a review of microloans indicate that entrepreneurial activities are largely in the form of local entrepreneurship rather than systemic entrepreneurship (Suatet, 2011) and the benefits of business improvements achieved from micro-loans are enhanced by feelings of agency and purpose regarding future business activities. Implications for theory and practice are presented.
Resumo:
A substantial body of literature exists identifying factors contributing to under-performing Enterprise Resource Planning systems (ERPs), including poor communication, lack of executive support and user dissatisfaction (Calisir et al., 2009). Of particular interest is Momoh et al.’s (2010) recent review identifying poor data quality (DQ) as one of nine critical factors associated with ERP failure. DQ is central to ERP operating processes, ERP facilitated decision-making and inter-organizational cooperation (Batini et al., 2009). Crucial in ERP contexts is that the integrated, automated, process driven nature of ERP data flows can amplify DQ issues, compounding minor errors as they flow through the system (Haug et al., 2009; Xu et al., 2002). However, the growing appreciation of the importance of DQ in determining ERP success lacks research addressing the relationship between stakeholders’ requirements and perceptions of ERP DQ, perceived data utility and the impact of users’ treatment of data on ERP outcomes.
Resumo:
Successful organizational transformation typically requires transformed leadership; that is, fundamental changes in the implicit leadership schema that underpin observed organizational leadership practice. The purpose of this study is to elaborate leadership schema change theory by investigating a case study in which the CEO of a public infrastructure organization sought to transform traditional organizational leadership to facilitate wider organization transformation. Data were generated through focus groups and semi-structured interviews at four points over a three-year period. Our findings suggest that (a) change leader initiatives do not necessarily activate the cognitive processing required to achieve leadership schema change, (b) collective schema change, defined in terms of the system of beliefs and values underlying the new leading-managing schema did not occur, however, (c) sub-schema change did occur. The research contributes to existing literature on implicit leadership schema change in three main ways. First, we provide a schema change framework to guide current and future research on schema change. Second, we highlight the role that both change leader initiatives and individual and social processing play in schema change. Finally, we stress the role of teleological processes in leadership schema change.
Resumo:
Ghassan Hage asserts the “core element of Australia’s colonial paranoia is a fear of loss of Europeanness or Whiteness and the lifestyle and privileges that are seen to emanate directly from them. This is a combination of the fragility of White European colonial identity in general and the specificity of the Australian situation” (419). This ‘White paranoia’ can be traced through a range of popular cultural formations, including contemporary Australian children’s literature. The Children’s Book Council of Australia (CBCA) awards an annual prize for “outstanding books which have the prime intention of documenting factual material with consideration given to imaginative presentation, interpretation and variation of style” (“Awards”) published in the preceding year. Although not often included in critical debates, non-fictional texts overtly seek to shape young readers’ understandings of their national context and their own location as national subjects. Thus, the books named as winners and honours of this prize from 2001-2010 provide a snapshot of which facts and whose fictions are salient in shaping the Australian nation in the twenty-first century. Using Hage’s concept of Australian colonial paranoia, this paper considers the relationship between ‘factual material’ and ‘imaginative presentation’ in the ongoing revision and renewal of national myths in award-winning Australian non-fiction for children.
Resumo:
We advocate for the use of predictive techniques in interactive computer music systems. We suggest that the inclusion of prediction can assist in the design of proactive rather than reactive computational performance partners. We summarize the significant role prediction plays in human musical decisions, and the only modest use of prediction in interactive music systems to date. After describing how we are working toward employing predictive processes in our own metacreation software we reflect on future extensions to these approaches.
Resumo:
Although there are many approaches for developing secure programs, they are not necessarily helpful for evaluating the security of a pre-existing program. Software metrics promise an easy way of comparing the relative security of two programs or assessing the security impact of modifications to an existing one. Most studies in this area focus on high level source code but this approach fails to take compiler-specific code generation into account. In this work we describe a set of object-oriented Java bytecode security metrics which are capable of assessing the security of a compiled program from the point of view of potential information flow. These metrics can be used to compare the security of programs or assess the effect of program modifications on security using a tool which we have developed to automatically measure the security of a given Java bytecode program in terms of the accessibility of distinguished ‘classified’ attributes.
Resumo:
This volume stems from the 1st International Conference on Epithelial-Mesenchymal Transitions (EMT), which was convened by the editors on October 5–8, 2003 in the beautiful setting of Port Douglas, Queensland, Australia. EMT, the name given to the transformation of cells arranged in a coherent layer – epithelial cells – to more individualistic and potential motile cells – mesenchymal cells – was recognized decades ago by Prof. Elisabeth (Betty) Hay (Harvard Medical School, Boston, Mass., USA) as a primary mechanism in embryogenesis for remodelling tissues. More recently EMT has been seen as crucial to the spread and invasion of carcinoma, and more recently still, EMT-like changes have been detected in various pathologies marked by fi brosis. Despite the basic and clinical importance of EMT, this extremely rapidly growing fi eld had never previously had a conference devoted to it, and indeed the disciplines of developmental biology, cancer and pathology rarely interact although they have much to share. The chapters assembled for this volume encompass these three major themes of the meeting, development, pathology and cancer, and further highlight the commonality in terms of mechanisms and outcomes among them...
Ways to increase the length of single wall carbon nanotubes in a magnetically enhanced arc discharge
Resumo:
Ability to control the properties of single-wall nanotubes produced in the arc discharge is important for many practical applications. Our experiments suggest that the length and purity of single-wall nanotubes significantly increase when the magnetic field is applied to the arc discharge. A model of a single wall carbon nanotube interaction and growth in the thermal plasma was developed which considers several important effects such as anode ablation that supplies the carbon plasma in an anodic arc discharge technique, and the momentum, charge and energy transfer processes between nanotube and plasma. The numerical simulations based on Monte-Carlo technique were performed, which explain an increase of the nanotubes produced in the magnetic field - enhanced arc discharge.
Resumo:
Object detection is a fundamental task in many computer vision applications, therefore the importance of evaluating the quality of object detection is well acknowledged in this domain. This process gives insight into the capabilities of methods in handling environmental changes. In this paper, a new method for object detection is introduced that combines the Selective Search and EdgeBoxes. We tested these three methods under environmental variations. Our experiments demonstrate the outperformance of the combination method under illumination and view point variations.
Resumo:
While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take priority in many circumstances. As such the overall security and performance metrics of those cryptographic functions in their embedded context needs to be understood. Understanding those metrics has been the main aim of this research activity. This research reports on an implementation of one network security technology, Internet Protocol Security (IPSec), to assess security performance. This research simulates sensitive healthcare information being transferred over networks, and then measures data delivery times with selected security parameters for various communication scenarios on Linux-based and Windows-based systems. Based on our test results, this research has revealed a number of network security metrics that need to be considered when designing and managing network security for healthcare-specific or non-healthcare-specific systems from security, performance and manageability perspectives. This research proposes practical recommendations based on the test results for the effective selection of network security controls to achieve an appropriate balance between network security and performance
Resumo:
Anselm of Canterbury (1033–1109) was a prolific letter writer. The modern edition of his letter collection comprises more than 600 folio-size pages in print and includes 472 letters, the vast majority of which were sent by him. Our knowledge of Anselm’s letters is derived from collections of his letters, for none of his correspondence survives in its original form of individual letters. There was no one canonical version of the collection, and the extant manuscripts generally differ substantially: the largest medieval manuscript witnesses include over 400 letters, while the smallest contain only a few. We know 38 manuscript witnesses, but no authorial manuscript survives. Certain references in Anselm’s letters reveal, however, that he collected his correspondence on at least two occasions while he was still abbot of Bec, and this study proposes that a third collection was possibly made under his supervision in Christ Church. The third collection also covered Anselm’s Canterbury period. Whether the third collection was authorial or posthumous is unclear. Certain contextual evidence and references in letters would suggest that the collection was authorial. If so, the collection was probably a register book, which was started in c. 1101 at the earliest. There is no positive proof that any of the three surviving minor collections may be authorial. Each of these collections was circulating at a very early stage, however, some probably in Anselm’s lifetime. Moreover, the minor collections seem to have been put together from smaller source units, which possibly originated at Bec. The contents of these units suggest very early and possibly authorial origins: the letters are mainly from Anselm’s years as prior of Bec. The critical edition by F. S. Schmitt represents the current phase in the textual tradition of Anselm’s letter collection. This study demonstrates that the value of the edition is weakened in particular by the way in which Schmitt selected manuscripts for collation, doubtless influenced by the fact that he had not established the structure of the tradition properly. Ultimately it is impossible to undertake systematic research on the letter collection on the basis of Schmitt’s edition.