820 resultados para Enterprise Educators
Resumo:
The problem of technology obsolescence in information intensive businesses (software and hardware no longer being supported and replaced by improved and different solutions) and a cost constrained market can severely increase costs and operational, and ultimately reputation risk. Although many businesses recognise technological obsolescence, the pervasive nature of technology often means they have little information to identify the risk and location of pending obsolescence and little money to apply to the solution. This paper presents a low cost structured method to identify obsolete software and the risk of their obsolescence where the structure of a business and its supporting IT resources can be captured, modelled, analysed and the risk to the business of technology obsolescence identified to enable remedial action using qualified obsolescence information. The technique is based on a structured modelling approach using enterprise architecture models and a heatmap algorithm to highlight high risk obsolescent elements. The method has been tested and applied in practice in two consulting studies carried out by Capgemini involving three UK police forces. However the generic technique could be applied to any industry based on plans to improve it using ontology framework methods. This paper contains details of enterprise architecture meta-models and related modelling.
Resumo:
Using Triad-based multinational enterprises as their empirical setting, influential scholars in international management uncovered key organizational characteristics needed to create globally integrated and locally responsive multinationals. They proposed a “modern” theory of multinationals' organization (Hedlund, 1994). But recently, a new generation of multinationals from emerging markets has appeared. Little is known about their organizational choices and some scholars even doubt that they leverage organizational capabilities altogether. Does the “modern” theory still hold in their case? This exploratory study of three emerging-market multinationals (EMNEs) discloses that for reasons related to their origin in emerging economies and to the competitive specificities of these economies, EMNEs approach the global and local conundrum in ways which are both similar – and vastly different – from recommendations of the “modern” theory. We inductively develop a new theory that accounts for the evolution of organizational capabilities in EMNEs to reconcile global integration and local responsiveness. We discuss its implications for the executives of both emerging and Triad-based multinationals.
Resumo:
During the last few years Enterprise Architecture (EA) has received increasing attention among industry and academia. By adopting EA, organisations may gain a number of benefits such as better decision making,increased revenues and cost reduction, and alignment of business and IT. However, EA adoption has been found to be difficult. In this paper a model to explain resistance during EA adoption process (REAP) is introduced and validated. The model reveals relationships between strategic level of EA, resulting organisational changes, and sources of resistance. By utilising REAP model, organisations may anticipate and prepare for the organisational change resistance during EA adoption.
Resumo:
During the last few years Enterprise Architecture has received increasing attention among industry and academia. Enterprise Architecture (EA) can be defined as (i) a formal description of the current and future state(s) of an organisation, and (ii) a managed change between these states to meet organisation’s stakeholders’ goals and to create value to the organisation. By adopting EA, organisations may gain a number of benefits such as better decision making, increased revenues and cost reductions, and alignment of business and IT. To increase the performance of public sector operations, and to improve public services and their availability, the Finnish Parliament has ratified the Act on Information Management Governance in Public Administration in 2011. The Act mandates public sector organisations to start adopting EA by 2014, including Higher Education Institutions (HEIs). Despite the benefits of EA and the Act, EA adoption level and maturity in Finnish HEIs are low. This is partly caused by the fact that EA adoption has been found to be difficult. Thus there is a need for a solution to help organisations to adopt EA successfully. This thesis follows Design Science (DS) approach to improve traditional EA adoption method in order to increase the likelihood of successful adoption. First a model is developed to explain the change resistance during EA adoption. To find out problems associated with EA adoption, an EA-pilot conducted in 2010 among 12 Finnish HEIs was analysed using the model. It was found that most of the problems were caused by misunderstood EA concepts, attitudes, and lack of skills. The traditional EA adoption method does not pay attention to these. To overcome the limitations of the traditional EA adoption method, an improved EA Adoption Method (EAAM) is introduced. By following EAAM, organisations may increase the likelihood of successful EA adoption. EAAM helps in acquiring the mandate for EA adoption from top-management, which has been found to be crucial to success. It also helps in supporting individual and organisational learning, which has also found to be essential in successful adoption.
Resumo:
This paper argues that the problems commonly associated with the joint enterprise doctrine might be alleviated by supplementing the cognitive mens rea standard of foresight with a volitional element that looks to how the defendant related to the foreseen risk. A re-examination of the case law suggests that a mens rea conception of foresight plus endorsement might be within interpretative reach. The paper considers possible objections to such a development but ultimately rejects them. It concludes that it is not necessary to wait for Parliament to put in place reforms: joint enterprise is a creature of the common law, and the common law is able to tame it unaided.
Resumo:
This paper empirically tests the effectiveness of information and communications technology (ICT) knowledge transfer and adoption in the multinational enterprise (MNE) as an issue of critical importance to contemporary MNE functioning. In contrast to mainstream thinking on absorptive capacity, but in line with prevailing international business theory, our research supports the proposition that perceptions of procedural justice, rather than absorptive capacity, determine effectiveness, especially in cases of high tacit knowledge transfers. Data was collected from senior ICT representatives in 86 Canadian subsidiaries of foreign owned MNEs. Each of these subsidiaries recently experienced a significant ICT transfer imposed by the parent organization. Support was found for the main propositions: Procedural justice significantly predicted successful ICT transfer and adoption, while absorptive capacity was not significant. These findings are consistent even when knowledge tacitness was high. The perceived success of the ICT transfer as well as its adoption varied widely across these firms. The potential reasons for this divergence in effectiveness are manifold, but our findings suggest that in situations of substantial knowledge tacitness, a higher level of procedural justice, rather than a higher level of absorptive capacity, is critical to effective transfer and adoption.
Resumo:
This paper introduces a pragmatic and practical method for requirements modeling. The method is built using the concepts of our goal sketching technique together with techniques from an enterprise architecture modeling language. Our claim is that our method will help project managers who want to establish early control of their projects and will also give managers confidence in the scope of their project. In particular we propose the inclusion of assumptions as first class entities in the ArchiMate enterprise architecture modeling language and an extension of the ArchiMate Motivation Model principle to allow radical as well as normative analyses. We demonstrate the usefulness of this method using a simple university library system as an example.
Resumo:
The aim of this study was to evaluate work ability among college educators before and after an intervention at the workplace. An administrative restructuring in the workplace started to be implemented in 2005. The work ability index (WAI) was administered to 154 educators before the restructure in 2004 and to 60 educators following the restructure in 2006. A mest comparing the WAI score of the 60 educators who took part in both phases showed a trend of improving work ability (p = 0.06; mean WAI in 2004 was 41.7 and 43.3 in 2006). The results suggest that the intervention led to an improvement in psychosocial factors, which in turn positively influenced work ability. (c) 2008 Elsevier Ltd. All rights reserved.
Resumo:
Security administrators face the challenge of designing, deploying and maintaining a variety of configuration files related to security systems, especially in large-scale networks. These files have heterogeneous syntaxes and follow differing semantic concepts. Nevertheless, they are interdependent due to security services having to cooperate and their configuration to be consistent with each other, so that global security policies are completely and correctly enforced. To tackle this problem, our approach supports a comfortable definition of an abstract high-level security policy and provides an automated derivation of the desired configuration files. It is an extension of policy-based management and policy hierarchies, combining model-based management (MBM) with system modularization. MBM employs an object-oriented model of the managed system to obtain the details needed for automated policy refinement. The modularization into abstract subsystems (ASs) segment the system-and the model-into units which more closely encapsulate related system components and provide focused abstract views. As a result, scalability is achieved and even comprehensive IT systems can be modelled in a unified manner. The associated tool MoBaSeC (Model-Based-Service-Configuration) supports interactive graphical modelling, automated model analysis and policy refinement with the derivation of configuration files. We describe the MBM and AS approaches, outline the tool functions and exemplify their applications and results obtained. Copyright (C) 2010 John Wiley & Sons, Ltd.
Resumo:
The inclusion of the history of science in science curricula-and specially, in the curricula of science teachers-is a trend that has been followed in several countries. The reasons advanced for the study of the history of science are manifold. This paper presents a case study in the history of chemistry, on the early developments of John Dalton`s atomic theory. Based on the case study, several questions that are worth discussing in educational contexts are pointed out. It is argued that the kind of history of science that was made in the first decades of the twentieth century (encyclopaedic, continuist, essentially anachronistic) is not appropriate for the development of the competences that are expected from the students of sciences in the present. Science teaching for current days will benefit from the approach that may be termed the ""new historiography of science"".
Resumo:
Architectural description languages (ADLs) are used to specify high-level, compositional view of a software application. ADLs usually come equipped with a rigourous state-transition style semantics, facilitating specification and analysis of distributed and event-based systems. However, enterprise system architectures built upon newer middleware (implementations of Java’s EJB specification, or Microsoft’s COM+/ .NET) require additional expressive power from an ADL. The TrustME ADL is designed to meet this need. In this paper, we describe several aspects of TrustME that facilitate specification and anlysis of middleware-based architectures for the enterprise.