950 resultados para Strategy information
Resumo:
One of UNESCO’s overarching goals is to build inclusive knowledge societies by harnessing information and communication technologies to maintain, increase and diffuse knowledge in the fields of education, the sciences, culture, and communication and information, including through open access. Open Access (OA) is the provision of free access to peer-reviewed, scholarly, research information (both scientific papers and research data) to all. It envisages that the rights-holder grants worldwide irrevocable right of access to copy, use, distribute, transmit, and make derivative works in any format for any lawful activities with proper attribution to the original author. Through Open Access, researchers and students from around the world gain increased access to knowledge, publications have greater visibility and readership, and the potential impact of research is heightened.
Resumo:
Local Government Authorities (LGAs) are mainly characterised as information-intensive organisations. To satisfy their information requirements, effective information sharing within and among LGAs is necessary. Nevertheless, the dilemma of Inter-Organisational Information Sharing (IOIS) has been regarded as an inevitable issue for the public sector. Despite a decade of active research and practice, the field lacks a comprehensive framework to examine the factors influencing Electronic Information Sharing (EIS) among LGAs. The research presented in this paper contributes towards resolving this problem by developing a conceptual framework of factors influencing EIS in Government-to-Government (G2G) collaboration. By presenting this model, we attempt to clarify that EIS in LGAs is affected by a combination of environmental, organisational, business process, and technological factors and that it should not be scrutinised merely from a technical perspective. To validate the conceptual rationale, multiple case study based research strategy was selected. From an analysis of the empirical data from two case organisations, this paper exemplifies the importance (i.e. prioritisation) of these factors in influencing EIS by utilising the Analytical Hierarchy Process (AHP) technique. The intent herein is to offer LGA decision-makers with a systematic decision-making process in realising the importance (i.e. from most important to least important) of EIS influential factors. This systematic process will also assist LGA decision-makers in better interpreting EIS and its underlying problems. The research reported herein should be of interest to both academics and practitioners who are involved in IOIS, in general, and collaborative e-Government, in particular. © 2013 Elsevier Ltd. All rights reserved.
Resumo:
The aim of this paper is to explore the management of information in an aerospace manufacturer's supply chain by analysing supply chain disruption risks. The social network perspective will be used to examine the flows of information in the supply chain. The examination of information flows will also be explored in terms of push and pull information management. The supply chain risk management (SCRM) strategy is to assess the management of information that allows companies to gather information which will allow them to mitigate that risk before any disruption to the supply chain occurs. There is a shortage of models in analysing the supply chain risk associated with information flows, possibly due to the omission of appropriate modelling techniques in this area (Tang and Nurmaya, 2011). This paper uses an exploratory case study consisting of a multi method qualitative approach using fifteen interviews and four focus groups.
Resumo:
The enterprise management (EM) approach provides a holistic view of organizations and their related information systems. In order to align information technology (IT) innovation with global markets and volatile virtualization, traditional firms are seeking to reconstruct their enterprise structures alongside repositioning strategy and establish new information system (IS) architectures to transform from single autonomous entities into more open enterprises supported by new Enterprise Resource Planning (ERP) systems. This chapter shows how ERP engage-abilities cater to three distinctive EM patterns and resultant strategies. The purpose is to examine the presumptions and importance of combing ERP and inter-firm relations relying on the virtual value chain concept. From a review of the literature on ERP development and enterprise strategy, exploratory inductive research studies in Zoomlion and Lanye have been conducted. In addition, the authors propose a dynamic conceptual framework to demonstrate the adoption and governance of ERP in the three enterprise management forms and points to a new architectural type (ERPIII) for operating in the virtual enterprise paradigm.
Resumo:
This paper focuses on the move from buyer dominance toward interdependence between buyers and suppliers in a distribution channel. The paper introduces a case study collected through in-depth interviews and participative observations. It examines the relationships between a timber supplier and its customers in the builders' merchants sector. We stress the relevance of considering actions intended to change the power balance, rather than focusing only on trust. The power balance in a dyadic relationship is dynamic, and power positions need to be constantly re-evaluated. An important power resource is information asymmetry, manifested in the supplier's information about: products, regional and local demand, and the usage of the products. For practitioners, we highlight the possibility of exerting a non-coercive power resource, such as information asymmetry, in order to increase the relative power. Furthermore, being open about the power position between a buyer and a seller can foster a more efficient collaboration.
Resumo:
A szerzők tanulmányukban az információbiztonság egy merőben új, minőségi változást hozó találmányával, a kvantumkulcscserével (QKD-vel – quantum key distribution) foglalkoznak. Céljuk az, hogy az újdonságra mint informatikai biztonsági termékre tekintsenek, és megvizsgálják a bevezetéséről szóló vállalati döntés során felmerülő érveket, ellenérveket. Munkájuk egyaránt műszaki és üzleti szemléletű. Előbb elkülönítik a kvantumkulcscsere hagyományos eljárásokkal szembeni használatának motiváló tényezőit, és megállapítják, milyen körülmények között szükséges a napi működésben alkalmazni. Ezt követően a forgalomban is kapható QKD-termékek tulajdonságait és gyártóit szemügyre véve megfogalmazzák a termék széles körű elterjedésének korlátait. Végül a kvantumkulcscsere-termék bevezetéséről szóló vállalati döntéshozás különböző aspektusait tekintik át. Információbiztonsági és üzleti szempontból összehasonlítják az új, valamint a hagyományosan használt kulcscsereeszközöket. Javaslatot tesznek a védendő információ értékének becslésére, amely a használatbavétel költség-haszon elemzését támaszthatja alá. Ebből levezetve megállapítják, hogy mely szervezetek alkotják a QKD lehetséges célcsoportját. Utolsó lépésként pedig arra keresik a választ, melyik időpont lehet ideális a termék bevezetésére. _____ This study aims to illuminate Quantum Key Distribution (QKD), a new invention that has the potential to bring sweeping changes to information security. The authors’ goal is to present QKD as a product in the field of IT security, and to examine several pro and con arguments regarding the installation of this product. Their work demonstrates both the technical and the business perspectives of applying QKD. First they identify motivational factors of using Quantum Key Distribution over traditional methods. Then the authors assess under which circumstances QKD could be necessary to be used in daily business. Furthermore, to evaluate the limitations of its broad spread, they introduce the vendors and explore the properties of their commercially available QKD products. Bearing all this in mind, they come out with numerous factors that can influence corporate decision making regarding the installation of QKD. The authors compare the traditional and the new tools of key distribution from an IT security and business perspective. They also take efforts to estimate the value of the pieces of information to be protected. This could be useful for a subsequent cost–benefit analysis. Their findings try to provide support for determining the target audience of QKD in the IT security market. Finally the authors attempt to find an ideal moment for an organization to invest in Quantum Key Distribution.
Innovációs kalandozások az elmélettől a stratégiáig = Innovation adventuring from theory to strategy
Resumo:
A cikk célja, hogy közelebb vigye az olvasót az innováció és az innovációmenedzsment kérdésköréhez. A tanulmány az innováció témakörének feldolgozását a vállalatelméleti alapoktól kezdi, majd konkrét stratégiai megfontolásokig jut el a cikk végére. A tanulmány széles körű hazai és nemzetközi szakirodalom alapján tárja fel az innováció vállalatelméleti gyökereit. A felhasznált irodalom nem ragad meg elméleti szinten, hiszen a tanulmány lefordítja ezeket az elméleti koncepciókat valós, gyakorlatorientált üzleti nyelvre. Célja, hogy a nagyvilágban szétszórt elméleteket letisztítsa, és a modern kori menedzsmentelvekkel szintetizálja. A cikk az innovációt a vállalati értékteremtés szemszögéből vizsgálja. Megállapítja, hogy az innováció számos vállalatelmélet tanait integrálja egybe, aminek következtében a stratégiai implikációk is széles spektrumon mozoghatnak. Ahogy az innováció változást indukál a szervezetben, úgy bukkannak fel komplex optimalizálási dilemmák, amelyek a turbulens gazdasági környezetben, a rövidülő reakcióidők miatt, egyre nagyobb kihívást okoznak a menedzserek számára. A cikk ezeket a dilemmákat mutatja be vitaindító attitűddel, valamint az elmélet és a gyakorlat szintetizálásával. ____ The aim of the article is to bring the reader closer to the topic of innovation management through several company theories and strategic implications. This study is based on a wide range of international literature which is interpreted in a practice oriented way. This article is summarizing the sporadic information on innovation as well as makes an effort on synthesizing this knowledge. The aspect of observation is mainly based on corporate value creation. As innovation causes changes into the organization company leaders have to face complex economic optimization questions. These management dilemmas are not easy to solve in this turbulent business environment. This article tries to highlight these strategic level issues around innovation management by synthesizing theoretical knowledge with business implications.
Resumo:
The ultimate intent of this dissertation was to broaden and strengthen our understanding of IT implementation by emphasizing research efforts on the dynamic nature of the implementation process. More specifically, efforts were directed toward opening the "black box" and providing the story that explains how and why contextual conditions and implementation tactics interact to produce project outcomes. In pursuit of this objective, the dissertation was aimed at theory building and adopted a case study methodology combining qualitative and quantitative evidence. Precisely, it examined the implementation process, use and consequences of three clinical information systems at Jackson Memorial Hospital, a large tertiary care teaching hospital.^ As a preliminary step toward the development of a more realistic model of system implementation, the study proposes a new set of research propositions reflecting the dynamic nature of the implementation process.^ Findings clearly reveal that successful implementation projects are likely to be those where key actors envision end goals, anticipate challenges ahead, and recognize the presence of and seize opportunities. It was also found that IT implementation is characterized by the systems theory of equifinality, that is, there are likely several equally effective ways to achieve a given end goal. The selection of a particular implementation strategy appears to be a rational process where actions and decisions are largely influenced by the degree to which key actors recognize the mediating role of each tactic and are motivated to action. The nature of the implementation process is also characterized by the concept of "duality of structure," that is, context and actions mutually influence each other. Another key finding suggests that there is no underlying program that regulates the process of change and moves it form one given point toward a subsequent and already prefigured end. For this reason, the implementation process cannot be thought of as a series of activities performed in a sequential manner such as conceived in stage models. Finally, it was found that IT implementation is punctuated by a certain indeterminacy. Results suggest that only when substantial efforts are focused on what to look for and think about, it is less likely that unfavorable and undesirable consequences will occur. ^
Resumo:
The Accounting Information System (AIS) is an important course in the Department of Accounting (DoAc) of universities in Taiwan. This course is required for seniors not only because it meets the needs of the profession, but also because it provides continual study for the department's students.^ The scores of The National College and University Joint Entrance Examination (NUEE) show that students with high learning ability are admitted to public universities with high scores, while those with low learning ability are admitted only to private universities. The same situation has been found by the researcher while teaching an AIS course in DoAc of The Public Chun Shin University (CSU) and The Private Chinese Culture University (CCU).^ The purpose of this study was to determine whether low ability students enrolled in private universities in Taiwan in a mastery learning program could attain the same level as high ability students from public universities enrolled in a traditional program. An experimental design was used. The mastery learning method was used to teach three groups of seniors with low learning ability studying in the DoAc at CCU. The traditional method was used to teach the control group which consisted of senior students of DoAc of CSU with high learning ability. As a part of the mastery learning strategy, a formative test, quizzes, and homework were completed by the experimental group only, while the mid-term examination was completed by both groups as part of the course. The dependent variable was the summative test, the final examination. It was completed by both groups upon the course's completion.^ As predicted, there were significant differences between the two groups' results on the pretest. There were no significant differences between the two groups' results on the posttest. These findings support the hypothesis of the study and reveal the effectiveness of mastery learning strategies with low learning ability students. ^
Resumo:
This research investigated the effectiveness and efficiency of structured writing as compared to traditional nonstructured writing as a teaching and learning strategy in a training session for teachers.^ Structured writing is a method of identifying, interrelating, sequencing, and graphically displaying information on fields of a page or computer. It is an alternative for improving training and educational outcomes by providing an effective and efficient documentation methodology.^ The problem focuses upon the contradiction between: (a) the supportive research and theory to modify traditional methods of written documents and information presentation and (b) the existing paradigm to continue with traditional communication methods.^ A MANOVA was used to determine significant difference between a control and an experimental group in a posttest only experimental design. The experimental group received the treatment of structured writing materials during a training session. Two variables were analyzed. They were: (a) effectiveness; correct items on a posttest, and (b) efficiency; time spent on test.^ The quantitative data showed a difference for the experimental group on the two dependent variables. The experimental group completed the posttest in 2 minutes less time while scoring 1.5 more items correct. An interview with the training facilitators revealed that the structured writing materials were "user friendly." ^
Resumo:
The complexity of many organizational tasks requires perspectives, expertise, and talents that are often not found in a single individual. Organizations have therefore been placing employees into groups, assigning them to tasks they would formally have undertaken individually. The use of these groups, known as workgroups, has become an important strategy for managing this increased complexity. Empirical research on participative budgeting however has been limited almost exclusively to individuals. This dissertation empirically examines the effect of the information that management and workgroups have about group members' performance capabilities, on the work standards that workgroups select during the participative budgeting process. ^ A laboratory experiment was conducted in which two hundred and forty undergraduate business students were randomly assigned to three-member groups. The study provides empirical evidence which suggests that when management is unaware of group members' performance capabilities, workgroups select higher work standards and have higher performance levels than when management is aware of their performance capabilities. ^
Resumo:
The purpose of this phenomenological study was to describe how Colombian adult English language learners (ELL) select and use language learning strategies (LLS). This study used Oxford’s (1990a) taxonomy for LLS as its theoretical framework. Semi-structured interviews and a focus group interview, were conducted, transcribed, and analyzed for 12 Colombian adult ELL. A communicative activity known as strip story (Gibson, 1975) was used to elicit participants’ use of LLS. This activity preceded the focus group session. Additionally, participants’ reflective journals were collected and analyzed. Data were analyzed using inductive, deductive, and comparative analyses. Four themes emerged from the inductive analysis of the data: (a) learning conditions, (b) problem-solving resources, (c) information processing, and (d) target language practice. Oxford’s classification of LLS was used as a guide in deductively analyzing data concerning the participants’ experiences. The deductive analysis revealed that participants do not use certain strategies included in Oxford’s taxonomy at the third level. For example, semantic mapping, or physical response or sensation was not reported by participants. The findings from the inductive and deductive analyses were then compared to look for patterns and answers to the research questions. The comparative analysis revealed that participants used additional LLS that are not included in Oxford’s taxonomy. Some examples of these strategies are: using sound transcription in native language and help from children. The study was conducted at the MDC InterAmerican campus in South Florida, one of the largest Hispanic-influenced communities in the U.S. Based on the findings from this study, the researcher proposed a framework to study LLS that includes both external (i.e., learning context, community) and internal (i.e., culture, prior education) factors that influence the selection and use of LLS. The findings from this study imply that given the importance of the both external and internal factors in learners’ use of LLS, these factors should be considered for inclusion in any study of language learner strategies use by adult learners. Implications for teaching and learning as well as recommendations for further research are provided.
Resumo:
In his dialogue - Near Term Computer Management Strategy For Hospitality Managers and Computer System Vendors - by William O'Brien, Associate Professor, School of Hospitality Management at Florida International University, Associate Professor O’Brien initially states: “The computer revolution has only just begun. Rapid improvement in hardware will continue into the foreseeable future; over the last five years it has set the stage for more significant improvements in software technology still to come. John Naisbitt's information electronics economy¹ based on the creation and distribution of information has already arrived and as computer devices improve, hospitality managers will increasingly do at least a portion of their work with software tools.” At the time of this writing Assistant Professor O’Brien will have you know, contrary to what some people might think, the computer revolution is not over, it’s just beginning; it’s just an embryo. Computer technology will only continue to develop and expand, says O’Brien with citation. “A complacent few of us who feel “we have survived the computer revolution” will miss opportunities as a new wave of technology moves through the hospitality industry,” says ‘Professor O’Brien. “Both managers who buy technology and vendors who sell it can profit from strategy based on understanding the wave of technological innovation,” is his informed opinion. Property managers who embrace rather than eschew innovation, in this case computer technology, will benefit greatly from this new science in hospitality management, O’Brien says. “The manager who is not alert to or misunderstands the nature of this wave of innovation will be the constant victim of technology,” he advises. On the vendor side of the equation, O’Brien observes, “Computer-wise hospitality managers want systems which are easier and more profitable to operate. Some view their own industry as being somewhat behind the times… They plan to pay significantly less for better computer devices. Their high expectations are fed by vendor marketing efforts…” he says. O’Brien warns against taking a gamble on a risky computer system by falling victim to un-substantiated claims and pie-in-the-sky promises. He recommends affiliating with turn-key vendors who provide hardware, software, and training, or soliciting the help of large mainstream vendors such as IBM, NCR, or Apple. Many experts agree that the computer revolution has merely and genuinely morphed into the software revolution, informs O’Brien; “…recognizing that a computer is nothing but a box in which programs run.” Yes, some of the empirical data in this article is dated by now, but the core philosophy of advancing technology, and properties continually tapping current knowledge is sound.