845 resultados para outsourcing (make or buy)
Resumo:
The development of the Internet has made it possible to transfer data ‘around the globe at the click of a mouse’. Especially fresh business models such as cloud computing, the newest driver to illustrate the speed and breadth of the online environment, allow this data to be processed across national borders on a routine basis. A number of factors cause the Internet to blur the lines between public and private space: Firstly, globalization and the outsourcing of economic actors entrain an ever-growing exchange of personal data. Secondly, the security pressure in the name of the legitimate fight against terrorism opens the access to a significant amount of data for an increasing number of public authorities.And finally,the tools of the digital society accompany everyone at each stage of life by leaving permanent individual and borderless traces in both space and time. Therefore, calls from both the public and private sectors for an international legal framework for privacy and data protection have become louder. Companies such as Google and Facebook have also come under continuous pressure from governments and citizens to reform the use of data. Thus, Google was not alone in calling for the creation of ‘global privacystandards’. Efforts are underway to review established privacy foundation documents. There are similar efforts to look at standards in global approaches to privacy and data protection. The last remarkable steps were the Montreux Declaration, in which the privacycommissioners appealed to the United Nations ‘to prepare a binding legal instrument which clearly sets out in detail the rights to data protection and privacy as enforceable human rights’. This appeal was repeated in 2008 at the 30thinternational conference held in Strasbourg, at the 31stconference 2009 in Madrid and in 2010 at the 32ndconference in Jerusalem. In a globalized world, free data flow has become an everyday need. Thus, the aim of global harmonization should be that it doesn’t make any difference for data users or data subjects whether data processing takes place in one or in several countries. Concern has been expressed that data users might seek to avoid privacy controls by moving their operations to countries which have lower standards in their privacy laws or no such laws at all. To control that risk, some countries have implemented special controls into their domestic law. Again, such controls may interfere with the need for free international data flow. A formula has to be found to make sure that privacy at the international level does not prejudice this principle.
Resumo:
This paper develops a process model of how and why complementarity and substitution form over time between contractual and relational governance in the context of information systems outsourcing. Our analysis identifies four distinct process patterns that explain this formation as the outcome of interaction processes between key elements of both contractual and relational governance. These patterns unveil the dynamic nature of complementarity and substitution. In particular, we show that the relationship between contractual and relational governance oscillates between complementarity and substitution. Those oscillations are triggered mainly by three types of contextual events (goal fuzziness, goal conflict, and goal misalignment). Surprisingly, substitution of informal control did not occur as an immediate reaction to external events but emerged as a consequence of preceding complementarity. Thus, our study challenges the prevailing view of an either/or dichotomy of complementarity and substitution by showing that they are causally connected over time.
Resumo:
Objective: past research has shown relationship problems associated with narcissists’ excessive self-centeredness and lacking concern for others. Using romantic relationships as opportunities to self-enhance rather than caring about intimacy, narcissists are sensitive to shortcomings in their partners and quick to withdraw investment once relationships turn out to be less than perfect. Our research aimed to reveal whether narcissists are aware of their destructive relationship behavior or tend to put the blame for a failed relationship on their ex-partners. Conversely, do ex-partners of narcissists take the blame and feel responsible for the breakup or walk away convinced their narcissistic ex-partners’ behavior was just too unbearable? Method: 120 participants (19-59 yrs) who reported a recent romantic breakup completed a battery of questionnaires online, including measures of narcissism and self-esteem, as well as newly created scales assessing attributions for breakup. In addition to self-reports, participants retrospectively rated their ex-partners on adapted versions of the same measures. Results: narcissists made attributions to lacking relationship investment mostly in themselves and to a lesser extent in their partners. However, this pattern was reversed when self-esteem was controlled, with attributions to partner shortcomings outnumbering aspects of own destructive behavior. Narcissism perceived in the ex-partner was related to reports of lacking investment in oneself as well as the ex-partner, but controlling for self-esteem reduced the number of attributions to own shortcomings. Conclusion: our analyses revealed that narcissists do show some awareness of their contribution to a failed relationship, although controlling for self-esteem increased their blame of the ex-partner. In contrast, associations between perceived partner-narcissism and aspects of own lacking relationship investment became fewer when self-esteem was controlled for.
Explaining Emergence and Consequences of Specific Formal Controls in IS Outsourcing – A Process-View
Resumo:
IS outsourcing projects often fail to achieve project goals. To inhibit this failure, managers need to design formal controls that are tailored to the specific contextual demands. However, the dynamic and uncertain nature of IS outsourcing projects makes the design of such specific formal controls at the outset of a project challenging. Hence, the process of translating high-level project goals into specific formal controls becomes crucial for success or failure of IS outsourcing projects. Based on a comparative case study of four IS outsourcing projects, our study enhances current understanding of such translation processes and their consequences by developing a process model that explains the success or failure to achieve high-level project goals as an outcome of two unique translation patterns. This novel process-based explanation for how and why IS outsourcing projects succeed or fail has important implications for control theory and IS project escalation literature.
Resumo:
BACKGROUND The purpose of patient information leaflets (PILs) is to inform patients about the administration, precautions and potential side effects of their prescribed medication. Despite European Commission guidelines aiming at increasing readability and comprehension of PILs little is known about the potential risk information has on patients. This article explores patients' reactions and subsequent behavior towards risk information conveyed in PILs of commonly prescribed drugs by general practitioners (GPs) for the treatment of Type 2 diabetes, hypertension or hypercholesterolemia; the most frequent cause for consultations in family practices in Germany. METHODS We conducted six focus groups comprising 35 patients which were recruited in GP practices. Transcripts were read and coded for themes; categories were created by abstracting data and further refined into a coding framework. RESULTS Three interrelated categories are presented: (i) The vast amount of side effects and drug interactions commonly described in PILs provoke various emotional reactions in patients which (ii) lead to specific patient behavior of which (iii) consulting the GP for assistance is among the most common. Findings show that current description of potential risk information caused feelings of fear and anxiety in the reader resulting in undesirable behavioral reactions. CONCLUSIONS Future PILs need to convey potential risk information in a language that is less frightening while retaining the information content required to make informed decisions about the prescribed medication. Thus, during the production process greater emphasis needs to be placed on testing the degree of emotional arousal provoked in patients when reading risk information to allow them to undertake a benefit-risk-assessment of their medication that is based on rational rather than emotional (fearful) reactions.
Resumo:
Abstract Within the field of neuroscientific research on second language learning, considerable attention has been devoted to functional and recently also structural changes related to second language acquisition. The present literature review summarizes studies that investigated structural changes related to bilingualism. Furthermore, as recent evidence has suggested that native-like exposure to a second language (i.e., a naturalistic learning setting or immersion) considerably impacts second language learning, all findings are reflected with respect to the learning environment. Aggregating the existing evidence, we conclude that structural changes in left inferior frontal and inferior parietal regions have been observed in studies on cortical gray matter changes, while the anterior parts of the corpus callosum have been repeatedly found to reflect bilingualism in studies on white matter (WM) connectivity. Regarding the learning environment, no cortical alterations can be attributed specifically to naturalistic or classroom learning. With regard to WM changes, one might tentatively propose that changes in IFOF and SLF are possibly more prominently observed in studies investigating bilinguals with a naturalistic learning experience. However, future studies are needed to replicate and strengthen the existing evidence and to directly test the impact of naturalistic exposure on structural brain plasticity.
Resumo:
Despite over 30 years of research, the molecular mechanisms of nonsense-mediated mRNA decay (NMD) are still not well understood. NMD appears to exist in most eukaryotes and is intensively studied in S. cerevisiae, C. elegans, D. melanogaster and in mammalian cells. Current evidence suggests that the core of NMD – involving UPF1, UPF2 and UPF3 – is evolutionarily conserved, but that different species may have evolved slightly different ways to identify target mRNAs for NMD and to degrade them. Our lab has shown that the exon junction complex (EJC) is not absolutely required for NMD in human cells (Bühler et al., NSMB 2006) and that it is neither restricted to CBP80-bound mRNAs as classical models claim (Rufener & Mühlemann, NSMB 2013). Together with the finding that long 3’ UTRs often are an NMD-inducing feature (Eberle et al, PLoS Biol 2008; Yepiskoposyan et al., RNA 2011), our data is consistent with much of the data from other species and hence has led to a “unified” working model for NMD (Stalder & Mühlemann, Trends Cell Biol 2008; Schweingruber et al., Biochim Biophys Acta 2013). Our recent iCLIP experiments with endogenous UPF1 indicate that UPF1 binds mRNAs indiscriminately with respect to being an NMD target or not before they engage with ribosomes (Zünd et al., NSMB 2013). After onset of translation, UPF1 is cleared from the coding region but remains bound to the 3’ UTR of mRNAs. Why this 3’ UTR-associated in some cases induces NMD and in others not is currently being investigated and not yet understood. Following assembly of a phospho-UPF1-containing NMD complex, decay adaptors (SMG5, SMG7, PNRC2) and/or the endonuclease SMG6 are recruited. While the latter cleaves the mRNA in the vicinity of the termination codon, the former proteins induce deadenylation, decapping and exonucleolytic degradation of the mRNA. In my talk, I will give an overview about the latest developments in NMD – with a focus on our own work – and try to integrate the bits and pieces into a somewhat coherent working model.
Resumo:
Knowledge processes are critical to outsourced software projects. According to outsourcing research, outsourced software projects succeed if they manage to integrate the client’s business knowledge and the vendor’s technical knowledge. In this paper, we submit that this view may not be wrong, but incomplete in a significant part of outsourced software work, which is software maintenance. Data from six software-maintenance outsourcing transitions indicate that more important than business or technical knowledge can be application knowledge, which vendor engineers acquire over time during practice. Application knowledge was the dominant knowledge during knowledge transfer activities and its acquisition enabled vendor staff to solve maintenance tasks. We discuss implications for widespread assumptions in outsourcing research.
Resumo:
“Large-scale acquisition of land by foreign investors” is the correct term for a process where the verdict of guilt is often quicker than the examination. But is there something really new about land grab except in its extent? In comparison with colonial and post-colonial plantation operations, should foreign investors today behave differently? We generally accept coffee and banana exports as pro-growth and pro-development, just as for cars, beef and insurance. What then is wrong with an investment contract allowing the holder to buy a farm and to export wheat to Saudi Arabia, or soybeans and maize as cattle feed to Korea, or to plant and process sugar cane and palm oil into ethanol for Europe and China? Assuming their land acquisition was legal, should foreigners respect more than investment contracts and national legislation? And why would they not take advantage of the legal protection offered by international investment law and treaties, not to speak of concessional finance, infrastructure and technical cooperation by a development bank, or the tax holidays offered by the host state? Remember Milton Friedman’s often-quoted quip: “The business of business is business!” And why would the governments signing those contracts not know whether and which foreign investment projects are best for their country, and how to attract them? This chapter tries to show that land grab, where it occurs, is not only yet another symptom of regulatory failures at the national level and a lack of corporate social responsibility by certain private actors. National governance is clearly the most important factor. Nonetheless, I submit that there is an international dimension involving investor home states in various capacities. The implication is that land grab is not solely a question whether a particular investment contract is legal or not. This chapter deals with legal issues which seem to have largely escaped the attention of both human rights lawyers and, especially, of investment lawyers. I address this fragmentation between different legal disciplines, rules, and policies, by asking two basic questions: (i) Do governments and parliaments in investor home countries have any responsibility in respect of the behaviour of their investors abroad? (ii) What should they and international regulators do, if anything?
Resumo:
At first sight, experimenting and modeling form two distinct modes of scientific inquiry. This spurs philosophical debates about how the distinction should be drawn (e.g. Morgan 2005, Winsberg 2009, Parker 2009). But much scientific practice casts serious doubts on the idea that the distinction makes much sense. There are two worries. First, the practices of modeling and experimenting are often intertwined in intricate ways because much modeling involves experimenting, and the interpretation of many experiments relies upon models. Second, there are borderline cases that seem to blur the distinction between experiment and model (if there is any). My talk tries to defend the philosophical project of distinguishing models from experiment and to advance the related philosophical debate. I begin with providing a minimalist framework of conceptualizing experimenting and modeling and their mutual relationships. The methods are conceptualized as different types of activities that are characterized by a primary goal, respectively. The minimalist framwork, which should be uncontroversial, suffices to accommodate the first worry. I address the second worry by suggesting several ways how to conceptualize the distinction in a more flexible way. I make a concrete suggestion of how the distinction may be drawn. I use examples from the history of science to argue my case. The talk concentrates and models and experiments, but I will comment on simulations too.
Resumo:
Introduction: The prevalence of ADHD among patients with substance use disorder (SUD) is substantial. This study addressed the following research questions: Are early developmental, temperamental and educational problems overrepresented among SUD patients with ADHD compared to SUD patients without ADHD? Do this comorbid group receive early help for their ADHD, and are there signs of self-medicating with illicit central stimulants? Method: An international, multi-centre cross-sectional study was carried out involving seven European countries, with 1205 patients in treatment for SUD. The mean age was 40 years and 27% of the sample was female. All par- ticipants were interviewed with the Mini International Neuropsychiatric Interview Plus and the Conners' Adult ADHD Diagnostic Interview for DSM-IV. Results: SUD patients with ADHD (n = 196; 16.3% of the total sample) had a significantly slower infant develop- ment than SUD patients without ADHD (n = 1,009; 83.4%), had greater problems controlling their temperament, and had lower educational attainment. Only 24 (12%) of the current ADHD positive patients had been diagnosed and treated during childhood and/or adolescence. Finally, SUD patients with ADHD were more likely to have central stimulants or cannabis as their primary substance of abuse, whereas alcohol use was more likely to be the primary substance of abuse in SUD patients without ADHD. Conclusion: The results emphasize the importance of early identification of ADHD and targeted interventions in the health and school system, as well as in the addiction field.
Resumo:
Human capital and members of the creative class are bearers of economic growth, yet little is known about exactly what the relevant factors are for the concentration of the highly skilled in a specific place. Tolerance for example is supposed to make the difference between creative and human capital. But does tolerance really make a difference for anybody? And what about other factors: Are they specifically relevant for creative individuals or simply valid for the whole population? This study contributes to the discussion on the highly skilled by investigating whether tolerance, taxes, or other regional amenities contribute to their concentration and dynamics. The results show that tolerance in particular toward immigrants, but also toward same-sex partnerships, is a rather dynamic concept, differs largely between and within functional urban regions, and makes a difference regarding the highly skilled.
Resumo:
This book attempts to synthesize research that contributes to a better understanding of how to reach sustainable business value through information systems (IS) outsourcing. Important topics in this realm are how IS outsourcing can contribute to innovation, how it can be dynamically governed, how to cope with its increasing complexity through multi-vendor arrangements, how service quality standards can be met, how corporate social responsibility can be upheld, and how to cope with increasing demands of internationalization and new sourcing models, such as crowdsourcing and platform-based cooperation. These issues are viewed from either the client or vendor perspective, or both. The book should be of interest to all academics and students in the fields of Information Systems, Management, and Organization as well as corporate executives and professionals who seek a more profound analysis and understanding of the underlying factors and mechanisms of outsourcing.
Resumo:
This book attempts to synthesize research that contributes to a better understanding of how to reach sustainable business value through information systems (IS) outsourcing. Important topics in this realm are how IS outsourcing can contribute to innovation, how it can be dynamically governed, how to cope with its increasing complexity through multi-vendor arrangements, how service quality standards can be met, how corporate social responsibility can be upheld and how to cope with increasing demands of internationalization and new sourcing models, such as crowdsourcing and platform-based cooperation. These issues are viewed from either the client or vendor perspective, or both. The book should be of interest to all academics and students in the fields of Information Systems, Management and Organization as well as corporate executives and professionals who seek a more profound analysis and understanding of the underlying factors and mechanisms of outsourcing.
Resumo:
This chapter aims to overcome the gap existing between case study research, which typically provides qualitative and process-based insights, and national or global inventories that typically offer spatially explicit and quantitative analysis of broader patterns, and thus to present adequate evidence for policymaking regarding large-scale land acquisitions. Therefore, the chapter links spatial patterns of land acquisitions to underlying implementation processes of land allocation. Methodologically linking the described patterns and processes proved difficult, but we have identified indicators that could be added to inventories and monitoring systems to make linkage possible. Combining complementary approaches in this way may help to determine where policy space exists for more sustainable governance of land acquisitions, both geographically and with regard to processes of agrarian transitions. Our spatial analysis revealed two general patterns: (i) relatively large forestry-related acquisitions that target forested landscapes and often interfere with semi-subsistence farming systems; and (ii) smaller agriculture-related acquisitions that often target existing cropland and also interfere with semi-subsistence systems. Furthermore, our meta-analysis of land acquisition implementation processes shows that authoritarian, top-down processes dominate. Initially, the demands of powerful regional and domestic investors tend to override socio-ecological variables, local actors’ interests, and land governance mechanisms. As available land grows scarce, however, and local actors gain experience dealing with land acquisitions, it appears that land investments begin to fail or give way to more inclusive, bottom-up investment models.