723 resultados para constructing universities as organizations
Resumo:
It is a known fact that some employees misuse the organizational computers to do their personal work such as sending emails, surfing the Internet, chatting, playing games. These activities not only waste productive time of employees but also bring a risk factor to the organization. This affects organizations in the software industry very much as almost all of their employees are connected to the Internet throughout them day./ By introducing an Acceptable Use Policy (AUP) for an organization, it is believed that the computer misuse by its employees could be reduced. In many countries Acceptable Use Policies are used and they have been studied with various perspectives. In Sri Lankan context research on these areas are scarce. This research explored the situation in Sri Lanka with respect to AUPs and their effectiveness./ A descriptive study was carried out to identify the large and medium scale software development organizations that had implemented computer usage guidelines for employees. A questionnaire was used to gather information regarding employee’s usual computer usage behavior. Stratified random sampling was employed to draw a representative sample from the population./ Majority of the organizations have not employed a written guideline on acceptable use of work computers. The study results did not provide evidence to conclude that the presence or non presence of an AUP has a significant difference in computer use behaviors of employees. A significant negative correlation was observed between level of awareness about AUP and misuse. Access to the Internet and organizational settings were identified as significant factors that influence employee computer misuse behavior.
Resumo:
Purpose– The purpose of this paper is to shed new light on the link between diversity in project teams and team performance by examining the effects of players’ international career diversity on the performance of national football teams. Design/methodology/approach– The paper draws upon the literature on project organizations and experiential diversity in teams. Using data on players’ international career backgrounds and team performance from the FIFA World Cup 2006, the authors test two hypotheses linking experiential diversity in teams and a measure of relative team performance. The dataset includes detailed individual background profiles of the 736 participating players and performance data from the 64 games played at the tournament. Findings– The findings suggest that different types of experiential diversity have contrasting effects on team performance in a time‐limited project team setting. Research limitations/implications– These findings encourage team diversity researchers to further examine the impact of experiential diversity in teams on team process and performance outcomes in future research. Practical implications– The findings particularly highlight the need to carefully manage experiential diversity in project team settings in order to benefit from access to diverse tacit resources, while at the same time avoiding that the integrative capacities of teams becoming overstretched. Originality/value– The paper is a step towards a better understanding of how diversity of individual career backgrounds affects team performance outcomes in project teams.
Resumo:
Purpose This paper aims to fill the research and knowledge gap in knowledge management studies in Ghana. Knowledge acquisition is one of the unexploited areas in knowledge management literature, especially in the Ghanaian context. This study tries to ascertain the factors affecting knowledge acquisition in Ghanaian universities. Design/methodology/approach The study used the quantitative approach. The cross-sectional survey was adopted as the research design. A questionnaire consisting of Likert scale questions was used to collect data from the respondents. The items and the constructs were derived from the extant literature. The questionnaire was sent to 350 respondents, out of which 250 were returned fully completed. Data were quantitatively analysed using descriptive methods and factor analysis. Findings This study provides empirical evidence about the factors affecting knowledge acquisition in Ghanaian universities. Findings from the study show that programme content, lecturers’ competence, student academic background and attitude and facilities for teaching and learning influence knowledge acquisition in Ghanaian universities. Research limitations/implications Although the study seeks to generalize the findings, this should be cautiously done, as some scholars have advocated for large sample size. Nonetheless, there are some studies that have used sample size less than the one used in this study. Practical implications The study takes notice of the need for Ghanaian universities to use modern facilities and infrastructures such as electronic libraries and information technology equipment and also provide reading rooms to enhance teaching and learning. Originality/value Studies looking at knowledge acquisition in Ghanaian universities are virtually non-existent, and this study provides empirical findings on the factors affecting knowledge acquisition in Ghanaian universities.
Resumo:
The 2008-2009 financial crisis and related organizational and economic failures have meant that financial organizations are faced with a ‘tsunami’ of new regulatory obligations. This environment provides new managerial challenges as organizations are forced to engage in complex and costly remediation projects with short deadlines. Drawing from a longitudinal study conducted with nine financial institutions over twelve years, this paper identifies nine IS capabilities which underpin activities for managing regulatory themed governance, risk and compliance efforts. The research shows that many firms are now focused on meeting the Regulators’ deadlines at the expense of developing a strategic, enterprise-wide connected approach to compliance. Consequently, executives are in danger of implementing siloed compliance solutions within business functions. By evaluating the maturity of their IS capabilities which underpin regulatory adherence, managers have an opportunity to develop robust operational architectures and so are better positioned to face the challenges derived from shifting regulatory landscapes.
Resumo:
The use of social network sites (SNS) has become very valuable to educational institutions. Some universities have formally integrated these social media in their educational systems and are using them to improve their service delivery. The main aim of this study was to establish whether African universities have embraced this emerging technology by having official presence on SNS. A purposive sampling method was used to study 24 universities from which data were obtained by visiting their official websites and following the official links to the most common SNS.
Resumo:
The extensive use of cloud computing in educational institutes around the world brings unique challenges for universities. Some of these challenges are due to clear differences between Europe and Middle East universities. These differences stem from the natural variation between people. Cloud computing has created a new concept to deal with software services and hardware infrastructure. Some benefits are immediately gained, for instance, to allow students to share their information easily and to discover new experiences of the education system. However, this introduces more challenges, such as security and configuration of resources in shared environments. Educational institutes cannot escape from these challenges. Yet some differences occur between universities which use cloud computing as an educational tool or a form of social connection. This paper discusses some benefits and limitations of using cloud computing and major differences in using cloud computing at universities in Europe and the Middle East, based on the social perspective, security and economics concepts, and personal responsibility.
Resumo:
Citizens across the world are increasingly called upon to participate in healthcare improvement. It is often unclear how this can be made to work in practice. This 4- year ethnography of a UK healthcare improvement initiative showed that patients used elements of organizational culture as resources to help them collaborate with healthcare professionals. The four elements were: (1) organizational emphasis on nonhierarchical, multidisciplinary collaboration; (2) organizational staff ability to model desired behaviours of recognition and respect; (3) commitment to rapid action, including quick translation of research into practice; and (4) the constant data collection and reflection process facilitated by improvement methods.
Resumo:
Massive Open Online Courses (MOOCs) have become very popular among learners millions of users from around the world registered with leading platforms. There are hundreds of universities (and other organizations) offering MOOCs. However, sustainability of MOOCs is a pressing concern as MOOCs incur up front creation costs, maintenance costs to keep content relevant and on-going support costs to provide facilitation while a course is being run. At present, charging a fee for certification (for example Coursera Signature Track and FutureLearn Statement of Completion) seems a popular business model. In this paper, the authors discuss other possible business models and their pros and cons. Some business models discussed here are: Freemium model – providing content freely but charging for premium services such as course support, tutoring and proctored exams. Sponsorships – courses can be created in collaboration with industry where industry sponsorships are used to cover the costs of course production and offering. For example Teaching Computing course was offered by the University of East Anglia on the FutureLearn platform with the sponsorship from British Telecom while the UK Government sponsored the course Introduction to Cyber Security offered by the Open University on FutureLearn. Initiatives and Grants – The government, EU commission or corporations could commission the creation of courses through grants and initiatives according to the skills gap identified for the economy. For example, the UK Government’s National Cyber Security Programme has supported a course on Cyber Security. Similar initiatives could also provide funding to support relevant course development and offering. Donations – Free software, Wikipedia and early OER initiatives such as the MIT OpenCourseware accept donations from the public and this could well be used as a business model where learners could contribute (if they wish) to the maintenance and facilitation of a course. Merchandise – selling merchandise could also bring revenue to MOOCs. As many participants do not seek formal recognition (European Commission, 2014) for their completion of a MOOC, merchandise that presents their achievement in a playful way could well be attractive for them. Sale of supplementary material –supplementary course material in the form of an online or physical book or similar could be sold with the revenue being reinvested in the course delivery. Selective advertising – courses could have advertisements relevant to learners Data sharing – though a controversial topic, sharing learner data with relevant employers or similar could be another revenue model for MOOCs. Follow on events – the courses could lead to follow on summer schools, courses or other real-life or online events that are paid-for in which case a percentage of the revenue could be passed on to the MOOC for its upkeep. Though these models are all possible ways of generating revenue for MOOCs, some are more controversial and sensitive than others. Nevertheless unless appropriate business models are identified the sustainability of MOOCs would be problematic.
Resumo:
This briefing paper outlines the rationale for and development of the new Core Maths qualifications, the characteristics of Core Maths, and why Core Maths is important for higher education. It is part of a communication to university vice-chancellors from the Department for Business, Innovation and Skills (BIS) comprising this paper and a joint Ministerial letter from Jo Johnson, Minister of State for Universities and Science in BIS, and Nick Gibb, Minister of State for Schools in the Department for Education (DfE).
Resumo:
This paper explores the way risk is constructed in the stories gay men tell of their sexual experiences. It focuses on how tellers use such stories to portray themselves both as rational actors and as legitimate members of their social groups by reconstructing the ‘orderliness’ of sexual encounters. An analysis of a corpus of stories derived from a diary study of gay male sexual behaviour in Hong Kong using current theories of discourse analysis reveals how narrators organize their experiences along two primary vectors of engagement: a sequential vector along which the trajectory of the sexual encounter is presented as a chain of occurrences, each occurrence contingent upon previous ones and warranting subsequent ones, and a hierarchical vector along which processes perceived on longer timescales are portrayed as exerting pressure on the ways processes on shorter timescales unfold. Examining how men portray these vectors in their accounts of risk behaviour can help us better understand both the situatedness of risk behaviour and the ways it is linked to larger social practices, identity projects and community histories
Resumo:
This paper completes the review of the theory of self-adjoint extensions of symmetric operators for physicists as a basis for constructing quantum-mechanical observables. It contains a comparative presentation of the well-known methods and a newly proposed method for constructing ordinary self-adjoint differential operators associated with self-adjoint differential expressions in terms of self-adjoint boundary conditions. The new method has the advantage that it does not require explicitly evaluating deficient subspaces and deficiency indices (these latter are determined in passing) and that boundary conditions are of explicit character irrespective of the singularity of a differential expression. General assertions and constructions are illustrated by examples of well-known quantum-mechanical operators like momentum and Hamiltonian.
Resumo:
This presentation was offered as part of the CUNY Library Assessment Conference, Reinventing Libraries: Reinventing Assessment, held at the City University of New York in June 2014.
Resumo:
In recent years, it has been observed that software clones and plagiarism are becoming an increased threat for one?s creativity. Clones are the results of copying and using other?s work. According to the Merriam – Webster dictionary, “A clone is one that appears to be a copy of an original form”. It is synonym to duplicate. Clones lead to redundancy of codes, but not all redundant code is a clone.On basis of this background knowledge ,in order to safeguard one?s idea and to avoid intentional code duplication for pretending other?s work as if their owns, software clone detection should be emphasized more. The objective of this paper is to review the methods for clone detection and to apply those methods for finding the extent of plagiarism occurrence among the Swedish Universities in Master level computer science department and to analyze the results.The rest part of the paper, discuss about software plagiarism detection which employs data analysis technique and then statistical analysis of the results.Plagiarism is an act of stealing and passing off the idea?s and words of another person?s as one?s own. Using data analysis technique, samples(Master level computer Science thesis report) were taken from various Swedish universities and processed in Ephorus anti plagiarism software detection. Ephorus gives the percentage of plagiarism for each thesis document, from this results statistical analysis were carried out using Minitab Software.The results gives a very low percentage of Plagiarism extent among the Swedish universities, which concludes that Plagiarism is not a threat to Sweden?s standard of education in computer science.This paper is based on data analysis, intelligence techniques, EPHORUS software plagiarism detection tool and MINITAB statistical software analysis.