823 resultados para Food service management
Resumo:
Governments around the world are facing the challenge of responding to increased expectations by their customers with regard to public service delivery. Citizens, for example, expect governments to provide better and more efficient electronic services on the Web in an integrated way. Online portals have become the approach of choice in online service delivery to meet these requirements and become more customer-focussed. This study describes and analyses existing variants of online service delivery models based upon an empirical study and provides valuable insights for researchers and practitioners in government. For this study, we have conducted interviews with senior management representatives from five international governments. Based on our findings, we distinguish three different classes of service delivery models. We describe and characterise each of these models in detail and provide an in-depth discussion of the strengths and weaknesses of these approaches.
Resumo:
The incidence of self-service technology, where the consumer delivers the service themselves using technology, is increasing in the service encounter. One area that is under-explored is the potential impact of self-service technology on consumer satisfaction and affective commitment. Accordingly, this paper presents an empirical study that investigates the relative impact of self-service technology on consumer satisfaction (both overall and transaction-specific) and affective commitment, accounting for the moderating effects of consumer characteristics. The results highlight the importance of personal service for evaluations of satisfaction and commitment, and the importance of social competency as a moderator in this relationship. An understanding of these consumer perceptions will allow organisations to develop strategies to deliver the services expected by their consumers, improving consumer satisfaction and commitment.
Resumo:
Stereotypes of salespeople are common currency in US media outlets and research suggests that these stereotypes are uniformly negative. However, there is no reason to expect that stereotypes will be consistent across cultures. The present paper provides the first empirical examination of salesperson stereotypes in an Asian country, specifically Taiwan. Using accepted psychological methods, Taiwanese salesperson stereotypes are found to be twofold, with a negative stereotype being quite congruent with existing US stereotypes, but also a positive stereotype, which may be related to the specific culture of Taiwan.
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
Resumo:
This study examines the relationships between job demands (in the form of role stressors and emotional management) and employee burnout amongst high contact service employees. Employees in customer facing roles are frequently required to manage overwhelming, conflicting or ambiguous demands, which they may feel ill-equipped to handle. Simultaneously, they must manage the emotions they display towards customers, suppressing some, and expressing others, be they genuine or contrived. If the in-role effort required of employees exceeds their inherent capacity to cope, burnout may result. Burnout, in turn, can have serious detrimental consequences for the psychological well being of employees. We find that both emotional management and role stressors impact burnout. We also confirm that burnout predicts psychological strain. In line with the Job Demands and Resources Model, we examine the mitigating impact of perceived support on these relationships but do not find a significant mitigating impact.
Resumo:
"This column is distinguished from previous Impact columns in that it concerns the development tightrope between research and commercial take-up and the role of the LGPL in an open source workflow toolkit produced in a University environment. Many ubiquitous systems have followed this route, (Apache, BSD Unix, ...), and the lessons this Service Oriented Architecture produces cast yet more light on how software diffuses out to impact us all." Michiel van Genuchten and Les Hatton Workflow management systems support the design, execution and analysis of business processes. A workflow management system needs to guarantee that work is conducted at the right time, by the right person or software application, through the execution of a workflow process model. Traditionally, there has been a lack of broad support for a workflow modeling standard. Standardization efforts proposed by the Workflow Management Coalition in the late nineties suffered from limited support for routing constructs. In fact, as later demonstrated by the Workflow Patterns Initiative (www.workflowpatterns.com), a much wider range of constructs is required when modeling realistic workflows in practice. YAWL (Yet Another Workflow Language) is a workflow language that was developed to show that comprehensive support for the workflow patterns is achievable. Soon after its inception in 2002, a prototype system was built to demonstrate that it was possible to have a system support such a complex language. From that initial prototype, YAWL has grown into a fully-fledged, open source workflow management system and support environment
Resumo:
In a previous chapter (Dean and Kavanagh, Chapter 37), the authors made a case for applying low intensity (LI) cognitive behaviour therapy (CBT) to people with serious mental illness (SMI). As in other populations, LI CBT interventions typically deal with circumscribed problems or behaviours. LI CBT retains an emphasis on self-management, has restricted content and segment length, and does not necessarily require extensive CBT training. In applying these interventions to SMI, adjustments may be needed to address cognitive and symptomatic difficulties often faced by these groups. What may take a single session in a less affected population may require several sessions or a thematic application of the strategy within case management. In some cases, the LI CBT may begin to appear more like a high-intensity (HI) intervention, albeit simple and with many LI CBT characteristics still retained. So, if goal setting were introduced in one or two sessions, it could clearly be seen as an LI intervention. When applied to several different situations and across many sessions, it may be indistinguishable from a simple HI treatment, even if it retains the same format and is effectively applied by a practitioner with limited CBT training. ----- ----- In some ways, LI CBT should be well suited to case management of patients with SMI. treating staff typically have heavy workloads, and find it difficult to apply time-consuming treatments (Singh et al. 2003). LI CBT may allow provision of support to greater numbers of service users, and allow staff to spend more time on those who need intensive and sustained support. However, the introduction of any change in practice has to address significant challenges, and LI CBT is no exception. ----- ----- Many of the issues that we face in applying LI CBT to routine case management in a mnetal health service and their potential solutions are essentially the same as in a range of other problem domains (Turner and Sanders 2006)- and, indeed, are similar to those in any adoption of innovation (Rogers 2003). Over the last 20 years, several commentators have described barriers to implementing evidence-based innovations in mental health services (Corrigan et al. 1992; Deane et al. 2006; Kavanagh et al. 1993). The aim of the current chapter is to present a cognitive behavioural conceptualisation of problems and potential solutions for dissemination of LI CBT.
Resumo:
SAP and its research partners have been developing a lan- guage for describing details of Services from various view- points called the Unified Service Description Language (USDL). At the time of writing, version 3.0 describes technical implementation aspects of services, as well as stakeholders, pricing, lifecycle, and availability. Work is also underway to address other business and legal aspects of services. This language is designed to be used in service portfolio management, with a repository of service descriptions being available to various stakeholders in an organisation to allow for service prioritisation, development, deployment and lifecycle management. The structure of the USDL metadata is specified using an object-oriented metamodel that conforms to UML, MOF and EMF Ecore. As such it is amenable to code gener-ation for implementations of repositories that store service description instances. Although Web services toolkits can be used to make these programming language objects available as a set of Web services, the practicalities of writing dis- tributed clients against over one hundred class definitions, containing several hundred attributes, will make for very large WSDL interfaces and highly inefficient “chatty” implementations. This paper gives the high-level design for a completely model-generated repository for any version of USDL (or any other data-only metamodel), which uses the Eclipse Modelling Framework’s Java code generation, along with several open source plugins to create a robust, transactional repository running in a Java application with a relational datastore. However, the repository exposes a generated WSDL interface at a coarse granularity, suitable for distributed client code and user-interface creation. It uses heuristics to drive code generation to bridge between the Web service and EMF granularities.
Resumo:
In a resource constrained business world, strategic choices must be made on process improvement and service delivery. There are calls for more agile forms of enterprises and much effort is being directed at moving organizations from a complex landscape of disparate application systems to that of an integrated and flexible enterprise accessing complex systems landscapes through service oriented architecture (SOA). This paper describes the analysis of strategies to detect supporting business services. These services can then be delivered in a variety of ways: web-services, new application services or outsourced services. The focus of this paper is on strategy analysis to identify those strategies that are common to lines of business and thus can be supported through shared services. A case study of a state government is used to show the analytical method and the detection of shared strategies.
Resumo:
Purpose: The paper seeks to apply the theory of the democratic deficit to school-based management with an emphasis on Australia. This theory was developed to examine managerial restructuring of the Australian Public Service in the 1990s. Given similarities between the use of managerial practices in the public service and government schools, the authors draw on recent literature about school-based management in Australia and apply the democratic deficit theory to it. ----- ----- Design/methodology/approach: This paper is conceptual in focus. The authors analyse literature in terms of the three components of the democratic deficit – i.e. the weakening of accountability, the denial of the roles and values of public employees, and the emergence of a “hollow state” – and in relation to the application of this theory to the Australian Public Service.----- ----- Findings: A trend towards the three components of the democratic deficit is evident in Australia although, to date, its emergence has not been as extensive as in the UK. The authors argue that the democratic principles on which public schooling in Australia was founded are being eroded by managerial and market practices.----- ----- Practical implications: These findings provide policy makers and practitioners with another way of examining managerial and market understandings of school-based management and its impact on teachers and on students. It offers suggestions to reorient practices away from those that are exclusively managerial-based towards those that are public-sector based.----- ----- Originality/value: The value of this paper is that it applies the theory of the democratic deficit to current understandings of school-based management.
Resumo:
QUT Library and the High Performance Computing and Research Support (HPC) Team have been collaborating on developing and delivering a range of research support services, including those designed to assist researchers to manage their data. QUT’s Management of Research Data policy has been available since 2010 and is complemented by the Data Management Guidelines and Checklist. QUT has partnered with the Australian Research Data Service (ANDS) on a number of projects including Seeding the Commons, Metadata Hub (with Griffith University) and the Data Capture program. The HPC Team has also been developing the QUT Research Data Repository based on the Architecta Mediaflux system and have run several pilots with faculties. Library and HPC staff have been trained in the principles of research data management and are providing a range of research data management seminars and workshops for researchers and HDR students.
Resumo:
Property management requires an understanding of infrastructure management, service life planning and quality management. Today, people are beginning to realize that effective property management in high-rise residential property can sustain the property value and maintaining high returns on their investment. The continuous growth of high-rise residential properties indicates that there is a need for an effective property management system to provide a sustainable high-rise residential property development. As intensive as these studies are, they do not attempt to investigate the correlation between property management systems with the trends of Malaysia high-rise residential property development. By examining the trends and scenario of Malaysia high-rise residential property development, this paper aims to gain an understanding of impacts from the effectiveness of property management in this scope area. Findings from this scoping paper will assist in providing a greater understanding and possible solutions for the current Malaysian property management systems for the expanding high-rise residential unit market. With current high rise units in excess of 1.3 million and increasing, the need for more cost effective management systems are of highly important to the Malaysian Property Industry.
Resumo:
know personally. They also communicate with other members of the network who are the friends of their friends and may be friends of their friend’s network. They share their experiences and opinions within the social network about an item which may be a product or service. The user faces the problem of evaluating trust in a service or service provider before making a choice. Opinions, reputations and ecommendations will influence users' choice and usage of online resources. Recommendations may be received through a chain of friends of friends, so the problem for the user is to be able to evaluate various types of trust recommendations and reputations. This opinion or ecommendation has a great influence to choose to use or enjoy the item by the other user of the community. Users share information on the level of trust they explicitly assign to other users. This trust can be used to determine while taking decision based on any recommendation. In case of the absence of direct connection of the recommender user, propagated trust could be useful.