827 resultados para Actor network theory
Resumo:
In dynamic environments, firms seek to build capabilities which will permit them to become innovation and change ready. Programs offered by intermediaries, while varying greatly in content and format, are designed to support those firms wishing to enhance their competitiveness. Firms which participate in intermediary programs have displayed their willingness to overcome deficiencies or barriers to competitiveness through acquiring knowledge which is external to the firm. This paper reports on interviews with 24 firms who were involved in a MAP or TAP program offered by QMI Solutions. The findings of the research suggest that knowledge intermediaries serve to disrupt organisational paths and in so doing establish mechanisms for ongoing learning and change. They do this first by disrupting the firm with a positive learning experience and also by establishing processes for developing new relationships and access to knowledge which are critical for learning and change. It is the experience of learning through knowledge exchange which can trigger the pursuit of new paths and it is the processes involving new relations and knowledge processing that provides the micro-foundations for ongoing learning and change. This suggests that the role of intermediaries goes well beyond merely knowledge transfer to include longer term effects on the capability of organisations to innovate, which is critical to economic competitiveness and the survival rate of firms.
Resumo:
New product development projects are experiencing increasing internal and external project complexity. Complexity leadership theory proposes that external complexity requires adaptive and enabling leadership, which facilitates opportunity recognition (OR). We ask whether internal complexity also requires OR for increased adaptability. We extend a model of EO and OR to conclude that internal complexity may require more careful OR. This means that leaders of technically or structurally complex projects need to evaluate opportunities more carefully than those in projects with external or technological complexity.
Resumo:
Research on social networking sites like Facebook is emerging but sparse. This exploratory study investigates the value users derive from self-described ‘cool’ Facebook applications, and explores the features that either encourage or discourage users to recommend applications to their friends. The concepts of value and cool are explored in a social networking context. Our qualitative data reveals consumers derive a combination of functional value along with either social or emotional value from the applications. Female Facebook users indicate self-expression as important motivators, while males tend to use Facebook applications to socially compete. Three broad categories emerged for application features; symmetrical features can both encourage or discourage recommendation, polar features where different levels of the same feature encourage or discourage, and uni-directional features only encourage or discourage but not both. Recommending or not recommending an application tends to be the result of a combination of features and context, rather than one feature in isolation.
Resumo:
How adequate are current theoretical standpoints, tools and categories for explaining the flows of international students to Anglo/American/European universities? This essay takes a different analytic tact and historical standpoint to the study of them and us, insiders and outsiders (cf. Foley, Levinson & Hurtig, 2001), in the internationalisation of education.
Resumo:
Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. In this paper, a key management scheme is proposed to defeat node capture attack by offering both forward and backward secrecies. Our scheme overcomes the pitfalls which Nilsson et al.'s scheme suffers from, and is not more expensive than their scheme.
Resumo:
The main objective of the thesis is to seek insights into the theory, and provide empirical evidence of rebound effects. Rebound effects reduce the environmental benefits of environmental policies and household behaviour changes. In particular, win-win demand side measures, in the form of energy efficiency and household consumption pattern changes, are seen as ways for households and businesses to save money and the environment. However, these savings have environmental impacts when spent, which are known as rebound effects. This is an area that has been widely neglected by policy makers. This work extends the rebound effect literature in three important ways, (1) it incorporates the potential for variation of rebound effects with household income level, (2) it enables the isolation of direct and indirect effects for cases of energy efficient technology adoption, and examines the relationship between these two component effects, and (3) it expands the scope of rebound effect analysis to include government taxes and subsidies. MACROBUTTON HTMLDirect Using a case study approach it is found that the rebound effect from household consumption pattern changes targeted at electricity is between 5 and 10%. For consumption pattern changes with reduced vehicle fuel use, the rebound effect is in the order of 20 to 30%. Higher income households in general are found to have a lower total rebound effect; however the indirect effect becomes relatively more significant at higher household income levels. In the win-lose case of domestic photovoltaic electricity generation, it is demonstrated that negative rebound effects can occur, which can potentially amplify the environmental benefits of this action. The rebound effect from a carbon tax, which occurs due to the re-spending of raised revenues, was found to be in the range of 11-32%. Taxes and transfers between households of different income levels also have environmental implications. For example, a more progressive tax structure, with increased low income welfare payments is likely to increase greenhouse gas emissions. Subsidies aimed at encouraging environmentally friendly consumption habits are also subject to rebound effects, as they constitute a substitution of government expenditure for household expenditure. For policy makers, these findings point to the need to incorporate rebound effects in the environmental policy evaluation process.’
Resumo:
This study employs BP neural network to simulate the development of Chinese private passenger cars. Considering the uncertain and complex environment for the development of private passenger cars, indicators of economy, population, price, infrastructure, income, energy and some other fields which have major impacts on it are selected at first. The network is proved to be operable to simulate the progress of chinese private passenger cars after modeling, training and generalization test. Based on the BP neural network model, sensitivity analysis of each indicator is carried on and shows that the sensitivity coefficients of fuel price change suddenly. This special phenomenon reveals that the development of Chinese private passenger cars may be seriously affected by the recent high fuel price. This finding is also consistent with facts and figures
Resumo:
Most forms of tissue healing depend critically on revascularisation. In soft tissues and in vitro, mechanical stimuli have been shown to promote vessel-forming activity. However, in bone defects, increased interfragmentary motion impairs vascular regeneration. Because these effects seem contradictory, we aimed to determine whether a range of mechanical stimuli exists in which angiogenesis is favoured. A series of cyclic strain magnitudes were applied to a Matrigel-based “tube formation” assay and the total lengths of networks formed by human microvascular endothelial cells measured at 24 h. Network lengths were reduced at all strain levels, compared to unstretched controls. However, the levels of pro-angiogenic matrix metalloproteases-2 and -9 in the corresponding conditioned media were unchanged by strain, and vascular endothelial growth factor was uniformly elevated in stretched conditions. By repeating the assay with the addition of conditioned media from mesenchymal stem cells cultivated in similar conditions, paracrine stimuli were shown to increase network lengths, but not to alter the negative effect of cyclic stretching. Together, these results demonstrate that directly applied periodic strains can inhibit endothelial organisation in vitro, and suggest that this may be due to physical disruption rather than biochemical modulation. Most importantly, the results indicate that the straining of endothelial cells and their assembly into vascular-like structures must be studied simultaneously to adequately characterise the mechanical influence on vessel formation.
Resumo:
Edith Penrose’s theory of firm growth postulates that a firm’s current growth rate will be influenced by the adjustment costs of, and changes to a firm’s productive opportunity set arising from, previous growth. Although she explicitly considered the impact of previous organic growth on current organic growth, she was largely silent about the impact of previous acquisitive growth. In this paper we extend Penrose’s work to examine that the relative impact of organic and acquisitive growth on the adjustment costs and productive opportunity set of the firm. Employing a panel of commercially active enterprises in Sweden over a 10 year period our results suggest the following. First, previous organic growth acts as a constraint on current organic growth. Second, previous acquisitive growth has a positive effect on current organic growth. We conclude that organic growth and acquisitive growth constitute two distinct strategic options facing the firm, which have a differential impact on the future organic growth of the firm.
Resumo:
With the rise of ubiquitous computing in recent years, concepts of spatiality have become a significant topic of discussion in design and development of multimedia systems. This article investigates spatial practices at the intersection of youth, technology, and urban space in Seoul, and examines what the author calls ‘transyouth’: in the South Korean context, these people are between the ages of 18 and 24, situated on the delicate border between digital natives and immigrants in Prensky’s (2001) terms. In the first section, the article sets out the technosocial environment of contemporary Seoul. This is followed by a discussion of social networking processes derived from semi-structured interviews conducted in 2007-8 with Seoul transyouth about their ‘lived experiences of the city.’ Interviewees reported how they interact to play, work, and live with and within the city’s unique environment. The article develops a theme of how technosocial convergence (re)creates urban environments and argues for a need to consider such user-driven spatial recreation in designing cities as (ubiquitous) urban networks in recognition of its changing technosocial contours of connections. This is explored in three spaces of different scales: Cyworld as an online social networking space; cocoon housing – a form of individual residential space which is growing rapidly in many Korean cities – as a private living space; and u-City (ubiquitous City) as the future macro-space of Seoul.
Resumo:
Monitoring unused or dark IP addresses offers opportunities to extract useful information about both on-going and new attack patterns. In recent years, different techniques have been used to analyze such traffic including sequential analysis where a change in traffic behavior, for example change in mean, is used as an indication of malicious activity. Change points themselves say little about detected change; further data processing is necessary for the extraction of useful information and to identify the exact cause of the detected change which is limited due to the size and nature of observed traffic. In this paper, we address the problem of analyzing a large volume of such traffic by correlating change points identified in different traffic parameters. The significance of the proposed technique is two-fold. Firstly, automatic extraction of information related to change points by correlating change points detected across multiple traffic parameters. Secondly, validation of the detected change point by the simultaneous presence of another change point in a different parameter. Using a real network trace collected from unused IP addresses, we demonstrate that the proposed technique enables us to not only validate the change point but also extract useful information about the causes of change points.
Resumo:
The research on project learning has recognised the significance of knowledge transfer in project based organisations (PBOs). Effective knowledge transfer across projects avoids reinventions, enhances knowledge creation and saves lots of time that is crucial in project environment. In order to facilitate knowledge transfer, many PBOs have invested lots of financial and human resources to implement IT-based knowledge repository. However, some empirical studies found that employees would rather turn for knowledge to colleagues despite their ready access to IT-based knowledge repository. Therefore, it is apparent that social networks play a pivotal role in the knowledge transfer across projects. Some scholars attempt to explore the effect of network structure on knowledge transfer and performance, however, focused only on egocentric networks and the groups’ internal social networks. It has been found that the project’s external social network is also critical, in that the team members can not handle critical situations and accomplish the projects on time without the assistance and knowledge from external sources. To date, the influence of the structure of a project team’s internal and external social networks on project performance, and the interrelation between both networks are barely known. In order to obtain such knowledge, this paper explores the interrelation between the structure of a project team’s internal and external social networks, and their effect on the project team’s performance. Data is gathered through survey questionnaire distributed online to respondents. Collected data is analysed applying social network analysis (SNA) tools and SPSS. The theoretical contribution of this paper is the knowledge of the interrelation between the structure of a project team’s internal and external social networks and their influence on the project team’s performance. The practical contribution lies in the guideline to be proposed for constructing the structure of project team’s internal and external social networks.
Resumo:
Network RTK (Real-Time Kinematic) is a technology that is based on GPS (Global Positioning System) or more generally on GNSS (Global Navigation Satellite System) measurements to achieve centimeter-level accuracy positioning in real-time. Reference station placement is an important problem in the design and deployment of network RTK systems as it directly affects the quality of the positioning service and the cost of the network RTK systems. This paper identifies a new reference station placement for network RTK, namely QoS-aware regional network RTK reference station placement problem, and proposes an algorithm for the new reference station placement problem. The algorithm can always produce a reference station placement solution that completely covers the region of network RTK.