895 resultados para Family Business
Resumo:
As organizations reach higher levels of business process management maturity, they often find themselves maintaining very large process model repositories, representing valuable knowledge about their operations. A common practice within these repositories is to create new process models, or extend existing ones, by copying and merging fragments from other models. We contend that if these duplicate fragments, a.k.a. ex- act clones, can be identified and factored out as shared subprocesses, the repository’s maintainability can be greatly improved. With this purpose in mind, we propose an indexing structure to support fast detection of clones in process model repositories. Moreover, we show how this index can be used to efficiently query a process model repository for fragments. This index, called RPSDAG, is based on a novel combination of a method for process model decomposition (namely the Refined Process Structure Tree), with established graph canonization and string matching techniques. We evaluated the RPSDAG with large process model repositories from industrial practice. The experiments show that a significant number of non-trivial clones can be efficiently found in such repositories, and that fragment queries can be handled efficiently.
Resumo:
Evidence exists that repositories of business process models used in industrial practice contain significant amounts of duplication. This duplication may stem from the fact that the repository describes variants of the same pro- cesses and/or because of copy/pasting activity throughout the lifetime of the repository. Previous work has put forward techniques for identifying duplicate fragments (clones) that can be refactored into shared subprocesses. However, these techniques are limited to finding exact clones. This paper analyzes the prob- lem of approximate clone detection and puts forward two techniques for detecting clusters of approximate clones. Experiments show that the proposed techniques are able to accurately retrieve clusters of approximate clones that originate from copy/pasting followed by independent modifications to the copied fragments.
Resumo:
Comprehensive BCM plan testing for complex information systems is difficult and expensive, if not infeasible. This paper suggests that a simulator could be employed to ameliorate these problems. A general model for such a BCM simulator is presented, and the implementation of a prototype simulator is described. The simulator reacts to system disturbances by seeking alternative configurations provided within the BCM plan, reporting the resource availabilities in the updated system and identifying any failure to meet the requirements placed on the system. The simulator then explores any changes in data security introduced by the proposed post disturbance configuration and reports any enhanced risk.
Resumo:
With the large diffusion of Business Process Managemen (BPM) automation suites, the possibility of managing process-related risks arises. This paper introduces an innovative framework for process-related risk management and describes a working implementation realized by extending the YAWL system. The framework covers three aspects of risk management: risk monitoring, risk prevention, and risk mitigation. Risk monitoring functionality is provided using a sensor-based architecture, where sensors are defined at design time and used at run-time for monitoring purposes. Risk prevention functionality is provided in the form of suggestions about what should be executed, by who, and how, through the use of decision trees. Finally, risk mitigation functionality is provided as a sequence of remedial actions (e.g. reallocating, skipping, rolling back of a work item) that should be executed to restore the process to a normal situation.
Resumo:
Objectives To assess the effects of information interventions which orient patients and their carers/family to a cancer care facility and the services available within the facility. Design Systematic review of randomised controlled trials (RCTs), cluster RCTs and quasi-RCTs. Data sources MEDLINE, CINAHL, PsycINFO, EMBASE and the Cochrane Central Register of Controlled Trials. Methods We included studies evaluating the effect of an orientation intervention, compared with a control group which received usual care, or with trials comparing one orientation intervention with another orientation intervention. Results Four RCTs of 610 participants met the criteria for inclusion. Findings from two RCTs demonstrated significant benefits of the orientation intervention in relation to reduced levels of distress (mean difference (MD): −8.96, 95% confidence interval (95%CI): −11.79 to −6.13), but non-significant benefits in relation to the levels state anxiety levels (MD −9.77) (95%CI: −24.96 to 5.41). There are insufficient data on the other outcomes of interest. Conclusions This review has demonstrated the feasibility and some potential benefits of orientation interventions. There was a low level of evidence to suggest that orientation interventions can reduce distress in patients. However, other outcomes, including patient knowledge recall/satisfaction, remain inconclusive. The majority of trials were subjected to high risk of bias and were likely to be insufficiently powered. Further well conducted and powered RCTs are required to provide evidence for determining the most appropriate intensity, nature, mode and resources for such interventions. Patient and carer-focused outcomes should be included.
Resumo:
This paper describes a number of interventions being developed to address the emotional, social and behavioural problems experienced by Aboriginal people in Australia. These are: the We-Al-Li program to help people deal with the impact of transgenerational trauma; and the RAP Indigenous Parenting Program. It is argued that the emotional well being of indigenous people will be enhanced through the integration of interventions targeting the individual, family and community.
Resumo:
Discusses the role of the family in the development, treatment and prevention of adolescent depression. Studies have demonstrated that between 21–32% of adolescents report mild to severe symptoms of depression. The research points out the need for increased attention to adolescent depression because of its high prevalence, the risk factor for the development of other disorders and suicide, recurrence and tendency to endure into adulthood. Many studies have shown a strong relationship between depressive symptomatology and family factors. Therefore, family interventions should play an important role in the prevention and treatment of adolescent depression. However, there exists a paradox in that the research published to date fails to show that family-intervention programs add to the efficacy of treatments provided to the adolescents. Possible explanations for this paradox are discussed.
Resumo:
Children who have suffered physical or sexual abuse are as vulnerable as adult trauma victims to experience "secondary trauma", in which the reactions of the family or broader system exacerbate the child's difficulties. Three clinical cases (a 7 yr old male, an 8 yr old male, and a 7 yr old female) are presented that suggest that this secondary trauma can be made worse by either excessive or insufficient provision of individual child psychotherapy, and the way the system interprets and reacts to these clinical decisions. Types of secondary trauma and their interactions with clinical decisions are discussed. Ways of framing clinical decisions to minimize the potential secondary trauma are presented.
Resumo:
This chapter contains sections titled: -Adolescent Depression and the Australian National Mental Health Strategies -Preventive Interventions and Adolescent Depression -The Rationale and Content of the Interventions -Evaluations of the Resourceful Adolescent Programs
Resumo:
This brief paper will introduce a new theoretical framework or model which may be useful for putting a structure around the theme of ageing and its accompanying grief and loss. It is especially appropriate in the context of counselling families living with dementia, including those individuals with a diagnosis of alzheimers disease. The paper describes the origin of the Spanish expressions of the `wall of tears’ and `house of tears’ and involves an historical narrative of the first author as context to the framework.
Resumo:
The next generation of SOA needs to scale for flexible service consumption, beyond organizational boundaries and current B2B applications, into communities, eco-systems, and business networks. In the wider and, ultimately, global settings, new capabilities are needed so that business partners can efficiently and reliably enable, adapt, and expose services where they can be discovered, ordered, consumed, metered, and paid for, through new applications and opportunities, driven by third parties in the global "village". This trend is already underway, in different ways, through various early adopter market segments. For the small medium enterprises segment, Google, Intuit-Microsoft, and others have launched appstores, through which an open-ended array of hosted applications are sourced from the development community and procured as maketplace commondities. In the corporate sector, the marketplace model and business network hubs are being put in place on top of connectivity and network orchestration investments for capitalizing services as tradable assets, seen in banking/finance (e.g. American Express Intelligent Marketplace), logistics (e.g., the E2open hub), and the public sector (e.g., UK DirectGov whole-of-government citizen services delivery).
Resumo:
The emergence of semantic technologies to deal with the underlying meaning of things, instead of a purely syntactical representation, has led to new developments in various fields, including business process modeling. Inspired by artificial intelligence research, technologies for semantic Web services have been proposed and extended to process modeling. However, the applicablility of semantic Web services for semantic business processes is limited because business processes encompass wider requirements of business than Web services. In particular, processes are concerned with the composition of tasks, that is, in which order activities are carried out, regardless of their implementation details; resources assigned to carry out tasks, such as machinery, people, and goods; data exchange; and security and compliance concerns.
Resumo:
Understanding the business value of IT has mostly been studied in developed countries, but because most investment in developing countries is derived from external sources, the influence of that investment on business value is likely to be different. We test this notion using a two-layer model. We examine the impact of IT investments on firm processes, and the relationship of these processes to firm performance in a developing country. Our findings suggest that investment in different areas of IT positively relates to improvements in intermediate business processes and these intermediate business processes positively relate to the overall financial performance of firms in a developing country.
Resumo:
Organisations devote substantial resources to acquire information technology (IT), and explaining the important issue of how IT can affect performance has posed a significant challenge to information system (IS) researchers. Owing to the importance of expanding our understanding on how and where IT and IT-related resources impact organisational performance, this study investigates the differential effects of IT resources and IT-related capabilities, in the presence of platform-related complementarities, on business process performance. We test these relationships empirically via a field survey of 216 firms. The findings suggest that IT resources and IT-related capabilities explain variance in performance. Of interest is the finding that IT resources and IT-related capabilities ability to explain variance in business process is further enhanced by the presence of the platform-related complementarities. Our findings are largely consistent with the resource-based and complementarity arguments of sources of IT-related business value.