983 resultados para emerald ash borer


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose Process modeling is a complex organizational task that requires many iterations and communication between the business analysts and the domain specialists. The challenge of process modeling is exacerbated, when the process of modeling has to be performed in a cross-organizational, distributed environment. In this paper we suggest a 3D environment for collaborative process modeling, using Virtual World technology. Design/methodology/approach We suggest a new collaborative process modeling approach based on Virtual World technology. We describe the design of an innovative prototype collaborative process modeling approach, implemented as a 3D BPMN modeling environment in Second Life. We use a case study to evaluate the suggested approach. Findings Based on our case study application, we show that our approach increases user empowerment and adds significantly to the collaboration and consensual development of process models even when the relevant stakeholders are geographically dispersed. Research limitations implications – We present design work and a case study. More research is needed to more thoroughly evaluate the presented approach in a variety of real-life process modeling settings. Practical implications Our research outcomes as design artifacts are directly available and applicable by business process management professionals and can be used by business, system and process analysts in real-world practice. Originality/value Our research is the first reported attempt to develop a process modeling approach on the basis of virtual world technology. We describe a novel and innovative 3D BPMN modeling environment in Second Life.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose: The purpose of this paper is to explain variations in discretionary information shared between buyers and key suppliers. The paper also aims to examine how the extent of information shared affects buyers’ performance in terms of resource usage, output, and flexibility. ----- ----- Design/methodology/approach: The data for the paper comprise 221 Finnish and Swedish non-service companies obtained through a mail survey. The hypothesized relationships were tested using partial least squares modelling with reflective and formative constructs.----- ----- Findings: The results of the study suggest that (environmental and demand) uncertainty and interdependency can to some degree explain the extent of information shared between a buyer and key supplier. Furthermore, information sharing improves buyers’ performance with respect to resource usage, output, and flexibility.----- ----- Research limitations/implications: A limitation to the paper relates to the data, which only included buyers.Abetter approach would have been to collect data from both, buyers and key suppliers. Practical implications – Companies face a wide range of supply chain solutions that enable and encourage collaboration across organizations. This paper suggests a more selective and balanced approach toward adopting the solutions offered as the benefits are contingent on a number of factors such as uncertainty. Also, the risks of information sharing are far too high for a one size fits all approach.----- ----- Originality/value: The paper illustrates the applicability of transaction cost theory to the contemporary era of e-commerce. With this finding, transaction cost economics can provide a valuable lens with which to view and interpret interorganizational information sharing, a topic that has received much attention in the recent years.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose – The purpose of this paper is to determine the patterns of transitional employment (TE) aspirations and training and development (T&D) needs of women within local government. Design/methodology/approach – A quantitative survey methodology was used to identify aspirations in a sample of 1,068 employees from the Australian Local Government Association. Findings – Mature-aged women were very interested in continuous learning at work despite their limited formal education. Their training preferences consisted of informal delivery face-to-face or online in the areas of management or administration. Younger women were interested in undertaking university courses, while a minority were interested in blue collar occupations. Practical implications – Through the identification of patterns of TE and T&D aspirations, long term strategies to develop and retain women in local government may be developed. Findings suggest that mature-aged women would benefit from additional T&D to facilitate entry into management and senior administration positions, as well as strategies to facilitate a shift in organizational climate. Social implications – Mature-aged women were found to be a potentially untapped resource for management and senior administrative roles owing to their interest in developing skills in these fields and pursuing TE. Younger women may also benefit from T&D to maintain their capacity during breaks from employment. Encouragement of women in non-traditional areas may also address skill shortages in the local government. Originality/value – Mature-aged women were found to be a potentially untapped resource for management and senior administrative roles owing to their interest in developing skills in these fields and pursuing TE. Younger women may also benefit from T&D to maintain their capacity during breaks from employment. Encouragement of women in non-traditional areas may also address skill shortages in the local government.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose – The purpose of this paper is to present a selection of responses to the report Fashion Victims, published by War on Want in December 2006. It offers a range of viewpoints presented by members of the Editorial Advisory Board of CPOIB. These are presented in chronological order of submission. There is some cross-reference by contributors to the work of others, but no attempt is made to present a unified argument. Design/methodology/approach – Presents the full contributions of involved participants, without mediation or editorial change. Findings – A number of different perspectives are presented on the central issue that is summarised by the opening heading in War on Want’s report – “How cheap is too cheap?” It is seen that the answer to this question is very much dependent upon the standpoint of the respondent. Originality/value – In presenting this form of commentary, members of the CPOIB Editorial Board seek to stimulate debate about an issue of concern to contemporary society, without resort to the time delay and mediating processes of peer-review normally attached to academic writing. It is hoped that this discussion will provoke further contributions and a widening of the debate. Keywords Corporate social responsibility, Multinational companies, Conditions of employment, Trade unions

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose The purpose of this paper is to explore the process, and analyse the implementation of constructability improvement and innovation result during the planning and design for sea water intake structure of fertilizer plant project. Design/methodology/approach The research methodology approach is case study method at project level. This constructability improvement process was investigated by using constructability implementation check lists, direct observation, documented lesson learned analysis and key personnel interviews. Findings The case study shows that the implementation of constructability during planning and design stage for this sea water intake structure has increased the project performance as well as improved the schedule by 5 months (14.21%) and reduced the project cost by 15.35%. Research limitations/implications This case study was limited to three (3) previous sea water intake projects as references and one (1) of new method sea water intake structure at fertilizer plant project. Practical implications A constructability improvement check list using theory and lesson learned for the specific construction project was documented. Originality/value The findings support the relevant study of constructability and provide specific lesson learned for three (3) previous project and one (1) of the new innovation method of the construction project and documented by the company.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose – The paper aims to argue that there has been a privileging of the private (social mobility) and economic (social efficiency) purposes of schooling at the expense of the public (democratic equality) purposes of schooling. Design/methodology/approach – The paper employs a literature review, policy and document analysis. Findings – Since the late 1980s, the schooling agenda in Australia has been narrowed to one that gives primacy to purposes of schooling that highlight economic orientations (social efficiency) and private purposes (social mobility). Practical implications – The findings have wider relevance beyond Australia, as similar policy agendas are evident in many other countries raising the question as to how the shift in purposes of education in those countries might mirror those in Australia. Originality/value – While earlier writers have examined schooling policies in Australia and noted the implications of managerialism in relation to these policies, no study has analysed these policies from the perspective of the purposes of schooling. Conceptualising schooling, and its purposes in particular, in this way refocuses attention on how societies use their educational systems to promote (or otherwise) the public good.