834 resultados para security, usability, identity management, authentication, authorization


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Change management theorists largely overlook using the brand as a vehicle for change. Similarly, while branding has become an increasingly popular research and business topic, the branding literature appears to neglect change management. Our research bridges this gap through the development of brand identity as the main driver of organizational renewal. In the article we provide insights into brand-driven leadership for change which have been develope by collaborative action research with CEOs and owners of retail firms over a twenty year period. In contrast to the usual planning of change attempting to fit the firm to external trends and considering internal resources our brand-driven approach is based on resonance with consumers by the use of external socio-cultural meanings in society. We highlight phases in the development of brand identity by reference to a prototypical retail case study and presenta framework to help managers with brand-driven leadership for change.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Purpose: The following case study aims to explore management's, health professionals' and patients' experiences on the extent to which there is visibility of management support in achieving effective interdisciplinary team working, which is explicitly declared in the mission statement of a 60-bed acute rehabilitative geriatric hospital in Malta. Design/methodology/approach: A total of 21 semi-structured interviews were conducted with the above-mentioned key stakeholders. Findings: Three main distinct yet interdependent themes emerged as a result of thematic analysis: "managing a team-friendly hospital", "interdisciplinary team components", and "interdisciplinary team processes". The findings show that visibility of management support and its alignment with the process and content levels of interdisciplinary teamwork are key to integrated care for acute rehabilitative geriatric patients. Research limitations/implications: The emerging phenomena may not be reproducible in a different context; although many of the emerging themes could be comfortably matched with the existing literature. Practical implications: The implications are geared towards raising the consciousness and conscientiousness of good practice in interdisciplinary teamwork in hospitals, as well as in emphasizing organizational and management support as crucial factors for team-based organizations. Social implications: Interdisciplinary teamwork in acute rehabilitative geriatrics provides optimal quality and integrated health care delivery with the aim that the older persons are successfully discharged back to the community. Originality/value: The authors draw on solid theoretical frameworks - the complexity theory, team effectiveness model and the social identity theory - to support their major finding, namely the alignment of organizational and management support with intra-team factors at the process and content level. © Emerald Group Publishing Limited.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In an Arab oil producing country in the Middle East such as Kuwait, Oil industry is considered as the main and most important industry of the country. This industry’s importance emerged from the significant role it plays in both country’s national economy and also global economy. Moreover, Oil industry’s criticality comes from its interconnectivity with national security and power in the Middle East region. Hence, conducting this research in this crucial industry had certainly added values to companies in this industry as it investigated thoroughly the main components of the TQM implementation process and identified which components affects significantly TQM’s implementation and its gained business results. In addition, as the Oil sector is a large sector that is known for its richness of employees with different national cultures and backgrounds. Thus, this culture-heterogeneous industry seems to be the most appropriate environment to address and satisfy a need in the literature to investigate the national culture values’ effects on TQM implementation process. Furthermore, this research has developed a new conceptual model of TQM implementation process in the Kuwaiti Oil industry that applies in general to operations and productions organizations at the Kuwaiti business environment and in specific to organizations in the Oil industry, as well it serves as a good theoretical model for improving operations and production level of the oil industry in other developing and developed countries. Thus, such research findings minimized the literature’s gap found the limited amount of empirical research of TQM implementation in well-developed industries existing in an Arab, developing countries and specifically in Kuwait, where there was no coherent national model for a universal TQM implementation in the Kuwaiti Oil industry in specific and Kuwaiti business environment in general. Finally, this newly developed research framework, which emerged from the literature search, was validated by rigorous quantitative analysis tools including SPSS and Structural Equation Modeling. The quantitative findings of questionnaires collected were supported by the qualitative findings of interviews conducted.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Increasingly users are seen as the weak link in the chain, when it comes to the security of corporate information. Should the users of computer systems act in any inappropriate or insecure manner, then they may put their employers in danger of financial losses, information degradation or litigation, and themselves in danger of dismissal or prosecution. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of inappropriate behaviours, and in so doing, protecting corporate information, is through the formulation and application of a formal ‘acceptable use policy (AUP). Whilst the AUP has attracted some academic interest, it has tended to be prescriptive and overly focussed on the role of the Internet, and there is relatively little empirical material that explicitly addresses the purpose, positioning or content of real acceptable use policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and composition of a sample of authentic policies – taken from the higher education sector – rather than simply making general prescriptions about what they ought to contain. There are two important conclusions to be drawn from this study: (1) the primary role of the AUP appears to be as a mechanism for dealing with unacceptable behaviour, rather than proactively promoting desirable and effective security behaviours, and (2) the wide variation found in the coverage and positioning of the reviewed policies is unlikely to be fostering a coherent approach to security management, across the higher education sector.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Ensuring the security of corporate information, that is increasingly stored, processed and disseminated using information and communications technologies [ICTs], has become an extremely complex and challenging activity. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of security breaches, and in so doing, protecting corporate information, is through the formulation and application of a formal information security policy (InSPy). Whilst a great deal has now been written about the importance and role of the information security policy, and approaches to its formulation and dissemination, there is relatively little empirical material that explicitly addresses the structure or content of security policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and content of authentic information security policies, rather than simply making general prescriptions about what they ought to contain. Having established the structure and key features of the reviewed policies, the paper critically explores the underlying conceptualisation of information security embedded in the policies. There are two important conclusions to be drawn from this study: (1) the wide diversity of disparate policies and standards in use is unlikely to foster a coherent approach to security management; and (2) the range of specific issues explicitly covered in university policies is surprisingly low, and reflects a highly techno-centric view of information security management.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Management of social identities is important for optimizing intergroup relations in organizations, and for overall organizational performance. Research on marketing’s intergroup relations employs different social identity constructs. This leaves managers and academics confused as to what impact different social identity constructs have on organizational outcomes. We therefore tested the impact of competing social identity constructs (i.e., functional identity [FI], organizational identity [OI]) on important outcomes. We find different combinations of social identity constructs result in different levels of relationship quality and departmental performance, and that FI and OI measures provide more useful information than the accepted relative functional identity or OI measures in isolation. Academic and practical implications are advanced.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The problems of formalization of the process of matching different management subjects’ functioning characteristics obtained on the financial flows analysis basis is considered. Formal generalizations for gaining economical security system knowledge bases elements are presented. One of feedback directions establishment between knowledge base of the system of economical security and financial flows database analysis is substantiated.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article builds on the securitisation and post-development literature and it scrutinises the Czech and Hungarian legitimising discourses of the two countries’ respective Provincial Reconstruction Teams (PRTs) in the Logar and Baghlan provinces of Afghanistan from 2007 to 2013. In spite of the hybrid civil–military character of the PRTs, their security–development nexus was absent and they were respectively securitised and “developmentalised” only indirectly and to a varying extent. The PRTs were mostly justified by the Czech Republic's NATO membership as an identity issue and they were justified as a Hungarian national interest and as both an obligation and an opportunity. Rather than merely importing NATO's arguments as suggested by the previous literature, the depoliticisation and positive connotation of the intervention in Afghanistan was constructed by the domestic NATO-related identities and interests in the Czech Republic and Hungary.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Purpose – This paper aims to apply the business-to-business (B2B) Service Brand Identity (SBI) scale to empirically assess the influence of service brand identity on brand performance for the first time. Design/methodology/approach – Based on data collected from 421 senior marketing executives, this paper applies the B2B SBI and structural equation modeling to fulfill the above purpose. Findings – Brand personality and human resource initiatives have a positive and significant influence on brand performance. Corporate visual identity, in addition to an employee and client focus, has an insignificant impact on performance. Consistent communications have a negative and significant influence on brand performance. Research limitations/implications – Data were only collected from executives in the UK. This research would benefit from replicative studies. Practical implications – This research empirically establishes the brand management activities that drive brand performance. Originality/value – This is the first empirical study to assess the influence service brand identity has on brand performance.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

People manage a spectrum of identities in cyber domains. Profiling individuals and assigning them to distinct groups or classes have potential applications in targeted services, online fraud detection, extensive social sorting, and cyber-security. This paper presents the Uncertainty of Identity Toolset, a framework for the identification and profiling of users from their social media accounts and e-mail addresses. More specifically, in this paper we discuss the design and implementation of two tools of the framework. The Twitter Geographic Profiler tool builds a map of the ethno-cultural communities of a person's friends on Twitter social media service. The E-mail Address Profiler tool identifies the probable identities of individuals from their e-mail addresses and maps their geographical distribution across the UK. To this end, this paper presents a framework for profiling the digital traces of individuals.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Based on extensive quantitative and qualitative analyses of a corpus of American presidential speeches that includes all inaugural addresses and State of the Union messages from 1789 to 2008, as well as major foreign and security policy speeches after 1945, this research monograph analyzes the various forms and functions of intertextual references found in the discourse of American presidents. Working within an original, interdisciplinary theoretical framework established by theories of intertextuality, discourse analysis, and presidential studies, the book discusses five different types of presidential intertextuality, all of which contribute jointly to creating a set of carefully manipulated and politically powerful images of both the American nation and the American presidency. The book is intended for scholars and students in political and presidential studies, communications, American cultural studies, and linguistics, as well as anyone interested in the American presidency in general.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article outlines the possibilities of autobiographical stories to criticize status quo iterations of International Relations (IR). The article draws on the personal experiences of the author’s deportation order issued by the United Kingdom’s Home Office and its associated Border Agency (UKBA) to challenge the accepted assumptions of a cosmopolitan worldview as it relates to orderly international institutional design. It highlights the possibilities of trauma when border management and personal mobility collide. It suggests that mobility trauma ensues when the expectations of human mobility, outlined in Article 13 of the Universal Declaration of Human Rights, infringe the state’s role as security provider. It begins in part one with a challenge to the traditional role and understanding of international borders that sustain order within the international. It examines the unacknowledged role that human vulnerability plays within IR and institutional design while frankly engaging with human vulnerability and trauma in the second section. This section details the experiences of the author when her mobility rights were curtailed and the ensuing identity crisis prompted by such events. The final section investigates the ideas of critical cosmopolitan scholarship demanding that such discourses acknowledge and work through the possibility of failed agency when the demands of state security supersede individual mobility rights. It turns to the possibility of traumatic iterations of IR in order to probe such possibilities. The article suggests, in its conclusion, the possibility of storytelling and psychoanalysis to endorse unorthodox agency, and the possibility of a dynamic international institutional design, that challenges the status quo iterations of IR.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Several brand identity frameworks have been published in the B2C and the B2B brand marketing literature. A reliable, valid and parsimonious service brand identity scale that empirically establishes the construct's dimensionality in a B2B market has yet to be developed. This paper reports the findings of a study conducted amongst 421 senior executives working in the UK IT Service sector to develop and validate a B2B Service Brand Identity Scale. Following established scale development procedures support is provided for a B2B Service Brand Identity Scale comprising five dimensions; employee and client focus, visual identity, brand personality, consistent communications and human resource initiatives. Concluding remarks discuss theoretical and managerial implications with limitations and directions for future research. © 2011 Elsevier Inc.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This edited volume analyzes recent key developments in EU border management. In light of the refugee crises in the Mediterranean and the responses on the part of EU member states, this volume presents an in-depth reflection on European border practices and their political, social and economic consequences. Approaching borders as concepts in flux, the authors identify three main trends: the rise of security technologies such as the EUROSUR system, the continued externalization of EU security governance such as border mission training in third states, and the unfolding dynamics of accountability. The contributions show that internal security cooperation in Europe is far from consolidated, since both political oversight mechanisms and the definition of borders remain in flux. This edited volume makes a timely and interdisciplinary contribution to the ongoing academic and political debate on the future of open borders and legitimate security governance in Europe. It offers a valuable resource for scholars in the fields of international security and migration studies, as well as for practitioners dealing with border management mechanisms.