919 resultados para Accounting information
Resumo:
Having IT-related capabilities is not enough to secure value from the IT resources and survive in today’s competitive environment. IT resources evolve dynamically and organisations must sustain their existing capabilities to continue to leverage value from their IT resources. Organisations’ IT-related management capabilities are an important source of their competitive advantage. We suggest that organisations can sustain these capabilities through appropriate considerations of resources at the technology-use level. This study suggests that an appropriate organisational design relating to decision rights and work environment, and a congruent reward system can create a dynamic IT-usage environment. This environment will be a vital source of knowledge that could help organisations to sustain their IT-related management capabilities. Analysis of data collected from a field survey demonstrates that this dynamic IT-usage environment, a result of the synergy between complementary factors, helps organisations to sustain their IT-related management capabilities. This study adds an important dimension to understanding why some organisations continue to perform better with their IT resources than others. For practice, this study suggests that organisations need to consider a comprehensive approach to what constitutes their valuable resources.
Juggling competing public values : resolving conflicting agendas in social procurement in Queensland
Resumo:
Organisations within the not-for-profit sector provide services to individuals and groups government and for-profit organisations cannot or will not consider. This response by the not-for-profit sector to market failure and government failure is a well understood contribution to society by the nonprofit sector. Over time, this response has resulted in the development of a vibrant and rich agglomeration of services and programs that operate under a myriad of philosophical stances, service orientations, client groupings and operational capacities. In Australia, these organisations and services provide social support and service assistance to many people in the community; often targeting their assistance to clients facing the most difficult of clients with complex problems. Initially, in undertaking this role, the not-for-profit sector received limited sponsorship from government, relying on primarily on public donations to fund the delivery of services. (Lyons 2001). Over time governments assumed greater responsibility in the form of service grants to particular groups: ‘the worthy poor’. More recently, government has engaged in widespread procurement of services from the not-for-profit sector, which specify the nature of the outcomes to be achieved and, to a degree, the way in which the services will be provided. A consequence of this growing shift to a more marketised model of service contracting, often offered-up under the label of enhanced collaborative practice, has been increased competitiveness between agencies that had previously worked well together (Keast and Brown, 2006). One of the challenges which emerge from the procurement of services by government from third sector organisations is that public values such as effectiveness, efficiency, transparency and professionalism can be neglected (Jørgensen and Bozeman 2002), although this is not always the case (Brown, Furneaux and Gudmundsson 2012). While some approaches to the examination of social procurement - the intentional purchasing of social outcomes (Furneaux and Barraket 2011) - assumes that public values are lost in social procurement arrangements (Bozeman 2002; Jørgensen and Bozeman 2002), alternative approach suggest such inevitability is not the case. Instead, social procurement is seen to involve a set of tensions (Brown, Potoski and Slyke 2006) or a set of trade offs (Charles et al. 2007), which must be managed, and through such management, public values can be potentially safeguarded (Bruin and Dicke 2006). The potential trade-offs of public values in social procurement is an area in need of further research, and one which carries both theoretical and practical significance. Additionally, the juxtaposition of policies – horizontal integration and vertical efficiency – results in a complex, crowded and contested policy and practice environment (Keast et al., 2007),, with the potential for set of unintentional consequences arising from these arrangements. Further the involvement of for-profit, non-profit, and hybrid organisations such as social enterprises, adds further complexity in the number of different organisational forms engaged in service delivery on behalf of government. To address this issue, this paper uses information gleaned from a state-wide survey of not-for-profit organisations in Queensland, Australia which included within its focus organisational size, operational scope, funding arrangements and governance/management approaches. Supplementing this information is qualitative data derived from 17 focus groups and 120 interviews conducted over ten years of study of this sector. The findings contribute to greater understanding of the practice and theory of the future provision of social services.
Resumo:
The study shows an alternative solution to existing efforts at solving the problem of how to centrally manage and synchronise users’ Multiple Profiles (MP) across multiple discrete social networks. Most social network users hold more than one social network account and utilise them in different ways depending on the digital context (Iannella, 2009a). They may, for example, enjoy friendly chat on Facebook1, professional discussion on LinkedIn2, and health information exchange on PatientsLikeMe3 In this thesis the researcher proposes a framework for the management of a user’s multiple online social network profiles. A demonstrator, called Multiple Profile Manager (MPM), will be showcased to illustrate how effective the framework will be. The MPM will achieve the required profile management and synchronisation using a free, open, decentralized social networking platform (OSW) that was proposed by the Vodafone Group in 2010. The proposed MPM will enable a user to create and manage an integrated profile (IP) and share/synchronise this profile with all their social networks. The necessary protocols to support the prototype are also proposed by the researcher. The MPM protocol specification defines an Extensible Messaging and Presence Protocol (XMPP) extension for sharing vCard and social network accounts information between the MPM Server, MPM Client, and social network sites (SNSs). . Therefore many web users need to manage disparate profiles across many distributed online sources. Maintaining these profiles is cumbersome, time-consuming, inefficient, and may lead to lost opportunity. The writer of this thesis adopted a research approach and a number of use cases for the implementation of the project. The use cases were created to capture the functional requirements of the MPM and to describe the interactions between users and the MPM. In the research a development process was followed in establishing the prototype and related protocols. The use cases were subsequently used to illustrate the prototype via the screenshots taken of the MPM client interfaces. The use cases also played a role in evaluating the outcomes of the research such as the framework, prototype, and the related protocols. An innovative application of this project is in the area of public health informatics. The researcher utilised the prototype to examine how the framework might benefit patients and physicians. The framework can greatly enhance health information management for patients and more importantly offer a more comprehensive personal health overview of patients to physicians. This will give a more complete picture of the patient’s background than is currently available and will prove helpful in providing the right treatment. The MPM prototype and related protocols have a high application value as they can be integrated into the real OSW platform and so serve users in the modern digital world. They also provide online users with a real platform for centrally storing their complete profile data, efficiently managing their personal information, and moreover, synchronising the overall complete profile with each of their discrete profiles stored in their different social network sites.
Resumo:
Exploring information use within everyday or community contexts is a recent area of interest for information literacy research endeavors. Within this domain, health information literacy (HIL) has emerged as a focus of interest due to identified synergies between information use and health status. However, while HIL has been acknowledged as a core ingredient that can assist people to take responsibility for managing and improving their own health, limited research has explored how HIL is experienced in everyday community life. This article will present the findings of ongoing research undertaken using phenomenography to explore how HIL is experienced among older Australians within everyday contexts. It will also discuss how these findings may be used to inform policy formulation in health communication and as an evidence base for the design and delivery of consumer health information resources and services.
Resumo:
Exploring information use within everyday or community contexts is a recent area of interest for information literacy research endeavours. Within this domain, health information literacy (HIL) has emerged as a focus of interest due to identified synergies between information use and health status. However, while HIL has been acknowledged as a core ingredient that can assist people to take responsibility for managing and improving their own health, limited research has explored how HIL is experienced in everyday community life. This article will present the findings of ongoing research undertaken using phenomenography to explore how HIL is experienced among older Australians within everyday contexts. It will also discuss how these findings may be used to inform policy formulation in health communication and as an evidence base for the design and delivery of consumer health information resources and services.
Resumo:
Effective enterprise information security policy management requires review and assessment activities to ensure information security policies are aligned with business goals and objectives. As security policy management involves the elements of policy development process and the security policy as output, the context for security policy assessment requires goal-based metrics for these two elements. However, the current security management assessment methods only provide checklist types of assessment that are predefined by industry best practices and do not allow for developing specific goal-based metrics. Utilizing theories drawn from literature, this paper proposes the Enterprise Information Security Policy Assessment approach that expands on the Goal-Question-Metric (GQM) approach. The proposed assessment approach is then applied in a case scenario example to illustrate a practical application. It is shown that the proposed framework addresses the requirement for developing assessment metrics and allows for the concurrent undertaking of process-based and product-based assessment. Recommendations for further research activities include the conduct of empirical research to validate the propositions and the practical application of the proposed assessment approach in case studies to provide opportunities to introduce further enhancements to the approach.
Resumo:
The privacy of efficient tree-based RFID authentication protocols is heavily dependent on the branching factor on the top layer. Indefinitely increasing the branching factor, however, is not a viable option. This paper proposes the alternate-tree walking scheme as well as two protocols to circumvent this problem. The privacy of the resulting protocols is shown to be comparable to that of linear-time protocols, where there is no leakage of information, whilst reducing the computational load of the database by one-third of what is required of tree-based protocols during authentication. We also identify and address a limitation in quantifying privacy in RFID protocols.
Resumo:
In the last 10 years, the third sector has seen an eruption of texts, websites, discussion forums, conferences, new journals, new research centres and sector-specific degrees. This growing abundance of information allows for hitherto impossible networking, collaboration and general awareness of what is happening in the sector. At the same time, however, like staff in many industries, nonprofit professionals can suffer from an increasingly common 21st century malaise known as ‘information anxiety’. It is worth examining the sector through the lens of Information Studies theory, to question what the information technology needs of nonprofits are and how their information management techniques may differ from those in the public and private sectors. There are implications of this both for those within the industry (in terms of governance, training and public relations) and those external to it (who may form relationships with nonprofits on the basis of access to information).
Resumo:
Each year QUT’s Centre of Philanthropy and Nonprofit Studies collects and analyses statistics on the extent of tax-deductible donations claimed by Australians in their individual income tax returns to deductible gift recipients (DGRs). The information presented below is based on the amount and type of tax-deductible donations claimed by Australian taxpayers to deductible gift recipients (DGRs) for the period 1 July 1999 to 30 June 2000. This information has been extracted from the Australian Taxation Office's publication Taxation Statistics 1999-2000 which provides an overview and profile of the income and taxation status of Australian taxpayers using information extracted from their income tax returns for the period 1 July 1999 to 30 June 2000. The 1999/2000 report is the latest report that has been made publicly available...
Resumo:
Understanding the business value of IT has mostly been studied in developed countries, but because most investment in developing countries is derived from external sources, the influence of that investment on business value is likely to be different. We test this notion using a two-layer model. We examine the impact of IT investments on firm processes, and the relationship of these processes to firm performance in a developing country. Our findings suggest that investment in different areas of IT positively relates to improvements in intermediate business processes and these intermediate business processes positively relate to the overall financial performance of firms in a developing country.
Resumo:
Organisations devote substantial resources to acquire information technology (IT), and explaining the important issue of how IT can affect performance has posed a significant challenge to information system (IS) researchers. Owing to the importance of expanding our understanding on how and where IT and IT-related resources impact organisational performance, this study investigates the differential effects of IT resources and IT-related capabilities, in the presence of platform-related complementarities, on business process performance. We test these relationships empirically via a field survey of 216 firms. The findings suggest that IT resources and IT-related capabilities explain variance in performance. Of interest is the finding that IT resources and IT-related capabilities ability to explain variance in business process is further enhanced by the presence of the platform-related complementarities. Our findings are largely consistent with the resource-based and complementarity arguments of sources of IT-related business value.
Resumo:
Understanding information technology’s (ITs) contribution to business value is an imperative issue, and while we have attempted to untangle the relationship between IT and business value with some success, our knowledge of specific factors leading to ITs contribution to business value still remains limited. In this paper we propose that complementing IT resources, by establishing a sound IT platform with capable organisational resources may aid in ITs ability to contribute to business value. We suggest that performance measurement of this contribution be undertaken at the business process level first, and then mapped through to firm level performance measurement to obtain a better understanding of the path of IT business value contribution.
Resumo:
We examine the relationship between the effectiveness of IT steering committee-driven IT governance initiatives and firm’s IT management and IT infrastructure related capabilities. We test these relationships empirically by a field survey of 216 firms. Results of this study suggest that a firms’ effectiveness of IT steering committee-driven IT governance initiatives positively relate to the level of their IT-related capabilities. We also found positive relationships between IT-related capabilities and internal process-level performance, which positively relate to improvement in customer service and firm-level performance. For researchers, we demonstrate that the resourcebased theory provides a more robust explanation of the determinants of firms IT governance initiatives. This would be ideal in evaluating other IT governance initiatives effectiveness in relation to how they contribute to building performance-differentiating IT-related capabilities. For decision makers, we hope our study has reiterated the notion that IT governance is truly a coordinated effort, embracing all levels of human resources.
Resumo:
This book provides the much needed international dimension on the payoffs of information technology investments. The bulk of the research on the impact of information technology investments has been undertaken in developed economies, mainly the United States. This research provides an alternative dimension - a developing country perspective on how information technology investments impacts organizations. Secondly, there has been much debate and controversy on how we measure information technology investment payoffs. This research uses an innovative two-stage model where it proposes that information technology investments will first impact the process and improvement in the processes will then impact the performance. In doing so, it considers sectors of information technology investment rather than taking it as one. Finally, almost all prior studies in this area have considered only the tangible impact of information technology investments. This research proposes that one can only better understand the benefits by looking at both the tangible and intangible benefits.
Resumo:
Social media networks have emerged as a powerful tool in allowing collaboration and sharing of information during times of crisis (Bruns, The Centre for Creative Industries Blog, comment posted on January 19,2011). The 2011 Queensland floods provided a unique opportunity to explore social media use during an emergency. This paper presents the findings of a pilot study that explored the information experiences of people using social media during the flooding of the Brisbane River. Analysis of data from four interviews supported the emergence of four categories of information experience. Examination of the categories revealed variation between the way in which individuals experienced social media and the point of the flooding at which each category of experience occurred. Information regarding individual’s use of social media has the potential to inform the development of social media platforms that can provide relevant and accessible information for the general public in event of a natural disaster.