850 resultados para Enterprises
Resumo:
Technology has advanced in such a manner that the world can now communicate in means previously never thought possible. These new technologies have not been overlooked by transnational organized crime groups and networks of corruption, and have been exploited for criminal success. This text explores the use of communication interception technology (CIT), such as phone taps or email interception, and its potential to cause serious disruption to these criminal enterprises. Exploring the placement of communication interception technology within differing policing frameworks, and how they integrate in a practical manner, the authors demonstrate that CIT is best placed within a proactive, intelligence-led policing framework. They also indicate that if law enforcement agencies in Western countries are serious about fighting transnational organized crime and combating corruption, there is a need to re-evaluate the constraints of interception technology, and the sceptical culture that surrounds intelligence in policing. Policing Transnational Organized Crime and Corruption will appeal to scholars of Law, Criminal Justice and Police Science as well as intelligence analysts and police and security intelligence professionals.
Resumo:
In recent times, technology has advanced in such a manner that the world can now communicate in means previously never thought possible. Transnational organised crime groups, who have exploited these new technologies as basis for their criminal success, however, have not overlooked this development, growth and globalisation. Law enforcement agencies have been confronted with an unremitting challenge as they endeavour to intercept, monitor and analyse these communications as a means of disrupting the activities of criminal enterprises. The challenge lies in the ability to recognise and change tactics to match an increasingly sophisticated adversary. The use of communication interception technology, such as phone taps or email interception, is a tactic that when used appropriately has the potential to cause serious disruption to criminal enterprises. Despite the research that exists on CIT and TOC, these two bodies of knowledge rarely intersect. This paper builds on current literature, drawing them together to provide a clearer picture of the use of CIT in an enforcement and intelligence capacity. It provides a review of the literature pertaining to TOC, the structure of criminal enterprises and the vulnerability of communication used by these crime groups. Identifying the current contemporary models of policing it reviews intelligence-led policing as the emerging framework for modern policing. Finally, it assesses the literature concerning CIT, its uses within Australia and the limitations and arguments that exist. In doing so, this paper provides practitioners with a clearer picture of the use, barriers and benefits of using CIT in the fight against TOC. It helps to bridge the current gaps in modern policing theory and offers a perspective that can help drive future research.
Resumo:
Although the tourism industry has been dramatically altered due to the Internet, there has been limited research published about international entrepreneurial values and Internet use in tourism firms. The findings of this study point to a relationship between the values of Internet-enabled international entrepreneurs in small-sized to medium-sized enterprises and the inclination of the firm to develop and initiate international activity. The findings of this study suggest that Internet-enabled tourism entrepreneurs share similar construct values. Two effective but underutilized qualitative methods were used in this study. The first method, repertory test, is an efficient technique for exploring constructs in decision making; the second method, laddering analysis, facilitates understanding of the perceived consequences and personal values guiding behaviour.
Resumo:
This paper focuses on Australian development firms in the console and mobile games industry in order to understand how small firms in a geographically remote and marginal position in the global industry are able to relate to global firms and capture revenue share. This paper shows that, while technological change in the games industry has resulted in the emergence of new industry segments based on transactional rather than relational forms of economic coordination, in which we might therefore expect less asymmetrical power relations, lead firms retain a position of power in the global games entertainment industry relative to remote developers. This has been possible because lead firms in the emerging mobile devices market have developed and sustained bottlenecks in their segment of the industry through platform competition and the development of an intensely competitive ecosystem of developers. Our research shows the critical role of platform competition and bottlenecks in influencing power asymmetries within global markets.
Resumo:
This paper presents the theory and practice of the Futures Action Model (FAM). FAM has been in development for over a decade, in a number of contexts and iterations. It is a creative methodology that uses a variety of concepts and tools to guide participants through the conception and modeling of enterprises, services, social innovations and projects in the context of emerging futures. It is used to generate strategic options that people can utilise to build opportunities for value creation as they move into the future. This paper details examples in its development, and provides theoretical and practical guidelines for educators and business facilitators to use the FAM system in their own workplaces.
Resumo:
Since the 1970s, the Uppsala stages model has been one of the dominant explanations of firm internationalization. The model's focus on internationalization as a firm's gradual and incremental process of increasing international involvement has attracted much debate, with one criticism being that it is unclear in explaining how the internationalization process first originates within a firm. In this paper, the Uppsala model is extended through the incorporation of a pre-internationalization phase to explore the antecedents of firm internationalization. Adopting the Uppsala model's theoretical underpinnings, this paper develops and operationalizes a pre-internationalization phase decision heuristic in the form of an ‘export readiness index'. Four constructs are proposed that drive and inhibit export commencement decision-making during a firm's preinternationalization phase: export stimuli, attitudinal/psychological commitment, resources and lateral rigidity. Through a survey of Australian exporting and non-exporting small-medium sized enterprises (SMEs), the Export Readiness Index (ERI) is developed through factor analysis and tested using logistic regression. Results of the study and their potential implications are discussed.
Resumo:
This paper surveys the practical benefits and drawbacks of several identity-based encryption schemes based on bilinear pairings. After providing some background on identity-based cryptography, we classify the known constructions into a handful of general approaches. We then describe efficient and fully secure IBE and IBKEM instantiations of each approach, with reducibility to practice as the main design parameter. Finally, we catalogue the strengths and weaknesses of each construction according to a few theoretical and many applied comparison criteria.
Resumo:
We present two unconditional secure protocols for private set disjointness tests. In order to provide intuition of our protocols, we give a naive example that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the intersection cardinality. More specifically, it discloses its lower bound. By using the Lagrange interpolation, we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. In this protocol, a verification test is applied to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and computation overhead. Unlike previous protocols whose security relies on computational assumptions, our protocols provide information theoretic security. To our knowledge, our protocols are the first ones that have been designed without a generic secure function evaluation. More important, they are the most efficient protocols for private disjointness tests in the malicious adversary case.
Resumo:
Repair, maintenance, minor alteration, and addition work (RMAA) has become more and more important in developed societies, but its safety performance is alarming. For example, RMAA projects accounted for 53.2% of the total construction market and the percentage of RMAA accidents to all construction accidents in the Hong Kong Special Administrative Region (HKSAR) increased considerably in 2007. The RMAA sector has a huge potential for safety improvement. This study aims to explore and evaluate the difficulties of implementing safety practices in RMAA work. The mixed methods approach was adopted, and semistructured interviews and a two-round Delphi survey were conducted for the data collection. Major difficulties were identified, including limited safety resources for small and medium enterprises (SMEs), difficulty in changing the mindset of RMAA workers, and difficulty in performing safety supervision. These obstacles for implementing safety practices in the RMAA sector, if successfully removed, could significantly improve the safety performance of the RMAA sector and the construction industry as a whole.
Resumo:
Enterprises, both public and private, have rapidly commenced using the benefits of enterprise resource planning (ERP) combined with business analytics and “open data sets” which are often outside the control of the enterprise to gain further efficiencies, build new service operations and increase business activity. In many cases, these business activities are based around relevant software systems hosted in a “cloud computing” environment. “Garbage in, garbage out”, or “GIGO”, is a term long used to describe problems in unqualified dependency on information systems, dating from the 1960s. However, a more pertinent variation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems, such as ERP and usage of open datasets in a cloud environment, the ability to verify the authenticity of those data sets used may be almost impossible, resulting in dependence upon questionable results. Illicit data set “impersonation” becomes a reality. At the same time the ability to audit such results may be an important requirement, particularly in the public sector. This paper discusses the need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment and analyses some current technologies that are offered and which may be appropriate. However, severe limitations to addressing these requirements have been identified and the paper proposes further research work in the area.
Resumo:
Safety of repair, maintenance, alteration, and addition (RMAA) works have long been neglected because RMAAworks are often minute and only last for a short period of time. With rising importance of the RMAA sector in many developed societies, safety of RMAA works has begun to draw attention. Many RMAA contracting companies are small- and medium-sized enterprises (SMEs) that do not have comprehensive safety management systems. Existing safety legislation and regulations for new construction sites are not fully applicable to RMAAworks. Instead of relying on explicit and well-established safety systems, tacit safety knowledge plays an extremely important role in RMAA projects. To improve safety of RMAAworks, safety knowledge should be better managed. However, safety knowledge is difficult to capture in RMAA works. This study aims to examine safety management practices of RMAA contracting companies to see how safety knowledge of RMAA projects is managed. Findings show that RMAA contracting companies undertaking large-scale RMAA projects have more initiatives of safety management. Safety management of small-scale RMAA works relies heavily on the motivation of site supervisors and self-regulation of workers. Better tacit knowledge management improves safety performance. To enhance safety capability of RMAA contracting companies, a knowledge sharing culture should be cultivated. The government should provide assistance to SMEs to implement proper safety management practices in small-sized projects. Potentials of applying computer software technology in RMAA projects to capture, store, and retrieve safety information should be explored. Employees should be motivated to share safety knowledge by giving proper recognition to those who are willing to share.
Resumo:
In this paper we discuss the social, economic and institutional aspects of the development of carbon management systems within Australia's tropical savannas. Land-use values in savanna landscapes are changing as a result of changing economic markets, greater recognition of native title, and growing social demands and expectations for tourism, recreation and conservation. In addition, there is increasing interest in developing markets and policy arrangements for greenhouse gas abatement, carbon sequestration and carbon trade in savannas. We argue that for carbon management to lead to national greenhouse outcomes, attention must be paid to social, economic and institutional issues in environmental planning and policy arrangements. From an economic perspective, the financial impact of carbon management on savanna enterprises will depend on appropriate and available policy mechanisms, unit price for carbon, landscape condition, existing management strategies and abatement measurements used. Local social and cultural features of communities and regions may enhance or constrain the implementation of carbon abatement strategies, depending on how they are perceived. In terms of institutional arrangements, policies and plans must support and enable carbon management. We identify three areas that require priority investigation and adjustment: regional planning arrangements, property rights, and rules for accounting at enterprise and regional scales. We conclude that the best potential for managing for carbon will be achieved while managing for range of other natural resource management outcomes, especially where managing for carbon delivers collateral benefits to enterprises.
Resumo:
This special issue of the International Journal of Technology Policy and Law considers recent developments in the reconfiguration of communication regulation to account for the impact of media convergence. It is readily apparent that media worldwide are going through a series of transformations, associated with the rise of the internet, user-created content and social media. The papers in the collection draw upon legal and policy developments in Australia, the European union and South Korea, and consider such issues as public participation in media policy and regulation, civic media governance for online platforms, the future copyright laws, the roles and responsibilities of internet intermediaries, and regulatory frameworks for internet protocol television (IPTV).
Resumo:
A salient but rarely explicitly studied characteristic of interfirm relationships is that they can intentionally be formed for finite periods of time. What determines firms' intertemporal choices between different alliance time horizons? Shadow of the future theorists suggest that when an alliance has an explicitly set short-term time frame, there is an increased risk that partners may behave opportunistically. This does not readily explain the high incidence of time-bound alliances being formed. Reconciling insights from the shadow of the future perspective with nascent research on the flexibility of temporary organizations, and shifting the focus from the level of individual transactions to that of strategic alliance portfolios, we argue that firms may be willing to accept a higher risk of opportunism when there are offsetting gains in strategic flexibility in managing their strategic alliance portfolio. Consequently, we hypothesize that environmental factors that increase the need for strategic flexibility—namely, dynamism and complexity in the environment—are likely to increase the relative share of time-bound alliances in strategic alliance portfolios. Our analysis of longitudinal data on the intertemporal alliance choices of a large sample of small and medium-sized enterprises provides support for this argument. Our findings fill an important gap in theory about time horizons in interfirm relationships and temporary organizations and show the importance of separating planned terminations from duration-based performance measures.
Resumo:
Besides classical criteria such as cost and overall organizational efficiency, an organization’s ability to being creative and to innovate is of increasing importance in markets that are overwhelmed with commodity products and services. Business Process Management (BPM) as an approach to model, analyze, and improve business processes has been successfully applied not only to enhance performance and reduce cost but also to facilitate business imperatives such as risk management and knowledge management. Can BPM also facilitate the management of creativity? We can find many examples where enterprises unintentionally reduced or even killed creativity and innovation for the sake of control, performance, and cost reduction. Based on the experiences we have made within case studies with organizations from the creative industries (film industry, visual effects production, etc.,) we believe that BPM can be a facilitator providing the glue between creativity management and well-established business principles. In this article we introduce the notions of creativity-intensive processes and pockets of creativity as new BPM concepts. We further propose a set of exemplary strategies that enable process owners and process managers to achieve creativity without sacrificing creativity. Our aim is to set the baseline for further discussions on what we call creativity-oriented BPM.