809 resultados para Relevance of information
Resumo:
For over 30. years information-processing approaches to leadership and more specifically Implicit Leadership Theories (ILTs) research has contributed a significant body of knowledge on leadership processes in applied settings. A new line of research on Implicit Followership Theories (IFTs) has re-ignited interest in information-processing and socio-cognitive approaches to leadership and followership. In this review, we focus on organizational research on ILTs and IFTs and highlight their practical utility for the exercise of leadership and followership in applied settings. We clarify common misperceptions regarding the implicit nature of ILTs and IFTs, review both direct and indirect measures, synthesize current and ongoing research on ILTs and IFTs in organizational settings, address issues related to different levels of analysis in the context of leadership and follower schemas and, finally, propose future avenues for organizational research. © 2013 Elsevier Inc.
Resumo:
DUE TO COPYRIGHT RESTRICTIONS ONLY AVAILABLE FOR CONSULTATION AT ASTON UNIVERSITY LIBRARY AND INFORMATION SERVICES WITH PRIOR ARRANGEMENT
Resumo:
DUE TO COPYRIGHT RESTRICTIONS ONLY AVAILABLE FOR CONSULTATION AT ASTON UNIVERSITY LIBRARY AND INFORMATION SERVICES WITH PRIOR ARRANGEMENT
Resumo:
The article looks first into the nature of the relations between Germany and the CEE countries a decade since the accession of the CEE countries to the EU. The relations are characterized as normalised and intensive with diverse levels of closeness and co-operation reflecting of the conceptual and ideological compatibility/differences. Next, the article focuses on the German attitude to the euro zone crisis. Germany has become a hegemon in the rescue effort aimed at stabilisation and economic invigoration of the euro zone. However, German hegemony has developed by default, not by design: her leading position is linked with considerable political and financial costs. Germany moved central stage and took the position of a reluctant hegemon. However, German role is contested internationally (it has not the support of the French government in key areas) as well as internally (particularly by the Federal Constitutional Court and the Bundesbank).The article argues that the new situation makes the German-CEE relations increasingly relevant for both sides. The German leadership of the EU increasing split along the north-south divide requires backing by the Northern group countries to which the CEE in general belongs. Given a number of reasons the CEE countries implement three distinctive strategies of co-operation with Germany in European politics. Also military co-operation, which remained rather limited so far, may receive new impulses, given the financial austerity. © 2013 The Regents of the University of California.
Resumo:
Information and Communications Technology (ICT) is widely regarded as a key integration enabler in contemporary supply chain configurations. Furthermore, recent years have seen the vertical disintegration of supply chains as increasing numbers of manufacturers and retailers outsource significant parts of their supply chain functionality. In this environment, Third Party Logistics (3PL) providers - the majority of which are small companies - play a pivotal role. This raises important questions about the usage of ICT in this sector. However, there is a paucity of research in the field of small 3PLs with little empirical investigation into the usage of ICT by such firms. This paper presents the results of a survey on ICT systems usage in a sample of small Italian 3PLs. The results provide a technological profile of the surveyed companies, as well as an analysis of the role of ICT in customising services and of the factors influencing technology adoption.
Resumo:
This article focuses on the relevance of undergraduate business and management higher education from the perspectives of recent graduates and graduate employers in four European countries. Drawing upon the findings of an empirical qualitative study in which data was collated and analysed using grounded theory research techniques, the paper draws attention to graduates' and employers' perceptions of the value of higher education in equipping students with discipline-specific skills and knowledge as well as softer 'generic' skills. It also highlights the importance of formal 'work-based' learning within undergraduate curricula in providing students with the skills and experiences required by employers operating within a global workplace. © 2014 John Wiley & Sons Ltd.
Resumo:
The behaviour of short fatigue cracks is shown to be relevant only to a limited number of engineering situations. Within these situations, further restrictions on the extent to which metallurgical control can be exerted to improve fatigue crack growth behaviour are identified. The degree of control remaining is discussed in terms of two separate regimes which are described as intrinsic and extrinsic crack growth resistance. These separate effects are highlighted by comparisons both within and between a wide range of alloy systems. The implications of such an analysis are discussed in terms of aerospace applications.
Resumo:
In this paper a possibility for quantitative measuring of information security of objects, exposed to information attacks and processed with methods of compression, is represented. A co-efficient of information security, which reflects the influence of the level of compression obtained after applying methods of compression to objects and the time, required by the attack to get access to the corresponding object, is proposed. Methods’ groups with the highest and respectively the lowest values of the co-efficient of information security for all methods’ groups in relation to all attacks’ groups are determined. Assessments and conclusions for future investigations are proposed.
Resumo:
In this paper a methodology for evaluation of information security of objects under attacks, processed by methods of compression, is represented. Two basic parameters for evaluation of information security of objects – TIME and SIZE – are chosen and the characteristics, which reflect on their evaluation, are analyzed and estimated. A co-efficient of information security of object is proposed as a mean of the coefficients of the parameter TIME and SIZE. From the simulation experiments which were carried out methods with the highest co-efficient of information security had been determined. Assessments and conclusions for future investigations are proposed.
Resumo:
The compact and visualized documenting of information business modeling is a major prerequisite for comprehending its basic concepts, as well as for its effective application and improvement. The documenting of this process is related to its modeling. Thus, the process of information business modeling can be represented by its own tools. Being based on this thesis, the authors suggest an approach to representing the process of information business modeling. A profile for its documenting has been developed for the purpose.
Resumo:
This article describes the approach, which allows to develop information systems without taking into consideration details of physical storage of the relational model and type database management system. Described in terms of graph model, this approach allows to construct several algorithms, for example, for verification application domain. This theory was introduced into operation testing as a part of CASE-system METAS.
Resumo:
The article proposes the model of management of information about program flow analysis for conducting computer experiments with program transformations. It considers the architecture and context of the flow analysis subsystem within the framework of Specialized Knowledge Bank on Program Transformations and describes the language for presenting flow analysis methods in the knowledge bank.