996 resultados para Business Establishment


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper consists of a detailed case narrative on how a leading Australian Finance organisation has utilised contemporary Business Process Management (BPM) concepts for improving the IT incident management processes within the whole organisation. The target audience includes practitioners who are interested in BPM case studies and Academics who may be seeking case studies for innovative teaching practices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"Globalisation‟ and the "global knowledge economy‟ have become some of the most common "buzzwords‟ in Australian business, economic, and social sectors in the past decade. Further, knowledge service exports are a growing sector for Australia that utilise complex technical and creative capacities, increasingly rely on virtual work innovations, require new socio-technical systems to establish and maintain effective client relationships in global contexts; and – along with other innovations in the electronic age – may require novel coping abilities on the part of both managers and their employees to achieve desired outcomes (Bandura, 2002). Accordingly, this paper overviews such trends. The paper also includes a research agenda which is a "work-in-progress‟ with a major global company, Shell (Australia); it highlights both the objectives and proposed methodology of the study; it also outlines anticipated key benefits arising from the research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Business Process Management (BPM) has been identified as the number one business priority by a recent Gartner study (Gartner, 2005). However, BPM has a plethora of facets as its origins are in Business Process Reengineering, Process Innovation, Process Modelling, and Workflow Management to name a few. Organisations increasingly recognize the requirement for an increased process orientation and require appropriate comprehensive frameworks, which help to scope and evaluate their BPM initiative. This research project aims toward the development of a holistic and widely accepted BPM maturity model, which facilitates the assessment of BPM capabilities. This paper provides an overview about the current model with a focus on the actual model development utilizing a series of Delphi studies. The development process includes separate studies that focus on further defining and expanding the six core factors within the model, i.e. strategic alignment, governance, method, Information Technology, people and culture.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many studies have been carried out in relation to construction procurement methods. Evidence shows that there needs to be a change of culture and attitude in the construction industry, moving away from traditional adversarial relationship into cooperative and collaborative relationship. At the same time there is also an increasing concern and discussion on alternative procurement methods, drifting away from traditional procurement systems. Relational contracting approaches have become more popular in recent years, and have appeared in common forms such as partnering, alliancing and relationship management contracts. This paper reports the findings of a survey undertaken with a private organisation based on an alliance project during its design stage, identifying the critical factors that influence the success of the alliance project. Legal aspects focusing on dispute resolution in alliancing are also highlighted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange (IKE). Our protocols can be implemented using different concrete mechanisms and we discuss different options; in particular we suggest solutions based on elliptic curve pairings. The protocol designs use the modular construction method of Canetti and Krawczyk which provides the basis for a proof of security. Our schemes can, in some situations, be more efficient than existing IKE protocols as well as having stronger deniability properties.