813 resultados para Civil service ethics.


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Technology-based self-service (TBSS) enables consumers to complete services themselves using a technological interface. As evaluations of consumer satisfaction and commitment have typically focused on interpersonal interactions, the effect of TBSS on these is under researched . This paper explores the impact of TBSS on consumer satisfaction and on a multidimensional measure of consumer commitment.Data are collected from 241 hotel guests. The results suggest personal-service is more important for satisfaction and commitment. This has implications for marketing as the benefits of adopting TBSS are not clear. Multi-dimensional commitment provides some interesting findings and suggests the need for further research into TBSS and commitment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Traditionally, service encounters have included an interpersonal interaction between the service provider and the customer. The introduction ofself-service technologies to the service encounter, however, is reducing and in some cases, eliminating this interpersonal interaction. Self-se rvice technology is where the customer delivers the service themselves using a technological interface. This CIM funded research programme investigates the effect of self-service technology on the service encounter, and in turn on consumer satisfaction and consumer commitment. This paper reviews the literature relevant to the current study and outlines the constructs of interest in this study. The resear ch hypotheses and conceptual model are also introduced.Finally, the agenda for future research is presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Consumersatisfaction is fundamental to organisational success. It is well recognised that personal service is important in achieving consumer satisfaction. However, the application of self-service technology (SST) is widcning and is attennuating traditional exchanges between consumers and service employees. The effect of this reduction of personal service on consumer satisfaction judgements is not well understood. This study addresses this gap by investigating the relative effects of SST and personal service attributes on overall consumer satisfaction. Thc study highlights important service attributes applicable to SST and personal service. The conceptual framework is tested using data collected from 241 leisure and business travellers drawn from premium hotels in a regional area. Structural equation modelling techniques support the conceptual framework. As expected, the attributes of personal service and SST contribute to consumer satisfaction. However, thc impact of personal service attributes 011 consumer satisfaction is much stronger than the effects of SST attributes. Though SST is an important determinant of consumer satisfaction, interactions with staff are critical. These results have applications for the theory and practice of services marketing, and high light avenues for further investigation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

lnformation technology (IT) and, in particular, the Internet is dramatically impacting on the services sector. This paper specifically investigates the relative impact of several forms of internet use on perceived performance for two groups of service organisations - retail service firms and professlonal health service firms. Using a mailed out self-administered questionnaire, 625 completed questionnaires were obtained and 43 per cent of respondents reported that they used the lternet. Thus the final usable sample in the study comprised 262 respondents. Results showed that the Internet does significantly influence perceived performance in both types of service firms. However,there are differences in the forms of lntemet use between the two service groups and their relative effect on performance. For retail firms, use of transactional function, such as ordering, selling and payment was found to be positively related to increases in perceived performance. In contrast, for professional health service firms, the ability to search for information on products and/or services was found to be positively associated with perceived performance. Finally, theoretical and managerial implications of the findings of this study are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study investigates variation in IT professionals' experience of ethics with a view to enhancing their formation and support. This is explored through an examination of the experience of IT, IT professional ethics and IT professional ethics education. The study's principal contribution is the empirical study and description of IT professionals' experience of ethics. The empirical phase is preceded by a review of conceptions of IT and followed by an application of the findings to IT education. The study's empirical findings are based on 30 semi-structured interviews with IT professionals who represent a wide demographic, experience and IT sub-discipline range. Their experience of ethics is depicted as five citizenships: Citizenship of my world, Citizenship of the corporate world, Citizenship of a shared world, Citizenship of the client's world and Citizenship of the wider world. These signify an expanding awareness, which progressively accords rights to others and defines responsibility in terms of others. The empirical findings inform a Model of Ethical IT. This maps an IT professional space increasingly oriented towards others. Such a model provides a conceptual tool, available to prompt discussion and reflection, and which may be employed in pursuing formation aimed at experiential change. Its usefulness for the education of IT professionals with respect to ethics is explored. The research approach employed in this study is phenomenography. This method seeks to elicit and represent variation of experience. It understands experience as a relationship between a subject (IT professionals) and an object (ethics), and describes this relationship in terms of its foci and boundaries. The study's findings culminate in three observations, that change is indicated in the formation and support of IT professionals in: 1. IT professionals' experience of their discipline, moving towards a focus on information users; 2. IT professionals' experience of professional ethics, moving towards the adoption of other-centred attitudes; and 3. IT professionals' experience of professional development, moving towards an emphasis on a change in lived experience. Based on these results, employers, educators and professional bodies may want to evaluate how they approach professional formation and support, if they aim to promote a comprehensive awareness of ethics in IT professionals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A key concern organisations face is how to incorporate Internet tools into their marketing communications mix. Where and how should companies invest their human, technological and financial resources? This paper explores a subset of this problem, online complaining and electronic customer service. It applies diffusion of innovation as a theoretical framework to investigate organisational implementation of email technology and explain the outcome of annual customer service surveys in 2001, 2002 and 2003. The results add to the small body of research on electronic service recovery by extending diffusion of innovations to email service recovery and underscoring the importance of adoption phases, particularly for SMEs. Larger companies provide more channels for submitting complaints, which represents an early phase of adoption. There was little difference in how large and small companies respond to online complaints, a later phase of adoption.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the advent of Service Oriented Architecture, Web Services have gained tremendous popularity. Due to the availability of a large number of Web services, finding an appropriate Web service according to the requirement of the user is a challenge. This warrants the need to establish an effective and reliable process of Web service discovery. A considerable body of research has emerged to develop methods to improve the accuracy of Web service discovery to match the best service. The process of Web service discovery results in suggesting many individual services that partially fulfil the user’s interest. By considering the semantic relationships of words used in describing the services as well as the use of input and output parameters can lead to accurate Web service discovery. Appropriate linking of individual matched services should fully satisfy the requirements which the user is looking for. This research proposes to integrate a semantic model and a data mining technique to enhance the accuracy of Web service discovery. A novel three-phase Web service discovery methodology has been proposed. The first phase performs match-making to find semantically similar Web services for a user query. In order to perform semantic analysis on the content present in the Web service description language document, the support-based latent semantic kernel is constructed using an innovative concept of binning and merging on the large quantity of text documents covering diverse areas of domain of knowledge. The use of a generic latent semantic kernel constructed with a large number of terms helps to find the hidden meaning of the query terms which otherwise could not be found. Sometimes a single Web service is unable to fully satisfy the requirement of the user. In such cases, a composition of multiple inter-related Web services is presented to the user. The task of checking the possibility of linking multiple Web services is done in the second phase. Once the feasibility of linking Web services is checked, the objective is to provide the user with the best composition of Web services. In the link analysis phase, the Web services are modelled as nodes of a graph and an allpair shortest-path algorithm is applied to find the optimum path at the minimum cost for traversal. The third phase which is the system integration, integrates the results from the preceding two phases by using an original fusion algorithm in the fusion engine. Finally, the recommendation engine which is an integral part of the system integration phase makes the final recommendations including individual and composite Web services to the user. In order to evaluate the performance of the proposed method, extensive experimentation has been performed. Results of the proposed support-based semantic kernel method of Web service discovery are compared with the results of the standard keyword-based information-retrieval method and a clustering-based machine-learning method of Web service discovery. The proposed method outperforms both information-retrieval and machine-learning based methods. Experimental results and statistical analysis also show that the best Web services compositions are obtained by considering 10 to 15 Web services that are found in phase-I for linking. Empirical results also ascertain that the fusion engine boosts the accuracy of Web service discovery by combining the inputs from both the semantic analysis (phase-I) and the link analysis (phase-II) in a systematic fashion. Overall, the accuracy of Web service discovery with the proposed method shows a significant improvement over traditional discovery methods.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Business Service Management describes the emerging discipline dedicated to the IT-enabled management of services as corporate assets. Business Service Management deals with the service orientation of the organisation and the provisioning and use of business services. The term business service describes an autonomous transformational capability that is offered to and consumed by external or internal customers for their benefit. The prefix ‘business’ stresses that such a service has a market value, requires the ability to be managed internally as a corporate asset and that its implementation is technology-agnostic. While business services (or so called capabilities) have attracted the attention of many vendors and organisations, a lack of understanding of the activities required for the successful management of such business services remains a critical issue. In order to fill this gap, a framework consisting of Service Lifecycle Management, Service Value Management, Service Relationship Management and Service Enablement is proposed. This Framework has the potential to provide organisations with the much needed guidance in their attempts to convert current IT-driven service initiatives into successful service-centric business models.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Encouraging Ethics and Preventing Corruption brings theory and practice together in addressing the question: How are we to be ethical in public life and through public institutions? It is a major contribution to public sector ethics within Australia and internationally because it provides an exhaustive analysis of reform across a decade in one jurisdiction, Queensland, and then proceeds to itemise a best practice integrity system or ethics regime. Drawing on the extensive research of two of Australia's leading practical ethicists, this text is essential reading for all students and practitioners of applied and professional ethics in the public sphere. Part A of the text provides a preferred theoretical and conceptual framework which both justifies and guides the development of a public sector ethics regime. Part B examines the place of the individual within a world of institutional ethics. Part C outlines the Queensland governance reforms introduced since 1989 following the Fitzgerald Inquiry which exposed corruption in the police and ministry. The final chapter, the 'Epilogue', gathers the insights of earlier chapters and suggests a more explicitly ethics-centred approach to governance reform that may take us 'beyond best practice'. Clearly, while it is the Australian context we have in mind, we are confident that this is a text which addresses the quest for integrity and ethics in government wherever society is committed to social and liberal democratic ideals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Various reasons have been proffered for female under-representation in tertiary information technology (IT) courses and the IT industry with most relating to cultural moirés. The 2006 Geek Goddess calendar was designed to alter IT’s “geeky image” and the term is used here to represent young women enrolled in pre-service IT teaching courses. Their special mix of IT and teaching draws on conflicting stereotypes and represents a micro-climate which is typically lost in studies of IT occupations because of the aggregation of all IT roles. This paper will report on a small-scale investigation of female students (N=25) at a university in Queensland (Australia) studying to become teachers of secondary IT subjects. They are entering the IT industry, gendered as a “male” occupation, through the safe space of teaching a discipline allied to feminine qualities of nurturing. They are “geek goddesses” who – perhaps to balance the masculine and feminine of these occupations - have decided to go to school rather than into corporations or government.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although the service-oriented paradigm has been well established in the technical domain for quite some time now, service governance is still considered a research gap. To ensure adequate governance, there is a necessity to manage services as first-class assets throughout the lifecycle. Now that the concept of ser-vice-orientation is also increasingly applied on the business level to structure an organisation’s capabili-ties, the problem has become an even bigger chal-lenge. This paper presents a generic business and software service lifecycle and aligns it with the com-mon management layers in organisations. Using ser-vice analysis as an example, it moreover illustrates how activities in the service lifecycle may vary on lower levels of granularity depending on the focus on business or software services.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since the 1980s, in Australia and other developed nations, public sector management philosophies and how the public sector is organized have changed dramatically. At the same time, there have been many demands, and several attempts, to preserve and promote ethical behaviour within the public sector - though few go much beyond the publication of a code. Both developments require an understanding of how public organizations operate in this new environment. Organizational and management theory are seen as providing important potential insights into the opportunities and pitfalls for building ethics into the practices, culture and norms of public organizations. This book brings together the experience and research of a range of "reflective practitioners" and "engaged academics" in public sector management, organizational theory, management theory, public sector ethics and law. It addresses what management and organization theory might suggest about the nature of public organizations and the institutionalization of ethics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An earlier CRC-CI project on ‘automatic estimating’ (AE) has shown the key benefit of model-based design methodologies in building design and construction to be the provision of timely quantitative cost evaluations. Furthermore, using AE during design improves design options, and results in improved design turn-around times, better design quality and/or lower costs. However, AEs for civil engineering structures do not exist; and research partners in the CRC-CI expressed interest in exploring the development of such a process. This document reports on these investigations. The central objective of the study was to evaluate the benefits and costs of developing an AE for concrete civil engineering works. By studying existing documents and through interviews with design engineers, contractors and estimators, we have established that current civil engineering practices (mainly roads/bridges) do not use model-based planning/design. Drawings are executed in 2D and only completed at the end of lengthy planning/design project management lifecycle stages. We have also determined that estimating plays two important, but different roles. The first is part of project management (which we have called macro level estimating). Estimating in this domain sets project budgets, controls quality delivery and contains costs. The second role is estimating during planning/design (micro level estimating). The difference between the two roles is that the former is performed at the end of various lifecycle stages, whereas the latter is performed at any suitable time during planning/design.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Digital forensics relates to the investigation of a crime or other suspect behaviour using digital evidence. Previous work has dealt with the forensic reconstruction of computer-based activity on single hosts, but with the additional complexity involved with a distributed environment, a Web services-centric approach is required. A framework for this type of forensic examination needs to allow for the reconstruction of transactions spanning multiple hosts, platforms and applications. A tool implementing such an approach could be used by an investigator to identify scenarios of Web services being misused, exploited, or otherwise compromised. This information could be used to redesign Web services in order to mitigate identified risks. This paper explores the requirements of a framework for performing effective forensic examinations in a Web services environment. This framework will be necessary in order to develop forensic tools and techniques for use in service oriented architectures.