888 resultados para strategy management
Resumo:
Alarming statistics provides that only 10,2 percentage of companies listed on the Swedish stock exchange has achieved gender equality in their top management. The fact is that women being discriminated, since men dominates these positions of power. The study is of a qualitative nature and aims to achieve a deeper understanding and knowledge contribution of how gender equal companies´ has achieved this gender diversity in their top management. Sweden's highest ranking business leaders has been interviewed in order to obtain their view, and the companies they represent, in order to get an answer to what the most important requirements has been in the achievement. The study's main result has shown that strong core values and corporate culture are basic and required condition for a successful gender equality strategy. A deliberate or emergent strategy can then be successfully implemented, and it is mainly the impact of structural barriers that determine which strategy a company uses. At a deliberate strategy, following measures are in additional to core values and corporate cultural crucial; commitment towards gender equality, a specific plan with clear objectives, and a conscious objective recruitment process. The result found aboute these two factors and three measures also identified a required specific order to follow in order to achieve gender diversity in top management. These findings, which in a near future, aims to contribute to a more gender equal Sweden.
Resumo:
This policy sets out the Department’s commitment to maintaining and improving environmental cleanliness in Northern Ireland (NI). It has been developed with the aim that best management practice, staff training and continued monitoring of performance will lead to services being maintained and improved in a challenging financial climate. The detail of the policy is presented in the three sections which follow this executive summary. Section 1 – Introduction and Background. This section sets out the aims, objectives and scope of the policy. It also sets out the key principles which should apply to cleaning services. Section 2 - Developments since the launch of Cleanliness Matters Strategy in October 2005. This outlines events and progress since 2005 and indicates how these are shaping the proposed strategic direction. Section 3 - The Way Forward. This section sets out the areas for attention over the coming years.
Resumo:
This keynote presentation will report some of our research work and experience on the development and applications of relevant methods, models, systems and simulation techniques in support of different types and various levels of decision making for business, management and engineering. In particular, the following topics will be covered. Modelling, multi-agent-based simulation and analysis of the allocation management of carbon dioxide emission permits in China (Nanfeng Liu & Shuliang Li Agent-based simulation of the dynamic evolution of enterprise carbon assets (Yin Zeng & Shuliang Li) A framework & system for extracting and representing project knowledge contexts using topic models and dynamic knowledge maps: a big data perspective (Jin Xu, Zheng Li, Shuliang Li & Yanyan Zhang) Open innovation: intelligent model, social media & complex adaptive system simulation (Shuliang Li & Jim Zheng Li) A framework, model and software prototype for modelling and simulation for deshopping behaviour and how companies respond (Shawkat Rahman & Shuliang Li) Integrating multiple agents, simulation, knowledge bases and fuzzy logic for international marketing decision making (Shuliang Li & Jim Zheng Li) A Web-based hybrid intelligent system for combined conventional, digital, mobile, social media and mobile marketing strategy formulation (Shuliang Li & Jim Zheng Li) A hybrid intelligent model for Web & social media dynamics, and evolutionary and adaptive branding (Shuliang Li) A hybrid paradigm for modelling, simulation and analysis of brand virality in social media (Shuliang Li & Jim Zheng Li) Network configuration management: attack paradigms and architectures for computer network survivability (Tero Karvinen & Shuliang Li)
Resumo:
Rin de Aveiro is a coastal lagoon located at the Central Region of Portugal subjected to the influence of the tides, resulting in a set of characteristic biotopes favouring anthropic and natural processes. Once managed and controlled correctly, each of these biotopes will allow simultaneously the biodiversity and integration in the making of the wetland landscape. In 1998, one of the final conclusions of the "MARIA" Demonstration Programme for the Integrated Management of Ria de Aveiro was that the poor current state of the environment area resulted from a set of interrelated factors. The Programme selected four (4) pilot-projects towards the integrated management of the lagoon biotopes as possible scenarios for an intervention. This selection was based in criteria related to environmental priorities and the maintenance of traditional economic activities in the region. The idea of choosing projects that would involve the whole geographic space of the Ria, without forgetting the other important themes interrelated with the Management Structure, emerged as a relevant aspect for their definition. Thus, and as a first test of this Management Structure functionality, the following task forces were put forward: Recovery and valorisation of the piers; Recovery of the former salt pans; Management of the agricultural fields of Baixo-Vouga; Implementation of measures for the classification of the Protected Landscape Area of the River Caster Mouth. This payer will report the main results of these pilot-projects attained during their first year period, especially the intervention strategies defined by the Partnership created for this aim.
Resumo:
This work involves the organization and content perspectives on Enterprise Content Management (ECM) framework. The case study at the Federal University of Rio Grande do Norte was based on ECM model to analyse the information management provided by the three main administrative systems: The Integrated Management of Academic Activities (SIGAA), Integrated System of Inheritance, and Contracts Administration (SIPAC) and the Integrated System for Administration and Human Resources (SIGRH). A case study protocol was designed to provide greater reliability to research process. Four propositions were examined in order to reach the specific objectives of identification and evaluation of ECM components from UFRN perspective. The preliminary phase provided the guidelines for the data collection. In total, 75 individuals were interviewed. Interviews with four managers directly involved on systems design were recorded (average duration of 90 minutes). The 70 remaining individuals were approached in random way in UFRN s units, including teachers, administrative-technical employees and students. The results showed the presence of many ECM elements in the management of UFRN administrative information. The technological component with higher presence was "management of web content / collaboration". But initiatives of other components (e.g. email and document management) were found and are in continuous improvement. The assessment made use of eQual 4.0 to examine the effectiveness of applications under three factors: usability, quality of information and offered service. In general, the quality offered by the systems was very good and walk side by side with the obtained benefits of ECM strategy adoption in the context of the whole institution
Resumo:
On December 21, 2015, Governor Branstad issued Executive Order 87 (EO87); a cybersecurity initiative for the State of Iowa. The executive order establishes a multi-agency partnership, the EO87 Leadership Team, with the Office of the Chief Information Officer, Iowa National Guard, Department of Public Safety, Iowa Communications Network, and the Iowa Homeland Security and Emergency Management Department. The order directs these agencies to develop a comprehensive cybersecurity strategy which addresses lifeline critical infrastructure, risk assessments, best practices, awareness training, public education and communication, collaboration, K-12 and higher education, data breach notifications, and incident response planning to protect the citizens of Iowa and Iowa businesses. The EO87 Leadership Team, along with several key partners, worked diligently over the last six months to prepare recommendations that will have a direct and sustainable impact on protecting lifeline critical infra-structure, reducing risk to government operations, and creating sustainable partnerships in cybersecurity.
Resumo:
Decisions made and actions taken by individuals in the operations function impact the formation of a company’s manufacturing strategy (MS). Therefore, it is important that the MS is understood and agreed on by all employees, that is, strategic consensus among the individuals in the operations function is essential. This research contributes to the current body of knowledge by including a workers’ perspective on MS formation. It is the workers on the shop floor who bring the MS to life in the actual operations through their daily decisions and actions. The MS falls short if the priorities outlined do not materialise in practice as intended. The purpose of this research is to investigate how the individuals in the operations function perceive the MS in order to understand how these individuals are involved in the MS formation. The research is based on five studies, differing by evidence, as follows: one theoretical, three qualitative in the setting of small and medium-sized enterprises (SMEs), and one quantitative at a large company. Based on the findings presented in the six appended papers, the results show that empirically and conceptually, workers have been overlooked or given a passive role in the MS formation. Empirically, it is seen that workers and managers do not have a shared understanding of the underlying reasons for strategic priorities; hence, the level of strategic consensus is low. Furthermore, the level of strategic consensus varies among the different MS dimensions depending on their organisational level. Moreover, the empirical findings reveal that internal contextual factors influence the individuals’ perceptions of the MS and the possibilities for strategic consensus. Regarding the external context, the results show that major customers’ strategies influence the subcontractor SMEs’ MS formation. The usage of means of communication in the operations function has also shown to be of importance for how the MS is perceived. Conceptually, the findings indicate that the MS literature tends to treat individuals in the operations function in a deterministic manner; individuals on the shop floor are regarded as manufacturing resources. To ensure a successful MS formation process, where the patterns of the decisions made by the individuals in the operations function forms the MS, the view on human nature within the MS requires a more voluntaristic approach. This research suggests to view the MS formation as an iterative “patterning process” which builds on a reciprocal relationship between workers and managers. The introduction of the patterning process contributes to the research on MS formation by explaining the perception range within the hierarchical levels, by re-defining the hierarchical levels included in the MS formation and by detailing the activities in the MS formation.
Resumo:
Purpose – The aim of this study is to investigate the role of key strategic factors in new service development (NSD). In particular, the role of service development strategy, a formalised development process, integrated development teams and customer co-creation were investigated and the results were compared with managers' beliefs. Design/methodology/approach – The study used a sample of more than 500 service development projects to test a NSD conceptual model. Regression analysis was used to test the relative importance of the key strategic factors, and the results were compared with managers' beliefs. Findings – The results show that managers believe that customer co-creation is most important in order to succeed with NSD. However, contrary to management belief, a service development strategy is the “missing link” in improving NSD performance. In addition, the research highlighted an interaction effect between integrated development teams and customer co-creation, which means that project managers should focus on individual competencies on the development team and how they interact with customers throughout the NSD process. Originality/value – For a long time, NSD has failed to receive the attention it deserves, not just in practice but also in service research. This study shows that the number of new services put on the market and then withdrawn because of low sales remains as high as 43 per cent. This paper contributes knowledge on how to reduce the number of failures in NSD by pointing out the key strategic factors that influence NSD performance.
Resumo:
Strategy is a highly topical subject among managers and since the world is constantlychanging it is also an important subject for companies’ competitive advantage and survival.At the same time experts in the field of strategic management describe western techniques ascomplex and ineffective while the Japanese techniques have been seen as unambiguous andcharacterized by focus on quality, productivity and teamwork. This calls for greaterknowledge in the Japanese management systems. Hoshin Kanri is a collection of Japanesebest strategic management practices and therefore an interesting target for our study. Thus, onthe one hand this study investigates the theory of Hoshin Kanri in order to give structure to itand provide a way for practitioner into the management system. On the other hand this studyinvestigates Hoshin Kanri in order to reveal how Japanese subsidiaries based in Sweden haveimplemented this strategic management system. This is firstly done by reviewing the existingliterature on the subject and secondly by a collective case study with in-depth interviewsconducted with managers at Japanese owned subsidiaries based in Sweden. There are somelimitations in this study. One is that the results of the study do not include all Japanesesubsidiaries in Sweden as not all companies participated in the study. Moreover, the study islimited by one individuals’ knowledge and perception of Hoshin Kanri in each of the threecompanies. The study contributes to the existing literature on the topic of Hoshin Kanri by;(1) structuring the literature and the existing models under one of two categories, namelycyclical or sequential; (2) providing a model that aims at making it more understandable andattractive for practitioner to apply; (3) initiating the mapping of the spread of Hoshin Kanriamong Japanese subsidiaries in Sweden and (4) providing a Swedish model for theapplication of HK in Japanese subsidiaries.
Resumo:
The evolution and maturation of Cloud Computing created an opportunity for the emergence of new Cloud applications. High-performance Computing, a complex problem solving class, arises as a new business consumer by taking advantage of the Cloud premises and leaving the expensive datacenter management and difficult grid development. Standing on an advanced maturing phase, today’s Cloud discarded many of its drawbacks, becoming more and more efficient and widespread. Performance enhancements, prices drops due to massification and customizable services on demand triggered an emphasized attention from other markets. HPC, regardless of being a very well established field, traditionally has a narrow frontier concerning its deployment and runs on dedicated datacenters or large grid computing. The problem with common placement is mainly the initial cost and the inability to fully use resources which not all research labs can afford. The main objective of this work was to investigate new technical solutions to allow the deployment of HPC applications on the Cloud, with particular emphasis on the private on-premise resources – the lower end of the chain which reduces costs. The work includes many experiments and analysis to identify obstacles and technology limitations. The feasibility of the objective was tested with new modeling, architecture and several applications migration. The final application integrates a simplified incorporation of both public and private Cloud resources, as well as HPC applications scheduling, deployment and management. It uses a well-defined user role strategy, based on federated authentication and a seamless procedure to daily usage with balanced low cost and performance.
Resumo:
he term "carcinoma of unknown primary" (CUP) defines a malignant condition in which a metastatic cancer is documented in absence of a detectable primary site. It occurs in about 2÷6 % of cancer patients, according to various literature reports. The primary tumor site results indefinable because of several either single or associated factors, even remaining occult at autopsy in 15÷25% of CUP patients. The metastatic spread pattern of CUP is quite unlike that expected for analogous known primary malignancy. For instance, the unknown prostate cancer often metastasizes to the lungs and liver while the its known analogous usually spreads to the bone. Whether certain genetic abnormalities might play a role in determining a CUP condition, it remains undefined. Most CUP are adenocarcinoma, squamous cell carcinoma, either undifferentiated or differentiated carcinoma, whereas less frequently may be sarcoma, melanoma or neuroendocrine tumor. As CUP diagnostic management is concerned, two opposite approach modalities may be adopted, one, named "shotgun modality", consisting in a multiplicity of examinations aimed at achieving the identification of the primary tumor and the other, a nihilistic modality, by adopting tout court a palliative therapy of the metastatic disease. A reasonable intermediate diagnostic strategy consists in undertaking some procedures with a specific target and low cost/benefit ratio. Selected imaging studies, serum tumor markers, immunohistochemical analyses and genetic- molecular examinations on biopsy material allow sometimes to reach the detection of primary malignancies that might be responsive to a potential treatments. Nevertheless, in spite of recent sophisticated -laboratory and imaging progress, CUP remains a strong challenge in clinical oncology.
Resumo:
Introduction. Breast phyllodes tumors (PT) are uncommon fibroepithelial lesions having potential malignant features. These tumors have characteristic features, like phleomorphism, mitoses and overgrowth of the stroma with possible infiltrative margins. The clinical behaviour could be unpredictable, since the relatively high recurrence rate despite correct surgical strategy. Conventional diagnostic examinations show high sensitivity and specificity, but cannot demonstrate the differences between benign and malignant PT. MRI is not more effective. Patients and methods. Sixteen patients affected by PT have been surgically treated at our Institution. All patients received mammography and ultrasonography (US) as preoperative diagnostic work-up. Results. in 13 patients, US was effective in preoperative diagnosis of PT. Mammography was uneffective in detecting breast lesions in 5 cases, while in 11 cases mammographic findings presented benign features, with a round opacity with moderate tissue density and well-defined wall. Conclusion. US remains the most useful diagnostic test in detecting PT. However, there is no test effective in identifying malignat PT. In case of suspicion, fine needle biopsy should be performed.
Resumo:
Physical control of water hyacinth consists of removing the plants from the water by hand or machines. It is considered over effetive because it involves removing the whole plants from water. The first attempt on physical control was in 1992 when weed infestation was causing serious problems to the fishing communities in Lake Kyoga. The fishermen had problems of accessing the lake as huge masses of mobile weed blocked landing sites. Furthermore, the fishers lost their nets, which were swept away by mobile water hyacinth. As a result, an integrated control strategy involving physical control (manual and mechanical removal) was put in place. Through this method, the fishers were able to open up access routes to fishing grounds even though weed mats often reblocked the access routes. In the infested lakes, manual removal offered remedial relief to fish Iandings and other access sites. Sites of strategic importance such as hydro-electric power generation dam, water intake points and docking points which had large masses of water hyacinth required heavy machinery and mechanical harvesters were used at these sites.
Resumo:
In recent years, the EU and its member states have experienced a number of changes, as well as challenges, in the areas of politics, economics, security and law. As these areas are interconnected, changes and challenges to any of them have implications for the others, as well as implications for the populations and institutions of the EU or those coming into contact with its international power and influence. This edited collection focuses primarily on security and law, particularly the EU’s internal security strategy. The EU’s Internal Security Strategy, adopted by the Spanish presidency early in 2010, followed the Lisbon Treaty in 2009, building on previous developments within the EU in the Area of Freedom Security and Justice (AFSJ) policy. The focus of the EU Internal Security Strategy is to prevent and combat “serious and organised crime, terrorism and cybercrime, in strengthening the management of our external borders and in building resilience to natural and man-made disasters”. The Internal Security strategy intersects and overlaps with the European Union’s Counter-terrorism strategy, the Strategy for the External Dimension of JHA, and the EU’s Security Strategy. The role of and interaction between these strategies, their supplementing documents, and their implications for crime, victims, the law, political relations, democracy and human rights, form the backdrop against which the chapters in this collection are written. Building on original research by its contributors, this collection comprises work by authors from a wide variety of academic and professional areas and perspectives, as well as different countries, on a variety of areas and issues related to or raised by the EU’s Internal Security Strategy, from intelligence-led policing to human trafficking and port security. This book examines, from a wide variety of disciplinary perspectives including law, geography, politics and practice, both this further refinement of existing internal provisions on cross-border crime, and the increasing external relations of the EU in the AFSJ.
Resumo:
Sulfuryl fluoride (SF), an effective structural fumigant, is registered recently as Profume™ for controlling insect pests of stored grains and processed commodities. Information on its effectiveness in disinfestation of bulk grain, however, is limited. The ongoing problem with the strong level of resistance to phosphine has been addressed recently through deployment of SF as a ‘resistance breaker’ in bulk storages in Australia. This paper discusses important results on the efficacy of SF against key phosphine- resistant insect pests, lesser grain borer, Rhyzopertha dominca, red flour beetle, Tribolium castaneum, rice weevil, Sitophilus oryzae and the rusty grain beetle, Cryptolestes ferrugineus. We have established CT (g-hm3) profiles for SF against these insect pests at two temperature regimes 25 and 30°C, that showed that both temperature and exposure period (t) has significant influence on the effectiveness of SF than the concentration. Over a seven days fumigation period, CTs of 800 and 400 g-hm3 achieved complete control of all the target pests, including the most strongly phosphine - resistant species, C. ferrugineus at 25 and 30°C, respectively. Results from four industry scale field trials involving currently registered rate of SF (1500 g-hm3) over 2–14 d exposure period, confirmed its effectiveness in achieving complete control of the target pest species. The assessment of postfumigation grain samples across all the test storages indicated that the reinfestation occurs after three months. Monitoring resistance to phosphine in C. ferrugineus over a six year period (2009–2015), showed a significant reduction in resistant populations after the introduction of SF into the fumigation strategy at problematic storage sites. Overall our research concludes that SF is a good candidate to be used as a ‘resistance breaker’ where phosphine resistance is prevalent.