774 resultados para value chain collaboration
Resumo:
The focus of this study is on curriculum change within a School of Nursing in Taiwan where there is a growing demand for educational reform in order to meet the new accreditation standards and demands of the Taiwan Nursing Accreditation Council (TNAC). The aim of this study was to transform the Psychiatric Nursing curriculum in ways that are empowering, generative and sustainable. This study introduced Action Research as a vehicle to bring about curriculum transformation. I conceptualised a framework to guide the transformation process based on the notions of learner-centredness, conceptual change, pedagogical knowledge, reflection, collaboration, reculturing and empowerment. The Action Plan was developed in accordance with the conceptual framework, and was developed in five steps through which team members explored and became aware of our conceptions of teaching and learning, and then planned and implemented actions to change our curriculum, and examined and reflected on the curriculum transformation. The study demonstrated the value of working collaboratively to solve educational problems. This study also suggested that experiential knowledge, when shared and integrated with theoretical knowledge, can constructively contribute to all aspects of curriculum transformation. This study further supported the value of including clinical facilitators in the development and transformation of curricula. It confirmed that academics and clinical facilitators can work together to create new learning for students. This study is significant for both practical and political reasons. Its practical significance lies in its direct utility to the learners and teachers who were involved in the study. The political significance lies in the potential of the study to lead to further changes or improvements in other, similar contexts. The study is limited in that any interpretations cannot be generalised to other contexts. However, what emerged adds to the body of knowledge in such a way that it would constitute the basis for better informed educational practice.
Resumo:
Purpose Process modeling is a complex organizational task that requires many iterations and communication between the business analysts and the domain specialists. The challenge of process modeling is exacerbated, when the process of modeling has to be performed in a cross-organizational, distributed environment. In this paper we suggest a 3D environment for collaborative process modeling, using Virtual World technology. Design/methodology/approach We suggest a new collaborative process modeling approach based on Virtual World technology. We describe the design of an innovative prototype collaborative process modeling approach, implemented as a 3D BPMN modeling environment in Second Life. We use a case study to evaluate the suggested approach. Findings Based on our case study application, we show that our approach increases user empowerment and adds significantly to the collaboration and consensual development of process models even when the relevant stakeholders are geographically dispersed. Research limitations implications – We present design work and a case study. More research is needed to more thoroughly evaluate the presented approach in a variety of real-life process modeling settings. Practical implications Our research outcomes as design artifacts are directly available and applicable by business process management professionals and can be used by business, system and process analysts in real-world practice. Originality/value Our research is the first reported attempt to develop a process modeling approach on the basis of virtual world technology. We describe a novel and innovative 3D BPMN modeling environment in Second Life.
Resumo:
A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.
Resumo:
One of Cultural Studies' most important contributions to academic thinking about culture is the acceptance as axiomatic that we must not simply accept traditional value hierarchies in relation to cultural objects (see, for example, McGuigan, 1992: 157; Brunsdon, 1997: 5; Wark, 2001). Since Richard Hoggart and Raymond Williams took popular culture as a worthy object of study, Cultural Studies practitioners have accepted that the terms in which cultural debate had previously been conducted involved a category error. Opera is not 'better' than pop music, we believe in Cultural Studies - 'better for what?', we would ask. Similarly, Shakespeare is not 'better' than Mills and Boon, unless you can specify the purpose for which you want to use the texts. Shakespeare is indeed better than Mills and Boon for understanding seventeenth century ideas about social organisation; but Mills and Boon is unquestionably better than Shakespeare if you want slightly scandalous, but ultimately reassuring representations of sexual intercourse. The reason that we do not accept traditional hierarchies of cultural value is that we know that the culture that is commonly understood to be 'best' also happens to be that which is preferred by the most educated and most materially well-off people in any given culture (Bourdieu, 1984: 1- 2; Ross, 1989: 211). We can interpret this information in at least two ways. On the one hand, it can be read as proving that the poorer and less well-educated members of a society do indeed have tastes which are innately less worthwhile than those of the material and educational elite. On the other hand, this information can be interpreted as demonstrating that the cultural and material elite publicly represent their own tastes as being the only correct ones. In Cultural Studies, we tend to favour the latter interpretation. We reject the idea that cultural objects have innate value, in terms of beauty, truth, excellence, simply 'there' in the object. That is, we reject 'aesthetic' approaches to culture (Bourdieu, 1984: 6; 485; Hartley, 1994: 6)1. In this, Cultural Studies is similar to other postmodern institutions, where high and popular culture can be mixed in ways unfamiliar to modernist culture (Sim, 1992: 1; Jameson, 1998: 100). So far, so familiar.
Resumo:
Monitoring and assessing environmental health is becoming increasingly important as human activity and climate change place greater pressure on global biodiversity. Acoustic sensors provide the ability to collect data passively, objectively and continuously across large areas for extended periods of time. While these factors make acoustic sensors attractive as autonomous data collectors, there are significant issues associated with large-scale data manipulation and analysis. We present our current research into techniques for analysing large volumes of acoustic data effectively and efficiently. We provide an overview of a novel online acoustic environmental workbench and discuss a number of approaches to scaling analysis of acoustic data; collaboration, manual, automatic and human-in-the loop analysis.
Resumo:
This volume breaks new ground by approaching Socially Responsible Investment (SRI) as an explicitly ethical practice in financial markets. The work explains the philosophical and practical shortcomings of ‘long term shareholder value’ and the origins and conceptual structure of SRI, and links its pursuit to both its deeper philosophical foundations and the broader, multi-dimensional global movement towards greater social responsibility in global markets. Interviews with fund managers in the Australian SRI sector generate recommendations for better integrating ethics into SRI practice via ethically informed engagement with invested companies, and an in-depth discussion of the central practical SRI issue of fiduciary responsibility strengthens the case in favour of SRI. The practical and ethical theoretical perspectives are then brought together to sketch out an achievable ideal for SRI worldwide, in which those who are involved in investment and business decisions become part of an ‘ethical chain’ of decision makers linking the ultimate owners of capital with the business executives who frame, advocate and implement business strategies. In between there are investment advisors, fund managers, business analysts and boards. The problem lies in the fact that the ultimate owners are discouraged from considering their own values, or even their own long term interests, whilst the others often look only to short term interests. The solution lies in the latter recognising themselves as links in the ethical chain.
Resumo:
Engineering asset management (EAM) is a broad discipline and the EAM functions and processes are characterized by its distributed nature. However, engineering asset nowadays mostly relies on self-maintained experiential rule bases and periodic maintenance, which is lacking a collaborative engineering approach. This research proposes a collaborative environment integrated by a service center with domain expertise such as diagnosis, prognosis, and asset operations. The collaborative maintenance chain combines asset operation sites, service center (i.e., maintenance operation coordinator), system provider, first tier collaborators, and maintenance part suppliers. Meanwhile, to realize the automation of communication and negotiation among organizations, multiagent system (MAS) technique is applied to enhance the entire service level. During the MAS design processes, this research combines Prometheus MAS modeling approach with Petri-net modeling methodology and unified modeling language to visualize and rationalize the design processes of MAS. The major contributions of this research include developing a Petri-net enabled Prometheus MAS modeling methodology and constructing a collaborative agent-based maintenance chain framework for integrated EAM.
Resumo:
This article is a study of the arts in early childhood as a way of learning, for both children and their teachers. The author suggests that drawing can be a powerful tool for collaborative approaches to pedagogy. When teachers draw with children, pathways of communication can be opened, and the collaborative exercise can trigger processes of transformation for both adult and child. In order to present challenges to more traditional, hands-off pedagogical practices in arts education, this article is an account of reflexive arts pedagogies, and how they can work to improve communication and understandings between adults and children. Within the educational contexts of Australian preschooling and primary schooling, the author examines the process of collaborative drawing, and how this can enable a process of transformation. Her analysis, and the accompanying examples of reflexive practices, combine complementary lenses, socio-cultural and postmodern, that she sees as working in harmony to produce new possibilities, in arts education in particular, and, more broadly, in early childhood education.
Resumo:
A pervasive and puzzling feature of banks’ Value-at-Risk (VaR) is its abnormally high level, which leads to excessive regulatory capital. A possible explanation for the tendency of commercial banks to overstate their VaR is that they incompletely account for the diversification effect among broad risk categories (e.g., equity, interest rate, commodity, credit spread, and foreign exchange). By underestimating the diversification effect, bank’s proprietary VaR models produce overly prudent market risk assessments. In this paper, we examine empirically the validity of this hypothesis using actual VaR data from major US commercial banks. In contrast to the VaR diversification hypothesis, we find that US banks show no sign of systematic underestimation of the diversification effect. In particular, diversification effects used by banks is very close to (and quite often larger than) our empirical diversification estimates. A direct implication of this finding is that individual VaRs for each broad risk category, just like aggregate VaRs, are biased risk assessments.