877 resultados para Information Resources Management


Relevância:

80.00% 80.00%

Publicador:

Resumo:

A component of broader scholarship addressing the social context in which individuals work, has focused on the role of ‘employee voice’ in determining flexible-work outcomes (Donnelly et al., 2012). Employee voice incorporates a spectrum of practices designed to give employees a say in organisational decisions (Dundon et al., 2004). This paper extends work on voice and workplace flexibility in two ways. First, it focuses not simply on ‘voice’ but on its antithesis, employee silence, which is defined (following Van Dyne et al., 2003) as the intentional withholding of ideas and opinions. We utilise an alternative reading of silence to the majority of literature which interprets it as a product of employee motivation, by focusing on the role of management and by adopting a framework which considers silence as a control dialectic (Donaghey et al., 2011). Second, the study examines silence with respect to preferences for customising the terms/conditions of employment beyond narrowly defined notions of ‘flexible work’ (e.g., reduced hours; home-working). The study utilises 30 telephone interviews with employees who had been previously identified as ‘discontent non-requesters’ (Skinner and Pocock, 2011: 75), that is they had expressed a desire to request flexible working provisions, but had not done so. Interviewees were asked to articulate the reasons for, and consequences of, their silence. The findings reveal nuanced workplace practices and structures that close down possibilities for employee voice and perpetuate silence on matters relating to customising work. They also illustrate a disjuncture between espoused organizational goals and everyday practices and norms encountered in workplaces.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The Internet of Things facilitates the identification, digitization, and control of physical objects. However, it is the availability of cost effective sensors, mobile smart devices, scalable cloud infrastructure, and advanced analytics that have consumerized the Internet of Things. The accessibility of digital representations of things has transformative potential and provides entire new affordances for organizations and their ecosystems across most industries.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Technology is impacting on most elements of organisations today and workforce development professionals have been some of the leading proponents of embracing technologies and the benefits they offer. E-learning has emerged as at least a complementary offering to face-to-face training, and in some cases has totally replaced more traditional forms of workforce development. This chapter explores the use of learning technologies and the benefits and drawbacks of their use. In particular it focuses on further exploring the issue of a perceived lack of interaction in some e-learning offerings; a factor identified as critical to address in order to ensure effective e-learning. The chapter discusses the issues of interaction and social presence to address feelings of isolation and offers some key considerations for those considering integrating technology into workforce development.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

L'intérêt suscité par la ré-ingénierie des processus et les technologies de l'information révèle l'émergence du paradigme du management par les processus. Bien que beaucoup d'études aient été publiées sur des outils et techniques alternatives de modélisation de processus, peu d'attention a été portée à l'évaluation post-hoc des activités de modélisation de processus ou à l'établissement de directives sur la façon de conduire efficacement une modélisation de processus. La présente étude a pour objectif de combler ce manque. Nous présentons les résultats d'une étude de cas détaillée, conduite dans une organisation leader australienne dans le but de construire un modèle de réussite de la modélisation des processus.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large numbers of users and large information base, seem to be perfect breeding grounds for exploiting the vulnerabilities of people, the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” While technology-based security has been addressed by research and may be well understood, social engineering is more challenging to understand and manage, especially in new environments such as SNSs, owing to some factors of SNSs that reduce the ability of users to detect the attack and increase the ability of attackers to launch it. This work will contribute to the knowledge of social engineering by presenting the first two conceptual models of social engineering attacks in SNSs. Phase-based and source-based models are presented, along with an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

While social engineering represents a real and ominous threat to many organizations, companies, governments, and individuals, social networking sites (SNSs), have been identified as among the most common means of social engineering attacks. Owing to factors that reduce the ability of users to detect social engineering tricks and increase the ability of attackers to launch them, SNSs seem to be perfect breeding ground for exploiting the vulnerabilities of people, and the weakest link in security. This work will contribute to the knowledge of social engineering by identifying different entities and subentities that affect social engineering based attacks in SNSs. Moreover, this paper includes an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

There is no doubt that social engineering plays a vital role in compromising most security defenses, and in attacks on people, organizations, companies, or even governments. It is the art of deceiving and tricking people to reveal critical information or to perform an action that benefits the attacker in some way. Fraudulent and deceptive people have been using social engineering traps and tactics using information technology such as e-mails, social networks, web sites, and applications to trick victims into obeying them, accepting threats, and falling victim to various crimes and attacks such as phishing, sexual abuse, financial abuse, identity theft, impersonation, physical crime, and many other forms of attack. Although organizations, researchers, practitioners, and lawyers recognize the severe risk of social engineering-based threats, there is a severe lack of understanding and controlling of such threats. One side of the problem is perhaps the unclear concept of social engineering as well as the complexity of understand human behaviors in behaving toward, approaching, accepting, and failing to recognize threats or the deception behind them. The aim of this paper is to explain the definition of social engineering based on the related theories of the many related disciplines such as psychology, sociology, information technology, marketing, and behaviourism. We hope, by this work, to help researchers, practitioners, lawyers, and other decision makers to get a fuller picture of social engineering and, therefore, to open new directions of collaboration toward detecting and controlling it.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Despite the increased focus on wellness and wellness programs there is still no consensus as to what wellness is. This is in part because programs do not define wellness and in part because studies and programs employ vastly different outcome measures that arguably reflect other constructs such as health, well-being, and quality of life. In this paper, we suggest an operational understanding of wellness and show how wellness differs from health, quality of life and well-being. Academic literature on the subject of health, wellness, well-being and quality of life reveals confusion, as theorists and researchers frequently describe each of these constructs in a very similar manner. We argue that elements such as the context and target population in which the term wellness is used are critical for our understanding of the construct. While it is inevitable that cross-over exists between similar constructs, wellness does have distinctly identifiable features. These include: being both holistic and multidimensional, being focused on lifestyle behaviours, being about actions or processes, recognising the inter-relatedness between person and environment, and being unique by way of goal and context.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Understanding the antecedents of work-family conflict is important as it allows organisations to effectively engage in work design for professional employees. This study examines the impact of sources of social support as antecedents of work-family conflict. The hypotheses were tests using Partial Least Squares modelling on a sample of 366 professional employees. The path model showed that context-specific stressors impacted positively on job demand, which led to higher levels of work-family conflict. Contrary to our expectation, non-work related social support did not have any statistical relationship with job demand and work-family conflict. In addition, individuals experiencing high job demands were found to obtain more social support from both work and non-work-related sources. Individuals with more work-related social support were less likely to have less work-family conflict. Surprisingly, non-work social support sources had no statistically significant relationship with work-family conflict.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The aim of this research is to report initial experimental results and evaluation of a clinician-driven automated method that can address the issue of misdiagnosis from unstructured radiology reports. Timely diagnosis and reporting of patient symptoms in hospital emergency departments (ED) is a critical component of health services delivery. However, due to disperse information resources and vast amounts of manual processing of unstructured information, a point-of-care accurate diagnosis is often difficult. A rule-based method that considers the occurrence of clinician specified keywords related to radiological findings was developed to identify limb abnormalities, such as fractures. A dataset containing 99 narrative reports of radiological findings was sourced from a tertiary hospital. The rule-based method achieved an F-measure of 0.80 and an accuracy of 0.80. While our method achieves promising performance, a number of avenues for improvement were identified using advanced natural language processing (NLP) techniques.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Australia has been populated for more than 40,000 years with Indigenous Australians joined by European settlers only 230 years ago. The first settlers consisted of convicts from more than 28 countries and members of the British army who arrived in 1788 to establish a British penal colony. Mass migration in the nineteenth century with one and a half million immigrants from Europe, principally from the United Kingdom and Ireland (Haines and Shlomowitz, 1992), established the continent as an Anglo society in the Pacific. In the twentieth century immigrants came from many European countries and in the latter decades from many parts of Asia and the Middle East (Collins, 1991, pp.10-13). In the 21st century Australia has an ethnically and culturally diverse population. The original Indigenous population of Australia accounts for approximately 460,000 or 2.5 per cent of the total population (ABS, 2006a). Estimates are that around 4.5m. persons in the population (close to 20 per cent), were born outside Australia with the majority of these arriving from Europe, principally the United Kingdom, and New Zealand (ABS, 2006b). Like many other countries, Australia has a legacy of discrimination and inequality in employment. Propelled by racist ideologies and the male breadwinner ideology, Indigenous Australians, and non-European immigrants, and women were barred from certain jobs and paid less for their work than any white male counterpart. These conditions were legally sanctioned through the industrial relations system and other laws in the nineteenth and first half of the twentieth century. Since the 1960s a dramatic change has occurred in social policy and national legislation and Australia today has an extensive array of laws which forbid employment discrimination on race, ethnicity, gender and many other characteristics, and other approaches which promote proactive organizational plans and actions to achieve equity in employment. This chapter outlines these developments.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Organisational culture is considered an important influence on performance, particularly for service firms that rely on values-driven social controls to enhance human interactions (O’Reilly & Chatman, 1996). Using a qualitative approach, we show how the modified Organisational Culture Profile developed by Sarros, Gray, Densten, and Cooper (2005) to assess Australian organisations provides a framework for exploring the cultural drivers of high performing knowledge-intensive service firms in New Zealand. Our study provides rich insights into how six key cultural dimensions–competitiveness, innovation, performance orientation, emphasis on rewards, supportiveness and social responsibility–are translated into strategic human resource management practices.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Background Timely diagnosis and reporting of patient symptoms in hospital emergency departments (ED) is a critical component of health services delivery. However, due to dispersed information resources and a vast amount of manual processing of unstructured information, accurate point-of-care diagnosis is often difficult. Aims The aim of this research is to report initial experimental evaluation of a clinician-informed automated method for the issue of initial misdiagnoses associated with delayed receipt of unstructured radiology reports. Method A method was developed that resembles clinical reasoning for identifying limb abnormalities. The method consists of a gazetteer of keywords related to radiological findings; the method classifies an X-ray report as abnormal if it contains evidence contained in the gazetteer. A set of 99 narrative reports of radiological findings was sourced from a tertiary hospital. Reports were manually assessed by two clinicians and discrepancies were validated by a third expert ED clinician; the final manual classification generated by the expert ED clinician was used as ground truth to empirically evaluate the approach. Results The automated method that attempts to individuate limb abnormalities by searching for keywords expressed by clinicians achieved an F-measure of 0.80 and an accuracy of 0.80. Conclusion While the automated clinician-driven method achieved promising performances, a number of avenues for improvement were identified using advanced natural language processing (NLP) and machine learning techniques.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Public sector organisations (PSOs) operate in information-intensive environments often within operational contexts where efficiency is a goal. What's more, the rapid adoption of IT is expected to facilitate good governance within public sector organisations but it often clashes with the bureaucratic culture of these organisations. Accordingly, models such as IT Governance (ITG) and government reform -in particular the new public management (NPM)- were introduced in PSOs in an effort to address the inefficiencies of bureaucracy and under performance. This work explores the potential effect of change in political direction and policy on the stability of IT governance in Australian public sector organisations. The aim of this paper is to examine implications of a change of government and the resulting political environment on the effectiveness of the audit function of ITG. The empirical data discussed here indicate that a number of aspects of audit functionality were negatively affected by change in political direction and resultant policy changes. The results indicate a perceived decline in capacity and capability which in turn disrupts the stability of IT governance systems in public sector organisations.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In this editorial letter, we provide the readers of Information Systems Management with a background on process design before we discuss the content of the special issue proper. By introducing and describing a so-called process design compass we aim to clarify what developments in the field are taking place and how the papers in this special issue expand on our current knowledge in this domain.