827 resultados para 280102 Information Systems Management
Resumo:
Adjustable speed induction generators, especially the Doubly-Fed Induction Generators (DFIG) are becoming increasingly popular due to its various advantages over fixed speed generator systems. A DFIG in a wind turbine has ability to generate maximum power with varying rotational speed, ability to control active and reactive by integration of electronic power converters such as the back-to-back converter, low rotor power rating resulting in low cost converter components, etc, DFIG have become very popular in large wind power conversion systems. This chapter presents an extensive literature survey over the past 25 years on the different aspects of DFIG. Application of H8 Controller for enhanced DFIG-WT performance in terms of robust stability and reference tracking to reduce mechanical stress and vibrations is also demonstrated in the chapter.
Resumo:
There is consensus among practitioners and academics that culture is a critical factor that is able to determine success or failure of BPM initiatives. Yet, culture is a topic that seems difficult to grasp and manage. This may be the reason for the overall lack of guidance on how to address this topic in practice. We have conducted in-depth research for more than three years to examine why and how culture is relevant to BPM. In this chapter, we introduce a framework that explains the role of culture in BPM. We also present the relevant cultural values that compose a BPM culture, and we introduce a tool to examine the supportiveness of organizational cultures for BPM. Our research results provide the basis for further empirical analyses on the topic and support practitioners in the management of culture as an important factor in BPM initiatives.
Resumo:
Preface The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13–15 July, 2004. The conference was sponsored by the Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie University and the Australian Computer Society. The aims of the conference are to bring together researchers and practitioners working in areas of information security and privacy from universities, industry and government sectors. The conference program covered a range of aspects including cryptography, cryptanalysis, systems and network security. The program committee accepted 41 papers from 195 submissions. The reviewing process took six weeks and each paper was carefully evaluated by at least three members of the program committee. We appreciate the hard work of the members of the program committee and external referees who gave many hours of their valuable time. Of the accepted papers, there were nine from Korea, six from Australia, five each from Japan and the USA, three each from China and Singapore, two each from Canada and Switzerland, and one each from Belgium, France, Germany, Taiwan, The Netherlands and the UK. All the authors, whether or not their papers were accepted, made valued contributions to the conference. In addition to the contributed papers, Dr Arjen Lenstra gave an invited talk, entitled Likely and Unlikely Progress in Factoring. This year the program committee introduced the Best Student Paper Award. The winner of the prize for the Best Student Paper was Yan-Cheng Chang from Harvard University for his paper Single Database Private Information Retrieval with Logarithmic Communication. We would like to thank all the people involved in organizing this conference. In particular we would like to thank members of the organizing committee for their time and efforts, Andrina Brennan, Vijayakrishnan Pasupathinathan, Hartono Kurnio, Cecily Lenton, and members from ACAC and INSS.
Resumo:
Enterprise Architecture Management (EAM) is discussed in academia and industry as a vehicle to guide IT implementations, alignment, compliance assessment, or technology management. Still, a lack of knowledge prevails about how EAM can be successfully used, and how positive impact can be realized from EAM. To determine these factors, we identify EAM success factors and measures through literature reviews and exploratory interviews and propose a theoretical model that explains key factors and measures of EAM success. We test our model with data collected from a cross-sectional survey of 133 EAM practitioners. The results confirm the existence of an impact of four distinct EAM success factors, ‘EAM product quality’, ‘EAM infrastructure quality’, ‘EAM service delivery quality’, and ‘EAM organizational anchoring’, and two important EAM success measures, ‘intentions to use EAM’ and ‘Organizational and Project Benefits’ in a confirmatory analysis of the model. We found the construct ‘EAM organizational anchoring’ to be a core focal concept that mediated the effect of success factors such as ‘EAM infrastructure quality’ and ‘EAM service quality’ on the success measures. We also found that ‘EAM satisfaction’ was irrelevant to determining or measuring success. We discuss implications for theory and EAM practice.
Resumo:
While the growth in the number of IT investments remains strong, research in the IT investment field is limited, resulting in suboptimal practical guidance on effectively governing IT investments. Based on resource-based theory, this paper reports the initial work involved in developing a construct names IT investment governance (ITIG), because it can be used to measure organizations' capability to govern their IT investments. This paper then empirically examines the association of ITIG and corporate performance. The preliminary result is a four-factor, 16-item instrument for assessing the ITIG construct. This method's factors are IT investment value governance, IT investment value monitoring, IT investment appraisals and IT investment project management. The impact of ITIG on corporate performance was demonstrated with a significant and positive relationship found to exist between the ITIG construct and corporate performance, thus supporting the effectiveness of the ITIG construct. Corporations with higher levels of ITIG capability are more likely to maximize the contribution of their IT investments to firm value.
Resumo:
Service compositions enable users to realize their complex needs as a single request. Despite intensive research, especially in the area of business processes, web services and grids, an open and valid question is still how to manage service compositions in order to satisfy both functional and non-functional requirements as well as adapt to dynamic changes. In this paper we propose an (functional) architecture for adaptive management of QoS-aware service compositions. Comparing to the other existing architectures this one offers two major advantages. Firstly, this architecture supports various execution strategies based on dynamic selection and negotiation of services included in a service composition, contracting based on service level agreements, service enactment with flexible support for exception handling, monitoring of service level objectives, and profiling of execution data. Secondly, the architecture is built on the basis of well know existing standards to communicate and exchange data, which significantly reduces effort to integrate existing solutions and tools from different vendors. A first prototype of this architecture has been implemented within an EU-funded Adaptive Service Grid project. © 2006 Springer-Verlag.
Resumo:
BPM 2015 was the 13th International Conference on Business Process Management. It provided a global forum for researchers to meet and exchange views over research topics and outcomes in business process management. BPM 2015 was hosted by the University of Innsbruck and took place August 31 to September 3.
Resumo:
With new national targets for patient flow in public hospitals designed to increase efficiencies in patient care and resource use, better knowledge of events affecting length of stay will support improved bed management and scheduling of procedures. This paper presents a case study involving the integration of material from each of three databases in operation at one tertiary hospital and demonstrates it is possible to follow patient journeys from admission to discharge. What is known about this topic? At present, patient data at one Queensland tertiary hospital are assembled in three information systems: (1) the Hospital Based Corporate Information System (HBCIS), which tracks patients from in-patient admission to discharge; (2) the Emergency Department Information System (EDIS) containing patient data from presentation to departure from the emergency department; and (3) Operation Room Management Information System (ORMIS), which records surgical operations. What does this paper add? This paper describes how a new enquiry tool may be used to link the three hospital information systems for studying the hospital journey through different wards and/or operating theatres for both individual and groups of patients. What are the implications for practitioners? An understanding of the patients’ journeys provides better insight into patient flow and provides the tool for research relating to access block, as well as optimising the use of physical and human resources.
Resumo:
Since their inception in 1962, Petri nets have been used in a wide variety of application domains. Although Petri nets are graphical and easy to understand, they have formal semantics and allow for analysis techniques ranging from model checking and structural analysis to process mining and performance analysis. Over time Petri nets emerged as a solid foundation for Business Process Management (BPM) research. The BPM discipline develops methods, techniques, and tools to support the design, enactment, management, and analysis of operational business processes. Mainstream business process modeling notations and workflow management systems are using token-based semantics borrowed from Petri nets. Moreover, state-of-the-art BPM analysis techniques are using Petri nets as an internal representation. Users of BPM methods and tools are often not aware of this. This paper aims to unveil the seminal role of Petri nets in BPM.
Resumo:
When designed effectively dashboards are expected to reduce information overload and improve performance management. Hence, interest in dashboards has increased recently,which is also evident from the proliferation of dashboard solution providers in the market. Despite dashboards popularity, little is known about the extent of their effectiveness in organizations. Dashboards draw from multiple disciplines but ultimately use visualization to communicate important information to stakeholders. Thus,a better understanding of visualization can improve the design and use of dashboards. This paper reviews the foundations and roles of dashboards in performance management and proposes a framework for future research, which can enhance dashboard design and perceived usefulness depending on the fit between the features of the dashboard and the characteristics of the users.
Resumo:
This research contributes a formal framework to evaluate whether existing CMFs can model and reason about various types of normative requirements. The framework can be used to determine the level of coverage of concepts provided by CMFs, establish mappings between CMF languages and the semantics for the normative concepts and evaluate the suitability of a CMF for issuing a certification of compliance. The developed framework is independent of any specific formalism and it has been formally defined and validated through the examples of such mappings of CMFs.
Resumo:
The article discusses a new decision support process for forestry pest management. Over the past few years, DSS have been introduced for forestry pest management, providing forest growers with advice in areas such as selecting the most suitable pesticide and relevant treatment. Most of the initiatives process knowledge from various domains for providing support for specific decision making problems. However, very few studies have identified the requirements of developing a combined process model in which all relevant practitioners can contribute and share knowledge for effective decision making; such an approach would need to include the decision makers’ perspective along with other relevant attributes such as the problem context and relevant policies. We outline a decision support process for forestry pest management, based on the design science research paradigm, in which a focus group technique has application to acquire both expert and practical knowledge in order to construct the DSS solution.
Resumo:
Understanding activities of individuals is of major importance because their actions are the main foundation of economic activity. However, there is a lack of understanding with regard to how individual activities are characterised. Thus, we develop a first conceptual classification for individual activities extending the view on business processes. The classification scheme contains personal care, education, professional work, domestic work, leisure and travel as primary activities and individual organization, procurement, information gathering and self-expression as secondary activities. We extend mainly prior literature on customer management by structuring processes of individuals independently from their status as customer. This enables new theoretical insights in the way companies can design their offers from a strategic point of view. Companies can use IPM to systematically analyze individual processes independent from specific products and services which is assumed to foster the development of innovative product and service offers.
Resumo:
The research field of Business Process Management (BPM) has gradually developed as a discipline situated within the computer, management and information systems sciences. Its evolution has been shaped by its own conference series, the BPM conference. Still, as with any other academic discipline, debates accrue and persist, which target the identity as well as the quality and maturity of the BPM field. In this paper, we contribute to the debate on the identity and progress of the BPM conference research community through an analysis of the BPM conference proceedings. We develop an understanding of signs of progress of research presented at this conference, where, how, and why papers in this conference have had an impact, and the most appropriate formats for disseminating influential research in this conference. Based on our findings from this analysis, we provide conclusions about the state of the conference series and develop a set of recommendations to further develop the conference community in terms of research maturity, methodological advance, quality, impact, and progression.
Resumo:
Business Process Management (BPM) as a research field integrates different perspectives from the disciplines computer science, management science and information systems research. Its evolution has by been shaped by the corresponding conferences series, the International Conference on Business Process Management (BPM conference). As much as in other academic discipline, there is an ongoing debate that discusses the identity, the quality and maturity of the BPM field. In this paper, we review and summarize the major findings a larger study that will be published in the Business & Information Systems Engineering journal in 2016. In the study, we investigate the identity and progress of the BPM conference research community through an analysis of the BPM conference proceedings. Based on our findings from this analysis, we formulate recommendations to further develop the conference community in terms of methodological advance, quality, impact and progression.