890 resultados para profit forecasts


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This video details interviews undertaken and shows a range of varying local opinions in West End within the Griffith electorate of Brisbane in the lead up to 2007's federal election. In 2007, West Enders had both the sitting Queensland Premier, Anna Bligh, and the impending Prime Minister, Kevin Rudd, as their local members. This video was produced as part of the YouDecide2007, a non-profit citizen journalism intiative led by QUT's Creative Industries and funded by the ARC. The camera man and editor was Barry Saunders.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Enterprise Social Networks continue to be adopted by organisations looking to increase collaboration between employees, customers and industry partners. Offering a varied range of features and functionality, this technology can be distinguished by the underlying business models that providers of this software deploy. This study identifies and describes the different business models through an analysis of leading Enterprise Social Networks: Yammer, Chatter, SharePoint, Connections, Jive, Facebook and Twitter. A key contribution of this research is the identification of consumer and corporate models as extreme approaches. These findings align well with research on the adoption of Enterprise Social Networks that has discussed bottom-up and top-down approaches. Of specific interest are hybrid models that wrap a corporate model within a consumer model and may, therefore, provide synergies on both models. From a broader perspective, this can be seen as the merging of the corporate and consumer markets for IT products and services.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper investigates how Enterprise Architecture (EA) evolves due to emerging trends. It specifically explores how EA integrates the Service-oriented Architecture (SOA). Archer’s Morphogenetic theory is used as an analytical approach to distinguish the architectural conditions under which SOA is introduced, to study the relationships between these conditions and SOA introduction, and to reflect on EA evolution (elaborations) that then take place. The paper focuses on reasons for why EA evolution could take place, or not and what architectural changes could happen due to SOA integration. The research builds on sound theoretical foundations to discuss EA evolution in a field that often lacks a solid theoretical groundwork. Specifically, it proposes that critical realism, using the morphogenetic theory, can provide a useful theoretical foundation to study enterprise architecture (EA) evolution. The initial results of a literature review (a-priori model) were extended using explorative interviews. The findings of this study are threefold. First, there are five different levels of EA-SOA integration outcomes. Second, a mature EA, flexible and well-defined EA framework and comprehensive objectives of EA improve the integration outcomes. Third, the analytical separation using Archer’s theory is helpful in order to understand how these different integration outcomes are generated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper proposes that critical realism can provide a useful theoretical foundation to study enterprise architecture (EA) evolution. Specifically it will investigate the practically relevant and academically challenging question of how EAs integrate the Service-oriented Architecture (SOA). Archer’s Morphogenetic theory is used as an analytical approach to distinguish the architectural conditions under which SOA is introduced, to study the relationships between these conditions and SOA introduction, and to reflect on EA evolution (elaborations) that then take place. The focus lies on the reasons why EA evolution takes place (or not) and what architectural changes happen. This paper uses the findings of a literature review to build an a-priori model informed by Archer’s theory to understand EA evolution in a field that often lacks a solid theoretical groundwork. The findings are threefold. First, EA can evolve on different levels (different integration outcomes). Second, the integration outcomes are classified into three levels: business architecture, information systems architecture and technology architecture. Third, the analytical separation using Archer’s theory is helpful in order to understand how these different integration outcomes are generated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The occurrence of extreme movements in the spot price of electricity represents a significant source of risk to retailers. A range of approaches have been considered with respect to modelling electricity prices; these models, however, have relied on time-series approaches, which typically use restrictive decay schemes placing greater weight on more recent observations. This study develops an alternative, semi-parametric method for forecasting, which uses state-dependent weights derived from a kernel function. The forecasts that are obtained using this method are accurate and therefore potentially useful to electricity retailers in terms of risk management.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Organizations employ Enterprise Social Networks (ESNs) (e.g., Yammer) expecting better intra-organizational communication, effective knowledge sharing and, in general, greater collaboration. Despite their similarities with Public Social Networks (PSNs) (e.g., Twitter), ESNs are struggling to gain credence with employees. This paper is part of a larger research project that investigates mechanisms to enhance employees’ engagement in the ESNs. Through the lens of Control Theory, this paper reports preliminary findings of a pilot case study aimed to propose formal and informal mechanisms that impact employees’ intrinsic and extrinsic motivations to encourage their use of ESNs. The study results highlight (i) the need to better understand employees’ extrinsic and intrinsic motivations to use Social Networks, and (ii) that unlike a PSN which acts as a hedonic system, an ESN acts as a utilitarian system, highlighting the importance of supporting intrinsic motivations in its implementation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Retired business professionals represent an unexplored source of skill support for struggling rural communities. This research examined the feasibility of drawing on this valuable pool of knowledge and experience by engaging retirees in short term, project based volunteering roles in rural, not for profit agencies. Using the theory of planned behaviour and the functional approach to volunteering, the program of study generated a model comprising the key psychological and contextual factors determining the volunteers' decision to provide skill assistance in rural settings. The model provides a useful resource for creating suitable volunteering opportunities and for informing volunteer recruitment strategies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study examines nascent entrepreneurship by comparing individuals engaged in nascent activities (n=380) with a control group (n=608), after screening a sample from the general population (n=30,427). The study then follows the developmental process of nascent entrepreneurs for 18 months. Bridging and bonding social capital, consisting of both strong and weak ties, was a robust predictor for nascent entrepreneurs, as well as for advancing through the start-up process. With regard to outcomes like first sale or showing a profit, only one aspect of social capital, viz. being a member of a business network, had a statistically significant positive effect. The study supports human capital in predicting entry into nascent entrepreneurship, but only weakly for carrying the start-up process towards successful completion.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Prior to graduation engineering students are expected to provide evidence of relevant experience in the workplace. This experience is expected to provide opportunities for exposure to the profession and to help students develop confidence, skills and capabilities as emerging professionals. This investigation considers the expectations and challenges in implementing WIL programs in different contexts. While this will inform the next iteration of engineering course development at QUT the issues and interventions described provide useful insights into options available and engineering curriculum design more broadly. This comparative analysis across three phases highlights expectations and challenges including stakeholder responsibilities, expectations, and assessment. The study draws on the findings of a 2005 investigation into the purpose and provision of WIL and findings of a 2012 Faculty review of the current WIL model. The enhancement of WIL through a series of developmental phases highlights strengths and weaknesses of various models. It is anticipated that this investigation will inform course development decisions on a whole-of-course approach to WIL that improves student engagement and learning experience. The importance of WIL is not disputed. However with industry expectations, increasing student numbers and cohort diversity the ways in which students and industry currently engage in WIL are not sustainable and more creative, flexible and engaging approaches are needed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Early career engineering academics are encouraged to join and contribute to established research groups at the leading edge of their discipline. This is often facilitated by various staff development and support programs. Given that academics are often appointed primarily on the basis of their research skills and outputs, such an approach is justified and is likely to result in advancing the individual academic’s career. It also enhances their capacity to attract competitive research funding, while contributing to the overall research performance of their institution, with further potential for an increased share of government funding. In contrast, there is much less clarity of direction or availability of support mechanisms for those academics in their role as teachers. Following a general induction to teaching and learning at their institution, they would commonly think about preparing some lecture materials, whether for delivery in a face-to-face or on-line modality. Typically they would look for new references and textbooks to act as a guide for preparing the content. They would probably find out how the course has been taught before, and what laboratory facilities and experiments have been used. In all of these and other related tasks, the majority of newly appointed academics are guided strongly by their own experiences as students, rather than any firm knowledge of pedagogical principles. At a time of increased demands on academics’ time, and high expectations of performance and productivity in both research and teaching, it is essential to examine possible actions to support academics in enhancing their teaching performance in effective and efficient ways. Many resources have been produced over the years in engineering schools around the world, with very high intellectual and monetary costs. In Australia, the last few years have seen a surge in the number of ALTC/OLT projects and fellowships addressing a range of engineering education issues and providing many resources. There are concerns however regarding the extent to which these resources are being effectively utilised. Why are academics still re-inventing the wheel and creating their own version of teaching resources and pedagogical practice? Why do they spend so much of their precious time in such an inefficient way? A symposium examining the above issues was conducted at the AAEE2012 conference, and some pointers to possible responses to the above questions were obtained. These are explored in this paper and supplemented by the responses to a survey of a group of engineering education leaders on some of the aspects of these research questions. The outcomes of the workshop and survey results have been analysed in view of the literature and the ALTC/OLT sponsored learning and teaching projects and resources. Other factors are discussed, including how such resources can be found, how their quality might be evaluated, and how assessment may be appropriately incorporated, again using readily available resources. This study found a strong resonance between resources reuse with work on technology acceptance (Davis, 1989), suggesting that technology adoption models could be used to encourage resource sharing. Efficient use of outstanding learning materials is an enabling approach. The paper provides some insights on the factors affecting the re-use of available resources, and makes some recommendations and suggestions on how the issue of resources re-use might be incorporated in the process of applying and completing engineering education projects.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a series of operating schedules for Battery Energy Storage Companies (BESC) to provide peak shaving and spinning reserve services in the electricity markets under increasing wind penetration. As individual market participants, BESC can bid in ancillary services markets in an Independent System Operator (ISO) and contribute towards frequency and voltage support in the grid. Recent development in batteries technologies and availability of the day-ahead spot market prices would make BESC economically feasible. Profit maximization of BESC is achieved by determining the optimum capacity of Energy Storage Systems (ESS) required for meeting spinning reserve requirements as well as peak shaving. Historic spot market prices and frequency deviations from Australia Energy Market Operator (AEMO) are used for numerical simulations and the economic benefits of BESC is considered reflecting various aspects in Australia’s National Electricity Markets (NEM).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Business Process Management (BPM) is accepted globally as an organizational approach to enhance productivity and drive cost efficiencies. Studies confirm a shortage of BPM skilled professionals with limited opportunities to develop the required BPM expertise. This study investigates this gap starting from a critical analysis of BPM courses offered by Australian universities and training institutions. These courses were analyzed and mapped against a leading BPM capability framework to determine how well current BPM education and training offerings in Australia address the core capabilities required by BPM professionals globally. To determine the BPM skill-sets sought by industry, online recruitment advertisements were collated, analyzed, and mapped against this BPM capability framework. The outcomes provide a detailed overview on the alignment of available BPM education/training and industry demand. These insights are useful for BPM professionals and their employers to build awareness of the BPM capabilities required for a BPM mature organization. Universities and other training institutions will benefit from these results by understanding where demand is, where the gaps are, and what other BPM education providers are supplying. This structured comparison method could continue to provide a common ground for future discussion across university-industry boundaries and continuous alignment of their respective practices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a vulnerability within the generic object oriented substation event (GOOSE) communication protocol. It describes an exploit of the vulnerability and proposes a number of attack variants. The attacks sends GOOSE frames containing higher status numbers to the receiving intelligent electronic device (IED). This prevents legitimate GOOSE frames from being processed and effectively causes a hijacking of the communication channel, which can be used to implement a denial–of–service (DoS) or manipulate the subscriber (unless a status number roll-over occurs). The authors refer to this attack as a poisoning of the subscriber. A number of GOOSE poisoning attacks are evaluated experimentally on a test bed and demonstrated to be successful.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Modicon Communication Bus (Modbus) protocol is one of the most commonly used protocols in industrial control systems. Modbus was not designed to provide security. This paper confirms that the Modbus protocol is vulnerable to flooding attacks. These attacks involve injection of commands that result in disrupting the normal operation of the control system. This paper describes a set of experiments that shows that an anomaly-based change detection algorithm and signature-based Snort threshold module are capable of detecting Modbus flooding attacks. In comparing these intrusion detection techniques, we find that the signature-based detection requires a carefully selected threshold value, and that the anomaly-based change detection algorithm may have a short delay before detecting the attacks depending on the parameters used. In addition, we also generate a network traffic dataset of flooding attacks on the Modbus control system protocol.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As support grows for greater access to information and data held by governments, so does awareness of the need for appropriate policy, technical and legal frameworks to achieve the desired economic and societal outcomes. Since the late 2000s numerous international organizations, inter-governmental bodies and governments have issued open government data policies, which set out key principles underpinning access to, and the release and reuse of data. These policies reiterate the value of government data and establish the default position that it should be openly accessible to the public under transparent and non-discriminatory conditions, which are conducive to innovative reuse of the data. A key principle stated in open government data policies is that legal rights in government information must be exercised in a manner that is consistent with and supports the open accessibility and reusability of the data. In particular, where government information and data is protected by copyright, access should be provided under licensing terms which clearly permit its reuse and dissemination. This principle has been further developed in the policies issued by Australian Governments into a specific requirement that Government agencies are to apply the Creative Commons Attribution licence (CC BY) as the default licensing position when releasing government information and data. A wide-ranging survey of the practices of Australian Government agencies in managing their information and data, commissioned by the Office of the Australian Information Commissioner in 2012, provides valuable insights into progress towards the achievement of open government policy objectives and the adoption of open licensing practices. The survey results indicate that Australian Government agencies are embracing open access and a proactive disclosure culture and that open licensing under Creative Commons licences is increasingly prevalent. However, the finding that ‘[t]he default position of open access licensing is not clearly or robustly stated, nor properly reflected in the practice of Government agencies’ points to the need to further develop the policy framework and the principles governing information access and reuse, and to provide practical guidance tools on open licensing if the broadest range of government information and data is to be made available for innovative reuse.