933 resultados para Business schools
Resumo:
The competent leadership and governance of digital transformation needs to involve the board of directors. The reported lack of such capability in boards is becoming a pressing issue. Underpinning leadership in such transformation are the competencies to effectively govern Enterprise Technology (ETG). In this paper we take the position that ETG competencies are essential in boards because competent enterprise business technology governance has been shown to contribute to increased revenue, profit, and returns. We report the industry validation processes of a set of three board-of-director competencies needed for effective ETG related to strategy and planning; investment and risk; and, innovation and value creation. We conclude that gaps in board ETG competence remain.
Resumo:
On 21 September 1999 Division 152 was inserted into the Income Tax Assessment Act (1997) (ITAA 1997). Division 152 contains the small business CGT concessions, which enables eligible small business taxpayers to reduce the amount of tax payable on capital gains arising from certain CGT events that occur after 11:45 am on 21 September 1999. One of the principal objectives of the legislation is to provide a concessionary regime for small business owners who do not have the same ability to access the concessionary superannuation regime generally available to employees. When announcing the introduction of the concessions the then Federal Treasurer, Mr Peter Costello, specifically stated that the objective of Division 152 was to provide ‘small business people with access to funds for retirement or expansion’. The purpose of this article is to: one, assess the extent to which small business taxpayers understand the CGT small business concessions, particularly when considering the sale of their business; two, determine which of the four small business CGT concessions are most commonly adopted and/or recommended by tax practitioners to clients; and three, to determine whether the superannuation changes in relation to the capping of the concessional superannuation thresholds have had an impact on the use of the small business retirement concession.
Resumo:
There is consensus among practitioners and academics that culture is a critical factor that is able to determine success or failure of BPM initiatives. Yet, culture is a topic that seems difficult to grasp and manage. This may be the reason for the overall lack of guidance on how to address this topic in practice. We have conducted in-depth research for more than three years to examine why and how culture is relevant to BPM. In this chapter, we introduce a framework that explains the role of culture in BPM. We also present the relevant cultural values that compose a BPM culture, and we introduce a tool to examine the supportiveness of organizational cultures for BPM. Our research results provide the basis for further empirical analyses on the topic and support practitioners in the management of culture as an important factor in BPM initiatives.
Resumo:
This paper describes moral education in Indonesia, more particularly, how teachers have implemented the Character Education policy issued by the Ministry of Education and Culture (MOEC) in 2010. This policy required teachers to instil certain values in every lesson, including EFL lessons, to contribute towards building a shared national moral character. Drawing on Durkheim's distinction between secular and religious morality, this paper considers how state schools accommodated and promoted this ‘rational moral education' or secular morality (Durkheim, 1925) in government schools, and how it interacted with religious moral education. This paper uses Bernstein's concepts of pedagogic discourse, instructional and regulative discourses to analyse how teachers have recontextualised this policy in the micro pedagogic settings of their EFL classes. Three types of data were collected for this study: interviews, class observations and teachers' lesson plans. In this way, four EFL teachers working in state schools were interviewed on two occasions and three of their classes were observed. The first interview identified teachers' beliefs and perceptions regarding the Character Education policy. Their classroom and lesson plans were observed to augment this information. Then the final interview asked about the teacher's thinking behind their actions in the observed classes. Since character education was issued within the broader frame of school based curriculum that offered schools and teachers more choices to develop the local curriculum and its intent, the analysis will focus on what moral premises were evident in their school and classes, and how such morality was transmitted through the EFL lessons. The conclusion suggests that teachers' implementation of moral education in their classes was dominated by their school communities and the teachers' own preferred value of religiosity. Such value played out in the classes through both the regulative discourse and the instructional discourse.
Resumo:
Business processes are prone to continuous and unexpected changes. Process workers may start executing a process differently in order to adjust to changes in workload, season, guidelines or regulations for example. Early detection of business process changes based on their event logs – also known as business process drift detection – enables analysts to identify and act upon changes that may otherwise affect process performance. Previous methods for business process drift detection are based on an exploration of a potentially large feature space and in some cases they require users to manually identify the specific features that characterize the drift. Depending on the explored feature set, these methods may miss certain types of changes. This paper proposes a fully automated and statistically grounded method for detecting process drift. The core idea is to perform statistical tests over the distributions of runs observed in two consecutive time windows. By adaptively sizing the window, the method strikes a trade-off between classification accuracy and drift detection delay. A validation on synthetic and real-life logs shows that the method accurately detects typical change patterns and scales up to the extent it is applicable for online drift detection.
Resumo:
This paper addresses the problem of identifying and explaining behavioral differences between two business process event logs. The paper presents a method that, given two event logs, returns a set of statements in natural language capturing behavior that is present or frequent in one log, while absent or infrequent in the other. This log delta analysis method allows users to diagnose differences between normal and deviant executions of a process or between two versions or variants of a process. The method relies on a novel approach to losslessly encode an event log as an event structure, combined with a frequency-enhanced technique for differencing pairs of event structures. A validation of the proposed method shows that it accurately diagnoses typical change patterns and can explain differences between normal and deviant cases in a real-life log, more compactly and precisely than previously proposed methods.
Resumo:
Students in secondary schools experience problems that can impact on their well-being and educational outcomes. Although face-to-face counselling is available in most Australian secondary schools, many students, particularly boys, do not seek appropriate help. Research suggests that online counselling can be effective and increase engagement. This study of 215 secondary school students sought to assess students' intention to use online counselling if it was made available in schools. The results found no gender difference in the likely intentions to seek online help though year level was significant and students experiencing psychological distress had a preference for online counselling. If students did use online counselling it was more likely they would discuss sensitive topics rather than for career issues. Implications for school counselling are discussed.
Resumo:
Process improvement and innovation are risky endeavors, like swimming in unknown waters. In this chapter, I will discuss how process innovation through BPM can benefit from Research-as-a-Service, that is, from the application of research concepts in the processes of BPM projects. A further subject will be how innovations can be converted from confidence-based to evidence-based models due to affordances of digital infrastructures such as large-scale enterprise soft-ware or social media. I will introduce the relevant concepts, provide illustrations for digital capabilities that allow for innovation, and share a number of key takeaway lessons for how organizations can innovate on the basis of digital opportunities and principles of evidence-based BPM: the foundation of all process decisions in facts rather than fiction.
Resumo:
We fail children who experience difficulty in school and with learning almost every day in Australia and in so many ways. These children can fall through a myriad of cracks: cracks that appear in some schools and not others, cracks that exist for different reasons whether they be capacity, belief or resource-related, and cracks that are exacerbated by industrial relations and education policy. Whatever their origin, these cracks need to be addressed.
Resumo:
Many organizations realize that increasing amounts of data (“Big Data”) need to be dealt with intelligently in order to compete with other organizations in terms of efficiency, speed and services. The goal is not to collect as much data as possible, but to turn event data into valuable insights that can be used to improve business processes. However, data-oriented analysis approaches fail to relate event data to process models. At the same time, large organizations are generating piles of process models that are disconnected from the real processes and information systems. In this chapter we propose to manage large collections of process models and event data in an integrated manner. Observed and modeled behavior need to be continuously compared and aligned. This results in a “liquid” business process model collection, i.e. a collection of process models that is in sync with the actual organizational behavior. The collection should self-adapt to evolving organizational behavior and incorporate relevant execution data (e.g. process performance and resource utilization) extracted from the logs, thereby allowing insightful reports to be produced from factual organizational data.
Resumo:
Mismatches between services needing to interoperate have been addressed through the adaptation of structural and behavioural interfaces of services, which in practice incur long lead time through manual, coding effort. We propose a framework, complementary to con- ventional service adaptation, to synthesise service interfaces in the open setting of business networks, allowing consumers to introspect service interfaces and formulate service invocations. The framework also allows evolved service requests, as new features of service capabilities are discov- ered, through interactions with other, similar services. Finally the frame- work fosters reuse of adaptation efforts through normalisation of struc- tural and behavioural interfaces of similar services. This paper provides a first exposition of the service interface synthesis framework, describing patterns containing novel requirements for unilateral service adaptation and detailing the interface synthesis technique. Complex examples of ser- vices drawn from commercial logistic systems are then used to validate the synthesis technique and identify open challenges and future research directions.
Resumo:
The relationship between corporate and sustainability performance continues to be controversial and unclear, not withstanding numerous theoretical and empirical studies. Despite this, views on corporate responsibilities “meet where management can show how voluntary social and environmental management contributes to the competitiveness and economic success of the company.” This approach is fundamental to the business case for infrastructure sustainability. It suggests that beyond-compliance activities undertaken by companies are commercially justified if they can be shown to contribute to profitability and shareholder value. Potential public good benefits range across a wide spectrum of economic (for example employment, local purchasing, reduced demand for electricity generation), social (indigenous employment and development, equity of access), and environmental (lower greenhouse gas emission, reduced use of non-renewable resources and potable water, less waste, enhanced biodiversity). Some of these benefits have impacts that lie in more than one of the economic, social, and environmental areas of public goods. Using a sustainability rating schemes and potential business benefits from sustainability initiatives, this paper presents a brief summary of an online survey of industry that identifies how rating scheme themes and business benefits relate. This allows for a case to be built demonstrating which sustainability themes offer particular business benefits.
Resumo:
XACML has become the defacto standard for enterprise- wide, policy-based access control. It is a structured, extensible language that can express and enforce complex access control policies. There have been several efforts to extend XACML to support specific authorisation models, such as the OASIS RBAC profile to support Role Based Access Control. A number of proposals for authorisation models that support business processes and workflow systems have also appeared in the literature. However, there is no published work describing an extension to allow XACML to be used as a policy language with these models. This paper analyses the specific requirements of a policy language to express and enforce business process authorisation policies. It then introduces BP-XACML, a new profile that extends the RBAC profile for XACML so it can support business process authorisation policies. In particular, BP-XACML supports the notion of tasks, and constraints at the level of a task instance, which are important requirements in enforcing business process authorisation policies.
Resumo:
Assessments of students in primary and secondary education are debated among practitioners, policy-makers, and parents. In some countries, assessment scores serve a criterion for passage between levels of education, for example, from secondary school to post-secondary education. Those practices are often traditions and while they come under criticism, they are a long-accepted part of the educational practices within a country. In those countries, the students’ assessment and examination scores are posted in public places or published in local news media. In other countries, assessments are used for the periodic checks on individual student progress. The results of assessments may be used for rating schools, and in some cases, they are used for evaluating the performance of teachers. Assessments are used less often to analyze student performance and make judgments regarding the performance of the curriculum. Even less often, assessments serve to critically establish strategies for the improvement of student learning and educational practices. The ends on the continuum of the assessment debate often focus on the opportunities that assessments present to improve education on one end. The other end is that assessments serve as a major distraction from the important work of teachers by removing classroom room time from instruction. The debate on those issues continues.
Resumo:
"We live in times in which unlearning has become as important as learning. Dan Pink has called these times the Conceptual Age,i to distinguish them from the Knowledge/Information Age in which many of us were born and educated. Before the current Conceptual Age, the core business of learning was the routine accessing of information to solve routine problems, so there was real value in retaining and reusing the templates taught to us at schools and universities. What is different about the Conceptual Age is that it is characterised by new cultural forms and modes of consumption that require us to unlearn our Knowledge/Information Age habits to live well in our less predictable social world. The ‘correct’ way to write, for example, is no longer ‘correct’ if communicating by hypertext rather than by essay or letter. And who would bother with an essay or a letter or indeed a pen these days? Whether or not we agree that the Conceptual Age, amounts to the first real generation gap since rock and roll, as Ken Robinson claims,ii it certainly makes unique demands of educators, just as it makes unique demands of the systems, strategies and sustainability of organisations. Foremost among these demands, according to innovation analyst Charlie Leadbeater,iii is to unlearn the idea that we are becoming a more knowledgeable society with each new generation. If knowing means being intimately familiar with the knowledge embedded in the technologies we use in our daily lives, then, Leadbeater says, we have never been more ignorant.iv He reminds us that our great grandparents had an intimate knowledge of the technologies around them, and had no problem with getting the butter churn to work or preventing the lamp from smoking. Few of us would know what to do if our mobile phones stopped functioning, just as few of us know what is ‘underneath’ or ‘behind’ the keys of our laptops. Nor, indeed, do many of us want to know. But this means that we are all very quickly reduced to the quill and the lamp if we lose our power sources or if our machines cease to function. This makes us much more vulnerable – as well as much more ignorant in relative terms – than our predecessors."