936 resultados para existing
Resumo:
This thesis employs the theoretical fusion of disciplinary knowledge, interlacing an analysis from both functional and interpretive frameworks and applies these paradigms to three concepts—organisational identity, the balanced scorecard performance measurement system, and control. As an applied thesis, this study highlights how particular public sector organisations are using a range of multi-disciplinary forms of knowledge constructed for their needs to achieve practical outcomes. Practical evidence of this study is not bound by a single disciplinary field or the concerns raised by academics about the rigorous application of academic knowledge. The study’s value lies in its ability to explore how current communication and accounting knowledge is being used for practical purposes in organisational life. The main focus of this thesis is on identities in an organisational communication context. In exploring the theoretical and practical challenges, the research questions for this thesis were formulated as: 1. Is it possible to effectively control identities in organisations by the use of an integrated performance measurement system—the balanced scorecard—and if so, how? 2. What is the relationship between identities and an integrated performance measurement system—the balanced scorecard—in the identity construction process? Identities in the organisational context have been extensively discussed in graphic design, corporate communication and marketing, strategic management, organisational behaviour, and social psychology literatures. Corporate identity is the self-presentation of the personality of an organisation (Van Riel, 1995; Van Riel & Balmer, 1997), and organisational identity is the statement of central characteristics described by members (Albert & Whetten, 2003). In this study, identity management is positioned as a strategically complex task, embracing not only logo and name, but also multiple dimensions, levels and facets of organisational life. Responding to the collaborative efforts of researchers and practitioners in identity conceptualisation and methodological approaches, this dissertation argues that analysis can be achieved through the use of an integrated framework of identity products, patternings and processes (Cornelissen, Haslam, & Balmer, 2007), transforming conceptualisations of corporate identity, organisational identity and identification studies. Likewise, the performance measurement literature from the accounting field now emphasises the importance of ‘soft’ non-financial measures in gauging performance—potentially allowing the monitoring and regulation of ‘collective’ identities (Cornelissen et al., 2007). The balanced scorecard (BSC) (Kaplan & Norton, 1996a), as the selected integrated performance measurement system, quantifies organisational performance under the four perspectives of finance, customer, internal process, and learning and growth. Broadening the traditional performance measurement boundary, the BSC transforms how organisations perceived themselves (Vaivio, 2007). The rhetorical and communicative value of the BSC has also been emphasised in organisational self-understanding (Malina, Nørreklit, & Selto, 2007; Malmi, 2001; Norreklit, 2000, 2003). Thus, this study establishes a theoretical connection between the controlling effects of the BSC and organisational identity construction. Common to both literatures, the aspects of control became the focus of this dissertation, as ‘the exercise or act of achieving a goal’ (Tompkins & Cheney, 1985, p. 180). This study explores not only traditional technical and bureaucratic control (Edwards, 1981), but also concertive control (Tompkins & Cheney, 1985), shifting the locus of control to employees who make their own decisions towards desired organisational premises (Simon, 1976). The controlling effects on collective identities are explored through the lens of the rhetorical frames mobilised through the power of organisational enthymemes (Tompkins & Cheney, 1985) and identification processes (Ashforth, Harrison, & Corley, 2008). In operationalising the concept of control, two guiding questions were developed to support the research questions: 1.1 How does the use of the balanced scorecard monitor identities in public sector organisations? 1.2 How does the use of the balanced scorecard regulate identities in public sector organisations? This study adopts qualitative multiple case studies using ethnographic techniques. Data were gathered from interviews of 41 managers, organisational documents, and participant observation from 2003 to 2008, to inform an understanding of organisational practices and members’ perceptions in the five cases of two public sector organisations in Australia. Drawing on the functional and interpretive paradigms, the effective design and use of the systems, as well as the understanding of shared meanings of identities and identifications are simultaneously recognised. The analytical structure guided by the ‘bracketing’ (Lewis & Grimes, 1999) and ‘interplay’ strategies (Schultz & Hatch, 1996) preserved, connected and contrasted the unique findings from the multi-paradigms. The ‘temporal bracketing’ strategy (Langley, 1999) from the process view supports the comparative exploration of the analysis over the periods under study. The findings suggest that the effective use of the BSC can monitor and regulate identity products, patternings and processes. In monitoring identities, the flexible BSC framework allowed the case study organisations to monitor various aspects of finance, customer, improvement and organisational capability that included identity dimensions. Such inclusion legitimises identity management as organisational performance. In regulating identities, the use of the BSC created a mechanism to form collective identities by articulating various perspectives and causal linkages, and through the cascading and alignment of multiple scorecards. The BSC—directly reflecting organisationally valued premises and legitimised symbols—acted as an identity product of communication, visual symbols and behavioural guidance. The selective promotion of the BSC measures filtered organisational focus to shape unique identity multiplicity and characteristics within the cases. Further, the use of the BSC facilitated the assimilation of multiple identities by controlling the direction and strength of identifications, engaging different groups of members. More specifically, the tight authority of the BSC framework and systems are explained both by technical and bureaucratic controls, while subtle communication of organisational premises and information filtering is achieved through concertive control. This study confirms that these macro top-down controls mediated the sensebreaking and sensegiving process of organisational identification, supporting research by Ashforth, Harrison and Corley (2008). This study pays attention to members’ power of self-regulation, filling minor premises of the derived logic of their organisation through the playing out of organisational enthymemes (Tompkins & Cheney, 1985). Members are then encouraged to make their own decisions towards the organisational premises embedded in the BSC, through the micro bottom-up identification processes including: enacting organisationally valued identities; sensemaking; and the construction of identity narratives aligned with those organisationally valued premises. Within the process, the self-referential effect of communication encouraged members to believe the organisational messages embedded in the BSC in transforming collective and individual identities. Therefore, communication through the use of the BSC continued the self-producing of normative performance mechanisms, established meanings of identities, and enabled members’ self-regulation in identity construction. Further, this research establishes the relationship between identity and the use of the BSC in terms of identity multiplicity and attributes. The BSC framework constrained and enabled case study organisations and members to monitor and regulate identity multiplicity across a number of dimensions, levels and facets. The use of the BSC constantly heightened the identity attributes of distinctiveness, relativity, visibility, fluidity and manageability in identity construction over time. Overall, this research explains the reciprocal controlling relationships of multiple structures in organisations to achieve a goal. It bridges the gap among corporate and organisational identity theories by adopting Cornelissen, Haslam and Balmer’s (2007) integrated identity framework, and reduces the gap in understanding between identity and performance measurement studies. Parallel review of the process of monitoring and regulating identities from both literatures synthesised the theoretical strengths of both to conceptualise and operationalise identities. This study extends the discussion on positioning identity, culture, commitment, and image and reputation measures in integrated performance measurement systems as organisational capital. Further, this study applies understanding of the multiple forms of control (Edwards, 1979; Tompkins & Cheney, 1985), emphasising the power of organisational members in identification processes, using the notion of rhetorical organisational enthymemes. This highlights the value of the collaborative theoretical power of identity, communication and performance measurement frameworks. These case studies provide practical insights about the public sector where existing bureaucracy and desired organisational identity directions are competing within a large organisational setting. Further research on personal identity and simple control in organisations that fully cascade the BSC down to individual members would provide enriched data. The extended application of the conceptual framework to other public and private sector organisations with a longitudinal view will also contribute to further theory building.
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
Resumo:
Introduction Among the many requirements of establishing community health, a healthy urban environment stands out as significant one. A healthy urban environment constantly changes and improves community well-being and expands community resources. The promotion efforts for such an environment, therefore, must include the creation of structures and processes that actively work to dismantle existing community inequalities. In general, these processes are hard to manage; therefore, they require reliable planning and decision support systems. Current and previous practices justify that the use of decision support systems in planning for healthy communities have significant impacts on the communities. These impacts include but are not limited to: increasing collaboration between stakeholders and the general public; improving the accuracy and quality of the decision making process; enhancing healthcare services; and improving data and information availability for health decision makers and service planners. Considering the above stated reasons, this study investigates the challenges and opportunities of planning for healthy communities with the specific aim of examining the effectiveness of participatory planning and decision systems in supporting the planning for such communities. Methods This study introduces a recently developed methodology, which is based on an online participatory decision support system. This new decision support system contributes to solve environmental and community health problems, and to plan for healthy communities. The system also provides a powerful and effective platform for stakeholders and interested members of the community to establish an empowered society and a transparent and participatory decision making environment. Results The paper discusses the preliminary findings from the literature review of this decision support system in a case study of Logan City, Queensland. Conclusion The paper concludes with future research directions and applicability of this decision support system in health service planning elsewhere.
Resumo:
This paper investigates the current turbulent state of copyright in the digital age, and explores the viability of alternative compensation systems that aim to achieve the same goals with fewer negative consequences for consumers and artists. To sustain existing business models associated with creative content, increased recourse to DRM (Digital Rights Management) technologies, designed to restrict access to and usage of digital content, is well underway. Considerable technical challenges associated with DRM systems necessitate increasingly aggressive recourse to the law. A number of controversial aspects of copyright enforcement are discussed and contrasted with those inherent in levy based compensation systems. Lateral exploration of the copyright dilemma may help prevent some undesirable societal impacts, but with powerful coalitions of creative, consumer electronics and information technology industries having enormous vested interest in current models, alternative schemes are frequently treated dismissively. This paper focuses on consideration of alternative models that better suit the digital era whilst achieving a more even balance in the copyright bargain.
Resumo:
Hazard perception in driving involves a number of different processes. This paper reports the development of two measures designed to separate these processes. A Hazard Perception Test was developed to measure how quickly drivers could anticipate hazards overall, incorporating detection, trajectory prediction, and hazard classification judgements. A Hazard Change Detection Task was developed to measure how quickly drivers can detect a hazard in a static image regardless of whether they consider it hazardous or not. For the Hazard Perception Test, young novices were slower than mid-age experienced drivers, consistent with differences in crash risk, and test performance correlated with scores in pre-existing Hazard Perception Tests. For drivers aged 65 and over, scores on the Hazard Perception Test declined with age and correlated with both contrast sensitivity and a Useful Field of View measure. For the Hazard Change Detection Task, novices responded quicker than the experienced drivers, contrary to crash risk trends, and test performance did not correlate with measures of overall hazard perception. However for drivers aged 65 and over, test performance declined with age and correlated with both hazard perception and Useful Field of View. Overall we concluded that there was support for the validity of the Hazard Perception Test for all ages but the Hazard Change Detection Task might only be appropriate for use with older drivers.
Resumo:
Process modeling is a central element in any approach to Business Process Management (BPM). However, what hinders both practitioners and academics is the lack of support for assessing the quality of process models – let alone realizing high quality process models. Existing frameworks are highly conceptual or too general. At the same time, various techniques, tools, and research results are available that cover fragments of the issue at hand. This chapter presents the SIQ framework that on the one hand integrates concepts and guidelines from existing ones and on the other links these concepts to current research in the BPM domain. Three different types of quality are distinguished and for each of these levels concrete metrics, available tools, and guidelines will be provided. While the basis of the SIQ framework is thought to be rather robust, its external pointers can be updated with newer insights as they emerge.
Resumo:
Driver aggression is a road safety issue of growing concern throughout most highly motorised countries, yet to date there is no comprehensive model that deals with this issue in the road safety area. This paper sets out to examine the current state of research and theory on aggressive driving with a view to incorporating useful developments in the area of human aggression from mainstream psychological research. As a first step, evidence regarding the prevalence and incidence of driver aggression, including the impact of the phenomenon on crash rates is reviewed. Inconsistencies in the definition and operationalisation of driver aggression that have hampered research in the area are noted. Existing models of driver aggression are then identified and the need to distinguish and address the role of intentionality as well as the purpose of perpetrating behaviours within both these and research efforts is highlighted. Drawing on recent findings from psychological research into general aggression, it is argued that progress in understanding driver aggression requires models that acknowledge not only the person-related and situational factors, but the cognitive and emotional appraisal processes involved in driver aggression. An effective model is expected to allow the explanation of not only the likelihood and severity of driver aggression behaviours, but also the escalation of incidents within the context of the road environment.
Resumo:
INTRODUCTION: Queensland University of Technology (QUT) Library is partnering with High Performance Computing (HPC) services and the Division of Research and Commercialisation to develop and deliver a range of integrated research support services and systems designed to enhance the research capabilities of the University. Existing and developing research support services include - support for publishing strategies including open access, bibliographic citation and ranking services, research data management, use of online collaboration tools, online survey tools, quantitative and qualitative data analysis, content management and storage solutions. In order to deliver timely and effective research referral and support services, it is imperative that library staff maintain their awareness of, and develop expertise in new eResearch methods and technologies. ---------- METHODS: In 2009/10 QUT Library initiated an online survey for support staff and researchers and a series of focus groups for researchers aimed at gaining a better understanding of current and future eresearch practices and skills. These would better inform the development of a research skills training program and the development of new research support services. The Library and HPC also implemented a program of seminars and workshops designed to introduce key library staff to a broad range of eresearch concepts and technologies. Feedback was obtained after each training session. A number of new services were implemented throughout 2009 and 2010. ---------- RESULTS: Key findings of the survey and focus groups are related to the development of the staff development program. Feedback from program attendees is provided and evaluated. The staff development program is assessed in terms of its success to support the implementation of new research support services. --------- CONCLUSIONS QUT Library has embarked on an ambitious awareness and skills development program to assist Library staff transition a period of rapid change and broadening scope for the Library. Successes and challenges of the program are discussed. A number of recommendations are made in retrospect and also looking forward to the future training needs of Library staff to support the University’s future research goals.
Resumo:
The ‘creative industries’ idea does not belong to anyone, and its orphan status in the disciplinary family has been one of its continuing problems. No existing science developed a theory that could then be tested, using formal hypotheses, experiments, fieldwork, data-analysis and the like.
Resumo:
Background: There is overwhelming scientific evidence that human activities have changed and will continue to change the climate of the Earth. Eco-environmental health, which refers to the interdependencies between ecological systems and population health and well-being, is likely to be significantly influenced by climate change. The aim of this study was to examine perceptions from government stakeholders and other relevant specialists about the threat of climate change, their capacity to deal with it, and how to develop and implement a framework for assessing vulnerability of eco-environmental health to climate change.---------- Methods: Two focus groups were conducted in Brisbane, Australia with representatives from relevant government agencies, non-governmental organisations, and the industry sector (n = 15) involved in the discussions. The participants were specialists on climate change and public health from governmental agencies, industry, and nongovernmental organisations in South-East Queensland.---------- Results: The specialists perceived climate change to be a threat to eco-environmental health and had substantial knowledge about possible implications and impacts. A range of different methods for assessing vulnerability were suggested by the participants and the complexity of assessment when dealing with multiple hazards was acknowledged. Identified factors influencing vulnerability were perceived to be of a social, physical and/or economic nature. They included population growth, the ageing population with associated declines in general health and changes in the vulnerability of particular geographical areas due to for example, increased coastal development, and financial stress. Education, inter-sectoral collaboration, emergency management (e.g. development of early warning systems), and social networks were all emphasised as a basis for adapting to climate change. To develop a framework, different approaches were discussed for assessing eco-environmental health vulnerability, including literature reviews to examine the components of vulnerability such as natural hazard risk and exposure and to investigate already existing frameworks for assessing vulnerability.---------- Conclusion: The study has addressed some important questions in regard to government stakeholders and other specialists’ views on the threat of climate change and its potential impacts on eco-environmental health. These findings may have implications in climate change and public health decision-making.
Resumo:
The behavioral theory of “entrepreneurial bricolage” attempts to understand what entrepreneurs do when faced with resource constraints. Prior research suggests that bricolage behaviors enable firms to “make do” through recombining existing resources and may assist in the development of firms that are better able to manage market uncertainties, survive and perhaps even flourish despite resource constraints. Using a new survey measure we further theorize and test the moderating effects of firm strategic change and innovativeness on bricolage and firm performance. Our findings suggest that changes in core elements of the business and degree of innovation reduce the positive effects of bricolage in young firm performance.
Resumo:
This article examines the role of copyrights in contemporary media literacies. It argues that, provided they are ethical, young people’s engagement with text should occur in environments that are as free from restriction as possible. Discussion of open culture ecologies and the emergent education commons is followed by a theorisation of both literacy and copyrights education as forms of epistemology: that is, as effects of knowledge producing discourses and practices. Because Creative Commons licenses respect and are based on existing copyright laws, a brief overview of traditional copyrights for educators is first provided. We then describe the voluntary Creative Commons copyright licensing framework (“some rights reserved”) as an alternative to conventional “all rights reserved” models. This is followed by an account of a series of workshop activities on copyrights and Creative Commons conducted by the authors in the media literacy classes of a preservice teacher education program in Queensland, Australia. It provides one example of a practical program on critical copyrights approaches, which may be adapted and used by other school and higher education institutions.
Resumo:
Accessibility to affordable housing for low income people are one of the housing problems in Indonesia, especially in major cities like Jakarta and Surabaya. Government has provided indirect subsidised on home ownership for low income people through planning instrument such as inclusionary zoning. However, low cost housing has been located in cheaper land which is very far from city and employment centre. This paper aims to discuss recent government initiatives to support low cost strata title housing in prime location which closer to the employment centre. This paper compares the characteristics of existing affordable housing solutions and focus on a new initiative as a case study. Learning from this initiative will allow a recommendation on application of similar scheme in other sites. The land availability, high construction cost, culture barriers and higher risk with lower return have been named as main barriers on repeating this model in other sites. Moreover, the high-rise solution is still very expensive compared to landed houses.
Resumo:
The purpose of this paper is to highlight important issues in the study of dysfunctional customer behavior and to provide a research agenda to inspire, guide, and enthuse. Through a critical evaluation of existing research, the aim is to highlight key issues and to present potentially worthy avenues for future study.
Resumo:
To date, much work has been done to examine the ways in which information literacy – a way of thinking about, existing alongside and working with information- functions in an academic setting. However, its role in the non-academic library professions has been largely ignored. Given that the public librarian is responsible for designing and delivering services and programmes aimed at supporting the information literacy needs of the community-at-large there is great value to be had from examining the ways in which public libraries understand and experience IL. The research described in this paper investigates, through the use of phenomenography; the ways in which public librarians understand and experience the concept of Information Literacy.