848 resultados para Blending conceptual


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose - The purpose of this paper is to analyse the concept of supply chain collaboration and to provide an overall framework that can be used as a conceptual landmark for further empirical research. In addition, the concept is explored in the context of agri-food industry and particularities are identified. Finally, the paper submits empirical evidence from an exploratory case study in the agri-food industry, at the grower-processor interface, and information regarding the way the concept is actually applied in small medium-sized enterprises (SMEs) is presented. Design/methodology/approach - The paper employed case study research by conducting in-depth interviews in the two companies. Findings - Supply chain collaboration concept is of significant importance for the agri-food industry however, some constraints arise due to the nature of industry's products, and the specific structure of the sector. Subsequently, collaboration in the supply chain is often limited to operational issues and to logistics-related activities. Research limitations/implications - Research is limited to a single case study and further qualitative testing of the conceptual model is needed in order to adjust the model before large scale testing. Practical implications - Case study findings may be transferable to other similar dual relationships at the grower-processor interface. Weaker parts in asymmetric relationships have opportunities to improve their position, altering the dependence balance, by achieving product/process excellence. Originality/value - The paper provides evidence regarding the applicability of the supply chain collaboration concept in the agri-food industry. It takes into consideration not relationships between big multinational companies, but SMEs. © Emerald Group Publishing Limited.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a causal explanation of formative variables that unpacks and clarifies the generally accepted idea that formative indicators are ‘causes’ of the focal formative variable. In doing this, we explore the recent paper by Diamantopoulos and Temme (AMS Review, 3(3), 160-171, 2013) and show that the latter misunderstand the stance of Lee, Cadogan, and Chamberlain (AMS Review, 3(1), 3-17, 2013; see also Cadogan, Lee, and Chamberlain, AMS Review, 3(1), 38-49, 2013). By drawing on the multiple ways that one can interpret the idea of causality within the MIMIC model, we then demonstrate how the continued defense of the MIMIC model as a tool to validate formative indicators and to identify formative variables in structural models is misguided. We also present unambiguous recommendations on how formative variables can be modelled in lieu of the formative MIMIC model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A cross-country pipeline construction project is exposed to an uncertain environment due to its enormous size (physical, manpower requirement and financial value), complexity in design technology and involvement of external factors. These uncertainties can lead to several changes in project scope during the process of project execution. Unless the changes are properly controlled, the time, cost and quality goals of the project may never be achieved. A methodology is proposed for project control through risk analysis, contingency allocation and hierarchical planning models. Risk analysis is carried out through the analytic hierarchy process (AHP) due to the subjective nature of risks in construction projects. The results of risk analysis are used to determine the logical contingency for project control with the application of probability theory. Ultimate project control is carried out by hierarchical planning model which enables decision makers to take vital decisions during the changing environment of the construction period. Goal programming (GP), a multiple criteria decision-making technique, is proposed for model formulation because of its flexibility and priority-base structure. The project is planned hierarchically in three levels—project, work package and activity. GP is applied separately at each level. Decision variables of each model are different planning parameters of the project. In this study, models are formulated from the owner's perspective and its effectiveness in project control is demonstrated.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Projections into future increasingly suggest that the intensity and frequency of Extreme Weather Events (EWEs) will increase in the future. This has demanded the business organisations as well to be prepared to face the increasing risk of EWEs, in order to ensure their business continuity. However, current evidence base suggests that businesses, especially SMEs, are not adequately prepared to face the threat of such events. Ability to adequately prepare them has been hindered by the lack of in depth studies addressing this issue. The paper presents a doctoral study designed to investigate the resilience of SMEs operating in the construction sector; which is said to be a highly vulnerable sector for the impacts of EWEs, and their supply chains to EWEs. A conceptual framework developed to investigate this issue is presented and explained. It is argued that the resilience of construction SMEs and their supply chains against EWEs can be improved by a combination of reducing their vulnerability, enhancing coping capacity and implementing coping mechanisms. Importance of undertaking a broader view to include the whole supply chain in making business decisions with regard to EWEs by SMEs is also highlighted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The role that student friendship groups play in learning was investigated here. Employing a critical realist design, two focus groups on undergraduates were conducted to explore their experience of studying. Data from the "case-by-case" analysis suggested student-to-student friendships produced social contexts which facilitated conceptual understanding through discussion, explanation, and application to "real life" contemporary issues. However, the students did not conceive this as a learning experience or suggest the function of their friendships involved learning. These data therefore challenge the perspective that student groups in higher education are formed and regulated for the primary function of learning. Given these findings, further research is needed to assess the role student friendships play in developing disciplinary conceptual understanding.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The conceptual foundations of the models and procedures for prediction of the avalanche-dangerous situations initiation are considered. The interpretation model for analysis of the avalanche-dangerous situations initiation based on the definition of probabilities of correspondence of studied parameters to the probabilistic distributions of avalanche-dangerous or avalanche non-dangerous situations is offered. The possibility to apply such a model to the real data is considered. The main approaches to the use of multiple representations for the avalanche dangerous situations initiation analysis are generalized.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper deals with the security problems of DRM protected e-learning content. After a short review of the main DRM systems and methods used in e-learning, an examination is made of participators in DRM schemes (e-learning object author, content creator, content publisher, license creator and end user). Then a conceptual model of security related processes of DRM implementation is proposed which is improved afterwards to reflect some particularities in DRM protection of e-learning objects. A methodical way is used to describe the security related motives, responsibilities and goals of the main participators involved in the DRM system. Taken together with the process model, these security properties are used to establish a list of requirements to fulfill and a possibility for formal verification of real DRM systems compliance with these requirements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper represents a verification of a previously developed conceptual model of security related processes in DRM implementation. The applicability of established security requirements in practice is checked as well by comparing these requirements to four real DRM implementations (Microsoft Media DRM, Apple's iTunes, SunnComm Technologies’s MediaMax DRM and First4Internet’s XCP DRM). The exploited weaknesses of these systems resulting from the violation of specific security requirements are explained and the possibilities to avoid the attacks by implementing the requirements in designing step are discussed.