932 resultados para Hotel management agreement


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The overarching objective of the research was to identify the existence and nature of international legal principles governing sustainable forest use and management. This research intended to uncover a set of forest legal considerations that are relevant for consideration across the globe. The purpose behind this, is to create a theoretical base of international forest law literature which be drawn upon to inform future international forestry research. This research will be of relevance to those undertaking examination of a particular forest issue or those focusing on forests in a particular region. The thesis explains the underlying legal issues in forest regulation, the dominant international regulatory approaches and makes suggestions as to how international and national forest policy could be improved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Infrastructure capacity management is the process of ensuring optimal provision of infrastructure assets to support business operations. Effectiveness in this process will enable infrastructure asset owners and its stakeholders to receive full value on their investment. Management research has shown that an organisation can only achieve business value when it has the right capabilities. This paradigm can also be applied to infrastructure capacity management. With competing needs for limited organisation resources, the challenge for infrastructure organisations is to identify and invest their limited resources to develop the right capabilities in the management of their infrastructure capacity. Using a multiple case study approach, the challenges faced in the management of infrastructure asset capacity and the approaches that can be adopted to overcome these challenges were explored. Conceptualising the approaches adopted by the case participants, the findings suggest that infrastructure organisations must strengthen their stakeholder connectivity capability in order to effectively manage the capacity of their infrastructure assets.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Business transformations are large-scale organizational change programs that, evidence suggests, are often unsuccessful. Our interest is in identifying the management capabilities required for the successful execution of these projects. We advance a service-oriented view of the enterprise, which suggests that different management services need to be identified and integrated in order to execute business transformation. In order to identify those management services that require integration, we conducted an exploratory empirical study of the demand for management services in US and Asia, and we show that two archetypes of management services exist in business transformation initiatives: transactional and transformational management services. We identify the relevant set of transactional and transformational services and discuss what the demand for these services implies for the execution of business transformations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis argues that in order to establish a sound information security culture it is necessary to look at organisation's information security systems in a socio- technical context. The motivation for this research stems from the continuing concern of ineffective information security in organisations, leading to potentially significant monetary losses. It is important to address both technical and non- technical aspects when dealing with information security management. Culture has been identified as an underlying determinant of individuals' behaviour and this extends to information security culture, particularly in developing countries. This research investigates information security culture in the Saudi Arabia context. The theoretical foundation for the study is based on organisational and national culture theories. A conceptual framework for this study was constructed based on Peterson and Smith's (1997) model of national culture. This framework guides the study of national, organisational and technological values and their relationships to the development of information security culture. Further, the study seeks to better understand how these values might affect the development and deployment of an organisation's information security culture. Drawing on evidence from three exploratory case studies, an emergent conceptual framework was developed from the traditional human behaviour and the social environment perspectives used in social work, This framework contributes to in- formation security management by identifying behaviours related to four modes of information security practice. These modes provide a sound basis that can be used to evaluate individual organisational members' behaviour and the adequacy of ex- isting security measures. The results confirm the plausibility of the four modes of practice. Furthermore, a final framework was developed by integrating the four modes framework into the research framework. The outcomes of the three case stud- ies demonstrate that some of the national, organisational and technological values have clear impacts on the development and deployment of organisations' informa- tion security culture. This research, by providing an understanding the in uence of national, organi- sational and technological values on individuals' information security behaviour, contributes to building a theory of information security culture development within an organisational context. The research reports on the development of an inte- grated information security culture model that highlights recommendations for developing an information security culture. The research framework, introduced by this research, is put forward as a robust starting point for further related work in this area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: People with cardiac disease and type 2 diabetes have higher hospital readmission rates (22%)compared to those without diabetes (6%). Self-management is an effective approach to achieve better health outcomes; however there is a lack of specifically designed programs for patients with these dual conditions. This project aims to extend the development and pilot test of a Cardiac-Diabetes Self-Management Program incorporating user-friendly technologies and the preparation of lay personnel to provide follow-up support. Methods/Design: A randomised controlled trial will be used to explore the feasibility and acceptability of the Cardiac-Diabetes Self-Management Program incorporating DVD case studies and trained peers to provide follow-up support by telephone and text-messaging. A total of 30 cardiac patients with type 2 diabetes will be randomised, either to the usual care group, or to the intervention group. Participants in the intervention group will received the Cardiac-Diabetes Self-Management Program in addition to their usual care. The intervention consists of three faceto- face sessions as well as telephone and text-messaging follow up. The face-to-face sessions will be provided by a trained Research Nurse, commencing in the Coronary Care Unit, and continuing after discharge by trained peers. Peers will follow up patients for up to one month after discharge using text messages and telephone support. Data collection will be conducted at baseline (Time 1) and at one month (Time 2). The primary outcomes include self-efficacy, self-care behaviour and knowledge, measured by well established reliable tools. Discussion: This paper presents the study protocol of a randomised controlled trial to pilot evaluates a Cardiac- Diabetes Self-Management program, and the feasibility of incorporating peers in the follow-ups. Results of this study will provide directions for using such mode in delivering a self-management program for patients with both cardiac condition and diabetes. Furthermore, it will provide valuable information of refinement of the intervention program.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Previous studies exploring the incidence and readmission rates of cardiac patients admitted to a coronary care unit (CCU) with type 2 diabetes [1] have been undertaken by the first author. Interviews of these patients regarding their experiences in managing their everyday conditions [2] provided the basis for developing the initial cardiac–diabetes self-management programme (CDSMP) [3]. Findings from each of these previous studies highlighted the complexity of self-management for patients with both conditions and contributed to the creation of a new self-management programme, the CDSMP, based on Bandura’s (2004) self-efficacy theory [4]. From patient and staff feedback received for the CDSMP [3], it became evident that further revision of the programme was needed to improve self-management levels of patients and possibility of incorporating methods of information technology (IT). Little is known about the applicability of different methods of technology for delivering self-management programmes for patients with chronic diseases such as those with type 2 diabetes and cardiac conditions. Although there is some evidence supporting the benefits and the great potential of using IT in supporting self-management programmes, it is not strong, and further research on the use of IT in such programmes is recommended [5–7]. Therefore, this study was designed to pilot test feasibility of the CDSMP incorporating telephone and text-messaging as follow-up approaches.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In asset intensive industries such as mining, oil & gas, utilities etc. most of the capital expenditure happens on acquiring engineering assets. Process of acquiring assets is called as “Procurement” or “Acquisition”. An asset procurement decision should be taken in consideration with the installation, commissioning, operational, maintenance and disposal needs of an asset or spare. However, such cross-functional collaboration and communication does not appear to happen between engineering, maintenance, warehousing and procurement functions in many asset intensive industries. Acquisition planning and execution are two distinct parts of asset acquisition process. Acquisition planning or procurement planning is responsible for determining exactly what is required to be purchased. It is important that an asset acquisition decision is the result of cross-functional decision making process. An acquisition decision leads to a formal purchase order. Most costly asset decisions occur even before they are acquired. Therefore, acquisition decision should be an outcome of an integrated planning & decision making process. Asset intensive organizations both, Government and non Government in Australia spent AUD 102.5 Billion on asset acquisition in year 2008-09. There is widespread evidence of many assets and spare not being used or utilized and in the end are written off. This clearly shows that many organizations end up buying assets or spares which were not required or non-conforming to the needs of user functions. It is due the fact that strategic and software driven procurement process do not consider all the requirements from various functions within the organization which contribute to the operation and maintenance of the asset over its life cycle. There is a lot of research done on how to implement an effective procurement process. There are numerous software solutions available for executing a procurement process. However, not much research is done on how to arrive at a cross functional procurement planning process. It is also important to link procurement planning process to procurement execution process. This research will discuss ““Acquisition Engineering Model” (AEM) framework, which aims at assisting acquisition decision making based on various criteria to satisfy cross-functional organizational requirements. Acquisition Engineering Model (AEM) will consider inputs from corporate asset management strategy, production management, maintenance management, warehousing, finance and HSE. Therefore, it is essential that the multi-criteria driven acquisition planning process is carried out and its output is fed to the asset acquisition (procurement execution) process. An effective procurement decision making framework to perform acquisition planning which considers various functional criteria will be discussed in this paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective To describe the impact of a parent-led, family focused child weight management program on the food intake and activity patterns of pre-pubertal children. Methods n assessor-blinded, randomized controlled trial involving 111 (64% female) overweight, pre-pubertal children 6 to 9 years of age randomly assigned to parenting-skills training plus intensive lifestyle education, parenting-skills training alone, or a 12-month wait-listed control. Study outcomes were assessed at baseline, 6 months, and 12 months. This paper presents data on food intake assessed via a validated 54-item parent completed dietary questionnaire and activity behaviours assessed via a parent-report 20-item activity questionnaire. Results Intake of energy-dense nutrient poor foods was lower in both intervention groups at 6 months (mean difference, P+DA -1.5 serves [CI -2.0;-1.0]; P -1.0 serves [-2.0;-0.5]) and 12 months (mean difference P+DA -1.0 serves [CI -2.0;-0.5]; P -1.0 serves [-1.5; 0.0]) compared to baseline. Intake of vegetables, fruit, breads and cereals, meat and alternatives and dairy foods remained unchanged. Regardless of study group there were significant reductions over time in the reported time spent engaged in small screen activities and an increase in the time reported spent in active play. Conclusion Child weight management intervention that promotes food intake in line with national dietary guidelines achieves a reduction in children’s intake of energy dense, nutrient poor foods. This was achieved without compromising intake of nutrient-rich food and changes in were maintained even once the intervention ceased.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research explores the nature of relationship management on construction projects in Australia and examines the effects of culture, by means of Schwarz’s value survey, on relationships under different contract strategies. The research was based on the view that the development of a sustainable supply chain depends on the transfer of knowledge and capabilities from the larger players in the supply chain through collaboration brought about by relationship management. The research adopted a triangulated approach in which quantitative data were collected by questionnaire, interviews were conducted to explore and enrich the quantitative data and case studies were undertaken in order to illustrate and validate the findings. The aim was to investigate how values and attitudes enhance or reduce the incorporation of the supply chain into the project. From the research it was found that the degree of match and mismatch between values and contract strategy impacts commitment and the engagement and empowerment of the supply chain.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many studies carried out in relation to construction procurement methods reveal evidence of a need to change of culture and attitude in the construction industry. This culture change would transition from traditional adversarial relationships to cooperative and collaborative relationships. Relational contracting approaches, such as partnering and relationship management, are business strategies whereby client, commercial participants’ and stakeholders’ objectives are aligned for mutual benefit. The efficacy of relationship management in the client and contractor groups is proven and well documented. However, the industry has a slow implementation of relational contracting down the value chain. This paper reports the findings of an empirical study which examined the practices and prerequisites for relationship management implementation success and for supply chain engagement to develop. Questionnaire survey, interviews and case studies were conducted with Australian contracting organisations in this study. The study reveals that the adaption of relational contracting approach in the supply chain is found to be limited and contractors still prefer to keep suppliers and subcontractors at arm’s length. Findings also show that the degree of match and mismatch between organizational structuring and organizational process is found to have an impact on staff’s commitment level and performance effectiveness.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The focus of the present research was to investigate how Local Governments in Queensland were progressing with the adoption of delineated DM policies and supporting guidelines. The study consulted Local Government representatives and hence, the results reflect their views on these issues. Is adoption occurring? To what degree? Are policies and guidelines being effectively implemented so that the objective of a safer, more resilient community is being achieved? If not, what are the current barriers to achieving this, and can recommendations be made to overcome these barriers? These questions defined the basis on which the present study was designed and the survey tools developed. While it was recognised that LGAQ and Emergency Management Queensland (EMQ) may have differing views on some reported issues, it was beyond the scope of the present study to canvass those views. The study resolved to document and analyse these questions under the broad themes of: • Building community capacity (notably via community awareness). • Council operationalisation of DM. • Regional partnerships (in mitigation/adaptation). Data was collected via a survey tool comprising two components: • An online questionnaire survey distributed via the LGAQ Disaster Management Alliance (hereafter referred to as the “Alliance”) to DM sections of all Queensland Local Government Councils; and • a series of focus groups with selected Queensland Councils

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the field of leadership studies transformational leadership theory (e.g., Bass, 1985; Avolio, Bass, & Jung, 1995) has received much attention from researchers in recent years (Hughes, Ginnet, & Curphy, 2009; Hunt, 1999). Many previous studies have found that transformational leadership is related to positive outcomes such as the satisfaction, motivation and performance of followers in organisations (Judge & Piccolo, 2004; Lowe, Kroeck, & Sivasubramaniam, 1996), including in educational institutions (Chin, 2007; Leithwoood & Jantzi, 2005). Hence, it is important to explore constructs that may predict leadership style in order to identify potential transformational leaders in leadership assessment and selection procedures. Several researchers have proposed that emotional intelligence (EI) is one construct that may account for hitherto unexplained variance in transformational leadership (Mayer, 2001; Watkin, 2000). Different models of EI exist (e.g., Goleman, 1995, 2001; Bar-On, 1997; Mayer & Salovey, 1997) but momentum is growing for the Mayer and Salovey (1997) model to be considered the most useful (Ashkanasy & Daus, 2005; Daus & Ashkanasy, 2005). Studies in non-educational settings claim to have found that EI is a useful predictor of leadership style and leader effectiveness (Harms & Crede, 2010; Mills, 2009) but there is a paucity of studies which have examined the Mayer and Salovey (1997) model of EI in educational settings. Furthermore, other predictor variables have rarely been controlled in previous studies and only self-ratings of leadership behaviours, rather than multiple ratings, have usually been obtained. Therefore, more research is required in educational settings to answer the question: to what extent is the Mayer and Salovey (1997) model of EI a useful predictor of leadership style and leadership outcomes? This project, set in Australian educational institutions, was designed to move research in the field forward by: using valid and reliable instruments, controlling for other predictors, obtaining an adequately sized sample of real leaders as participants and obtaining multiple ratings of leadership behaviours. Other variables commonly used to predict leadership behaviours (personality factors and general mental ability) were assessed and controlled in the project. Additionally, integrity was included as another potential predictor of leadership behaviours as it has previously been found to be related to transformational leadership (Parry & Proctor-Thomson, 2002). Multiple ratings of leadership behaviours were obtained from each leader and their supervisors, peers and followers. The following valid and reliable psychological tests were used to operationalise the variables of interest: leadership styles and perceived leadership outcomes (Multifactor Leadership Questionnaire, Avolio et al., 1995), EI (Mayer–Salovey–Caruso Emotional Intelligence Test, Mayer, Salovey, & Caruso, 2002), personality factors (The Big Five Inventory, John, Donahue, & Kentle, 1991), general mental ability (Wonderlic Personnel Test-Quicktest, Wonderlic, 2003) and integrity (Integrity Express, Vangent, 2002). A Pilot Study (N = 25 leaders and 75 raters) made a preliminary examination of the relationship between the variables included in the project. Total EI, the experiential area, and the managing emotions and perceiving emotions branches of EI, were found to be related to transformational leadership which indicated that further research was warranted. In the Main Study, 144 leaders and 432 raters were recruited as participants to assess the discriminant validity of the instruments and examine the usefulness of EI as a predictor of leadership style and perceived leadership outcomes. Scores for each leadership scale across the four rating levels (leaders, supervisors, peers and followers) were aggregated with the exception of the management-by-exception active scale of transactional leadership which had an inadequate level of interrater agreement. In the descriptive and measurement component of the Main Study, the instruments were found to demonstrate adequate discriminant validity. The impact of role and gender on leadership style and EI were also examined, and females were found to be more transformational as leaders than males. Females also engaged in more contingent reward (transactional leadership) behaviours than males, whilst males engaged in more passive/avoidant leadership behaviours than females. In the inferential component of the Main Study, multiple regression procedures were used to examine the usefulness of EI as a predictor of leadership style and perceived leadership outcomes. None of the EI branches were found to be related to transformational leadership or the perceived leadership outcomes variables included in the study. Openness, emotional stability (the inverse of neuroticism) and general mental ability (inversely) each predicted a small amount of variance in transformational leadership. Passive/avoidant leadership was inversely predicted by the understanding emotions branch of EI. Overall, EI was not found to be a useful predictor of leadership style and leadership outcomes in the Main Study of this project. Implications for researchers and human resource practitioners are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this paper is to frame effective models of arts management for Australia in the nineties and beyond based on an analysis of historical practices. The evolutionary process of government subvention of the arts through non-profit arts organisations provides a clear statement of the role of power and influence. In particular the ascendancy of arts organisations and their management constitute a background against which to study other non-profit corporations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Business Process Management (BPM) is a top priority in organisations and is rapidly proliferating as an emerging discipline in practice. However, the current studies show lack of appropriate BPM skilled professionals in the field and a dearth of opportunities to develop BPM expertise. This paper analyses the gap between available BPM-related education in Australia and required BPM capabilities. BPM courses offered by Australian universities and training institutions have been critically analysed and mapped against leading BPM capability frameworks to determine how well current BPM education and training offerings in Australia actually address the core capabilities required for BPM professionals. The outcomes reported here can be used by Australian universities and training institutions to better align and position their training materials to the BPM required capabilities. It could also be beneficial to individuals looking for a systematic and in-depth understanding of BPM capabilities and trainings.