889 resultados para Strategy information
Resumo:
This paper focuses on information sharing with key suppliers and seeks to explore the factors that might influence its extent and depth. We also investigate how information sharing affects a company’s performance with regards to resource usage, output, and flexibility. Drawing from transaction cost- and contingency theories, several factors, namely environmental uncertainty, demand uncertainty, dependency and, the product life cycle stage are proposed to explain the level of information shared with key suppliers. We develop a model where information sharing mediates the (contingent) factors and company performance. A mail survey was used to collect data from Finnish and Swedish companies. Partial Least Squares analysis was separately performed for each country (n=119, n=102). There was consistent evidence that environmental uncertainty, demand uncertainty and supplier/buyer dependency had explanatory power, whereas no significance was found for the product life cycle stage. The results also confirm previous studies by providing support for a positive relationship between information sharing and performance, where output performance was found to be the most strongly related
Resumo:
This paper focuses on information sharing with key suppliers and seeks to explore the factors that might influence its extent and depth. We also investigate how information sharing affects a company’s performance with regards to resource usage, output, and flexibility. Drawing from transaction cost- and contingency theories, several factors, namely environmental uncertainty, demand uncertainty, dependency and, the product life cycle stage are proposed to explain the level of information shared with key suppliers. We develop a model where information sharing mediates the (contingent) factors and company performance. A mail survey was used to collect data from Finnish and Swedish companies. Partial Least Squares analysis was separately performed for each country (n=119, n=102). There was consistent evidence that environmental uncertainty, demand uncertainty and supplier/buyer dependency had explanatory power, whereas no significance was found for the relationship between product life cycle stage and information sharing. The results also confirm previous studies by providing support for a positive relationship between information sharing and performance, where output performance was found to be the most strongly related.
Resumo:
Crowdsourcing harnesses the potential of large and open networks of people. It is a relatively new phenomenon and attracted substantial interest in practice. Related research, however, lacks a theoretical foundation. We propose a system-theoretical perspective on crowdsourcing systems to address this gap and illustrate its applicability by using it to classify crowdsourcing systems. By deriving two principal dimensions from theory, we identify four fundamental types of crowdsourcing systems that help to distinguish important features of such systems. We analyse their respective characteristics and discuss implications and requirements for various aspects related to the design of such systems. Our results demonstrate that systems theory can inform the study of crowdsourcing systems. The identified system types and the implications on their design may prove useful for researchers to frame future studies and for practitioners to identify the right crowdsourcing systems for a particular purpose.
Resumo:
The growing importance and need of data processing for information extraction is vital for Web databases. Due to the sheer size and volume of databases, retrieval of relevant information as needed by users has become a cumbersome process. Information seekers are faced by information overloading - too many result sets are returned for their queries. Moreover, too few or no results are returned if a specific query is asked. This paper proposes a ranking algorithm that gives higher preference to a user’s current search and also utilizes profile information in order to obtain the relevant results for a user’s query.
Resumo:
Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.
Resumo:
Background: Cancer patients experience distress and anxiety related to their diagnosis, treatment and the unfamiliar cancer centre. Strategies with the aim of orienting patients to a cancer care facility may improve patient outcomes. Although meeting patients' information needs at different stages is important, there is little agreement about the type of information and the timing for information to be given. Orientation interventions aim to address information needs at the start of a person's experience with a cancer care facility. The extent of any benefit of these interventions is unknown. Objectives: To assess the effects of information interventions which orient patients and their carers/family to a cancer care facility, and to the services available in the facility. Search Methods: We searched the Cochrane Central Register of Controlled Trials (CENTRAL) (The Cochrane Library 2011, Issue 2); MEDLINE (OvidSP) (1966 to Jun 2011), EMBASE (Ovid SP) (1966 to Jun 2011), CINAHL (EBSCO) (1982 to Jun 2011), PsycINFO (OvidSP) (1966 to Jun 2011), review articles and reference lists of relevant articles. We contacted principal investigators and experts in the field. Selection Criteria: Randomised controlled trials (RCTs), cluster RCTs and quasi-RCTs evaluating the effects of information interventions that orient patients and their carers/family to a cancer care facility. Data collection and analysis: Results of searches were reviewed against the pre-determined criteria for inclusion by two review authors. The primary outcomes were knowledge and understanding; health status and wellbeing, evaluation of care, and harms. Secondary outcomes were communication, skills acquisition, behavioural outcomes, service delivery, and health professional outcomes. We pooled results of RCTs using mean differences (MD) and 95% confidence intervals (CI). Main results: We included four RCTs involving 610 participants. All four trials aimed to investigate the effects of orientation programs for cancer patients to a cancer facility. There was high risk of bias across studies. Findings from two of the RCTs demonstrated significant benefits of the orientation intervention in relation to levels of distress (mean difference (MD) -8.96 (95% confidence interval (CI) -11.79 to -6.13), but non-significant benefits in relation to state anxiety levels (MD -9.77 (95% CI -24.96 to 5.41). Other outcomes for participants were generally positive (e.g. more knowledgeable about the cancer centre and cancer therapy, better coping abilities). No harms or adverse effects were measured or reported by any of the included studies. There were insufficient data on the other outcomes of interest. Authors conclusion: This review has demonstrated the feasibility and some potential benefits of orientation interventions. There was a low level of evidence suggesting that orientation interventions can reduce distress in patients. However, most of the other outcomes remain inconclusive (patient knowledge recall/ satisfaction). The majority of studies were subject to high risk of bias, and were likely to be insufficiently powered. Further well conducted and powered RCTs are required to provide evidence for determining the most appropriate intensity, nature, mode and resources for such interventions. Patient and carer-focused outcomes should be included.
Resumo:
The availability of bridges is crucial to people’s daily life and national economy. Bridge health prediction plays an important role in bridge management because maintenance optimization is implemented based on prediction results of bridge deterioration. Conventional bridge deterioration models can be categorised into two groups, namely condition states models and structural reliability models. Optimal maintenance strategy should be carried out based on both condition states and structural reliability of a bridge. However, none of existing deterioration models considers both condition states and structural reliability. This study thus proposes a Dynamic Objective Oriented Bayesian Network (DOOBN) based method to overcome the limitations of the existing methods. This methodology has the ability to act upon as a flexible unifying tool, which can integrate a variety of approaches and information for better bridge deterioration prediction. Two demonstrative case studies are conducted to preliminarily justify the feasibility of the methodology
Resumo:
Train delay is one of the most important indexes to evaluate the service quality of the railway. Because of the interactions of movement among trains, a delayed train may conflict with trains scheduled on other lines at junction area. Train that loses conflict may be forced to stop or slow down because of restrictive signals, which consequently leads to the loss of run-time and probably enlarges more delays. This paper proposes a time-saving train control method to recover delays as soon as possible. In the proposed method, golden section search is adopted to identify the optimal train speed at the expected time of restrictive signal aspect upgrades, which enables the train to depart from the conflicting area as soon as possible. A heuristic method is then developed to attain the advisory train speed profile assisting drivers in train control. Simulation study indicates that the proposed method enables the train to recover delays as soon as possible in case of disturbances at railway junctions, in comparison with the traditional maximum traction strategy and the green wave strategy.
Resumo:
Many current HCI, social networking, ubiquitous computing, and context aware designs, in order for the design to function, have access to, or collect, significant personal information about the user. This raises concerns about privacy and security, in both the research community and main-stream media. From a practical perspective, in the social world, secrecy and security form an ongoing accomplishment rather than something that is set up and left alone. We explore how design can support privacy as practical action, and investigate the notion of collective information-practice of privacy and security concerns of participants of a mobile, social software for ride sharing. This paper contributes an understanding of HCI security and privacy tensions, discovered while “designing in use” using a Reflective, Agile, Iterative Design (RAID) method.
Resumo:
goDesign Travelling Workshop Program for Regional Secondary Students was an initiative of Queensland University of Technology (QUT) and the Design Institute of Australia (DIA) Queensland Branch, which aligned with the DIA unleashed: Queensland design on tour 2010 Exhibition. It was designed be delivered by university design academics in state secondary schools in Chinchilla, Mt Isa, Quilpie, Emerald, Gladstone and Bundaberg between February and September 2010, to approximately 95 secondary students and 24 teachers from the subject areas of visual art, graphics and industrial technology and design. A talk by a visiting design practitioner whose work was displayed in the exhibition, also features in the final day of the program in each town, and student work from the workshop was displayed in the exhibition alongside the professional design work. The three-day workshop is a design immersion program for regional Queensland Secondary Schools, which responds to specific actions outlined in the Queensland Government Design Strategy 2020 to ‘Build Design Knowledge and Learning’ and ‘Foster a Design Culture’. Underpinned by a place-based approach and the integration of Dr Charles Burnette’s IDESIGN teaching model, the program gives students and teachers the opportunity to explore, analyse and reimagine their local town through a series of scaffolded problem solving activities around the theme of ‘place’. The program allows students to gain hands-on experience designing graphics, products, interior spaces and architecture to assist their local community, with the support of design professionals. Students work individually and in groups on real design problems learning sketching, making, communication, presentation and collaboration skills to improve their design process, while considering social, cultural and environmental opportunities. The program was designed to facilitate an understanding of the value of design thinking and its importance to regional communities, to give students more information about various design disciplines as career options, and provide a professional development opportunity for teachers. Advisory assistance for the program was gained through Kelvin Grove State College, Queensland Studies Authority and QMI/Manufacturing Skills Queensland Manager, Manufacturing & Engineering Gateway Schools Project.
Resumo:
This project involved the complete refurbishment and extension of a 1980’s two-storey domestic brick building, previously used as a Boarding House (Class 3), into Middle School facilities (Class 9b) on a heritage listed site at Nudgee College secondary school, Brisbane. The building now accommodates 12 technologically advanced classrooms, computer lab and learning support rooms, tuckshop, art room, mini library/reading/stage area, dedicated work areas for science and large projects with access to water on both floors, staff facilities and an undercover play area suitable for assemblies and presentations. The project was based on a Reggio Emilia approach, in which the organisation of the physical environment is referred to as the child’s third teacher, creating opportunities for complex, varied, sustained and changing relationships between people and ideas. Classrooms open to a communal centre piazza and are integrated with the rest of the school and the school with the surrounding community. In order to achieve this linkage of the building with the overall masterplan of the site, a key strategy of the internal planning was to orientate teaching areas around a well defined active circulation space that breaks out of the building form to legibly define the new access points to the building and connect up to the pathway network of the campus. The width of the building allowed for classrooms and a generous corridor that has become ‘breakout’ teaching areas for art, IT, and small group activities. Large sliding glass walls allow teachers to maintain supervision of students across all areas and allow maximum light penetration through small domestic window openings into the deep and low-height spaces. The building was also designed with an effort to uphold cultural characteristics from the Edmund Rice Education Charter (2004). Coherent planning is accompanied by a quality fit-out, creating a vibrant and memorable environment in which to deliver the upper primary curriculum. Consistent with the Reggio Emilia approach, materials, expressive of the school’s colours, are used in a contemporary, adventurous manner to create panels of colour useful for massing and defining the ‘breakout’ teaching areas and paths of travel, and storage elements are detailed and arranged to draw attention to their aesthetic features. Modifications were difficult due to the random placement of load bearing walls, minimum ceiling heights, the general standard of finishes and new fire and energy requirements, however the reuse of this building was assessed to be up to 30% cheaper than an equivalent new building, The fit out integrates information technology and services at a level not usually found in primary school facilities. This has been achieved within the existing building fabric through thoughtful detailing and co-ordination with allied disciplines.