884 resultados para Time in Management and the Organisation
Resumo:
"This summary is based on Space Management and the Courts.-- Design Handbook prepared under Grant Nos. NI 70-040 and NI 71-059 from the National Institute of Law Enforcement and Criminal Justice ... "
Resumo:
Original text by the composer after Scribe's Le chalet.
Resumo:
"Updated December 8, 1998."
Resumo:
Mode of access: Internet.
Resumo:
Terrorism poses both direct and indirect threats to the operations of the firm. It represents a market imperfection that increases transaction costs and creates barriers to the free flow of goods, affecting potential gains that would occur in the presence of unhindered exchange. Terrorism reflects the risk or actual encounter of violent acts, whose goal is to engender fear, coercion, or intimidation. We investigate terrorism and its association with marketing strategy and operations. Key concepts on terrorism are reviewed and a collection of propositions is offered. We highlight the pivotal roles of sourcing, production, distribution, pricing, communications, and general business strategy as functions influenced by, or capable of influencing, terrorism. Lastly, we offer managerial implications, as well as directions and guidelines for future research.
Resumo:
Purpose - The idea that knowledge needs to be codified is central to many claims that knowledge can be managed. However, there appear to be no empirical studies in the knowledge management context that examine the process of knowledge codification. This paper therefore seeks to explore codification as a knowledge management process. Design/methodology/approach - The paper draws on findings from research conducted around a knowledge management project in a section of the UK Post Office, using a methodology of participant-observation. Data were collected through observations of project meetings, correspondence between project participants, and individual interviews. Findings - The principal findings about the nature of knowledge codification are first, that the process of knowledge codification also involves the process of defining the codes needed to codify knowledge, and second, that people who participate in the construction of these codes are able to interpret and use the codes more similarly. From this it can be seen that the ability of people to decodify codes similarly places restrictions on the transferability of knowledge between them. Research limitations/implications - The paper therefore argues that a new conceptual approach is needed for the role of knowledge codification in knowledge management that emphasizes the importance of knowledge decodification. Such an approach would start with one's ability to decodify rather than codify knowledge as a prerequisite for knowledge management. Originality/value - The paper provides a conceptual basis for explaining limitations to the management and transferability of knowledge. © Emerald Group Publishing Limited.
Resumo:
This paper contributes to the debate on the role of real options theory in business strategy and organizational decision-making. It analyses and critiques the decision-making and performance implications of real options within the management theories of the (multinational) firm, reviews and categorizes the organizational, strategic and operational facets of real options management in large business settings. It also presents the views of scholars and practitioners regarding the incorporation and validity of real options in strategy, international management and business processes. The focus is particularly on the decision-making and performance attributes of the real options logic concerning strategic investments, governance modes and multinational operations management. These attributes are examined from both strategic and operating perspectives of decision-making in organizations, also with an overview of the empirical evidence on real options decision-making and performance.
Resumo:
Models at runtime can be defined as abstract representations of a system, including its structure and behaviour, which exist in tandem with the given system during the actual execution time of that system. Furthermore, these models should be causally connected to the system being modelled, offering a reflective capability. Significant advances have been made in recent years in applying this concept, most notably in adaptive systems. In this paper we argue that a similar approach can also be used to support the dynamic generation of software artefacts at execution time. An important area where this is relevant is the generation of software mediators to tackle the crucial problem of interoperability in distributed systems. We refer to this approach as emergent middleware, representing a fundamentally new approach to resolving interoperability problems in the complex distributed systems of today. In this context, the runtime models are used to capture meta-information about the underlying networked systems that need to interoperate, including their interfaces and additional knowledge about their associated behaviour. This is supplemented by ontological information to enable semantic reasoning. This paper focuses on this novel use of models at runtime, examining in detail the nature of such runtime models coupled with consideration of the supportive algorithms and tools that extract this knowledge and use it to synthesise the appropriate emergent middleware.
Resumo:
Current and future IT applications effecting supply chains in Europe and Pacific Asia are investigated. 3PL providers increasingly use IT systems for logistics, to enhance supply chain collaboration with business partners. Advanced systems are not always immediately profi table. Most companies already implement IT systems for processing transactions but motivations vary and barriers remain since 3PL providers incompletely understand clients' IT requirements. Long-term productivity gains require sophisticated IT systems to streamline cycles and improve supply chain visibility to facilitate, plan and make decisions. RFID and advanced integration systems, including Business Process Management, are probably the next trend in IT logistics systems. Copyright © 2012 Inderscience Enterprises Ltd.
Resumo:
In this paper we propose a quantum algorithm to measure the similarity between a pair of unattributed graphs. We design an experiment where the two graphs are merged by establishing a complete set of connections between their nodes and the resulting structure is probed through the evolution of continuous-time quantum walks. In order to analyze the behavior of the walks without causing wave function collapse, we base our analysis on the recently introduced quantum Jensen-Shannon divergence. In particular, we show that the divergence between the evolution of two suitably initialized quantum walks over this structure is maximum when the original pair of graphs is isomorphic. We also prove that under special conditions the divergence is minimum when the sets of eigenvalues of the Hamiltonians associated with the two original graphs have an empty intersection.
Resumo:
The links between childhood eating behaviours and parental feeding practices are well-established in younger children, but there is a lack of research examining these variables in a preadolescent age group, particularly from the child's perspective, and longitudinally. This study firstly aimed to examine the continuity and stability of preadolescent perceptions of their parents' controlling feeding practices (pressure to eat and restriction) over a 12 month period. The second aim was to explore if perceptions of parental feeding practices moderated the relationship between preadolescents' eating behaviours longitudinally. Two hundred and twenty nine preadolescents (mean age at recruitment 8.73 years) completed questionnaires assessing their eating behaviours and their perceptions of parental feeding practices at two time points, 12 months apart (T1 and T2). Preadolescents' perceptions of their parental feeding practices remained stable. Perceptions of restriction and pressure to eat were continuous. Perceptions of parental pressure to eat and restriction significantly moderated the relationships between eating behaviours at T1 and T2. The findings from this study suggest that in a preadolescent population, perceptions of parental pressure to eat and restriction of food may exacerbate the development of problematic eating behaviours.
Resumo:
Research with adult samples has identified a cognitive risk factor for the development of panic and other anxiety disorders in the concept of anxiety sensitivity. The research to date on anxiety sensitivity in children, using the Childhood Anxiety Sensitivity Index (CASI), suggests that the CASI may help to garner knowledge regarding the development of anxiety sensitivity and also help to understand the development of panic attacks, panic disorder and other anxiety disorders in youth. To examine the development of anxiety sensitivity and its relation to panic in youth, data were collected on 44 children in 1998 who were administered the CASI in 1991. Results indicated that children whose CASI scores increased from Time 1 to Time 2 were significantly more likely to report experiencing panic attacks than children whose CASI scores decreased from Time 1 to Time 2. Specifically, 64% (9/14) of children whose CASI scores increased from Time 1 to Time 2 reported having one or more panic attacks versus 36% (5/14) reported having none. Moreover, 72% (21/29) of children whose CASI scores decreased from Time 1 to Time 2 reported no panic attacks. These results suggest that childhood may be the time when anxiety sensitivity as a risk factor for panic and panic disorder is developing. Results are discussed in terms of their relevance for understanding the development of panic and the need for further research to determine the generalizability of these findings in larger samples of children followed over different time spans. ^
Resumo:
My paper discusses three different ways in which stray dogs have been intertwined with ideologies of economic and urban development in Romania. I categorize results from archival and ethnographic research under three major time periods: early socialism, late socialism, and post-socialism. During early socialism stray dogs were seen to be damaging the soviet economy by killing species that humans could also hunt, like rabbits. During late socialism, stray dogs appeared as the enemies of the communist city, and the department of urban sanitation was given orders to poison dogs with strychnine. Finally, the increasing number of stray dogs in Bucharest after the collapse of communism was seen as a direct result of former communist demolitions, and was also taken as a sign of the collapsing state. Through such examples my paper discusses how the state and particular population groups have seen dogs as parts of an unwanted and dangerous nature, rather than a species that needs to be protected. I argue that distinctions of nature and culture have served discourses of civilization and the view of Bucharest as a model socialist, and then European city. Throughout my paper I juxtapose the treatment of stray dogs with other, more “valued” urban natures like the protection of parks, the wide-spread hobby of pigeon breeding during socialist years, the most recent debate on saving the rural area of Rosia Montana from non-environmentally friendly methods of gold extraction, and the current trend of healthy eating and living.