909 resultados para pre-slaughter management
Resumo:
Early models of bankruptcy prediction employed financial ratios drawn from pre-bankruptcy financial statements and performed well both in-sample and out-of-sample. Since then there has been an ongoing effort in the literature to develop models with even greater predictive performance. A significant innovation in the literature was the introduction into bankruptcy prediction models of capital market data such as excess stock returns and stock return volatility, along with the application of the Black–Scholes–Merton option-pricing model. In this note, we test five key bankruptcy models from the literature using an upto- date data set and find that they each contain unique information regarding the probability of bankruptcy but that their performance varies over time. We build a new model comprising key variables from each of the five models and add a new variable that proxies for the degree of diversification within the firm. The degree of diversification is shown to be negatively associated with the risk of bankruptcy. This more general model outperforms the existing models in a variety of in-sample and out-of-sample tests.
Resumo:
Successful organizational transformation relies on being able to achieve paradigm or collective schema change, and more particularly, the ability to manage the interplay between pre-existing schemas and alternative schemas required for new environments. This conceptual paper presents an analysis and critique of collective schema change dynamics. Two schema change pathways are reflected in the literature: frame-juxtapose-transition and frame-disengage-learning. Research findings in each pathway are limited and/or contradictory. Moreover, research on schema change focuses primarily on social dynamics and less on the relationship between social schema change dynamics and individual schema change dynamics. One implication of this lack of focus on individual schema change dynamics is the masking of the high level of cognitive processing and cognitive effort required by individuals to effect schema change. The capacity to achieve organizational transformation requires that more attention is given to managing these dynamics, which, in turn, requires significant investment in developing the change leadership capabilities of managers and the organizations they manage.
Resumo:
Pre-service teacher education is a spatialized enterprise. It operates across a number of spaces that may or may not be linked ideologically and/or physically. These spaces can include daily practices, locations, infrastructure, relationships and representations of power and ideology. The interrelationships between and within these (sometimes competing) spaces for pre-service teachers will influence their identities as teachers and learners across time and space. Pre-service teachers are expected to make the connections between these often-contradictory spaces with little or no guidance on how to negotiate such complex relationships. These are difficult spaces, yet the slippages and gaps between these spaces offer generative possibilities. This paper explores these spaces of possibility for pre-service teacher education, and uses the spatial theories of Lefebvre (1991) and Foucault (1977, 1980) to argue that critical reflective practice can be used to create a ‘thirdspace’ (Soja, 1996) for reconstructing future practice.
Resumo:
All organisations, irrespective of size and type, need effective information security management (ISM) practices to protect vital organisational in- formation assets. However, little is known about the information security management practices of nonprofit organisations. Australian nonprofit organisations (NPOs) employed 889,900 people, managed 4.6 million volunteers and contributed $40,959 million to the economy during 2006-2007 (Australian Bureau of Statistics, 2009). This thesis describes the perceptions of information security management in two Australian NPOs and examines the appropriateness of the ISO 27002 information security management standard in an NPO context. The overall approach to the research is interpretive. A collective case study has been performed, consisting of two instrumental case studies with the researcher being embedded within two NPOs for extended periods of time. Data gathering and analysis was informed by grounded theory and action research, and the Technology Acceptance Model was utilised as a lens to explore the findings and provide limited generalisability to other contexts. The major findings include a distinct lack of information security management best practice in both organisations. ISM Governance and risk management was lacking and ISM policy was either outdated or non- existent. While some user focused ISM practices were evident, reference to standards, such as ISO 27002, were absent. The main factor that negatively impacted on ISM practices was the lack of resources available for ISM in the NPOs studied. Two novel aspects of information security dis- covered in this research were the importance of accuracy and consistency of information. The contribution of this research is a preliminary understanding of ISM practices and perceptions in NPOs. Recommendations for a new approach to managing information security management in nonprofit organisations have been proposed.
Resumo:
This study presents the importance of a mentor’s (experienced teacher’s) personal attributes and pedagogical knowledge for developing a mentee’s (preservice teacher’s) teaching practices. Specifically, preservice teachers can have difficulties with behaviour management and must learn management strategies that help them to teach more effectively. This paper investigates how mentoring may facilitate the development of a mentee’s behaviour management strategies, in particular what personal attributes and pedagogical knowledge are used in this process.
Resumo:
Mentors (cooperating classroom teachers) have a shared responsibility with universities for developing preservice teachers’ pedagogical practices, particularly towards becoming reflective practitioners. Preservice teachers need to participate actively in their own learning, by reflecting and acting on the mentor’s constructive feedback provided during planning and feedback dialogue sessions. This case study uses feedback practices outlined within a five-factor mentoring model to analyse dialogue between a mentor and her respective mentee during different stages in their school-based programs (first practicum). This investigation uses multiple data sources such as video and audio-recorded interviews, archival documents from participants such as lesson plans, reflections and reports to examine preservice teacher’s reflections and implementations of practice as a result of her mentor’s feedback (e.g., establish expectations, review lesson plans, observe teaching then provide oral and written feedback, and evaluate progress). Findings indicated that reflective thinking was more apparent when the mentor did not dominate conversations but instead asked astute pedagogical knowledge questions to facilitate the mentee’s reflections on practice.
Resumo:
In this research we examined, by means of case studies, the mechanisms by which relationships can be managed and by which communication and cooperation can be enhanced in developing sustainable supply chains. The research was predicated on the contention that the development of a sustainable supply chain depends, in part, on the transfer of knowledge and capabilities from the larger players in the supply chain. A sustainable supply chain requires proactive relationship management and the development of an appropriate organisational culture, and trust. By legitimising individuals’ expectations of the type of culture which is appropriate to their company and empowering employees to address mismatches that may occur, a situation can be created whereby the collaborating organisations develop their competences symbiotically and so facilitate a sustainable supply chain. Effective supply chain management enhances organisation performance and competitiveness through the management of operations across organisational boundaries. Relational contracting approaches facilitate the exchange of information and knowledge and build capacity in the supply chain, thus enhancing its sustainability. Relationship management also provides the conditions necessary for the development of collaborative and cooperative relationships However, often subcontractors and suppliers are not empowered to attend project meetings or to have direct communication with project based staff. With this being a common phenomenon in the construction industry, one might ask: what are the barriers to implementation of relationship management through the supply chain? In other words, the problem addressed in this research is the engagement of the supply chain through relationship management.
Resumo:
Purpose – This article aims to consider success in terms of the financial returns and risks of new public management (NPM) in state-owned enterprises (SOEs). Design/methodology/approach – Financial returns of New Zealand SOEs were examined through a review of their annual reports over a five-year period. Dimensions of risk were examined through interviews conducted in two phases over a two-year period with senior executives from 12 of the (then) 17 SOEs operating in New Zealand. Findings – Findings indicate the potential for SOEs to operate as profitable government investments, with clear support for positive financial returns under NPM. However, variations noted within individual SOEs also indicate that profitable and commercial operations may not be possible in all cases. An examination of the risks associated with SOEs’ operations reveals a number of dimensions of risk, encompassing financial, political (including regulatory), reputational, and public accountability aspects. Practical implications – There is a need for an enhanced awareness on the part of internal and external stakeholders (such as the government and general public) of the risks SOEs face in pursuing higher levels of profitability. Also required, is a more acute understanding on the part of internal and external stakeholders (e.g. government and the public) of the need for SOEs to manage the range of risks identified, given the potentially delicate balance between risk and return. Originality/value – While previous studies have considered the financial returns of SOEs, or the risks faced by the public sector in terms of accountability, few have addressed the two issues collectively in a single context.
Resumo:
The study examines non-Indigenous pre-service teacher responses to the authorisation of Indigenous knowledge perspectives in compulsory Indigenous studies with a primary focus on exploring the nature and effects of resistance. It draws on the philosophies of the Japanangka teaching and research paradigm (West, 2000), relationship theory (Graham, 1999), Indigenist methodologies and decolonisation approaches to examine this resistance. A Critical Indigenist Study was employed to investigate how non-Indigenous pre-service teachers managed their learning, and how they articulated shifts in resistance as they progressed through their studies. This study explains resistance to compulsory Indigenous and how it can be targeted by Indigenist Standpoint Pedagogy. The beginning transformations in pre-service teacher positioning in relation to Australian history, contemporary educational practice, and professional identity was also explored.
Resumo:
Dashboards are expected to improve decision making by amplifying cognition and capitalizing on human perceptual capabilities. Hence, interest in dashboards has increased recently, which is also evident from the proliferation of dashboard solution providers in the market. Despite dashboards' popularity, little is known about the extent of their effectiveness, i.e. what types of dashboards work best for different users or tasks. In this paper, we conduct a comprehensive multidisciplinary literature review with an aim to identify the critical issues organizations might need to consider when implementing dashboards. Dashboards are likely to succeed and solve the problems of presentation format and information load when certain visualization principles and features are present (e.g. high data-ink ratio and drill down features).Werecommend that dashboards come with some level of flexibility, i.e. allowing users to switch between alternative presentation formats. Also some theory driven guidance through popups and warnings can help users to select an appropriate presentation format. Given the dearth of research on dashboards, we conclude the paper with a research agenda that could guide future studies in this area.
Resumo:
Usability in HCI (Human-Computer Interaction) is normally understood as the simplicity and clarity with which the interaction with a computer program or a web site is designed. Identity management systems need to provide adequate usability and should have a simple and intuitive interface. The system should not only be designed to satisfy service provider requirements but it has to consider user requirements, otherwise it will lead to inconvenience and poor usability for users when managing their identities. With poor usability and a poor user interface with regard to security, it is highly likely that the system will have poor security. The rapid growth in the number of online services leads to an increasing number of different digital identities each user needs to manage. As a result, many people feel overloaded with credentials, which in turn negatively impacts their ability to manage them securely. Passwords are perhaps the most common type of credential used today. To avoid the tedious task of remembering difficult passwords, users often behave less securely by using low entropy and weak passwords. Weak passwords and bad password habits represent security threats to online services. Some solutions have been developed to eliminate the need for users to create and manage passwords. A typical solution is based on generating one-time passwords, i.e. passwords for single session or transaction usage. Unfortunately, most of these solutions do not satisfy scalability and/or usability requirements, or they are simply insecure. In this thesis, the security and usability aspects of contemporary methods for authentication based on one-time passwords (OTP) are examined and analyzed. In addition, more scalable solutions that provide a good user experience while at the same time preserving strong security are proposed.
Resumo:
The primary goal of the Vehicular Ad Hoc Network (VANET) is to provide real-time safety-related messages to motorists to enhance road safety. Accessing and disseminating safety-related information through the use of wireless communications technology in VANETs should be secured, as motorists may make critical decisions in dealing with an emergency situation based on the received information. If security concerns are not addressed in developing VANET systems, an adversary can tamper with, or suppress, the unprotected message to mislead motorists to cause traffic accidents and hazards. Current research on secure messaging in VANETs focuses on employing the certificate-based Public Key Infrastructure (PKI) scheme to support message encryption and digital signing. The security overhead of such a scheme, however, creates a transmission delay and introduces a time-consuming verification process to VANET communications. This thesis has proposed a novel public key verification and management approach for VANETs; namely, the Public Key Registry (PKR) regime. Compared to the VANET PKI scheme, this new approach can satisfy necessary security requirements with improved performance and scalability, and at a lower cost by reducing the security overheads of message transmission and eliminating digital certificate deployment and maintenance issues. The proposed PKR regime consists of the required infrastructure components, rules for public key management and verification, and a set of interactions and associated behaviours to meet these rule requirements. This is achieved through a system design as a logic process model with functional specifications. The PKR regime can be used as development guidelines for conforming implementations. An analysis and evaluation of the proposed PKR regime includes security features assessment, analysis of the security overhead of message transmission, transmission latency, processing latency, and scalability of the proposed PKR regime. Compared to certificate-based PKI approaches, the proposed PKR regime can maintain the necessary security requirements, significantly reduce the security overhead by approximately 70%, and improve the performance by 98%. Meanwhile, the result of the scalability evaluation shows that the latency of employing the proposed PKR regime stays much lower at approximately 15 milliseconds, whether operating in a huge or small environment. It is therefore believed that this research will create a new dimension to the provision of secure messaging services in VANETs.
Knowledge management for enterprise systems: observations from small, medium and large organizations
Resumo:
Anecdotal evidence suggests that the lifecycle-wide management of Enterprise System (ES) related knowledge is critical for ES health and longevity. At a time where many ES-vendors now offering solutions to Small and Medium size organizations, this paper investigates the ability of Small and Medium size organizations to maintain a lifecycle-wide knowledge management strategy. The paper explores the alleged differences in the knowledge management practices across 27 small, medium and large organizations that had implemented a market-leading ES. Results suggest that: (1) despite similar knowledge creation efforts in all three organizational sizes, small organizations struggle with retaining, transferring and applying the knowledge. The study also reveals that, (2) the overall goodness of the knowledge management process in larger organizations remains higher than their small and medium counterparts.
Resumo:
Knowledge base is one of the emerging concepts in the Knowledge Management area. As there exists no agreed- upon standard definition of a knowledge base, this paper defines a knowledge base in terms of our research of Enterprise Systems (ES). The knowledge base is defined with reference to Learning Network Theory. Using this theoretical framework, we investigate the roles of management and operational staff in organisations and how their interactions can create a better ES-knowledge base to contribute to ES success. We focus on the post- implementation phase of ES as part of the ES lifecycle. Our findings will facilitate future research directions and contribute to better understandings of how the knowledge base can be integrated and how this integration leads to Enterprise System success.