922 resultados para ubiquitous identity management
Resumo:
Current conceptualizations of organizational processes consider them as internally optimized yet static systems. Still, turbulences in the contextual environment of a firm often lead to adaptation requirements that these processes are unable to fulfil. Based on a multiple case study of the core processes of two large organizations, we offer an extended conceptualisation of business processes as complex adaptive systems. This conceptualization can enable firms to optimise business processes by analysing operations in different contexts and by examining the complex interaction between external, contextual elements and internal agent schemata. From this analysis, we discuss how information technology can play a vital goal in achieving this goal by providing discovery, analysis, and automation support. We detail implications for research and practice.
Resumo:
Arts managers play a critical role in creating a strong, sustainable arts and cultural sector. They operate as brokers, creating programs, and, more critically, coordinating the relationships between artists, audiences, communities, governments and sponsors required to make these programs a success. Based on study of model developed for a subject in the Master of Creative Industries (Creative Production & Arts Management) at Queensland University of Technology (QUT), this paper examines the pros and cons of a “community of practice” approach in training arts management students to act as cultural brokers. It provides data on the effectiveness of a range of activities – including Position Papers, Case Studies, Masterclasses, and offline and online conversations – that can be used facilitate the peer-to-peer engagement by which students work together to build their cultural brokering skills in a community of practice. The data demonstrates that, whilst students appreciate this approach, educators must provide enough access to voices of authority – that is, to arts professionals – to establish a well-functioning community of practice, and ensure that more expert students do not become frustrated when they are unwittingly and unwillingly thrust into this role by less expert classmates. This is especially important in arts management, where classes are always diverse, due to the fact that most dedicated programs in Australia, as in the US, UK and Europe, are taught via small-scale programs at graduate level which accept applicants from a wide variety of arts and non-arts backgrounds.
Resumo:
Medical industries have brought Information Technology (IT) in their systems for both patients and medical staffs due to the numerous benefits of IT we experience at presently. Moreover, the Mobile healthcare (M-health) system has been developed as the first step of Ubiquitous Health Environment (UHE). With the mobility and multi-functions, M-health system will be able to provide more efficient and various services for both doctors and patients. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well implemented. In this paper, user authentication and authorization procedures will applied as a featured component at each level of M-health systems inthe hospital environment. Accordingly, M-health system in the hospital will meet the optimal requirements as a countermeasure to its vulnerabilities.
Resumo:
The management of risks in business processes has been a subject of active research in the past few years. Many benefits can potentially be obtained by integrating the two traditionally-separated fields of risk management and business process management, including the ability to minimize risks in business processes (by design) and to mitigate risks at run time. In the past few years, an increasing amount of research aimed at delivering such an integrated system has been proposed. However, these research efforts vary in terms of their scope, goals, and functionality. Through systematic collection and evaluation of relevant literature, this paper compares and classifies current approaches in the area of risk-aware business process management in order to identify and explain relevant research gaps. The process through which relevant literature is collected, filtered, and evaluated is also detailed.
Resumo:
Enterprise architecture management (EAM) has become an intensively discussed approach to manage enterprise transformations. While many organizations employ EAM, a notable insecurity about the value of EAM remains. In this paper, we propose a model to measure the realization of benefits from EAM. We identify EAM success factors and EAM benefits through a comprehensive literature review and eleven explorative expert interviews. Based on our findings, we integrate the EAM success factors and benefits with the established DeLone & McLean IS success model resulting in a model that explains the realization of EAM benefits. This model aids organizations as a benchmark and framework for identifying and assessing the setup of their EAM initiatives and whether and how EAM benefits are materialized. We see our model also as a first step to gain insights in and start a discussion on the theory of EAM benefit realization.
Resumo:
In this study, we examine how organisations in Fiji communicate or legitimise their profit. We base the need for understanding this phenomenon on the following premise. Organisations are part of a wider society, and in competition for scarce resources. Organisations obtain the rights to consume resources upon conception, but must continually legitimise their rights of existence and the need to access the resources. Legitimacy is the ability to continue to justify one’s authority to exist in a society. Organisations rights to resources are contractual, and have a moral obligation to act in a responsible manner and justify their outcomes, actions, and activities to external stakeholders. Such justifications would be an attempt at legitimizing their existence by some form of impression management. Impression management refers to the process by which individuals attempt to influence the impression of others (Melo et al. 2009). In corporate reporting, impression management occurs when management selects, display, and presents that information in a manner that distorts readers’ perceptions of corporate achievements (Neu 1991; Patten 2002), and is managed best through disclosures (O’Donovan 2002). In developing economies, there is significant Government protection that creates near-monopoly sectors and industries. The rendered protection permits organisations to provide essential services to the community at reasonable costs. Organisations in these sectors and industries have an ominous need to legitimise their position and actions. The bond between the organisations and the society is much stronger, making organisations devote more effort in communicating their activities. Protection permits organisations to make reasonable profits to sustain their operations. Society may not accept abnormal profits from operational efficiencies. Profit is fundamental to the society’s perception of an organisation, amplifying the need for the firm to justify a level of profit. Abnormal profit for organisations construes bad news, and organisations would make relevant disclosures to manage stakeholder impressions on profit (Patten 2002). Organisations can manage impressions by disclosing information in a particular way. That is, organisations would want to put the impression that the abnormal profit is justified and the society will obtain its benefits in future. Such form of impression management requires unambiguous disclosure of information. The readability of corporate disclosures is an important indicator of organisational abnormal profit-related legitimacy efforts in developing economies.
Resumo:
Conventional training methods for nurses involve many physical factors that place limits on potential class sizes. Alternate training methods with lower physical requirements may support larger class sizes, but given the tactile quality of nurse training, are most appropriately applied to supplement the conventional methods. However, where the importance of physical factors are periphery, such alternate training methods can provide an important way to increase upper class-size limits and therefore the rate of trained nurses entering the important role of critical care. A major issue in ICU training is that the trainee can be released into a real-life intensive care scenario with sub optimal preparation and therefore a level of anxiety for the student concerned, and some risk for the management level nurses, as patient safety is paramount. This lack of preparation places a strain on the allocation of human and non-human resources to teaching, as students require greater levels of supervision. Such issues are a concern to ICU management, as they relate to nursing skill development and patient health outcomes, as nursing training is potentially dangerous for patients who are placed in the care of inexperienced staff. As a solution to this problem, we present a prototype ICU handover training environment that has been developed in a socially interactive virtual world. Nurses in training can connect remotely via the Internet to this environment and engage in collaborative ICU handover training classes.
Resumo:
Cultural tourism and creative industries have intersecting policy agendas and economic interdependencies. Most studies of the creative industries have focused on western countries. Cultural tourism is rarely included. However the arrival of the creative economy and its movement through developing countries has changed the relationship. Supporters of the creative economy now see fit to include tourism. This thesis addresses the development of the creative economy in Malaysia. The thesis conducted case studies on animation and museum sectors in Malaysia. These two case studies provide information on the development of creative economy in Malaysia. The study found that a top-down cultural management approach is being practised but that Malaysia is now influenced by new ideas concerning innovation and technical creativity. The study examined whether or not technical innovation by itself is enough. The reference points here are the Multimedia Super Corridor in Cyberjaya and other similar projects in the region. The museum case study was situated in Malacca. It showed that museums needed to adapt new media and new experiences to remain relevant in today’s world. In applying a case study approach, the thesis made use of interviews with key stakeholders, as well consulting numerous policy documents and web sites. Both case studies imitated similar products and services in the market but added local characteristics. This research project contributes significantly to the existing body of knowledge in the field of creative economy within the context of developing countries. Finally the thesis makes recommendations for Malaysia to better position itself in the regional economy while retaining its distinctive cultural identity.
Resumo:
One of the key trends that we currently witness not only in academic circles but also in industry - all throughout Australia at least – is that “Innovation” is becoming an important driver for business projects, for change agendas – and in turn, for Business Process Management initiatives.
Resumo:
Companies face the challenges of expanding their markets, improving products, services and processes, and exploiting intellectual capital in a dynamic network. Therefore, more companies are turning to an Enterprise System (ES). Knowledge management (KM) has also received considerable attention and is continuously gaining the interest of industry, enterprises, and academia. For ES, KM can provide support across the entire lifecycle, from selection and implementation to use. In addition, it is also recognised that an ontology is an appropriate methodology to accomplish a common consensus of communication, as well as to support a diversity of KM activities, such as knowledge repository, retrieval, sharing, and dissemination. This paper examines the role of ontology-based KM for ES (OKES) and investigates the possible integration of ontology-based KM and ES. The authors develop a taxonomy as a framework for understanding OKES research. In order to achieve the objective of this study, a systematic review of existing research was conducted. Based on a theoretical framework of the ES lifecycle, KM, KM for ES, ontology, and ontology-based KM, guided by the framework of study, a taxonomy for OKES is established.
Resumo:
Information communication and technology (ICT) systems are almost ubiquitous in the modern world. It is hard to identify any industry, or for that matter any part of society, that is not in some way dependent on these systems and their continued secure operation. Therefore the security of information infrastructures, both on an organisational and societal level, is of critical importance. Information security risk assessment is an essential part of ensuring that these systems are appropriately protected and positioned to deal with a rapidly changing threat environment. The complexity of these systems and their inter-dependencies however, introduces a similar complexity to the information security risk assessment task. This complexity suggests that information security risk assessment cannot, optimally, be undertaken manually. Information security risk assessment for individual components of the information infrastructure can be aided by the use of a software tool, a type of simulation, which concentrates on modelling failure rather than normal operational simulation. Avoiding the modelling of the operational system will once again reduce the level of complexity of the assessment task. The use of such a tool provides the opportunity to reuse information in many different ways by developing a repository of relevant information to aid in both risk assessment and management and governance and compliance activities. Widespread use of such a tool allows the opportunity for the risk models developed for individual information infrastructure components to be connected in order to develop a model of information security exposures across the entire information infrastructure. In this thesis conceptual and practical aspects of risk and its underlying epistemology are analysed to produce a model suitable for application to information security risk assessment. Based on this work prototype software has been developed to explore these concepts for information security risk assessment. Initial work has been carried out to investigate the use of this software for information security compliance and governance activities. Finally, an initial concept for extending the use of this approach across an information infrastructure is presented.
Resumo:
While governments are engaged in developing social policy responses to address wicked issues such as poverty, homelessness, drug addiction and crime, long term resolution of these issues through government policy making and state-based programmatic action has remained elusive. The use of vehicles for joint action and partnership between government and the community sector such as co-management has been offered as a way of harnessing productive capability and innovative capacity of both these sectors to resolve these complex problems. However, it is suggested that while there is a well advanced agenda with the intent for collaboration and partnership, working with the models for undertaking this joint action are not well understood and have not been fully developed or evaluated. This chapter examines new approaches to resolving the wicked issue of homelessness through applying the lens of co-management to understand the complexities of this issue and its resolution. The chapter analyses an attempt to move away from traditional bureaucratic structures of welfare departments, operating through single functional ‘silos’ to a new horizontal ‘hub-based’ model of service delivery that seeks to integrate actors across many different service areas and organizations. The chapter explores case studies of co-management in the establishment, development and operation of service hubs to address homelessness. We argue that the response to homelessness needs a ‘wicked solution’ that goes beyond simply providing shelter to those in need. The case of the hub models of community sector organizations working across organizational boundaries is evaluated to determine whether this approach can be considered successful co-managing of an innovative initiative, and understanding the requirements for developing, improving and extending this model. The role of the third sector in co-managing public services is examined through the in-depth case studies and the results are presented together with an assessment of how co-management can contribute to service quality and service management in public services.
Resumo:
Since the late twentieth century, there has been a shift away from delivery of infrastructure, including road networks, exclusively by the state. Subsequently, a range of alternative delivery models including governance networks have emerged. However, little is known about how connections between these networks and their stakeholders are created, managed or sustained. Using an analytical framework based on a synthesis of theories of network and stakeholder management, three cases in road infrastructure in Queensland, Australia are examined. The paper finds that although network management can be used to facilitate stakeholder engagement, such activities in the three cases are mainly focused within the core network of those most directly involved with delivery of the infrastructure often to the exclusion of other stakeholder groups.