955 resultados para McRae, Ben
Resumo:
To the Editor—In a recent review article in Infection Control and Hospital Epidemiology, Umscheid et al1 summarized published data on incidence rates of catheter-associated bloodstream infection (CABSI), catheter-associated urinary tract infection (CAUTI), surgical site infection (SSI), and ventilator- associated pneumonia (VAP); estimated how many cases are preventable; and calculated the savings in hospital costs and lives that would result from preventing all preventable cases. Providing these estimates to policy makers, political leaders, and health officials helps to galvanize their support for infection prevention programs. Our concern is that important limitations of the published studies on which Umscheid and colleagues built their findings are incompletely addressed in this review. More attention needs to be drawn to the techniques applied to generate these estimates...
Resumo:
This paper presents a novel method to rank map hypotheses by the quality of localization they afford. The highest ranked hypothesis at any moment becomes the active representation that is used to guide the robot to its goal location. A single static representation is insufficient for navigation in dynamic environments where paths can be blocked periodically, a common scenario which poses significant challenges for typical planners. In our approach we simultaneously rank multiple map hypotheses by the influence that localization in each of them has on locally accurate odometry. This is done online for the current locally accurate window by formulating a factor graph of odometry relaxed by localization constraints. Comparison of the resulting perturbed odometry of each hypothesis with the original odometry yields a score that can be used to rank map hypotheses by their utility. We deploy the proposed approach on a real robot navigating a structurally noisy office environment. The configuration of the environment is physically altered outside the robots sensory horizon during navigation tasks to demonstrate the proposed approach of hypothesis selection.
Resumo:
So called “knowledge work” is seen as integral to post-industrial society and, for some, information and communications technologies (ICTs) are critical enablers of the associated practices. Many still propose the technologically deterministic route of rolling out ICTs and expecting that users will, and indeed can, “download” what they know into a system that can then be used in a number of ways. This approach is usually underpinned by the predominant assumption that the system will be developed by one group (developers) and used by another group (users). In this paper, we report on an exploratory case study of the enactment of ICT supported knowledge work in a human resources contact center which illustrates the negotiable boundary between the developer and user in local level innovation processes. Drawing upon ideas from the social shaping of technology, we examine how discussions regarding producer-user relations in innovation processes require a degree of greater sophistication as we show how users often develop (or produce) technologies and work practices in situ—in this case, to enable knowledge work practices and contribute to the project of constructing the knowledge component of professional identity. Much has been made of contextualizing the user; further work is required to contextualize the developer as a user and understand the social actors in ICT innovation environments who straddle both domains
Resumo:
The purpose of this study is to understand a small e-support firm’s response to the local e-readiness and the global e-business environment in a developing context. E-Support firms provide Web development and consultancy services to user organizations, assisting them in their uptake and maintenance of their Internet applications. Within the e-readiness research area, little is known about e-support firms, particularly in connection with their interaction with their local and the global e-business environment. As yet the emphasis on e-readiness studies has been at the national level. Nevertheless, the e-support sector is very significant in the successful adoption and diffusion of the Internet and related applications in any economy. It is thus important to understand how such firms relate to their e-business environments.That said, this study draws on the interpretive case study of a small e-support firm in Ghana, a developing context, to investigate the firm’s response to the e-readiness level of the local and the global e-business environment. Findings show that the firm could employ resources from the global environment to address most of the infrastructural challenges posed by a relatively poor local e-readiness context. However, its attempt to transfer advanced e-business technologies from the global e-business environment to the local e-business context did not succeed. This chapter offers implications for practice and research concerning the notion of reconciling local and global e-business environments in the small e-support sector.
Resumo:
Enterprise Resource Planning (ERP) software typically takes the form of a package that is licensed for use to those in a client organisation and is sold as being able to automate a wide range of processes within organisations. ERP packages have become an important feature of information and communications technology (ICT) infrastructures in organizations. However, a number of highly publicised failures have been associated with the ERP packages too. For example: Hershey, Aero Group and Snap-On have blamed the implementation of ERP packages for negative impacts upon earnings (Scott and Vessey 2000); Cadbury Schweppes implemented plans to fulfil 250 orders where normally they would fulfil 1000 due to the increased complexity and the need to re-train staff post implementation (August 1999) and FoxMeyer drug company’s implementation of an ERP package has been argued to have lead to bankruptcy proceedings resulting in litigation against SAP, the software vendor in question (Bicknell 1998). Some have even rejected a single vendor approach outright (Light et. al. 2001). ERP packages appear to work for some and not for others, they contain contradictions. Indeed, if we start from the position that technologies do not provide their own explanation, then we have to consider the direction of a technological trajectory and why it moves in one way rather than another (Bijker and Law 1994). In other words, ERP appropriation cannot be predetermined as a success, despite the persuasive attempts of vendors via their websites and other marketing channels. Moreover, just because ERP exists, we cannot presume that all will appropriate it in the same fashion, if at all. There is more to the diffusion of innovations than stages of adoption and a simple demarcation between adoption and rejection. The processes that are enacted in appropriation need to be conceptualised as a site of struggle, political and imbued with power (Hislop et. al. 2000; Howcroft and Light, 2006). ERP appropriation and rejection can therefore be seen as a paradoxical phenomenon. In this paper we examine these contradictions as a way to shed light on the presence and role of inconsistencies in ERP appropriation and rejection. We argue that much of the reasoning associated with ERP adoption is pro-innovation biased and that deterministic models of the diffusion of innovations such as Rogers (2003), do not adequately take account of contradictions in the process. Our argument is that a better theoretical understanding of these contradictions is necessary to underpin research and practice in this area. In the next section, we introduce our view of appropriation. Following this is an outline of the idea of contradiction, and the strategies employed to ‘cope’ with this. Then, we introduce a number of reasons for ERP adoption and identify their inherent contradictions using these perspectives. From this discussion, we draw a framework, which illustrates how the interpretive flexibility of reasons to adopt ERP packages leads to contradictions which fuel the enactment of appropriation and rejection.
Resumo:
Broadband technology has been introduced to the business community and the public as a fast and easy way of exploiting the Internet. The benefits of its use (fast reliable connections, always on) have been widely realised and broadband diffusion is one of the items at the top of the agenda for technology related polices of governments worldwide. Broadband diffusion and capacity development are central to debates in many countries concerning the role of the government in developing efficient broadband policies particularly in terms of the usage of public money. In this paper we examine the impact of government polices to broadband adoption in the case of the UK government, a country that is striving to have the most extensive and competitive broadband market in the G7 by 2005. We analyse specific institutional actions related to IT diffusion as pursued by the government with the view to identify best practices in government intervention. We believe that are our analysis is useful for broadband strategies in particular and technology in general when applied elsewhere.
Resumo:
Abstract: Social network technologies, as we know them today have become a popular feature of everyday life for many people. As their name suggests, their underlying premise is to enable people to connect with each other for a variety of purposes. These purposes however, are generally thought of in a positive fashion. Based on a multi-method study of two online environments, Habbo Hotel and Second Life, which incorporate social networking functionality, we she light on forms of what can be conceptualized as antisocial behaviours and the rationales for these. Such behaviours included: scamming, racist/homophobic attacks, sim attacks, avatar attacks, non-conformance to contextual norms, counterfeiting and unneighbourly behaviour. The rationales for sub behaviours included: profit, fun, status building, network disruption, accidental acts and prejudice. Through our analysis we are able to comment upon the difficulties of defining antisocial behaviour in such environments, particularly when such environments are subject to interpretation vis their use and expected norms. We also point to the problems we face in conducting our public and private lives given the role ICTs are playing in the convergence of these two spaces and also the convergence of ICTs themselves.
Resumo:
Enterprise Resource Planning (ERP) systems are integrated enterprise-wide standard information systems that automate all aspects of an organisations’ business processes. The ERP philosophy is that business systems incorporating sales, marketing, manufacturing, distribution, personnel and finance modules can be supported by a single integrated system with all of the company’s data captured in a central database. The ERP packages of vendors such as SAP, Baan, J.D. Edwards and Intentia represent more than a common systems platform for a business. They prescribe information blueprints of how organisation’s business processes should operate. In this paper, the scale and strategic importance of ERP systems is identified and the problem of ERP implementation is defined. Five company examples are analysed using a Critical Success Factors (CSFs) theoretical framework. The paper offers a framework for managers which provides the basis for developing an ERP implementation strategy. The case analysis identifies different approaches to ERP implementation, highlights the critical role of legacy systems in influencing the implementation process, and identifies the importance of business process change and software configuration in addition to factors already cited in the literature such as top management support and communication. The implications of the results and future research opportunities are outlined.
Resumo:
ABSTRACT A rapidly changing business environment and legacy IT problems has resulted in many organisations implementing standard package solutions. This 'common systems' approach establishes a common IT and business process infrastructure within organisations and its increasing dominance raises several important strategic issues. These are to what extent do common systems impose common business processes and management systems on competing firms, and what is the source of competitive advantage if the majority of firms employ almost identical information systems and business processes? A theoretical framework based on research into legacy systems and earlier IT strategy literature is used to analyse three case studies in the manufacturing, chemical and IT industries. It is shown that the organisations are treating common systems as the core of their organisations' abilities to manage business transactions. To achieve competitive advantage they are clothing these common systems with information systems designed to capture information about competitors, customers and suppliers, and to provide a basis for sharing knowledge within the organisation and ultimately with economic partners. The importance of these approaches to other organisations and industries is analysed and an attempt is made at outlining the strategic options open to firms beyond the implementation of common business systems.
Resumo:
Organisational dependence upon IT continues to grow yet experiences of satisfaction vary widely. Problematic, aged IT is often cited as being a fundamental problem in this respect and this is commonly termed legacy information systems. However, in this paper the author offers an alternative, and arguably more comprehensive, theory of legacy information systems that accommodates multiple viewpoints and recognises its inherent dynamism. The paper suggests a theory of legacy information systems that comprises of the concepts of temporal effects, interpretations and characteristics. It is argued that legacy information systems are constructed of many ‘legacies’ that are handed down continuously, forming an amorphous set of sociotechnical interdependencies and relationships.
Resumo:
Social networking sites have become increasingly popular destinations for people wishing to chat, play games, make new friends or simply stay in touch. Furthermore, many organizations have been quick to grasp the potential they offer for marketing, recruitment and economic activities. Nevertheless, counterclaims depict such spaces as arenas where deception, social grooming and the posting of defamatory content flourish. Much research in this area has focused on the ends to which people deploy the technology, and the consequences arising, with a view to making policy recommendations and ethical interventions. In this paper, we argue that tracing where morality lies is more complex than these efforts suggest. Using the case of a popular social networking site, and concepts about the morality of technology, we disclose the ethics of Facebook as diffuse and multiple. In our conclusions we provide some reflections on the possibilities for action in light of this disclosure.
Resumo:
Abstract - Enterprise Resource Planning (ERP) software has become the dominant strategic platform for supporting enterprise-wide business processes. However, single vendor ERP software systems have been criticised for not meeting specific organisation and industry requirements. An alternative approach ‘Best of Breed (BoB)’, integrates components of software from multiple standard package vendors, and in some cases custom components. The objective is to develop enterprise systems that are more closely aligned with the requirements of an organisation. Although this approach may not be common at present it is likely to grow in importance due to business needs and technology advances such as the componentisation of ERP software. A case study analysis of a BoB implementation at a global entertainment's company is used as a platform for the discussion of the issues associated with this strategy and a comparison is made with the single vendor ERP alternative. The analysis centres on the complexity of implementation, the differences in the levels of functionality and business fit and the maintenance requirements.