949 resultados para Scientific apparatus and instruments


Relevância:

100.00% 100.00%

Publicador:

Resumo:

1. Introduction "The one that has compiled ... a database, the collection, securing the validity or presentation of which has required an essential investment, has the sole right to control the content over the whole work or over either a qualitatively or quantitatively substantial part of the work both by means of reproduction and by making them available to the public", Finnish Copyright Act, section 49.1 These are the laconic words that implemented the much-awaited and hotly debated European Community Directive on the legal protection of databases,2 the EDD, into Finnish Copyright legislation in 1998. Now in the year 2005, after more than half a decade of the domestic implementation it is yet uncertain as to the proper meaning and construction of the convoluted qualitative criteria the current legislation employs as a prerequisite for the database protection both in Finland and within the European Union. Further, this opaque Pan-European instrument has the potential of bringing about a number of far-reaching economic and cultural ramifications, which have remained largely uncharted or unobserved. Thus the task of understanding this particular and currently peculiarly European new intellectual property regime is twofold: first, to understand the mechanics and functioning of the EDD and second, to realise the potential and risks inherent in the new legislation in economic, cultural and societal dimensions. 2. Subject-matter of the study: basic issues The first part of the task mentioned above is straightforward: questions such as what is meant by the key concepts triggering the functioning of the EDD such as presentation of independent information, what constitutes an essential investment in acquiring data and when the reproduction of a given database reaches either qualitatively or quantitatively the threshold of substantiality before the right-holder of a database can avail himself of the remedies provided by the statutory framework remain unclear and call for a careful analysis. As for second task, it is already obvious that the practical importance of the legal protection providedby the database right is in the rapid increase. The accelerating transformationof information into digital form is an existing fact, not merely a reflection of a shape of things to come in the future. To take a simple example, the digitisation of a map, traditionally in paper format and protected by copyright, can provide the consumer a markedly easier and faster access to the wanted material and the price can be, depending on the current state of the marketplace, cheaper than that of the traditional form or even free by means of public lending libraries providing access to the information online. This also renders it possible for authors and publishers to make available and sell their products to markedly larger, international markets while the production and distribution costs can be kept at minimum due to the new electronic production, marketing and distributionmechanisms to mention a few. The troublesome side is for authors and publishers the vastly enhanced potential for illegal copying by electronic means, producing numerous virtually identical copies at speed. The fear of illegal copying canlead to stark technical protection that in turn can dampen down the demand for information goods and services and furthermore, efficiently hamper the right of access to the materials available lawfully in electronic form and thus weaken the possibility of access to information, education and the cultural heritage of anation or nations, a condition precedent for a functioning democracy. 3. Particular issues in Digital Economy and Information Networks All what is said above applies a fortiori to the databases. As a result of the ubiquity of the Internet and the pending breakthrough of Mobile Internet, peer-to-peer Networks, Localand Wide Local Area Networks, a rapidly increasing amount of information not protected by traditional copyright, such as various lists, catalogues and tables,3previously protected partially by the old section 49 of the Finnish Copyright act are available free or for consideration in the Internet, and by the same token importantly, numerous databases are collected in order to enable the marketing, tendering and selling products and services in above mentioned networks. Databases and the information embedded therein constitutes a pivotal element in virtually any commercial operation including product and service development, scientific research and education. A poignant but not instantaneously an obvious example of this is a database consisting of physical coordinates of a certain selected group of customers for marketing purposes through cellular phones, laptops and several handheld or vehicle-based devices connected online. These practical needs call for answer to a plethora of questions already outlined above: Has thecollection and securing the validity of this information required an essential input? What qualifies as a quantitatively or qualitatively significant investment? According to the Directive, the database comprises works, information and other independent materials, which are arranged in systematic or methodical way andare individually accessible by electronic or other means. Under what circumstances then, are the materials regarded as arranged in systematic or methodical way? Only when the protected elements of a database are established, the question concerning the scope of protection becomes acute. In digital context, the traditional notions of reproduction and making available to the public of digital materials seem to fit ill or lead into interpretations that are at variance with analogous domain as regards the lawful and illegal uses of information. This may well interfere with or rework the way in which the commercial and other operators have to establish themselves and function in the existing value networks of information products and services. 4. International sphere After the expiry of the implementation period for the European Community Directive on legal protection of databases, the goals of the Directive must have been consolidated into the domestic legislations of the current twenty-five Member States within the European Union. On one hand, these fundamental questions readily imply that the problemsrelated to correct construction of the Directive underlying the domestic legislation transpire the national boundaries. On the other hand, the disputes arisingon account of the implementation and interpretation of the Directive on the European level attract significance domestically. Consequently, the guidelines on correct interpretation of the Directive importing the practical, business-oriented solutions may well have application on European level. This underlines the exigency for a thorough analysis on the implications of the meaning and potential scope of Database protection in Finland and the European Union. This position hasto be contrasted with the larger, international sphere, which in early 2005 does differ markedly from European Union stance, directly having a negative effect on international trade particularly in digital content. A particular case in point is the USA, a database producer primus inter pares, not at least yet having aSui Generis database regime or its kin, while both the political and academic discourse on the matter abounds. 5. The objectives of the study The above mentioned background with its several open issues calls for the detailed study of thefollowing questions: -What is a database-at-law and when is a database protected by intellectual property rights, particularly by the European database regime?What is the international situation? -How is a database protected and what is its relation with other intellectual property regimes, particularly in the Digital context? -The opportunities and threats provided by current protection to creators, users and the society as a whole, including the commercial and cultural implications? -The difficult question on relation of the Database protection and protection of factual information as such. 6. Dsiposition The Study, in purporting to analyse and cast light on the questions above, is divided into three mainparts. The first part has the purpose of introducing the political and rationalbackground and subsequent legislative evolution path of the European database protection, reflected against the international backdrop on the issue. An introduction to databases, originally a vehicle of modern computing and information andcommunication technology, is also incorporated. The second part sets out the chosen and existing two-tier model of the database protection, reviewing both itscopyright and Sui Generis right facets in detail together with the emergent application of the machinery in real-life societal and particularly commercial context. Furthermore, a general outline of copyright, relevant in context of copyright databases is provided. For purposes of further comparison, a chapter on the precursor of Sui Generi, database right, the Nordic catalogue rule also ensues. The third and final part analyses the positive and negative impact of the database protection system and attempts to scrutinize the implications further in the future with some caveats and tentative recommendations, in particular as regards the convoluted issue concerning the IPR protection of information per se, a new tenet in the domain of copyright and related rights.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Durante los cursos 2005/06 y 2006/07 se llevó a cabo un estudio sobre la incorporación de un centro virtual de recursos educativos como herramienta para la formación en TIC de estudiantes de magisterio de las universidades Rovira i Virgili y la de Lleida en el marco de la asignatura troncal Nuevas tecnologías aplicadas a la educación. Además de analizar la incidencia del centro virtual en la formación profesional de los estudiantes en el uso de TIC, el estudio tenía como objetivo comparar –entre los alumnos de ambos cursos y ambas universidades– el impacto de la asignatura en su percepción acerca de su capacitación y dominio de las TIC. En la primera parte del artículo se detallan los principales objetivos e instrumentos de nuestra investigación, en la segunda se describen y ejemplifican las características y funciones de la herramienta. Por último, se plantean los principales resultados y conclusiones de nuestra investigación.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

La fabrication, la distribution et l'usage de fausses pièces d'identité constituent une menace pour la sécurité autant publique que privée. Ces faux documents représentent en effet un catalyseur pour une multitude de formes de criminalité, des plus anodines aux formes les plus graves et organisées. La dimension, la complexité, la faible visibilité, ainsi que les caractères répétitif et évolutif de la fraude aux documents d'identité appellent des réponses nouvelles qui vont au-delà d'une approche traditionnelle au cas par cas ou de la stratégie du tout technologique dont la perspective historique révèle l'échec. Ces nouvelles réponses passent par un renforcement de la capacité de comprendre les problèmes criminels que posent la fraude aux documents d'identité et les phénomènes qui l'animent. Cette compréhension est tout bonnement nécessaire pour permettre d'imaginer, d'évaluer et de décider les solutions et mesures les plus appropriées. Elle requière de développer les capacités d'analyse et la fonction de renseignement criminel qui fondent en particulier les modèles d'action de sécurité les plus récents, tels que l'intelligence-led policing ou le problem-oriented policing par exemple. Dans ce contexte, le travail doctoral adopte une position originale en postulant que les fausses pièces d'identité se conçoivent utilement comme la trace matérielle ou le vestige résultant de l'activité de fabrication ou d'altération d'un document d'identité menée par les faussaires. Sur la base de ce postulat fondamental, il est avancé que l'exploitation scientifique, méthodique et systématique de ces traces au travers d'un processus de renseignement forensique permet de générer des connaissances phénoménologiques sur les formes de criminalité qui fabriquent, diffusent ou utilisent les fausses pièces d'identité, connaissances qui s'intègrent et se mettent avantageusement au service du renseignement criminel. A l'appui de l'épreuve de cette thèse de départ et de l'étude plus générale du renseignement forensique, le travail doctoral propose des définitions et des modèles. Il décrit des nouvelles méthodes de profilage et initie la constitution d'un catalogue de formes d'analyses. Il recourt également à des expérimentations et des études de cas. Les résultats obtenus démontrent que le traitement systématique de la donnée forensique apporte une contribution utile et pertinente pour le renseignement criminel stratégique, opérationnel et tactique, ou encore la criminologie. Combiné aux informations disponibles par ailleurs, le renseignement forensique produit est susceptible de soutenir l'action de sécurité dans ses dimensions répressive, proactive, préventive et de contrôle. En particulier, les méthodes de profilage des fausses pièces d'identité proposées permettent de révéler des tendances au travers de jeux de données étendus, d'analyser des modus operandi ou d'inférer une communauté ou différence de source. Ces méthodes appuient des moyens de détection et de suivi des séries, des problèmes et des phénomènes criminels qui s'intègrent dans le cadre de la veille opérationnelle. Ils permettent de regrouper par problèmes les cas isolés, de mettre en évidence les formes organisées de criminalité qui méritent le plus d'attention, ou de produire des connaissances robustes et inédites qui offrent une perception plus profonde de la criminalité. Le travail discute également les difficultés associées à la gestion de données et d'informations propres à différents niveaux de généralité, ou les difficultés relatives à l'implémentation du processus de renseignement forensique dans la pratique. Ce travail doctoral porte en premier lieu sur les fausses pièces d'identité et leur traitement par les protagonistes de l'action de sécurité. Au travers d'une démarche inductive, il procède également à une généralisation qui souligne que les observations ci-dessus ne valent pas uniquement pour le traitement systématique des fausses pièces d'identité, mais pour celui de tout type de trace dès lors qu'un profil en est extrait. Il ressort de ces travaux une définition et une compréhension plus transversales de la notion et de la fonction de renseignement forensique. The production, distribution and use of false identity documents constitute a threat to both public and private security. Fraudulent documents are a catalyser for a multitude of crimes, from the most trivial to the most serious and organised forms. The dimension, complexity, low visibility as well as the repetitive and evolving character of the production and use of false identity documents call for new solutions that go beyond the traditional case-by-case approach, or the technology-focused strategy whose failure is revealed by the historic perspective. These new solutions require to strengthen the ability to understand crime phenomena and crime problems posed by false identity documents. Such an understanding is pivotal in order to be able to imagine, evaluate and decide on the most appropriate measures and responses. Therefore, analysis capacities and crime intelligence functions, which found the most recent policing models such as intelligence-led policing or problem-oriented policing for instance, have to be developed. In this context, the doctoral research work adopts an original position by postulating that false identity documents can be usefully perceived as the material remnant resulting from the criminal activity undertook by forgers, namely the manufacture or the modification of identity documents. Based on this fundamental postulate, it is proposed that a scientific, methodical and systematic processing of these traces through a forensic intelligence approach can generate phenomenological knowledge on the forms of crime that produce, distribute and use false identity documents. Such knowledge should integrate and serve advantageously crime intelligence efforts. In support of this original thesis and of a more general study of forensic intelligence, the doctoral work proposes definitions and models. It describes new profiling methods and initiates the construction of a catalogue of analysis forms. It also leverages experimentations and case studies. Results demonstrate that the systematic processing of forensic data usefully and relevantly contributes to strategic, tactical and operational crime intelligence, and also to criminology. Combined with alternative information available, forensic intelligence may support policing in its repressive, proactive, preventive and control activities. In particular, the proposed profiling methods enable to reveal trends among extended datasets, to analyse modus operandi, or to infer that false identity documents have a common or different source. These methods support the detection and follow-up of crime series, crime problems and phenomena and therefore contribute to crime monitoring efforts. They enable to link and regroup by problems cases that were previously viewed as isolated, to highlight organised forms of crime which deserve greatest attention, and to elicit robust and novel knowledge offering a deeper perception of crime. The doctoral research work discusses also difficulties associated with the management of data and information relating to different levels of generality, or difficulties associated with the implementation in practice of the forensic intelligence process. The doctoral work focuses primarily on false identity documents and their treatment by policing stakeholders. However, through an inductive process, it makes a generalisation which underlines that observations do not only apply to false identity documents but to any kind of trace as soon as a profile is extracted. A more transversal definition and understanding of the concept and function of forensic intelligence therefore derives from the doctoral work.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Heart transplantation (HTx) is the treatment of choice for end-stage heart failure but the limited availability of heart's donors still represents a major issue. So long-term mechanical circulatory support (MCS) has been proposed as an alternative treatment option to assist patients scheduled on HTx waiting list bridging them for a variable time period to cardiac transplantation-the so-called bridge-to-transplantation (BTT) strategy. Nowadays approximately 90% of patients being considered for MCS receive a left ventricular assist device (LVAD). In fact, LVAD experienced several improvements in the last decade and the predominance of continuous-flow over pulsatile-flow technology has been evident since 2008. The aim of the present report is to give an overview of continuous-flow LVAD utilization in the specific setting of the BTT strategy taking into consideration the most representative articles of the scientific literature and focusing the attention on the evolution, clinical outcomes, relevant implications on the HTx strategy and future perspectives of the continuous-flow LVAD technology.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis gives an overview of the use of the level set methods in the field of image science. The similar fast marching method is discussed for comparison, also the narrow band and the particle level set methods are introduced. The level set method is a numerical scheme for representing, deforming and recovering structures in an arbitrary dimensions. It approximates and tracks the moving interfaces, dynamic curves and surfaces. The level set method does not define how and why some boundary is advancing the way it is but simply represents and tracks the boundary. The principal idea of the level set method is to represent the N dimensional boundary in the N+l dimensions. This gives the generality to represent even the complex boundaries. The level set methods can be powerful tools to represent dynamic boundaries, but they can require lot of computing power. Specially the basic level set method have considerable computational burden. This burden can be alleviated with more sophisticated versions of the level set algorithm like the narrow band level set method or with the programmable hardware implementation. Also the parallel approach can be used in suitable applications. It is concluded that these methods can be used in a quite broad range of image applications, like computer vision and graphics, scientific visualization and also to solve problems in computational physics. Level set methods and methods derived and inspired by it will be in the front line of image processing also in the future.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tämä diplomityö on Lappeenrannan teknillisessä yliopistossa aloitetun kaasunpolttotutkimushankkeen ensimmäinen tutkimusjakso. Tutkimushanketta varten on LTY:n voimalaitostekniikan koepolttolaboratoriossa rakennettu kaasunpolton tutkimuslaitteisto, jolla tässä diplomityössä perehdytään kaasuliekin lämpötilan mittausmenetelmiin, lämmönsiirtoon ja syntyviin päästöihin neste- ja maakaasupoltossa. Hankkeen toisessa tutkimusjaksossa laitteistolla tutkitaan regenaratiivista polttoa, ja polttoaineena käytetään neste- ja maakaasun lisäksi muita kaasuja kuten vetyä ja erilaisia seoskaasuja. Kaasunpolttotutkimushankkeen kokonaistavoitteena on pienentää kaasunpoltossa syntyviä NOx-päästöjä ja parantaa palamishyötysuhdetta ja tätä kautta pienentää laitteiston kokoa ja vähentää hiilidioksidipäästöjä.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis is composed of three main parts. The first consists of a state of the art of the different notions that are significant to understand the elements surrounding art authentication in general, and of signatures in particular, and that the author deemed them necessary to fully grasp the microcosm that makes up this particular market. Individuals with a solid knowledge of the art and expertise area, and that are particularly interested in the present study are advised to advance directly to the fourth Chapter. The expertise of the signature, it's reliability, and the factors impacting the expert's conclusions are brought forward. The final aim of the state of the art is to offer a general list of recommendations based on an exhaustive review of the current literature and given in light of all of the exposed issues. These guidelines are specifically formulated for the expertise of signatures on paintings, but can also be applied to wider themes in the area of signature examination. The second part of this thesis covers the experimental stages of the research. It consists of the method developed to authenticate painted signatures on works of art. This method is articulated around several main objectives: defining measurable features on painted signatures and defining their relevance in order to establish the separation capacities between groups of authentic and simulated signatures. For the first time, numerical analyses of painted signatures have been obtained and are used to attribute their authorship to given artists. An in-depth discussion of the developed method constitutes the third and final part of this study. It evaluates the opportunities and constraints when applied by signature and handwriting experts in forensic science. A brief summary covering each chapter allows a rapid overview of the study and summarizes the aims and main themes of each chapter. These outlines presented below summarize the aims and main themes addressed in each chapter. Part I - Theory Chapter 1 exposes legal aspects surrounding the authentication of works of art by art experts. The definition of what is legally authentic, the quality and types of the experts that can express an opinion concerning the authorship of a specific painting, and standard deontological rules are addressed. The practices applied in Switzerland will be specifically dealt with. Chapter 2 presents an overview of the different scientific analyses that can be carried out on paintings (from the canvas to the top coat). Scientific examinations of works of art have become more common, as more and more museums equip themselves with laboratories, thus an understanding of their role in the art authentication process is vital. The added value that a signature expertise can have in comparison to other scientific techniques is also addressed. Chapter 3 provides a historical overview of the signature on paintings throughout the ages, in order to offer the reader an understanding of the origin of the signature on works of art and its evolution through time. An explanation is given on the transitions that the signature went through from the 15th century on and how it progressively took on its widely known modern form. Both this chapter and chapter 2 are presented to show the reader the rich sources of information that can be provided to describe a painting, and how the signature is one of these sources. Chapter 4 focuses on the different hypotheses the FHE must keep in mind when examining a painted signature, since a number of scenarios can be encountered when dealing with signatures on works of art. The different forms of signatures, as well as the variables that may have an influence on the painted signatures, are also presented. Finally, the current state of knowledge of the examination procedure of signatures in forensic science in general, and in particular for painted signatures, is exposed. The state of the art of the assessment of the authorship of signatures on paintings is established and discussed in light of the theoretical facets mentioned previously. Chapter 5 considers key elements that can have an impact on the FHE during his or her2 examinations. This includes a discussion on elements such as the skill, confidence and competence of an expert, as well as the potential bias effects he might encounter. A better understanding of elements surrounding handwriting examinations, to, in turn, better communicate results and conclusions to an audience, is also undertaken. Chapter 6 reviews the judicial acceptance of signature analysis in Courts and closes the state of the art section of this thesis. This chapter brings forward the current issues pertaining to the appreciation of this expertise by the non- forensic community, and will discuss the increasing number of claims of the unscientific nature of signature authentication. The necessity to aim for more scientific, comprehensive and transparent authentication methods will be discussed. The theoretical part of this thesis is concluded by a series of general recommendations for forensic handwriting examiners in forensic science, specifically for the expertise of signatures on paintings. These recommendations stem from the exhaustive review of the literature and the issues exposed from this review and can also be applied to the traditional examination of signatures (on paper). Part II - Experimental part Chapter 7 describes and defines the sampling, extraction and analysis phases of the research. The sampling stage of artists' signatures and their respective simulations are presented, followed by the steps that were undertaken to extract and determine sets of characteristics, specific to each artist, that describe their signatures. The method is based on a study of five artists and a group of individuals acting as forgers for the sake of this study. Finally, the analysis procedure of these characteristics to assess of the strength of evidence, and based on a Bayesian reasoning process, is presented. Chapter 8 outlines the results concerning both the artist and simulation corpuses after their optical observation, followed by the results of the analysis phase of the research. The feature selection process and the likelihood ratio evaluation are the main themes that are addressed. The discrimination power between both corpuses is illustrated through multivariate analysis. Part III - Discussion Chapter 9 discusses the materials, the methods, and the obtained results of the research. The opportunities, but also constraints and limits, of the developed method are exposed. Future works that can be carried out subsequent to the results of the study are also presented. Chapter 10, the last chapter of this thesis, proposes a strategy to incorporate the model developed in the last chapters into the traditional signature expertise procedures. Thus, the strength of this expertise is discussed in conjunction with the traditional conclusions reached by forensic handwriting examiners in forensic science. Finally, this chapter summarizes and advocates a list of formal recommendations for good practices for handwriting examiners. In conclusion, the research highlights the interdisciplinary aspect of signature examination of signatures on paintings. The current state of knowledge of the judicial quality of art experts, along with the scientific and historical analysis of paintings and signatures, are overviewed to give the reader a feel of the different factors that have an impact on this particular subject. The temperamental acceptance of forensic signature analysis in court, also presented in the state of the art, explicitly demonstrates the necessity of a better recognition of signature expertise by courts of law. This general acceptance, however, can only be achieved by producing high quality results through a well-defined examination process. This research offers an original approach to attribute a painted signature to a certain artist: for the first time, a probabilistic model used to measure the discriminative potential between authentic and simulated painted signatures is studied. The opportunities and limits that lie within this method of scientifically establishing the authorship of signatures on works of art are thus presented. In addition, the second key contribution of this work proposes a procedure to combine the developed method into that used traditionally signature experts in forensic science. Such an implementation into the holistic traditional signature examination casework is a large step providing the forensic, judicial and art communities with a solid-based reasoning framework for the examination of signatures on paintings. The framework and preliminary results associated with this research have been published (Montani, 2009a) and presented at international forensic science conferences (Montani, 2009b; Montani, 2012).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tutkielman tavoitteena oli tutkia ja analysoida kirjallisuuden pohjalta reaalioptioteoriaa ja reaalioptioiden arvonmääritystapana binomimallia. Erityisenä painona tutkimuksessa oli reaalioptioiden hyväksikäyttö strategiaan ja tutkimus- ja tuotekehitysinvestointeihin. Tutkielma on toteutettu kirjallisuustutkimuksena. Tutkimusmetodologia on käsiteanalyyttinen. Lähdeaineistona on käytetty ulkomaisia tieteellisen aikakausijulkaisujen artikkeleita ja reaalioptioihin liittyviä kirjoja. Tutkielman tarkoituksena oli keskittyä reaalioptioteorian ja binomimallin ymmärtämiseen, perusteisiin ja käsitteistöön. Reaalioptiot tuovat hankkeiden arvonmääritykseen joustavuuden komponentin. Nykyajan kilpailullisilla markkinoilla on lisääntyvässä määrin epävarmuutta. Epävarmuuden hyödyntäminen on reaalioptioajattelun lähtökohta. Binomimalli on yksi tapa määrittää arvo reaalioptioille ja tähän malliin paneudutaan tutkielmassa syvemmin.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tavoitteet Tutkielman tavoitteena on selvittää ne tekijät, jotka ratkaisivat lähes konkurssissa olleen vähittäiskaupan yrityksen nostamisen todelliseksi menestystarinaksi. Aineisto ja tutkimusmenetelmä Teoreettinen viitekehys tutkielmassa muodostui keskeisten käsitteiden ympärille liittyneiden artikkeleiden sekä kirjallisuuden tarkastelusta tämän tutkielman kannalta. Empiirinen osa sisälsi tutkimuksen toteuttamisen case-yrityksessä, jossa tutkin strategisen muutoksen johtamista teoreettista viitekehystä hyväksikäyttäen. Tutkimusote tutkielmassa oli kvalitatiivinen ja informaation keräämisen metodina oli teemahaastattelu, mikä mahdollisti runsaan ja monipuolisen aineiston keräämisen case-yrityksestä. Tulokset Tutkimus vahvisti aikaisempia käsityksiä arvojen, vision ja strategian merkityksistä muutoksenjohtamisessa. Arvojen osalta tutkimustuloksessa korostuivat johdon oman esimerkin ja voimakkaan tahtotilan merkitykset arvojen sisäistämisessä. Menestyvän vähittäiskaupan yrityksen strategiaprosessi näyttää olevan monia aikaisempia teorioita suoraviivaisempi prosessi. Myös tietojärjestelmien tuen merkitys tuli esille vahvasti.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tutkielman päätavoitteena on kehittää konsernitason strategista johtamista tukeva mittaristo vähittäiskauppakonsernille. Ensimmäisenä osatavoitteena on tutkia strategisen johtamisen ja suorituskyvyn sekä mittaamisen doktriinia strategian seurannan näkökulmasta Toiseksi tutkitaan osuustoimintaa mittaamisen näkökulmasta ja S-ryhmän käytössä olevia mittaristoja. Kolmanneksi selvitetään strategisia vaihtoehtoja ja soveltaa niitä case-yritykseen. Neljänneksi arvioidaan mittariston relevanssi. Tutkimusmenetelmä on konstruktiivinen, ja tutkimustieto kerätään puolistrukturoiduilla teemahaastatteluilla. Kaupan strategisten perusvaihtoehtojen tarkastelun taustaksi esitellään kaupan erityispiirteitä, strategisia menestystekijöitä ja strategian vaihtoehtoja selventävä katsaus sekä selvitetään kaupan strategian sisältöä perustuen alan kirjallisuuteen, tieteellisiin artikkeleihin ja ajankohtaisiin uutisartikkeleihin. Lisäksi luodaan katsaus mittaamisteoriaan ja strategiaprosessiin mittaamisen näkökulmasta. Suorituskykymittaristojen esittelyssä vertaillaan eri mittaristoja keskenään. Balanced Scorecard esitellään strategisena johtamis- ja mittaamisjärjestelmänä, koska se soveltuu hyvin laaditun strategian toteuttamisen mittaamiseen. Osuuskauppa Keulan mittariston taustaksi tutkitaan S-ryhmän käytössä olevia mittareita, ja haastattelujen pohjalta luodaan katsaus osuuskauppojen mittaamiseen. Lopuksi sovelletaan strategisten valintavaihtoehtojen malleja Osuuskauppa Keulaan. Valintapäätösten taustaksi tarvitaan perusteellinen strateginen analyysi, jotta ylin johto pystyy tekemään yrityksen tilanteeseen sopivat valinnat. Tätä analyysia on sivuttu ja tehty johtopäätöksiä yrityksen toiminta-ajatuksen pohjalta strategisista todellisista vaihtoehdoista. Doktriinin ja empirian pohjalta määritellään kohdeyritykselle kriittiset menestystekijät ja niille mitattavat tavoitteet. Lopuksi strategian toteuttamisen seurantaan kehitetään toiminta-ajatuksen ja vision toteuttamista mittaavat strategiset mittarit, joissa otetaan huomioon kuluttajaosuustoiminnan erityispiirteet.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tutkielman tavoitteena oli selvittää, mikä on palvelun laadun taso infocom sektorilla Suomessa, ja miten sitä voidaan parantaa. Teoriaosassa tavoitteeseen pyrittiin muodostamalla teoriakirjallisuuteen, tieteellisiin julkaisuihin sekä aikaisempaan aihealuetta sivuavaan tutkimukseen perustuva viitekehysmalli. Empiirisessä osassa tavoitetta lähestyttiin tutkimalla infocom sektorin kunkin toimialueen (telekommunikaatio, informaatio teknologia ja sisältötuotanto) palvelujen laatua case-kuvausten muodossa. Tutkielman empiirinen osuus toteutettiin kvalitatiivisena multiple case -tutkimuksena teemahaastattelu-menetelmää soveltaen. Case-analyysi suorittiin käyttäen ns. explanation- building -menetelmää. Teoreettiset ja empiiriset tutkimustulokset yhdistettiin erityisiksi infocom sektorille soveltuviksi toimenpidesuosituksiksi. Tutkielman empiirinen osuus antoi tukea teoreettisen osuuden pohjalta kehitetylle viitekehykselle. Tutkimuksen tavoitteena oli case-analyysi- menetelmän mukaisesti luoda perusta syvemmälle aihepiiriä käsittelevälle jatkotutkimukselle ja luoda kuva infocom sektorin tämän hetkisestä laadullisesta tilasta. Yhteenvetona voidaan sanoa, että laatu palvelujen markkinoinnissa infocom sektorilla on suhteellisen heikkoa, vaikka tutkimusaineiston mukaan laatu arvostetaan hyvin korkealle. Yritysten tämänhetkiset panostukset laatuun liittyvät lähinnä liiketoiminnan tukifunktioihin ja prosessien ohjausmenetelmiä koskeviin järjestelmiin. Tutkimuksen pohjalta tehtävät varsinaiset toimenpidesuositukset liittyvät laadun sisäistämiseen jo strategiaa luotaessa, asiakaslähtöisyyteen, laatujohtamiseen, laatukoulutukseen ja kokonaisvaltaisen laatukulttuurin luomiseen organisaatioissa. Turbulentissa, nopeasti kansainvälistyvässä ja erittäin voimakkaasti kilpaillussa liiketoimintaympäristössä nämä ovat elintärkeitä menestymisen kriteerejä.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tutkielman tavoitteena oli analysoida mentorointia, sen teoriaa ja menetelmää sekä miten sitä käytetään S-ryhmässä ja millä tavalla mentoroinnin käyttöä voidaan edistää johtamisen tukena S-ryhmässä. Tutkimuksessa tarkasteltiin mentorointia menetelmänä, jolla edistetään toisilta oppimista. Mentorointia analysoidaan myös hiljaisen tiedon, tietopääoman johtamisen ja kehittyvän johtajan ominaisuuksien näkökulmista. Osatavoitteiksi asetettiin kahdella eri tavalla toteutettujen mentorointiohjelmien erojen selvittäminen tuloksiltaan ja vaikutuksiltaan sekä mentoroinnin avulla tapahtuva oppimisen tehostaminen S-ryhmässä. Tutkielmassa käytetty konstruktiivinen metodologia valittiin tutkimusongelman perusteella, koska tarkoituksena oli kehittää S-ryhmään mentoroinnin hyödyntämiseen sopiva malli. Tiedonkeruumenetelmänä käytettiin sekä kyselytutkimusta että tietoverkossa tapahtuvaa strukturoitua teemahaastattelua. Tutkimuksen teoriaosa perustuu alan kirjallisuuteen, aihetta käsitteleviin kotimaisiin ja ulkomaisiin tutkimuksiin sekä tieteellisiin lehti- ja muihin artikkeleihin. Aikaisemman teoreettisen tutkimuksen perusteella laadittiin teoreettinen viitekehys, joka muodosti perustan tutkimuksen empiiriselle osalle. Empiirinen osa koostuu S-ryhmän mentorointiprojektia koskevasta materiaalista, mentorointiprojektiin osallistuneiden henkilöiden kyselytutkimuksista sekä S-ryhmän johtoon kuuluvien yhdeksän johtajan haastattelu-tutkimuksesta. Tutkimuksen päätuloksena oli se, että mentorointi sopii erinomaisen hyvin kehitysmenetelmäksi osaamisen ja kokemustiedon siirtämiseen vanhemmilta johtajilta nuorille potentiaalisille johtajille. Tämä tulos on erityisen merkittävä S-ryhmälle johtajaosaamisen kehittämisessä, kun ryhmään ollaan parhaillaan kasvattamassa uutta johtajasukupolvea. Empiirinen tutkimus tukee myös sitä näkemystä, että mentoroinnin toteuttamiseen S-ryhmässä on olemassa erilaisia tapoja. Keskeisenä tavoitteena toteutuksissa on henkilöiden kehittyminen ja oppiminen. Tutkimustuloksissa korostuivat myös nuoremman eli mentoroitavan tarve päästä kahdenkeskiseen, avoimeen ja luottamukselliseen keskusteluun kokeneemman henkilön kanssa. Näiden tutkimustulosten perusteella päädyttiin seuraaviin johtopäätöksiin: S-ryhmä tarvitsee oman mentorointijärjestelmän, joka toteutetaan ohjatun mentorointimallin mukaisesti. S-ryhmään on tärkeä perustaa oma mentorointipooli, jossa on halukkaita, eri osa-alueita osaavia mentoreita ja meklari, joka yhdyttää osapuolet toisiinsa.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The organization, assembly and remodeling of the actin cytoskeleton provide force and tracks for a variety of (endo)membrane-associated events such as membrane trafficking. This review illustrates in different cellular models how actin and many of its numerous binding and regulatory proteins (actin and co-workers) participate in the structural organization of the Golgi apparatus and in traf- ficking-associated processes such as sorting, biogenesis and motion of Golgi-derived transport carriers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Prostate Cancer Programme of the European School of Oncology developed the concept of specialised interdisciplinary and multiprofessional prostate cancer care to be formalized in Prostate Cancer Units (PCU). After the publication in 2011 of the collaborative article "The Requirements of a Specialist Prostate Cancer Unit: A Discussion Paper from the European School of Oncology", in 2012 the PCU Initiative in Europe was launched. A multiprofessional Task Force of internationally recognized opinion leaders, among whom representatives of scientific societies, and patient advocates gathered to set standards for quality comprehensive prostate cancer care and designate care pathways in PCUs. The result was a consensus on 40 mandatory and recommended standards and items, covering several macro-areas, from general requirements to personnel to organization and case management. This position paper describes the relevant, feasible and applicable core criteria for defining PCUs in most European countries delivered by PCU Initiative in Europe Task Force.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Recent studies conducted in Europe using communicative methodology highlight that different ways of grouping students has a direct effect on their academic output. This article analyzes how said research methodology identifies and analyzes those student groupings that provide greater academic success and improve classroom coexistence at Spanish educational centers. Said methodology entails all of the research participants researchers, teachers, families, and students reflecting on the consequences of streaming, mixture, and inclusion for student academic achievement. Following this, our conclusions are compared with the policies and educational practices implemented in Spanish schools, which are not based on scientific knowledge and do not usually lead to academic success. Finally, recommendations are presented for future educational policies with the aim of providing an alternative for teachers and educational managers that would substantially improve student academic success.