918 resultados para Information resources management - Case studies


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In Finland one of the most important current issues in the environmental management is the quality of surface waters. The increasing social importance of lakes and water systems has generated wide-ranging interest in lake restoration and management, concerning especially lakes suffering from eutrophication, but also from other environmental impacts. Most of the factors deteriorating the water quality in Finnish lakes are connected to human activities. Especially since the 1940's, the intensified farming practices and conduction of sewage waters from scattered settlements, cottages and industry have affected the lakes, which simultaneously have developed in to recreational areas for a growing number of people. Therefore, this study was focused on small lakes, which are human impacted, located close to settlement areas and have a significant value for local population. The aim of this thesis was to obtain information from lake sediment records for on-going lake restoration activities and to prove that a well planned, properly focused lake sediment study is an essential part of the work related to evaluation, target consideration and restoration of Finnish lakes. Altogether 11 lakes were studied. The study of Lake Kaljasjärvi was related to the gradual eutrophication of the lake. In lakes Ormajärvi, Suolijärvi, Lehee, Pyhäjärvi and Iso-Roine the main focus was on sediment mapping, as well as on the long term changes of the sedimentation, which were compared to Lake Pääjärvi. In Lake Hormajärvi the role of different kind of sedimentation environments in the eutrophication development of the lake's two basins were compared. Lake Orijärvi has not been eutrophied, but the ore exploitation and related acid main drainage from the catchment area have influenced the lake drastically and the changes caused by metal load were investigated. The twin lakes Etujärvi and Takajärvi are slightly eutrophied, but also suffer problems associated with the erosion of the substantial peat accumulations covering the fringe areas of the lakes. These peat accumulations are related to Holocene water level changes, which were investigated. The methods used were chosen case-specifically for each lake. In general, acoustic soundings of the lakes, detailed description of the nature of the sediment and determinations of the physical properties of the sediment, such as water content, loss on ignition and magnetic susceptibility were used, as was grain size analysis. A wide set of chemical analyses was also used. Diatom and chrysophycean cyst analyses were applied, and the diatom inferred total phosphorus content was reconstructed. The results of these studies prove, that the ideal lake sediment study, as a part of a lake management project, should be two-phased. In the first phase, thoroughgoing mapping of sedimentation patterns should be carried out by soundings and adequate corings. The actual sampling, based on the preliminary results, must include at least one long core from the main sedimentation basin for the determining the natural background state of the lake. The recent, artificially impacted development of the lake can then be determined by short-core and surface sediment studies. The sampling must be focused on the basis of the sediment mapping again, and it should represent all different sedimentation environments and bottom dynamic zones, considering the inlets and outlets, as well as the effects of possible point loaders of the lake. In practice, the budget of the lake management projects of is usually limited and only the most essential work and analyses can be carried out. The set of chemical and biological analyses and dating methods must therefore been thoroughly considered and adapted to the specific management problem. The results show also, that information obtained from a properly performed sediment study enhances the planning of the restoration, makes possible to define the target of the remediation activities and improves the cost-efficiency of the project.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The introduction describes productive forest in Queensland and summaries the principles of native forest management that achieve optimum productivity. Case study 1 deals with thinning an even-aged regrowth forest. It shows how thinning the stand actively manages the future composition and structure to improve productivity in the best stems and increase the commercial value of the next harvest. Case study 2 describes restoring productivity in a high-graded spotted gum - ironbark forest. It shows that defective and non-saleable trees should be removed so they do not repress the future stand; and that regeneration should be thinned, retaining the best trees in adequate growing space. Case study 3 discusses on-farm value adding for hardwood forests. It shows how long-term viability and maximum productivity and returns depend on the best management practices and knowing how to obtain the best returns from a range of forest products. Case study 4 examines integrated harvesting in a eucalypt forest. It shows how integrating the harvest enables the full range of timber products are harvested and sold for their maximum value while reducing the amount of waste.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study investigated the use of competencies for human resource management in seven Australian companies. Despite advocacy for the use of competencies by Government Committees and Task Forces (For example Carmichael (1992), Mayer, (1992) and Karpin, 1995), and the existence of competency standards for eighty per cent of the Australian workforce, the competency approach has not been widely adopted. A review of the literature indicated that the term competency had several meanings with different implications for its use depending on the meaning. The study looked at how individuals have defined the term and applied the approach to human resource management practices. Interviews were conducted with Human Resource and Training managers, and operative staff in companies using competencies. How they defined the term, described the rationale for using competencies, and applied competencies to selection, training, performance appraisal and remuneration were determined. Case studies were written for each company to describe their particular application of competencies. Competencies were found to be defined in several ways by those interviewed. Some advantages of using competencies in human resource management applications were found. The amount of work involved in introducing the competency approach was described as a reason why competencies have not been more widely adopted.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Using Actor-Network Theory (ANT), this thesis describes arguments and inducements organisations can offer other organisations to participate in Vertical IS standardisation initiatives. To develop public goods such as Vertical IS standards, a persuasive value proposition is needed to encourage participation. Without social interactions between participants, tensions may hinder the progress of standards developments.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Includes bibliographical references.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose: The aim of this paper is to promote qualitative methodology within the scientific community of management. The specific objective is oriented to propose an empirical research process based on case study method. This is to ensure rigor in the empirical research process, that future research may follow a similar procedure to that is proposed. Design/methodology/approach: Following a qualitative methodological approach, we propose a research process that develops according to four phases, each with several stages. This study analyses the preparatory and field work phases and their stages. Findings: The paper shows the influence that case studies have on qualitative empirical research process in management. Originality/value:. Case study method assumes an important role within qualitative research by allowing for the study and analysis of certain types of phenomena that occur inside organisations, and in respect of which quantitative studies cannot provide an answer.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Federal Highway Administration, Washington, D.C.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Federal Highway Administration, Washington, D.C.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Identifying the information needs of managers and other stakeholders is an important first step in designing an evaluation of management effectiveness for marine protected areas (MPAs) that will be relevant to local circumstances and useful for improving management practices. Information requirements for evaluating effectiveness were investigated at two MPAs in Indonesia. Results show that, despite similar management objectives, information needs for evaluation differ between sites and those differences reflect the unique context within which management operates in each case. The scope of information needs at each site covers a broad range of issues including context, planning, resources, processes, outputs, and outcomes. Relevant components of a variety of different evaluation tools will need to be used to satisfy information needs at these sites. Evaluation tools that are based primarily on stated management objectives or the expressed views of a few key stakeholders are unlikely to be very useful for improving management in these cases.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis argues that in order to establish a sound information security culture it is necessary to look at organisation's information security systems in a socio- technical context. The motivation for this research stems from the continuing concern of ineffective information security in organisations, leading to potentially significant monetary losses. It is important to address both technical and non- technical aspects when dealing with information security management. Culture has been identified as an underlying determinant of individuals' behaviour and this extends to information security culture, particularly in developing countries. This research investigates information security culture in the Saudi Arabia context. The theoretical foundation for the study is based on organisational and national culture theories. A conceptual framework for this study was constructed based on Peterson and Smith's (1997) model of national culture. This framework guides the study of national, organisational and technological values and their relationships to the development of information security culture. Further, the study seeks to better understand how these values might affect the development and deployment of an organisation's information security culture. Drawing on evidence from three exploratory case studies, an emergent conceptual framework was developed from the traditional human behaviour and the social environment perspectives used in social work, This framework contributes to in- formation security management by identifying behaviours related to four modes of information security practice. These modes provide a sound basis that can be used to evaluate individual organisational members' behaviour and the adequacy of ex- isting security measures. The results confirm the plausibility of the four modes of practice. Furthermore, a final framework was developed by integrating the four modes framework into the research framework. The outcomes of the three case stud- ies demonstrate that some of the national, organisational and technological values have clear impacts on the development and deployment of organisations' informa- tion security culture. This research, by providing an understanding the in uence of national, organi- sational and technological values on individuals' information security behaviour, contributes to building a theory of information security culture development within an organisational context. The research reports on the development of an inte- grated information security culture model that highlights recommendations for developing an information security culture. The research framework, introduced by this research, is put forward as a robust starting point for further related work in this area.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

All organisations, irrespective of size and type, need effective information security management (ISM) practices to protect vital organisational in- formation assets. However, little is known about the information security management practices of nonprofit organisations. Australian nonprofit organisations (NPOs) employed 889,900 people, managed 4.6 million volunteers and contributed $40,959 million to the economy during 2006-2007 (Australian Bureau of Statistics, 2009). This thesis describes the perceptions of information security management in two Australian NPOs and examines the appropriateness of the ISO 27002 information security management standard in an NPO context. The overall approach to the research is interpretive. A collective case study has been performed, consisting of two instrumental case studies with the researcher being embedded within two NPOs for extended periods of time. Data gathering and analysis was informed by grounded theory and action research, and the Technology Acceptance Model was utilised as a lens to explore the findings and provide limited generalisability to other contexts. The major findings include a distinct lack of information security management best practice in both organisations. ISM Governance and risk management was lacking and ISM policy was either outdated or non- existent. While some user focused ISM practices were evident, reference to standards, such as ISO 27002, were absent. The main factor that negatively impacted on ISM practices was the lack of resources available for ISM in the NPOs studied. Two novel aspects of information security dis- covered in this research were the importance of accuracy and consistency of information. The contribution of this research is a preliminary understanding of ISM practices and perceptions in NPOs. Recommendations for a new approach to managing information security management in nonprofit organisations have been proposed.