Spelling suggestions: "subject:"enterprise"" "subject:"interprise""
241 |
Proposta de um modelo de representação de Design Rationale para projetos de sistemas ERP. / Representation model proposal of Design Rationale to ERP systems design.Sandra Kawamoto 06 February 2007 (has links)
Atenção especial tem sido dada às atividades de documentação e suporte a projetos em Engenharia de Software, principalmente quando estão relacionadas a sistemas complexos e equipes distribuídas. Geralmente apenas se registram as informações relativas às decisões finais de determinada fase. Não são documentadas as razões de cada decisão e nem as alternativas que foram consideradas e descartadas. A captura e recuperação, de maneira eficiente, deste tipo de informação é a finalidade do estudo do Design Rationale. O registro destas informações pode facilitar a manutenção, o reuso e também a própria fase de elaboração do projeto, na medida em que possibilita um melhor entendimento do sistema, por meio da disseminação de conhecimento, comunicação e integração entre a equipe de projeto. A questão é quando e como capturar estas informações sem muita interferência junto às atividades usuais dos projetistas, a fim de que os benefícios possam superar os custos envolvidos nesta tarefa. O presente trabalho tem como objetivo mostrar com razões plausíveis a grande utilidade da aplicação da técnica de Design Rationale em projetos de sistemas ERP, propondo um novo modelo de representação das decisões de projeto para estes sistemas. / Special attention has been given to documentation and support activities in Software Engineering design, mainly when they are related to complex systems and distributed teams. Usually, information related to the final decisions of each phase is registered. However, the reasons of each decision and the alternatives that were considered and discarded are not documented. Capture and recovery of this type of information, in an efficient way, are the purposes of the Design Rationale study. Recording this information can facilitates maintenance, reuse and even the design phase, providing a better understanding of the system, by knowledge spread, communication and integration among the project team. The main concern is when and how to capture this information with low interference in designers\' usual activities, so that benefits can overcome costs involved in this task. The purpose of the present work is to show with plausible reasons the great usefulness of the application of Design Rationale technique in ERP systems design, proposing a new representation model for recording design decisions in these system.
|
242 |
A percep??o da cultura organizacional por trabalhadores: uma compara??o entre empresas p?blicas e privadas dos setores de servi?o e de manufatura / The perception of organizational culture by workers: a comparison between public and private enterprise of the sectors of the service and manufacturingPERES, Antero Aguiar 05 September 2008 (has links)
Made available in DSpace on 2016-04-28T20:19:22Z (GMT). No. of bitstreams: 1
2008 - Antero Aguiar Peres.pdf: 322879 bytes, checksum: 17ddecf64808646f5255787694b06de8 (MD5)
Previous issue date: 2008-09-05 / This study aims to investigate the differences in organizational culture between public
and private enterprises in the manufacturing and service sectors as well as to highlight
some features that have been identified as typical of public organizations, to enable the
distinction between public enterprises and private. However, this effort should not be
regarded as an interest to criticize the enterprise public, as both have been identified in
the literature. The study is structured in ten chances from the results of research of
scholars in the area. Was used as a tool to search a wide Brazilian, already validated, to
measure the values and organizational practices embedded in organizational culture.
The data were analyzed using SPSS in the Student's t-test and linear correlation
coefficient of Pearson, allowing the testing of hypotheses of the study. The results
revealed significant differences between public and private enterprise regarding the
adoption of values and practices of organizational culture. Unlike the results between
enterprises of the sectors of manufacturing and service, with no differences in
organizational culture. I conclude that there are significant differences in organizational
culture between public and private enterprises, which indicate the need for attention by
the managers of these organizations. Thus, in comparison, three issues deserve
attention: the practice of integrating foreign, practices of training and professionalism
and reward competitive and individualistic. / Este estudo tem como objetivo investigar as diferen?as na cultura organizacional
entre empresas p?blicas e privadas nos setores de servi?o e manufatura, bem como dar
destaque a algumas caracter?sticas que t?m sido apontadas como t?picas de organiza??es
p?blicas, de modo a permitir a distin??o entre empresas p?blicas e privadas. Entretanto,
tal esfor?o n?o deve ser considerado como um interesse de criticar a empresa p?blica,
como tanto tem sido identificado na literatura. O estudo est? estruturado em dez
hip?teses a partir de resultados de pesquisas de estudiosos da ?rea. Adotou-se como
instrumento de pesquisa uma escala brasileira, j? validada, para medir os valores e as
pr?ticas organizacionais inseridas na cultura organizacional. Os dados foram analisados
no SPSS utilizando o Teste t de Student e o Coeficiente de Correla??o Linear de
Pearson, permitindo testar as hip?teses do estudo. Os resultados revelaram haver
diferen?as significativas entre empresas p?blicas e privadas em rela??o ? ado??o de
valores e pr?ticas da cultura organizacional. Ao contr?rio dos resultados encontrados
entre empresas dos setores de manufatura e servi?o, que n?o apresentaram diferen?as
quanto ? cultura organizacional. Concluo que h? diferen?as significativas na cultura
organizacional entre empresas p?blicas e privadas, que indicam a necessidade de
aten??o por parte dos gestores dessas organiza??es. Assim, nesta compara??o, tr?s
aspectos merecem destaque: a pr?tica de integra??o externa, as pr?ticas de recompensa e
treinamento e o profissionalismo competitivo e individualista.
|
243 |
Transformation of business collaboration in a digital age : Towards a multi-relation perspectiveKhisro, Jwan January 2019 (has links)
The process of digitalisation is progressively transforming the way business is carried out and how enterprises collaborate. In this digital age, characterised by collaborations among a larger community of suppliers, customers, employees, and governments, all partners need to understand avariety of relations and how digitalisation transforms them. However, it is difficult to understand the multitude of unclear or even unknown relations generated by re-coordinating different types of relations in this digital age. Accordingly, this thesis contributes to the understanding of the transformation of business collaboration by exploring how collaboration can be understood in a digital age. The theoretical concepts involved collaboration, enterprise architecture, enterprise interoperability, and boundary object. These concepts enabled digging deeper into the complexity of sharing and aligning social and cultural worlds between communities of practice. The methodology employed was hermeneutics, which was suitable for understanding human activities. The study object concerned national development of data hubs for the electricity market in Denmark and Sweden, which replaced an old way of communicating point to point between companies. This was implemented in order to coordinate and manage data transactions between grid companies and electricity suppliers. The results indicated that digitalisation tends to increase the ability to manage collaboration and even closer relations among partners by clearly identifying every partner role and responsibility. Further, business collaboration appeared to transform from a traditional collaboration to a multi-relation collaboration that addressed digital age demands more comprehensively. / <p>Vid tidpunkten för framläggningen av avhandlingen var följande delarbete opublicerat: delarbete 2 (accepterat).</p><p>At the time of the defence the following paper was unpublished: paper 2 (accepted).</p>
|
244 |
The Interface Between Enterprise Content Management and Records Management in Changing OrganizationsSvärd, Proscovia January 2011 (has links)
The increased demand from citizens for efficient service delivery from public sector organizations has implications for the information that underpins those services. Robust and effective information management is required. Information is looked upon as a resource that can give organizations a competitive edge if it is well leveraged. To address the need for more services and for more efficient service delivery, the Swedish government has promoted e-government initiatives and the two municipalities that are the subjects of this research have responded by engaging in e-service development and provision. e-Government has at its core the use of information and communication technology (ICT). The municipalities have embarked on the analysis and automation of their business processes and hence the use of information systems. Web-based technologies have created a two-way communication flow which has generated complex information for the municipalities to address. This development calls for stronger information and records management regimes. Enterprise Content Management is a new information management construct proposed to help organizations to deal with all their information resources. It promotes enterprise-wide information management. There is, however, little knowledge and understanding of ECM in the Swedish public sector. Further, how e-government developments have affected the management of information is an issue that has not been explored. Traditionally Swedish public authorities have employed records management to address the challenges of managing information. Records management has been used for the effective and systematic capture of records and the maintenance of their reliability and authenticity. While information helps with the daily running of business activities, records carry the evidentiary value of the interactions between the citizens and the municipalities. This research critically examines the interface between Enterprise Content Management (ECM) and records management as information/records management approaches. This has meant examining what the similarities and the differences between the two approaches are. The research instrumentally used the lens of the Records Continuum Model (RCM), which promotes the management of the entire records’ continuum, a proactive approach, combines the management of archives and records and supports the pluralisation of the captured records. The research further highlights the information management challenges that the municipalities are facing as they engage in e-government developments. Keywords: Enterprise Content Management, Records Management, E-government, Long-term Preservation, Business Process Management, Enterprise Architecture. / Centre for Digital Information Management
|
245 |
Assessment of Enterprise Information Security : How to make it Credible and EfficientJohansson, Erik January 2005 (has links)
Information is an important business asset in today’s enterprises. Hence enterprise information security is an important system quality that must be carefully managed. Although enterprise information security is acknowledged as one of the most central areas for enterprise IT management, the topic still lacks adequate support for decision making on top-management level. This composite thesis consists of four articles which presents the Enterprise Information Security Assessment Method (EISAM), a comprehensive method for assessing the current state of the enterprise information security. The method is useful in helping guide top-management’s decision-making because of the following reasons: 1) it is easy to understand, 2) it is prescriptive, 3) it is credible, and 4) it is efficient. The assessment result is easy to understand because it presents a quantitative estimate. The result can be presented as an aggregated single value, abstracting the details of the assessment. The result is easy to grasp and enables comparisons both within the organization and in terms of industry in general. The method is prescriptive since it delivers concrete and traceable measurements. This helps guide top-level management in their decisions regarding enterprise-wide information security by highlighting the areas where improvements efforts are essential. It is credible for two reasons. Firstly, the method presents an explicit and transparent definition of enterprise information security. Secondly, the method in itself includes an indication of assessment uncertainty, expressed in terms of confidence levels. The method is efficient because it focuses on important enterprise information security aspects, and because it takes into account how difficult it is to find security related evidence. Being resource sparse it enables assessments to take place regularly, which gives valuable knowledge for long-term decision-making. The usefulness of the presented method, along with its development, has been verified through empirical studies at a leading electric power company in Europe and through statistical surveys carried out among information security experts in Sweden. The success from this research should encourage further researcher in using these analysis techniques to guide decisions on other enterprise architecture attributes. / QC 20101028
|
246 |
Balancing the Double Bottom Line of Social Enterprise: An Evaluation of the Business Cost Recovery MetricPimento, Taryn 01 January 2011 (has links)
This study examines the utility of the Business Cost Recovery (BCR) metric, a social accounting tool that is used by social purpose enterprises in Toronto Enterprise Funds portfolio to separate their business and social costs. This research builds upon the BCR metric developing definitions for social and business costs and a guide to accompany the metric. The researcher tested the reliability of the metric useing test-retest methods with 20 participants. Three social enterprise experts evaluated the validity of the reliability test.
The reliability test proved statistically significant, indicating that the BCR metric accompanied by the BCR guide can be used consistently. The BCR metric is a practical tool for the field of social accounting because of the relative ease with which it can be used to distinguish between social and business costs. The definitions created for this research can help mitigate ambiguity that exists across the field of social accounting.
|
247 |
Balancing the Double Bottom Line of Social Enterprise: An Evaluation of the Business Cost Recovery MetricPimento, Taryn 01 January 2011 (has links)
This study examines the utility of the Business Cost Recovery (BCR) metric, a social accounting tool that is used by social purpose enterprises in Toronto Enterprise Funds portfolio to separate their business and social costs. This research builds upon the BCR metric developing definitions for social and business costs and a guide to accompany the metric. The researcher tested the reliability of the metric useing test-retest methods with 20 participants. Three social enterprise experts evaluated the validity of the reliability test.
The reliability test proved statistically significant, indicating that the BCR metric accompanied by the BCR guide can be used consistently. The BCR metric is a practical tool for the field of social accounting because of the relative ease with which it can be used to distinguish between social and business costs. The definitions created for this research can help mitigate ambiguity that exists across the field of social accounting.
|
248 |
Modeling and Analysis of Complex Technology Adoption Decisions: An Investigation in the Domain of Mobile ICTBasole, Rahul C. 10 July 2006 (has links)
Mobile information and communication technologies (ICT) promise to significantly transform enterprises, their business processes and services, improve employee productivity, effectiveness, and efficiency, and create new competitive advantages and business agility. Despite the plethora of potential benefits, however, widespread enterprise adoption of mobile ICT has not been as extensive as initially anticipated. Drawing on the extant information systems, technology management, and organizational innovation literature, this dissertation investigates the salient drivers and inhibitors of emerging ICT adoption, in general, and mobile ICT in particular, and develops an integrative ICT adoption decision framework. From this synthesis we identify four broad elements that influence an enterprise s decision to adopt mobile ICT: (1) business value, (2) costs and economics, (3) strategic alignment, and (4) enterprise readiness. The latter decision element has received only little theoretical and practical attention. In order to fill this gap, this dissertation explored the concept of enterprise readiness in further detail and identified eight key dimensions and their associated assessment indicators. Using a two-stage expert study and experimental design approach, we empirically validated these dimensions and determined their relative importance. Results indicated that leadership readiness followed by technology, data and information, and resource readiness, contributed the most to enterprise readiness for mobile ICT. The results are implemented into a web-based readiness diagnostic tool (RDT) that enables decision makers to assess an enterprise s readiness for mobile ICT. The benefits of the RDT are multifold: first, it navigates the decision maker through the complex readiness assessment space; second, it identifies potential organizational deficiencies and provides a means to assess potential sources of risks associated with the adoption and implementation of mobile ICT; and third, it enables decision makers to benchmark their level of readiness against other organizations. The dissertation concludes by highlighting both theoretical and practical implications for emerging and mobile ICT adoption management and suggesting directions for future research.
|
249 |
A Study of Influence of Relative Dominance in Human Resource Management of Dispatched Enterprises and User Enterprises on Dispatched Workers¡¦ Cognition of Employer LiabilityLi, Ching-chiu 12 August 2010 (has links)
This study investigates influence of relative dominance in human resource management (HRM) of dispatched enterprises and user enterprises on dispatched worker¡¦s cognition of employer liability. Hopefully, this study could serve as basis for management in dispatched enterprise and user enterprises.Questionnaires were administered to Taiwanese dispatched workers to study relationships among and influence of individual variables (as control variable), HRM in user enterprises and dispatched enterprises (recruitment, training, compensation and benefits and performance appraisal as independent variable) and employees¡¦ cognition of employer liability (as dependent variable).
Results show that relative dominance in HRM of user enterprises and dispatched enterprises dictate employees¡¦ cognition of employer liability. Dispatched workers have higher cognition of employer liability for dispatched firms when dispatched enterprises are of high dominance in HRM. On the other hand, dispatched workers have higher cognition of employer liability for user enterprises when user enterprises are of high dominance in HRM. In addition to relative dominance in HRM, positions that dispatched workers occupy also significantly influence cognition of employer liability: dispatched workers who hold professional jobs have higher cognition of employer liability toward dispatched enterprises.
|
250 |
Study on Architecture-Oriented Information Security Management ModelTsai, Chiang-nan 07 January 2009 (has links)
Information security, sometimes referred as enterprise security, plays a very important and professional role in the enterprises. Therefore, information security management is getting more and more popularity among the enterprises in recent years. Several aspects on information, such as technical documents, research and development plans, product quotations, are considered as core assets in one company. How to effectively manage and realize an information security system has become a key for a company¡¦s survival.
The international information security management standard, ISO 27001:2005, which includes personnel security, technology security, physical security and management security has been promulgated. When bringing in an information security management system, a company usually embraces the process-oriented approach which treats the system¡¦s structure view and behavior view separately. Separating structure view from behavior view during the planning phase may cause many difficulties, such as uneven distribution of resources, poor safety performance, bad risk management, poor system management and so on, when working on the later realization and verification phase of the information security management system¡¦s construction.
Up to date, there is no enterprise architecture theory for information security management system. This research utilizes architecture-oriented modeling methodology so that structure view and behavior view are coalesced when decomposing the information security management system to obtain structural elements and behaviors deriving from interactions among these structure elements. By adopting structure behavior coalescence, abbreviated as SBC, which includes ¡§architecture hierarchy diagram", "structure element diagram", "structure element service diagram", "structure element connection diagram", "structure behavior coalescence diagram", and "interactive flow diagram", this research constructs a complete architecture-oriented information security management model, abbreviated as AOISMM. This research is the first study using architecture-oriented approach to construct the information security management system. Also, AOISMM solves many difficulties caused by the process-oriented approach when constructing information security management systems. These are the contributions of this research.
|
Page generated in 0.0675 seconds