• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 5
  • 5
  • 5
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Die Relevanz der High Reliability Theory für Hochleistungssysteme : Diskussionspapier

Mistele, Peter 04 November 2005 (has links) (PDF)
Organisationen wie Feuerwehren, med. Rettungsdienste oder Spezialeinheiten der Polizei zeigen auch in Situationen, die durch Unsicherheit, unvollständige Informationen oder eine sehr hohe Dynamik gekennzeichnet sind, eine effiziente und effektive Leistungsfähigkeit. Sie können deswegen als Hochleistungssysteme (HLS) bezeichnet werden. Im vorliegenden Artikel wird dargestellt wie sich Erkenntnisse der High Reliabilty Theory auf die Untersuchung von Hochleistungssystemen auswirken und welche Gemeinsamkeiten und Parallelen bestehen. Dabei wird insbesondere ein Schwerpunkt auf die Thematik des Lernens gelegt.
2

Mitigating supply chain disruptions: essays on lean management, interactive complexity, and tight coupling

Marley, Kathryn Ann 20 September 2006 (has links)
No description available.
3

Die Relevanz der High Reliability Theory für Hochleistungssysteme : Diskussionspapier

Mistele, Peter 04 November 2005 (has links)
Organisationen wie Feuerwehren, med. Rettungsdienste oder Spezialeinheiten der Polizei zeigen auch in Situationen, die durch Unsicherheit, unvollständige Informationen oder eine sehr hohe Dynamik gekennzeichnet sind, eine effiziente und effektive Leistungsfähigkeit. Sie können deswegen als Hochleistungssysteme (HLS) bezeichnet werden. Im vorliegenden Artikel wird dargestellt wie sich Erkenntnisse der High Reliabilty Theory auf die Untersuchung von Hochleistungssystemen auswirken und welche Gemeinsamkeiten und Parallelen bestehen. Dabei wird insbesondere ein Schwerpunkt auf die Thematik des Lernens gelegt.
4

Unexpected Events in Nigerian Construction Projects: A Case of Four Construction Companies

Pidomson, Gabriel Baritulem 01 January 2016 (has links)
In Nigeria, 50% to 70% of construction projects are delayed due to unexpected events that are linked to lapses in performance, near misses, and surprises. While researchers have theorized on the impact of mindfulness and information systems management (ISM) on unexpected events, information is lacking on how project teams can combine ISM and mindfulness in response to unexpected events in construction projects. The purpose of this case study was to examine how project teams can combine mindfulness with ISM in response to unexpected events during the execution phase of Nigerian construction projects. The framework of High Reliability Theory revealed that unexpected events could be minimized by mindfulness defined by 5 cognitive processes: preoccupation with failure, reluctance to simplify, sensitivity to operations, commitment to resilience, and deference to expertise. In-depth semi-structured interviews elicited the views of 24 project experts on team behaviors, tactics, and processes for combining mindfulness with ISM. Data analysis was conducted by open coding to identify and reduce data into themes, and axial coding was used to identify and isolate categories. Findings were that project teams could combine mindfulness with ISM in response to unexpected events by integrating effective risk, team, and communication management with appropriate training and technology infrastructure. If policymakers, project clients, and practitioners adopt practices suggested in this study, the implications for social change are that project management practices, organizational learning, and the performance of construction projects may improve, construction wastes may be reduced, and taxpayers may derive optimum benefits from public funds committed to construction projects.
5

Cyberepidemiologi : Hur kan utbrottsdetektion inom folkhälsa hjälpa IT-incidentsövervakning?

Richter, Andreas January 2018 (has links)
This study aims to shed light on what a comparison between cybersecurity intelligence and public health surveillance systems can yield in practical improvements. The issue at hand is best described by the amount of threats both systems must detect. Intelligent malicious software, malware, designed by humans to spread and reap havoc in the abundance of unprotected networks worldwide and contagious diseases with millions of years of evolution behind their design to bypass human defences, infect and multiply. These two threats stand as mighty competitors to actors who try to monitor their presence to be able to give advice on further action to hinder their spread. The sheer amount of experience in public health of dealing with surveillance of contagious disease can contribute with important lessons to cyber intelligence when malware is becoming an even more alarming threat against everybody who uses the Internet. To compare them both this study uses high reliability theory to understand how Folkhälsomyndigheten, Sweden’s main authority in public health surveillance, and CERT-SE, Sweden’s national computer emergency response team, operate to make their surveillance as reliable as possible to detect emerging threats. Some key findings of the study points to the lack of regional or global binding policy’s to share information in the cyber security sector of which CERT-SE takes part in. The major roll of trust-based information sharing can be subject to shifts in relationships between states and excludes states with which no bilateral arrangements are made, but who may possess information of urgent necessity. The lack of arrangements in the cybersecurity sector, correspondent to the International health regulations by World Health Organization in public health, stands as a major difference between the two sectors access to information. However, this study may not stretch as far as to prove that the greater access to information would have proved to be of ease in a specific cyberincident. Case studies of this kind or further research of how agreements can be made in an anarchistic domain like the Internet are to be continued from this study.

Page generated in 0.0794 seconds