Spelling suggestions: "subject:"canprocess model"" "subject:"canprocess godel""
11 |
Work wellness, absenteeism and productivity in a call centre in the insurance industry / Adèle van WykVan Wyk, Adèle January 2008 (has links)
Thesis (M.Comm. (Industrial Psychology))--North-West University, Potchefstroom Campus, 2008.
|
12 |
Testing emotion dysregulation as a moderator in an interpersonal process model of intimacy in couplesHerrington, Rachael 15 May 2009 (has links)
Although theorists, researchers, and therapists alike emphasize emotional
intimacy as an important aspect of a couple’s relationship, empirical data to understand
the underlying processes behind this concept are lacking. The purpose of this study is to
examine Reis and Shaver’s interpersonal process model of intimacy in a community
sample of couples and to contribute to the current understanding of constructs that may
moderate the process of intimacy. Reis and Shaver’s model suggests that vulnerable
self-disclosure by one partner, coupled with empathic responding by the other partner,
results in greater subjective emotional intimacy. Previous studies have examined this
interpersonal process model in a sample of community couples in committed romantic
relationships. The present study aims to contribute to the extant literature by testing
emotion dysregulation as a potential moderator in Reis and Shaver’s interpersonal
process model of intimacy. Multilevel modeling was used to analyze data from 108
community couples. Couples completed measures and were asked to participate in
videotaped interactions in which each partner discussed a time that someone other than
the partner hurt their feelings (low threat condition) and a time the partner hurt their feelings (high threat condition). For each interaction, partners were assigned to a
designated role (speaker or listener). Results lend support to Reis and Shaver’s
interpersonal process model of intimacy suggesting that both vulnerable self-disclosure
and empathic responding by the partner are key components to one’s subjective
experience of emotional intimacy. Results also lend support to the idea that emotion
dysregulation moderates the relation between self-disclosure, empathic responding, and
resulting post-interaction intimacy; however, when measuring how emotion
dysregulation affects post-interaction intimacy within this study, results varied based on
whose intimacy was being measured (speaker or listener) and based on the condition
(low or high threat.) Clinical implications as well as directions for future research were
discussed.
|
13 |
Security Analysis and Improvement Model for Web-based ApplicationsWang, Yong 14 January 2010 (has links)
Today the web has become a major conduit for information. As the World Wide
Web?s popularity continues to increase, information security on the web has become an
increasing concern. Web information security is related to availability, confidentiality,
and data integrity. According to the reports from http://www.securityfocus.com in May
2006, operating systems account for 9% vulnerability, web-based software systems
account for 61% vulnerability, and other applications account for 30% vulnerability.
In this dissertation, I present a security analysis model using the Markov Process
Model. Risk analysis is conducted using fuzzy logic method and information entropy
theory. In a web-based application system, security risk is most related to the current
states in software systems and hardware systems, and independent of web application
system states in the past. Therefore, the web-based applications can be approximately
modeled by the Markov Process Model. The web-based applications can be conceptually
expressed in the discrete states of (web_client_good; web_server_good,
web_server_vulnerable, web_server_attacked, web_server_security_failed; database_server_good, database_server_vulnerable, database_server_attacked,
database_server_security_failed) as state space in the Markov Chain. The vulnerable
behavior and system response in the web-based applications are analyzed in this
dissertation. The analyses focus on functional availability-related aspects: the probability
of reaching a particular security failed state and the mean time to the security failure of a
system. Vulnerability risk index is classified in three levels as an indicator of the level of
security (low level, high level, and failed level). An illustrative application example is
provided. As the second objective of this dissertation, I propose a security improvement
model for the web-based applications using the GeoIP services in the formal methods. In
the security improvement model, web access is authenticated in role-based access control
using user logins, remote IP addresses, and physical locations as subject credentials to
combine with the requested objects and privilege modes. Access control algorithms are
developed for subjects, objects, and access privileges. A secure implementation
architecture is presented. In summary, the dissertation has developed security analysis
and improvement model for the web-based application. Future work will address Markov
Process Model validation when security data collection becomes easy. Security
improvement model will be evaluated in performance aspect.
|
14 |
METAPHOR, COGNITIVE ELABORATION AND PERSUASIONSarnoff, Tamar Jill January 2009 (has links)
Metaphors have long been a subject of interest to philosophers, scholars and researchers. Recent insights into the nature and function of metaphor have spurred new interest in the persuasive effects of metaphor. To date, research on the relation between metaphors and attitudes has produced mixed findings. This paper argues that there are several limitations in previous models and designs and this work attempted to resolve several of them. The rationale for the study is based on the Elaboration Likelihood Model (ELM) of persuasion, which argues that cognitive elaboration is a strong predictor of attitudes. Researchers have posited that metaphors should evoke more cognitive elaboration than literal counterparts. This paper reports the results of a study that tested the relationship between metaphors, cognitive elaboration, and attitudes. Participants were exposed to one of 72 message conditions and responded to a set of psychological and attitude scales. Many of the hypotheses were not supported, including tests of the amount of cognitive effort that subjects reported and results related to attitude change by metaphor type. Results indicated that attitudes were stable across time, which is consistent with the ELM.
|
15 |
Work wellness, absenteeism and productivity in a call centre in the insurance industry / Adèle van WykVan Wyk, Adèle January 2008 (has links)
Thesis (M.Comm. (Industrial Psychology))--North-West University, Potchefstroom Campus, 2008.
|
16 |
Work wellness, absenteeism and productivity in a call centre in the insurance industry / Adèle van WykVan Wyk, Adèle January 2008 (has links)
Thesis (M.Comm. (Industrial Psychology))--North-West University, Potchefstroom Campus, 2008.
|
17 |
Logistics technology transfer modelAl Hajri, Abdullah Said, Mechanical & Manufacturing Engineering, Faculty of Engineering, UNSW January 2008 (has links)
A consecutive number of studies on the adoption trend of logistics technology since 1988 revealed that logistics organizations are not in the frontier when it comes to adopting new technology and this delayed adoption creates an information gap. In the advent of supply chain management and the strategic position of logistics, the need for accurate and timely information to accompany the logistics executives became more important than ever before. Given the integrative nature of logistics technology, failure to implement the technology successfully could result in writing off major investments in developing and implementing the technology or even in abandoning the strategic initiatives underpinned by these innovations. Consequently, the need to employ effective strategies and models to cope with these uncertainties is rather crucial. This thesis addresses the aspect of uncertainty in implementation success by process and factor research models. Process research approach focuses on the sequence of events in the technology transfer process that occurs over time. It explains the story that explains the degree of association between these sequences and implementation success. Through content analysis, this research gathers, extracts, and categorizes process data of actual stories of logistics technology adoption and implementations in organizations that are published in literature. The extracted event sequences are then analyzed using optimal matching from natural science and grouped using cluster analysis. Four patterns were revealed that organizations follow to transfer logistics technology namely, formal minimalist, mutual adaptation, development concerned, and organizational roles dispenser. Factors that contribute to successful implementation in each pattern were defined as the crucial and necessary events that characterized and differentiated each pattern from others. The factor approach identifies the potential predictors of successful technology implementation and tests empirical association between predictors and outcomes. This research develops a logistics technology success model. In developing the model, various streams of research were investigated including logistics, information systems, and organizational psychology. The model is tested using a questionnaire survey study. The data were collected from Australian companies which have recently adopted and implemented logistics technology. The results of a partial least squares structured equation modeling provide strong support for the model constructs and valuable insights to logistics/supply chain managers. The last study reports a convergent triangulation study using multiple case study of three Australian companies which have implemented logistics technology. A within and a cross case analysis of the three cases provide cross validation for the results of the other two studies. The results provided high predictive validity for the two models. Furthermore, the case study approach was so beneficial in explaining and contextualizing the linkages of the factor-based model and in confirming the importance of the crucial events in the process-based model. The thesis concludes with a research and managerial implications chapter which is devoted for logistics/supply chain managers and researchers.
|
18 |
Working on a dream: sustainable organisational change in SMEs using the example of the Austrian wine industryHatak, Isabella, Floh, Arne, Zauner, Alexander 30 December 2014 (has links) (PDF)
Driving sustainable development through new products, services, techniques and organisational modes that substantially reduce environmental impacts, or ecopreneurship, is especially important for small and medium-sized enterprises (SMEs) as they have a vital role to play in managing limited environmental and social resources. Reaping the benefits associated with ecopreneurship, however, requires a fundamental qualitative change process at the firm level. However, there remains
considerable uncertainty as to how ecopreneurs will discover, develop and realise sustainabilityrelated
opportunities in their organisations. Thus, the purpose of this article is to address this gap by analysing how this qualitative change process associated with a shift to sustainable development actually unfolds in SMEs. To do so it examines small and medium-sized wineries in Austria. Based on the results of a Delphi study, a multi-layer process model that differentiates between unfreezing,
changing and refreezing processes is developed. The framework shows that the unfreezing of the status quo is mainly accomplished by the business owner's attitude towards sustainability. In the course of the changing process, change related to the adoption of greener business practices follows a hierarchical order, starting with business activity (the first layer). Then, four dimensions of capital resources (the second layer) must be revised in order to implement the change successfully. After that,
relevant stakeholders (the third layer) must be integrated into this iterative learning process. Finally, in the course of refreezing, change is embedded in the organisation by the ongoing commitment of the business owner and future sustainable expansion strategies. The developed framework may serve as a guideline for small and medium-sized wineries, but also for a broader set of SMEs implementing sustainable organisational change in the future. The framework could also be used by national governments or certification authorities uncertain of how best to support the change process in SMEs. (authors' abstract)
|
19 |
Propagating Changes between Aligned Process ModelsWeidlich, Matthias, Mendling, Jan, Weske, Mathias 28 February 2012 (has links) (PDF)
There is a wide variety of drivers for business process modelling initiatives, reaching from organisational redesign to the development of information systems. Consequently, a common business process is often captured in multiple models that overlap in content due to serving different purposes. Business process management aims at exible adaptation to changing business needs. Hence, changes of business processes occur frequently and have to be incorporated in the respective process models. Once a process model is changed, related process models have to be updated accordingly, despite the fact that those process models may only be loosely coupled. In this article, we introduce an approach that supports change propagation between related process models. Given a change in one process model, we leverage the behavioural
abstraction of behavioural profiles for corresponding activities in order to determine a change region in another model. Our approach is able to cope with changes in pairs of models that are not related by hierarchical refinement and show behavioural inconsistencies. We evaluate the applicability of our approach with two real-world process model collections. To this end, we either deduce change operations from different model revisions or rely on synthetic change operations.
|
20 |
Supporting Process Model Validation through Natural Language GenerationLeopold, Henrik, Mendling, Jan, Polyvyanyy, Artem 29 May 2014 (has links) (PDF)
The design and development of process-aware information systems is often supported by specifying requirements
as business process models. Although this approach is generally accepted as an effective strategy, it remains a fundamental
challenge to adequately validate these models given the diverging skill set of domain experts and system analysts. As domain
experts often do not feel confident in judging the correctness and completeness of process models that system analysts create, the
validation often has to regress to a discourse using natural language. In order to support such a discourse appropriately, so-called
verbalization techniques have been defined for different types of conceptual models. However, there is currently no sophisticated
technique available that is capable of generating natural-looking text from process models. In this paper, we address this research
gap and propose a technique for generating natural language texts from business process models. A comparison with manually
created process descriptions demonstrates that the generated texts are superior in terms of completeness, structure, and linguistic
complexity. An evaluation with users further demonstrates that the texts are very understandable and effectively allow the reader
to infer the process model semantics. Hence, the generated texts represent a useful input for process model validation.
|
Page generated in 0.0606 seconds