47,479 research outputs found

    Adapted Loss Database – A New Approach to Assess IT Risk in Automated Business Processes

    Get PDF
    Service-oriented architectures (SOA) provide companies with dynamic IT infrastructures to adapt business processes flexibly to new requirements. However, the success of SOA will also depend on the ability to manage risk resulting from frequent and context-specific changes of IT support for automated business processes. Assessing this IT risk is challenging, since frequently changing relations between the causes of risk and their effects on business processes turns established methods for assessing risk into a game of hazard. Following a design science approach, this contribution proposes a novel approach for taking changes of cause-effect relations into consideration. Based on a backward-directed recalculation of historical loss data, a risk-adjusted loss database is generated that can provide a more realistic basis for assessing IT risk

    Criticality analysis for improving maintenance, felling and pruning cycles in power lines

    Get PDF
    16th IFAC Symposium on Information Control Problems in Manufacturing INCOM 2018 Bergamo, Italy, 11–13 June 2018. Edited by Marco Macchi, László Monostori, Roberto PintoThis paper deals with the process of criticality analysis in overhead power lines, as a tool to improve maintenance, felling & pruning programs. Felling & pruning activities are tasks that utility companies must accomplish to respect the servitudes of the overhead lines, concerned with distances to vegetation, buildings, infrastructures and other networks crossings. Conceptually, these power lines servitudes can be considered as failure modes of the maintainable items under our analysis (power line spans), and the criticality analysis methodology developed, will therefore help to optimize actions to avoid these as other failure modes of the line maintainable items. The approach is interesting, but another relevant contribution of the paper is the process followed for the automation of the analysis. Automation is possible by utilizing existing companies IT systems and databases. The paper explains how to use data located in Enterprise Assets Management Systems, GIS and Dispatching systems for a fast, reliable, objective and dynamic criticality analysis. Promising results are included and also discussions about how this technique may result in important implications for this type of businesse

    Management information systems in social safety net programs : a look at accountability and control mechanisms

    Get PDF
    This paper is intended to provide task managers and World Bank Group clients working on Social Safety Net (SSN) programs with practical and systematic ways to use information management practices to mitigate risks by strengthening control and accountability mechanisms. It lays out practices and options to consider in the design and implementation of the Management Information System (MIS), and how to evaluate and mitigate operational risks originating from running a MIS. The findings of the paper are based on the review of several Conditional Cash Transfer (CCT) programs in the Latin American Region and various World Bank publications on CCTs. The paper presents a framework for the implementation of MIS and cross-cutting information management systems that is based on industry standards and information management practices. This framework can be applied both to programs that make use of information and communications technology (ICT) and programs that are paper based. It includes examples of MIS practices that can strengthen control and accountability mechanisms of SSN programs, and presents a roadmap for the design and implementation of an MIS in these programs. The application of the framework is illustrated through case studies from three fictitious countries. The paper concludes with some considerations and recommendations for task managers and government officials in charge of implementing CCTs and other safety nets program, and with a checklist for the implementation and monitoring of MIS.E-Business,Technology Industry,Education for Development (superceded),Labor Policies,Knowledge Economy

    JISC Preservation of Web Resources (PoWR) Handbook

    Get PDF
    Handbook of Web Preservation produced by the JISC-PoWR project which ran from April to November 2008. The handbook specifically addresses digital preservation issues that are relevant to the UK HE/FE web management community”. The project was undertaken jointly by UKOLN at the University of Bath and ULCC Digital Archives department

    Managing Operational Risk in Payment, Clearing, and Settlement Systems

    Get PDF
    Awareness of operational risk has increased greatly in recent years, both at individual financial institutions and for payment, clearing, and settlement systems (PCSS). PCSS consist of networks of interconnected elements (i.e., central operators, participants, and settlement agents); operational problems at any one of the key elements have the potential to disrupt the system as a whole and negatively affect financial stability. The author describes the key features of systemically important PCSS in Canada and the oversight role of the Bank of Canada with respect to those systems. She also describes one approach that could be used to assess and manage operational risk in Canadian PCSS. This approach relies on a consistent definition of operational risk that can be applied across all elements of a PCSS. It uses a recent methodology adapted from the management of operational risk at individual financial institutions. This methodology, called the loss-distribution approach, assesses risk in terms of the potential outcomes of operational events owing to certain risk factors (such as systems problems, human error, process problems, and external events), their likelihood, and their frequency. Once operational risk databases are developed that record the frequency and severity of operational events, it will be possible to estimate parts of the loss distributions for PCSS. In the meantime, qualitative analysis provided by operations experts associated with the various elements of PCSS will be important for judging the potential impact and frequency of events. In a changing financial environment, it is hoped that this methodology could be used to supplement core aspects of operational risk management, such as sound corporate governance, internal controls, policies and procedures, knowledgeable people, and robust contingency plans.Financial institutions; Payments, clearing and settlements systems

    A Risk Management Process for Consumers

    Get PDF
    Simply by using information technology, consumers expose themselves to considerable security risks. Because no technical or legal solutions are readily available, the only remedy is to develop a risk management process for consumers, similar to the process executed by enterprises. Consumers need to consider the risks in a structured way, and take action, not once, but iteratively. Such a process is feasible: enterprises already execute such processes, and time-saving tools can support the consumer in her own process. In fact, given our society's emphasis on individual responsibilities, skills and devices, a risk management process for consumers is the logical next step in improving information security

    Committed to Safety: Ten Case Studies on Reducing Harm to Patients

    Get PDF
    Presents case studies of healthcare organizations, clinical teams, and learning collaborations to illustrate successful innovations for improving patient safety nationwide. Includes actions taken, results achieved, lessons learned, and recommendations

    A Critical Investigation into Identifying Key Focus Areas for the Implementation of Blockchain Technology in the Mining Industry

    Get PDF
    Thesis (PhD)--University of Pretoria, 2023.The value of digital information is ever-increasing as more companies utilize digital technologies such as Artificial Intelligence (AI) and the Internet of Things (IoT) to gain deeper insight into their business operations and drive productivity gains. It is therefore important to safeguard and ensure the integrity of digital information exchange. Blockchain technology (BCT) was identified as potentially providing the mining industry with a trusted system for securely exchanging digital value. However, there is little evidence or understanding of how/where BCT can be implemented and what benefits the industry could obtain. This research study provides a fundamental understanding of what the technology is in order to identify the associated capabilities and potential application benefits for the mining industry. From a technology push perspective, blockchain capabilities are used to evaluate how the technology’s value drivers map to the mining industries core value chain processes. This was done to identify potential focus areas within the mining enterprise for further research and development of blockchain applications.ARMMining EngineeringMEngUnrestricte
    • …
    corecore