60,326 research outputs found

    Capability and responsibility balancing in online social search

    Get PDF
    Online social search (OSS) brings forth a new way to harness the Internet for answers. In this paper, we study the balancing between OSS users' capabilities and responsibilities. Targeting a practical system design, we propose an analytical model that captures the heterogeneity of different referral sessions in OSS, and a distributed socio-aware referral strategy that can achieve the desired balance when the system reaches steady state. We show that configuring the strategy enables the system operator to control the flow of all posed questions in the system. We also discuss the implications of configuring the strategy from a gaming-strategy point of view. ©2010 IEEE.published_or_final_versionThe IEEE Conference and Exhibition on Global Telecommunications Conference (GLOBECOM 2010), Miami, FL., 6-10 December 2010. In Proceedings of GLOBECOM, 2010, p. 1-

    Practices for strategic capacity management in Malaysian manufacturing firms

    Get PDF
    While the notion of manufacturing capabilities is a long-standing notion in research on operations management, its actual implementation and management has been hardly researched. Five case studies in Malaysia offered the opportunity to examine the practice of manufacturing managers with regard to strategic capability management. The data collection and analysis was structured by using the notion of Strategic Capacity Management. Whereas traditionally literature has demonstrated the beneficial impact of an appropriate manufacturing strategy on the business strategy and performance, the study highlights the difficulty of managers to set the strategy, let alone implementing it. This is partly caused by the immense pressure of customers in these dominantly Make-To-Order environments for SMEs. Current concepts for manufacturing capabilities have insufficiently accounted this phenomenon and an outline of a research agenda is presented

    Introducing conflict as the microfoundation of organizational ambidexterity

    Get PDF
    This article contributes to our understanding of organizational ambidexterity by introducing conflict as its microfoundation. Existing research distinguishes between three approaches to how organizations can be ambidextrous, that is, engage in both exploitation and exploration. They may sequentially shift the strategic focus of the organization over time, they may establish structural arrangements enabling the simultaneous pursuit of being both exploitative and explorative, or they may provide a supportive organizational context for ambidextrous behavior. However, we know little about how exactly ambidexterity is accomplished and managed. We argue that ambidexterity is a dynamic and conflict-laden phenomenon, and we locate conflict at the level of individuals, units, and organizations. We develop the argument that conflicts in social interaction serve as the microfoundation to organizing ambidexterity, but that their function and type vary across the different approaches toward ambidexterity. The perspective developed in this article opens up promising research avenues to examine how organizations purposefully manage ambidexterity

    Providing a law degree for the real world : perspective of an Australian law school

    Get PDF
    As a result of a two year curriculum review, QUT’s undergraduate law degree has a focus on first year student transition, integration of law graduate capabilities throughout the degree and work integrated learning. A ‘whole-degree’ approach was adopted to ensure that capabilities were appropriately embedded and scaffolded throughout the degree, that teaching and learning approaches met the needs of students as they transitioned from first year through to final year, and that students in final year were provided with a capstone experience to assist them with transition into the work place. The revised degree commenced implementation in 2009. This paper focuses on the ‘real world’ approach to the degree achieved through the first year program, embedding and scaffolding law graduate capabilities through authentic and valid assessment and work integrated learning to assist graduates with transition into the workplace

    Access to information: Challenges and opportunities for the records profession

    Get PDF

    PRECEPT:a framework for ethical digital forensics investigations

    Get PDF
    Purpose: Cyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics has become far more sophisticated over the years and is now able to uncover even more evidence that can be used to support prosecution of cyber criminals in a court of law. Governments, too, have embraced the ability to track suspicious individuals in the online world. Forensics investigators are driven to gather data exhaustively, being under pressure to provide law enforcement with sufficient evidence to secure a conviction. Yet, there are concerns about the ethics and justice of untrammeled investigations on a number of levels. On an organizational level, unconstrained investigations could interfere with, and damage, the organization’s right to control the disclosure of their intellectual capital. On an individual level, those being investigated could easily have their legal privacy rights violated by forensics investigations. On a societal level, there might be a sense of injustice at the perceived inequality of current practice in this domain. This paper argues the need for a practical, ethically-grounded approach to digital forensic investigations, one that acknowledges and respects the privacy rights of individuals and the intellectual capital disclosure rights of organisations, as well as acknowledging the needs of law enforcement. We derive a set of ethical guidelines, then map these onto a forensics investigation framework. We subjected the framework to expert review in two stages, refining the framework after each stage. We conclude by proposing the refined ethically-grounded digital forensics investigation framework. Our treatise is primarily UK based, but the concepts presented here have international relevance and applicability.Design methodology: In this paper, the lens of justice theory is used to explore the tension that exists between the needs of digital forensic investigations into cybercrimes on the one hand, and, on the other, individuals’ rights to privacy and organizations’ rights to control intellectual capital disclosure.Findings: The investigation revealed a potential inequality between the practices of digital forensics investigators and the rights of other stakeholders. That being so, the need for a more ethically-informed approach to digital forensics investigations, as a remedy, is highlighted, and a framework proposed to provide this.Practical Implications: Our proposed ethically-informed framework for guiding digital forensics investigations suggest a way of re-establishing the equality of the stakeholders in this arena, and ensuring that the potential for a sense of injustice is reduced.Originality/value: Justice theory is used to highlight the difficulties in squaring the circle between the rights and expectations of all stakeholders in the digital forensics arena. The outcome is the forensics investigation guideline, PRECEpt: Privacy-Respecting EthiCal framEwork, which provides the basis for a re-aligning of the balance between the requirements and expectations of digital forensic investigators on the one hand, and individual and organizational expectations and rights, on the other
    • 

    corecore