9,739 research outputs found

    Human resource management implications of new forms of organizing

    Get PDF
    Adopting a process view, we explore the personnel (HRM) implications of new forms of organizing (NFOs). We review the characteristics of NFOs and explain how they require a renewed HRM approach. We illustrate the HRM approach with preliminary results from a European comparative study, and comment on the challenges ahead.Human resource management;

    Listening between the Lines: Learning Personal Attributes from Conversations

    Full text link
    Open-domain dialogue agents must be able to converse about many topics while incorporating knowledge about the user into the conversation. In this work we address the acquisition of such knowledge, for personalization in downstream Web applications, by extracting personal attributes from conversations. This problem is more challenging than the established task of information extraction from scientific publications or Wikipedia articles, because dialogues often give merely implicit cues about the speaker. We propose methods for inferring personal attributes, such as profession, age or family status, from conversations using deep learning. Specifically, we propose several Hidden Attribute Models, which are neural networks leveraging attention mechanisms and embeddings. Our methods are trained on a per-predicate basis to output rankings of object values for a given subject-predicate combination (e.g., ranking the doctor and nurse professions high when speakers talk about patients, emergency rooms, etc). Experiments with various conversational texts including Reddit discussions, movie scripts and a collection of crowdsourced personal dialogues demonstrate the viability of our methods and their superior performance compared to state-of-the-art baselines.Comment: published in WWW'1

    A Multidiscipline Approach to Mitigating the Insider Threat

    Get PDF
    Preventing and detecting the malicious insider is an inherently difficult problem that expands across many areas of expertise such as social, behavioral and technical disciplines. Unfortunately, current methodologies to combat the insider threat have had limited success primarily because techniques have focused on these areas in isolation. The technology community is searching for technical solutions such as anomaly detection systems, data mining and honeypots. The law enforcement and counterintelligence communities, however, have tended to focus on human behavioral characteristics to identify suspicious activities. These independent methods have limited effectiveness because of the unique dynamics associated with the insider threat. The solution requires a multidisciplinary approach with a clearly defined methodology that attacks the problem in an organized and consistent manner. The purpose of this paper is to present a framework that provides a systematic way to identify the malicious insider and describe a methodology to counter the threat. Our model, the Multidiscipline Approach to Mitigating the Insider Threat (MAMIT), introduces a novel process for addressing this challenge. MAMIT focuses on the collaboration of information from the relative disciplines and uses indicators to produce a consolidated matrix demonstrating the likelihood of an individual being a malicious insider. The well-known espionage case study involving Robert Hanssen is used to illustrate the effectiveness of the framework

    The Ghost Of Herzberg Motivational Theory: Motivators And Demotivators

    Get PDF
    Managers tend to sense, that many employees could do more. The question is: What can we do to influence them to contribute more than job description reguqires? Herzberg answer it, but his Two-Factor Theory has not received strong support in the literature. Accordingly, the basic objective of this scientific debate is to examine the relevance Herzberg motivation theory in terms of the new work economy. Scientific research methods applied in confirming the working hypothesis about the ghost of Herbzerg motivation theory based on scientific methods of analysis and synthesis, methods of descriptive statistics, method of mathematical modeling and method of mathematicalprogramming. The resulting findings suggest that any manager should not ignore its recommendations

    Outsourcing Information Technology and the Insider Threat

    Get PDF
    As one of our nation\u27s top critical infrastructures, telecommunications is an essential element of many aspects of our lives upon which we, as a society, are becoming increasingly dependent. Computers, digital telephone switches, and interconnected information technology (IT) systems impact finances, travel, infrastructure management, and missions of national defense. This research examined whether the trend in increased outsourcing of information technology systems is a significant contributing factor to a reportedly increasing amount of insider attacks. In light of changing social, global economic, and technological conditions, the paradigm in which risk analysis, management practices, and operational and personnel security practices are applied to protect information has shifted over the last decade. A comprehensive model of the discursive nature of the insider threat in the outsourced IT environment was developed using a qualitative grounded theory approach put forth by Glaser and Strauss in 1967. The theory generated by this research suggests a multidimensional real and growing threat resulting from outsourced IT as well as preconditions for continued future growth of the insider threat phenomenon

    Achieving Excellence through Memorable Traveler Experience and Challenges,Opportunities and Solutions for Romanian Travel and Hospitality Industry

    Get PDF
    Hospitality industry is probably the fastest growing one in the world. The tourism company should endeavour to shape the overall perception of value in this industry. What matters is the provision of experiences, but not services. To meet international standards the Romanian tourism should consider challenges, opportunities and solutions to cope with the specific requirements in this field.Hausehold Behaviour; Sustenable Development; Regional Development Policy; Tourism

    Factors Influencing Safety Behavior in the Malaysian Army

    Get PDF
    Much attention has been focused on workers’ perception of workplace safety. However, relatively limited studies focus on Malaysian Armed Forces particularly the Malaysia Army. This organization experiences a significant accident rates which are not reported publicly or contributed into the SOCSO statistics. Improving occupational health and safety in the Army organization is not an easy task despite adequate safety legislation and regulative institutions. It is because the Armed Forces are not obliged to the OSHA 1994 (Act 514). This framework is a replication of Shang et.al (2009) which examined the effects of safety climate on container operation terminal employees’ perceptions of safety performance. However, the technique used to determine the perception and compliance with safety behavior among army personnel in the Malaysian Army organization is by using the Work Safety Scale (WSS) of Hayes et al.(1988). The purpose of this study is to examine whether the five critical factors of safety culture dimensions related to the safety behavior of the Malaysian Army personnel. The WSS measures five factorially distinct constructs: (a) job safety, (b) coworker safety, (c) supervisor safety, (d) management safety practices, and (e) satisfaction with the safety program. All those independent variables were measured on the perception of workplace safety towards the compliance of safety behavior as the determinants among 217 army personnel in one army unit based in Kem Terendak, Melaka. Based on the analysis there was a positive relationship between these five facets and safety behavior. It was found that satisfaction with safety programs, co-worker safety and management safety practices each made significant contributions to compliance with safety behavior, whilst job safety and supervisor safety made least contributions in the study. Results also suggest that management can enhance and refine the Army units’ safety culture by focusing especially on the variables mentioned thereby increasing and strengthening safety culture and soldiers’ safety behavior thereby reducing injuries and accident

    Spartan Daily, December 7, 1948

    Get PDF
    Volume 37, Issue 47https://scholarworks.sjsu.edu/spartandaily/11160/thumbnail.jp
    • 

    corecore