9 research outputs found
Industrial Relationship Between Worker, Entrepreneur and Government On the Outsourcing Program in PT. Aru Raharja Indonesia
This study aims to determine whether the Industrial Relationship Between Worker, Entrepreneur and Government at PT. Aru Raharja Indonesia has achieved its goal.
This research method used an evaluative descriptive method. The object of the research was focused on the Industrial relationship between worker, entrepreneur and government
On the outsourcing program of PT. Aru Raharja Indonesia
Data is collected through observatied, documentation studied, and indepth interview. Data analysis used descriptive evaluative techniques, through four stages, namely: data collection, data reduction, data display and conclusion drawing/verification.
The results of the studied found that industrial relationship at the outsourcing program of PT. Aru Raharja Indonesia is classified as moderate. This indicates that the industrial relation to the outsourcing program of PT. Aru Raharja Indonesia still needs to be repaired in its implementation. It can be less effective in the process of communication between worker, entrepreneur and government in the form of coaching, supervision and coordination between the parties involved in the relationship industr
Success factors affecting the healthcare professionals to utilize cloud computing services
Integrating the new technologies to improve the healthcare services can be seen as one of the research trends nowadays, as earlier studies have recommended the potential of emerging technologies in enhancing healthcare service practices by means of providing more opportunities to carry out activities essential for prevention, diagnosis, monitoring, and treatment of the disease. Involving the cloud computing services in healthcare domain can offer a way for handling and maintaining health data by making use of software applications hosted on the Internet. To ensure successful cloud computing utilization, a pre-examination on the context of usage should be applied in order to collect the real needs to guarantee getting all the possible benefits of this technology. In Iraq, the health records of public hospitals consist of various types of data which continue to increase in velocity, volume, and variety progressively. This has led to several major issues to the health sectors from two perspectives, data complexity and low IT integrity. For that reason, managing and maintaining all these health data are essential to healthcare organizations. In this paper, we collected the success factors that may influence the healthcare professionals to utilize cloud computing services for the health sector in Iraq. This is done by conducting an interview with 30 physicians and technicians from four hospitals in Iraq, then a literature survey was carried out to verify that all the gathered factors are within the circumstance of healthcare. It has been found that eight factors may affect the perspective of healthcare professionals to utilize cloud computing services. Finally, a conceptual model was developed based on the findings
Learning management systems and cloud file hosting services: A study on students’ acceptance
The aim of this paper is to investigate the motivations that lead higher education students to replace several
Learning Management Systems (LMS) services with cloud file hosting services for information sharing
and collaboration among them. The research approach is based on the Technology Acceptance Model
(TAM). More specifically, the model is devoted to identifying barriers and enablers to the acceptance of
these technologies. A questionnaire comprising three factors (Attitude toward using technology, Perceived
ease of use and Perceived usefulness) was applied to a sample consisting of 121 higher education students.
Results show that the perceived ease of use of cloud file hosting services is above that of LMS tools and
services and that cloud file hosting services presented higher levels of perceived usefulness than standard
learning management tools. In addition, attitude toward using cloud file hosting services is well above
that of using LMS tools
Managing cyber risk in supply chains:A review and research agenda
Purpose: Despite growing research interest in cyber security, inter-firm based cyber risk studies are rare. Therefore, this study investigates cyber risk management in supply chain contexts.
Methodology: Adapting a systematic literature review process, papers from interdisciplinary areas published between 1990 and 2017 were selected. Different typologies, developed for conducting descriptive and thematic analysis were established using data mining techniques to conduct a comprehensive, replicable and transparent review.
Findings: The review identifies multiple future research directions for cyber security/resilience in supply chains. A conceptual model is developed, which indicates a strong link between IT, organisational and supply chain security systems. The human/behavioural elements within cyber security risk are found to be critical; however, behavioural risks have attracted less attention due to a perceived bias towards technical (data, application and network) risks. There is a need for raising risk awareness, standardised policies, collaborative strategies and empirical models for creating supply chain cyber-resilience.
Research implications: Different type of cyber risks and their points of penetration, propagation levels, consequences and mitigation measures are identified. The conceptual model developed in this study drives an agenda for future research on supply chain cyber security/resilience.
Practical implications: A multi-perspective, systematic study provides a holistic guide for practitioners in understanding cyber-physical systems. The cyber risk challenges and the mitigation strategies identified support supply chain managers in making informed decisions.
Originality: This is the first systematic literature review on managing cyber risks in supply chains. The review defines supply chain cyber risk and develops a conceptual model for supply chain cyber security systems and an agenda for future studies
Cloud adoption and cyber security in public organizations: an empirical investigation on Norwegian municipalities
The public sector in Norway, particularly municipalities, is currently transforming through the adoption of cloud solutions. This multiple case study investigates cloud adoption and is security challenges that come along with it. The objective is to identify the security challenges that cloud solutions present and techniques or strategies that can be used to mitigate these security challenges. The Systematic Literature Review (SLR) provided valuable insights into the prevalent challenges and associated mitigation techniques in cloud adoption. The thesis also uses a qualitative approach using Semi-Structured Interviews (SSI) to gather insight into informants’ experiences regarding cloud adoption and its security challenges. The study’s empirical data is based on interviews with six different Norwegian municipalities, providing a unique and broad perspective. The analysis of the empirical findings, combined with the literature, reveals several security challenges and mitigation techniques in adopting cloud solutions. The security challenges encompass organizational, environmental, legal, and technical aspects of cloud adoption in the municipality. Based on the findings, it is recommended that Norwegian municipalities act on these issues to ensure a more secure transition to cloud solutions
Managing security and compliance risks of outsourced IT projects
PhD ThesisSeveral sources of constraints, such as business, financial and legal, can lead
organisations to outsource some of their IT services. As a consequence, different
security risks may be introduced, such as confidentiality, integrity and
availability risks. Analysing and managing the potential security risks in the
early stages of project execution allow organisations to avoid or mitigate the
impact of these security risks. Several organisations have adopted ISMS
standards and frameworks in an endeavour to manage outsourced IT project
security risks. In this thesis, existing ISMS standards and frameworks have been
reviewed and analysed to assess their ability to effectively manage the security
and compliance risks of outsourced IT projects and satisfy their security needs.
The review reveals that existing ISMS standards and frameworks represent only
general security recommendations and do not consider variation in security
requirements from one organisation to another. There is also a lack of adequate
guidance for implementing or complying with these standards and frameworks,
and they are not designed to manage the security and compliance risks of
outsourced IT projects. To overcome these weaknesses, a new framework has
been introduced. The framework is a structured approach that is designed to
manage variation in security requirements, as well as provide a methodology to
guide organisations for the purpose of security management and implementation.
The framework was evaluated using different evaluation methods including a
focus group, questionnaire, and case study, which were also used to generate
recommendations and suggestions for improvements. The evaluation results
confirmed that the framework provided the participants with an effective
approach for managing security and compliance risks in the outsourcing context.
It was understandable, easy to use, and independent from different constraints
such as project size, cost or execution time. The framework is now ready to be put
into practice by organisations that intend to outsource their IT services partially
or totally
Total Quality System Breakdowns in Outsourced Clinical Trials
Numerous deaths, tragedies, and underreported drug side effects occur in outsourced clinical trials. Total quality system breakdowns occur even though quality agreement contracts and quality management systems are used by pharmaceutical organizations. The purpose of this single case study was to explore strategies clinical quality assurance managers use to avoid breakdowns in quality with outsourced clinical trials in Asia-Pacific countries. The study included a purposeful sample of 15 clinical quality assurance managers from 1 pharmaceutical organization located in the Northeast region of the United States. The conceptual framework was von Bertalanffy\u27s general systems theory. Face-to-face semistructured interviews or e-mail questionnaires containing open-ended questions were used to gather data from clinical quality assurance managers who had a minimum of 5 years of experience with outsourced clinical trials. Coded data and themes were identified through the modified van Kaam method. The three emergent themes were the following: vendor quality management, building quality in outsourced clinical trials, and quality management systems. Results of the study may contribute to social change by helping pharmaceutical organizations\u27 leaders develop strategies and tools to improve the quality of outsourced clinical trials