9 research outputs found

    Industrial Relationship Between Worker, Entrepreneur and Government On the Outsourcing Program in PT. Aru Raharja Indonesia

    Get PDF
    This study aims to determine whether the Industrial Relationship  Between Worker, Entrepreneur and Government  at PT. Aru Raharja Indonesia has achieved its goal.           This research method used an evaluative descriptive method. The object of the research was focused on the Industrial relationship  between worker, entrepreneur and government  On the outsourcing program of PT. Aru Raharja Indonesia          Data is collected through observatied, documentation studied, and indepth interview. Data analysis used descriptive evaluative techniques, through four stages, namely: data collection, data reduction, data display and conclusion drawing/verification.          The results of the studied found that industrial relationship at the outsourcing program of PT. Aru Raharja Indonesia is classified as moderate. This indicates that the industrial relation to the outsourcing program of PT. Aru Raharja Indonesia still needs to be repaired in its implementation. It can be less effective in the process of communication between worker, entrepreneur and government in the form of coaching, supervision and coordination between the parties involved in the relationship industr

    Success factors affecting the healthcare professionals to utilize cloud computing services

    Get PDF
    Integrating the new technologies to improve the healthcare services can be seen as one of the research trends nowadays, as earlier studies have recommended the potential of emerging technologies in enhancing healthcare service practices by means of providing more opportunities to carry out activities essential for prevention, diagnosis, monitoring, and treatment of the disease. Involving the cloud computing services in healthcare domain can offer a way for handling and maintaining health data by making use of software applications hosted on the Internet. To ensure successful cloud computing utilization, a pre-examination on the context of usage should be applied in order to collect the real needs to guarantee getting all the possible benefits of this technology. In Iraq, the health records of public hospitals consist of various types of data which continue to increase in velocity, volume, and variety progressively. This has led to several major issues to the health sectors from two perspectives, data complexity and low IT integrity. For that reason, managing and maintaining all these health data are essential to healthcare organizations. In this paper, we collected the success factors that may influence the healthcare professionals to utilize cloud computing services for the health sector in Iraq. This is done by conducting an interview with 30 physicians and technicians from four hospitals in Iraq, then a literature survey was carried out to verify that all the gathered factors are within the circumstance of healthcare. It has been found that eight factors may affect the perspective of healthcare professionals to utilize cloud computing services. Finally, a conceptual model was developed based on the findings

    Learning management systems and cloud file hosting services: A study on students’ acceptance

    Get PDF
    The aim of this paper is to investigate the motivations that lead higher education students to replace several Learning Management Systems (LMS) services with cloud file hosting services for information sharing and collaboration among them. The research approach is based on the Technology Acceptance Model (TAM). More specifically, the model is devoted to identifying barriers and enablers to the acceptance of these technologies. A questionnaire comprising three factors (Attitude toward using technology, Perceived ease of use and Perceived usefulness) was applied to a sample consisting of 121 higher education students. Results show that the perceived ease of use of cloud file hosting services is above that of LMS tools and services and that cloud file hosting services presented higher levels of perceived usefulness than standard learning management tools. In addition, attitude toward using cloud file hosting services is well above that of using LMS tools

    Managing cyber risk in supply chains:A review and research agenda

    Get PDF
    Purpose: Despite growing research interest in cyber security, inter-firm based cyber risk studies are rare. Therefore, this study investigates cyber risk management in supply chain contexts. Methodology: Adapting a systematic literature review process, papers from interdisciplinary areas published between 1990 and 2017 were selected. Different typologies, developed for conducting descriptive and thematic analysis were established using data mining techniques to conduct a comprehensive, replicable and transparent review. Findings: The review identifies multiple future research directions for cyber security/resilience in supply chains. A conceptual model is developed, which indicates a strong link between IT, organisational and supply chain security systems. The human/behavioural elements within cyber security risk are found to be critical; however, behavioural risks have attracted less attention due to a perceived bias towards technical (data, application and network) risks. There is a need for raising risk awareness, standardised policies, collaborative strategies and empirical models for creating supply chain cyber-resilience. Research implications: Different type of cyber risks and their points of penetration, propagation levels, consequences and mitigation measures are identified. The conceptual model developed in this study drives an agenda for future research on supply chain cyber security/resilience. Practical implications: A multi-perspective, systematic study provides a holistic guide for practitioners in understanding cyber-physical systems. The cyber risk challenges and the mitigation strategies identified support supply chain managers in making informed decisions. Originality: This is the first systematic literature review on managing cyber risks in supply chains. The review defines supply chain cyber risk and develops a conceptual model for supply chain cyber security systems and an agenda for future studies

    Cloud adoption and cyber security in public organizations: an empirical investigation on Norwegian municipalities

    Get PDF
    The public sector in Norway, particularly municipalities, is currently transforming through the adoption of cloud solutions. This multiple case study investigates cloud adoption and is security challenges that come along with it. The objective is to identify the security challenges that cloud solutions present and techniques or strategies that can be used to mitigate these security challenges. The Systematic Literature Review (SLR) provided valuable insights into the prevalent challenges and associated mitigation techniques in cloud adoption. The thesis also uses a qualitative approach using Semi-Structured Interviews (SSI) to gather insight into informants’ experiences regarding cloud adoption and its security challenges. The study’s empirical data is based on interviews with six different Norwegian municipalities, providing a unique and broad perspective. The analysis of the empirical findings, combined with the literature, reveals several security challenges and mitigation techniques in adopting cloud solutions. The security challenges encompass organizational, environmental, legal, and technical aspects of cloud adoption in the municipality. Based on the findings, it is recommended that Norwegian municipalities act on these issues to ensure a more secure transition to cloud solutions

    Managing security and compliance risks of outsourced IT projects

    Get PDF
    PhD ThesisSeveral sources of constraints, such as business, financial and legal, can lead organisations to outsource some of their IT services. As a consequence, different security risks may be introduced, such as confidentiality, integrity and availability risks. Analysing and managing the potential security risks in the early stages of project execution allow organisations to avoid or mitigate the impact of these security risks. Several organisations have adopted ISMS standards and frameworks in an endeavour to manage outsourced IT project security risks. In this thesis, existing ISMS standards and frameworks have been reviewed and analysed to assess their ability to effectively manage the security and compliance risks of outsourced IT projects and satisfy their security needs. The review reveals that existing ISMS standards and frameworks represent only general security recommendations and do not consider variation in security requirements from one organisation to another. There is also a lack of adequate guidance for implementing or complying with these standards and frameworks, and they are not designed to manage the security and compliance risks of outsourced IT projects. To overcome these weaknesses, a new framework has been introduced. The framework is a structured approach that is designed to manage variation in security requirements, as well as provide a methodology to guide organisations for the purpose of security management and implementation. The framework was evaluated using different evaluation methods including a focus group, questionnaire, and case study, which were also used to generate recommendations and suggestions for improvements. The evaluation results confirmed that the framework provided the participants with an effective approach for managing security and compliance risks in the outsourcing context. It was understandable, easy to use, and independent from different constraints such as project size, cost or execution time. The framework is now ready to be put into practice by organisations that intend to outsource their IT services partially or totally

    Total Quality System Breakdowns in Outsourced Clinical Trials

    Get PDF
    Numerous deaths, tragedies, and underreported drug side effects occur in outsourced clinical trials. Total quality system breakdowns occur even though quality agreement contracts and quality management systems are used by pharmaceutical organizations. The purpose of this single case study was to explore strategies clinical quality assurance managers use to avoid breakdowns in quality with outsourced clinical trials in Asia-Pacific countries. The study included a purposeful sample of 15 clinical quality assurance managers from 1 pharmaceutical organization located in the Northeast region of the United States. The conceptual framework was von Bertalanffy\u27s general systems theory. Face-to-face semistructured interviews or e-mail questionnaires containing open-ended questions were used to gather data from clinical quality assurance managers who had a minimum of 5 years of experience with outsourced clinical trials. Coded data and themes were identified through the modified van Kaam method. The three emergent themes were the following: vendor quality management, building quality in outsourced clinical trials, and quality management systems. Results of the study may contribute to social change by helping pharmaceutical organizations\u27 leaders develop strategies and tools to improve the quality of outsourced clinical trials
    corecore