75,583 research outputs found

    Business schools inside the academy: What are the prospects for interdepartmental research collaboration?

    Get PDF
    Established literature about the role of business schools tends towards more parochial concerns, such as their need for a more pluralist and socially reflexive mode of knowledge production (Starkey and Tiratsoo 2007; Starkey et al 2009) or the failure of management’s professionalism project expressed through the business school movement (Khurana 2007). When casting their gaze otherwise, academic commentators examine business schools’ weakening links with management practice (Bennis and O’Toole 2005). Our theme makes a novel contribution to the business school literature through exploring prospects for research collaborations with other university departments. We draw upon the case of UK business schools, which are typically university-based (unlike some of their European counterparts), and provide illustrations relating to collaboration with medical schools to make our analytical points. We might expect that business schools and medical schools effectively collaborate given their similar vocational underpinnings, but at the same time, there are significant differences, such as differing paradigms of research and the extent to which the practice fields are professionalised. This means collaboration may prove challenging. In short, the case of collaboration between business schools and medical schools is likely to illuminate the challenges for business schools ‘reaching out’ to other university departments

    Electronic information sharing in local government authorities: Factors influencing the decision-making process

    Get PDF
    This is the post-print version of the final paper published in International Journal of Information Management. The published article is available from the link below. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. Copyright @ 2013 Elsevier B.V.Local Government Authorities (LGAs) are mainly characterised as information-intensive organisations. To satisfy their information requirements, effective information sharing within and among LGAs is necessary. Nevertheless, the dilemma of Inter-Organisational Information Sharing (IOIS) has been regarded as an inevitable issue for the public sector. Despite a decade of active research and practice, the field lacks a comprehensive framework to examine the factors influencing Electronic Information Sharing (EIS) among LGAs. The research presented in this paper contributes towards resolving this problem by developing a conceptual framework of factors influencing EIS in Government-to-Government (G2G) collaboration. By presenting this model, we attempt to clarify that EIS in LGAs is affected by a combination of environmental, organisational, business process, and technological factors and that it should not be scrutinised merely from a technical perspective. To validate the conceptual rationale, multiple case study based research strategy was selected. From an analysis of the empirical data from two case organisations, this paper exemplifies the importance (i.e. prioritisation) of these factors in influencing EIS by utilising the Analytical Hierarchy Process (AHP) technique. The intent herein is to offer LGA decision-makers with a systematic decision-making process in realising the importance (i.e. from most important to least important) of EIS influential factors. This systematic process will also assist LGA decision-makers in better interpreting EIS and its underlying problems. The research reported herein should be of interest to both academics and practitioners who are involved in IOIS, in general, and collaborative e-Government, in particular

    Internet of things security implementation using blockchain for wireless technology

    Get PDF
    Blockchain is a new security system which group many data into a block or so called classifying the data into a block. The block can have many types and each of them content data and security code. By using a decentralize mechanism, one security code protect all the data. That could happen at the server. In this research, a network of wireless sensor technology is proposed. The transmission of sensor data is via the Internet of things (Internet of Thing) technology. As many data transmitted, they have to classified and group them into a block. All the blocks are then send to the central processing unit, like a microcontroller. The block of data is then processed, identified and encrypted before send over the internet network. At the receiver, a GUI or Apps is developed to open and view the data. The Apps or GUI have an encrypted data or security code. User must key in the password before they can view the data. The password used by the end user at the Apps or GUI must be equivalent to the one encrypted at the sensor nodes. This is to satisfy the decentralized concept used in the Blockchain. To demonstrate the Blockchain technology applied to the wireless sensor network, a MATLAB Simulink function is used. The expected results should show a number of block of data in cryptography manner and chain together. The two set of data. Both have the data encrypted using hash. The black dots indicate the data has been encrypted whereas the white dot indicate indicates the data is not encrypted. The half white and half black indicates the data is in progress of encrypted. All this data should arrange in cryptography order and chain together in a vertical line. A protocol called block and chain group the data into the block and then chain then. The data appears in the blocks and send over the network. As seen in the simulation results, the yellow color represents the user data. This data has a default amplitude as 1 or 5. The data is chained and blocked to produce the Blockchain waveform Keywords: Blockchain, Internet of things, Wireless Sensor Network and MATLAB Simulin

    Defining the dimensions of engineering asset procurement: towards an integrated model

    Get PDF
    Procuring engineering asset management is a critical activity of all types of government, with optimal approaches to procurement still in need of identification. This paper advances a novel approach of exploring the procurement of engineering assets across a number of dimensions: Project rules, organisational interaction rules and complexity. The dimensions of project rules are held to include cost, quality and time. The dimensions of organisational interaction rules are held to be collaboration, competition and control. Complexity is seen as in the project itself, in the interaction between organisations or in the business environment. Taken together these dimensions seem salient for any type of engineering asset, and provide a useful way of conceptualising procurement arrangements of these assets

    Securing intellectual capital:an exploratory study in Australian universities

    Get PDF
    Purpose – To investigate the links between IC and the protection of data, information and knowledge in universities, as organizations with unique knowledge-related foci and challenges.Design/methodology/approach – We gathered insights from existing IC-related research publications to delineate key foundational aspects of IC, identify and propose links to traditional information security that impact the protection of IC. We conducted interviews with key stakeholders in Australian universities in order to validate these links.Findings – Our investigation revealed two kinds of embeddedness characterizing the organizational fabric of universities: (1) vertical and (2) horizontal, with an emphasis on the connection between these and IC-related knowledge protection within these institutions.Research implications – There is a need to acknowledge the different roles played by actors within the university, and the relevance of information security to IC-related preservation.Practical implications – Framing information security as an IC-related issue can help IT security managers communicate the need for knowledge security with executives in higher education, and secure funding to preserve and secure such IC-related knowledge, once its value is recognized.Originality/value – This is one of the first studies to explore the connections between data and information security and the three core components of IC’s knowledge security in the university context

    Project benefit management: a conceptual framework of target benefit formulation

    Get PDF
    Successful realization of project benefits is strongly associated with organizational performance. Formulating project target benefits is regarded as the first and critical step in the benefit management process. In this study, we drew upon relevant theories and conducted in-depth interviews with senior managers in Australia to develop a conceptual framework of project target benefit formulation and corresponding propositions. Our findings highlight the important role of project target benefits in funding decision-making and suggest seven criteria for their appraisal (strategic fit, target value, measurability, realism, target date, accountability and comprehensiveness) and four constructs which improve the formulated target benefits (a formal benefit formulation process, senior executive leadership, senior executive supports, and public service motivation). These findings extend the current literature on project benefit management by providing a holistic view on how project target benefits should be formulated and appraised

    Review of Literature and Curricula in Smart Supply Chain & Transportation

    Get PDF
    This study provides a review of existing smart supply chain management (SCM) literature and current course offerings in order to identify unexplored implications of smart SCM. Specifically, the study focuses on curricula within the state of California to derive potential opportunities for the relevant practitioners in the Bay Area. In addition, the study further extends curriculum review to other well-recognized SCM programs around the U.S. By exploring current relevant course offerings from different academic institutions for higher education (i.e., universities), this research aims to deliver general ideas useful to knowledge practitioners in fields concerning SCM. Finally, the research illustrates a conceptual framework aimed at fostering familiarity with the necessary research topics for the evolving smart SCM

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    Towards technological rules for designing innovation networks: a dynamic capabilities view.

    No full text
    Inter-organizational innovation networks provide opportunities to exploit complementary resources that reside beyond the boundary of the firm. The shifting locus of innovation and value creation away from the “sole firm as innovator” poses important questions about the nature of these resources and the capabilities needed to leverage them for competitive advantage. The purpose of this paper is to describe research into producing design-oriented knowledge, for configuring inter-organizational networks as a means of accessing such resources for innovation
    • 

    corecore