37,420 research outputs found

    Data Envelopment Analysis (Dea) approach In efficiency transport manufacturing industry in Malaysia

    Get PDF
    The objective of this study was to measure of technical efficiency, transport manufacturing industry in Malaysia score using the data envelopment analysis (DEA) from 2005 to 2010. The efficiency score analysis used only two inputs, i.e., capital and labor and one output i.e., total of sales. The results shown that the average efficiency score of the Banker, Charnes, Cooper - Variable Returns to Scale (BCC-VRS) model is higher than the Charnes, Cooper, Rhodes - Constant Return to Scale (CCR-CRS) model. Based on the BCC-VRS model, the average efficiency score was at a moderate level and only four sub-industry that recorded an average efficiency score more than 0.50 percent during the period study. The implication of this result suggests that the transport manufacturing industry needs to increase investment, especially in human capital such as employee training, increase communication expenses such as ICT and carry out joint ventures as well as research and development activities to enhance industry efficiency

    Internet of things security implementation using blockchain for wireless technology

    Get PDF
    Blockchain is a new security system which group many data into a block or so called classifying the data into a block. The block can have many types and each of them content data and security code. By using a decentralize mechanism, one security code protect all the data. That could happen at the server. In this research, a network of wireless sensor technology is proposed. The transmission of sensor data is via the Internet of things (Internet of Thing) technology. As many data transmitted, they have to classified and group them into a block. All the blocks are then send to the central processing unit, like a microcontroller. The block of data is then processed, identified and encrypted before send over the internet network. At the receiver, a GUI or Apps is developed to open and view the data. The Apps or GUI have an encrypted data or security code. User must key in the password before they can view the data. The password used by the end user at the Apps or GUI must be equivalent to the one encrypted at the sensor nodes. This is to satisfy the decentralized concept used in the Blockchain. To demonstrate the Blockchain technology applied to the wireless sensor network, a MATLAB Simulink function is used. The expected results should show a number of block of data in cryptography manner and chain together. The two set of data. Both have the data encrypted using hash. The black dots indicate the data has been encrypted whereas the white dot indicate indicates the data is not encrypted. The half white and half black indicates the data is in progress of encrypted. All this data should arrange in cryptography order and chain together in a vertical line. A protocol called block and chain group the data into the block and then chain then. The data appears in the blocks and send over the network. As seen in the simulation results, the yellow color represents the user data. This data has a default amplitude as 1 or 5. The data is chained and blocked to produce the Blockchain waveform Keywords: Blockchain, Internet of things, Wireless Sensor Network and MATLAB Simulin

    Contextual factors, knowledge processes and performance in global sourcing of IT services: An investigation in China

    Get PDF
    Copyright @ 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. Reuse of this article has been approved by the publisher.In this paper, the authors explore the influences of two major contextual factors—supplier team members’ cultural understanding and trust relationship—on knowledge processes and performance in global sourcing of IT services. The authors discuss a joint investigation conducted by a cross-cultural research team in China. Cultural understanding is measured by individualism with guanxi and mianzi, two Chinese cultural concepts, and trust relationship is measured by adjusting trust, a notion reflecting the uniqueness of the Chinese people. Knowledge processes are characterized by knowledge sharing. Performance is measured by the outcomes of global sourcing, which is represented by product success and personal satisfaction. Data are collected in 13 companies in Xi’an Software Park, with 200 structured questionnaires distributed to knowledge workers. The results of quantitative data analysis indicate that cultural understanding influences trust relationship greatly, as well as knowledge sharing and performance in global sourcing of IT services. Trust relationship significantly impacts knowledge sharing, whereas trust relationship and knowledge sharing have no impact on performance. This study suggests that special aspects of the Chinese context have significant direct impacts on knowledge processes while no direct and immediate impacts on performance in global sourcing of IT services.National Natural Science Foundation of China, Program for Humanity and Social Science Research, Program for New Century Excellent Talents in University in China and Brunel University's Research Development Fund

    Virtual HR Departments: Getting Out of the Middle

    Get PDF
    In this chapter, we explore the notion of virtual HR departments: a network-based organization built on partnerships and mediated by information technologies in order to be simultaneously strategic, flexible, cost-efficient, and service-oriented. We draw on experiences and initiatives at Merck Pharmaceuticals in order to show how information technology in establishing an infrastructure for virtual HR. Then, we present a model for mapping the architecture of HR activities that includes both internal and external sourcing options. We conclude by offering some recommendations for management practice as well as future research

    Governance of Offshore IT Outsourcing at Shell Global Functions IT-BAM Development and Application of a Governance Framework to Improve Outsourcing Relationships

    Get PDF
    The lack of effective IT governance is widely recognized as a key inhibitor to successful global IT outsourcing relationships. In this study we present the development and application of a governance framework to improve outsourcing relationships. The approach used to developing an IT governance framework includes a meta model and a customization process to fit the framework to the target organization. The IT governance framework consists of four different elements (1) organisational structures, (2) joint processes between in- and outsourcer, (3) responsibilities that link roles to processes and (4) a diverse set of control indicators to measure the success of the relationship. The IT governance framework is put in practice in Shell GFIT BAM, a part of Shell that concluded to have a lack of management control over at least one of their outsourcing relationships. In a workshop the governance framework was used to perform a gap analysis between the current and desired governance. Several gaps were identified in the way roles and responsibilities are assigned and joint processes are set-up. Moreover, this workshop also showed the usefulness and usability of the IT governance framework in structuring, providing input and managing stakeholders in the discussions around IT governance

    A framework and tool to manage Cloud Computing service quality

    Get PDF
    Cloud Computing has generated considerable interest in both companies specialized in Information and Communication Technology and business context in general. The Sourcing Capability Maturity Model for service (e-SCM) is a capability model for offshore outsourcing services between clients and providers that offers appropriate strategies to enhance Cloud Computing implementation. It intends to achieve the required quality of service and develop an effective working relationship between clients and providers. Moreover, quality evaluation framework is a framework to control the quality of any product and/or process. It offers a tool support that can generate software artifacts to manage any type of product and service efficiently and effectively. Thus, the aim of this paper was to make this framework and tool support available to manage Cloud Computing service quality between clients and providers by means of e-SCM.Ministerio de Ciencia e InnovaciĂłn TIN2013-46928-C3-3-RJunta de AndalucĂ­a TIC-578

    The development of service provider's BPO-IT framework

    Get PDF
    Purpose The decision to operate BPO-IT organisational model by a business process outsourcing (BPO) service provider has far reaching benefits. The purpose of this paper is to develop a service provider’s BPO-IT framework that provides in-house IT function (software) required to process client services. Design/methodology/approach The multi-case study adopted an exploratory sequential mixed method research approach. In the first instance, seven BPO service provider organisations were investigated in the qualitative phase and 156 in the quantitative phase, respectively. Findings The adoption of the developed framework indicates that it could reduce failures in BPO relationships through reduced turnaround time in processing client services, improved quality of service, reduced cost, improved client and provider’s competitiveness, and confidentiality of client operations. Outsourcing clients could lay the foundation for a successful relationship by adopting a selection process that could choose the right provider. Originality/value The paper reveals BPO-IT organisation’s operation towards in-house provision of software required to process client services. A research exploring BPO service providers from a top outsourcing destination like India could provide offshore outsourcing clients the information to move towards onshore outsourcing. </jats:sec
    • 

    corecore