31,030 research outputs found

    Managing Transitions: Using William Bridges’ Transition Model and a Change Style Assessment Instrument to Inform Strategies and Measure Progress in Organizational Change Management

    Get PDF
    Purpose: As academic libraries redefine their services and roles within higher education, library leaders are charged to implement transformative changes. The biggest leadership challenge in effecting change is the human element: helping employees to embrace and implement the changes necessary for transformation. This paper describes the change management process used by Butler University Libraries in 2013-14 to migrate to a cloud-based integrated library system that streamlined workflows and drove reorganization. Design, methodology or approach: The library leadership team relied upon two tools to develop strategies for change management and to track progress in employee perceptions of and participation in implementing change: the book Managing Transitions: Making the Most of Change by William Bridges and Susan Bridges and the Ryan Change Style Assessment instrument. Managing Transitions applies the Transition Model of psychological response to change to organizational change management. The model presents three phases of transition: “Letting Go,” the “Neutral Zone,” and “A New Beginning.” The book provides managers with concrete strategies to support employees through these phases. The Ryan Change Style Assessment developed by The Ryan Group, Inc., is one of several instruments available to determine how an individual responds to change. A self-scoring instrument, the Ryan Change Style Assessment identifies four change styles based on scales in four dimensions: preferred role during change (lead-follow, emotional expression (low-high), orientation (people-task), and openness to change (excited-cautious). The results place each respondent into one of four change styles: Initiator, Collaborator, Protector, or Questioner. Supporting documentation provides information the needs and contributions of each style during change. While planning for the system migration, the library leadership team read Managing Transitions and discussed each chapter at biweekly meetings. This reading provided a shared vocabulary for discussing change. Also during the planning phase, all library employees completed the Ryan Change Style Assessment. The results were compiled into a 2 x 2 matrix graphic. Two months before the new cloud-based system went live, we shared the results of the Change Style Assessment at an all-staff meeting and discussed the implications of our overall mix of change styles. Subsequently, the leadership team implemented a pre- and post- system migration exercise to determine employee readiness for and integration into their roles following system migration and reorganization. The exercise used a graphic “map” of the three phases of transition from Managing Transitions. Employees were asked to place a dot color-coded to change style on the map to indicate their current position in the three phases of transition relative to the system migration. The pre-migration map became an essential tool for the leadership team in developing strategies for communication and decision-making. The transition strategies used by the leadership team during the change implementation phase included intentional over-communication of all issues related to the system migration, for both internal and external communications; ceremonial events to acknowledge critical milestones; and increased employee engagement in redefining their roles and position responsibilities. Three months after the system migration, the mapping exercise was repeated to assess progress toward employee integration into their roles using the new system. Findings: In the pre-migration map of staff readiness for the migration showed that ten of 21 employees (47%) placed themselves on the border between the “Neutral Zone” and “A New Beginning”—they were ready for change. Not surprisingly, three of them identified as “Collaborators” and three identified as “Initiators,” the two change styles of the Ryan Assessment that are excited by change. Seven of the employees (33%) placed themselves within the “Neutral Zone.” All four change styles were represented in this group. Four employees (20%)—two Protectors and two Questioners, the styles cautious about change—placed themselves inside or on the border of “Letting Go.” This initial map demonstrated that most of the employees with change styles open to change were ready, while those cautious about change were less likely to feel ready for change. The leadership team used these findings to be more intentional in addressing the concerns of those with these change styles by communicating detailed information about migration tasks, workflow changes as information became available, and to reassure employees that these changes would not result in elimination of positions. The post-migration map showed that twenty of 26 (77%) of library employees positioned themselves in or on the border of the “New Beginning” phase, three (11.5%) positioned themselves within the “Neutral Zone,” and three (11.5%) positioned themselves in the “Letting Go” phase. All of those who placed themselves in the “Neutral Zone” or “Letting Go” phase identified as Questioners or Protectors. Research or practical limitations or implications: The purpose of the pre- and post- system migration maps was to be able to visualize, generally, staff perceptions of their readiness for the system migration by change style. We therefore made the mapping process anonymous, and we did not attempt to draw conclusions about individuals’ progress toward “The New Beginning” phase. Also, the library experienced some staff changes during the period between the creation of the two maps depicting staff “location” relative to the phases of transition; some individuals who participated in the pre-migration mapping exercise did not participate in the post-migration exercise, and vice versa. Conclusions: Used in combination, the model for successful organizational change presented in Managing Transitions and the Ryan Change Style Assessment instrument provided the leadership team at Butler University Libraries with an effective process for minimizing disruption and discord during a transformative system migration. The outcomes we had anticipated include: improved communication through a common vocabulary for change management; better understanding of and ability to leverage individual and collective change styles to improve morale; a smooth migration facilitated by better communication and improved morale; and increased capacity for new library services. The outcomes we did not anticipate include: improved decision-making through balanced change-style composition on teams; institutional recognition of the library organization as a resource for change management; and revitalization of the library organization’s image as a forward-looking, vital resource

    Trusted Computing and Secure Virtualization in Cloud Computing

    Get PDF
    Large-scale deployment and use of cloud computing in industry is accompanied and in the same time hampered by concerns regarding protection of data handled by cloud computing providers. One of the consequences of moving data processing and storage off company premises is that organizations have less control over their infrastructure. As a result, cloud service (CS) clients must trust that the CS provider is able to protect their data and infrastructure from both external and internal attacks. Currently however, such trust can only rely on organizational processes declared by the CS provider and can not be remotely verified and validated by an external party. Enabling the CS client to verify the integrity of the host where the virtual machine instance will run, as well as to ensure that the virtual machine image has not been tampered with, are some steps towards building trust in the CS provider. Having the tools to perform such verifications prior to the launch of the VM instance allows the CS clients to decide in runtime whether certain data should be stored- or calculations should be made on the VM instance offered by the CS provider. This thesis combines three components -- trusted computing, virtualization technology and cloud computing platforms -- to address issues of trust and security in public cloud computing environments. Of the three components, virtualization technology has had the longest evolution and is a cornerstone for the realization of cloud computing. Trusted computing is a recent industry initiative that aims to implement the root of trust in a hardware component, the trusted platform module. The initiative has been formalized in a set of specifications and is currently at version 1.2. Cloud computing platforms pool virtualized computing, storage and network resources in order to serve a large number of customers customers that use a multi-tenant multiplexing model to offer on-demand self-service over broad network. Open source cloud computing platforms are, similar to trusted computing, a fairly recent technology in active development. The issue of trust in public cloud environments is addressed by examining the state of the art within cloud computing security and subsequently addressing the issues of establishing trust in the launch of a generic virtual machine in a public cloud environment. As a result, the thesis proposes a trusted launch protocol that allows CS clients to verify and ensure the integrity of the VM instance at launch time, as well as the integrity of the host where the VM instance is launched. The protocol relies on the use of Trusted Platform Module (TPM) for key generation and data protection. The TPM also plays an essential part in the integrity attestation of the VM instance host. Along with a theoretical, platform-agnostic protocol, the thesis also describes a detailed implementation design of the protocol using the OpenStack cloud computing platform. In order the verify the implementability of the proposed protocol, a prototype implementation has built using a distributed deployment of OpenStack. While the protocol covers only the trusted launch procedure using generic virtual machine images, it presents a step aimed to contribute towards the creation of a secure and trusted public cloud computing environment

    State-of-the-Art in Parallel Computing with R

    Get PDF
    R is a mature open-source programming language for statistical computing and graphics. Many areas of statistical research are experiencing rapid growth in the size of data sets. Methodological advances drive increased use of simulations. A common approach is to use parallel computing. This paper presents an overview of techniques for parallel computing with R on computer clusters, on multi-core systems, and in grid computing. It reviews sixteen different packages, comparing them on their state of development, the parallel technology used, as well as on usability, acceptance, and performance. Two packages (snow, Rmpi) stand out as particularly useful for general use on computer clusters. Packages for grid computing are still in development, with only one package currently available to the end user. For multi-core systems four different packages exist, but a number of issues pose challenges to early adopters. The paper concludes with ideas for further developments in high performance computing with R. Example code is available in the appendix

    Process of designing robust, dependable, safe and secure software for medical devices: Point of care testing device as a case study

    Get PDF
    This article has been made available through the Brunel Open Access Publishing Fund.Copyright © 2013 Sivanesan Tulasidas et al. This paper presents a holistic methodology for the design of medical device software, which encompasses of a new way of eliciting requirements, system design process, security design guideline, cloud architecture design, combinatorial testing process and agile project management. The paper uses point of care diagnostics as a case study where the software and hardware must be robust, reliable to provide accurate diagnosis of diseases. As software and software intensive systems are becoming increasingly complex, the impact of failures can lead to significant property damage, or damage to the environment. Within the medical diagnostic device software domain such failures can result in misdiagnosis leading to clinical complications and in some cases death. Software faults can arise due to the interaction among the software, the hardware, third party software and the operating environment. Unanticipated environmental changes and latent coding errors lead to operation faults despite of the fact that usually a significant effort has been expended in the design, verification and validation of the software system. It is becoming increasingly more apparent that one needs to adopt different approaches, which will guarantee that a complex software system meets all safety, security, and reliability requirements, in addition to complying with standards such as IEC 62304. There are many initiatives taken to develop safety and security critical systems, at different development phases and in different contexts, ranging from infrastructure design to device design. Different approaches are implemented to design error free software for safety critical systems. By adopting the strategies and processes presented in this paper one can overcome the challenges in developing error free software for medical devices (or safety critical systems).Brunel Open Access Publishing Fund

    IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT

    Full text link
    With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from flawed security designs and implementations. They also tend to lack mechanisms for firmware updates or patches that can help eliminate security vulnerabilities. Securing networks where the presence of such vulnerable devices is given, requires a brownfield approach: applying necessary protection measures within the network so that potentially vulnerable devices can coexist without endangering the security of other devices in the same network. In this paper, we present IOT SENTINEL, a system capable of automatically identifying the types of devices being connected to an IoT network and enabling enforcement of rules for constraining the communications of vulnerable devices so as to minimize damage resulting from their compromise. We show that IOT SENTINEL is effective in identifying device types and has minimal performance overhead

    New intelligent network approach for monitoring physiological parameters : the case of Benin

    Get PDF
    Benin health system is facing many challenges as: (i) affordable high-quality health care to a growing population providing need, (ii) patients’ hospitalization time reduction, (iii) and presence time of the nursing staff optimization. Such challenges can be solved by remote monitoring of patients. To achieve this, five steps were followed. 1) Identification of the Wireless Body Area Network (WBAN) systems’ characteristics and the patient physiological parameters’ monitoring. 2) The national Integrated Patient Monitoring Network (RIMP) architecture modeling in a cloud of Technocenters. 3) Cross-analysis between the characteristics and the functional requirements identified. 4) Each Technocenter’s functionality simulation through: a) the design approach choice inspired by the life cycle of V systems; b) functional modeling through SysML Language; c) the communication technology and different architectures of sensor networks choice studying. 5) An estimate of the material resources of the national RIMP according to physiological parameters. A National Integrated Network for Patient Monitoring (RNIMP) remotely, ambulatory or not, was designed for Beninese health system. The implementation of the RNIMP will contribute to improve patients’ care in Benin. The proposed network is supported by a repository that can be used for its implementation, monitoring and evaluation. It is a table of 36 characteristic elements each of which must satisfy 5 requirements relating to: medical application, design factors, safety, performance indicators and materiovigilance

    Innovative public governance through cloud computing: Information privacy, business models and performance measurement challenges

    Get PDF
    Purpose: The purpose of this paper is to identify and analyze challenges and to discuss proposed solutions for innovative public governance through cloud computing. Innovative technologies, such as federation of services and cloud computing, can greatly contribute to the provision of e-government services, through scaleable and flexible systems. Furthermore, they can facilitate in reducing costs and overcoming public information segmentation. Nonetheless, when public agencies use these technologies, they encounter several associated organizational and technical changes, as well as significant challenges. Design/methodology/approach: We followed a multidisciplinary perspective (social, behavioral, business and technical) and conducted a conceptual analysis for analyzing the associated challenges. We conducted focus group interviews in two countries for evaluating the performance models that resulted from the conceptual analysis. Findings: This study identifies and analyzes several challenges that may emerge while adopting innovative technologies for public governance and e-government services. Furthermore, it presents suggested solutions deriving from the experience of designing a related platform for public governance, including issues of privacy requirements, proposed business models and key performance indicators for public services on cloud computing. Research limitations/implications: The challenges and solutions discussed are based on the experience gained by designing one platform. However, we rely on issues and challenges collected from four countries. Practical implications: The identification of challenges for innovative design of e-government services through a central portal in Europe and using service federation is expected to inform practitioners in different roles about significant changes across multiple levels that are implied and may accelerate the challenges' resolution. Originality/value: This is the first study that discusses from multiple perspectives and through empirical investigation the challenges to realize public governance through innovative technologies. The results emerge from an actual portal that will function at a European level. © Emerald Group Publishing Limited
    corecore