Academic literature on the topic 'Business systems in context not elsewhere classified'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Business systems in context not elsewhere classified.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Business systems in context not elsewhere classified"

1

Cornia, Alessio, Annika Sehl, and Rasmus Kleis Nielsen. "Comparing legacy media responses to the changing business of news: Cross-national similarities and differences across media types." International Communication Gazette 81, no. 6-8 (November 4, 2018): 686–706. http://dx.doi.org/10.1177/1748048518808641.

Full text
Abstract:
In this article, we analyse how legacy media organizations in six countries are adapting to the changing business of news. We focus on how similarities and differences in their responses to digital developments are shaped by the interplay between organizational legacy and national context. The study draws on media sociology and comparative media systems research and is based on 54 interviews with senior editors and managers at 25 newspapers and commercial broadcasters in Finland, France, Germany, Italy, Poland, and the UK. We find that organizations within the same medium respond to change in similar ways (newspapers versus broadcasters), and that these responses are surprisingly similar across different countries. We argue that factors related to the medium-specific legacy shape media adaptation more than do structural differences between national media systems because news organizations faced with a changing and uncertain environment imitate the strategies adopted by peer organizations elsewhere.
APA, Harvard, Vancouver, ISO, and other styles
2

Vostryakov, Oleksandr, and Anastasiia Sybirtseva. "Business digitalization: definition and tools." Strategy of Economic Development of Ukraine, no. 54 (June 23, 2024): 5–16. http://dx.doi.org/10.33111/sedu.2024.54.005.016.

Full text
Abstract:
As a result of the study, the concept of digitalization of a business organization is defined as a set of tools, the process of adding digital technologies to physical space and transferring information into a digital format to improve the efficiency and increase the profit of a business organization. Digitalization is a process and a tool, not the ultimate goal, and it should improve the interaction between people and technology. Digitalization has been classified into two types: process digitalization and product digitalization. Process digitalization is the classic understanding of this term in the context of business processes, and product digitalization is the additions of digital technologies to an existing product to improve it. Any type of digitalization should lead to an increase in the profit of a business organization directly or indirectly because this is one of the most important goals of any business. Digitalization tools have been defined as digital technologies and methods of their implementation in business processes or additions to products. Examples of such tools have been provided. It has been determined that one of the most important tools of digitization is digital data management. Digital data management includes digitization as one of the first stages and may include the use of CRM systems, cloud technologies and artificial intelligence. The use of these tools is possible not only in the context of data management, but as a method of creating a digital infrastructure or making decisions. The advantages of using various digitalization tools have been determined. Digital data management (including CRM systems, cloud technologies and artificial intelligence in this context) gives the ability to store, analyse and use large volumes of data, allows quick and easy access to information, reliability, and confidentiality, ensuring statistics, etc. Also, the use of digitalization tools allows improving interaction with consumers and creating a comfortable and efficient infrastructure both within the company and for consumers. Other digitalization tools have been listed: mobile technologies, ERP systems, automation, robots, IoT platforms, and GPS systems. It has been found that all these tools can be used to digitize the process, and only artificial intelligence GPS, and cloud technologies can be used to digitize the product.
APA, Harvard, Vancouver, ISO, and other styles
3

Ravasan, Ahad Zare, and Sogol Rabiee Savoji. "An Investigation of BI Implementation Critical Success Factors in Iranian Context." International Journal of Business Intelligence Research 5, no. 3 (July 2014): 41–57. http://dx.doi.org/10.4018/ijbir.2014070104.

Full text
Abstract:
Nowadays, many organizations take Business Intelligence (BI) systems to improve their decision-making processes. Although many organizations have adopted BI systems, not all of these implementations have been successful. This paper seeks to identify critical success factors (CSFs) that impact on successful implementation of BI systems in organizations. So, at first, through literature review, 26 CSFs were identified. Following that, a questionnaire was developed and then filled out by domain experts who had at least three years of experience in BI implementation projects in Iran. Robust Exploratory Factor Analysis (EFA) was run for data analysis, which finally classified 26 CSFs into four distinct groups termed as “organizational”, “human”, “project management”, and “technical”. The results of this study provide a very useful reference for scholars and managers to identify the relevant issues of BI projects in Iran.
APA, Harvard, Vancouver, ISO, and other styles
4

Prokopowicz, Dariusz, and Mirosław Matosek. "IMPORTANCE AND SECURITY OF INFORMATION PROVIDED BY THE INTERNET IN THE CONTEXT OF THE DEVELOPMENT OF ECONOMIC ENTITIES IN POLAND." International Journal of New Economics and Social Sciences 6, no. 2 (December 22, 2017): 0. http://dx.doi.org/10.5604/01.3001.0010.7637.

Full text
Abstract:
With the development of information-sharing techniques via the Internet, there are many benefits for beneficiaries, customers and users of public sector information services. On the other hand, entities providing electronic information via the Internet appear to be able to significantly reduce transaction costs of conducted financial transactions and electronic data transfer. On the other hand, the process of making information available via the Internet generates a number of risks associated with identity theft, hacker hacking of classified data, and money scams in electronic banking systems. In response to these threats, individual entities including public sector bodies are developing security systems for remote access to information and transactions made via the Internet. Companies operating in Poland in pursuit of market and business success try to build their competitive advantage by implementing new IT solutions to their business. More and more companies and financial institutions use business intelligence on their IT platforms for Business Intelligence solutions. Business Intelligence analysis makes it easy for realtors to perform real-time analysis of large collections of businessrelated data. Consequently, the opinion that Business Intelligence solutions are becoming more and more useful in organizational management processes.
APA, Harvard, Vancouver, ISO, and other styles
5

Chaudhry, Kanika, and Sanjay Dhingra. "Modeling the Critical Success Factors for Business Intelligence Implementation." International Journal of Business Intelligence Research 12, no. 2 (July 2021): 1–21. http://dx.doi.org/10.4018/ijbir.20210701.oa3.

Full text
Abstract:
Business intelligence (BI) helps organizations to make better and quicker decisions. The primary requirement, as per previous studies, for any successful BI implementation in an organization and its' stakeholders, is to understand and pay heed to the vital issues and factors governing it. The objective of this study is, thus, to analyze the various critical success factors (CSF’s) for Business Intelligence Implementation, in context to the Indian sub-continent. In this qualitative study, the CSF’s for BI implementation are classified, through the review of the literature and to identify the relationship among the CSF's, Interpretive Structural Modeling (ISM) is applied along with MICMAC classification method. The ISM approach's outcome shows that management support and business goal alignment are the most significant driving factors for implementing BI. These findings may help recognize the crucial facts that affect the firms adopting BI in India and give some insights for other countries
APA, Harvard, Vancouver, ISO, and other styles
6

Idries, Ahmed, John Krogstie, and Jayaprakash Rajasekharan. "Dynamic Capabilities in Electrical Energy Digitalization: A Case from the Norwegian Ecosystem." Energies 15, no. 22 (November 8, 2022): 8342. http://dx.doi.org/10.3390/en15228342.

Full text
Abstract:
This paper aims to identify the dynamic capabilities required for electrical energy service providers to transform toward a digital and platform-based business models in the context of the current energy transition. The paper contributes to two fields: Information systems in the domain of platforms ecosystems and digital services innovation through the usage of dynamic capabilities theoretical lens and the field of energy informatics in the domain of digital business models and service innovation. Through the case study approach we investigate the case of Norwegian electrical energy provider TrønderEnergi and how the company is moving toward a fully digital business model and how the company build the dynamic capabilities required for the digitalization era. Through semi-structured interviews, the study managed to identify several activities related to each capability and then classified these activities under three main activities, which are: sensing, seizing, and transforming, and then classified them into sub-capabilities and identified activities related to each sup capability. The paper concludes with managerial implications for practitioners and initiates an empirical extension for the dynamic capabilities theoretical lens.
APA, Harvard, Vancouver, ISO, and other styles
7

Burgoyne, John, and Anna Lorbiecki. "Clinicians into Management. The Experience in Context." Health Services Management Research 6, no. 4 (November 1993): 248–59. http://dx.doi.org/10.1177/095148489300600404.

Full text
Abstract:
This paper interprets the experience of a sample of 60 clinicians becoming involved in formal management, mainly at hospital unit level, in the historical context of changing health service organisation. This includes the introduction of managerialism and the evolution of the NHS into a structured network based around purchaser/provider relationships. The conclusion is that these clinicians are becoming involved in management, and making the personal and social adjustments necessary for this, but in a way that leaves medical culture, and their allegiance to it, at the present largely intact. This is achieved largely through the organisational mechanism of clinical directorates, which promise to function as professional groups from the clinical point of view and as business units from the managerial perspective. An argument is put forward, based on a theoretical view compatible with the data from the clinicians' experience, that this mode of medical involvement in management may operate without undue conflict in the longer term if: (a) clinicians accept the degree of local professional regulation that this model applies; and (b) the conflict between medical need and available resource can be dealt with elsewhere in the system without passing it back to hospitals and clinical directorates. On the other hand it is possible that conflict will increase if the consequences of management control systems and objectives percolate down through the management hierarchy and cross into the medical domain, via clinical directorates.
APA, Harvard, Vancouver, ISO, and other styles
8

Salwin, Mariusz, Ilona Jacyna-Gołda, Andrzej Kraslawski, and Aneta Ewa Waszkiewicz. "The Use of Business Model Canvas in the Design and Classification of Product-Service Systems Design Methods." Sustainability 14, no. 7 (April 4, 2022): 4283. http://dx.doi.org/10.3390/su14074283.

Full text
Abstract:
The implementation of Product-Service Systems (PSS) calls for the modification of existing business models. The goal of the paper is to work out an analysis and a classification of PSS design methods used in the development of new business models. Using a systematic review method, we identified 60 PSS design methods. Following the examination of the major business model templates, we selected the Business Canvas Model for further studies. Then, coding rules were adopted to specify what elements of the Business Model Canvas impacts individual PSS design methods and an analysis was performed. In the final stage, methods were broken down by Business Model Canvas domains. Various PSS design methods presented in the literature address different areas of Business Model Canvas. The available PPS methods can be classified into three main groups: Group 1—including infrastructure and offering; Group 2—including infrastructure, offering and customers; and Group 3—including infrastructure, offering, customers and finance. Very few methods consider areas such as Key Partners, Customer Segments, Cost Structure and Revenue Streams. Nevertheless, there is no PPS design method that would address all of Business Model Canvas building blocks. The paper discusses PSS design in business model context. Classification of PSS design methods was proposed together with new possibilities to develop business models based on this classification. The proposed approach illustrates the combination of PSS design methods applied in food processing and agricultural machines industry.
APA, Harvard, Vancouver, ISO, and other styles
9

Geppert, Mike, and Dirk Matten. "Institutional Influences on Manufacturing Organization in Multinational Corporations: The ‘Cherrypicking’ Approach." Organization Studies 27, no. 4 (November 1, 2005): 491–515. http://dx.doi.org/10.1177/0170840605059452.

Full text
Abstract:
Research on the multinational corporation (MNC) is increasingly concerned with the alleged evolution of companies towards a more standardized and rationalized global organization. Only recently, this field has been informed by alternative approaches which generate a more differentiated picture and consider the influence of divergent national institutional contexts on the multinational organization. This paper makes a contribution to this debate from a comparative institutionalist perspective by focusing on manufacturing organization within MNCs. It argues that organization structures and processes in MNCs are sector specific and influenced by national institutional features of the home and host countries. Drawing on data from a specific industrial sector, it identifies the crucial role of home country and host country embeddedness in the (re)organization of manufacturing tasks and work systems. The key question is how actors shape the interaction of these institutional pressures and, hence, manufacturing approaches, location choices and work system designs. Research in British and German subsidiaries of three MNCs suggests that, particularly at subsidiary level, MNCs apply a ‘cherrypicking’ strategy of selected use of work system elements, shaped by the host country business system. It is shown that manufacturing strategies of MNCs originating from highly coordinated business systems are highly context specific and difficult (if not impossible) to transfer elsewhere. Moreover, ‘cherrypicking’ strategies in subsidiaries embedded in such contexts turned out to be highly problematic, especially when managers attempt to combine them with group-wide standardizing work systems.
APA, Harvard, Vancouver, ISO, and other styles
10

Melnyk, Tetiana, Svitlana Melnychenko, and Natalya Reznikova. "THE CONCEPTUAL FRAMEWORK FOR THE OPERATION OF FINANCIAL SYSTEMS IN THE CONTEXT OF GLOBAL STRUCTURAL TRANSFORMATIONS OF BUSINESS MODELS OF BANKING." Baltic Journal of Economic Studies 5, no. 4 (October 29, 2019): 148. http://dx.doi.org/10.30525/2256-0742/2019-5-4-148-154.

Full text
Abstract:
The authors reveal fundamental tendencies of banks financial intermediation especially in the sphere of shadow banking and off-balance writes-off. Substantial transformations of financial system structure caused by liberalization of financial legislation, invention of brand new financial instruments and special risk-transferring schemes (special purpose entities via special investment vehicles) and the gradual process of banking universalization specifically the approximation of business models conducted by traditional commercial and investment banks created grounds for the review of current approaches to financial systems classification. The objective of the study is to identify operative patterns and specifics of financial systems in the context of global structural transformations of business models in the bank sector. Methodology. The methodological basis of the study is formed by theoretical works of foreign and domestic experts on issues related with financial systems worldwide, and the statistical data on the operation of banks in various countries, normative documents of prominent international economic institutions. The general scientific methods of analysis and synthesis, abstraction, quantitative and qualitative comparisons, descriptive analysis, analysis of the current performance of the financial system are used in elaborating theoretical and methodological framework for the typology of national financial systems by position and role played by banks in the financial system. Results. The central objective of the financial system is to transfer temporarily free financial resources from its actors that have their surplus to the ones that feel the deficit of funds. National financial systems can, therefore, be classified by the way domestic companies raise funds they need.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Business systems in context not elsewhere classified"

1

(9791897), Ian De Vera. "An ICT adoption model for SMEs in the Philippines: Insights from the hospitality sector." Thesis, 2022. https://figshare.com/articles/thesis/An_ICT_Adoption_Model_for_SMEs_in_the_Philippines_Insights_from_the_Hospitality_Sector/21902268.

Full text
Abstract:
This thesis explores the drivers that encourage small and medium enterprises (SMEs) in the hospitality industry in the Philippines to adopt information and communications technologies (ICTs) for their business operations during the 2020-21 COVID-19 pandemic. Despite having the distinction of being strategically located within the Asia-Pacific region, a bustling centre for world trade and commerce, an expansive melting pot of human resources and a prominent hub for agile technologies and innovations, Philippine SMEs are functioning below expectations in terms of their contribution to the country’s macroeconomy compared to other SMEs in the Asia-Pacific region. Literature highlights ICT adoption in SMEs can lead to improved business performance. Consequently, an examination of drivers or factors influencing ICT adoption in Philippine SMEs is now crucial. A systematic review of the literature on technology adoption in SMEs reveals only two studies from the Philippines out of a total of 185 studies done on the Asia-Pacific region. This clearly highlights the gap in research on SMEs in the Philippines. Further, SMEs throughout the world have been the hardest hit during the COVID-19 pandemic with huge losses and business closures. The hardest hit were the tourism and tourism-allied industries such as hospitality businesses, as governments around the world imposed lockdowns limiting travel and mobility to curtail the rapid spread of the disease. COVID-19 restrictions are likely to impact ICT adoption, and currently the published literature on ICT adoption during the pandemic in the hospitality sector SMEs is scarce. This thesis aims to address these identified research gaps in literature and develop an ICT adoption model for hospitality sector SMEs in the Philippines. Employing an exploratory sequential mixed-methods approach, this research commenced with 10 in-depth qualitative interviews with ICT implementation experts and experienced professionals working in the government and industry sectors. The findings of the qualitative study informed the design of the subsequent quantitative phase involving a survey of 154 SMEs in the hospitality industry in the Philippines. Results of the qualitative and quantitative phases were integrated to develop an ICT adoption model for Philippine SMEs. Findings of the mixed-method study revealed novel factors specific to the Philippines (e.g., Filipino culture, Philippine infrastructure and development, and local external change agents), and preparedness-related factors (i.e., perceived utility of ICTs for adapting to COVID-19, and perceived utility of ICTs for disaster preparedness) influencing ICT adoption in that country’s SMEs. These new insights were in addition to factors already identified in the literature on the technology, organisation and environment or the TOE model devised by Tornatzky, Fleischer and Chakrabarti (1990). This thesis reports 16 significant drivers for ICT adoption in Philippine SMEs, namely: technological (relative advantage, perceived ease of use, and cost of the technology), organisational (top management support, resources, awareness, attitude and end user skill ), environmental (market forces, service providers’ competence and support, government intervention, and social or external pressure), Philippine-specific (Philippine infrastructure and development, and local external change agents) and preparedness-related (perceived utility of ICTs for adapting to COVID-19, and perceived utility of ICTs for disaster preparedness). The findings suggest it is necessary and urgent for ICT developers to produce solutions that not only benefit SMEs but also not costly to the extent that they will not be able to maximise their benefits such as adapting to COVID-19 and natural calamities. Further, the government and other change agents have important roles to play in terms of improving the infrastructure needed for interconnectivity, increasing awareness of the relative advantage of ICTs in business and developing end-user skills through training and education.
APA, Harvard, Vancouver, ISO, and other styles
2

(7042784), Mohammed S. Alyakoob. "The Economics of Geographic and Demographic Heterogeneity in Digitally Transformed Markets." Thesis, 2019.

Find full text
Abstract:
The digital transformation of markets can remove traditional geographic restrictions, democratizing access to previously unattainable products, and enable individuals to extract rent from their personal assets. However, these digital innovations often have competitors and complementors that are not immune to the impact of local factors such as the local market structure, economic condition, and even demographics. This dissertation examines the geographic and demographic heterogeneity driven disparities in two digitally transformed markets, the financial and accommodations sectors respectively.

First, we study the impact of local financial market competition in managing online peer-to-peer loans. With the boom of financial technologies (FinTech), a critical question is whether the local financial market structure still matters. Unlike traditional retail financial institutions that are predominantly territorial, FinTech-based platforms, in particular peer-to-peer (P2P) lending, provide individuals equal access to funds by removing typical geographic restrictions. Combined with other benefits such as ease-of-use and lower interest rates, P2P lenders are increasingly threatening the traditional local lenders. A largely unanswered question in the literature is whether the local retail financial institutions strategically respond to the rise of such P2P platforms. Moreover, if the strategic reaction of traditional institutions continues the legacy of being territorial, borrowers will ultimately gain unevenly from the competition. That is, where a borrower lives may still matter. In this chapter, we devise multiple strategies to empirically analyze the extent and nature of the strategic response of traditional institutions to P2P lending. This includes: (1) utilization of a Probit model that leverages the richness of our local market data and (2) exploitation of bank mergers as exogenous shocks to local market structure. We find consistently that a borrower from a more competitive market is more likely to prepay, suggesting that local market structure plays a pivotal role in P2P borrowers' debt management. We validate the underlying mechanism by studying the improving credit profiles of borrowers and platforms' (exogenous) changes in pricing in moderating the main effect. This mechanism reveals that traditional banks, especially when their local market conditions support, credibly responds to the growth of P2P and are successful in attracting consumers back to traditional financial products. Relatedly, we document heterogeneity in the benefits that borrowers gain from the local market structure (using a machine learning algorithm) and verify the robustness of our main findings. We discuss the implications for P2P lending, other crowd-based markets, and local retail financial markets.

Second, we examines the heterogeneous economic spillover effects of a home sharing platform---Airbnb---on the growth of a complimentary local service---restaurants. By circumventing traditional land-use regulation and providing access to underutilized inventory, Airbnb is attracting visitors of a city to vicinities that are not traditional tourist destinations. Although visitors generally bring significant spending power, it is, however, not clear if the visitors use Airbnb primarily for lodging, thus, not contributing to the adjacent vicinity economy. To evaluate this, we focus on the impact of Airbnb on the restaurant employment growth across vicinities in New York City (NYC). Our results indicate that if the intensity of Airbnb activity (Airbnb reviews per household) increases by 1\%, the restaurant employment in an average area grows by approximately 1.03\%. We also investigate the role of demographics and market concentration in driving the variation. Notably, restaurants in areas with a relatively high number of Black residents do not benefit from the economic spillover of Airbnb activity. Also, restaurants in more competitive areas reap the benefit from this spillover most. We validate the underlying mechanism behind the main result by evaluating the impact of Airbnb on Yelp visitor reviews -- areas with increasing Airbnb activity experience a surge in their share of NYC visitor reviews. This result is further validated by evaluating the impact of a unique Airbnb neighborhood level policy recently implemented in New Orleans.
APA, Harvard, Vancouver, ISO, and other styles
3

Ng, Lena Kay Lin. "Exploring management control systems using the resource-based view : a case study of the balanced scorecard." 2006. http://arrow.unisa.edu.au:8081/1959.8/46354.

Full text
Abstract:
This thesis critically analyses the definitions of strategy within the management control literature, the relationship between resource-based view of strategy and the balanced scorecard, as well as the impact of these on manager's perceived performance. Contingency theory has been used as the overall framework for this thesis. The thesis discusses the interaction between changes in management control systems and organisational changes through the use of the Laughlin framework and the three mechanisms of institutional isomorphic suggested by DiMaggio and Powell.
APA, Harvard, Vancouver, ISO, and other styles
4

(9809054), Raghavendra Kankanady. "Information economics: The disconnect between information communication technology and strategic intent." Thesis, 2020. https://figshare.com/articles/thesis/Information_economics_The_disconnect_between_information_communication_technology_and_strategic_intent/13416416.

Full text
Abstract:
The dynamic nature and rapid evolution of Information and Communications Technology (ICT) in the last decade (which is also referred to as the digital revolution or industrial revolution 4.0) has given little time for organisations to evaluate the nature of the technological change to their business. This research project aims to identify if there is a disconnection between organisational strategic intent and ICT use, such as, analyze ICT adoption and use issues from various perspectives concerning digital evolution, strategic outcomes and long-term objectives of the organisation, and report findings. The study also aims to identify the alignment factors for technology use with strategic intent. In today's digital age, the healthcare industry has been undergoing a transformational change in patient care pathways and patient safety with the help of digital technologies. Digital technologies such as electronic medical records, mobile applications, telehealth, assisted diagnosis, and prevention have been changing the ways healthcare services are being delivered to patients. But little success has been achieved in implementing these transformations due to the complexity of ICT requirements in healthcare. This challenge in achieving successful digital transformation has given rise to a knowledge gap requiring further research. Until now, a review of the literature reveals few studies have been undertaken to understand connections and disconnections between strategic intent and technology use in healthcare. Therefore, this study aims to understand if there is a disconnect between organisational strategic intent and technology used in the digital age. The primary audience for this research is senior policy and decision-makers in healthcare and senior ICT staff. This research is designed to understand the technology use and its impact on organisational strategic intent from the perspective of clinical staff, non-clinical staff, and executive management. The multi-stage mixed-method design has been used in this study. The findings indicate that technology should be part of strategic intent, and technology adoption should flow from the edge inwards. The findings will enhance the delivery of digital transformation initiatives in healthcare and enable more successful digital transformations with lesser technology adoption, and use issues.
APA, Harvard, Vancouver, ISO, and other styles
5

(9576107), Ananya B. Sheth. "PATHWAYS TO ENTERPRISE RESILIENCE." Thesis, 2021.

Find full text
Abstract:

Resilience is studied as a systemic property in several disciplines such as engineering, psychology, systems biology, and ecological sciences. Yet, the system view on resilience is not pervasive in management science. This dissertation is on Enterprise Resilience, which is an emerging topic within the fields of organization and management science. Corporate enterprises are viewed as type 1 complex adaptive systems (CAS) operating within an external business environment. Thus, perturbations occurring in the environment affect enterprises, whose resilience then depends on their adaptive response to them. Therefore, the focus is on system perturbances and on investigating drivers of the enterprises’ adaptive response. As a result, enterprise resilience is more granularly defined as an enterprise’s ability to continually remain valuable to stakeholders by simultaneously managing short-term shocks and long-term stressors. This re-definition brings forth an actionable pathway to enterprise resilience- the pursuit of improved management of the enterprise’s risk and growth management functions.

Two challenging issues plaguing the risk and growth functions are the lack of a comprehensive understanding of risks (especially of unknowns) and their inter-connections, and a weak link between risk management and the enterprise’s growth strategy intended to continually and increasingly generate value. This work addresses both issues via the development of an enterprise-agnostic comprehensive risk typology, and by building a conceptual link between risk and growth strategy through the business model construct and its use in the study of repeatable patterns of innovation. Therefore, this work develops one pathway toward enterprise resilience i.e., via improved risk management and systematic growth management. Furthermore, it advances knowledge by bridging the theoretical conceptualization of an enterprise as a CAS1 into actionable methods for practice in the form of risk management tools and systematic innovation frameworks that aid the enterprise’s adaptive response.

The interdisciplinary dissertation develops hypotheses and employs appropriate qualitative and quantitative methods to test them. Overall, a theory building process is undertaken using the constructionist school of thought and using methods based in inductive logic such as the scholarship of integration, thematic analysis, and case studies. Additionally, to achieve wide and comprehensive coverage, data-driven quantitative methods using advanced computing such as data mining, machine learning, and natural language processing are employed.

APA, Harvard, Vancouver, ISO, and other styles
6

(7659032), Zachary Brooks Smith. "DIGITAL TWIN: FACTORY DISCRETE EVENT SIMULATION." 2019.

Find full text
Abstract:
Industrial revolutions bring dynamic change to industry through major technological advances (Freeman & Louca, 2002). People and companies must take advantage of industrial revolutions in order to reap its benefits (Bruland & Smith, 2013). Currently, the 4th industrial revolution, industry is transforming advanced manufacturing and engineering capabilities through digital transformation. Company X’s production system was investigated in the research. Detailed evaluation the production process revealed bottlenecks and inefficiency (Melton, 2005). Using the Digital Twin and Discrete Event Factory Simulation, the researcher gathered factory and production input data to simulate the process and provide a system level, holistic view of Company X’s production system to show how factory simulation enables process improvement. The National Academy of Engineering supports Discrete Event Factory Simulation as advancing Personalized Learning through its ability to meet the unique problem solving needs of engineering and manufacturing process through advanced simulation technology (National Academy of Engineering, 2018). The directed project applied two process optimization experiments to the production system through the simulation tool, 3DExperience wiht the DELMIA application from Dassualt Systemes (Dassault, 2018). The experiment resulted in a 10% improvement in production time and a 10% reduction in labor costs due to the optimization
APA, Harvard, Vancouver, ISO, and other styles
7

Dobson, Toby. "Mitigation of political risk in the IT sector in Panama." 2008. http://arrow.unisa.edu.au:8081/1959.8/50731.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

(8771429), Ashley S. Dale. "3D OBJECT DETECTION USING VIRTUAL ENVIRONMENT ASSISTED DEEP NETWORK TRAINING." Thesis, 2021.

Find full text
Abstract:

An RGBZ synthetic dataset consisting of five object classes in a variety of virtual environments and orientations was combined with a small sample of real-world image data and used to train the Mask R-CNN (MR-CNN) architecture in a variety of configurations. When the MR-CNN architecture was initialized with MS COCO weights and the heads were trained with a mix of synthetic data and real world data, F1 scores improved in four of the five classes: The average maximum F1-score of all classes and all epochs for the networks trained with synthetic data is F1∗ = 0.91, compared to F1 = 0.89 for the networks trained exclusively with real data, and the standard deviation of the maximum mean F1-score for synthetically trained networks is σ∗ F1 = 0.015, compared to σF 1 = 0.020 for the networks trained exclusively with real data. Various backgrounds in synthetic data were shown to have negligible impact on F1 scores, opening the door to abstract backgrounds and minimizing the need for intensive synthetic data fabrication. When the MR-CNN architecture was initialized with MS COCO weights and depth data was included in the training data, the net- work was shown to rely heavily on the initial convolutional input to feed features into the network, the image depth channel was shown to influence mask generation, and the image color channels were shown to influence object classification. A set of latent variables for a subset of the synthetic datatset was generated with a Variational Autoencoder then analyzed using Principle Component Analysis and Uniform Manifold Projection and Approximation (UMAP). The UMAP analysis showed no meaningful distinction between real-world and synthetic data, and a small bias towards clustering based on image background.

APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Business systems in context not elsewhere classified"

1

Winter, Alfred, Elske Ammenwerth, Reinhold Haux, Michael Marschollek, Bianca Steiner, and Franziska Jahn. "Technological Perspective: Architecture, Integration, and Standards." In Health Information Systems, 51–152. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-12310-8_3.

Full text
Abstract:
AbstractHealth information systems can be described at three layers: The domain layer describing entity types and functions, the logical tool layer describing application components, and the physical tool layer. Data can be classified into personal and non-personal data and into standardized and non-standardized data.The architectures of an information system can be characterized by the number of databases, the number of application systems, the number of application software products and vendors, and the communication pattern.Technical interoperability describes the ability of application systems to send or receive data. Syntactic interoperability comprises the ability to use predefined message structures. Semantic interoperability means the ability to exchange and process meaningful messages. Process interoperability addresses whether application systems can cooperate. Interoperability standards support one or more aspects of interoperability.Integrating application systems leads to integrated health information systems. Data integration is achieved when data that have been recorded once in one application system are made available in other application systems. Semantic integration is achieved when application systems actually use the same system of concepts. User interface integration is guaranteed when different application systems organize their user interfaces in a unified way. Context integration is achieved when context is preserved when switching application systems. Feature integration is achieved when software features are implemented only once. Process integration is guaranteed when business processes are supported by cooperating application systems.Several integration technologies such as transaction management, communication servers, and open platforms support integrity and integration in heterogeneous health information systems.
APA, Harvard, Vancouver, ISO, and other styles
2

Ravasan, Ahad Zare, and Sogol Rabiee Savoji. "An Investigation of BI Implementation Critical Success Factors in Iranian Context." In Business Intelligence, 1935–51. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9562-7.ch096.

Full text
Abstract:
Nowadays, many organizations take Business Intelligence (BI) systems to improve their decision-making processes. Although many organizations have adopted BI systems, not all of these implementations have been successful. This paper seeks to identify critical success factors (CSFs) that impact on successful implementation of BI systems in organizations. So, at first, through literature review, 26 CSFs were identified. Following that, a questionnaire was developed and then filled out by domain experts who had at least three years of experience in BI implementation projects in Iran. Robust Exploratory Factor Analysis (EFA) was run for data analysis, which finally classified 26 CSFs into four distinct groups termed as “organizational”, “human”, “project management”, and “technical”. The results of this study provide a very useful reference for scholars and managers to identify the relevant issues of BI projects in Iran.
APA, Harvard, Vancouver, ISO, and other styles
3

Junior, Manuel Rocha Fiuza Branco, Cássio Luís Batista, Marco Elisio Marques, and Claudio Roberto Magalhães Pessoa. "Business Models Applicable to IoT." In Advances in Business Strategy and Competitive Advantage, 21–42. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7265-7.ch002.

Full text
Abstract:
Business models have been analyzed in the context of the information technology economy and are aligning the idea of innovation developing with the economy or, in other words, business aligning technology and market. Some care must be taken on the transformation of the Information Systems through the introduction of the new unique IoT offers in many fields. For the IoT systems, a complex value stack needs to be addressed in order to realize the possibilities on the innovation in the services. This induces specific requirements when it comes to designing IoT business models. IoT enables new business models, which create value by connecting existing and new things together to establish new business processes, increase business efficiency, enable greater innovation and drive improved visibility across an organization. To be successful, information systems need to consider all the layers of value creation in order to enable the collection of information with the agility needed in the modern world of business. This chapter highlights the IoT systems, its features and market expectations. It also suggests the existence of two classes of business models for IOT, the Digitally Loaded Product and another classified as Sensor as a Service, which address the uniqueness of IoT.
APA, Harvard, Vancouver, ISO, and other styles
4

Park, William W. "Judicial Supervision as Risk Management." In Arbitration of International Business Disputes, 143–84. Oxford University PressOxford, 2006. http://dx.doi.org/10.1093/oso/9780199286904.003.0003.

Full text
Abstract:
Abstract The genesis of the material in this section derives from a decades-old debate about the extent to which an arbitral award’s validity should depend on the law of the country where the proceedings are held. The problem is complex not only because it implicates several legal systems, but also because the place of arbitration sometimes represents a legal fiction. An “arbitral seat” is often designated (by the contract or the arbitral institution) to serve as the official venue at which the award is deemed made, notwithstanding that hearings and deliberations unfold elsewhere for the convenience of witnesses, counsel, and arbitrators. The context for this well-known line from Juvenal’s Sixth Satire has been all but forgotten, perhaps wisely so. In suggesting that husbands lock up their wives to safeguard their chastity (seemingly a preoccupation in ancient Rome) Juvenal slyly adds, “But who will guard the guards themselves? Your wife is as cunning as you, and begins with them.” Sed quis custodiet ipsos Custodes? Cauta est et ab illis incipit uxor. See Juvenal, Satires VI(The Ways of Women), 347.
APA, Harvard, Vancouver, ISO, and other styles
5

Hurson, Ali R., and Xing Gao. "Location-Based Services." In Electronic Services, 759–66. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-967-5.ch046.

Full text
Abstract:
The past decade has seen advances in wireless network technologies and an explosive growth in the diversity of portable computing devices such as laptop computers, handheld personal computers, personal digital assistants (PDAs), and smart phones with Internet access. Wireless networking technologies and portable devices enable users to access information in an “anytime, anywhere” fashion. For example, a mobile user (MU) on the highway may query local weather, traffic information, nearby gas stations, next rest areas, or restaurants within 10 miles. Such new demands introduce a new type of services, location-based services (LBS), where certain location constraints (e.g., the user’s current location) are used in the service provision. The idea of queries with location constraints is originally introduced by Imielinski and Badrinath (1992), in which mobile users are likely to query information relating to their current positions, leading to the need for LBS. Such services are also termed as location dependent information services (LDIS) in Lee, Lee, Xu, and Zheng (2002). LBS system is the context sensitive systems in a mobile computing environment that consider the user’s location as a significant and dynamic factor affecting the information and services delivered to the users. The major LBS applications include: • Destination guides with maps, driving directions, and real time prompt • Location-based traffic and weather alerts • Wireless advertising and electronic coupons to nearby mobile devices • Movie, theatre and restaurant location and booking • Store locating applications helping users to find the desired services • Telematics-based roadside assistance (e.g., OnStar from General Motors) • Personal content and messaging (Live Chat with friends) • Mobile Yellow Pages provide local information • Information Services (News, Stocks, Sports) • E911: (Wireless carriers provide wireless callers’ numbers and locations.) Generally, LBS services can be classified into three general categories: telematics LBS, Internet LBS, and wireless LBS (Telc). Telematics LBS is the integration of wireless communications, vehicle monitoring systems, and location devices. Telematics LBS applications include automated vehicle location, fleet tracking, online navigation, and emergency assistance. For example, a trucking company can track all their fleet, proactively warn about traffic ahead, and estimate the arrival time. Commercial LBS providers are beginning to offer important management applications that help direct vehicle fleets and ensure optimal usage of key assets. Telematics LBS is a multibillion dollar service industry and is currently the largest segment of the LBS market (Telc). Internet LBS provide Internet users the services relevant to their specified locations. Because they use a user-specified location instead of the user’s current location, no positioning technology is required. For example, one can find turn-by-turn driving direction from one location to another and search for tour information about the destination. These services are targeting applications with stationary users, relatively powerful computers, and reliable network connections. As a result, Internet LBS support sophisticated services, such as local business searching and comparison, trip planning, online virtual tours, and so forth. Wireless LBS deliver location relevant content to cell phones, PDAs, and other wireless devices. Equipped with automated positioning technologies, MUs can query local weather, nearby traffic information, and local businesses close to them. For example, a user can search neighboring post office or coffer shop from the PDA. The wireless LBS market is currently in a nascent stage, but it will potentially become the largest segment of the LBS market. The deployment of third generation (3G) mobile network, which support handsets that are both mobile and location sensitive, will lead to more wireless LBS subscribers and more useful LBS applications.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Business systems in context not elsewhere classified"

1

Alwaheidi, Mohammed, Shareeful Islam, Spyridon Papastergiou, and Kitty Kioskli. "Integrating Human Factors into Data-driven Threat Management for Overall Security Enhancement." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004778.

Full text
Abstract:
Human and other non-technological issues are often overlooked, which directly and indirectly contributing to many successful cyber attacks, including DoS, social engineering, download-driven attacks, and more. Considering human issues as causes for internal threats and weaknesses, a deeper understanding of these factors is essential for overall security enhancement. Therefore, organizations of all sizes need to ensure a broad range of knowledge, skills, and awareness among all user levels, from individual end-users to security practitioners. However, this task is challenging due to the evolving nature of business, systems, and threat contexts. To address this challenge, our research represents a significant advancement in holistic and comprehensive threat assessments, surpassing existing practices by considering pertinent human factors. Our approach views humans as potential weaknesses or threats, influenced by various factors. Specifically, it incorporates key human elements, such as motivation, knowledge, context, and privilege, into the threat management process to enhance overall security. These factors are systematically classified and interconnected, facilitating the identification of weaknesses and threats posed by humans within the system context. For example, depending on the context, privilege can be categorized into three levels: organizational, departmental, and unprivileged, with end-user privileges falling into these classifications. Knowledge, as a human factor in this approach, is differentiated into technological and security awareness. Our proposed approach extends data-driven threat modeling by integrating human factors to identify and assess threats related to these factors. We present a conceptual model that combines human factors with cybersecurity concepts, including data, assets, threats, weaknesses, and controls, to assess and manage threats associated with human factors and evaluated from both insider weaknesses and threat perspectives. This contributes significantly to overall security enhancement, including improving the accuracy of threat assessments, identifying new threats, and developing more effective threat mitigation strategies.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography