Dissertations / Theses on the topic 'Management Sciencees'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Management Sciencees.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Albrecht, Chad Orsen. "International fraud: A management perspective." Doctoral thesis, Universitat Ramon Llull, 2008. http://hdl.handle.net/10803/9196.
Full textEl primer article que presento en la meva tesi fou publicat al European Business Forum, una revista especialitzada patrocinada per la CEMS, que és llegida per més de 40.000 professionals dels negocis d'arreu d'Europa. Alguns dels diaris internacionals més importants, com ara el Times of London Newspaper, també citen aquest article a bastament. S'hi exposa per què i com es cometen els fraus.
El segon article que comento a la tesi es troba actualment en fase de "revisió i reenviament" al Journal of Business Ethics. Es tracta d'un journal sobre factors d'impacte, inclòs a la llista dels 40 millors journals de management que publica el Financial Times. Aquest article tracta de com les persones fan servir el poder per reclutar altres persones per tal que participin en el frau d'estats financers. Aquest segon article també es va sotmetre a la revisió d'àrbitres a l'edició 2007 de la European Academy of Management Conference que tingué lloc a París, França.
El tercer article que es presenta en la meva tesi fou publicat a The Journal of Digital Forensics, Security, and Law. També s'havia presentat prèviament a la XII Conferència Anual d'AMCIS amb revisors, que tingué lloc a Acapulco, Mèxic. La Conferència d'AMCIS és un dels principals congressos acadèmics que tracten dels camps relacionats amb els sistemes d'informació. Aquest tercer article analitza com els responsables de perpetrar el frau se serveixen dels principis i les estratègies de poder i negociació per enredar les persones per Internet perquè participin en projectes de frau.
El quart article que comento fou publicat a l'Information Systems Security Journal. Aquest journal fa 17 anys que el publica Taylor and Francis Publishing -una de les principals editorials de journals acadèmics-, i és la publicació oficial de CISSP i SSCP. L'article analitza les tendències actuals en matèria de frau i la seva detecció.
El cinquè article que es presenta fou publicat a la Corporate Finance Review. Aquest article tracta específicament del frau d'estats financers als Estats Units. També explica què pot fer Europa per aprendre dels errors comesos als Estats Units. La Corporate Finance Review és patrocinada per Thomson Education -una editorial líder en l'àmbit educatiu. Actualment, la revista es troba al 12è any de publicació.
Finalment, el darrer article que presento a la tesi és un comentari que es va fer sobre el tema del frau entre dos professors americans i jo mateix. Aquest diàleg es va publicar al Journal of Management, Spirituality, and Religion. El comentari tractava el tema de la relació entre organitzacions imbuïdes en la religió i el frau.
El objetivo de mi tesis es tratar de entender mejor los múltiples aspectos de la corrupción y el fraude internacionales desde la perspectiva del management. Para ello, proporciono un compendio de artículos, todos ellos publicados en journals con revisores, o bien que se hallan en proceso de publicación.
El primer artículo que presento en mi tesis fue publicado en el European Business Forum, una revista especializada patrocinada por la CEMS, que es leída por más de 40.000 profesionales de los negocios de toda Europa. Algunos de los diarios internacionales más importantes, como el Times of London Newspaper, también citan este artículo ampliamente. En él se expone por qué y cómo se cometen los fraudes.
El segundo artículo que comento en mi tesis se halla actualmente en fase de "revisión y reenvío" al Journal of Business Ethics. Se trata de un journal sobre factores de impacto, incluido en la lista de los 40 mejores journals de management que publica el Financial Times. Dicho artículo trata de cómo las personas se sirven del poder para reclutar a otras personas para que participen en el fraude de estados financieros. Este segundo artículo también fue sometido a la revisión de árbitros en la edición 2007 de la European Academy of Management Conference celebrada en París, Francia.
El tercer artículo que presento en mi tesis fue publicado en The Journal of Digital Forensics, Security, and Law. Asimismo, previamente se había presentado en la XII Conferencia Anual de AMCIS con revisores, celebrada en Acapulco, México. La Conferencia de AMCIS es uno de los principales congresos académicos que tratan de los campos relacionados con los sistemas de información. Este tercer artículo analiza cómo los responsables de perpetrar el fraude se sirven de los principios y estrategias de poder y negociación para enredar a persones por Internet para que participen en proyectos de fraude.
El cuarto artículo que comento fue publicado en el Information Systems Security Journal. Este journal es publicado desde hace 17 años por Taylor and Francis Publishing -una de las principales editoriales de journals académicos-, y es la publicación oficial de CISSP y SSCP. En dicho artículo se analizan las tendencias actuales en materia de fraude y su detección.
El quinto artículo que se presenta fue publicado en la Corporate Finance Review. Este artículo trata específicamente del fraude de estados financieros en Estados Unidos. També explica qué puede hacer Europa para aprender de los errores cometidos en Estados Unidos. La Corporate Finance Review cuenta con el patrocinio de Thomson Education -una editorial líder en el ámbito educativo. En la actualidad, la revista se halla en el 12.º año de publicación.
Finalmente, el último artículo que presento en mi tesis es un comentario sobre el tema del fraude, realizado entre dos profesores americanos y yo mismo. Dicho diálogo fue publicado en el Journal of Management, Spirituality, and Religion. El comentario trataba del tema de la relación entre organizaciones imbuidas en la religión y el fraude.
The purpose of my dissertation is to address and better understand the many aspects of International Fraud and Corruption from a Management Perspective. In my dissertation, I provide a compendium of publications. Each publication was published, or is in the process of being published, in a peer-review journal.
The first article that is presented in my dissertation was published in the European Business Forum, a CEMS sponsored journal that is read by more than 40,000 business professionals throughout Europe. Several major international newspapers, including the prestigious Times of London Newspaper, also quoted this article extensively. The article addresses why and how fraud are committed.
The second article that is presented in my dissertation is currently under "revise and resubmit" status at the Journal of Business Ethics. This journal is an impact factor journal and is included on the Financial Times list of top 40 management journals. The article addresses how individuals use power to recruit other people to participate in financial statement fraud. This second article was also presented at the peer review 2007 European Academy of Management Conference in Paris, France.
The third article that is presented in my dissertation was published in The Journal of Digital Forensics, Security, and Law. This article was also previously presented at the 12th annual peer-review AMCIS conference in Acapulco, Mexico. The AMCIS conference is one of the leading academic conferences within the information systems fields. This third article addresses how perpetrators use the principles and strategies of power and negotiation to con individuals via the Internet to participate in fraud schemes.
The fourth article presented in my dissertation was published in Information Systems Security Journal. This journal is currently in its 17th year of publication and is published by Taylor and Francis Publishing - one of the leading publishers in academic journals. This journal is also the official publication of the CISSP and SSCP. The article deals with current trends in fraud and its detection.
The fifth article that is presented in my dissertation was published in the journal Corporate Finance Review. This article specifically deals with financial statement fraud in the United States. The article further explains what Europe can do to learn from the mistakes of the United States. Thomson Education - a leader in educational publishing, is the sponsor of Corporate Finance Review. The journal is currently in its 12th year of publication.
Finally, the last article presented in my dissertation is a commentary that took place on the subject of fraud between two American professors and myself. The dialogue was published in the Journal of Management, Spirituality, and Religion. The topic of the commentary was on the relationship between organizations embedded in religion and fraud.
Nadrowski, Karin, Daniel Seifarth, Sophia Ratcliffe, Christian Wirth, and Lutz Maicher. "Identifiers in e-Science platforms for the ecological sciences." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-101319.
Full textYan, Kwan-shing, and 甄君成. "Management science: quenes in cinemas." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1996. http://hub.hku.hk/bib/B31267798.
Full textYan, Kwan-shing. "Management science : quenes in cinemas /." Hong Kong : University of Hong Kong, 1996. http://sunzi.lib.hku.hk/hkuto/record.jsp?B18024646.
Full textBrogliato, Marcelo Salhab. "Essays in computational management science." reponame:Repositório Institucional do FGV, 2018. http://hdl.handle.net/10438/24615.
Full textApproved for entry into archive by ÁUREA CORRÊA DA FONSECA CORRÊA DA FONSECA (aurea.fonseca@fgv.br) on 2018-08-24T16:29:40Z (GMT) No. of bitstreams: 1 brogliato-phd-thesis-v3-final.pdf: 19935806 bytes, checksum: df0caf31076cfec5c116e0b4c18346ee (MD5)
Made available in DSpace on 2018-08-27T13:54:00Z (GMT). No. of bitstreams: 1 brogliato-phd-thesis-v3-final.pdf: 19935806 bytes, checksum: df0caf31076cfec5c116e0b4c18346ee (MD5) Previous issue date: 2018-07-15
A presente tese é formada por três trabalhos científicos na área de Management Science Computacional. A gestão moderna e a alta tecnologia interagem em múltiplas e profundas formas. O professor Andre Ng diz aos seus estudantes na Escola de Negócios de Stanford que “Inteligência Artificial é a nova eletricidade”, como sua forma hiperbólica de enfatizar o potencial transformador da tecnologia. O primeiro trabalho é inspirado na possibilidade de que haverá alguma forma de dinheiro digital e estuda ledger distribuídas, propondo e analisando o Hathor, uma arquitetura alternativa para criptomoedas escaláveis. O segundo trabalho pode ser um item crucial no entendimento de tomadas de decisão, nos trazendo um modelo formal de recognition-primed decisions. Situada na intersecção entre psicologia cognitiva, ciência da computação, neuro-ciência e inteligência artifical, ele apresenta um framework open-source, multi-plataforma e altamente paralelo da Sparse Distributed Memory e analisa a dinâmica da memória e algumas aplicações. O terceiro e último trabalho se situa na intersecção entre marketing, difusão de inovação tecnologica e modelagem, extendendo o famoso modelo de Bass para levar em consideração usuário que, após adotar a tecnologia por um tempo, decidiram rejeitá-la.
This thesis presents three specific, self-contained, scientific papers in the Computational Management Science area. Modern management and high technology interact in multiple, profound, ways. Professor Andrew Ng tells students at Stanford’s Graduate School of Business that “AI is the new electricity”, as his hyperbolic way to emphasize the potential transformational power of the technology. The first paper is inspired by the possibility that there will be some form of purely digital money and studies distributed ledgers, proposing and analyzing Hathor, an alternative architecture towards a scalable cryptocurrency. The second paper may be a crucial item in understanding human decision making, perhaps, bringing us a formal model of recognition-primed decision. Lying at the intersection of cognitive psychology, computer science, neuroscience, and artificial intelligence, it presents an open-source, cross-platform, and highly parallel framework of the Sparse Distributed Memory and analyzes the dynamics of the memory with some applications. Last but not least, the third paper lies at the intersection of marketing, diffusion of technological innovation, and modeling, extending the famous Bass model to account for users who, after adopting the innovation for a while, decide to reject it later on.
Chada, Daniel de Magalhães. "From cognitive science to management science: two computational contributions." reponame:Repositório Institucional do FGV, 2011. http://hdl.handle.net/10438/17053.
Full textApproved for entry into archive by Kelly Ayala (kelly.ayala@fgv.br) on 2016-09-12T12:58:17Z (GMT) No. of bitstreams: 1 Chada 2011 FINAL ENTREGUE.pdf: 579283 bytes, checksum: f463590c20f51b84ba0f9357ab1a6e08 (MD5)
Approved for entry into archive by Kelly Ayala (kelly.ayala@fgv.br) on 2016-09-12T13:00:07Z (GMT) No. of bitstreams: 1 Chada 2011 FINAL ENTREGUE.pdf: 579283 bytes, checksum: f463590c20f51b84ba0f9357ab1a6e08 (MD5)
Made available in DSpace on 2016-09-12T13:03:31Z (GMT). No. of bitstreams: 1 Chada 2011 FINAL ENTREGUE.pdf: 579283 bytes, checksum: f463590c20f51b84ba0f9357ab1a6e08 (MD5) Previous issue date: 2011
This work is composed of two contributions. One borrows from the work of Charles Kemp and Joshua Tenenbaum, concerning the discovery of structural form: their model is used to study the Business Week Rankings of U.S. Business Schools, and to investigate how other structural forms (structured visualizations) of the same information used to generate the rankings can bring insights into the space of business schools in the U.S., and into rankings in general. The other essay is purely theoretical in nature. It is a study to develop a model of human memory that does not exceed our (human) psychological short-term memory limitations. This study is based on Pentti Kanerva’s Sparse Distributed Memory, in which human memories are registered into a vast (but virtual) memory space, and this registration occurs in massively parallel and distributed fashion, in ideal neurons.
Este trabalho é composto de duas contribuições. Uma se usa do trabalhode Charles Kemp e Joshua Tenenbaum sobre a descoberta da forma estrutural: o seu modelo é usado para estudar os rankings da revista Business Week sobre escolas de administração, e para investigar como outras formas estruturais (visualizações estruturadas) da mesma informação usada para gerar os rankings pode trazer discernimento no espaço de escolas de negócios nos Estados Unidos e em rankings em geral. O outro ensaio é de natureza puramente teórica. Ele é um estudo no desenvolvimento de um modelo de memória que não excede os nossos (humanos) limites de memória de curto-prazo. Este estudo se baseia na Sparse Distributed Memory (Memória Esparsa e Distribuida) de Pentti Kanerva, na qual memórias humanas são registradas em um vasto (mas virtual) espaço, e este registro ocorre de forma maciçamente paralela e distribuida, em neurons ideais.
Layouni, Mohamed. "Privacy-preserving personal information management." Thesis, McGill University, 2010. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=86764.
Full textIn this thesis we provide techniques to enhance users' privacy, and to give them greater control over their data. We propose a protocol allowing users to authorize access to their remotely-stored records, according to a self-chosen privacy policy, and without the storage server learning the access pattern to their records, or the index of the queried records. This prevents the storage server from linking the identity of the party retrieving a record to that of the record owner. In many applications, the association between the identity of the record retriever and that of the record owner represents sensitive information, and needs to be kept private. The proposed protocol is called Accredited Symmetrically Private Information Retrieval (ASPIR), and uses Brands's Anonymous Credentials [Bra00] and a Symmetrically Private Information Retrieval (SPIR) scheme by Lipmaa [Lip05], as building blocks.
Next, we extend the above ASPIR protocol to a setting where the stored records belong to multiple owners simultaneously. The new protocol, called Multi-Authorizer ASPIR, allows the owners of a record to authorize access to their data according to a self-chosen privacy policy, without the storage server learning the access pattern to their record. We present constructions for settings where the retrieving party has to provide authorizations either from all the owners of the target record, or from a subset of them of size greater that a certain threshold. We also consider the case of a General Access Structure, where the retrieval is allowed only if authorizations from certain pre-defined subsets of the owners are provided. The Multi-authorizer ASPIR protocol is more efficient than ASPIR, and can be built with any SPIR primitive.
Finally, we dedicate the last part of the thesis to applying privacy preserving techniques to a real world problem. In particular, we consider the area of e-health, and provide a privacy-preserving protocol for handling prescriptions in the Belgian healthcare system.
La prolifération des services électroniques a eu des retombées positives sur nos sociétés. Les technologies de l'information ont révolutionné divers domaines clé de notre vie, notamment les services gouvernementaux, les affaires, la santé, les transports, les communications et l'éducation. Souvent, le passage au numérique, a rendu les services plus accessibles, plus rapides, plus faciles à utiliser et socialement plus inclusifs. Cependant, avec ces améliorations sont apparus aussi de nouveaux problèmes. En effet, l'utilisation des services électroniques au quotidien, et la collecte massives de données transactionnelles sur les utilisateurs, ont conduit à l'établissement de ce qu'on appelle communément les "dossiers électroniques". Un dossier électronique est une compilation de données personnelles récoltées lorsqu'un individu effectue des transactions électroniques ou reçoit des services. Ces dossiers sont de plus en plus utilisés par le gouvernement et les corporations pour prendre des décisions importantes sur les individus, sans que ces derniers ne soient capables d'y participer.
Cette thèse présente des techniques pour protéger davantage la vie privée des citoyens et leur donner plus de contrôle sur leurs données. On propose, entre autres, un protocole pour permettre à des utilisateurs d'autoriser l'accès à leurs données, sauvegardées sur un serveur distant, sans que celui-ci n'apprenne d'informations sur la fréquence et la distribution des accès, ou même sur l'indice des données récupérées. Ceci empêche le serveur d'établir des liens entre l'identité d'un propriétaire de données, et celle de l'agent qui a demandé l'accès à ses données. On peut penser à une multitude de scénarios où la divulgation de l'existence d'un tel lien est non souhaitable. Le protocole qu'on propose est nommé ASPIR de l'Anglais (Accredited Symmetrically Private Information Retrieval), et utilise les systèmes de certification de Brands [Bra00], ainsi que le système SPIR de Lipmaa [Lip05].
Dans un deuxième temps, on généralise le protocole ASPIR initial à un environnement où les entrées appartiennent à plusieurs parties. Le nouveau protocole, nommé Multi-Authorizer ASPIR, permet aux propriétaires d'autoriser l'accès à leurs données selon une politique qu'ils ont eux même choisie, et sans que le serveur n'apprenne des informations sur la fréquence et la distribution des accès. On présente des constructions pour des scénarios où le demandeur de données doit fournir une autorisation de la part de tous les (respectivement une partie des) propriétaires. Le protocole, Multi-authorizer ASPIR, est plus performant, et peut être implanté avec n'importe quel système SPIR.
Enfin, la dernière partie de la thèse est dédiée à l'application des techniques de protection de la vie privée à un exemple concret de la vie courante. L'exemple qu'on traite appartient au domaine de la santé. On présente alors un protocole pour gérer les ordonnances médicales, qui est compatible avec le système de santé Belge. Le protocole proposé préserve la vie privée des patients et des médecins.
Huang, Jianyuan. "Computer science graduate project management system." CSUSB ScholarWorks, 2007. https://scholarworks.lib.csusb.edu/etd-project/3250.
Full textSeromo, M. "Academic excellence office in the faculty of management sciences." Tshwane University of Technology, 2013. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001653.
Full textDavids, Steven Emlyn. "A soft systems approach to social sciences projects." Thesis, Stellenbosch : Stellenbosch University, 2001. http://hdl.handle.net/10019.1/52133.
Full textENGLISH ABSTRACT: This paper asks the question: "Is the Guide to the PMBOICs method appropriate for doing projects of a social science character?" Inthis enquiry extensive use is made ofliterature that is available via the world wide web. This paper follows the school of thought that regards the world as a complex set of interrelated systems. Humans as social beings are an integral part of these complex systems. In order to do justice to human endeavours, one must understand the systems in which humans operate and interpret all human undertakings in relation to those systems. Three broad types of systems approaches to project management are distinguished. A common underlying principle of all three approaches is that they regard social systems as complex, highly volatile and in constant flux. A direct consequence of this characteristic of social systems is that project goals are also not simple and rigidly fixed. The project goals are also complex, in constant flux and open-ended. The traditional Guide to the PMBOICs method for doing project management is unable to deal effectively with these complex and volatile system problems. This paper advocates that a slightly modified version of Checkland's soft systems method be used to deal with social projects, which are by definition, also complex projects. It is proposed that Checkland's soft systems method should be used in addition to the traditional approach. The method proposed by this paper is, to various degrees, already being implemented in practice. The proposed method is, however, presently not being catered for in the project management software packages that are readily and commercially available.
AFRIKAANSE OPSOMMING: Hierdie studie ondersoek die vraag: "Is die metode soos voorgestel in die Guide to the PMBOK geskik vir projekte met 'n sosiaal wetenskaplike karakter?" In die ondersoek word op grootskaal gebruik gemaak van literatuur wat beskikbaar is op die internet. Hierdie studie sluit aan by die wetenskaplike gedagterigting wat die wêreld beskou as bestaande uit 'n reeks ingewikkelde en onderling verbinde sisteme. As sosiale wese is die mens 'n integrale deel van hierdie gekompliseerde sisteme. Om reg te laat geskied aan menslike handelinge, moet die sisteme waarbinne die mens leef verstaan word. Menslike handeling moet ook vertolk word teen die agtergrond van daardie sisteme en in verhouding tot die sisteme. Drie gedagterigtings kan onderskei word binne die sisteem benadering tot projekbestuur. 'n Gemeenskaplike en onderliggende beginsel van al drie gedagterigtings is dat hulle sosiale sisteme beskou as gekompliseerd, uiters onbestendig en in voortdurende beweging. 'n Direkte gevolg van hierdie eienskap van sosiale sisteme is dat projekte se doelwitte ook nie maklik definieerbaar en stabiel is nie. Projekte se doelwitte is gekompliseerd, onbestendig en oop. Die konvensionele metodes vir projekbestuur soos voorgestel deur die Guide to the PMBOK is nie in staat om hierdie gekompliseerde en onbestendige sisteem probleme effektief te hanteer nie. Hierdie studie debatteer dat 'n effens gewysigde weergawe van Checkland se sagte sisteem metode gebruik word vir die doen van sosiale projekte, wat per definisie gekompliseerde projekte is. Dit word aan die hand gedoen dat Checkland se sagte sisteem metode gebruik word saam met die konvensionele benadering. Die metode wat hierdie studie bepleit, word alreeds tot vlakke in die praktyk toegepas. Daar word egter nie voorsieining gemaak vir die voorgestelde metode in rekenaar sagte ware programme in projekbestuur wat redelik algemeen in die kleinhandel beskikbaar is nie.
Kinzell, Deborah. "Implementation of Professional Academic Advisors in Minot State University's College of Arts and Sciences and College of Education and Health Sciences." Thesis, Minot State University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10846685.
Full textThe purpose of this research project was to determine perceptions or concerns faculty advisors at Minot State University have regarding professional academic advisors and steps that can be taken to address those perceptions and concerns so that professional academic advisors can be implemented. A survey was sent to all full-time tenure track faculty, and the data were analyzed using t-tests of unequal variances to compare whether the College of Education and Health Sciences was more inclined than the College of Arts and Sciences to implement professional academic advisors. Additional t-tests of unequal variances were used to compare whether faculty who had 10 or fewer years of service with Minot State University were more inclined to use professional academic advisors than faculty with 11 or more years of service. The survey results indicated that faculty overall had many misconceptions regarding professional academic advisors and while the College of Education and Health Science and the College of Arts and Sciences had similar views regarding professional academic advisors, faculty who had 10 or fewer years of service were more likely to be in favor of professional academic advisors than those with 11 or more years of service. Suggestions from the lead faculty advisor at the University of North Dakota (UND) were used to determine best practices, and the National Academic Advising Association (NACADA) database was also searched for best practices and qualifications for professional academic advisors.
Medema, Wietske. "Integrated water resources management and adaptive management : shaping science and practice." Thesis, Cranfield University, 2008. http://dspace.lib.cranfield.ac.uk/handle/1826/3531.
Full textBoulanger, Jean-Sebastien. "Interest management for massively multiplayer games." Thesis, McGill University, 2007. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=18280.
Full textLa popularité des jeux massivement multijoueurs a augmenté de façon phénoménale au cours des dernières années. Les fournisseurs de jeux rencontrent de plus en plus de problèmes d’extensibilité pour supporter des populations croissantes de joueurs. La diffusion à tous les joueurs des changements réalisés dans le monde virtuel n’est pas une solution viable pour maintenir une vision cohérente du monde dans un jeu massivement multijoueurs. Pour surmonter ce défi d’extensibilité, les jeux massivement multijoueurs doivent utiliser des techniques de gestion d’intérêt sophistiquées qui relaient seulement l’information pertinente vers chaque joueur. Dans cette thèse nous développons une technique de partition de l’espace qui s’adapte aux obstacles du monde virtuel en utilisant une triangulation. Nous présentons des algorithmes sensible-aux-obstacles de gestion d’intérêt qui emploient les partitions triangulaires pour déterminer la pertinence des objets pour chaque joueur, selon l’occlusion créée par les obstacles. Nous comparons l’efficacité des algorithmes sensible-aux-obstacles et d’autres algorithmes modernes de gestion d’intérêt à l’aide de données obtenues d’un vrai jeu massivement multijoueurs. À cet effet, nous utilisons à la fois des actions de vrais joueurs et des actions de joueurs générées par ordinateur. Nous démontrons que les algorithmes sensible-aux-obstacles de gestion d’intérêt peuvent réduirent le nombre de messages relayés entre les joueurs. Nous démontrons également que les algorithmes utilisant notre partition triangulaire peuvent s’adapter à un plus grand nombre d’objets tout en conservant de bonnes performances. Nos expériences suggèrent également que les résultats obtenus à partir de joueurs contrôlés par ordinateur se déplaçant aléatoirement ce rapprochent des résultats obtenus avec de vrais joueurs, dans la mesure où les actions aléatoires des joueurs son
Wason, Jasmin Lesley. "Automating data management in science and engineering." Thesis, University of Southampton, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.396143.
Full textRanj, Bar Amin. "Confidentiality and integrity management in online systems." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=117112.
Full textLe rôle prépondérant des réseaux sociaux sur le web change les relations humaines enconduits d'échange d'information. Ainsi, l'information qui est véhiculée sur le web est déterminée en grande partie par les prises de décisions humaines. Conséquemment, la sécurité de l'information, la confidentialité et l'intégrité de l'information partagée dépendentde la qualité des décisions prises collectivement par les utilisateurs. Récemment, plusieurs schémas de contrôle d'accès ont été proposés pour contrôler la propagation non autorisée et la modification de l'information dans les systèmes en ligne. Par contre, il y a encore un besoin de mécanismes dévaluation des risques de fuites d'information et de modifications non autorisées à l'intérieur des systèmes en ligne. Premièrement, la thèse se concentre sur la confidentialité de l'information dans les réseaux sociaux en ligne. Un nouveau mécanisme de contrôle de la confidentialité axé sur la communité pour la gestion de circulation de l'information est présenté. Un algorithme basé sur le modèle Monte Carlo est développé pour déterminer la possibilité de la diffusion des éléments de données partagés ainsi que pour informer l'utilisateur des risques de fuite d'information associés aux différentes décisions de partage que l'utilisateur pourra faire dans un réseau social. Le schéma fournit également une installation pour réduire l'échappement de l'information à un utilisateur spécifique (ex. mettre un utilisateur sur une liste noire). Deuxièmement, la thèse se concentre sur l'intégrité des objets des systèmes de crowdsourcing. Une approche nouvelle pour gérer l'intégrité du contenu créé par les archives de crowdsourcing appelé Gestion de l'intégrité sociale (Social Integrity Management) est présentée. Cette approcheintgre deux approches contradictoires pour gérer l'intégrité des systèmes de crowdsourcing: les schémas basés sur le propriétaire et les schémas sans propriétaires. La problématique de la propriété est d´etendue en incluant la copropriété et la possibilité d'avoir plusieurs versions. Finalement, la thèse présente une analyse complète des sites d'échange commeexemple de système de réponses aux questions par le crowdsourcing qui sont grandement utilisés. L'ensemble de données déchargées est utilisé pour analyser le comportement de différents utilisateurs dans les systèmes de réponses aux questions basés sur le crowdsourcing en considérant les effets d'étiquetage, la réputation des utilisateurs et les commentaires des utilisateurs. Les caract´eristiques observées par les études sont utilisées dans la simulationet l'évaluation de la gérance de l'intégrité sociale.
De, Kock Johannes Marthinus. "Optimal management of MPLS networks." Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52977.
Full textENGLISH ABSTRACT: Multiprotocol Label Switching (MPLS) is a routing technology which can manage Quality of Service (QoS) in scalable connectionless networks using relatively simple packet forwarding mechanisms. This thesis considers the optimisation of the QoS offered by an MPLS network. The QoS measure used is the expected packet delay which is minimised by switching packets along optimal label switched paths (LSPs). Two mathematical models of MPLS networks are presented together with appropriate algorithms for optimally dividing the network traffic into forwarding equivalence classes (FECs), finding optimal LSPs which minimise the expected packet delay and switching these FECs along the optimal LSPs. These algorithms are applied to compute optimal LSPs for several test networks. The mathematics on which these algorithms are based is also reviewed. This thesis provides the MPLS network operator with efficient packet routing algorithms for optimising the network's QoS.
AFRIKAANSE OPSOMMING: Multiprotocol Label Switching (MPLS) is 'n roeteringsmetode om die diensvlak (QoS) van 'n skaleerbare, verbindinglose netwerk te bestuur deur middel van relatief eenvoudige versendingsmeganismes. Hierdie tesis beskou die optimering van die QoS van 'n MPLS-netwerk. Die QoS-maatstaf is die verwagte vert raging van 'n netwerk-pakkie. Dit word geminimeer deur pakkies langs optimale "label switched paths" (LSPs) te stuur. Twee wiskundige modelle van MPLS-netwerke word ondersoek. Toepaslike algoritmes word verskaf vir die optimale verdeling van die netwerkverkeer in "forwarding equivalence classes" (FECs), die soektog na optimale LSPs (wat die verwagte pakkie-vertraging minimeer) en die stuur van die FECs langs die optimale LSPs. Hierdie algoritmes word ingespan om optimale LSPs vir verskeie toetsnetwerke op te stel. Die wiskundige teorie waarop hierdie algoritmes gegrond is, word ook hersien. Hierdie tesis verskaf doeltreffende roeteringsalgoritmes waarmee 'n MPLS-netwerkbestuurderj-es die netwerk se QoS kan optimeer.
Shearn, Peter Anthony. "Making science visible : new forms of science and technology management and evaluation." Thesis, University of Manchester, 2002. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.500670.
Full textBrocklesby, John. "Looking at the management sciences through the lens of autopoietic theory." Thesis, University of Warwick, 2001. http://wrap.warwick.ac.uk/3094/.
Full textHaggart, Melanie Jane. "Organochlorine management policy in Canada, the challenge of applying science to contaminant management." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq24148.pdf.
Full textColavito, Melanie Meyers. "The Role of Science in Collaborative Forest Management." Diss., The University of Arizona, 2015. http://hdl.handle.net/10150/593634.
Full textO'Leary, Bethan Christine. "Reconciling science and politics in marine resource management." Thesis, University of York, 2012. http://etheses.whiterose.ac.uk/2599/.
Full textAlJabban, Tarek. "Distributed database storage management for a cloud computing infrastructure." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=114556.
Full textLes applications Internet ont récemment connu une croissance considérable en termes de taille et de complexité. Afin de satisfaire la forte demande pour les ressources informatiques et les espaces de stockage, les technologies en distribution ont commencé à devenir plus impliquées dans les applications à grande échelle. Le Cloud Computing est l'une de ces nombreuses technologies qui ont émergé pour aider à atteindre les objectifs de ces applications, telles que la haute disponibilité, les performances et l'évolutivité.Platform as a Service (PaaS) est un type de service qui peut être fourni par les solutions de Cloud Computing. Ces systèmes suivent souvent une architecture multi-niveaux qui se compose principalement d'un niveau de présentation, un niveau d'application et d'un niveau de base de données. Les volumes de données échangées entre l'application et la base de données deviennent énormes en particulier pour les applications de niveau entreprise. En conséquence, la conception de la base de données dans les systèmes de Cloud Computing doit prendre en compte le challenge de l'évolution des quantités énormes de données. Dans cette mémoire, nous proposons une approche de distribution des données qui peuvent être utilisées pour améliorer l'évolutivité des bases de données. Nous proposons deux techniques qui peuvent être appliquées à un serveur de base de données unique traditionnelle.Ces techniques fonctionnent en remplaçant le paradigme traditionnel utilisant une seule machine de stockage avec un paradigme de stockage distribué. Les techniques proposées maintiennent les caractéristiques qui existaient à l'origine dans le système de base de données, et en plus fournissent les caractéristiques de la distribution et de la réplication. Ces deux fonctionnalités supplémentaires aident à améliorer le système de tolérance aux pannes, car ils diminuent la possibilité d'avoir une défaillance au niveau du serveur de base de données. La distribution du stockage permet de résoudre les problèmes de performances spécifiques, tels que la réduction de l'utilisation des entrées/sorties et consécutivement de diminuer la possibilité de saturation des entrées/sorties.Par ailleurs, cela produit d'autres défis de performances qui doivent être pris en compte. Pour prouver la faisabilité de nos techniques, nous les avons implémentées comme des extensions du module de gestion de stockage de la base de données PostgreSQL.
Bates, Anthony Shawn. "The Trilogy of Science: Filling the Knowledge Management Gap with Knowledge Science and Theory." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3977.
Full textEklund, Pieta. "Knowledge management på en dagstidning." Thesis, Högskolan i Borås, Institutionen Biblioteks- och informationsvetenskap / Bibliotekshögskolan, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-16347.
Full textUppsatsnivå: D
Toupal, Rebecca Stuart. "Landscape perceptions and natural resource management: Finding the 'social' in the 'sciences'." Diss., The University of Arizona, 2001. http://hdl.handle.net/10150/279917.
Full textFord, Neil Spencer, and Nicholas Waldon Zimmon. "A data-based Financial Management Information System (FMIS) for Administrative Sciences Department." Thesis, Monterey, California: Naval Postgraduate School, 1990. http://hdl.handle.net/10945/27584.
Full textThe Administrative Sciences (AS) Department of the Naval Postgraduate School (NPS) is placing an increasing emphasis on keeping departmental expenses at minimum levels requiring the AS Department to carefully monitor a large number of complex financial accounts. It becomes necessary to develop a Financial Management Information System that would result in improved management of financial assets, better use of clerical skills, and more detailed, accurate, and up-to-date reporting within the AS Department. Based on the requirement analysis and prototypes performed by previous work, this thesis develops and implements a personal computer-based Management Information System for the Management of the many funding accounts controlled by the Administrative Sciences Department. The central objective was to integrate accounting transactions performed in several different offices, currently using different software programs, into a single all-encompassing Management Information System. The system was written using dBASE IV and is currently operational.
Ford, Neil Spencer Zimmon Nicholas Waldon. "A data-based Financial Management Information System (FMIS) for Administrative Sciences Department." Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA241958.
Full textThesis Advisor(s): Liao, Shu. Second Reader: Bui, Tung. "December 1990." Description based on title screen as viewed on March 30, 2010. Author(s) subject terms: Financial Management Information System, DBase IV, Data-Based Management System. Includes bibliographical references (p. 111). Also available in print.
Tang, Fugui. "A proximity determinable social pseudonym framework in online identity management system." Thesis, McGill University, 2012. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=107858.
Full textDans le contexte d'Internet, les identifiants des usagers jouent un rôle critique. L'un des avantages des identifiants traditionnels, soient les pseudonymes, est de fournir une protection de la vie privée des usagers. Les usagers peuvent créer autant d'identifiants anonymes qu'ils le désirent simplement en utilisant une adresse courriel. Par contre, l'anonymité même peut devenir un facteur limitant dû à la déresponsabilisation des usagers. L'importance des réseaux sociaux en ligne nous inspire à créer un système de pseudonymes sociaux à travers lequel il sera possible de déterminer la proximité entre pseudonymes tout en conservant la confidentialité. Le système se base sur l'idée d'associer un réseau social à un espace géométrique et d'assigner des coordonnées à chaque usager qui dépendent de la relation entre l'usager et son voisinage. Les coordonnées elles-même ne fournissent aucune information confidentielle à propos d'un usager. Cependant, en calculant la distance entre différentes coordonnées, la proximité entre usagers peut être estimée avec une certaine probabilité. J'ai évalué le système avec des données provenant de réseaux sociaux réels. Les résultats indiquent que le système proposé, en imposant certaines conditions, est prometteur.
Papastefano, N., and der Walt SE Arnoldi-van. "A complexity science-based management framework for virtual organisations." African Journal of Business Management, 2010. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001182.
Full textGonçalves, Leandra Regina. "Regional Fisheries Management Organizations: is power listening to Science?" Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/101/101131/tde-21112016-164951/.
Full textUm dos maiores desafios na governança ambiental global contemporânea é o futuro dos ecossistemas e da biodiversidade marinha. Ao longo dos anos, o aumento do esforço de pesca nas áreas anteriormente remotas levou muitas populações de peixes à escassez. As Organizações Regionais para o Ordenamento Pesqueiro (OROPs) surgiram para resolver a crise internacional de pesca, através um fórum onde os Estados-Membros podem acordar e discutir regras vinculativas para a conservação e gestão dos recursos pesqueiros no âmbito da sua área geográfica de responsabilidade. Embora alguns acordos existam há mais de 60 anos, muitos pesquisadores concordam que os mesmos não têm sido totalmente eficazes para promover a manutenção e conservação dos recursos pesqueiros. Muitas razões podem explicar a falta de eficiência no manejo, uma delas é que, o aconselhamento cientifico não é muitas vezes considerado nas decisões políticas. Nesta pesquisa, a influência do conhecimento e da ciência na tomada de decisões políticas serão avaliadas. Para isso, a teoria das comunidades epistêmicas, que faz parte da veia construtivista em Relações Internacionais, foi usada para responder à principal questão colocada aqui: quando é que o poder ouviu a ciência? E isso trouxe mais eficiência em termos do conhecimento proveniente das comunidades epistêmicas induzir os Estados a mudarem seu comportamento e a influência levar a políticas que aumentem a biomassa dos estoques pesqueiros? Com o uso de process tracing, por meio de entrevistas com atores e uma compilação sistemática dos relatórios das reuniões anuais, as OROPS: CCAMLR, ICCAT e CCSBT foram estudadas, e a conclusão final é que, os tomadores de decisão podem ouvir a ciência, porém, a estratégia, os aliados e a forma como a influência se desenvolve varia caso a caso.
Lee, Jeongseok. "Knowledge management in preserving ecosystems the case of Seoul /." [Bloomington, Ind.] : Indiana University, 2009. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3380098.
Full textTitle from PDF t.p. (viewed on Jul 13, 2010). Source: Dissertation Abstracts International, Volume: 70-12, Section: A, page: 4849. Adviser: Robert Agranoff.
Roger, Kathleen Mary Louise. "A nursing workload manager for a patient data management system /." Thesis, McGill University, 1992. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=61047.
Full textNicolau, Daniela E. "Knowledge production and transfer in physical and life sciences /." Access via Murdoch University Digital Theses Project, 2002. http://wwwlib.murdoch.edu.au/adt/browse/view/adt-MU20061122.141122.
Full textLohse, Peter A. (Peter Andreas). "Distribution of knowledge production in the chemical sciences in the US." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/65786.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 43-44).
A citation analysis was carried out to gain an understanding of the geographical and institutional distribution of highly cited articles in the chemical sciences in the US over the last thirty years. The contribution of US chemistry departments was determined by quantifying the number of highly cited articles published by individual authors or groups of authors from the same department. Articles stemming from collaborative research across schools were not considered. The results show that a dilution in intradepartmental knowledge production has occurred both on a geographical and institutional level. Three chemistry departments have emerged as strong producers of high impact articles over the last thirty years: the University of North Carolina, Texas A&M University and the University of Utah. In terms of aggregate numbers of highly cited articles these three schools are in the top ten of over seventy schools which were evaluated; their chemistry departments are en par in terms of scientific impact with those from Ivy League schools like Stanford University, Harvard University and the California Institute of Technology. While the literature reports increasing concentration for the US research base, the present analysis shows a dilution in chemical knowledge production when collaborative efforts across departments and schools are excluded. This finding suggests that the increase in concentration in the US science base is not a uniform trend when studied on a more granular level.
by Peter A. Lohse.
M.B.A.
Koosimile, Anthony Tsatsing. "Science curriculum implementation in Botswana." Thesis, University of York, 1999. http://etheses.whiterose.ac.uk/9794/.
Full textPaucar-Caceres, A. "Business culture and management science methodologies in England and France." Thesis, Manchester Metropolitan University, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.435608.
Full textHeyboer, Maarten. "Knowledge-development in applied science: the case of range management." Thesis, Virginia Tech, 1989. http://hdl.handle.net/10919/46039.
Full textThis study traces the evolution of the applied ecological discipline of range management in terms of the goals, methods, concepts, and criteria developed by range management for their science between 1897 and 1920. It argues, in contrast to the traditional view uÌ uat describes the knowledge-development process in applied science as just science applied to social problems, that wider social goals, values, concepts, and criteria play a definite role in shaping the applied science knowledge-development process.
The first generation of range management allowed the primary users of the knowledge in the wider society, the stockmen in the West and Southwest, to have a direct influence on the knowledge-development process. The next generation of scientists eliminated the stockmen's direct influence on the knowledge-development process, yet the stockmen still influenced that process indirectly in various ways.
This study concludes that an orientation towards the wider society that actually applies the knowledge is characteristic of range management and may be illustrative of illustrative of many applied sciences. Due to that orientation towards the wider society and to the wider society's influence on the scientist's choice of methods,concepts, and criteria, another characteristic of range management and possibly of other applied sciences is a tension in the knowledge development process between that orientation and the individual goals of scientists in their research.
Master of Science
Deadman, Peter John 1960. "Modeling individual behavior in common pool resource management experiments with autonomous agents." Diss., The University of Arizona, 1997. http://hdl.handle.net/10150/282396.
Full textKu, Shawn. "Disability management, developing the ideal disability management model : the Diamond Health Management model." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0002/MQ45231.pdf.
Full textWilhelmsson, Jesper. "Efficient memory management for message-passing concurrency." Licentiate thesis, Uppsala : Univ. : Dept. of Information Technology, Univ, 2005. http://www.it.uu.se/research/reports/lic/2005-001/.
Full textZia, Vivian. "A computerized nursing workload management system in a pediatric ICU." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape16/PQDD_0007/MQ29638.pdf.
Full textCook, Susanne Welch. "Adolescent risk preference and asthma symptom self-management: Assessing symptom management scenarios." Diss., The University of Arizona, 2004. http://hdl.handle.net/10150/280507.
Full textBjerre, Johan. "Load management for a telecom charging system." Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-15220.
Full textThere are a huge number of customers using Ericsson’s prepaid telecom charging system. This means that even the smallest optimization done in its management of load results in a big win when considering time and CPU usage. Ericsson wishes therefore to learn about how the load management can be improved considering speed, i.e. faster response to load changes.
In this thesis work two subsystems of the prepaid telecom system are modeled. The first subsystem treats and prepares the telecom activity before it enters the second subsystem which checks if there is coverage for the action that the telecom activity asks for to be performed. A model which is an emulation of the subsystems is built using c++. It captures the timing of the real system not the logic or function. The c++ approach is compared to a Matlab approach which runs much slower in simulation. In addition, the model enables full view of the queue sizes and the rejects made by the regulator.
Verification has been performed with self generated data based on synthetic test cases. Verification and analysis show that the model captures the intended behavior of load management. Information about different software parameters and its influence on the output is obtained. Different scenarios are tested and the outcome discussed.
Kirstein-Jost, Simone. "Auflösung von Anaphern im Rahmen der Informationsextraktion für Ontologie-Management im Bereich Life Sciences." Hamburg Kovač, 2009. http://d-nb.info/999217755/04.
Full textSiyaya, Mlindeni Celinhlalo, B. B. Ndlovu, and B. T. Gamede. "Factors influencing learner performance in the economic and management sciences in the Ilembe district." Thesis, University of Zululand, 2019. http://hdl.handle.net/10530/1796.
Full textThis thesis explores “Factors Influencing Learner Performance in the Economic and Management Sciences in the iLembe District”. This study has used a mixed methodology, in Mandeni ward in KwaZulu-Natal. This district has four hundred and forty-two (442) schools. The district is divided into five (5) wards. One of those wards is Mandeni Ward, which has thirty-four (34) schools. The data analysing technique that was used is thematic analysis. The greatly publicised poor matric results in South Africa point to many systemic challenges in the education system. The system of education in South Africa requires teachers who are highly skilled to impart knowledge to learners. The historic curriculum paradigm shifts in the South African education system brought numerous changes. In the process of these curriculum changes, there is no evidence that suggests teachers’ involvement. For example, the introduction of Economic and Management Sciences (EMS) as a learning area brought about challenges to educators as EMS became a combination of three learning areas in one. The challenge of identifying a competent teacher in the three-layered EMS was exacerbated by the introduction of external examinations in grade seven, during the 2014 academic year. This research has attempted to investigate the factors that exist for teachers and heads of department with regards to EMS. In this study, a range of questioning statements that render relevant information about the factors that may influence performance in EMS have been employed. Through the use of interviews, qualitative data were collected from grade seven to nine teachers, as well as heads of department. Another set of data was generated using questionnaires given to the same participants. The final set of data was obtained using document analysis: where mark schedules for grade seven were analysed with the aim of investigating learner performance. This study found that EMS is being taught by unqualified EMS teachers due to the shortage of qualified EMS teachers (Modise, 2014). The absence of qualified teachers negatively impacts on the educational objectives of the EMS learning area. The study also discovered that the lack of exposure to commercial subjects in high school does dampen the confidence and the enthusiasm of the teacher and hamper their eagerness to stand in front of the learners to teach EMS. The insufficient time allocated for EMS and EMS workshops also negatively impacts on the objectives and outcomes for this subject. The lack of parental involvement in EMS related discussions also hampers the educational objectives of the EMS learning space. There are recommendations that suggest that there is a need to urgently revisit the manner in which EMS teachers are trained. The provision of EMS related resources has to be drastically improved if vi the stakeholders desire to witness identifiable and life-changing results. There is dire need to immediately review the EMS curriculum policy.
Chrystie, Jeanetta R. "A Model for Applying Total Quality Management in Computer Information Systems Management." NSUWorks, 1998. http://nsuworks.nova.edu/gscis_etd/454.
Full textFumai, Nicola. "A database for an intensive care unit patient data management system." Thesis, McGill University, 1992. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=22500.
Full textComputers can help by processing the data and displaying the information in easy to understand formats. Also, knowledge-based systems can provide advice in diagnosis and treatment of patients. If these systems are to be effective, they must be integrated into the total hospital information system and the separate computer data must be jointly integrated into a new database which will become the primary medical record.
This thesis presents the design and implementation of a computerized database for an intensive care unit patient data management system being developed for the Montreal Children's Hospital. The database integrates data from the various PDMS components into one logical information store. The patient data currently managed includes physiological parameter data, patient administrative data and fluid balance data.
A simulator design is also described, which allows for thorough validation and verification of the Patient Data Management System. This simulator can easily be extended for use as a teaching and training tool for PDMS users.
The database and simulator were developed in C and implemented under the OS/2 operating system environment. The database is based on the OS/2 Extended Edition relational Database Manager.
Simon, Katie. "Finding synergistic conservation values? Māori tikanga, science, resource management and law." The University of Waikato, 2007. http://hdl.handle.net/10289/2639.
Full textAbouarghoub, Wessam M. T. "Implementing the new science of risk management to tanker freight markets." Thesis, University of the West of England, Bristol, 2013. http://eprints.uwe.ac.uk/20836/.
Full textMitchell, Melissa. "Strategic human resource management plan for Task Applied Science (Pty) Ltd." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/96217.
Full textHuman resource management is a widely researched field. However, the research done in terms of small to medium-sized enterprises, is extremely limited, especially in South Africa. The aim of this research was to investigate human resource management practices in one such a company, and to develop a feasible action plan to improve on these practices. The chosen company, Task Applied Science (Pty) Ltd, is a medical research company based in Cape Town, South Africa. The data for the study was obtained through a literature review and interviews. The data from the literature review identified best practices and frameworks. This was combined with interviewing company employees as well as HRM practitioners in the medical field to not only identify problems, but to also suggest possible solutions. These solutions were compiled in a comprehensive action plan. As such, the results offer a workable solution for Task Applied Science, and can serve as example for all small to medium-sized enterprises. The literature review further showed that smaller companies tend to ignore the importance of human resource management due to the time and costs involved and the fact that they are focussed on the external environment rather than the internal. This cannot simply be remedied by implementing practices developed in large companies. Best practices need to be customised to fit the needs of the specific company. The findings showed that only certain human resource management practices were implemented in reaction to crises, or as needs arose. This, combined with the rapid growth and lack of structure, caused a breakdown in communication, transparency, and trust. Staff loyalty decreased because they felt that they were left in the dark. Both the company strategy and values became vague, and thus staff could not be aligned to it. Noteworthy was that the increase in policies and documentation did not cause employees to feel restricted, but rather that it created a feeling of security. The study made it abundantly clear that the human resources department needs to be treated as a strategic partner in the planning and execution of the company strategy; especially in terms of efficient change management. Their role is to communicate the strategic direction, while at the same time acting as an activist for the staff, voicing their needs and capabilities. The proposed action plan focused mainly on the company culture and the alignment of staff with the company’s business strategy. This was done by addressing issues such as company culture, communication, company values, and staff development. The plan offers practical solutions within each of these categories. Furthermore, it suggests solutions in terms of efficient staff recruitment and knowledge management. By implementing this plan the company will be able to increase the synergy between the business units within the company, eradicating silos, and establishing the staff as a competitive advantage. In addition to this, it will establish the human resources department as a credible partner for the staff in developing both their personal and professional lives.