The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Failure mode and effect analysis (FMEA) is a well-known engineering technique to recognize and reduce possible failures for quality and reliability improvement in products and services. It is a group-oriented method usually conducted by a multidisciplinary and cross-functional expert panel. In this paper, we explore two key issues inherent to the FMEA practice: the representation of diversified risk...
Many researchers analyzed the culture dissemination from observing and they did not give a mathematical model to quantitatively analyze the problem. In order to overcome the problem we would apply the theory of epidemic dynamics for safety cultures dissemination. In the paper, an ICB (the people in an organization divided into three groups: incomprehension, comprehension and oblivion) mathematic model...
Given the need for organizations that develop Business Process Management (BPM) initiatives to assess their maturity levels in this field, the complexity of choosing a suitable BPM maturity model (BPMM) to do so and the difficulty of applying the solutions proposed in the literature to address this problem, this paper presents a multicriteria decision model for choosing a BPMM. In this work, the alternatives...
Inter-organization business process collaboration is one of the most significant factors driving today's global business development. Such collaborations are typically composed by various processes executed by different organizations and are often difficult to specify and analyze, due to their distributed nature and to data interoperability issues. The standard notation for business process modeling,...
The BRPs require huge investment and have the characteristic of high public welfare. The lack of public participation in decision-making can easily cause the group events. To achieve the maximum public interest, this paper will introduce public participation into BRPs decision-making process. Using intuitionistic fuzzy evaluation, similarity degree method, cluster analysis establish the BRPs interactive...
Based on the perspective of ensuring business continuity through communication and cooperation between the members, the vulnerability of facility management organization under the interference of emergency was studied. The model and simulation of organization network of facility management based on knowing, emotion, consulting and collaboration relationship was put forward. With the case study, there...
Advanced Persistent Threats are increasingly becoming one of the major concerns to many industries and organizations. Currently, there exists numerous articles and industrial reports describing various case studies of recent notable Advanced Persistent Threat attacks. However, these documents are expressed in natural language. This limits the efficient reusability of the threat intelligence information...
Today, many Information System Success studies are performed however only a few studies which focused on the impact of a personal user to succeed of applying IS. The aim of this study is to investigate and to measure the effect of End User Computing Satisfaction into Individual of Impact Performance, with regard the successful implementation of Information system at higher education. Random sampling...
The organizational environment is defined by a complex and dynamic interaction of elements that act together to achieve goals. Organizational modeling helps stakeholders to better understand this complexity and analyze details in order to help the identification of changes that are necessary to keep the organization aligned with its strategic goals. However, it is still hard to map the many organizational...
Understanding and keeping the customer happy is a central tenet of requirements engineering. Strategies to gather, analyze, and negotiate requirements are complemented by efforts to manage customer input after products have been deployed. For the latter, support tickets are key in allowing customers to submit their issues, bug reports, and feature requests. Whenever insufficient attention is given...
Different contexts determine a different software process. This is especially true for requirements production. Different situations in a given universe of discourse will require different requirements processes. This paper proposes a family pattern that approaches the universe of discourse (context) from the viewpoint of whom are the actors demanding the software. We show five different instantiations...
Software requirements analyst work is considered crucial in the software development lifecycle. This paper presents a descriptive study on the software requirements analyst profile, considering Brazilian and Mexican markets, two countries that lead IT investment ranking in Latin America. To identify the competences expected by the Brazilian and Mexican markets for software requirements professionals...
Manufacturing cost (assembly, test, and rework) necessarily comprises a significant portion of overall system cost in complex engineering and manufacturing environments. Test cost alone can represent 30% of overall cost. Recognizing that both business growth and competitive advantage increase with reduced cost, a question becomes how to organize systems, processes, and personnel effectively to reduce...
This qualitative study describes and models reputation motivation of Knowledge Sharing (KS) among academicians at a Malaysian public academic institution. A single case study approach was adopted to gather more meaningful insights on factors involved in building reputation motivation for KS. Data were collected from fifteen professors and associate professors through face-to-face interviews over a...
With the urbanization process speeding up, the construction of City Road increased rapidly. So limited road resource is often occupied during the road construction, which makes road capacity of construction affected area greatly decrease. Then the contradiction of city original transport supply becomes more prominent. Therefore, it is very important to make a reasonable traffic organization plan....
Financing based on Islamic banking is one of our most desirable communities. In analyzing customer financing filing takes a relatively long time because the assessment process is carried out based on the subjectivity of the leaders and decision makers no accurate calculations in determining the customer is acceptable or not in the filing of financing. Absence of Decision Support Systems to assist...
The survey of related works on insider information security (IS) threats is presented. Special attention is paid to works that consider the insiders' behavioral models as it is very up-to-date for behavioral intrusion detection. Three key research directions are defined: 1) the problem analysis in general, including the development of taxonomy for insiders, attacks and countermeasures; 2) study of...
Reservation service users and or purchase online based on the marketplace often face difficulties in determining the object or service selected closest to the criteria of potential users. Aside from the rating or rating which features conventional, potential customers can make decisions with the customer review feature that has to wear or purchase items or services. The availability of these features...
The trend to discharge patients early from acute care settings to the home has increased the demand put on homecare nurses. Substantial portions of homecare patients have chronic or difficult to heal wounds. Homecare nurses use electronic patient documentation systems to input data, to support clinical decisions and to provide appropriate care for patients. These systems often do not support aspects...
Realtime simulation on organizational behaviors is very important for detection of group attacks in cyber situational awareness. Previous work on the modeling and simulation of organizational behaviors is successful in top-down approach centering on certain organizational behaviors. However, these models are inefficient for realtime simulation on unknown organizational behaviors. To address this issue,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.