共查询到20条相似文献,搜索用时 15 毫秒
1.
Mathew J. Manimala 《Creativity & Innovation Management》1996,5(3):179-189
In an earlier study of the policy orientations of innovative entrepreneurs, it was observed that there were considerable variations within the high-innovation and low-innovation groups identified for the purpose of comparing policy orientations. The possibility of identifying sub-types within the two groups was apparent and therefore the sample was subjected to cluster analysis. The most interpretable clusters were obtained when the two groups were clustered separately on the basis of the innovators’ orientations. Seven sub-types were identified within the high-innovation group which were named as inventor/tinkerer, adventurer, searcher/problem-solver, gap-filler, social visionary, opportunity-grabber, and specialist pioneer. The low-innovation group, on the other hand, got grouped into six sub-types which were named as chance entrant, agent-turned producer, concession-grabber, obsessed producer, ancillary/imitator, and non-pioneer niche holder. Some observed similarities among the sub-types of low and high innovation groups may be interpreted as offering empirical support to the theory that all entrepreneurs are innovators, with the differences being explained as those of degree. Common entrepreneurial subtypes were hypothetically identified on this basis. Alternatively, it could be proposed that innovativeness is a moderating variable which has a transformational impact on the basic entrepreneurial sub-types. 相似文献
2.
3.
Anna Meifort 《Creativity & Innovation Management》2016,25(2):251-269
Innovation portfolio management (IPM) addresses the resource allocation across a firm's portfolio of new product development projects consistent with corporate strategy. The paper provides a comprehensive review of IPM research and offers new conceptual arguments by systematizing prior findings in the following four categories: optimization perspective, strategic perspective, decision‐making perspective and organizational perspective. These different approaches to IPM have been largely disconnected so far, but they can complement one another to provide new theoretical insights into a critical topic in innovation research. The different approaches are therefore integrated into an overarching perspective and a detailed research agenda is proposed. 相似文献
4.
《International journal of human-computer interaction》2013,29(1):93-130
This article presents the outcomes of a technical symposium on the topic of the use of intranets as a tool for organizational learning, which was conducted at the 9th International Conference on Human-Computer Interaction, held in New Orleans, Louisiana, August 5 through 10, 2001. The objective of the symposium was to derive, based on the collective intelligence of experts, an agenda for research and development (R&D) concerning the use of intranet for organizational learning for the short, medium, and long term. Expert knowledge of this research area was acquired and assimilated through the symposium, which was composed of technical paper presentations and a full-day "white paper" session, as well as pre- and post-symposium survey dissemination and analysis. The current state of knowledge and resulting agenda for R&D are reported, and 4 critical areas are emphasized: organizational rules, norms and structures; changes in the nature of work; knowledge manipulation; and technology issues. 相似文献
5.
Organizing for the Big One: A Review of Case Studies and a Research Agenda for Multi‐Agency Disaster Response 下载免费PDF全文
Norbert Steigenberger 《突发事故与危机管理杂志》2016,24(2):60-72
Disaster response operations require the cooperation of agencies that seldom interact in their daily operations. The result is a complex coordination problem, which has been in the focus of many case studies. In an effort to facilitate cross‐case learning, this study presents a review of empirical studies on the multi‐agency coordination of disaster response operations. The review covers 80 empirical studies and highlights the importance of training, expertise, planning and plan enactment, leadership and personal acquaintance between the actors in emergent multi‐agency response networks. The analysis results also show that while some areas have received extensive coverage in scholarly publications (e.g., training, skills), a number of important topics have yet to be studied in sufficient depth (e.g., leadership and role taking, plan enactment). Based on these insights, a research agenda is proposed and a number of recommendations for practical disaster response management are made. 相似文献
6.
In this paper, we approach electronic commerce Customer Relationship Management (e-CRM) from the perspective of five research areas. Our purpose is to define a conceptual framework to examine the relationships among and between these five research areas within e-CRM and to propose how they might be integrated to further research this area. We begin with a discussion of each of the research areas through brief reviews of relevant literature for each and a discussion of the theoretical and strategic implications associated with some CRM technologies and research areas. Next we present our framework, which focuses on e-CRM from the five research perspectives. We then present a theoretical framework for e-CRM in terms of the five research areas and how they affect one another, as well as e-CRM processes and both performance and non-performance outcomes. 相似文献
7.
David Arnold 《Computer Graphics Forum》2008,27(8):2188-2196
Donald Stokes argued [ [Sto97] ] that for 50 years from the end of the Second World War to the end of the 20th century, there was an unhealthy taxonomy of research types which was formulated on a linear scale from pure to applied. The argument goes that the best research is only possible in environments which are free from contemplation of the potential uses to which results might be applied. In this paper, current research challenges in the application of ICTs to cultural heritage information are reviewed in order to consider where these applications‐linked needs require solutions that will advance the understanding of computational principles and help to develop new basic understanding in computer science, including shape manipulation and other aspects of importance in computer graphics and virtual environments. The paper draws extensively on the recently published EPOCH research agenda [ [AG07] ] for illustrations of the types of research which are required for the Cultural Heritage sector and the relationship between these and basic research challenges in Computing Science. 相似文献
8.
Brazier Frances M.T. Kephart Jeffrey O. Parunak H. Van Dyke Huhns Michael N. 《Internet Computing, IEEE》2009,13(3):82-87
Autonomic computing is the solution proposed to cope with the complexity of today's computing environments. Self-management, an important element of autonomic computing, is also characteristic of single and multiagent systems, as well as systems based on service-oriented architectures. Combining these technologies can be profitable for all — in particular, for the development of autonomic computing systems. 相似文献
9.
The challenge to develop an integrated perspective of embodiment in communication has been taken up by an international research
group hosted by Bielefeld University’s Center for Interdisciplinary Research (ZiF) from October, 2005 through September, 2006.
An international conference was held there on 12–15 January, 2005 to define a research agenda that will explicitly address
Embodied Communication in Humans and Machines. 相似文献
10.
Andrew Sears Jonathan Lazar Ant Ozok Gabriele Meiselwitz 《International journal of human-computer interaction》2013,29(1):2-16
Three National Science Foundation (NSF) programs—Human–Computer Interaction, Universal Access, and Digital Society and Technologies—were recently combined into one new cluster called “Human-Centered Computing” (HCC). Two workshops were held to share information about this new cluster with researchers, provide guidance to researchers who are early in their research careers and have yet to receive NSF funding, and provide feedback to NSF from the affected research communities regarding topics that are considered particularly important by this community. Continuing and emerging research opportunities identified included privacy and security issues in HCC context, intelligent user interfaces, universal access including research for different populations such as children and older adults, mobile and ubiquitous computing, and social computing, among others. Various issues concerning interdisciplinary research opportunities were also raised, including understanding the disciplines, promotion and tenure concerns, administrative overhead, and where to publish. Education discussions produced a list of curricular recommendations and a number of opportunities to enhance the education of future HCC practitioners and researchers. 相似文献
11.
Minds and Machines - The automation of online social life is an urgent issue for researchers and the public alike. However, one of the most significant uses of such technologies seems to have gone... 相似文献
12.
Ke Wang Kan Qiao Iman Sadooghi Xiaobing Zhou Tonglin Li Michael Lang Ioan Raicu 《Concurrency and Computation》2016,28(1):70-94
Data‐driven programming models such as many‐task computing (MTC) have been prevalent for running data‐intensive scientific applications. MTC applies over‐decomposition to enable distributed scheduling. To achieve extreme scalability, MTC proposes a fully distributed task scheduling architecture that employs as many schedulers as the compute nodes to make scheduling decisions. Achieving distributed load balancing and best exploiting data locality are two important goals for the best performance of distributed scheduling of data‐intensive applications. Our previous research proposed a data‐aware work‐stealing technique to optimize both load balancing and data locality by using both dedicated and shared task ready queues in each scheduler. Tasks were organized in queues based on the input data size and location. Distributed key‐value store was applied to manage task metadata. We implemented the technique in MATRIX, a distributed MTC task execution framework. In this work, we devise an analytical suboptimal upper bound of the proposed technique, compare MATRIX with other scheduling systems, and explore the scalability of the technique at extreme scales. Results show that the technique is not only scalable but can achieve performance within 15% of the suboptimal solution. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
13.
Robert W. Proctor Shimon Y. Nof Yuehwern Yih Parasuram Balasubramanian Jerome R. Busemeyer Pascale Carayon 《International journal of human-computer interaction》2013,29(2):151-190
In the global economy, design of digital media often involves teams of individuals from a variety of cultures who must function together. Similarly, products must be designed and marketed taking specific cultural characteristics into account. Much is known about decision processes, culture and cognition, design of products and interfaces for human interaction with machines, and organizational processes, but this knowledge is dispersed across several disciplines and research areas. This article reviews current work in these areas and proposes a research agenda for fostering increased understanding of the ways in which cultural differences influence decision making and action in design and use of digital media. 相似文献
14.
Mathew J. Manimala 《Creativity & Innovation Management》1993,2(3):197-206
The research reported in this paper was provoked by the author's experience with two entrepreneurs operating in the same industry in the same city in India during the same period. Ironically, the one with better resources and institutional support (call him Entrepreneur-A) could not succeed, while the other (Entrepreneur-B) with little resources and institutional support now presides over a fast-growing business. 相似文献
15.
ABSTRACTDigital transformation is becoming pervasive, resulting in the intertwine of organizational strategy with IT strategy and increasing importance of IT risk. This falls into the domain of the board of directors, who are ultimately accountable for strategy and control. Yet, research shows that the involvement of boards in governing digital assets is low. In order to address this topic, this paper summarizes the state-of-the-art of this research domain and identifies an agenda for future research. 相似文献
16.
17.
《Concurrency and Computation》2017,29(18)
Utilization of cloud computing resources has made a fast growth in e‐business. Business and government agencies often need to handle large volume of service requests, the so‐called instance‐intensive business processes in a constrained period. On‐time completion for instance‐intensive business processes within the constrained time is a very important issue. In the past few years, traditional optimal task scheduling has been well researched and proven to be a nondeterministic polynomial (NP) time–complete problem. So many heuristic and metaheuristic algorithms are put forward to solve the issue with near‐optimal solutions. However, most of them just treat a single workflow instance as a multistep task without considering that steps within a task can be different types of activities. To explain multistep features of business workflows, a typical motivating instance‐intensive business example of security exchange and a multistep scheduling model for business workflows are introduced in this paper. Then our near‐optimal dynamic priority scheduling (DPS) strategy is proposed on the basis of the idea of Min‐Min heuristic algorithm and greedy philosophy. Compared to the first come first served and constrained Min‐Min by makespan and standard deviation, DPS can make a more optimized choice in each round of scheduling towards overall outcome. To show the effectiveness of DPS, theoretical minimum execution time (METtheory) is used as a benchmark for evaluation based on simulation. The results show that the ratios between METtheory and DPS are more than 98.5% by scheduling different orders of magnitude tasks from 1000 to 1 000 000. In particular, the ratio between METtheory and DPS is nearly 99.9% with 1 000 000 tasks, which means that our DPS can get the near‐optimal result when scheduling large number of tasks. 相似文献
18.
19.
Lahiru S. Gallege Dimuthu U. Gamage James H. Hill Rajeev R. Raje 《Concurrency and Computation》2016,28(1):114-143
An early understanding of the trust concerns while composing a distributed system from independently developed software services saves time and effort. It also allows the developer of such distributed systems to reason about the trust‐related properties of these systems. Although there are prevalent approaches for evaluating the trust of such systems, it is not clear which approach, if any, is the most comprehensive and best suited for a given situation. Moreover, there is no agreement about a unified approach, for quantifying trust, which can be applied to the entire software life‐cycle of distributed systems. This article, first, motivates the need for such a quantification of trust via a case study from the domain of indoor tracking. It then provides a comprehensive survey of current approaches that define trust, in general domains, and then focuses on the relevant approaches from the domain of software‐oriented distributed systems. These prevalent efforts are categorized into groups using existing clustering tools and then are further analyzed for their comprehensiveness. The analysis depicts: (1) many trust‐related efforts and associated models have their own constrained views of trust; (2) different trust models focus on different aspects of trust and life‐cycle details; and (3) it is difficult to interoperate across different trust models. Hence, the paper identifies a set of principles that can assist in quantifying and evaluating the trust throughout the software life‐cycle of distributed systems. These principles, then, are applied to the aforementioned case study to provide an outline of how trustworthy distributed systems can be composed from independent software services. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献