it resources
Recently Published Documents


TOTAL DOCUMENTS

216
(FIVE YEARS 57)

H-INDEX

13
(FIVE YEARS 2)

Author(s):  
Shamsul Karim ◽  
Caleb Kwong ◽  
Mili Shrivastava ◽  
Jagannadha Pawan Tamvada

AbstractThis paper provides new evidence at the intersectionality of gender, family status, and culture by focusing on a previously little researched group of middle-class women in an emerging economy. While the existing literature examines both structural and normative constraints for women entrepreneurship, little is known about the gains from relaxing structural constraints for women when compared to men. In addition to examining this new question, the paper sheds light on the binding nature of normative constraints for women entrepreneurship that persist in a patriarchal developing economy even when structural constraints are significantly eased. Using a mixed-methods approach, the empirical results suggest that higher resource availability differentially impacts the entrepreneurial intentions of women when compared to men indicating the strong presence of normative barriers that inhibit their entrepreneurship. These normative barriers emerge through the roles people play within women life spheres inhibiting their entrepreneurial intentions.


2022 ◽  
Vol 2146 (1) ◽  
pp. 012010
Author(s):  
Zhihong Li ◽  
Guangxu Liu ◽  
Yijie Dang ◽  
Zhijie Shang ◽  
Nan Lin

Abstract As an emerging product under the condition of informatization, the utilization of cloud platform in many industries has brought fundamental changes to the production and business model in related fields. The cloud platform provides rich and diverse utilization services to terminals through multi-dimensional integration of different IT resources. With the in-depth utilization of cloud platform, the security problems it faces are becoming more and more prominent. The traditional network security protection means have been difficult to effectively adapt to and deal with the security threats under the new situation of cloud platform utilization. As a prominent part of building cloud platform, the construction level of virtualization security protection system will have an intuitive impact on the security of cloud platform. At present, the virtualization security protection management system under cloud platform is facing direct threats from virtual machine deployment, virtual machine communication and virtual machine migration. Based on this, this paper studies the virtualization security protection management system of cloud platform from the perspective of virtualization security tech, so as to ameliorate the stability, reliability and security of cloud platform.


2021 ◽  
Vol 23 (4) ◽  
pp. 0-0

Covid-19 has proliferated across the nations with increasing number of cases each day. Thus, IT companies are now forced to operate from remote places with limited IT resources. However, these companies across the globe are on continuous touch with their software development and maintenance teams to ensure that they are productive and are able to deliver their services on the projects on time. We study the challenges faced by the IT companies at this juncture and the need for a different software development approach to complete the projects successfully even during such crisis. In this context, when the IT industries are making attempts to complete their on-going software projects and also to attend to some critical up-gradation in their previously delivered products, the challenges faced by them due to acute shortage of IT resources and transforming the working model from physical setup to remote platform needs to be studied. This calls for studying the existing software development models and practices and defining an alternate one that would suit the present IT scenario.


2021 ◽  
Vol 23 (4) ◽  
pp. 1-10
Author(s):  
S. Parthasarathy ◽  
Thangavel Chandrakumar

Covid-19 has proliferated across the nations with increasing number of cases each day. Thus, IT companies are now forced to operate from remote places with limited IT resources. However, these companies across the globe are on continuous touch with their software development and maintenance teams to ensure that they are productive and are able to deliver their services on the projects on time. We study the challenges faced by the IT companies at this juncture and the need for a different software development approach to complete the projects successfully even during such crisis. In this context, when the IT industries are making attempts to complete their on-going software projects and also to attend to some critical up-gradation in their previously delivered products, the challenges faced by them due to acute shortage of IT resources and transforming the working model from physical setup to remote platform needs to be studied. This calls for studying the existing software development models and practices and defining an alternate one that would suit the present IT scenario.


2021 ◽  
Vol 5 (3) ◽  
pp. 231
Author(s):  
Asep Muhamad Taufik ◽  
Fandi Gunawan ◽  
Jodi Setiyawan ◽  
Basic Dirgantara B.A.P ◽  
Muhammad Rifki Shihab

The mining industry has faced intense challenges and disruptions from global trends. The mining industry needs to perform a transformation to survive. The important thing for mining companies in technological adoption is digital transformation. XYZ is a holding company with many subsidiaries with primary businesses in the coal mining sector spread throughout Indonesia. As part of digital transformation, one of the company's initiatives is to centralize IT resources into one organization, with the objective can share its utilization with all subsidiaries. IT's centralization and shared services caused problems, such as human resources in different company ownership, budget allocation among companies, and the structure of financing and utilization of IT resources for use. The problem was solved by mapping all the components' IT roles at the company based on the framework created by Applegate, Austin, and Soule. Mapping the role of IT in this company can be used as a guideline to make organizational change. Organizational changes that need to be done base on analysis is to change the structure of the organization of IT into a bimodal model, its combination between the Functional-Lean model and Matrix-Agile model. The Functional-Lean model provides organizations as a function to keep lean but can deliver high standard services and keep it stable. The Matrix-Agile model can provide agility for the organization to develop new and run projects. IT Governance at XYZ will use the Federal model.


2021 ◽  
Vol 11 (16) ◽  
pp. 7547
Author(s):  
Henning Baars ◽  
Ann Tank ◽  
Patrick Weber ◽  
Hans-Georg Kemper ◽  
Heiner Lasi ◽  
...  

The collection and analysis of industrial Internet of Things (IIoT) data offer numerous opportunities for value creation, particularly in manufacturing industries. For small and medium-sized enterprises (SMEs), many of those opportunities are inaccessible without cooperation across enterprise borders and the sharing of data, personnel, finances, and IT resources. In this study, we suggest so-called data cooperatives as a novel approach to such settings. A data cooperative is understood as a legal unit owned by an ecosystem of cooperating SMEs and founded for supporting the members of the cooperative. In a series of 22 interviews, we developed a concept for cooperative IIoT ecosystems that we evaluated in four workshops, and we are currently implementing an IIoT ecosystem for the coolant management of a manufacturing environment. We discuss our findings and compare our approach with alternatives and its suitability for the manufacturing domain.


2021 ◽  
Author(s):  
Rogier Van de Wetering ◽  
Johan Versendaal

UNSTRUCTURED There is a limited understanding of IT's role as a crucial enabler of patient agility and the department's ability to respond to patient's needs and wishes adequately. This study's objective is to contribute to the insights of the validity of the hypothesized relationship between IT resources, practices and capabilities, and hospital departments' knowledge processes and the department's ability to adequately sense and respond to patient needs and wishes, i.e., patient agility. This study conveniently sampled data from 107 clinical hospital departments in the Netherlands and uses structural equation modeling for model assessment. IT ambidexterity positively enhances the development of a digital dynamic capability. Likewise, IT ambidexterity also positively impacts the hospital department's knowledge processes. Both digital dynamic capability and knowledge processes positively influence patient agility. IT ambidexterity promotes taking advantage of IT resources and experiments to reshape patient services and enhance patient agility.


2021 ◽  
Author(s):  
Rogier van de Wetering

Hospitals are currently exploring digital options to transform their clinical procedures and their overall engagement with patients. This paper investigates how hospital departments can leverage the ability of firms to simultaneously explore new IT resources and practices (IT exploration) as well as exploit their current IT resources and practices (IT exploitation), i.e., IT ambidexterity, to adequately sense and respond to patients' needs and demands, i.e., patient agility. This study embraces the dynamic capability view and develops a research model, and tests it accordingly using cross-sectional data from 90 clinical hospital departments from the Netherlands through an online survey. The model's hypothesized relationships are tested using Partial Least Squares (PLS) structural equation modeling (SEM). The outcomes demonstrate the significance of IT ambidexterity in developing patient agility, positively influencing patient service performance. The study outcomes support the theorized model can the outcomes shed light on how to transform clinical practice and drive patient agility.


Sign in / Sign up

Export Citation Format

Share Document