Big Data in Organizations and the Role of Human Resource Management: a Complex Systems Theory- Based Conceptualization
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Enterprise Information Management (EIM): the Hidden Secret to Peak Business Performance
Enterprise Information Management (EIM): The Hidden Secret to Peak Business Performance A White Paper by Vincent Lam and JT Taylor Table of Contents 1 EIM: What It Is and Why It Matters 1 Customer Service 1 Marketing Opportunities 2 Process Improvement 2 Regulatory Compliance 2 Fraud Detection 3 EIM: The Challenges 3 The Enterprise Information Lifecycle 4 Upstream 4 Instream 5 Downstream 6 Formulating Your EIM Strategy: Key Points to Consider 6 Unlimited Data Access 6 End-to-End Data Management and Quality Control 6 Maximum Flexibility 7 The iWay EIM Suite: True Enterprise-Wide Information Management 7 Unparalleled Data Quality Management 10 Comprehensive Master Data Management 13 The Broadest Information Reach 13 Multiple Levels of Information Latency 13 Laying the Foundation for Critical Information-Integration Initiatives 16 Conclusion EIM: What It Is and Why It Matters Over the past decade, organizations of all types and sizes have experienced significant growth in the volume of business information they generate and maintain. That information and the technology architectures that house it have also become increasingly complex. The Butler Group, a division of Datamonitor, estimates that approximately 80 percent of vital business information is currently stored in unmanaged repositories, making its efficient and effective use a nearly impossible feat. Enterprise information management (EIM) is a strategic business discipline that combines many of the key principles of enterprise integration, business intelligence (BI), and content management to streamline and formalize the activities associated with data storage, access, and handling. Comprehensive EIM initiatives blend processes and technologies to significantly improve the way information is managed and leveraged across a company. -
Project Information Management PROJECT MANAGEMENT for DEVELOPMENT ORGANIZATIONS Project Information Management
pm4dev, 2016 –management for development series © Project Information Management PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS Project Information Management PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS A methodology to manage development projects for international humanitarian assistance and relief organizations © PM4DEV 2016 Our eBook is provided free of charge on the condition that it is not copied, modified, published, sold, re-branded, hired out or otherwise distributed for commercial purposes. Please give appropriate citation credit to the authors and to PM4DEV. Feel free to distribute this eBook to any one you like, including peers, managers, and organizations to assist in their project management activities. www.pm4dev.com Project Information Management INTRODUCTION “If you fail to plan, you plan to fail.” “.. A major weakness is the ability of project staff to utilize their logframe for designing a coherent and integrated, overall information system, where a manageable and limited number of feasible information activities are planned, which together will ensure that effective effect and impact level monitoring will occur. It is typical for projects to end up collecting too much rather than too little information. Frequently though, much of this information is not relevant to monitoring the results and impacts for which the project is accountable, and that which is, is not collected sufficiently reliably or regularly. By restricting the number, but improving the quality and reliability of their major information gathering activities, projects will much improve their information systems.” CARE International EDIAIS Case Study Project Information Management Plan Detailed planning is critical to the development of usable, high quality information deliverables that meet the needs of internal and external information users. -
ASD-Covert-Foreign-Money.Pdf
overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology �������������������������������������������������������������������������������������������������� -
Information Management Strategy I Table of Contents
information management strategy i Table of Contents 02 Message from the DM 03 Strategic Alignment 04 The Vision 05 Executive Summary 06 Introduction WHAT IS INFORMATION? WHAT IS INFORMATION MANAGEMENT? WHY IS INFORMATION MANAGEMENT IMPORTANT FOR THE GOA? 08 Business Drivers 11 Strategic Goals GOAL ONE. GOAL TWO. GOAL THREE. 14 Moving Forward 15 Acknowledgements 16 Glossary Message from the DM Service Alberta is focused on working collaboratively to foster an open, transparent, accountable and participatory government. We recognize that information, along with people, finances and infrastructure, are key strategic resources in the Government of Alberta, and are at the very core of our operations. Service delivery activities, decision-making, policy development and planning activities are all founded on information. The quality, reliability and integrity of information are critical to good-decision making in the government. Proper management of information will transform the delivery of program and service outcomes, protecting Albertans from information security and privacy risks. This will help ensure that the needs of Albertans are met through efficient and effective operations. The Information Management Strategy creates the foundation we need to continually improve, transform and increase information sharing, accountability and transparency in the government. It articulates a clear vision with three goals that address key business drivers, and works toward promoting effective and innovative information management practices within the -
The Impact of Information Technology on Supply Chain Performance: a Knowledge Management Perspective
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by The University of North Carolina at Greensboro THE IMPACT OF INFORMATION TECHNOLOGY ON SUPPLY CHAIN PERFORMANCE: A KNOWLEDGE MANAGEMENT PERSPECTIVE by Yuan Niu A dissertation submitted to the faculty of The University of North Carolina at Charlotte in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology Charlotte 2010 Approved by: _______________________________ Dr. Chandrasekar Subramaniam _______________________________ Dr. Antonis Stylianou _______________________________ Dr. Sungjune Park _______________________________ Dr. Arun Rai _______________________________ Dr. Thomas Stevenson ii © 2010 Yuan Niu ALL RIGHTS RESERVED iii ABSTRACT YUAN NIU. The impact of information technology on supply chain performance: a knowledge management perspective (Under direction of DR. CHANDRASEKAR SUBRAMANIAM AND DR. ANTONIS STYLIANOU) Supply chain management has become an increasingly important management tool to help organizations improve their business operations. Although information and communication technologies have been used extensively in supply chains, there is a lack of systematic evidence regarding the mechanisms through which IT creates value. Furthermore, as supply chain objectives are going beyond operational efficiency towards pursuing higher-order goals, such as understanding the market dynamics and discovering new partnering arrangements to provide greater customer value, the capabilities -
Information Management Strategy
Information Management Strategy July 2012 Contents Executive summary 6 Introduction 9 Corporate context 10 Objective one: An appropriate IM structure 11 Objective two: An effective policy framework 13 Objective three: Excellence in records and document management 15 Objective four: Changing the culture through communication and training with 18 effective monitoring and performance management June 2012 Action Plan to Best in Class Information Management 20 Croydon’s information management strategy 3 4 Croydon’s information management strategy Foreword by the chief executive There are practical business There are clear links between information reasons for having an management and performance management. information management This ranges from how we measure our strategy. Better information organisational performance right the way through management will create to our individual performance, through PDCS. efficiencies in accommodation, IT and This means that it is everyone’s responsibility in better use of its staff by the organisation to ensure that information is providing ready access to managed effectively. We have a duty of care to relevant information and the storage or our customers in ensuring that information is destruction of irrelevant information. handled in the best way possible and this strategy sets out how we intend to further improve This will, in turn, lead to a better service provided information management. to residents and other service users. It is up to every single one of us to help ensure the Increasingly our services are provided in success of this strategy. collaboration with a range of partners from all sectors. The effective and efficient provision of these services requires that information passes between organisations in a timely and appropriate manner. -
Making Technology Fit: Designing an Information Management System for Monitoring Social Protection Programmes in St
Making Technology Fit: Designing an Information Management System for Monitoring Social Protection Programmes in St. Kitts Kristina Pitula, Daniel Sinnig and T. Radhakrishnan Faculty of Engineering and Computer Science, Concordia University, Montreal Abstract This paper reports on the development of an Information Management System to monitor and plan social protection programmes for the St. Kitts’ Department of Social Work. Best practices for the design of such technologies require special consideration of users’ needs; in the case of St. Kitts, this included meeting the constraints of the small island environment. The collaborative process between the software developers and users, wherein users explain what they need and the software is designed accordingly, was complicated by the existence of a disconnect between users’ work practices and those supported by the proposed system. The challenge was thus to design a viable and sustainable information management system (IMS) relevant to the users’ work, and responsive to local constraints. The project revealed cultural differences between department workers and software developers. It suggested new methodologies for assessing user needs, eliciting their preferences, and building their capacity in electronic recordkeeping. It also highlighted the need to develop communication strategies for both clients and developers of technology. The lessons learnt have implications for improved practice when introducing IMS technologies into work contexts in microstates where they are currently not used. 1. Introduction In their continuing effort to find innovative strategies to maximize social and human capital, small island developing states (SIDS) have turned to the use of information and communication technology (ICT) to overcome the restraints posed by isolation, diseconomies of scale, and other limited resources (Atchoarena et al., 2008; Hage & Finsterbusch, 1987). -
Information Management Planning (Pdf)
G Information ii Management Information Management Planning March 2005 Discussion Draft Produced by Information Management Branch Open Government Service Alberta 3rd Floor, Commerce Place 10155 – 102 Street Edmonton, Alberta, Canada T5J 4L4 Office Phone: (780) 427-3884 Fax: (780) 422-0818 Website: www.alberta.ca/information-management-branch.aspx Email: [email protected] ©Government of Alberta ISBN 0-7785-3694-7 Information Management Planning Contents Contents .................................................................................... i 1. Introduction ......................................................................... 1 The need for information management planning ............................................. 1 Context and scope of the plan ...................................................................... 3 Developing the plan .................................................................................... 5 2. Establish Planning Team....................................................... 8 Objective ................................................................................................... 8 Who to involve ........................................................................................... 8 Activities ................................................................................................... 9 Checklist ................................................................................................. 10 3. Define Vision and Future State .......................................... -
Cyber Dissuasion
N° 03/2012 recherches & documents mars 2012 Cyber Dissuasion Bruno gruselle Maître de recherche à la Fondation pour la Recherche Stratégique Bruno tertrais Maître de recherche à la Fondation pour la Recherche Stratégique alain esterle Chercheur associé à la Fondation pour la Recherche Stratégique w w w . frstrategie . o r g CYBER DISSUASION RECHERCHES & DOCUMENTS N ° 03/2012 Édité et diffusé par la Fondation pour la Recherche Stratégique 4 bis rue des Pâtures – 75016 PARIS ISSN : 1966-5156 ISBN : 978-2-911101-68-7 EAN : 9782911101687 WWW.FRSTRATEGIE.ORG 4 B I S RUE DES P ÂTURES 75 016 P ARIS TÉL. 01 43 13 77 77 FAX 0 1 43 13 77 78 SIRET 394 095 533 00045 TVA FR74 394 095 533 CODE APE 7220Z FONDATION RECONNUE D'UTILITÉ PUBLIQUE – DÉCRET DU 26 FÉVRIER 1993 SOMMAIRE INTRODUCTION ....................................................................................................................... 5 LES VULNERABILITES DE L’ESPACE NUMERIQUE ET LES RISQUES ASSOCIES SONT DEJA IMPORTANTS ET DEVRAIENT S ’AGGRAVER A L ’HORIZON 2020 ................................................... 9 Il est nécessaire d’établir le degré de gravité des risques numériques, les vulnérabilités exploitables et les perspectives de leur développement ................. 9 Les menaces pesant sur l’espace numérique ont d’ores et déjà des conséquences de sécurité importantes ...........................................................10 Les acteurs malveillants de l’espace numérique sont nombreux et leurs motivations appartiennent à des ensembles diversifiés ........................................14 -
Winter 2020 Film Calendar
National Gallery of Art Film Winter 20 Special Events 11 Abbas Kiarostami: Early Films 19 Checkerboard Films on the American Arts: Recent Releases 27 Displaced: Immigration Stories 31 African Legacy: Francophone Films 1955 to 2019 35 An Armenian Odyssey 43 Hyenas p39 Winter 2020 opens with the rarely seen early work of Abbas Kiarostami, shown as part of a com- plete retrospective of the Iranian master’s legacy screening in three locations in the Washington, DC, area — the AFI Silver Theatre, the Freer Gallery of Art, and the National Gallery of Art. A tribute to Check- erboard Film Foundation’s ongoing documentation of American artists features ten of the foundation’s most recent films. Displaced: Immigration Stories is organized in association with Richard Mosse: Incom- ing and comprises five events that allow audiences to view the migrant crisis in Europe and the United States through artists’ eyes. African Legacy: Franco- phone Films 1955 to 2019 celebrates the rich tradition of filmmaking in Cameroon, Mauritania, Ivory Coast, Senegal, and Niger, including filmmakers such as Med Hondo, Timité Bassori, Paulin Soumanou Vieyra, Ousmane Sembène, Djibril Diop Mambéty, and Moustapha Alassane as well as new work by contemporary Cameroonian artist Rosine Mbakam. An Armenian Odyssey, organized jointly with Post- Classical Ensemble, the Embassy of Armenia, the National Cinema Center of Armenia, and the Freer Gallery, combines new films and recent restorations, including works by Sergei Parajanov, Kevork Mourad, Hamo Bek-Nazaryan, and Rouben Mamoulian, as well as musical events at Washington National Cathedral. The season also includes a number of special events and lectures; filmmaker presentations with Rima Yamazaki and William Noland; and recent documentaries such as Cunningham; Leaving Home, Coming Home: A Portrait of Robert Frank; Museum Town; The Hottest August; Architecture of Infinity; and It Will Be Chaos. -
The Question of State Sponsored Cyber Terrorism and Espionage Student Officer
st th The Hague International Model United Nations Qatar 2020 | 21 – 24 of January 2020 Forum: The Security Council Issue: The Question of State sponsored cyber terrorism and espionage Student Officer: Sebastian Santoni Position: President Introduction On the 27th of April 2007, Estonia experienced the first of a series of cyber attacks which would go on to shape laws, policies, and attitudes within and outside its borders. The country was bombarded by thousands of independent actors, resulting in the complete loss of most internet services for three weeks. The Estonian parliament, banks and media were all targeted in the midst of political disagreements with Russia. Although not the first incident of cyber terrorism, this was definitely one of the most destructive, managing to make an entire country go offline. In response, the world’s first ever regulations concerning actions in cyberspace were drafted, hoping to prevent such incidents from occurring in the future. However, incidents of cyber terrorism and espionage continued and remain a major threat to international security. Not only can they create mistrust and paranoia between nations, but also paralyse the organizations and resources core to their economic, social and political stability. This is especially true when such acts are initiated by countries and their related bodies, placing the world’s most sophisticated technology in the wrong hands. As members of the United Nations, it is the responsibility of countries to use their resources, voices and cooperation to strengthen international cyber security and work towards a world where state-sponsored cyber terrorism and espionage are void. Organizations such as the Kaspersky Lab and the Cooperative Cyber Defence Center of Excellence have made strides toward combating the issue, although they are restricted by an acute lack of relevant treaties and laws. -
From Information Management to Information Governance: the New Paradigm
From Information Management to Information Governance: The New Paradigm hbrconsulting.com | [email protected] | 312.201.8400 © 2017 HBR Consulting LLC. All rights reserved. OVERVIEW The explosive growth of information presents management challenges to every organization today. Retaining volumes of information beyond its legal, regulatory, or operational value increases data storage costs and strains information technology resources. Further, there is an inherent risk in retaining information beyond its legal or business retention needs when it may be subject to discovery related to litigation, audits, or governmental investigations. Added to these challenges are increasing privacy and security issues. Information containing personally identifiable information, intellectual property, or other sensitive data, if inadequately protected, is subject to cyber attack and security breach. The potential results of such a breach can be devastating — millions of revenue dollars lost, sanctions and fines levied, executives fired, and reputation and customer trust irreparably damaged. Today’s siloed approach to information management Traditionally, distinct business functions within an organization have been designated as responsible for specific pieces of the information pie. Some functions with defined focus include the following: • Records Management, responsible for establishing the retention rules for records, has historically emphasized the management of hardcopy records and now struggles to manage digital information, often requiring an approach that falls outside of the traditional methodologies. • The Legal department, with a reactive focus on litigation and e-discovery needs, has often discounted “non-responsive” information from its purview. • Information Security has focused its attention on implementing key controls for the security and protection of data, everything from access control permissions to data loss prevention tactics to breach response plans, without necessarily taking into consideration the practical business needs for that data.