Tactical planning of composite services in heterogeneous logistics networks is facing two major problems. First, existing planning methods lack in concreteness as they instruct to compare different alternatives of pos...
详细信息
ISBN:
(纸本)9783319291338;9783319291321
Tactical planning of composite services in heterogeneous logistics networks is facing two major problems. First, existing planning methods lack in concreteness as they instruct to compare different alternatives of possible composite services in order to find the best solution, but they do not state how to develop and engineer those alternatives. Second, the planning and evaluation of composite services via simulation is difficult, because services are offered and processed by different logistics service providers of the network and thus are based on different information sources and different kind of models. In this paper both issues are addressed with a comprehensive method. Engineering is supported by the service map that is an electronic catalog and construction system for services to create alternatives of process models from composite services automatically. Evaluation is assisted by an automated transformation of process models to simulation models. information exchange between both concepts is realized with a model-driven integration approach.
In business organizations a group decision process, which takes aggregation of DMs' final choices into account, usually uses a voting procedure (VP). Therefore, a relevant part of the decision process consists of ...
详细信息
ISBN:
(纸本)9783319195155;9783319195148
In business organizations a group decision process, which takes aggregation of DMs' final choices into account, usually uses a voting procedure (VP). Therefore, a relevant part of the decision process consists of choosing the VP. Since all VPs have some drawbacks that may occasionally lead to undesirable outcomes it is important to characterize decision settings that make certain performance criteria particularly pertinent for choosing a VP. In this paper, it is assumed that this decision should be made by the DMs while the analyst will give some methodological and technical aid, and that a specific decision model will be used. Therefore, this paper presents a framework for aiding the choice of a VP in a business organization decision context, based on an MCDM model.
Hesitant fuzzy set is a very useful means to depict the decision information in the process of decision making. In this paper, motivated by the extension principle of hesitant fuzzy sets, we export Einstein operations...
详细信息
ISBN:
(纸本)9783319195155;9783319195148
Hesitant fuzzy set is a very useful means to depict the decision information in the process of decision making. In this paper, motivated by the extension principle of hesitant fuzzy sets, we export Einstein operations on fuzzy sets to hesitant fuzzy sets, and develop some new arithmetic averaging aggregation operators, such as the hesitant fuzzy Einstein weighted averaging (HFWA epsilon) operator, hesitant fuzzy Einstein ordered weighted averaging (HFOWA(epsilon)) operator, and hesitant fuzzy Einstein hybrid weighted averaging (HFHWA(epsilon)) operator, for aggregating hesitant fuzzy elements. Finally, we apply the proposed operators to multiple attribute group decision making with hesitant fuzzy information.
The article is related to ethical, human and organizational - motivational aspects of IS development. The first goal of the study is to explore the occurrence of professional burnout and psychological violence among I...
详细信息
ISBN:
(纸本)9783319243665;9783319243658
The article is related to ethical, human and organizational - motivational aspects of IS development. The first goal of the study is to explore the occurrence of professional burnout and psychological violence among IT users in Poland, a transition economy. The second goal is to verify the dependency of professional burnout and negative communication aspects as mobbing or bullying, among IT users. The results of the analysis fill the gap in the scientific literature that concerns the ethical experiences associated with negative communication at work, such as psychological violence (called bullying or mobbing) and its impact on the burnout of IT users. The authors adapted, elaborated and used two questionnaires. The first one related to mobbing includes such dimensions like impact of the hindering on the ability to communicate, actions to disrupt the public perception of the person, the impact of disrupting of social relations, activities affecting the quality of life and employee situation, actions detrimental effect on the health of the victim. The second questionnaire is related to burnout syndrome and its three dimensions like physical, social and mental symptoms. The study is based on a pilot survey conducted among 120 IT users in south-west region of Poland. The results of this analysis show that phenomena of mobbing and professional burnout exist. Mobbing has an impact on professional burnout of IT users in transition economies. Managers and politicians in transition economies can benefit our study, by the use our findings to change some legal rules and positively influence the organizational ethical climate that, in turn, will remove psychic aggression and positively affect job satisfaction.
Past studies have shown that Door-in-the-face tactics can induce compliance from negotiators. This research examines the hidden costs of the use of the Door-in-the-face tactic in dyadic negotiations. It shows that lea...
详细信息
ISBN:
(纸本)9783319195155;9783319195148
Past studies have shown that Door-in-the-face tactics can induce compliance from negotiators. This research examines the hidden costs of the use of the Door-in-the-face tactic in dyadic negotiations. It shows that learning about opponents' use of this tactic affects negotiators' feelings of mistreatment and their behaviours in the subsequent negotiation. It also induces negotiators' covert, retaliatory behaviour. The results showed that negotiators who had dealt with opponents using the Door-in-the-face tactic made larger demands and attained higher outcomes in the subsequent negotiation. It was also found that feelings of mistreatment by opponents tended to spread over into future negotiations. Feelings of mistreatment mediated the effect of opponents' use of Door-in-the-face tactics on covert retaliation. Implications of results are discussed and directions for future research are given.
We propose a demand response privacy preserving interaction and intermediary protocol design (DPIP) using a trusted third party design to facilitate the collection of Smart Metering data and to perform Demand Response...
详细信息
ISBN:
(纸本)9783319267623;9783319267616
We propose a demand response privacy preserving interaction and intermediary protocol design (DPIP) using a trusted third party design to facilitate the collection of Smart Metering data and to perform Demand Response while preserving the privacy of residential customers in the Smart Grid. DPIP relies on intermediaries hiding customer program participation from Demand Response Aggregators (DRA) and thus enhance their anonymity and it provides individualized privacy preserved billing. This is the first of a series of papers. Its focus is the protocol, while following work discusses the role of differential privacy. Keywords: Smart Grid Management, Privacy, Privacy Enhancing Technologies.
In information and Communication Technology (ICT) a 'deliverable' may be either software (perceived as an 'output') or a service (perceived as an 'outcome'). On the one hand, the differences be...
详细信息
ISBN:
(数字)9783319242859
ISBN:
(纸本)9783319242859;9783319242842
In information and Communication Technology (ICT) a 'deliverable' may be either software (perceived as an 'output') or a service (perceived as an 'outcome'). On the one hand, the differences between software and service have led to the design of parallel models and lifecycles with more commonalities than differences, thereby not supporting the adoption of different frameworks. For instance, a software project could be managed applying best practices for services (e.g. ITIL), while some processes (e.g. Verification & Validation) are better defined in models of the Software Management domain. Thus, this paper aims at reconciling these differences and provides suggestions for a better joint usage of models/frameworks. To unify existing models we use the LEGO approach, which aims at keeping the element of interest from any potential model/framework for being inserted in the process architecture of the target business Process Model (BPM) of an organization, strengthening the organizational way of working. An example of a LEGO application is presented to show the benefit from the joint view of the 'software + service' sides as a whole across the project lifecycle, increasing the opportunity to have many more sources for this type of improvement task.
暂无评论