scholarly journals Responsible Resource Management in Remanufacturing—Framework for Qualitative Assessment in Small and Medium-Sized Enterprises

Resources ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 19
Author(s):  
Paulina Golinska-Dawson ◽  
Karolina Werner-Lewandowska ◽  
Monika Kosacka-Olejnik

Through the remanufacturing process, obsolete, broken, and end-of-use products are brought to “a like new condition”. Remanufacturing is an example of implementation of circular economy at a company level. There are few studies on responsible resource management in a remanufacturing process. This paper contributes to this research gap by presenting a two-layered framework, which uses the maturity model theory, and it allows for a quick scan of a remanufacturing process. First, in the descriptive layer of the framework we define five maturity levels with regard to responsible resource management. We analyze water, emissions, energy, and materials, and describe relevant responsible resource management practices, which we link with maturity levels. We also design the relevant self-assessment tool which utilizes the existing expert’s knowledge of a company. Then, in the prescriptive layer of the framework, we propose a method for the identification of the maturity gap, and areas for improvement. We develop a procedure for prioritizing the measures, which shall be implemented in order to achieve a higher level of responsible resource management in a remanufacturing company. The framework is tested in small and medium-sized enterprises from the automotive industry.

Author(s):  
Carolyn L. Kerr ◽  
Mina Abdulghani ◽  
Claudia Smith ◽  
Deep K. Khosa

Feedback has been shown to be one of the most powerful and effective influences on student achievement; however, the optimal method for providing feedback to trainees during veterinary skills training has yet to be determined. A prospective mixed-methods study was undertaken to evaluate student perceptions and performance outcomes with self-assessment using video- or instructor-delivered feedback during skills training using a model. Forty participants naïve to intravenous (IV) catheter placement were randomly assigned either to self-assessment using video or to instructor-directed feedback. A questionnaire probing participants’ perceptions of their knowledge level and confidence in their skills was completed before and after the training, and an interview was done at study completion. Final skill performance was recorded using video capture to permit blind evaluations using a standard assessment tool. A quantitative evaluation of the performance and questionnaire scores, as well as a qualitative assessment of the interviews, was performed. Questionnaire scores were significantly higher in the post-study questionnaire for 12 of the 14 questions in both groups. Students assigned to the instructor-directed group had significantly higher scores than students in the self-directed group on the skill performance ( p < .05). Self-reported confidence in knowledge and skill related to the IV catheterization technique improved with both self-directed feedback using video and instructor-directed feedback. Skill performance, however, was superior following instructor-directed feedback. Participants expressed positive experiences associated with use of the models for skills training, the value of the learning materials including the video, and guidance during learning.


2008 ◽  
pp. 1396-1415
Author(s):  
James E. Goldman ◽  
Vaughn R. Christie

This chapter introduces the Metrics Based Security Assessment (MBSA) as a means of measuring an organization’s information security maturity. It argues that the historical (i.e., first through third generations) approaches used to assess/ensure system security are not effective and thereby combines the strengths of two industry proven information security models, the ISO 17799 Standard and the Systems Security Engineering Capability Maturity Model (SSE-CMM), to overcome their inherent weaknesses. Furthermore, the authors trust that the use of information security metrics will enable information security practitioners to measure their information security efforts in a more consistent, reliable, and timely manner. Such a solution will allow a more reliable qualitative measurement of the return achieved through given information security investments. Ultimately, the MBSA will allow professionals an additional, more robust self-assessment tool in answering management questions similar to: “How secure are we?”


2018 ◽  
Vol 11 (2) ◽  
pp. 187
Author(s):  
Jabier Retegi Albisua ◽  
Juan Ignacio Igartua López

Purpose: In order to achieve excellence, outsourced maintenance contractors in Oil&Gas sector play a key role due to the important impact of their task on security, availability and energy consumption. This paper presents the process followed in order to implement a Supplier Development Program in a refinery using Company Maturity Model (CoMM) and the results obtained in three cases validating the method to obtain a strategic improvement project medium term grid.Design/methodology/approach: The methodology followed consists of constructing a CoMM capturing the knowledge existing in the refinery and applying it with three supplier improvement teams. Findings and conclusions have arised through an observation of the three processes and extracting common conclusions.Findings: The resulting CoMM has been used for self-assessment by three suppliers and has demonstrated its potential to define a medium-term improvement project road map validated by the customer. Furthermore, during the design and application processes, the contribution of CoMMs to the SECI process of knowledge management has been observed.Practical implications: The use of CoMMs in a service contractor context can be applied in other sectors. It contributes to alignment of targets between the supplier and customer companies and to knowledge sharing inside both firms.Originality/value: Maturity models in many transversal fields (CMMI, EFQM, BPMM, PEMM, etc.) have been thoroughly studied in the literature. Less effort has been made analysing the case of using maturity models constructed and implemented by a company for its specific purposes. In this paper, the process followed by a company to establish a Supplier Development Process using CoMMs is described.


2015 ◽  
Vol 25 (2) ◽  
pp. 57-68
Author(s):  
Timothy W Butler ◽  
David L Williams ◽  
Tingting Yan

This article introduces readers to a relatively new self-assessment tool for measuring the readiness and effectiveness of supplier materials management and logistics processes in the automotive industry. The tool, the Material Management Operating Guidelines/Logistics Evaluation (MMOG/ LE), was developed by the Automotive Industry Action Group (AIAG), and Odette International – a European alliance of automotive companies. The article begins with an introduction to the topic of quality and materials management assessment systems. The author’s then report on what they learned about MMOG/LE based on a review of the system and other comparable systems, and based on interviews with OEM’s and tier 1 and 2 auto suppliers that use the system. The article begins with a description of what the MMOG/LE system is, and how it works. The article then has a section comparing MMOG/LE and ISO/TS16949, and then another section comparing MMOG/LE and the SCOR model. The authors then address and comment on various strengths and weaknesses of the MMOG/LE model. Finally, the authors make several recommendations on how the system and processes for managing it could be improved. Overall, the authors find that MMOG/LE is an effective system for improving materials management and logistics performance.


2019 ◽  
Vol 13 (3) ◽  
pp. 170
Author(s):  
Hamad Alsawalqah ◽  
Yazan Alshamaileh ◽  
Bashar Alshboul ◽  
Areej Shorman ◽  
Azzam Sleit

Productive firms try to deliver high-quality products to be globally competitive. Therefore, software development firms need to adhere to a set of best practices that improve their processes. Capability maturity model integration (CMMI) comprehensively assesses the maturity of a firm&#39;s processes. Representing a major departure from the traditional method of running quality management in software development firms, the adoption of CMMI has major ramifications and long-lasting effects on a company&rsquo;s quality procedures. Unfortunately, the literature lacks information as to how firms should implement CMMI. Our research involved conducting an exploratory study examining the major factors that influenced CMMI adoption for Jordanian software development firms. Quality managers from eighteen software development organizations took an open-ended survey. The results show that the main factors in CMMI implementation in Jordanian software development firms were issues of its being too costly, having no time, dealing with market scope, and lack of top management support. Conclusions are also presented.


2000 ◽  
Vol 25 (1) ◽  
pp. 11-26 ◽  
Author(s):  
Robert L. Heneman ◽  
Judith W. Tansky ◽  
S. Michael Camp

A qualitative assessment is used to identify and describe the “gaps” between concerns entrepreneurs have about human resource management issues in growing small and medium-sized enterprises (SMEs) and the topics emphasized in the research literature on human resource practices in SMEs. Survey data from 156 young entrepreneurs, focus group data from 173 CEO/founders of fast-growth entrepreneurial firms, and 129 research articles were reviewed. Results revealed gaps and omissions in the literature, Including the importance to entrepreneurs of developing high-potential employees that can perform multiple roles under various stages of organizational growth and the matching of people to the organizational culture. Recommended perspectives for future research are identified.


Author(s):  
Amine Belhadi ◽  
Sachin S. Kamble ◽  
Charbel Jose Chiappetta Jabbour ◽  
Venkatesh Mani ◽  
Syed Abdul Rehman Khan ◽  
...  

Author(s):  
James E. Goldman ◽  
Vaughn R. Christie

This chapter introduces the Metrics Based Security Assessment (MBSA) as a means of measuring an organization’s information security maturity. It argues that the historical (i.e., first through third generations) approaches used to assess/ensure system security are not effective and thereby combines the strengths of two industry proven information security models, the ISO 17799 Standard and the Systems Security Engineering Capability Maturity Model (SSE-CMM), to overcome their inherent weaknesses. Furthermore, the authors trust that the use of information security metrics will enable information security practitioners to measure their information security efforts in a more consistent, reliable, and timely manner. Such a solution will allow a more reliable qualitative measurement of the return achieved through given information security investments. Ultimately, the MBSA will allow professionals an additional, more robust self-assessment tool in answering management questions similar to: “How secure are we?”


Procedia CIRP ◽  
2017 ◽  
Vol 64 ◽  
pp. 175-180 ◽  
Author(s):  
Konrad Exner ◽  
Raphael Zimpfer ◽  
Rainer Stark

Sign in / Sign up

Export Citation Format

Share Document