Enquête Pratiques Organisationnelles et Managériales des Entreprises (POME)
    Enterprises’ organizational and managerial practices survey (POME)
    The survey on ‘Enterprises’ organizational and managerial practices survey (POME) – Luxembourg – 2013’ was conducted between January and March 2013. The survey was run by regular mail on the census of resident legal units of the private sector with at least 15 employees. The response rate was 56%. The number of legal units in the dataset is 1 468. The topics covered are the management practices offered to employees (team work, job rotation, training, information-sharing, quality management, family-friendly policies, incentives, …) as well as the information and communication technologies (Internet, ERP, VPN, cloud, …). This survey interconnected with the survey on ‘working conditions and quality of work life (QVT) – Luxembourg – 2013’ is the first employer-employee dataset available in Luxembourg.
    Businesses
    Organizational practices
    Managerial practices
    Information And Communications Technology
    Access To Information And Communications Technology


    h1a
    H1.     Does your enterprise use each of the following Information and Communication Technology (ICT)? a.    Intranet [3]
    TAG: Access To Information And Communications Technology
    h1b
    H1.     Does your enterprise use each of the following Information and Communication Technology (ICT)? b.    Video conferencing or web conference tool
    TAG: Access To Information And Communications Technology
    h1c
    H1.     Does your enterprise use each of the following Information and Communication Technology (ICT)? c.     Client or customer relationship software (CRM) [4]
    TAG: Access To Information And Communications Technology
    h1d
    H1.     Does your enterprise use each of the following Information and Communication Technology (ICT)? d.    Enterprise Resource Planning software (ERP) [5]
    TAG: Access To Information And Communications Technology
    h1e
    H1.     Does your enterprise use each of the following Information and Communication Technology (ICT)? e.    Workflow software [6], Business Process Management System (BPMS [7]), ...
    TAG: Access To Information And Communications Technology
    h1f
    H1.     Does your enterprise use each of the following Information and Communication Technology (ICT)? f.      Collaborative work software or groupware [8] (e.g.: SharePoint) or web collaborative tools
    TAG: Access To Information And Communications Technology
    h1g
    H1.     Does your enterprise use each of the following Information and Communication Technology (ICT)? g.    Electronic data interchange with external clients or suppliers (e.g. Extranet [9], EDI [10])
    TAG: Access To Information And Communications Technology
    h1h
    H1.     Does your enterprise use each of the following Information and Communication Technology (ICT)? h.    Employees' performance tracking software
    TAG: Access To Information And Communications Technology
    h2a
    H2.     Do you think that the use of Information and Communication Technology (ICT) in your enterprise has permitted ...? a.    To give more autonomy of decisions to team leader(s)
    TAG: Access To Information And Communications Technology
    h2b
    H2.     Do you think that the use of Information and Communication Technology (ICT) in your enterprise has permitted ...? b.    To give more autonomy of decisions to employees
    TAG: Access To Information And Communications Technology
    h2c
    H2.     Do you think that the use of Information and Communication Technology (ICT) in your enterprise has permitted ...? c.     To remove hierarchical levels
    TAG: Access To Information And Communications Technology
    h2d
    H2.     Do you think that the use of Information and Communication Technology (ICT) in your enterprise has permitted ...? d.    To improve the monitoring of work quality
    TAG: Access To Information And Communications Technology
    h2e
    H2.     Do you think that the use of Information and Communication Technology (ICT) in your enterprise has permitted ...? e.    To improve the supervision of employees
    TAG: Access To Information And Communications Technology
    h3
    H3.     How many employees (not senior executives) use Internet for professional purposes? (tick only one answer)
    TAG: Access To Information And Communications Technology
    h4
    H4.     Do your employees (not senior executives) can use Internet for personal purposes?
    TAG: Access To Information And Communications Technology
    h5
    H5.     Does your enterprise provide digital tools such as Smartphone, laptop and/or tablet to its employees (not senior executives)?
    TAG: Access To Information And Communications Technology
    h6
    H6.     Does your enterprise allow its employees (not senior executives) to use their own digital tools such as Smartphone, laptop and/or tablet to its employees (not senior executives)?
    TAG: Access To Information And Communications Technology
    h7a
    H7.     Does your enterprise allow its employees to access remotely (via a fixed, mobile or wireless connection to the Internet) to ...? a.    the e-mail system of your enterprise?
    TAG: Access To Information And Communications Technology
    h7b
    H7.     Does your enterprise allow its employees to access remotely (via a fixed, mobile or wireless connection to the Internet) to ...? b.    the documents of your enterprise?
    TAG: Access To Information And Communications Technology
    h7c
    H7.     Does your enterprise allow its employees to access remotely (via a fixed, mobile or wireless connection to the Internet) to ...? c.     dedicated business software applications of your enterprise? e.g. for orders or sales management, ERP[5] (Enterprise Resource Planning) related applications etc.
    TAG: Access To Information And Communications Technology
    h8
    H8.     Does your enterprise resort to the virtualization of servers or applications through Cloud Computing [11]?
    TAG: Access To Information And Communications Technology

    LISER database access and use policy

    As part of its studies and research, LISER has collected large amounts of data from various projects the Institute has carried out since its creation. LISER has also conducted a significant number of surveys in the country and in bordering countries mainly concerning individuals and households, from which it has analysed and archived information.

    LISER aims to increase the value of the data collected by making it available to the scientific community.

    It is, therefore, necessary to lay down essential rules for accessing the Institute's different databases. These rules concern the confidentiality statutes that are to be complied with as well as general conditions of use and procedures for accessing the multiple databases.

    This policy specifies the types of databases LISER makes available, as well as how they can be used, either :

    • (a) Externally, by user requests from the scientific community,
    • (b) Internally, by all LISER employees or by visitors to LISER.


    Data access conditions

    By default, all the databases owned or co-owned by LISER are accessible to all LISER employees on simple request (using a confidentiality declaration form). There may be specific cases that differ, namely databases of which LISER is not the sole owner. For the latter case, each database has its own arrangements (generally a specific data agreement form).

    For people external to LISER, access to data varies depending on the legal status and confidentiality level of the database requested. Therefore, depending on the database's confidentiality level, access may be granted only within LISER (physical entity) through an individualised and secure IT account. In all cases, access is requested using a form (see 'How to make a request').

    The aim of our policy is to facilitate access to data for research. The rules laid down are not used to hinder research or any other arbitrary desire to control. Rather, the aim is to put researchers in a position of responsibility with regard to data whose dissemination may be limited due to legal obligations (protection of persons, professional secrecy, etc.) or due to the data producer's interest (privilege of use, right of quotation, etc.).

    How to make a request

    The data access procedures differ depending on the user and data status. In all cases, users must sign an individual commitment.

    Data can be requested :

    • By contacting the LISER Data Centre : dataservice@liser.lu,
    • Or by drawing up (if one is available for the database requested) a LISER Agreement on data access or provision. (downloadable).
      Users provide information on their status and are requested to indicate which research project their request relates to. The published and signed documents must be sent by post to the following address :

      The Luxembourg Institute of Socio-Economic Research (LISER)
      11 Porte des Sciences Campus Belval
      L-4366 Esch-sur-Alzette
      Luxembourg