186 resultados para 100301 Biocatalysis and Enzyme Technology
Resumo:
The Australian economy is currently supported by a resources boom and work opportunities in traditionally male dominated fields of construction and engineering and information technology are at a premium. Yet despite more than 25 years of anti discrimination and equal employment opportunity legislation these industries still employ few women in operational or management roles. This paper investigates the issue of the low representation of women in project management and their different work and career experiences through interviews with male and female project managers.
Resumo:
In relation to enterprise technology governance (ETG), opinions differ between there being no need for board of director involvement to there being an urgent need for such involvement. This research highlights the need for boards to provide ETG oversight of technology-related strategy, investment and risk, and to be competent in doing so. We identify a large gap between board’s awareness of the importance of ETG, their taking action and the competency requirements for effective ETG. Further, while there is considerable research and literature about operational IT governance frameworks and operational IT competencies, there is no known research into the specific competencies boards of directors need to effectively govern enterprise technology. This research focuses on and develops a board-level ETG competency set using a mixed methods approach within a recognised competency development framework. Further development is tracked using a rigour scale to demonstrate a medium to high level of competency validity for the derived set. This research contributes to practice by providing the first known industry validated ETG competency set situated within new and emerging technology. It contributes to the body of knowledge in the modification and application of competency development and competency validation frameworks not previously applied to the role of board director.
Resumo:
The purpose of this paper is to provide an evolutionary perspective of cloud computing (CC) by integrating two previously disparate literatures: CC and information technology outsourcing (ITO). We review the literature and develop a framework that highlights the demand for the CC service, benefits, risks, as well as risk mitigation strategies that are likely to influence the success of the service. CC success in organisations and as a technology overall is a function of (i) the outsourcing decision and supplier selection, (ii) contractual and relational governance, and (iii) industry standards and legal framework. Whereas CC clients have little control over standards and/or the legal framework, they are able to influence other factors to maximize the benefits while limiting the risks. This paper provides guidelines for (potential) cloud computing users with respect to the outsourcing decision, vendor selection, service-level-agreements, and other issues that need to be addressed when opting for CC services. We contribute to the literature by providing an evolutionary and holistic view of CC that draws on the extensive literature and theory of ITO. We conclude the paper with a number of research paths that future researchers can follow to advance the knowledge in this field.
Resumo:
With this special issue, we draw attention to the growing and diverse field of HCI researchers exploring the interstices of food, technology and everyday practices. This special issue builds on the CHI workshop of the same name (Comber et al., 2012a), where we brought together the community of researchers that take food as a point from which to understand people and design technology. The workshop aimed to ‘to attend to the practical and theoretical difficulties in designing for human–food interactions in everyday life’ identifying four thematic areas of food practices – health and wellbeing; sustainability; food experiences; and alternative food cultures. These practical and theoretical difficulties are evident in the papers that we present here, though the distinction between our four themes, premised by complexities of food practices, is a little less evident. Thus, in the papers that follow we explore how the social, technological, cultural and methodological intertwine in the field of human–food interaction.
Resumo:
Digital Human Models (DHM) have been used for over 25 years. They have evolved from simple drawing templates, which are nowadays still used in architecture, to complex and Computer Aided Engineering (CAE) integrated design and analysis tools for various ergonomic tasks. DHM are most frequently used for applications in product design and production planning, with many successful implementations documented. DHM from other domains, as for example computer user interfaces, artificial intelligence, training and education, or the entertainment industry show that there is also an ongoing development towards a comprehensive understanding and holistic modeling of human behavior. While the development of DHM for the game sector has seen significant progress in recent years, advances of DHM in the area of ergonomics have been comparatively modest. As a consequence, we need to question if current DHM systems are fit for the design of future mobile work systems. So far it appears that DHM in Ergonomics are rather limited to some traditional applications. According to Dul et al. (2012), future characteristics of Human Factors and Ergonomics (HFE) can be assigned to six main trends: (1) global change of work systems, (2) cultural diversity, (3) ageing, (4) information and communication technology (ICT), (5) enhanced competiveness and the need for innovation, and; (6) sustainability and corporate social responsibility. Based on a literature review, we systematically investigate the capabilities of current ergonomic DHM systems versus the ‘Future of Ergonomics’ requirements. It is found that DHMs already provide broad functionality in support of trends (1) and (2), and more limited options in regards to trend (3). Today’s DHM provide access to a broad range of national and international databases for correct differentiation and characterization of anthropometry for global populations. Some DHM explicitly address social and cultural modeling of groups of people. In comparison, the trends of growing importance of ICT (4), the need for innovation (5) and sustainability (6) are addressed primarily from a hardware-oriented and engineering perspective and not reflected in DHM. This reflects a persistent separation between hardware design (engineering) and software design (information technology) in the view of DHM – a disconnection which needs to be urgently overcome in the era of software defined user interfaces and mobile devices. The design of a mobile ICT-device is discussed to exemplify the need for a comprehensive future DHM solution. Designing such mobile devices requires an approach that includes organizational aspects as well as technical and cognitive ergonomics. Multiple interrelationships between the different aspects result in a challenging setting for future DHM. In conclusion, the ‘Future of Ergonomics’ pose particular challenges for DHM in regards to the design of mobile work systems, and moreover mobile information access.
Resumo:
Purpose: To identify a 15-KDa novel hypoxia-induced secreted protein in head and neck squamous cell carcinomas (HNSCC) and to determine its role in malignant progression. Methods: We used surface-enhanced laser desorption ionization time-of-flight mass spectrometry (SELDI-TOF-MS) and tandem MS to identify a novel hypoxia-induced secreted protein in FaDu cells. We used immunoblots, real-time polymerase chain reaction (PCR), and enzyme-linked immunoabsorbent assay to confirm the hypoxic induction of this secreted protein as galectin-1 in cell lines and xenografts. We stained tumor tissues from 101 HNSCC patients for galectin-1, CA IX (carbonic anhydrase IX, a hypoxia marker) and CDS (a T-cell marker). Expression of these markers was correlated to each other and to treatment outcomes. Results: SELDI-TOF studies yielded a hypoxia-induced peak at 15 kDa that proved to be galectin-1 by MS analysis. Immunoblots and PCR studies confirmed increased galectin-1 expression by hypoxia in several cancer cell lines. Plasma levels of galectin-1 were higher in tumor-bearing severe combined immunodeficiency (SCID) mice breathing 10% O 2 compared with mice breathing room air. In HNSCC patients, there was a significant correlation between galectin-1 and CA IX staining (P = .01) and a strong inverse correlation between galectin-1 and CDS staining (P = .01). Expression of galectin-1 and CDS were significant predictors for overall survival on multivariate analysis. Conclusion: Galectin-1 is a novel hypoxia-regulated protein and a prognostic marker in HNSCC. This study presents a new mechanism on how hypoxia can affect the malignant progression and therapeutic response of solid tumors by regulating the secretion of proteins that modulate immune privilege. © 2005 by American Society of Clinical Oncology.
Australian Research to Encourage School Students’ Positive Use of Technology to Reduce Cyberbullying
Resumo:
Information and Communications Technology (ICT) has spread rapidly in Australia. Mobile phones, which increasingly have advanced capabilities including Internet access, mobile television and multimedia storage, are owned by 22% of Australian children aged 9-11 years and 73% of those aged 12-14 years (Australian Bureau of Statistics, 2012b), as well as by over 90% of Australians aged 15 years and over(Australian Communications and Media Authority (ACMA), 2010). Nearly 80% of Australian households have access to the Internet and 73% have a broadband Internet connection, ensuring that Internet access is typically reliable and high-speed (Australian Bureau of Statistics, 2012a). Ninety percent of Australian children aged 5-14 years (comprising 79% of 5-8 year olds; 96% of 9-11 year olds; and 98% of 12-14 year olds) reported having accessed the Internet during 2011-2012, a significant increase from 79% in 2008-2009 (Australian Bureau of Statistics, 2012b). Approximately 90% of 5-14 year olds have accessed the Internet both from home and from school, with close to 49% accessing the Internet from other places (Australian Bureau of Statistics, 2012b). Young people often make use of borrowed Internet access (e.g. in friends’ homes), commercial access (e.g. cybercafés), public access (e.g. libraries), and mobile device access in areas offering free Wi-Fi (Lim, 2009).
Resumo:
Every motorised jurisdiction mandates legal driving behaviour which facilitates driver mobility and road user safety through explicit road rules that are enforced by regulatory authorities such as the Police. In road safety, traffic law enforcement has been very successfully applied to modify road user behaviour, and increasingly technology is fundamental in detecting illegal road user behaviour. Furthermore, there is also sound evidence that highly visible and/or intensive enforcement programs achieve long-term deterrent effects. To illustrate, in Australia random breath testing has considerably reduced the incidence and prevalence of driving whilst under the influence of alcohol. There is, however, evidence that many road rules continue to be broken, including speeding and using a mobile phone whilst driving, and there are many instances where drivers are not detected or sufficiently sanctioned for these transgressions. Furthermore, there is a growing body of evidence suggesting that experiences of punishment avoidance – that is, successful attempts at avoiding punishment such as drivers talking themselves out of a ticket, or changing driving routes to evade detection –are associated with and predictive of the extent of illegal driving behaviour and future illegal driving intentions. Therefore there is a need to better understand the phenomenon of punishment avoidance to enhance our traffic law enforcement procedures and therefore safety of all road users. This chapter begins with a review of the young driver road safety problem, followed by an examination of contemporary deterrence theory to enhance our understanding of both the experiences and implications of punishment avoidance in the road environment. It is noteworthy that in situations where detection and punishment remain relatively rare, such as on extensive road networks, the research evidence suggests that experiences of punishment avoidance may have a stronger influence upon risky driving behaviour than experiences of punishment. Finally, data from a case study examining the risky behaviour of young drivers will be presented, and the implications for ‘getting away with it’ will be discussed.
Resumo:
"Fully updated to reflect the rapid pace of change in the health law areas. Explains the legal process as it relates to the health care professional."--Libraries Australia. Table of Contents Part I. Introductory concepts -- 1. What is law -- 2. The legal structure -- 3. The legal process -- Part II. Patient relationships -- 4. Consent to health care by a competent adult -- 5. Consent to health care by a legally incompetent person -- 6. Negligence -- 7. Patient information and privacy -- 8. Patients' property -- 9. Contract -- Part III. Employment -- 10. Contracts to provide health care services -- 011. Accidents and injuries related to health care --12. Registration and practice --13. Drugs --14. Criminal law and health care --15. State involvement in birth and death: registration and coronial inquiries --16. State involvement in threats to health or welfare --17. Human tissue transplants and reproductive technology --18. Expanding recognition of human rights --19. Decision making, law and ethics: a discussion.
Resumo:
Social networking sites (SNSs), with their large numbers of users and large information base, seem to be perfect breeding grounds for exploiting the vulnerabilities of people, the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” While technology-based security has been addressed by research and may be well understood, social engineering is more challenging to understand and manage, especially in new environments such as SNSs, owing to some factors of SNSs that reduce the ability of users to detect the attack and increase the ability of attackers to launch it. This work will contribute to the knowledge of social engineering by presenting the first two conceptual models of social engineering attacks in SNSs. Phase-based and source-based models are presented, along with an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.
Resumo:
The avenues through which communities and community organisations raise awareness about the issues they face and how they agitate for change have developed rapidly in the past ten years; and digital technology has provided community activists with the means to quickly create and widely disseminate stories. Perhaps the most influential and wide reaching of recent innovations in storytelling has been transmedia storytelling. This article explores a new breed of projects that utilise recognisable conventions of transmedia storytelling and borrow elements from other forms of storytelling that predate transmedia, such as digital storytelling and documentary film making. In addition to being hybrid in form these projects are independent and solely focused on raising awareness about particular social issues or telling the stories of marginalized groups, who otherwise do not have a voice in the public sphere.
Resumo:
Enterprise resource planning (ERP) systems are rapidly being combined with “big data” analytics processes and publicly available “open data sets”, which are usually outside the arena of the enterprise, to expand activity through better service to current clients as well as identifying new opportunities. Moreover, these activities are now largely based around relevant software systems hosted in a “cloud computing” environment. However, the over 50- year old phrase related to mistrust in computer systems, namely “garbage in, garbage out” or “GIGO”, is used to describe problems of unqualified and unquestioning dependency on information systems. However, a more relevant GIGO interpretation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems based around ERP and open datasets as well as “big data” analytics, particularly in a cloud environment, the ability to verify the authenticity and integrity of the data sets used may be almost impossible. In turn, this may easily result in decision making based upon questionable results which are unverifiable. Illicit “impersonation” of and modifications to legitimate data sets may become a reality while at the same time the ability to audit any derived results of analysis may be an important requirement, particularly in the public sector. The pressing need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment is discussed in this paper. Some current and appropriate technologies currently being offered are also examined. However, severe limitations in addressing the problems identified are found and the paper proposes further necessary research work for the area. (Note: This paper is based on an earlier unpublished paper/presentation “Identity, Addressing, Authenticity and Audit Requirements for Trust in ERP, Analytics and Big/Open Data in a ‘Cloud’ Computing Environment: A Review and Proposal” presented to the Department of Accounting and IT, College of Management, National Chung Chen University, 20 November 2013.)
Resumo:
This paper makes a formal security analysis of the current Australian e-passport implementation using model checking tools CASPER/CSP/FDR. We highlight security issues in the current implementation and identify new threats when an e-passport system is integrated with an automated processing system like SmartGate. The paper also provides a security analysis of the European Union (EU) proposal for Extended Access Control (EAC) that is intended to provide improved security in protecting biometric information of the e-passport bearer. The current e-passport specification fails to provide a list of adequate security goals that could be used for security evaluation. We fill this gap; we present a collection of security goals for evaluation of e-passport protocols. Our analysis confirms existing security weaknesses that were previously identified and shows that both the Australian e-passport implementation and the EU proposal fail to address many security and privacy aspects that are paramount in implementing a secure border control mechanism. ACM Classification C.2.2 (Communication/Networking and Information Technology – Network Protocols – Model Checking), D.2.4 (Software Engineering – Software/Program Verification – Formal Methods), D.4.6 (Operating Systems – Security and Privacy Protection – Authentication)
Resumo:
In this age of electronic money transactions, the opportunities for electronic crime expanded at the same rate as ever expanding rise of on-line services. With world becoming a global village, crime over the internet transcends no boundaries, borders or jurisdictions. This paper critically examines the available literature on spam, and the control measures available to control spam. This study is followed by the literature overview related to mobility of devices and how the application of mobile technologies as communication medium has impacted the handling of spam. The conclusion of this literature review with proposed direction of study is summarized.
Resumo:
While applications of amine oxidases are increasing, few have been characterised and our understanding of their biological role and strategies for bacteria exploitation are limited. By altering the nitrogen source (NH4Cl, putrescine and cadaverine (diamines) and butylamine (monoamine)) and concentration, we have identified a constitutive flavin dependent oxidase (EC 1.4.3.10) within Rhodococcus opacus. The activity of this oxidase can be increased by over two orders of magnitude in the presence of aliphatic diamines. In addition, the expression of a copper dependent diamine oxidase (EC 1.4.3.22) was observed at diamine concentrations>1mM or when cells were grown with butylamine, which acts to inhibit the flavin oxidase. A Michaelis-Menten kinetic treatment of the flavin oxidase delivered a Michaelis constant (KM)=190μM and maximum rate (kcat)=21.8s(-1) for the oxidative deamination of putrescine with a lower KM (=60μM) and comparable kcat (=18.2s(-1)) for the copper oxidase. MALDI-TOF and genomic analyses have indicated a metabolic clustering of functionally related genes. From a consideration of amine oxidase specificity and sequence homology, we propose a putrescine degradation pathway within Rhodococcus that utilises oxidases in tandem with subsequent dehydrogenase and transaminase enzymes. The implications of PUT homeostasis through the action of the two oxidases are discussed with respect to stressors, evolution and application in microbe-assisted phytoremediation or bio-augmentation.