259 resultados para Combine harvester
Resumo:
Availability has become a primary goal of information security and is as significant as other goals, in particular, confidentiality and integrity. Maintaining availability of essential services on the public Internet is an increasingly difficult task in the presence of sophisticated attackers. Attackers may abuse limited computational resources of a service provider and thus managing computational costs is a key strategy for achieving the goal of availability. In this thesis we focus on cryptographic approaches for managing computational costs, in particular computational effort. We focus on two cryptographic techniques: computational puzzles in cryptographic protocols and secure outsourcing of cryptographic computations. This thesis contributes to the area of cryptographic protocols in the following ways. First we propose the most efficient puzzle scheme based on modular exponentiations which, unlike previous schemes of the same type, involves only a few modular multiplications for solution verification; our scheme is provably secure. We then introduce a new efficient gradual authentication protocol by integrating a puzzle into a specific signature scheme. Our software implementation results for the new authentication protocol show that our approach is more efficient and effective than the traditional RSA signature-based one and improves the DoSresilience of Secure Socket Layer (SSL) protocol, the most widely used security protocol on the Internet. Our next contributions are related to capturing a specific property that enables secure outsourcing of cryptographic tasks in partial-decryption. We formally define the property of (non-trivial) public verifiability for general encryption schemes, key encapsulation mechanisms (KEMs), and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption avors. We show that some generic transformations and concrete constructions enjoy this property and then present a new public-key encryption (PKE) scheme having this property and proof of security under the standard assumptions. Finally, we combine puzzles with PKE schemes for enabling delayed decryption in applications such as e-auctions and e-voting. For this we first introduce the notion of effort-release PKE (ER-PKE), encompassing the well-known timedrelease encryption and encapsulated key escrow techniques. We then present a security model for ER-PKE and a generic construction of ER-PKE complying with our security notion.
Resumo:
Denial-of-service (DoS) attacks are a growing concern to networked services like the Internet. In recent years, major Internet e-commerce and government sites have been disabled due to various DoS attacks. A common form of DoS attack is a resource depletion attack, in which an attacker tries to overload the server's resources, such as memory or computational power, rendering the server unable to service honest clients. A promising way to deal with this problem is for a defending server to identify and segregate malicious traffic as earlier as possible. Client puzzles, also known as proofs of work, have been shown to be a promising tool to thwart DoS attacks in network protocols, particularly in authentication protocols. In this thesis, we design efficient client puzzles and propose a stronger security model to analyse client puzzles. We revisit a few key establishment protocols to analyse their DoS resilient properties and strengthen them using existing and novel techniques. Our contributions in the thesis are manifold. We propose an efficient client puzzle that enjoys its security in the standard model under new computational assumptions. Assuming the presence of powerful DoS attackers, we find a weakness in the most recent security model proposed to analyse client puzzles and this study leads us to introduce a better security model for analysing client puzzles. We demonstrate the utility of our new security definitions by including two hash based stronger client puzzles. We also show that using stronger client puzzles any protocol can be converted into a provably secure DoS resilient key exchange protocol. In other contributions, we analyse DoS resilient properties of network protocols such as Just Fast Keying (JFK) and Transport Layer Security (TLS). In the JFK protocol, we identify a new DoS attack by applying Meadows' cost based framework to analyse DoS resilient properties. We also prove that the original security claim of JFK does not hold. Then we combine an existing technique to reduce the server cost and prove that the new variant of JFK achieves perfect forward secrecy (the property not achieved by original JFK protocol) and secure under the original security assumptions of JFK. Finally, we introduce a novel cost shifting technique which reduces the computation cost of the server significantly and employ the technique in the most important network protocol, TLS, to analyse the security of the resultant protocol. We also observe that the cost shifting technique can be incorporated in any Diffine{Hellman based key exchange protocol to reduce the Diffie{Hellman exponential cost of a party by one multiplication and one addition.
Resumo:
The number of culturally and linguistically diverse (CALD) students seeking enrollment in higher education courses in Western countries where English is the predominant language has grown considerably in the past decade, especially in undergraduate health care courses. When enrolled in nursing courses, students are required to complete clinical placements. Such experiences can create significant challenges for CALD students where language, cultural differences, and interpretation of cultural norms complicate the learning process. To assist CALD nursing students to transition successfully, an extracurricular integrated curriculum program was developed and implemented at a university in Queensland, Australia. The program is a series of interactive workshops based on the principles of caring pedagogy and student-centered learning. The program applies strategies that combine small-group discussions with peers, role-plays, and interactions with final-year nursing student volunteers. Evaluation of the program suggests it has assisted most of the students surveyed to be successful in their clinical studies.
Resumo:
This paper presents the recent findings from a study on the postdiagnosis support needs of women with breast cancer living in rural and remote Queensland. The findings presented in this discussion focus on support needs from the perspective of the women experiencing breast cancer as well as health service providers. The tyranny of distance imposes unique hardships, such as separation from family and friends, during a time of great vulnerability for treatment, the need to travel long distances for support and follow-up services, and extra financial burdens, which can combine to cause strains on the marital relationship and family cohesion. Positive indications are, however, that the rural communities operate on strong, informal networks of support. This network of family, friends and community can, and does, play an active role in the provision of emotional and practical support.
Resumo:
This thesis presents novel vision based control solutions that enable fixed-wing Unmanned Aerial Vehicles to perform tasks of inspection over infrastructure including power lines, pipe lines and roads. This is achieved through the development of techniques that combine visual servoing with alternate manoeuvres that assist the UAV in both following and observing the feature from a downward facing camera. Control designs are developed through techniques of Image Based Visual Servoing to utilise sideslip through Skid-to-Turn and Forward-Slip manoeuvres. This allows the UAV to simultaneously track and collect data over the length of infrastructure, including straight segments and the transition where these meet.
Resumo:
This practice-led project has two outcomes: a collection of short stories titled 'Corkscrew Section', and an exegesis. The short stories combine written narrative with visual elements such as images and typographic devices, while the exegesis analyses the function of these graphic devices within adult literary fiction. My creative writing explores a variety of genres and literary styles, but almost all of the stories are concerned with fusing verbal and visual modes of communication. The exegesis adopts the interpretive paradigm of multimodal stylistics, which aims to analyse graphic devices with the same level of detail as linguistic analysis. Within this framework, the exegesis compares and extends previous studies to develop a systematic method for analysing how the interactions between language, images and typography create meaning within multimodal literature.
Resumo:
After first observing a person, the task of person re-identification involves recognising an individual at different locations across a network of cameras at a later time. Traditionally, this task has been performed by first extracting appearance features of an individual and then matching these features to the previous observation. However, identifying an individual based solely on appearance can be ambiguous, particularly when people wear similar clothing (i.e. people dressed in uniforms in sporting and school settings). This task is made more difficult when the resolution of the input image is small as is typically the case in multi-camera networks. To circumvent these issues, we need to use other contextual cues. In this paper, we use "group" information as our contextual feature to aid in the re-identification of a person, which is heavily motivated by the fact that people generally move together as a collective group. To encode group context, we learn a linear mapping function to assign each person to a "role" or position within the group structure. We then combine the appearance and group context cues using a weighted summation. We demonstrate how this improves performance of person re-identification in a sports environment over appearance based-features.
Resumo:
The ethnic identity and commitment of Heritage Language Learners play salient roles in Heritage Language learning process. The mutually constitutive effect amongst Heritage Language Learner's ethnic identity, commitment, and Heritage Language proficiency has been well documented in social psychological and poststructuralist literatures. Both social psychological and poststructural schools offer meaningful insights into particular contexts but receive critiques from other contexts. In addition, the two schools largely oppose each other. This study uses Bourdieu's sociological triad of habitus, capital, and field to reconcile the two schools through the examination of Chinese Heritage Language Learners in Australia, an idiosyncratic social, cultural, and historical context for these learners. Specifically, this study investigates how young Chinese Australian adults (18-35 in age) negotiate their 'Chineseness' and capitalise on resources through Chinese Heritage Language learning in the lived world. The study adopts an explanatory mixed methods design to combine the quantitative approach with the qualitative approach. The initial quantitative phase addresses the first research question: Is Chinese Heritage Language proficiency of young Chinese Australian adults influenced by their investment of capital, the strength of their habitus of 'Chineseness', or both? The subsequent qualitative phase addresses the second research question: How do young Chinese Australian adults understand their Chinese Heritage Language learning in relation to (potential) profits produced by this linguistic capital in given fields? The initial quantitative phase applies Structural Equation Modelling to analyse the data from an online survey with 230 respondents. Findings indicate the statistically significant positive contribution made by the habitus of 'Chineseness' and by investment of capital to Chinese Heritage Language proficiency (r = .71 and r = .86 respectively). Subsequent multiple regression analysis demonstrates that 62% of the variance of Chinese Heritage Language proficiency can be accounted for by the joint contribution of 'Chineseness' and 'capital'. The qualitative phase of the study uses multiple interviews with five participants. It reveals that Chinese Heritage Language offers meaningful benefits for participants in the forms of capital production and habitus capture or recapture. Findings from the two phases talk to each other in terms of the inherent entanglement amongst habitus of 'Chineseness', investment of capital, and Chinese Heritage Language proficiency. The study offers important contributions. Theoretically, by virtue of Bourdieu's signature concepts of habitus, capital, and field, the study provides answers to questions that both social psychological and poststructuralist theories have long been struggling to answer. Methodologically, the position of 'pluralism' talks back to Bourdieu's theory and forwards to the mixed methods design. Particularly, the study makes a methodological breakthrough: A set of instruments was developed and validated to quantify Bourdieu's key concepts of capital and habitus within certain social fields. Practically, understanding Chinese Australians' heterogeneity and the potential drivers behind Chinese Heritage Language learning contributes to the growing interest in Chinese Australians' contemporary life experiences and helps to better accommodate linguistically diverse Chinese Heritage Language Learners in Chinese language courses. In addition, this study is very timely. It resonates with the recently released Australia in the Asian Century White Paper: Chinese Australians, with sound knowledge of Chinese culture and language obtained through negotiating their 'Chineseness' and capitalising on diverse resources for learning, will help to serve Australia's economic, social, and political needs in unique ways.
Resumo:
Designing the smart grid requires combining varied models. As their number increases, so does the complexity of the software. Having a well thought architecture for the software then becomes crucial. This paper presents MODAM, a framework designed to combine agent-based models in a flexible and extensible manner, using well known software engineering design solutions (OSGi specification [1] and Eclipse plugins [2]). Details on how to build a modular agent-based model for the smart grid are given in this paper, illustrated by an example for a small network.
Resumo:
The cell cycle is a carefully choreographed series of phases that when executed successfully will allow the complete replication of the genome and the equal division of the genome and other cellular content into two independent daughter cells. The inability of the cell to execute cell division successfully can result in either checkpoint activation to allow repair and/or apoptosis and/or mutations/errors that may or may not lead to tumourgenesis. Cyclin A/CDK2 is the primary cyclin/CDK regulating G2 phase progression of the cell cycle. Cyclin A/CDK2 activity peaks in G2 phase and its inhibition causes a G2 phase delay that we have termed 'the cyclin A/CDK2 dependent G2 delay'. Understanding the key pathways that are involved in the cyclin A/CDK2 dependent G2 delay has been the primary focus of this study. Characterising the cyclin A/CDK2 dependent G2 delay revealed accumulated levels of the inactive form of the mitotic regulator, cyclin B/CDK1. Surprisingly, there was also increased microtubule nucleation at the centrosomes, and the centrosomes stained for markers of cyclin B/CDK1 activity. Both microtubule nucleation at the centrosomes and phosphoprotein markers were lost with short-term treatment of CDK1/2 inhibition. Cyclin A/CDK2 localised at the centrosomes in late G2 phase after separation of the centrosomes but before the start of prophase. Thus G2 phase cyclin A/CDK2 controls the timing of entry into mitosis by controlling the subsequent activation of cyclin B/CDK1, but also has an unexpected role in coordinating the activation of cyclin B/CDK1 at the centrosome and in the nucleus. In addition to regulating the timing of cyclin B/CDK1 activation and entry into mitosis in the unperturbed cell cycle, cyclin A/CDK2 also was shown to have a role in G2 phase checkpoint recovery. Known G2 phase regulators were investigated to determine whether they had a role in imposing the cyclin A/ CDK2 dependent G2 delay. Examination of the critical G2 checkpoint arrest protein, Chk1, which also has a role during unperturbed G2/M phases revealed the presence of activated Chk1 in G2 phase, in a range of cell lines. Activated Chk1 levels were shown to accumulate in cyclin A/CDK2 depleted/inhibited cells. Further investigations revealed that Chk1, but not Chk2, depletion could reverse the cyclin A/CDK2 dependent G2 delay. It was confirmed that the accumulative activation of Chk1 was not a consequence of DNA damage induced by cyclin A depletion. The potential of cyclin A/CDK2 to regulate Chk1 revealed that the inhibitory phosphorylations, Ser286 and Ser301, were not directly catalysed by cyclin A/CDK2 in G2 phase to regulate mitotic entry. It appeared that the ability of cyclin A/CDK2 to regulate cyclin B/CDK1 activation impacted cyclin B/CDK1s phosphorylation of Chk1 on Ser286 and Ser301, thereby contributing to the delay in G2/M phase progression. Chk1 inhibition/depletion partially abrogated the cyclin A/CDK2 dependent G2 delay, and was less effective in abrogating G2 phase checkpoint suggesting that other cyclin A/CDK2 dependent mechanisms contributed to these roles of cyclin A/CDK2. In an attempt to identify these other contributing factors another G2/M phase regulator known to be regulated by cyclin A/CDK2, Cdh1 and its substrates Plk1 and Claspin were examined. Cdh1 levels were reduced in cyclin A/CDK2 depleted/inhibited cells although this had little effect on Plk1, a known Cdh1 substrate. However, the level of another substrate, Claspin, was increased. Cdh1 depletion mimicked the effect of cyclin A depletion but to a weaker extent and was sufficient at increasing Claspin levels similar to the increase caused by cyclin A depletion. Co-depletion of cyclin A and Claspin blocked the accumulation of activated Chk1 normally seen with cyclin A depletion alone. However Claspin depletion alone did not reduce the cyclin A/CDK2 dependent G2 delay but this is likely to be a result of inhibition of S phase roles of Claspin. Together, these data suggest that cyclin A/CDK2 regulates a number of different mechanisms that contribute to G2/M phase progression. Here it has been demonstrated that in normal G2/M progression and possibly to a lesser extent in G2 phase checkpoint recovery, cyclin A/CDK2 regulates the level of Cdh1 which in turn affects at least one of its substrates, Claspin, and consequently results in the increased level of activated Chk1 observed. However, the involvement of Cdh1 and Claspin alone does not explain the G2 phase delay observed with cyclin A/CDK2 depletion/inhibition. It is likely that other mechanisms, possibly including cyclin A/CDK2 regulation of Wee1 and FoxM1, as reported by others, combine with the mechanism described here to regulate normal G2/M phase progression and G2 phase checkpoint recovery. These findings support the critical role for cyclin A/CDK2 in regulating progression into mitosis and suggest that upstream regulators of cyclin A/CDK2 activation will also be critical controllers of this cell cycle transition. The pathways that work to co-ordinate cell cycle progression are very intricate and deciphering these pathways, required for normal cell cycle progression, is key to understanding tumour development. By understanding cell cycle regulatory pathways it will allow the identification of the pathway/s and their mechanism/s that become affected in tumourgenesis. This will lead to the development of better targeted therapies, inferring better efficacy with fewer side effects than commonly seen with the use of traditional therapies, such as chemotherapy. Furthermore, this has the potential to positively impact the development of personalised medicines and the customisation of healthcare.
Resumo:
Recent road safety statistics show that the decades-long fatalities decreasing trend is stopping and stagnating. Statistics further show that crashes are mostly driven by human error, compared to other factors such as environmental conditions and mechanical defects. Within human error, the dominant error source is perceptive errors, which represent about 50% of the total. The next two sources are interpretation and evaluation, which accounts together with perception for more than 75% of human error related crashes. Those statistics show that allowing drivers to perceive and understand their environment better, or supplement them when they are clearly at fault, is a solution to a good assessment of road risk, and, as a consequence, further decreasing fatalities. To answer this problem, currently deployed driving assistance systems combine more and more information from diverse sources (sensors) to enhance the driver's perception of their environment. However, because of inherent limitations in range and field of view, these systems' perception of their environment remains largely limited to a small interest zone around a single vehicle. Such limitations can be overcomed by increasing the interest zone through a cooperative process. Cooperative Systems (CS), a specific subset of Intelligent Transportation Systems (ITS), aim at compensating for local systems' limitations by associating embedded information technology and intervehicular communication technology (IVC). With CS, information sources are not limited to a single vehicle anymore. From this distribution arises the concept of extended or augmented perception. Augmented perception allows extending an actor's perceptive horizon beyond its "natural" limits not only by fusing information from multiple in-vehicle sensors but also information obtained from remote sensors. The end result of an augmented perception and data fusion chain is known as an augmented map. It is a repository where any relevant information about objects in the environment, and the environment itself, can be stored in a layered architecture. This thesis aims at demonstrating that augmented perception has better performance than noncooperative approaches, and that it can be used to successfully identify road risk. We found it was necessary to evaluate the performance of augmented perception, in order to obtain a better knowledge on their limitations. Indeed, while many promising results have already been obtained, the feasibility of building an augmented map from exchanged local perception information and, then, using this information beneficially for road users, has not been thoroughly assessed yet. The limitations of augmented perception, and underlying technologies, have not be thoroughly assessed yet. Most notably, many questions remain unanswered as to the IVC performance and their ability to deliver appropriate quality of service to support life-saving critical systems. This is especially true as the road environment is a complex, highly variable setting where many sources of imperfections and errors exist, not only limited to IVC. We provide at first a discussion on these limitations and a performance model built to incorporate them, created from empirical data collected on test tracks. Our results are more pessimistic than existing literature, suggesting IVC limitations have been underestimated. Then, we develop a new CS-applications simulation architecture. This architecture is used to obtain new results on the safety benefits of a cooperative safety application (EEBL), and then to support further study on augmented perception. At first, we confirm earlier results in terms of crashes numbers decrease, but raise doubts on benefits in terms of crashes' severity. In the next step, we implement an augmented perception architecture tasked with creating an augmented map. Our approach is aimed at providing a generalist architecture that can use many different types of sensors to create the map, and which is not limited to any specific application. The data association problem is tackled with an MHT approach based on the Belief Theory. Then, augmented and single-vehicle perceptions are compared in a reference driving scenario for risk assessment,taking into account the IVC limitations obtained earlier; we show their impact on the augmented map's performance. Our results show that augmented perception performs better than non-cooperative approaches, allowing to almost tripling the advance warning time before a crash. IVC limitations appear to have no significant effect on the previous performance, although this might be valid only for our specific scenario. Eventually, we propose a new approach using augmented perception to identify road risk through a surrogate: near-miss events. A CS-based approach is designed and validated to detect near-miss events, and then compared to a non-cooperative approach based on vehicles equiped with local sensors only. The cooperative approach shows a significant improvement in the number of events that can be detected, especially at the higher rates of system's deployment.
Resumo:
Seminal reports into higher education in Australia and overseas have recognised negotiation as an essential skill of a practising lawyer and have recommended that all law schools include instruction in negotiation theory and practice in their curricula. Effective negotiation training includes the elements of instruction, modelling, practice and feedback. Ideally such training takes place in the context of small groups. However, this does not necessarily mean that negotiation cannot be taught effectively in the context of large groups. This paper discusses two related blended learning environments that provide instruction in negotiation theory and practice as part of the graduate capabilities program of the undergraduate law degree in the School of Law at the Queensland University of Technology in Brisbane, Australia. Air Gondwana, which forms part of the curriculum of the two first year Contract Law subjects, and Mosswood Manor, which forms part of the curriculum of the second year Trusts subject, utilise a common narrative concerning the family of a wealthy industrialist to facilitate learning of negotiation skills. The programs both combine online and in-class components, the online components utilising machinima (computer graphics created without the need for professional software) to depict the narrative. This strategy has enabled the creation of effective, engaging and challenging learning experiences for large cohorts of students studying by different modes (full-time, part-time and distance external). The use of a common narrative, including the same characters and settings, in the two programs also provides a familiar environment in which students advance their learning from one level of attainment to the next.
Resumo:
Conservation of free-ranging cheetah (Acinonyx jubatus) populations is multi faceted and needs to be addressed from an ecological, biological and management perspective. There is a wealth of published research, each focusing on a particular aspect of cheetah conservation. Identifying the most important factors, making sense of various (and sometimes contrasting) findings, and taking decisions when little or no empirical data is available, are everyday challenges facing conservationists. Bayesian networks (BN) provide a statistical modeling framework that enables analysis and integration of information addressing different aspects of conservation. There has been an increased interest in the use of BNs to model conservation issues, however the development of more sophisticated BNs, utilizing object-oriented (OO) features, is still at the frontier of ecological research. We describe an integrated, parallel modeling process followed during a BN modeling workshop held in Namibia to combine expert knowledge and data about free-ranging cheetahs. The aim of the workshop was to obtain a more comprehensive view of the current viability of the free-ranging cheetah population in Namibia, and to predict the effect different scenarios may have on the future viability of this free-ranging cheetah population. Furthermore, a complementary aim was to identify influential parameters of the model to more effectively target those parameters having the greatest impact on population viability. The BN was developed by aggregating diverse perspectives from local and independent scientists, agents from the national ministry, conservation agency members and local fieldworkers. This integrated BN approach facilitates OO modeling in a multi-expert context which lends itself to a series of integrated, yet independent, subnetworks describing different scientific and management components. We created three subnetworks in parallel: a biological, ecological and human factors network, which were then combined to create a complete representation of free-ranging cheetah population viability. Such OOBNs have widespread relevance to the effective and targeted conservation management of vulnerable and endangered species.
Resumo:
Lyngbya majuscula is a cyanobacterium (blue-green algae) occurring naturally in tropical and subtropical coastal areas worldwide. Deception Bay, in Northern Moreton Bay, Queensland, has a history of Lyngbya blooms, and forms a case study for this investigation. The South East Queensland (SEQ) Healthy Waterways Partnership, collaboration between government, industry, research and the community, was formed to address issues affecting the health of the river catchments and waterways of South East Queensland. The Partnership coordinated the Lyngbya Research and Management Program (2005-2007) which culminated in a Coastal Algal Blooms (CAB) Action Plan for harmful and nuisance algal blooms, such as Lyngbya majuscula. This first phase of the project was predominantly of a scientific nature and also facilitated the collection of additional data to better understand Lyngbya blooms. The second phase of this project, SEQ Healthy Waterways Strategy 2007-2012, is now underway to implement the CAB Action Plan and as such is more management focussed. As part of the first phase of the project, a Science model for the initiation of a Lyngbya bloom was built using Bayesian Networks (BN). The structure of the Science Bayesian Network was built by the Lyngbya Science Working Group (LSWG) which was drawn from diverse disciplines. The BN was then quantified with annual data and expert knowledge. Scenario testing confirmed the expected temporal nature of bloom initiation and it was recommended that the next version of the BN be extended to take this into account. Elicitation for this BN thus occurred at three levels: design, quantification and verification. The first level involved construction of the conceptual model itself, definition of the nodes within the model and identification of sources of information to quantify the nodes. The second level included elicitation of expert opinion and representation of this information in a form suitable for inclusion in the BN. The third and final level concerned the specification of scenarios used to verify the model. The second phase of the project provides the opportunity to update the network with the newly collected detailed data obtained during the previous phase of the project. Specifically the temporal nature of Lyngbya blooms is of interest. Management efforts need to be directed to the most vulnerable periods to bloom initiation in the Bay. To model the temporal aspects of Lyngbya we are using Object Oriented Bayesian networks (OOBN) to create ‘time slices’ for each of the periods of interest during the summer. OOBNs provide a framework to simplify knowledge representation and facilitate reuse of nodes and network fragments. An OOBN is more hierarchical than a traditional BN with any sub-network able to contain other sub-networks. Connectivity between OOBNs is an important feature and allows information flow between the time slices. This study demonstrates more sophisticated use of expert information within Bayesian networks, which combine expert knowledge with data (categorized using expert-defined thresholds) within an expert-defined model structure. Based on the results from the verification process the experts are able to target areas requiring greater precision and those exhibiting temporal behaviour. The time slices incorporate the data for that time period for each of the temporal nodes (instead of using the annual data from the previous static Science BN) and include lag effects to allow the effect from one time slice to flow to the next time slice. We demonstrate a concurrent steady increase in the probability of initiation of a Lyngbya bloom and conclude that the inclusion of temporal aspects in the BN model is consistent with the perceptions of Lyngbya behaviour held by the stakeholders. This extended model provides a more accurate representation of the increased risk of algal blooms in the summer months and show that the opinions elicited to inform a static BN can be readily extended to a dynamic OOBN, providing more comprehensive information for decision makers.
Resumo:
Asset service organisations often recognize asset management as a core competence to deliver benefits to their business. But how do organizations know whether their asset management processes are adequate? Asset management maturity models, which combine best practices and competencies, provide a useful approach to test the capacity of organisations to manage their assets. Asset management frameworks are required to meet the dynamic challenges of managing assets in contemporary society. Although existing models are subject to wide variations in their implementation and sophistication, they also display a distinct weakness in that they tend to focus primarily on the operational and technical level and neglect the levels of strategy, policy and governance as well as the social and human resources – the people elements. Moreover, asset management maturity models have to respond to the external environmental factors, including such as climate change and sustainability, stakeholders and community demand management. Drawing on five dimensions of effective asset management – spatial, temporal, organisational, statistical, and evaluation – as identified by Amadi Echendu et al. [1], this paper carries out a comprehensive comparative analysis of six existing maturity models to identify the gaps in key process areas. Results suggest incorporating these into an integrated approach to assess the maturity of asset-intensive organizations. It is contended that the adoption of an integrated asset management maturity model will enhance effective and efficient delivery of services.