186 resultados para Police communication systems


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent management research has evidenced the significance of organizational social networks, and communication is believed to impact the interpersonal relationships. However, we have little knowledge on how communication affects organizational social networks. This paper studies the dynamics between organizational communication patterns and the growth of organizational social networks. We propose an organizational social network growth model, and then collect empirical data to test model validity. The simulation results agree well with the empirical data. The results of simulation experiments enrich our knowledge on communication with the findings that organizational management practices that discourage employees from communicating within and across group boundaries have disparate and significant negative effect on the social network’s density, scalar assortativity and discrete assortativity, each of which correlates with the organization’s performance. These findings also suggest concrete measures for management to construct and develop the organizational social network.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article addresses the paucity of systematic data on graduate careers in the arts and humanities in the broader context of enduring public and policy debates about the benefits of education to society, the relation between public and private good that is derivable from education, and the specific disciplinary angle that can be brought to bear on these questions from media, cultural and communication studies. We report findings from a survey of ten years of graduates from Queensland University of Technology’s courses in media, cultural and communication studies which indicate very high employment levels and generally positive accounts of the relevance of courses to working life. A major insight that can be drawn from the research is that media, cultural and communication studies deliver capabilities, skills and orientations which are themselves strongly aligned with the kinds of transferable generic attributes which facilitate transition into the workplace.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The development of an intelligent plug-in electric vehicle (PEV) network is an important research topic in the smart grid environment. An intelligent PEV network enables a flexible control of PEV charging and discharging activities and hence PEVs can be utilized as ancillary service providers in the power system concerned. Given this background, an intelligent PEV network architecture is first developed, and followed by detailed designs of its application layers, including the charging and discharging controlling system, mobility and roaming management, as well as communication mechanisms associated. The presented architecture leverages the philosophy in mobile communication network buildup

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper considers the role of CCTV (closed circuit television) in the surveillance, policing and control of public space in urban and rural locations, specifically in relation to the use of public space by young people. The use of CCTV technology in public spaces is now an established and largely uncontested feature of everyday life in a number of countries and the assertion that they are essentially there for the protection of law abiding and consuming citizens has broadly gone unchallenged. With little or no debate in the U.K. to critique the claims made by the burgeoning security industry that CCTV protects people in the form of a ‘Big Friend’, the state at both central and local levels has endorsed the installation of CCTV apparatus across the nation. Some areas assert in their promotional material that the centre of the shopping and leisure zone is fully surveilled by cameras in order to reassure visitors that their personal safety is a matter of civic concern, with even small towns and villages expending monies on sophisticated and expensive to maintain camera systems. It is within a context of monitoring, recording and control procedures that young people’s use of public space is constructed as a threat to social order, in need of surveillance and exclusion which forms a major and contemporary feature in shaping thinking about urban and rural working class young people in the U.K. As Loader (1996) notes, young people’s claims on public space rarely gain legitimacy if ‘colliding’ with those of local residents, and Davis (1990) describes the increasing ‘militarization and destruction of public space’, while Jacobs (1965) asserts that full participation in the ‘daily life of urban streets’ is essential to the development of young people and beneficial for all who live in an area. This paper challenges the uncritical acceptance of widespread use of CCTV and identifies its oppressive and malevolent potential in forming a ‘surveillance gaze’ over young people (adapting Foucault’s ‘clinical gaze’c. 1973) which can jeopardise mental health and well being in coping with the ‘metropolis’, after Simmel, (1964).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Securing IT infrastructures of our modern lives is a challenging task because of their increasing complexity, scale and agile nature. Monolithic approaches such as using stand-alone firewalls and IDS devices for protecting the perimeter cannot cope with complex malwares and multistep attacks. Collaborative security emerges as a promising approach. But, research results in collaborative security are not mature, yet, and they require continuous evaluation and testing. In this work, we present CIDE, a Collaborative Intrusion Detection Extension for the network security simulation platform ( NeSSi 2 ). Built-in functionalities include dynamic group formation based on node preferences, group-internal communication, group management and an approach for handling the infection process for malware-based attacks. The CIDE simulation environment provides functionalities for easy implementation of collaborating nodes in large-scale setups. We evaluate the group communication mechanism on the one hand and provide a case study and evaluate our collaborative security evaluation platform in a signature exchange scenario on the other.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

With the explosive growth of resources available through the Internet, information mismatching and overload have become a severe concern to users. Web users are commonly overwhelmed by huge volume of information and are faced with the challenge of finding the most relevant and reliable information in a timely manner. Personalised information gathering and recommender systems represent state-of-the-art tools for efficient selection of the most relevant and reliable information resources, and the interest in such systems has increased dramatically over the last few years. However, web personalization has not yet been well-exploited; difficulties arise while selecting resources through recommender systems from a technological and social perspective. Aiming to promote high quality research in order to overcome these challenges, this paper provides a comprehensive survey on the recent work and achievements in the areas of personalised web information gathering and recommender systems. The report covers concept-based techniques exploited in personalised information gathering and recommender systems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Evaluating Communication for Development presents a comprehensive framework for evaluating communication for development (C4D). This framework combines the latest thinking from a number of fields in new ways. It critiques dominant instrumental, accountability-based approaches to development and evaluation and offers an alternative holistic, participatory, mixed methods approach based on systems and complexity thinking and other key concepts. It maintains a focus on power, gender and other differences and social norms. The authors have designed the framework as a way to focus on achieving sustainable social change and to continually improve and develop C4D initiatives. The benefits and rigour of this approach are supported by examples and case studies from a number of action research and evaluation capacity development projects undertaken by the authors over the past fifteen years. Building on current arguments within the fields of C4D and development, the authors reinforce the case for effective communication being a central and vital component of participatory forms of development, something that needs to be appreciated by decision makers. They also consider ways of increasing the effectiveness of evaluation capacity development from grassroots to management level in the development context, an issue of growing importance to improving the quality, effectiveness and utilisation of monitoring and evaluation studies in this field. The book includes a critical review of the key approaches, methodologies and methods that are considered effective for planning evaluation, assessing the outcomes of C4D, and engaging in continuous learning. This rigorous book is of immense theoretical and practical value to students, scholars, and professionals researching or working in development, communication and media, applied anthropology, and evaluation and program planning.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

With the aim of advancing professional practice through better understanding how to create workplace contexts that cultivate individual and collective learning through situated 'information in context' experiences, this paper presents insights gained from three North American collaborative design (co-design) implementations. In the current project at the Auraria Library in Denver, Colorado, USA, participants use collaborative information practices to redesign face-to-face and technology-enabled communication, decision making, and planning systems. Design processes are described and results-to-date described, within an appreciative framework which values information sharing and enables knowledge creation through shared leadership.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The papers in this issue focus our attention to packaged software as an increasingly important, but still relatively poorly understood phenomena in the information systems research community. The topic is not new: Lucas et al. (1988) wrote a provocative piece focused on the issues with implementing packaged software. A decade later, Carmel (1997) argued that packaged software was both ideally suited for American entrepreneurial activity and rapidly growing. The information systems research community, however, has moved more slowly to engage this change (e.g., Sawyer, 2001). The papers in this special issue represent a significant step in better engaging the issues of packaged software relative to information systems research, and highlighting opportunities for additional relevant research.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent literature has emphasized the pivotal role of knowledge integration in Enterprise Systems (ES) success. This research-in-progress paper, building upon Knowledge Based Theory of the firm (KBT), examines the efficiency of knowledge integration in the context of ES implementation and identifies the factors contributing to its enhancement. The proposed model in this paper suggests that the efficiency of knowledge integration in an ES implementation process depends upon the level of common knowledge and the level of coordination in the ES adopting organization. It further suggests that the level of common knowledge can be enhanced by proper training, improving ES users’intrinsic and extrinsic motivations and business process modeling and the level of coordination can be improved by articulating a clear unified organizational goal for the ES adoption in the organization, forming a competent ES team, enhancing interdepartmental communication and the cross-functionality in the organization structure.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Police in-vehicle systems include a visual output mobile data terminal (MDT) with manual input via touch screen and keyboard. This study investigated the potential for voice-based input and output modalities for reducing subjective workload of police officers while driving. Nineteen experienced drivers of police vehicles (one female) from New South Wales (NSW) Police completed four simulated urban drives. Three drives included a concurrent secondary task: an imitation licence number search using an emulated MDT. Three different interface output-input modalities were examined: Visual-Manual, Visual-Voice, and Audio-Voice. Following each drive, participants rated their subjective workload using the NASA - Raw Task Load Index and completed questions on acceptability. A questionnaire on interface preferences was completed by participants at the end of their session. Engaging in secondary tasks while driving significantly increased subjective workload. The Visual-Manual interface resulted in higher time demand than either of the voice-based interfaces and greater physical demand than the Audio-Voice interface. The Visual-Voice and Audio-Voice interfaces were rated easier to use and more useful than the Visual-Manual interface, although not significantly different from each other. Findings largely echoed those deriving from the analysis of the objective driving performance data. It is acknowledged that under standard procedures, officers should not drive while performing tasks concurrently with certain invehicle policing systems; however, in practice this sometimes occurs. Taking action now to develop voice-based technology for police in-vehicle systems has potential to realise visions for potentially safer and more efficient vehicle-based police work.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Process models are often used to visualize and communicate workflows to involved stakeholders. Unfortunately, process modeling notations can be complex and need specific knowledge to be understood. Storyboards, as a visual language to illustrate workflows as sequences of images, provide natural visualization features that allow for better communication, to provide insight to people from non-process modelling expert domains. This paper proposes a visualization approach using a 3D virtual world environment to visualize storyboards for business process models. A prototype was built to present its applicability via generating output with examples of five major process model patterns and two non-trivial use cases. Illustrative results for the approach show the promise of using a 3D virtual world to visualize complex process models in an unambiguous and intuitive manner.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

As media institutions are encouraged to explore new production methodologies in the current economic crisis, they align with Schumpeter’s creative destruction provocation by exhibiting user-led political, organisation and socio-technical innovations. This paper highlights the significance of the cultural intermediary within the innovative, co-creative production arrangements for cultural artefacts by media professionals in institutional online communities. An institutional online community is defined as one that is housed, resourced and governed by commercial or non- commercial institutions and is not independently facilitated. Web 2.0 technologies have mobilised collaborative peer production activities for online content creation and professional media institutions face challenges in engaging participatory audiences in practices that are beneficial for all concerned stakeholders. The interests of those stakeholders often do not align, highlighting the need for an intermediary role that understands and translates the norms, rhetoric tropes and day-to-day activities between the individuals engaging in participatory communication activities for successful negotiation within the production process. This paper specifically explores the participatory relationship between the public service broadcaster (PSB), the Australian Broadcasting Corporation (ABC) and one of its online communities, ABC Pool (www.abc.net.au/pool). ABC Pool is an online platform developed and resourced by the ABC to encourage co-creation between audience members engaging in the production of user-generated content (UGC) and the professional producers housed within the ABC Radio Division. This empirical research emerges from a three-year research project where I employed an ethnographic action research methodology and was embedded at the ABC as the community manager of ABC Pool. In participatory communication environments, users favour meritocratic heterarchical governance over traditional institutional hierarchical systems (Malaby 2009). A reputation environment based on meritocracy requires an intermediary to identify the stakeholders, understand their interests and communicate effectively between them to negotiate successful production outcomes (Bruns 2008; Banks 2009). The community manager generally occupies this role, however it has emerged that other institutional production environments also employ an intermediary role under alternative monikers(Hutchinson 2012). A useful umbrella term to encompass the myriad of roles within this space is the cultural intermediary. The ABC has experimented with three institutional online community governance models that engage in cultural intermediation in differing decentralised capacities. The first and most closed is a single point of contact model where one cultural intermediary controls all of the communication of the participatory project. The second is a model of multiple cultural intermediaries engaging in communication between the institutional online community stakeholders simultaneously. The third is most open yet problematic as it promotes and empowers community participants to the level of cultural intermediaries. This paper uses the ABC Pool case study to highlight the differing levels of openness within cultural intermediation during the co-creative production process of a cultural artifact.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Technology has advanced in such a manner that the world can now communicate in means previously never thought possible. These new technologies have not been overlooked by transnational organized crime groups and networks of corruption, and have been exploited for criminal success. This text explores the use of communication interception technology (CIT), such as phone taps or email interception, and its potential to cause serious disruption to these criminal enterprises. Exploring the placement of communication interception technology within differing policing frameworks, and how they integrate in a practical manner, the authors demonstrate that CIT is best placed within a proactive, intelligence-led policing framework. They also indicate that if law enforcement agencies in Western countries are serious about fighting transnational organized crime and combating corruption, there is a need to re-evaluate the constraints of interception technology, and the sceptical culture that surrounds intelligence in policing. Policing Transnational Organized Crime and Corruption will appeal to scholars of Law, Criminal Justice and Police Science as well as intelligence analysts and police and security intelligence professionals.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents a new framework for distributed intrusion detection based on taint marking. Our system tracks information flows between applications of multiple hosts gathered in groups (i.e., sets of hosts sharing the same distributed information flow policy) by attaching taint labels to system objects such as files, sockets, Inter Process Communication (IPC) abstractions, and memory mappings. Labels are carried over the network by tainting network packets. A distributed information flow policy is defined for each group at the host level by labeling information and defining how users and applications can legally access, alter or transfer information towards other trusted or untrusted hosts. As opposed to existing approaches, where information is most often represented by two security levels (low/high, public/private, etc.), our model identifies each piece of information within a distributed system, and defines their legal interaction in a fine-grained manner. Hosts store and exchange security labels in a peer to peer fashion, and there is no central monitor. Our IDS is implemented in the Linux kernel as a Linux Security Module (LSM) and runs standard software on commodity hardware with no required modification. The only trusted code is our modified operating system kernel. We finally present a scenario of intrusion in a web service running on multiple hosts, and show how our distributed IDS is able to report security violations at each host level.