165 resultados para information and communication technology (ICT)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Predicate encryption has an advantage over traditional public-key or identity-based encryption, since predicate encryption systems provide more flexible control over access to encrypted data. We focus on delegation capabilities in predicate systems. More specifically, we investigate delegatable encryption systems supporting disjunctive predicate evaluations. We present formal security definitions of delegatable predicate encryption and provide the first delegatable predicate encryption scheme which supports disjunctive predicate evaluations in the public-key setting. We analyze the security of the proposed system and give a security proof. In addition, we present a delegatable predicate encryption in the symmetric-key setting and discuss the related security issues.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The increasing ubiquity of digital technology, internet ser-vices and social media in our everyday lives allows for a seamless transitioning between the visible and the invisible infrastructure of cities: road systems, building complexes, information and communication technology, and people networks create a buzzing environment that is alive and exciting. Driven by curiosity, initiative and interdiscipli-nary exchange, the Urban Informatics Research Lab at Queensland University of Technology (QUT), Brisbane, Australia, is an emerging cluster of people interested in research and development at the intersection of people, place and technology with a focus on cities, locative media and mobile technology. This paper seeks to define, for the first time, what we mean by ‘urban informatics’ and outline its significance as a field of study today. It describes the relevant background and trends in each of the areas of peo-ple, place and technology, and highlights the relevance of urban informatics to the concerns and evolving challenges of CSCW. We then position our work in academia juxta-posed with related research concentrations and labels, fol-lowed by a discussion of disciplinary influences. The paper concludes with an exposé of the three current research themes of the lab around augmented urban spaces, urban narratives, and environmental sustainability in order to illustrate specific cases and methods, and to draw out distinctions that our affiliation with the Creative Industries Faculty affords.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper reports on three primary school students’ explorations of 3D rotation in a virtual reality learning environment (VRLE) named VRMath. When asked to investigate if you would face the same direction when you turn right 45 degrees first then roll up 45 degrees, or when you roll up 45 degrees first then turn right 45 degrees, the students found that the different order of the two turns ended up with different directions in the VRLE. This was contrary to the students’ prior predictions based on using pen, paper and body movements. The findings of this study showed the difficulty young children have in perceiving and understanding the non-commutative nature of 3D rotation and the power of the computational VRLE in giving students experiences that they rarely have in real life with 3D manipulations and 3D mental movements.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Delegation, from the technical point of view, is widely considered as a potential approach in addressing the problem of providing dynamic access control decisions in activities with a high level of collaboration, either within a single security domain or across multiple security domains. Although delegation continues to attract significant attention from the research community, presently, there is no published work that presents a taxonomy of delegation concepts and models. This paper intends to address this gap by presenting a set of taxonomic criteria relevant to the concept of delegation and applies the taxonomy to a selection of significant delegation models published in the literature.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Many cities worldwide face the prospect of major transformation as the world moves towards a global information order. In this new era, urban economies are being radically altered by dynamic processes of economic and spatial restructuring. The result is the creation of ‘informational cities’ or its new and more popular name, ‘knowledge cities’. For the last two centuries, social production had been primarily understood and shaped by neo-classical economic thought that recognized only three factors of production: land, labor and capital. Knowledge, education, and intellectual capacity were secondary, if not incidental, factors. Human capital was assumed to be either embedded in labor or just one of numerous categories of capital. In the last decades, it has become apparent that knowledge is sufficiently important to deserve recognition as a fourth factor of production. Knowledge and information and the social and technological settings for their production and communication are now seen as keys to development and economic prosperity. The rise of knowledge-based opportunity has, in many cases, been accompanied by a concomitant decline in traditional industrial activity. The replacement of physical commodity production by more abstract forms of production (e.g. information, ideas, and knowledge) has, however paradoxically, reinforced the importance of central places and led to the formation of knowledge cities. Knowledge is produced, marketed and exchanged mainly in cities. Therefore, knowledge cities aim to assist decision-makers in making their cities compatible with the knowledge economy and thus able to compete with other cities. Knowledge cities enable their citizens to foster knowledge creation, knowledge exchange and innovation. They also encourage the continuous creation, sharing, evaluation, renewal and update of knowledge. To compete nationally and internationally, cities need knowledge infrastructures (e.g. universities, research and development institutes); a concentration of well-educated people; technological, mainly electronic, infrastructure; and connections to the global economy (e.g. international companies and finance institutions for trade and investment). Moreover, they must possess the people and things necessary for the production of knowledge and, as importantly, function as breeding grounds for talent and innovation. The economy of a knowledge city creates high value-added products using research, technology, and brainpower. Private and the public sectors value knowledge, spend money on its discovery and dissemination and, ultimately, harness it to create goods and services. Although many cities call themselves knowledge cities, currently, only a few cities around the world (e.g., Barcelona, Delft, Dublin, Montreal, Munich, and Stockholm) have earned that label. Many other cities aspire to the status of knowledge city through urban development programs that target knowledge-based urban development. Examples include Copenhagen, Dubai, Manchester, Melbourne, Monterrey, Singapore, and Shanghai. Knowledge-Based Urban Development To date, the development of most knowledge cities has proceeded organically as a dependent and derivative effect of global market forces. Urban and regional planning has responded slowly, and sometimes not at all, to the challenges and the opportunities of the knowledge city. That is changing, however. Knowledge-based urban development potentially brings both economic prosperity and a sustainable socio-spatial order. Its goal is to produce and circulate abstract work. The globalization of the world in the last decades of the twentieth century was a dialectical process. On one hand, as the tyranny of distance was eroded, economic networks of production and consumption were constituted at a global scale. At the same time, spatial proximity remained as important as ever, if not more so, for knowledge-based urban development. Mediated by information and communication technology, personal contact, and the medium of tacit knowledge, organizational and institutional interactions are still closely associated with spatial proximity. The clustering of knowledge production is essential for fostering innovation and wealth creation. The social benefits of knowledge-based urban development extend beyond aggregate economic growth. On the one hand is the possibility of a particularly resilient form of urban development secured in a network of connections anchored at local, national, and global coordinates. On the other hand, quality of place and life, defined by the level of public service (e.g. health and education) and by the conservation and development of the cultural, aesthetic and ecological values give cities their character and attract or repel the creative class of knowledge workers, is a prerequisite for successful knowledge-based urban development. The goal is a secure economy in a human setting: in short, smart growth or sustainable urban development.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In today's technological age, fraud has become more complicated, and increasingly more difficult to detect, especially when it is collusive in nature. Different fraud surveys showed that the median loss from collusive fraud is much greater than fraud perpetrated by a single person. Despite its prevalence and potentially devastating effects, collusion is commonly overlooked as an organizational risk. Internal auditors often fail to proactively consider collusion in their fraud assessment and detection efforts. In this paper, we consider fraud scenarios with collusion. We present six potentially collusive fraudulent behaviors and show their detection process in an ERP system. We have enhanced our fraud detection framework to utilize aggregation of different sources of logs in order to detect communication and have further enhanced it to render it system-agnostic thus achieving portability and making it generally applicable to all ERP systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This chapter presents a new approach to IT ethics education that may be used by teachers in academic institutions, employees responsible for promoting ethics in organisations and individuals wanting to pursue their own professional development. Experiential ethics education emphasises deep learning that prompts a changed experience of ethics. We first consider how this approach complements other ways of engaging in ethics education. We then explore what it means to strive for experiential change and offer a model which may be useful in pursuing IT professional ethics education in this way.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In recent years, with the impact of the global knowledge economy, a more comprehensive urban development approach, so called 'knowledge-based urban development', has gained significant popularity. This paper discusses the critical connections among knowledge-based urban development strategies, knowledge-intensive industries and information and communication technology infrastructures. In particular, the research focuses on investigating the application of the knowledge-based urban development concept by discussing one of the South East Asia's large scale knowledge-based urban development manifestations of Malaysia's Multimedia Super Corridor. The paper scrutinises Malaysia's experience in the development and evolution of the Multimedia Super Corridor from the angle of knowledge-based urban development policy implementation, infrastructural implications, and actors involved in its development and management. This paper provides a number of lessons learned from the Multimedia Super Corridor on the orchestration of knowledge-based development that is a necessity for cities seeking successful knowledge city and knowledge economy transformations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Notwithstanding the obvious potential advantages of information and communications technology (ICT) in the enhanced provision of healthcare services, there are some concerns associated with integration of and access to electronic health records. A security violation in health records, such as an unauthorised disclosure or unauthorised alteration of an individual's health information, can significantly undermine both healthcare providers' and consumers' confidence and trust in e-health systems. A crisis in confidence in any national level e-health system could seriously degrade the realisation of the system's potential benefits. In response to the privacy and security requirements for the protection of health information, this research project investigated national and international e-health development activities to identify the necessary requirements for the creation of a trusted health information system architecture consistent with legislative and regulatory requirements and relevant health informatics standards. The research examined the appropriateness and sustainability of the current approaches for the protection of health information. It then proposed an architecture to facilitate the viable and sustainable enforcement of privacy and security in health information systems under the project title "Open and Trusted Health Information Systems (OTHIS)". OTHIS addresses necessary security controls to protect sensitive health information when such data is at rest, during processing and in transit with three separate and achievable security function-based concepts and modules: a) Health Informatics Application Security (HIAS); b) Health Informatics Access Control (HIAC); and c) Health Informatics Network Security (HINS). The outcome of this research is a roadmap for a viable and sustainable architecture for providing robust protection and security of health information including elucidations of three achievable security control subsystem requirements within the proposed architecture. The successful completion of two proof-of-concept prototypes demonstrated the comprehensibility, feasibility and practicality of the HIAC and HIAS models for the development and assessment of trusted health systems. Meanwhile, the OTHIS architecture has provided guidance for technical and security design appropriate to the development and implementation of trusted health information systems whilst simultaneously offering guidance for ongoing research projects. The socio-economic implications of this research can be summarised in the fact that this research embraces the need for low cost security strategies against economic realities by using open-source technologies for overall test implementation. This allows the proposed architecture to be publicly accessible, providing a platform for interoperability to meet real-world application security demands. On the whole, the OTHIS architecture sets a high level of security standard for the establishment and maintenance of both current and future health information systems. This thereby increases healthcare providers‘ and consumers‘ trust in the adoption of electronic health records to realise the associated benefits.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents some theoretical perspectives that might inform the design and development of information and communications technology (ICT) tools to support integrated (in-session) reflection and deep learning during e-learning. The role of why questioning provides the focus of discussion and is informed by the literature on critical thinking, sense-making, and reflective practice, as well as recent developments in knowledge management, computational linguistics and automated question generation. It is argued that there exists enormous scope for the development of ICT scaffolding targeted at supporting reflective practice during e-learning. The first generations of e-Portfolio tools provide some evidence for the significance of the benefits of integrating reflection into the design of ICT systems; however, following the review of a number of such systems, as well as a range of ICT applications and services designed to support e-learning, it is argued that the scope of implementation is limited.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In Australia, Vocational Education and Training (VET) programs are delivered in a variety of settings. You can be enrolled within a course in a high school, at a technical institution, private training provider or at your place of employment. Recognition of prior learning, on the job training and industry partnerships are strong factors supporting the change of delivery. The curriculum content within these programs has also changed. For example within the Business Services programs, the prerequisite and corequisite skill of touch keyboarding to an Australian Standard has moved from a core requirement in the 1990’s to an elective requirement in the 2000’s. Where a base skill becomes an elective skill, how does this effect the performance and outcomes for the learner, educator, employer and society as a whole? This paper will explore these issues and investigate the current position of standards within the VET curriculum today.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper reports the results of a mixed method approach to answer: To what extent do cultural values impact on e-service use in Saudi Arabia, and if so how? This paper will firstly, introduce the importance of culture and define the aspects of Saudi culture. It will then describe the method used and present the questionnaire findings related to the role of nepotism. The review of the literature on nepotism indicates there is still much to be studied and learned. The legal aspects of nepotism, in addition to its impact on human resource management appear to be the more reported issues. However, nepotism’s impact on Information and Communication Technologies (ICT) has not been studied. This research aims to cover this gap by investigating to what extent nepotism, as one of Saudi Arabia’s cultural values, impacts on e-service use in Saudi Arabia. The tested hypothesis was found consistent with its predicted outcome: nepotism is a negative predictor of intention to use e- services in Saudi Arabia. It is evidenced that consideration of the impact of the cultural values will mainly contribute to the enhancement of social and organisational aspects of e-society research and practices, by deeply understanding them as of the influntials to e-service implementation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper reports the results of a mixed method approach to answer: To what extent do cultural values impact on e-service use in Saudi Arabia, and if so how? This paper will firstly, introduce the importance of culture and define the aspects of Saudi culture with focus on our scope: the fear of a lack of Interaction with other Humans. It will then describe the method used and present the qualitative and quantitative findings related to the need for Interactions with other Humans. Much of the written literature about human interaction aims at Information Systems design or design improvement. Yet, this is different to what is being investigated in this study. One of the factors this study will consider is the perceived lack of interaction with other humans or the anxiety people may feel in missing the physical interaction with other people by fully moving business interaction to the virtual world. The review of the literature indicates that the impact of such factor on Information and Communication Technologies (ICT) use has not been studied. This research aims to cover this gap by investigating to what extent the fear of a lack of Interaction with other Humans, as one of Saudi Arabia’s cultural values, impacts on e-service use in Saudi Arabia. The tested hypothesis was found consistent with its predicted outcome: the fear of a lack of Interaction with other Humans is a negative predictor of intention to use e-services in Saudi Arabia. It is evidenced that consideration of the impact of the cultural values will mainly contribute to the enhancement of ICTs implementation and use.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis investigates how modern individuals relate to themselves and others in the service of shaping their ethical conduct and governing themselves. It considers the use of online social networking sites (SNSs) as one particular practice through which people manage their day-to-day conduct and understandings of self. Current research on the use of SNSs has conceptualised them as tools for communication, information-sharing and self-presentation. This thesis suggests a different way of thinking about these sites as tools for self-formation. A Foucaultian genealogical, historical and problematising approach is applied in order to explore processes of subjectivation and historical backgrounds involved in the use of SNSs. This is complimented with an ANT-based understanding of the role that technologies play in shaping human action. Drawing new connections between three factors will show how they contribute to the ways in which people become selves today. These factors are, one, the psychologisation and rationalisation of modern life that lead people to confess and talk about themselves in order to improve and perfect themselves, two, the transparency or publicness of modern life that incites people to reveal themselves constantly to a public audience and, three, the techno-social hybrid character of Western societies. This thesis will show how some older practices of self-formation have been translated into the context of modern technologised societies and how the care of self has been reinvigorated and combined with the notion of baring self in public. This thesis contributes a different way of thinking about self and the internet that does not seek to define what the modern self is and how it is staged online but rather accounts for the multiple, contingent and historically conditioned processes of subjectivation through which individuals relate to themselves and others in the service of governing their daily conduct.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A key derivation function is used to generate one or more cryptographic keys from a private (secret) input value. This paper proposes a new method for constructing a generic stream cipher based key derivation function. We show that our proposed key derivation function based on stream ciphers is secure if the underlying stream cipher is secure. We simulate instances of this stream cipher based key derivation function using three eStream finalist: Trivium, Sosemanuk and Rabbit. The simulation results show these stream cipher based key derivation functions offer efficiency advantages over the more commonly used key derivation functions based on block ciphers and hash functions.