724 resultados para Security, usability, digital signature


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Electronic Health Record (EHR) systems are being introduced to overcome the limitations associated with paper-based and isolated Electronic Medical Record (EMR) systems. This is accomplished by aggregating medical data and consolidating them in one digital repository. Though an EHR system provides obvious functional benefits, there is a growing concern about the privacy and reliability (trustworthiness) of Electronic Health Records. Security requirements such as confidentiality, integrity, and availability can be satisfied by traditional hard security mechanisms. However, measuring data trustworthiness from the perspective of data entry is an issue that cannot be solved with traditional mechanisms, especially since degrees of trust change over time. In this paper, we introduce a Time-variant Medical Data Trustworthiness (TMDT) assessment model to evaluate the trustworthiness of medical data by evaluating the trustworthiness of its sources, namely the healthcare organisation where the data was created and the medical practitioner who diagnosed the patient and authorised entry of this data into the patient’s medical record, with respect to a certain period of time. The result can then be used by the EHR system to manipulate health record metadata to alert medical practitioners relying on the information to possible reliability problems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Measuring quality attributes of object-oriented designs (e.g. maintainability and performance) has been covered by a number of studies. However, these studies have not considered security as much as other quality attributes. Also, most security studies focus at the level of individual program statements. This approach makes it hard and expensive to discover and fix vulnerabilities caused by design errors. In this work, we focus on the security design of an object oriented application and define a number of security metrics. These metrics allow designers to discover and fix security vulnerabilities at an early stage, and help compare the security of various alternative designs. In particular, we propose seven security metrics to measure Data Encapsulation (accessibility) and Cohesion (interactions) of a given object-oriented class from the point of view of potential information flow.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Open and Trusted Health Information Systems (OTHIS) Research Group has formed in response to the health sector’s privacy and security requirements for contemporary Health Information Systems (HIS). Due to recent research developments in trusted computing concepts, it is now both timely and desirable to move electronic HIS towards privacy-aware and security-aware applications. We introduce the OTHIS architecture in this paper. This scheme proposes a feasible and sustainable solution to meeting real-world application security demands using commercial off-the-shelf systems and commodity hardware and software products.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter outlines examples of classroom activities that aim to make connections between young people’s everyday experiences with video games and the formal high school curriculum. These classroom activities were developed within the emerging field of digital media literacy. Digital media literacy combines elements of ‘traditional’ approaches to media education with elements of technology and information education (Buckingham, 2007; Warschauer, 2006). It is an educational field that has gained significant attention in recent years. For example, digital media literacy has become a significant objective for media policy makers in response to the increased social and cultural roles of new media technologies and controversies associated with young people’s largely unregulated online participation. Media regulators, educational institutions and independent organizations1 in the United States, Canada, the United Kingdom and Australia have developed digital media literacy initiatives that aim to provide advice to parents, teachers and young people.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

China’s accession to the World Trade Organisation (WTO) has greatly enhanced global interest in investment in the Chinese media market, where demand for digital content is growing rapidly. The East Asian region is positioned as a growth area in many forms of digital content and digital service industries. China is attempting to catch up and take its place as a production centre to offset challenges from neighbouring countries. Meanwhile, Taiwan is seeking to use China both as an export market and as a production site for its digital content. This research investigates entry strategies of Taiwanese digital content firms into the Chinese market. By examining the strategies of a sample of Taiwan-based companies, this study also explores the evolution of their market strategies. However, the focus is on how distinctive business practices such as guanxi are important to Taiwanese business and to relations with Mainland China. This research examines how entrepreneurs manage the characteristics of digital content products and in turn how digital content entrepreneurs adapt to changing market circumstances. This project selected five Taiwan-based digital content companies that have business operations in China: Wang Film, Artkey, CnYES, Somode and iPartment. The study involved a field trip, undertaken between November 2006 and March 2007 to Shanghai and Taiwan to conduct interviews and to gather documentation and archival reports. Six senior managers and nine experts were interviewed. Data were analysed according to Miller’s firm-level entrepreneurship theory, foreign direct investment theory, Life Cycle Model and guanxi philosophy. Most studies of SMEs have focused on free market (capitalist) environments. In contrast, this thesis examines how Taiwanese digital content firms’ strategies apply in the Chinese market. I identified three main types of business strategy: cost-reduction, innovation and quality-enhancement; and four categories of functional strategies: product, marketing, resource acquisition and organizational restructuring. In this study, I introduce the concept of ‘entrepreneurial guanxi’, special relationships that imply mutual obligation, assurance and understanding to secure and exchange favors in entrepreneurial activities. While guanxi is a feature of many studies of business in Pan-Chinese society, it plays an important mediating role in digital content industries. In this thesis, I integrate the ‘Life Cycle Model’ with the dynamic concept of strategy. I outline the significant differences in the evolution of strategy between two types of digital content companies: off-line firms (Wang Film and Artkey) and web-based firms (CnYES, Somode and iPartment). Off-line digital content firms tended to adopt ‘resource acquisition strategies’ in their initial stages and ‘marketing strategies’ in second and subsequent stages. In contrast, web-based digital content companies mainly adopted product and marketing strategies in the early stages, and would adopt innovative approaches towards product and marketing strategies in the whole process of their business development. Some web-based digital content companies also adopted organizational restructuring strategies in the final stage. Finally, I propose the ‘Taxonomy Matrix of Entrepreneurial Strategies’ to emphasise the two dimensions of this matrix: innovation, and the firm’s resource acquisition for entrepreneurial strategy. This matrix is divided into four cells: Effective, Bounded, Conservative, and Impoverished.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Curriculum initiatives in Australia emphasise the use of technologies and new media in classrooms. Some English teachers might fear this deployment of technologies because we are not all ‘digital natives’ like our students. If we embrace new media forms such as podcasts, blogs, vodcasts, and digital stories, a whole new world of possibilities open up for literary response and recreative texts, with new audiences and publication spaces. This article encourages English teachers to embrace these new digital forms and how shows we can go about it.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In public venues, crowd size is a key indicator of crowd safety and stability. Crowding levels can be detected using holistic image features, however this requires a large amount of training data to capture the wide variations in crowd distribution. If a crowd counting algorithm is to be deployed across a large number of cameras, such a large and burdensome training requirement is far from ideal. In this paper we propose an approach that uses local features to count the number of people in each foreground blob segment, so that the total crowd estimate is the sum of the group sizes. This results in an approach that is scalable to crowd volumes not seen in the training data, and can be trained on a very small data set. As a local approach is used, the proposed algorithm can easily be used to estimate crowd density throughout different regions of the scene and be used in a multi-camera environment. A unique localised approach to ground truth annotation reduces the required training data is also presented, as a localised approach to crowd counting has different training requirements to a holistic one. Testing on a large pedestrian database compares the proposed technique to existing holistic techniques and demonstrates improved accuracy, and superior performance when test conditions are unseen in the training set, or a minimal training set is used.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article discusses a pilot project that adapted the methods of digital storytelling and oral history to capture a range of personal responses to the official Apology to Australia’s Indigenous Peoples delivered by Prime Minister Kevin Rudd on 13 February 2008. The project was an initiative of State Library of Queensland and resulted in a small collection of multimedia stories, incorporating a variety of personal and political perspectives. The article describes how the traditional digital storytelling workshop method was adapted for use in the project, and then proceeds to reflect on the outcomes and continuing life of the project. The article concludes by suggesting that aspects of the resultant model might be applied to other projects carried out by cultural institutions and community-based media organizations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many older adults have difficulty using modern consumer products due to their complexity both in terms of functionality and interface design. It has been observed that older people also have more problems learning new systems. It was hypothesised that designing technological products that are more intuitive for older people to use can solve this problem. An intuitive interface allows a user’s to employ prior knowledge, thus minimizing the learning needed for effective interaction. This paper discusses an experiment investigating the effectiveness of redundancy in interface design. The primary objective of this experiment was to find out if using more than one modality for a product’s interface improves the speed and intuitiveness of interactions for older adults. Preliminary analysis showed strong correlation between technology familiarity and time on tasks, but redundancy in interface design improved speed and accuracy of use only for participants with moderate to high technology familiarity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report provides an overview of trends in digital media over the period from 2009-2015. It applies scenario analysis to provide foresight on macro trends in the economy, politics, society and culture that will impact upon digital media market development in Australia, and the prospects for growth in online and digital media industries. It considers developments in the diffusion of innovations in advertising and marketing, mobile media, user-created content, and legal issues for consumers engaging in online transactions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We all know that the future of news is digital. But mainstream news providers are still grappling with how to entice more customers to digital news. This paper provides context for a survey currently underway on user intentions towards digital news and entertainment, by exploring: 1. Consumer behaviours and intentions towards digital news and information use; 2. Current trends in the Australian online news and information sector; 3. Issues and emerging opportunities in the Australian (and global) environment. Key influences on digital use of news and information are pricing and access. The paper highlights emerging technical opportunities and flags service gaps as at December 2008. These gaps include multiple disconnects between: 1. Changing user intentions towards online and location based news (news based on a specific locality as chosen by the user) and information; 2. The ability by consumers to act on these intentions via the availability and cost of technologies; 3. Younger users prefer entertainment to news; 4. Current digital offerings of traditional news providers and opportunities. These disconnects present an opportunity for online news suppliers to appraise and resolve. Doing so may enhance their online news and information offering, attract consumers and improve loyalty. Outcomes from this paper will be used to identify knowledge gaps and contribute to the development of further analysis on Australian consumers and their behaviours and intentions towards online news and information. This will be ndertaken via focus groups as part of a broader study by researchers at the Creative Industries Faculty at the Queensland University of Technology supported by the Smart Services Cooperative Research Centre.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Co-creative media production practices offer important new modes and opportunities for social participation and engagement. In mid-2009 Institute for Creative Industries and Innovation researchers at QUT adapted a specific model of co-creative media production, known as ‘digital storytelling’ and piloted it as an action research platform for facilitating and researching knowledge production based on intergenerational dialogue and exchange. Nine stories were produced and important insights were generated into this particular use of digital storytelling, as well as the impact of institutional constraints and opportunities on the possibilities and outcomes co-creative media practices and processes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Brisbane Media Map is both an online resource and a tertiary-level authentic learning project. The Brisbane Media Map is an online database which provides a detailed overview of about 600 media industry organisations in Brisbane, Australia. In addition to providing contact details and synopses for each organisation’s profile, the Brisbane Media Map also includes supplementary information on current issues, trends, and individuals in the media and communication industry sectors. This resource is produced and updated annually by final-year undergraduate Media and Communication students. This article introduces the Brisbane Media Map, its functionality and systems design approach, as well as its alignment with key learning infrastructures. It examines authentic learning as the pedagogical framework underpinning the ongoing development work of the resource and highlights some synergies of this framework with participatory design principles. The Brisbane Media Map is a useful example of an authentic learning approach that successfully engages students of non-traditional and non-design areas of study in human-computer interaction, usability, and participatory design activities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An examination of Information Security (IS) and Information Security Management (ISM) research in Saudi Arabia has shown the need for more rigorous studies focusing on the implementation and adoption processes involved with IS culture and practices. Overall, there is a lack of academic and professional literature about ISM and more specifically IS culture in Saudi Arabia. Therefore, the overall aim of this paper is to identify issues and factors that assist the implementation and the adoption of IS culture and practices within the Saudi environment. The goal of this paper is to identify the important conditions for creating an information security culture in Saudi Arabian organizations. We plan to use this framework to investigate whether security culture has emerged into practices in Saudi Arabian organizations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Understanding the complex dynamic and uncertain characteristics of organisational employees who perform authorised or unauthorised information security activities is deemed to be a very important and challenging task. This paper presents a conceptual framework for classifying and organising the characteristics of organisational subjects involved in these information security practices. Our framework expands the traditional Human Behaviour and the Social Environment perspectives used in social work by identifying how knowledge, skills and individual preferences work to influence individual and group practices with respect to information security management. The classification of concepts and characteristics in the framework arises from a review of recent literature and is underpinned by theoretical models that explain these concepts and characteristics. Further, based upon an exploratory study of three case organisations in Saudi Arabia involving extensive interviews with senior managers, department managers, IT managers, information security officers, and IT staff; this article describes observed information security practices and identifies several factors which appear to be particularly important in influencing information security behaviour. These factors include values associated with national and organisational culture and how they manifest in practice, and activities related to information security management.