243 resultados para Innovations in web technology
Resumo:
Cloud computing is a currently developing revolution in information technology that is disturbing the way that individuals and corporate entities operate while enabling new distributed services that have not existed before. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Security is often said to be a major concern of users considering migration to cloud computing. This article examines some of these security concerns and surveys recent research efforts in cryptography to provide new technical mechanisms suitable for the new scenarios of cloud computing. We consider techniques such as homomorphic encryption, searchable encryption, proofs of storage, and proofs of location. These techniques allow cloud computing users to benefit from cloud server processing capabilities while keeping their data encrypted; and to check independently the integrity and location of their data. Overall we are interested in how users may be able to maintain and verify their own security without having to rely on the trust of the cloud provider.
Resumo:
The avenues through which communities and community organisations raise awareness about the issues they face and how they agitate for change have developed rapidly in the past ten years; and digital technology has provided community activists with the means to quickly create and widely disseminate stories. Perhaps the most influential and wide reaching of recent innovations in storytelling has been transmedia storytelling. This article explores a new breed of projects that utilise recognisable conventions of transmedia storytelling and borrow elements from other forms of storytelling that predate transmedia, such as digital storytelling and documentary film making. In addition to being hybrid in form these projects are independent and solely focused on raising awareness about particular social issues or telling the stories of marginalized groups, who otherwise do not have a voice in the public sphere.
Resumo:
Globally, cities face a convergence of complex and rapidly evolving challenges, including climate change, resource shortages, population growth and urbanization, and financial pressures. Biophilic urbanism is an emerging design principle capable of considering the multidimensional and interdependent complexities of urban systems and infrastructure, which through the use of natural design features, can meet society’s inherent need for contact with nature, and assist efforts to respond to these growing challenges. Considering the imperative for addressing these challenges, this paper proposes that significant lessons can be learned from existing examples of biophilic urbanism, avoiding ‘re-invention of the wheel’ and facilitating accelerated innovation in other areas. Vauban is a 38-hectare brownfield development located 3 kilometers from the centre of Germany’s ‘ecological capital’ of Freiburg city. It was developed using an innovative process with strong community participation and reinterpreted developer roles to produce an example of integrated sustainability. Innovation in transport, energy, housing, development and water treatment has enabled a relatively high-density, mixed-use development that integrates a considerable amount of nature. This paper discusses Vauban in light of research undertaken over the last two years through the Sustainable Built Environment National Research Centre in Australia, to investigate emerging elements of ‘biophilic urbanism’ (nature-loving cities), and their potential to be mainstreamed within urban environments. The paper considers the interplay between the policies, community dynamics and innovations in Vauban, within the context of the culture, history and practice of sustainability in Germany, and how these have enabled nature to be integrated into the urban environment of Vauban while achieving other desirable goals for urban areas. It highlights potential applications from Vauban for Australian cities.
Resumo:
A commitment in 2010 by the Australian Federal Government to spend $466.7 million dollars on the implementation of personally controlled electronic health records (PCEHR) heralded a shift to a more effective and safer patient centric eHealth system. However, deployment of the PCEHR has met with much criticism, emphasised by poor adoption rates over the first 12 months of operation. An indifferent response by the public and healthcare providers largely sceptical of its utility and safety speaks to the complex sociotechnical drivers and obstacles inherent in the embedding of large (national) scale eHealth projects. With government efforts to inflate consumer and practitioner engagement numbers giving rise to further consumer disillusionment, broader utilitarian opportunities available with the PCEHR are at risk. This paper discusses the implications of establishing the PCEHR as the cornerstone of a holistic eHealth strategy for the aggregation of longitudinal patient information. A viewpoint is offered that the real value in patient data lies not just in the collection of data but in the integration of this information into clinical processes within the framework of a commoditised data-driven approach. Consideration is given to the eHealth-as-a-Service (eHaaS) construct as a disruptive next step for co-ordinated individualised healthcare in the Australian context.
Resumo:
Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.
Resumo:
To harness safe operation of Web-based systems in Web environments, we propose an SSPA (Server-based SHA-1 Page-digest Algorithm) to verify the integrity of Web contents before the server issues an HTTP response to a user request. In addition to standard security measures, our Java implementation of the SSPA, which is called the Dynamic Security Surveillance Agent (DSSA), provides further security in terms of content integrity to Web-based systems. Its function is to prevent the display of Web contents that have been altered through the malicious acts of attackers and intruders on client machines. This is to protect the reputation of organisations from cyber-attacks and to ensure the safe operation of Web systems by dynamically monitoring the integrity of a Web site's content on demand. We discuss our findings in terms of the applicability and practicality of the proposed system. We also discuss its time metrics, specifically in relation to its computational overhead at the Web server, as well as the overall latency from the clients' point of view, using different Internet access methods. The SSPA, our DSSA implementation, some experimental results and related work are all discussed
Resumo:
This study analyzes the management of air pollutant substance in Chinese industrial sectors from 1998 to 2009. Decomposition analysis applying the logarithmic mean divisia index is used to analyze changes in emissions of air pollutants with a focus on the following five factors: coal pollution intensity (CPI), end-of-pipe treatment (EOP), the energy mix (EM), productive efficiency change (EFF), and production scale changes (PSC). Three pollutants are the main focus of this study: sulfur dioxide (SO2), dust, and soot. The novelty of this paper is focusing on the impact of the elimination policy on air pollution management in China by type of industry using the scale merit effect for pollution abatement technology change. First, the increase in SO2 emissions from Chinese industrial sectors because of the increase in the production scale is demonstrated. However, the EOP equipment that induced this change and improvements in energy efficiency has prevented an increase in SO2 emissions that is commensurate with the increase in production. Second, soot emissions were successfully reduced and controlled in all industries except the steel industry between 1998 and 2009, even though the production scale expanded for these industries. This reduction was achieved through improvements in EOP technology and in energy efficiency. Dust emissions decreased by nearly 65% between 1998 and 2009 in the Chinese industrial sectors. This successful reduction in emissions was achieved by implementing EOP technology and pollution prevention activities during the production processes, especially in the cement industry. Finally, pollution prevention in the cement industry is shown to result from production technology development rather than scale merit. © 2013 Elsevier Ltd. All rights reserved.
Resumo:
As of today, online reviews have become more and more important in decision making process. In recent years, the problem of identifying useful reviews for users has attracted significant attentions. For instance, in order to select reviews that focus on a particular feature, researchers proposed a method which extracts all associated words of this feature as the relevant information to evaluate and find appropriate reviews. However, the extraction of associated words is not that accurate due to the noise in free review text, and this affects the overall performance negatively. In this paper, we propose a method to select reviews according to a given feature by using a review model generated based upon a domain ontology called product feature taxonomy. The proposed review model provides relevant information about the hierarchical relationships of the features in the review which captures the review characteristics accurately. Our experiment results based on real world review dataset show that our approach is able to improve the review selection performance according to the given criteria effectively.
Resumo:
Devising authentic assessments for subjects with large enrolments is a challenge. This study describes an electronic role-play assessment for approximately 600 first-year nursing students to learn and apply pathophysiology (bioscience) concepts to nursing practice. Students used Microsoft Office PowerPoint® to prepare electronic role-plays both between a nurse and patient, and between two nurses, thus simulating workplace scenarios. Student feedback demonstrated that respondents found this assessment useful for learning pathophysiology, and for applying pathophysiology to a nursing clinical setting. This electronic presentation circumvented issues associated with a traditional oral presentation such as embarrassment and logistics of scheduling groups, and rated well with students of non-English speaking background. The electronic role-play assessment initiative encouraged students to apply their bioscience knowledge to a clinical setting, and allowed students to conceptualise the importance of bioscience within both the nursing degree and the profession.
Resumo:
Identifying product families has been considered as an effective way to accommodate the increasing product varieties across the diverse market niches. In this paper, we propose a novel framework to identifying product families by using a similarity measure for a common product design data BOM (Bill of Materials) based on data mining techniques such as frequent mining and clus-tering. For calculating the similarity between BOMs, a novel Extended Augmented Adjacency Matrix (EAAM) representation is introduced that consists of information not only of the content and topology but also of the fre-quent structural dependency among the various parts of a product design. These EAAM representations of BOMs are compared to calculate the similarity between products and used as a clustering input to group the product fami-lies. When applied on a real-life manufacturing data, the proposed framework outperforms a current baseline that uses orthogonal Procrustes for grouping product families.
Resumo:
The paper reports health related findings of the first study undertaken of rural sex workers in an income-rich nation. In-depth interviews were conducted with eighteen purposively selected women who work in the rural sex industry. Rural sex services have a unique structure which informs the experiences of sex workers. Recent advances in telecommunications technology have impacted upon the organisation and structure of the sex industry in rural environments. Notable has been the growth of escort services in rural areas, which has diversified the rural sex industry from its traditional base of brothel operations. The general absence of street prostitution in rural settings has meant that the profile of rural sex workers tends to resemble that of escorts or call girls in urban settings, with workers having a relatively high level of control over working conditions and compliance with public health initiatives. Important issues which impact upon the rural sex industry include confidentiality and the more limited market for sexual services likely to be encountered in rural settings. These issues may impact on the sexual health of rural sex workers in terms of risk practices and access to health services.
Resumo:
Information and Communication Technology (ICT) has become an integral part of societies across the globe. This study demonstrates how successful technology integration by 10 experienced teachers in an Australian high school was dependent on teacher-driven change and innovation that influenced the core business of teaching and learning. The teachers were subject specialists across a range of disciplines, engaging their Year Eight students (aged 12–14 years) in the Technology Rich Classrooms programme. Two classrooms were renovated to accommodate the newly acquired computer hardware. The first classroom adopted a one-to-one desktop model with all the computers with Internet access arranged in a front-facing pattern. The second classroom had computers arranged in small groups. The students also used Blackboard to access learning materials after school hours. Qualitative data were gathered from teachers mainly through structured and unstructured interviews and a range of other approaches to ascertain their perceptions of the new initiative. This investigation showed that ICT was impacting positively on the core business of teaching and learning. Through the support of the school leadership team, the built environment was enabling teachers to use ICT. This influenced their pedagogical approaches and the types of learning activities they designed and implemented. As a consequence, teachers felt that students were motivated and benefited through this experience.
Resumo:
The authors have collaborated in the development and initial evaluation of a curriculum for mathematics acceleration. This paper reports upon the difficulties encountered with documenting student understanding using pen-and-paper assessment tasks. This leads to a discussion of the impact of students’ language and literacy on mathematical performance and the consequences for motivation and engagement as a result of simplifying the language in the tests, and extending student work to algebraic representations. In turn, implications are drawn for revisions to assessment used within the project and the language and literacy focus included within student learning experiences.