448 resultados para co-operating target


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A firm, as a dynamic, evolving, and quasi-autonomous system of knowledge production and application, develops knowledge management capability (KMC) through strategic learning in order to sustain competitive advantages in a dynamic environment. Knowledge governance mechanisms and knowledge processes connect and interact with each other forming learning mechanisms, which carry out double loop learning that drives genesis and evolution of KMC to modify operating routines that effect desired performance. This paper reports a study that was carried out within a context of construction contractors, a type of project-based firms, operating within the dynamic Hong Kong construction market. A multiple-case design was used to incorporate evidence from the literature and interviews, with the help of system dynamics modeling, to visualize the evolution of KMC. The study demonstrates the feasibility to visualize how a firm's KMC matches its operating environment over time. The findings imply that knowledge management (KM) applications can be better planned and controlled through evaluation of KM performance over time from a capability perspective.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Smartphones started being targets for malware in June 2004 while malware count increased steadily until the introduction of a mandatory application signing mechanism for Symbian OS in 2006. From this point on, only few news could be read on this topic. Even despite of new emerging smartphone platforms, e.g. android and iPhone, malware writers seemed to lose interest in writing malware for smartphones giving users an unappropriate feeling of safety. In this paper, we revisit smartphone malware evolution for completing the appearance list until end of 2008. For contributing to smartphone malware research, we continue this list by adding descriptions on possible techniques for creating the first malware(s) for Android platform. Our approach involves usage of undocumented Android functions enabling us to execute native Linux application even on retail Android devices. This can be exploited to create malicious Linux applications and daemons using various methods to attack a device. In this manner, we also show that it is possible to bypass the Android permission system by using native Linux applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose – Within the construction industry there is a growing awareness of the need for linking knowledge management (KM) to business strategy, organisational objectives and existing performance measures. This study was undertaken within the context of construction organisations, and attempts to provide the empirical evidence about the relationships between KM activities and organisational business performance. Design/methodology/approach – A questionnaire survey was administered to a sample of construction contractors operating in Hong Kong to investigate the opinions of construction professionals regarding the intensity of KM activities and business performance within their organisations. In parallel to the survey, semi-structured interviews were undertaken to provide qualitative insights that helped to clarify and deepen understanding of the KM process within the context of the research target. Findings – The investigation shows that knowledge utilisation is the strongest contributor to general business performance. In addition, the impact of KM activities on the lagging performance indicators of the Balanced Scorecard (BSC), such as “financial performance”, is in an indirect manner, and through the leading indicators such as performance from “internal process” as well as “learning and growth” perspectives. Originality/value – The study empirically establishes the linkage between intensity of KM activities and business performance, and demonstrates that KM strategies need to be explicitly formulated and measured according to organisational business objectives.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the overwhelming increase in the amount of texts on the web, it is almost impossible for people to keep abreast of up-to-date information. Text mining is a process by which interesting information is derived from text through the discovery of patterns and trends. Text mining algorithms are used to guarantee the quality of extracted knowledge. However, the extracted patterns using text or data mining algorithms or methods leads to noisy patterns and inconsistency. Thus, different challenges arise, such as the question of how to understand these patterns, whether the model that has been used is suitable, and if all the patterns that have been extracted are relevant. Furthermore, the research raises the question of how to give a correct weight to the extracted knowledge. To address these issues, this paper presents a text post-processing method, which uses a pattern co-occurrence matrix to find the relation between extracted patterns in order to reduce noisy patterns. The main objective of this paper is not only reducing the number of closed sequential patterns, but also improving the performance of pattern mining as well. The experimental results on Reuters Corpus Volume 1 data collection and TREC filtering topics show that the proposed method is promising.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper aims to inform design strategies for smart space technology to enhance libraries as environments for co-working and informal social learning. The focus is on understanding user motivations, behaviour, and activities in the library when there is no programmed agenda. The study analyses gathered data over five months of ethnographic research at ‘The Edge’ – a bookless library space at the State Library of Queensland in Brisbane, Australia, that is explicitly dedicated to co-working, social learning, peer collaboration, and creativity around digital culture and technology. The results present five personas that embody people’s main usage patterns as well as motivations, attitudes, and perceived barriers to social learning. It appears that most users work individually or within pre-organised groups, but usually do not make new connections with co-present, unacquainted users. Based on the personas, four hybrid design dimensions are suggested to improve the library as a social interface for shared learning encounters across physical and digital spaces. The findings in this paper offer actionable knowledge for managers, decision makers, and designers of technology-enhanced library spaces and similar collaboration and co-working spaces.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Knowledge Management (KM) is a process that focuses on knowledge-related activities to facilitate knowledge creation, capture, transformation and use, with the ultimate aim of leveraging organisations’ intellectual capital to achieve organisational objectives. Organisational culture and climate have been identified as major catalysts to knowledge creation and sharing, and hence are considered important dimensions of KM research. The fragmented and hierarchical nature of the construction industry illustrates its difficulties to operate in a co-ordinated and homogeneous way when dealing with knowledge-related issues such as research and development, training and innovation. The culture and climate of organisations operating within the construction industry are profoundly shaped by the long-established characteristics of the industry, whilst also being influenced by the changes within the sector. Meanwhile, the special project-based structure of construction organisations constitutes additional challenges in facing knowledge production. The study this paper reports on addresses the impact of organisational culture and climate on the intensity of KM activities within construction organisations, with specific focus on the managerial activities that help to manage these challenges and to facilitate KM. A series of semi-structured interviews were undertaken to investigate the KM activities of the contractors operating in Hong Kong. The analysis on the qualitative data revealed that leadership on KM, innovation management, communication management and IT development were key factors that impact positively on the KM activities within the organisations under investigation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper explores what we are calling “Guerrilla Research Tactics” (GRT): research methods that exploit emerging mobile and cloud based digital technologies. We examine some case studies in the use of this technology to generate research data directly from the physical fabric and the people of the city. We argue that GRT is a new and novel way of engaging public participation in urban, place based research because it facilitates the co- creation of knowledge, with city inhabitants, ‘on the fly’. This paper discusses the potential of these new research techniques and what they have to offer researchers operating in the creative disciplines and beyond. This work builds on and extends Gauntlett’s “new creative methods” (2007) and contributes to the existing body of literature addressing creative and interactive approaches to data collection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ethanol sensing performance of gas sensors made of Fe doped and Fe implanted nanostructured WO3 thin films prepared by a thermal evaporation technique was investigated. Three different types of nanostructured thin films, namely, pure WO3 thin films, iron-doped WO3 thin films by co-evaporation and Fe-implanted WO3 thin films have been synthesized. All the thin films have a film thickness of 300 nm. The physical, chemical and electronic properties of these films have been optimized by annealing heat treatment at 300ºC and 400ºC for 2 hours in air. Various analytical techniques were employed to characterize these films. Atomic Force Microscopy and Transmission Electron Microscopy revealed a very small grain size of the order 5-10 nm in as-deposited WO3 films, and annealing at 300ºC or 400ºC did not result in any significant change in grain size. This study has demonstrated enhanced sensing properties of WO3 thin film sensors towards ethanol at lower operating temperature, which was achieved by optimizing the physical, chemical and electronic properties of the WO3 film through Fe doping and annealing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Co-creativity has become a significant cultural and economic phenomenon. Media consumers have become media producers. This book offers a rich description and analysis of the emerging participatory, co-creative relationships within the videogames industry. Banks discusses the challenges of incorporating these co-creative relationships into the development process. Drawing on a decade of research within the industry, the book gives us valuable insight into the continually changing and growing world of video games.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An upper primary multiliteracies project based on the children’s book “Pearl Barley and Charlie Parsley” by Aaron Blabey. The main theme explored is same and different.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aim To provide an overview of key governance matters relating to medical device trials and practical advice for nurses wishing to initiate or lead them. Background Medical device trials, which are formal research studies that examine the benefits and risks of therapeutic, non-drug treatment medical devices, have traditionally been the purview of physicians and scientists. The role of nurses in medical device trials historically has been as data collectors or co-ordinators rather than as principal investigators. Nurses more recently play an increasing role in initiating and leading medical device trials. Review Methods A review article of nurse-led trials of medical devices. Discussion Central to the quality and safety of all clinical trials is adherence to the International Conference on Harmonization Guidelines for Good Clinical Practice, which is the internationally-agreed standard for the ethically- and scientifically-sound design, conduct and monitoring of a medical device trial, as well as the analysis, reporting and verification of the data derived from that trial. Key considerations include the class of the medical device, type of medical device trial, regulatory status of the device, implementation of standard operating procedures, obligations of the trial sponsor, indemnity of relevant parties, scrutiny of the trial conduct, trial registration, and reporting and publication of the results. Conclusion Nurse-led trials of medical devices are demanding but rewarding research enterprises. As nursing practice and research increasingly embrace technical interventions, it is vital that nurse researchers contemplating such trials understand and implement the principles of Good Clinical Practice to protect both study participants and the research team.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This mathematics education research provides significant insights for the teaching of decimals to children. It is well known that decimals is one of the most difficult topics to learn and teach. Annette’s research is unique in that it focuses not only on the cognitive, but also on the affective and conative aspects of learning and teaching of decimals. The study is innovative as it includes the students as co-constructors and co-researchers. The findings open new ways of thinking for educators about how students cognitively process decimal knowledge, as well as how students might develop a sense of self as a learner, teacher and researcher in mathematics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the aim of advancing professional practice through better understanding how to create workplace contexts that cultivate individual and collective learning through situated 'information in context' experiences, this paper presents insights gained from three North American collaborative design (co-design) implementations. In the current project at the Auraria Library in Denver, Colorado, USA, participants use collaborative information practices to redesign face-to-face and technology-enabled communication, decision making, and planning systems. Design processes are described and results-to-date described, within an appreciative framework which values information sharing and enables knowledge creation through shared leadership.