545 resultados para information technology
Resumo:
Few frameworks exist for the teaching and assessment of programming subjects that are coherent and logical. Nor are they sufficiently generic and adaptable to be used outside the particular tertiary institutions in which they were developed. This paper presents the Teaching and Assessment of Software Development (TASD) frame-work. We describe its development and implementation at an Australian university and demonstrate, with examples, how it has been used, with supporting data. Extracts of criteria sheets (grading rubrics) for a variety of assessment tasks are included. The numerous advantages of this new framework are discussed with comparisons made to those reported in the published literature.
Resumo:
Digital forensics investigations aim to find evidence that helps confirm or disprove a hypothesis about an alleged computer-based crime. However, the ease with which computer-literate criminals can falsify computer event logs makes the prosecutor's job highly challenging. Given a log which is suspected to have been falsified or tampered with, a prosecutor is obliged to provide a convincing explanation for how the log may have been created. Here we focus on showing how a suspect computer event log can be transformed into a hypothesised actual sequence of events, consistent with independent, trusted sources of event orderings. We present two algorithms which allow the effort involved in falsifying logs to be quantified, as a function of the number of `moves' required to transform the suspect log into the hypothesised one, thus allowing a prosecutor to assess the likelihood of a particular falsification scenario. The first algorithm always produces an optimal solution but, for reasons of efficiency, is suitable for short event logs only. To deal with the massive amount of data typically found in computer event logs, we also present a second heuristic algorithm which is considerably more efficient but may not always generate an optimal outcome.
Resumo:
UCON is an emerging access control framework that lacks an administration model. In this paper we define the problem of administration and propose a novel administrative model. At the core of this model is the concept of attribute, which is also the central component of UCON. In our model, attributes are created by the assertions of subjects, which ascribe properties/rights to other subjects or objects. Through such a treatment of attributes, administration capabilities can be delegated from one subject to another and as a consequence UCON is improved in three aspects. First, immutable attributes that are currently considered as external to the model can be incorporated and thereby treated as mutable at- tributes. Second, the current arbitrary categorisation of users (as modifiers of attributes), to system and administrator can be removed. Attributes and objects are only modifiable by those who possess administration capability over them. Third, the delegation of administration over objects and properties that is not currently expressible in UCON is made possible.
Resumo:
The Mobile Learning Kit is a new digital learning application that allows students and teachers to compose, publish, discuss and evaluate their own mobile learning games and events. The research field was interaction design in the context of mobile learning. The research methodology was primarily design-based supported by collaboration between participating disciplines of game design, education and information technology. As such, the resulting MiLK application is a synthesis of current pedagogical models and experimental interaction design techniques and technologies. MiLK is a dynamic learning resource for incorporating both formal and informal teaching and learning practices while exploiting mobile phones and contemporary digital social tools in innovative ways. MiLK explicitly addresses other predominant themes in educational scholarship that relate to current education innovation and reform such as personalised learning, life-long learning and new learning spaces. The success of this project is indicated through rigorous trials and actual uptake of MiLK by international participants in Australia, UK, US and South Africa. MiLK was awarded for excellence in the use of emerging technologies for improved learning and teaching as a finalist (top 3) in the Handheld Learning and Innovation Awards in the UK in 2008. MiLK was awarded funding from the Australasian CRC for Interaction Design in 2008 to prepare the MiLK application for development. MiLK has been awarded over $230,000 from ACID since 2006. The resulting application and research materials are now being commercialised by a new company, ‘ACID Services’.
Resumo:
There have been powerful incentives for Tasmanian Small and Medium-sized Enterprises (SMEs) to adopt information technology to enable them to remain competitive and to comply with legislative regulations. This research study was undertaken to establish whether SMEs implementing computerised accounting systems have a subsequent change in their external accountancy fees. The research study employed a quantitative methodology using survey questionnaires. The study found that in less than 3% of cases SMEs reported a decrease in accountancy fees, in almost 45% of cases the organisation actually experienced a slight to substantial fee increase while 52% reported no change in accountancy fees.
Resumo:
A study of Australian nurses on their use of information technology in the workplace was undertaken by the Australian Nursing Federation (ANF) in 2007. This study of over 4000 nurses highlighted that nurses recognise benefits to adopting more information technology in the workplace although there are significant barriers to their use. It also identified gross deficits in the capacity of the nursing workforce to engage in the digital processing of information. Following the release of the study last year, the ANF commenced work on a number of key recommendations from the report in order to overcome identified barriers and provide opportunities for nurses to better utilise information technology and information management systems. One of these recommendations was to seek research funding to develop national information technology and information management competency standards for nurses. This project has now received Federal Government funding to undertake this development. This project is being developed in collaboration with the ANF and the Queensland University of Technology. This paper will discuss the methodology, development and publication of the Australian Nursing Informatics Competency Standards Project which is currently underway and due for completion in May 2009. The Australian Nursing Informatics Competencies will be presented at the conference.
Resumo:
Business Process Modelling is a fast growing field in business and information technology, which uses visual grammars to model and execute the processes within an organisation. However, many analysts present such models in a 2D static and iconic manner that is difficult to understand by many stakeholders. Difficulties in understanding such grammars can impede the improvement of processes within an enterprise due to communication problems. In this chapter we present a novel framework for intuitively visualising animated business process models in interactive Virtual Environments. We also show that virtual environment visualisations can be performed with present 2D business process modelling technology, thus providing a low barrier to entry for business process practitioners. Two case studies are presented from film production and healthcare domains that illustrate the ease with which these visualisations can be created. This approach can be generalised to other executable workflow systems, for any application domain being modelled.
Resumo:
Individuals, organizations, and governments are increasingly becoming aware of the necessity of sustainability in living, organizing, performing, and managing work. In this context, “green IS” has become an established colloquial term, acknowledging that information technology, corporate information systems, and the surrounding practices are both a contributor to the sustainability challenge and a potential enabler for green and sustainable practices. To date, however, there are few reported studies on the role of information systems for the challenge, and solution, of sustainability. This paper presents results from a case study of a world-wide operating IT software solution provider that is engaged in the development and adoption of sustainable practices. Our study suggests that the adoption of sustainable practices comes along with a number of particularities. We found information technology to be a key enabler of transparency about the progress of sustainability operations. We further found personal, motivator factors as well as organizational factors such as business inclusion, strategy definition, and a dialectic top-management and bottom-up support, to play a role in enabling a company to manage their sustainability. We describe a set of conjectures forthcoming from our case analysis, and detail some implications for further research in this area.
Resumo:
E-commerce technologies such as a website, email and the use of web browsers enables access to large amounts of information, facilitates communication and provides niche companies with an effective mechanism for competing with larger organisations world-wide. However recent literature has shown Australian SMEs have been slow in the uptake of these technologies. The aim of this research was to determine which factors were important in impacting on small firms' decision making in respect of information technology and e-commerce adoption. Findings indicate that generally the more a firm was concerned about its competitive position such a firm was likely to develop a web site. Moreover the 'Industry and Skill Demands' dimension suggested that as the formal education of the owner/manager increased, coupled with the likelihood that the firm was in the transport and storage or communication services industries, and realising the cost of IT adoption was in effect an investment, then such a firm would be inclined to develop a web site.
Resumo:
The aim of this paper is to contribute to the understanding of various models used in research for the adoption and diffusion of information technology in small and medium-sized enterprises (SMEs). Starting with Rogers' diffusion theory and behavioural models, technology adoption models used in IS research are discussed. Empirical research has shown that the reasons why firms choose to adopt or not adopt technology is dependent on a number of factors. These factors can be categorised as owner/manager characteristics, firm characteristics and other characteristics. The existing models explaining IS diffusion and adoption by SMEs overlap and complement each other. This paper reviews the existing literature and proposes a comprehensive model which includes the whole array of variables from earlier models.
Resumo:
Based on the model of ‘The Smile of Value Creation' (Mudambi 2007) and the theory of concept marketing, this study aims to examine the top 20 Taiwanese environmental marks companies, and explore their circumstances, innovation patterns and value chain system in Taiwan. It found out all of them are information technology product and household appliances companies. In addition, they make special efforts in two parts of value creation: product (including basic and applied ‘R and D' (Research and Design), design, commercialization) and marketing (including advertising and brand management, specialized logistics, after-sales services). They also locate their branches depending on different stages of the value chain, and expand them globally.
Resumo:
This paper proposes a security architecture for the basic cross indexing systems emerging as foundational structures in current health information systems. In these systems unique identifiers are issued to healthcare providers and consumers. In most cases, such numbering schemes are national in scope and must therefore necessarily be used via an indexing system to identify records contained in pre-existing local, regional or national health information systems. Most large scale electronic health record systems envisage that such correlation between national healthcare identifiers and pre-existing identifiers will be performed by some centrally administered cross referencing, or index system. This paper is concerned with the security architecture for such indexing servers and the manner in which they interface with pre-existing health systems (including both workstations and servers). The paper proposes two required structures to achieve the goal of a national scale, and secure exchange of electronic health information, including: (a) the employment of high trust computer systems to perform an indexing function, and (b) the development and deployment of an appropriate high trust interface module, a Healthcare Interface Processor (HIP), to be integrated into the connected workstations or servers of healthcare service providers. This proposed architecture is specifically oriented toward requirements identified in the Connectivity Architecture for Australia’s e-health scheme as outlined by NEHTA and the national e-health strategy released by the Australian Health Ministers.
Resumo:
Historically, distance education consisted of a combination of face-to-face blocks of time and surface mailed packages. However, advances in information technology literacy and the abundance of personal computers has placed e-learning in increased demand. The authors describe the planning, implementation, and evaluation of the blending of e-learning with face-to-face education in the postgraduate nursing forum. Experiences of this particular student group are also discussed.