594 resultados para Technology fee


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the current economy, knowledge has been recognized to be a valuable organisational asset, a crucial factor that aids organisations to succeed in highly competitive environments. Many organisations have begun projects and special initiatives aimed at fostering better knowledge sharing amongst their employees. Not surprisingly, information technology (IT) has been a central element of many of these projects and initiatives, as the potential of emerging information technologies such as Web 2.0 for enabling the process of managing organisational knowledge is recognised. This technology could be used as a collaborative system for knowledge management (KM) within enterprises. Enterprise 2.0 is the application of Web 2.0 in an organisational context. Enterprise 2.0 technologies are web-based social software that facilitate collaboration, communication and information flow in a bidirectional manner: an essential aspect of organisational knowledge management. This chapter explains how Enterprise 2.0 technologies (Web 2.0 technologies within organisations) can support knowledge management. The chapter also explores how such technologies support the codifying (technology-centred) and social network (people-centred) approaches of KM, towards bridging the current gap between these two approaches.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the growth and development of communication technology there is an increasing need for the use of interception technologies in modern policing. Law enforcement agencies are faced with increasingly sophisticated and complex criminal networks that utilise modern communication technology as a basis for their criminal success. In particular, transnational organised crime (TOC) is a diverse and complicated arena, costing global society in excess of $3 trillion annually, a figure that continues to grow (Borger, 2007) as crime groups take advantage of disappearing borders and greater profit markets. However, whilst communication can be a critical success factor for criminal enterprise it is also a key vulnerability. It is this vulnerability that the use of CIT, such as phone taps or email interception, can exploit. As such, law enforcement agencies now need a method and framework that allows them to utilise CIT to combat these crimes efficiently and successfully. This paper provides a review of current literature with the specific purpose of considering the effectiveness of CIT in the fight against TOC and the groundwork that must be laid in order for it to be fully exploited. In doing so, it fills an important gap in current research, focusing on the practical implementation of CIT as opposed to the traditional area of privacy concerns that arise with intrusive methods of investigation. The findings support the notion that CIT is an essential intelligence gathering tool that has a strong place within the modern policing arena. It identifies that the most effective use of CIT is grounded within a proactive, intelligence‐led framework and concludes that in order for this to happen Australian authorities and law enforcement agencies must re‐evaluate and address the current legislative and operational constraints placed on the use of CIT and the culture that surrounds intelligence in policing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent surveys of information technology management professionals show that understanding business domains in terms of business productivity and cost reduction potential, knowledge of different vertical industry segments and their information requirements, understanding of business processes and client-facing skills are more critical for Information Systems personnel than ever before. In an attempt to restrucuture the information systems curriculum accordingly, our view it that information systems students need to develop an appreciation for organizational work systems in order to understand the operation and significance of information systems within such work systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study examines consumer adoption of 3G mobile technology in China. The qualitative study involved 45 in-depth interviews undertaken in three major Chinese cities to explore the beliefs and attitudes which determine Chinese consumers’ acceptance of the mobile technological innovation. The findings are compared and contrasted against those reported in Western studies. The variations underpinning adoption of 3G between consumers in the three regional cities were identified. Specifically, it was found that the regions differed in terms of the relative importance of the identified adoption determinants, such as perceived social outcomes for using the innovation and the effects of social influence on the adoption. These findings provide subtle insight into the nature of Chinese consumers’ responses to new mobile technologies and a better understanding of variations among regional Chinese consumers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis presents a design investigation into how traditional technology-orientated markets can use design led innovation (DLI) strategies in order to achieve better market penetration of disruptive products. In a review of the Australian livestock industry, considering historical information and present-day trends, a lack of socio-cultural consideration was identified in the design and implementation of products and systems, previously been taken to market. Hence the adoption of these novel products has been documented as extremely slow. Classical diffusion models have typically been used in order to implement these products. However, this thesis poses that it is through the strategic intent of design led innovation, where heavily technology-orientated markets (such as the Australian livestock industry), can achieve better final adoption rates. By considering a range of external factors (business models, technology and user needs), rather than focusing design efforts solely on the technology, it is argued that using DLI approach will lead to disruptive innovations being made easier to adopt in the Australian livestock industry. This thesis therefore explored two research questions: 1. What are the social inhibitors to the adoption of a new technology in the Australian livestock industry? 2. Can design be used to gain a significant feedback response to the proposed innovation? In order to answer these questions, this thesis used a design led innovation approach to investigate the livestock industry, centring on how design can be used early on in the development of disruptive products being taken to market. This thesis used a three stage data collection programme, combining methods of design thinking, co-design and participatory design. The first study found four key themes to the social barriers of technology adoption; Social attitudes to innovation, Market monitoring, Attitude to 3D imaging and Online processes. These themes were built upon through a design thinking/co-design approach to create three ‘future scenarios’ to be tested in participant workshops. The analysis of the data collection found four key socio-cultural barriers that inhibited the adoption of a disruptive innovation in the Australian livestock industry. These were found to be a lack of Education, a Culture of Innovation, a Lack of Engagement and Communication barriers. This thesis recommends five key areas to be focused upon in the subsequent design of a new product in the Australian livestock industry. These recommendations are made to business and design managers looking to introduce disruptive innovations in this industry. Moreover, the thesis presents three design implications relating to stakeholder attitudes, practical constraints and technological restrictions of innovations within the industry.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is significant interest in Human-computer interaction methods that assist in the design of applications for use by children. Many of these approaches draw upon standard HCI methods,such as personas, scenarios, and probes. However, often these techniques require communication and kinds of thinking skills that are designer centred,which prevents children with Autism Spectrum Disorders or other learning and communication disabilities from being able to participate. This study investigates methods that might be used with children with ASD or other learning and communication disabilities to inspire the design of technology based intervention approaches to support their speech and language development. Similar to Iversen and Brodersen, we argue that children with ASD should not be treated as being in some way “cognitively incomplete”. Rather they are experts in their everyday lives and we cannot design future IT without involving them. However, how do we involve them Instead of beginning with HCI methods, we draw upon easy to use technologies and methods used in the therapy professions for child engagement, particularly utilizing the approaches of Hanen (2011) and Greenspan (1998). These approaches emphasize following the child’s lead and ensuring that the child always has a legitimate turn at a detailed level of interaction. In a pilot project, we have studied a child’s interactions with their parents about activities over which they have control – photos that they have taken at school on an iPad. The iPad was simple enough for this child with ASD to use and they enjoyed taking and reviewing photos. We use this small case study as an example of a child-led approach for a child with ASD. We examine interactions from this study in order to assess the possibilities and limitations of the child-led approach for supporting the design of technology based interventions to support speech and language development.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose an approach to employ eigen light-fields for face recognition across pose on video. Faces of a subject are collected from video frames and combined based on the pose to obtain a set of probe light-fields. These probe data are then projected to the principal subspace of the eigen light-fields within which the classification takes place. We modify the original light-field projection and found that it is more robust in the proposed system. Evaluation on VidTIMIT dataset has demonstrated that the eigen light-fields method is able to take advantage of multiple observations contained in the video.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The technology and innovation management literature offers somewhat conflicting evidence with regards to the formation of spinoff companies for radically new technologies. Sometimes spinoffs seem to be a very effective strategy—but not always. An obvious question emerges: under what conditions is a spinoff the best way to pursue a radical technology? This paper sheds light on this question by presenting case study evidence from spinoff firms within the Shell Technology Ventures portfolio. The data point to industry clockspeed as a potentially important variable in the decision to create a spinoff or not.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper explores the results an on-going research project to identify factors influencing the success of international and non-English speaking background (NESB) gradúate students in the fields of Engineering and IT at three Australian universities: the Queensland University of Technology (QUT), the University of Western Australia (UWA), and Curtin University (CU). While the larger study explores the influence of factors from both sides of the supervision equation (e.g., students and supervisors), this paper focusses primarily on the results of an online survey involving 227 international and/or NESB graduate students in the areas of Engineering and IT at the three universities. The study reveals cross-cultural differences in perceptions of student and supervisor roles, as well as differences in the understanding of the requirements of graduate study within the Australian Higher Education context. We argue that in order to assist international and NESB research students to overcome such culturally embedded challenges, it is important to develop a model which recognizes the complex interactions of factors from both sides of the supervision relationship, in order to understand this cohort‟s unique pedagogical needs and develop intercultural sensitivity within postgraduate research supervision.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The design of artificial intelligence in computer games is an important component of a player's game play experience. As games are becoming more life-like and interactive, the need for more realistic game AI will increase. This is particularly the case with respect to AI that simulates how human players act, behave and make decisions. The purpose of this research is to establish a model of player-like behavior that may be effectively used to inform the design of artificial intelligence to more accurately mimic a player's decision making process. The research uses a qualitative analysis of player opinions and reactions while playing a first person shooter video game, with recordings of their in game actions, speech and facial characteristics. The initial studies provide player data that has been used to design a model of how a player behaves.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For people with intellectual disabilities there are significant barriers to inclusion in socially cooperative endeavours. This paper investigates the effectiveness of Stomp, a tangible user interface (TUI) designed to provide new participatory experiences for people with intellectual disability. Results from an observational study reveal the extent to which the Stomp system supports social and physical interaction. The tangible, spatial and embodied qualities of Stomp result in an experience that does not rely on the acquisition of specific competencies before interaction and engagement can occur.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The existing Collaborative Filtering (CF) technique that has been widely applied by e-commerce sites requires a large amount of ratings data to make meaningful recommendations. It is not directly applicable for recommending products that are not frequently purchased by users, such as cars and houses, as it is difficult to collect rating data for such products from the users. Many of the e-commerce sites for infrequently purchased products are still using basic search-based techniques whereby the products that match with the attributes given in the target user's query are retrieved and recommended to the user. However, search-based recommenders cannot provide personalized recommendations. For different users, the recommendations will be the same if they provide the same query regardless of any difference in their online navigation behaviour. This paper proposes to integrate collaborative filtering and search-based techniques to provide personalized recommendations for infrequently purchased products. Two different techniques are proposed, namely CFRRobin and CFAg Query. Instead of using the target user's query to search for products as normal search based systems do, the CFRRobin technique uses the products in which the target user's neighbours have shown interest as queries to retrieve relevant products, and then recommends to the target user a list of products by merging and ranking the returned products using the Round Robin method. The CFAg Query technique uses the products that the user's neighbours have shown interest in to derive an aggregated query, which is then used to retrieve products to recommend to the target user. Experiments conducted on a real e-commerce dataset show that both the proposed techniques CFRRobin and CFAg Query perform better than the standard Collaborative Filtering (CF) and the Basic Search (BS) approaches, which are widely applied by the current e-commerce applications. The CFRRobin and CFAg Query approaches also outperform the e- isting query expansion (QE) technique that was proposed for recommending infrequently purchased products.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report focuses on blended learning within the Queensland University of Technology (QUT) which is one of Australia’s largest public universities. Although the university in its current format was established in 1989, it contains several previous institutions that can be traced to the earliest forms of technical and teacher education in Queensland in the 19th century (Kyle et al., 1999). The focal point of the report is the experience of QUT’s Faculty of Education which was formed from the amalgamation of several teacher training colleges servicing pre-school and kindergarten, primary and secondary teacher education. While the broader university currently employs approximately 4,000 staff and has about 40,000 students, QUT’s Faculty of Education employs around 170 staff and has approximately 5,000 enrolled students. The Faculty of Education at QUT is the largest provider of pre-service teacher education in Australia and is one of the largest producers of educational research. A major theme of the Faculty of Education is its focus on education and research that provides teachers, schools and educational authorities with practical solutions to the multifaceted issues facing contemporary education.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The underlying objective of this study was to develop a novel approach to evaluate the potential for commercialisation of a new technology. More specifically, this study examined the 'ex-ante'. evaluation of the technology transfer process. For this purpose, a technology originating from the high technology sector was used. The technology relates to the application of software for the detection of weak signals from space, which is an established method of signal processing in the field of radio astronomy. This technology has the potential to be used in commercial and industrial areas other than astronomy, such as detecting water leakages in pipes. Its applicability to detecting water leakage was chosen owing to several problems with detection in the industry as well as the impact it can have on saving water in the environment. This study, therefore, will demonstrate the importance of interdisciplinary technology transfer. The study employed both technical and business evaluation methods including laboratory experiments and the Delphi technique to address the research questions. There are several findings from this study. Firstly, scientific experiments were conducted and these resulted in a proof of concept stage of the chosen technology. Secondly, validation as well as refinement of criteria from literature that can be used for „ex-ante. evaluation of technology transfer has been undertaken. Additionally, after testing the chosen technology.s overall transfer potential using the modified set of criteria, it was found that the technology is still in its early stages and will require further development for it to be commercialised. Furthermore, a final evaluation framework was developed encompassing all the criteria found to be important. This framework can help in assessing the overall readiness of the technology for transfer as well as in recommending a viable mechanism for commercialisation. On the whole, the commercial potential of the chosen technology was tested through expert opinion, thereby focusing on the impact of a new technology and the feasibility of alternate applications and potential future applications.