303 resultados para critical information infrastructure
Resumo:
The US National Institute of Standards and Technology (NIST) showed that, in 2004, owners and operations managers bore two thirds of the total industry cost burden from inadequate interoperability in construction projects from inception to operation, amounting to USD10.6 billion. Building Information Modelling (BIM) and similar tools were identified by Engineers Australia in 2005 as potential instruments to significantly reduce this sum, which in Australia could amount to total industry-wide cost burden of AUD12 billion. Public sector road authorities in Australia have a key responsibility in driving initiatives to reduce greenhouse gas emissions from the construction and operations of transport infrastructure. However, as previous research has shown the Environmental Impact Assessment process, typically used for project approvals and permitting based on project designs available at the consent stage, lacks Key Performance Indicators (KPIs) that include long-term impact factors and transfer of information throughout the project life cycle. In the building construction industry, BIM is widely used to model sustainability KPIs such as energy consumption, and integrated with facility management systems. This paper proposes that a similar use of BIM in early design phases of transport infrastructure could provide: (i) productivity gains through improved interoperability and documentation; (ii) the opportunity to carry out detailed cost-benefit analyses leading to significant operational cost savings; (iii) coordinated planning of street and highway lighting with other energy and environmental considerations; iv) measurable KPIs that include long-term impact factors which are transferable throughout the project life cycle; and (v) the opportunity for integrating design documentation with sustainability whole-of-life targets.
Resumo:
Enterprise Resource Planning (ERP) systems are integrated enterprise-wide standard information systems that automate all aspects of an organisations’ business processes. The ERP philosophy is that business systems incorporating sales, marketing, manufacturing, distribution, personnel and finance modules can be supported by a single integrated system with all of the company’s data captured in a central database. The ERP packages of vendors such as SAP, Baan, J.D. Edwards and Intentia represent more than a common systems platform for a business. They prescribe information blueprints of how organisation’s business processes should operate. In this paper, the scale and strategic importance of ERP systems is identified and the problem of ERP implementation is defined. Five company examples are analysed using a Critical Success Factors (CSFs) theoretical framework. The paper offers a framework for managers which provides the basis for developing an ERP implementation strategy. The case analysis identifies different approaches to ERP implementation, highlights the critical role of legacy systems in influencing the implementation process, and identifies the importance of business process change and software configuration in addition to factors already cited in the literature such as top management support and communication. The implications of the results and future research opportunities are outlined.
Resumo:
Introduction This research is the first to investigate the experiences of teacher-librarians as evidence-based practice. An empirically derived model is presented in this paper. Method This qualitative study utilised the expanded critical incident approach, and investigated the real-life experiences of fifteen Australian teacher-librarians, through semi-structured interviews and inductive data analysis. Data collection utilised semi-structured interviews, on-site observations, journaling and the rubric for contextual information. These approaches allowed each of the interviewees to tell their own story and provided richness to the data. Analysis The analysis involved two types of data categorisation: binary and thematic. Binary classification was used to identify factual details. Thematic analysis involved categorising the emerging themes. Results An empirically derived model for evidence-based practice was devised and associated critical findings identified. The results demonstrate that evidence-based practice for teacher-librarians is a holistic practice. It is not a linear, step-by-step process. Conclusions This study is significant for teacher-librarians and library and information professionals as it provides new understanding of evidence-based practice.
Resumo:
We have previously suggested that three proof requirements are essential for a sustainable land registration system. These were proof of identity, proof of ownership and authority to deal. Our attention in this article is drawn to the security framework that surrounds these requirements. We will ask whether the introduction of the Property Exchange of Australia (PEXA), and its underpinning regulatory regime will meet the concerns that we have in relation to them. In drawing out some problems with PEXA, we then offer an innovative idea, sourced from the transfer of equities that could serve to generate discussion on how we can ensure the Torrens system of land registration is sustainable for another 160 years. We also canvass some more incremental suggestions that evolve out of what we currently do, as well as outlining some comparative externally sourced ideas as to how the transfer and ownership of land can be made safer for all citizens. Such a goal is imperative when land transfer and secure property ownership is a critical component of the economic infrastructure of a modern society.
Resumo:
Building information models are increasingly being utilised for facility management of large facilities such as critical infrastructures. In such environments, it is valuable to utilise the vast amount of data contained within the building information models to improve access control administration. The use of building information models in access control scenarios can provide 3D visualisation of buildings as well as many other advantages such as automation of essential tasks including path finding, consistency detection, and accessibility verification. However, there is no mathematical model for building information models that can be used to describe and compute these functions. In this paper, we show how graph theory can be utilised as a representation language of building information models and the proposed security related functions. This graph-theoretic representation allows for mathematically representing building information models and performing computations using these functions.
Resumo:
This chapter highlights the varied scope of research in the emerging information experience domain. First, I share my perspective as educator-researcher on information experience and its association with informed learning. Then, in six methodological snapshots I present a selection of qualitative approaches which are suited to investigating information experience. The snapshots feature: action research, constructivist grounded theory, ethnomethodology, expanded critical incident approach, phenomenography and qualitative case study. By way of illustration, six researchers explain how and why they use one of these methods. Finally, I review the key characteristics of the six methods and their respective benefits for information experience research.
Resumo:
Expert searchers engage with information in a variety of professional settings, as information brokers, reference librarians, information architects and faculty who teach advanced searching. As my recent research shows, the expert searcher’s information experience is defined by profound discernment of critical concepts about information, and a fluid ability to apply this knowledge to their engagement with the information environment. The information experience of the expert searcher means active and intentional participation with the processes and players that created that information environment. Expert searchers become an integral and seamless part of their information environment and also play a role in facilitating the information experiences of others. In this chapter, after discussing my understanding of the concept of information experience, I outline how I used threshold concept theory to explore the information experience of expert searchers. Through the findings, I identify four threshold concepts in the acquisition of search expertise that provide new perspectives on the information experience of the expert searcher. These new perspectives have implications for search engine design and how advanced search skills are taught. Finally, I consider how the fresh insights about the expert searcher’s experiences contribute to wider understanding about information experience.
Resumo:
Large infrastructure projects are a major responsibility of urban and regional governments, who usually lack expertise to fully specify the demanded projects. Contractors, typically experts on such projects due to experience with similar projects,advise of the needed design as well as the cost of construction in their bids. Producing the right design is costly. We model such infrastructure projects taking into account their credence goods feature and the costly design effort they require and examine the performance of commonly used contracting methods. We show that when building costs are homogeneous and public information, simultaneous bidding involving shortlisting of two contractors and contingent compensation of both contractors on design efforts outperforms sequential search. If building costs are private information of the contractors and are revealed to them after design cost is sunk,sequential search may be superior to simultaneous bidding.
Resumo:
Supervisory Control and Data Acquisition systems (SCADA) are widely used to control critical infrastructure automatically. Capturing and analyzing packet-level traffic flowing through such a network is an essential requirement for problems such as legacy network mapping and fault detection. Within the framework of captured network traffic, we present a simple modeling technique, which supports the mapping of the SCADA network topology via traffic monitoring. By characterizing atomic network components in terms of their input-output topology and the relationship between their data traffic logs, we show that these modeling primitives have good compositional behaviour, which allows complex networks to be modeled. Finally, the predictions generated by our model are found to be in good agreement with experimentally obtained traffic.
Resumo:
Health Information Exchange (HIE) is an interesting phenomenon. It is a patient centric health and/or medical information management scenario enhanced by integration of Information and Communication Technologies (ICT). While health information systems are repositioning complex system directives, in the wake of the ‘big data’ paradigm, extracting quality information is challenging. It is anticipated that in this talk, ICT enabled healthcare scenarios with big data analytics will be shared. In addition, research and development regarding big data analytics, such as current trends of using these technologies for health care services and critical research challenges when extracting quality of information to improve quality of life will be discussed.
Resumo:
“World food security … is at its lowest in half a century,” wrote Julian Cribb FTSE, a wellknown consultant in science communication and founding editor of www.sciencealert. com.au in the lead article in the 2008 ATSE Focus magazine issue entitled “Food for the world: the nation’s challenge”. Food security continues to be a key national and international concern and it is pleasing to see this issue of Focus again exploring aspects of the topic with the aim of continuing to raise awareness of issues and influencing relevant policy decisions. Statistics (or statistical science, more broadly) has been critical to the information and decision-making value chain needed to optimise agriculture and the food supply chain. The key steps are most often addressed by multidisciplinary research groups including statisticians in collaboration with life and physical scientists, agri-industry personnel and other relevant stakeholders.
Resumo:
This paper investigates how Enterprise Architecture (EA) evolves due to emerging trends. It specifically explores how EA integrates the Service-oriented Architecture (SOA). Archer’s Morphogenetic theory is used as an analytical approach to distinguish the architectural conditions under which SOA is introduced, to study the relationships between these conditions and SOA introduction, and to reflect on EA evolution (elaborations) that then take place. The paper focuses on reasons for why EA evolution could take place, or not and what architectural changes could happen due to SOA integration. The research builds on sound theoretical foundations to discuss EA evolution in a field that often lacks a solid theoretical groundwork. Specifically, it proposes that critical realism, using the morphogenetic theory, can provide a useful theoretical foundation to study enterprise architecture (EA) evolution. The initial results of a literature review (a-priori model) were extended using explorative interviews. The findings of this study are threefold. First, there are five different levels of EA-SOA integration outcomes. Second, a mature EA, flexible and well-defined EA framework and comprehensive objectives of EA improve the integration outcomes. Third, the analytical separation using Archer’s theory is helpful in order to understand how these different integration outcomes are generated.
Resumo:
Office building retrofit is a sector being highlighted in Australia because of the mature office building market characterised by a large proportion of ageing properties. The increasing number of office building retrofit projects strengthens the need for waste management. Retrofit projects possess unique characteristics in comparison to traditional demolition and new builds such as partial operation of buildings, constrained site spaces and limited access to as-build information. Waste management activities in retrofit projects can be influenced by issues that are different from traditional construction and demolition projects. However, previous research on building retrofit projects has not provided an understanding of the critical issues affecting waste management. This research identifies the critical factors which influence the management of waste in office building retrofit projects through a literature study and a questionnaire survey to industry practitioners. Statistical analysis on a range of potential waste issues reveals the critical factors, as agreed upon by survey respondents in consideration of their different professional responsibilities and work natures. The factors are grouped into five dimensions, comprising industry culture, organisational support and incentive, existing building information, design, and project delivery process. The discussions of the dimensions indicate that the waste management factors of office building retrofit projects are further intensified compared to those for general demolition and construction because retrofit projects involve existing buildings which are partially operating with constrained work space and limited building information. Recommendations for improving waste management in office building retrofit projects are generalised such as waste planning, auditing and assessment in the planning and designing stage, collaboration and coordination of various stakeholders and different specialists, optimised building surveying and BIM technologies for waste analysis, and new design strategies for waste prevention.
Resumo:
This research aims to explore and identify political risks on a large infrastructure project in an exaggerated environment to ascertain whether sufficient objective information can be gathered by project managers to utilise risk modelling techniques. During the study, the author proposes a new definition of political risk; performs a detailed project study of the Neelum Jhelum Hydroelectric Project in Pakistan; implements a probabilistic model using the principle of decomposition and Bayes probabilistic theorem and answers the question: was it possible for project managers to obtain all the relevant objective data to implement a probabilistic model?