607 resultados para Web-Access
Resumo:
Researchers are increasingly involved in data-intensive research projects that cut across geographic and disciplinary borders. Quality research now often involves virtual communities of researchers participating in large-scale web-based collaborations, opening their earlystage research to the research community in order to encourage broader participation and accelerate discoveries. The result of such large-scale collaborations has been the production of ever-increasing amounts of data. In short, we are in the midst of a data deluge. Accompanying these developments has been a growing recognition that if the benefits of enhanced access to research are to be realised, it will be necessary to develop the systems and services that enable data to be managed and secured. It has also become apparent that to achieve seamless access to data it is necessary not only to adopt appropriate technical standards, practices and architecture, but also to develop legal frameworks that facilitate access to and use of research data. This chapter provides an overview of the current research landscape in Australia as it relates to the collection, management and sharing of research data. The chapter then explains the Australian legal regimes relevant to data, including copyright, patent, privacy, confidentiality and contract law. Finally, this chapter proposes the infrastructure elements that are required for the proper management of legal interests, ownership rights and rights to access and use data collected or generated by research projects.
Resumo:
Mobile phones are now powerful and pervasive making them ideal information browsers. The Internet has revolutionized our lives and is a major knowledge sharing media. However, many mobile phone users cannot access the Internet (for financial or technical reasons) and so the mobile Internet has not been fully realized. We propose a novel content delivery network based on both a factual and speculative analysis of today’s technology and analyze its feasibility. If adopted people living in remote regions without Internet will be able to access essential (static) information with periodic updates.
Resumo:
Nowadays, everyone can effortlessly access a range of information on the World Wide Web (WWW). As information resources on the web continue to grow tremendously, it becomes progressively more difficult to meet high expectations of users and find relevant information. Although existing search engine technologies can find valuable information, however, they suffer from the problems of information overload and information mismatch. This paper presents a hybrid Web Information Retrieval approach allowing personalised search using ontology, user profile and collaborative filtering. This approach finds the context of user query with least user’s involvement, using ontology. Simultaneously, this approach uses time-based automatic user profile updating with user’s changing behaviour. Subsequently, this approach uses recommendations from similar users using collaborative filtering technique. The proposed method is evaluated with the FIRE 2010 dataset and manually generated dataset. Empirical analysis reveals that Precision, Recall and F-Score of most of the queries for many users are improved with proposed method.
Resumo:
Security and privacy in electronic health record systems have been hindering the growth of e-health systems since their emergence. The development of policies that satisfy the security and privacy requirements of different stakeholders in healthcare has proven to be difficult. But, these requirements have to be met if the systems developed are to succeed in achieving their intended goals. Access control is a fundamental security barrier for securing data in healthcare information systems. In this paper we present an access control model for electronic health records. We address patient privacy requirements, confidentiality of private information and the need for flexible access for health professionals for electronic health records. We carefully combine three existing access control models and present a novel access control model for EHRs which satisfies requirements of electronic health records.
Resumo:
When used as floor joists, the new mono-symmetric LiteSteel beam (LSB) sections require web openings to provide access for inspections and various services. The LSBs consist of two rectangular hollow flanges connected by a slender web, and are subjected to lateral distortional buckling effects in the intermediate span range. Their member capacity design formulae developed to date are based on their elastic lateral buckling moments, and only limited research has been undertaken to predict the elastic lateral buckling moments of LSBs with web openings. This paper addresses this research gap by reporting the development of web opening modelling techniques based on an equivalent reduced web thickness concept and a numerical method for predicting the elastic buckling moments of LSBs with circular web openings. The proposed numerical method was based on a formulation of the total potential energy of LSBs with circular web openings. The accuracy of the proposed method’s use with the aforementioned modelling techniques was verified through comparison of its results with those of finite strip and finite element analyses of various LSBs.
Resumo:
Recently developed cold-formed LiteSteel beam (LSB) sections have found increasing popularity in residential, industrial and commercial buildings due to their light weight and cost-effectiveness. Another beneficial characteristic is that they allow torsionally rigid rectangular flanges to be combined with economical fabrication processes. Currently, there is significant interest in the use of LSB sections as flexural members in floor joist systems. When used as floor joists, these sections require openings in the web to provide access for inspection and other services. At present, however, there is no design method available that provides accurate predictions of the moment capacities of LSBs with web openings. This paper presents the results of an investigation of the buckling and ultimate strength behaviour of LSB flexural members with web openings. A detailed fine element analysis (FEA)-based parametric study was conducted with the aim of developing appropriate design rules and making recommendations for the safe design of LSB floor joists. The results include the required moment capacity curves for LSB sections with a range of web opening combinations and spans and the development of appropriate design rules for the prediction of the ultimate moment capacities of LSBs with web openings.
Resumo:
The LiteSteel Beam (LSB) is an innovative cold-formed steel hollow flange section. When used as floor joists, the LSB sections require holes in the web to provide access for various services. In this study a detailed investigation was undertaken into the elastic lateral distortional buckling behaviour of LSBs with circular web openings subjected to a uniform moment using finite element analysis. Validated ideal finite element models were used first to study the effect of web holes on their elastic lateral distortional buckling behaviour. An equivalent web thickness method was then proposed using four different equations for the elastic buckling analyses of LSBs with web holes. It was found that two of them could be successfully used with approximate numerical models based on solid web elements with an equivalent reduced thickness to predict the elastic lateral distortional buckling moments.
Resumo:
Background The increasing popularity and use of the internet makes it an attractive option for providing health information and treatment, including alcohol/other drug use. There is limited research examining how people identify and access information about alcohol or other drug (AOD) use online, or how they assess the usefulness of the information presented. This study examined the strategies that individuals used to identify and navigate a range of AOD websites, along with the attitudes concerning presentation and content. Methods Members of the general community in Brisbane and Roma (Queensland, Australia) were invited to participate in a 30-minute search of the internet for sites related to AOD use, followed by a focus group discussion. Fifty one subjects participated in the study across nine focus groups. Results Participants spent a maximum of 6.5 minutes on any one website, and less if the user was under 25 years of age. Time spent was as little as 2 minutes if the website was not the first accessed. Participants recommended that AOD-related websites should have an engaging home or index page, which quickly and accurately portrayed the site’s objectives, and provided clear site navigation options. Website content should clearly match the title and description of the site that is used by internet search engines. Participants supported the development of a portal for AOD websites, suggesting that it would greatly facilitate access and navigation. Treatment programs delivered online were initially viewed with caution. This appeared to be due to limited understanding of what constituted online treatment, including its potential efficacy. Conclusions A range of recommendations arise from this study regarding the design and development of websites, particularly those related to AOD use. These include prudent use of text and information on any one webpage, the use of graphics and colours, and clear, uncluttered navigation options. Implications for future website development are discussed.
Resumo:
Background: It is imperative to understand how to engage young women in research about issues that are important to them. There is limited reliable data on how young women access contraception in Australia especially in rural areas where services may be less available. Objective: This paper identifies the challenges involved in engaging young Australian women aged 18-23 years to participate in a web-based survey on contraception and pregnancy and ensure their ongoing commitment to follow-up web-based surveys. Methods: A group of young women, aged 18-23 years and living in urban and rural New South Wales, Australia, were recruited to participate in face-to-face discussions using several methods of recruitment: direct contact (face-to-face, telephone or email)and snowball sampling by potential participants inviting their friends. All discussions were transcribed verbatim and analyzed using thematic analysis. Results: Twenty young women participated (urban, n=10: mean age 21.6 years; rural, n=10: 20.0 years) and all used computers or smart phones to access the internet on a daily basis. All participants were concerned about the cost of internet access and utilized free access to social media on their mobile phones. Their willingness to participate in a web-based survey was dependent on incentives with a preference for small financial rewards. Most participants were concerned about their personal details and survey responses remaining confidential and secure. The most appropriate survey would take up to 15 minutes to complete, be a mix of short and long questions and eye-catching with bright colours. Questions on the sensitive topics of sexual activity, contraception and pregnancy were acceptable if they could respond with “I prefer not to answer”. Conclusions: There are demographic, participation and survey design challenges in engaging young women in a web-based survey. Based on our findings, future research efforts are needed to understand the full extent of the role social media and incentives play in the decision of young women to participate in web-based research.
Resumo:
A Flash Event (FE) represents a period of time when a web-server experiences a dramatic increase in incoming traffic, either following a newsworthy event that has prompted users to locate and access it, or as a result of redirection from other popular web or social media sites. This usually leads to network congestion and Quality-of-Service (QoS) degradation. These events can be mistaken for Distributed Denial-of-Service (DDoS) attacks aimed at disrupting the server. Accurate detection of FEs and their distinction from DDoS attacks is important, since different actions need to be undertaken by network administrators in these two cases. However, lack of public domain FE datasets hinders research in this area. In this paper we present a detailed study of flash events and classify them into three broad categories. In addition, the paper describes FEs in terms of three key components: the volume of incoming traffic, the related source IP-addresses, and the resources being accessed. We present such a FE model with minimal parameters and use publicly available datasets to analyse and validate our proposed model. The model can be used to generate different types of FE traffic, closely approximating real-world scenarios, in order to facilitate research into distinguishing FEs from DDoS attacks.
Resumo:
Internet technologies have fundamentally changed the way we obtain access to legal documents and information about the law. However, for judgments of courts and tribunals, copyright management and licensing practices have not kept pace with the digital and online technologies which are now ubiquitous in the web 2.0 era. Under the provisions of the Copyright Act 1968 and the licensing statements on the Australian courts’ websites, judgments may generally be read online, downloaded, reproduced and printed out for personal, non-commercial use or ”in house” use by an organisation. However, beyond these permitted acts, the extent to which judgments can be copied and distributed in digital form online remains unclear. Open content licences (in particular, the Creative Commons (CC) licences) offer an effective mechanism for managing copyright in judgments in a manner that supports their wide public dissemination and reuse while also protecting their integrity and accuracy.
Strategies for gaining and maintaining academic support for the institutional open access repository
Resumo:
The impact of research can be measured by use or citation count. The more widely available that research outputs are; the more likely they are to be used, and the higher the impact. Making the author-manuscript version of research outputs freely available via the institutional repository greatly increases the availability of research outputs and can increase the impact. QUT ePrints, the open access institutional repository of research outputs at Queensland University of Technology (QUT), Australia, was established in 2003 and is managed by the QUT Library. The repository now contains over 39,000 records. More than 21,000 of these records have full-text copies attached as result of continuous effort to maintain momentum and encourage academic engagement. The full-text deposit rate has continued to increase over time and, in 2012 (August, at the time of writing), 88% of the records for works published in 2012 provide access to a full-text copy. Achieving success has required a long term approach to collaboration, open access advocacy, repository promotion, support for the deposit process, and ongoing system development. This paper discusses the various approaches adopted by QUT Library, in collaboration with other areas of the University, to achieve success. Approaches include mainstreaming the repository via having it report to the University Research and Innovation Committee; regular provision of deposit rate data to faculties; championing key academic supporters; and holding promotional competitions and events such as during Open Access Week. Support and training is provided via regular deposit workshops with academics and faculty research support groups and via the provision of online self-help information. Recent system developments have included the integration of citation data (from Scopus and Web of Science) and the development of a statistical reporting system which incentivise engagement.
Resumo:
Purpose - Researchers debate whether tacit knowledge sharing through Information Technology (IT) is actually possible. However, with the advent of social web tools, it has been argued that most shortcomings of tacit knowledge sharing are likely to disappear. This paper has two purposes: firstly, to demonstrate the existing debates in the literature regarding tacit knowledge sharing using IT, and secondly, to identify key research gaps that lay the foundations for future research into tacit knowledge sharing using social web. Design/methodology/approach - This paper reviews current literature on IT-mediated tacit knowledge sharing and opens a discussion on tacit knowledge sharing through the use of social web. Findings - First, the existing schools of thoughts in regards to IT ability for tacit knowledge sharing are introduced. Next, difficulties of sharing tacit knowledge through the use of IT are discussed. Then, potentials and pitfalls of social web tools are presented. Finally, the paper concludes that whilst there are significant theoretical arguments supporting that the social web facilitates tacit knowledge sharing there is a lack of empirical evidence to support these arguments and further work is required. Research limitations/implications - The limitations of the review includes: covering only papers that were published in English, issues of access to full texts of some resources, possibility of missing some resources due to search strings used or limited coverage of databases searched. Originality/value - The paper contributes to the fast growing literature on the intersection of KM and IT particularly by focusing on tacit knowledge sharing in social media space. The paper highlights the need for further studies in this area by discussing the current situation in the literature and disclosing the emerging questions and gaps for future studies.
Resumo:
Introduction: Participants may respond to phases of a workplace walking program at different rates. This study evaluated the factors that contribute to the number of steps through phases of the program. The intervention was automated through a web-based program designed to increase workday walking. Methods: The study reviewed independent variable influences throughout phases I–III. A convenience sample of university workers (n=56; 43.6±1.7 years; BMI 27.44±.2.15 kg/m2; 48 female) were recruited at worksites in Australia. These workers were given a pedometer (Yamax SW 200) and access to the website program. For analyses, step counts entered by workers into the website were downloaded and mean workday steps were compared using a seemingly unrelated regression. This model was employed to capture the contemporaneous correlation within individuals in the study across observed time periods. Results: The model predicts that the 36 subjects with complete information took an average 7460 steps in the baseline two week period. After phase I, statistically significance increases in steps (from baseline) were explained by age, working status (full or part time), occupation (academic or professional), and self reported public transport (PT) use (marginally significant). Full time workers walked more than part time workers by about 440 steps, professionals walked about 300 steps more than academics, and PT users walked about 400 steps more than non-PT users. The ability to differentiate steps after two weeks among participants suggests a differential affect of the program after only two weeks. On average participants increased steps from week two to four by about 525 steps, but regular auto users had nearly 750 steps less than non-auto users at week four. The effect of age was diminished in the 4th week of observation and accounted for 34 steps per year of age. In phase III, discriminating between participants became more difficult, with only age effects differentiating their increase over baseline. The marginal effect of age by phase III compared to phase I, increased from 36 to 50, suggesting a 14 step per year increase from the 2nd to 6th week. Discussion: The findings suggest that participants responded to the program at different rates, with uniformity of effect achieved by the 6th week. Participants increased steps, however a tapering off occurred over time. Age played the most consistent role in predicting steps over the program. PT use was associated with increased step counts, while Auto use was associated with decreased step counts.
Resumo:
Information privacy is a critical success/failure factor in information technology supported healthcare (eHealth). eHealth systems utilise electronic health records (EHR) as the main source of information, thus, implementing appropriate privacy preserving methods for EHRs is vital for the proliferation of eHealth. Whilst information privacy may be a fundamental requirement for eHealth consumers, healthcare professionals demand non-restricted access to patient information for improved healthcare delivery, thus, creating an environment where stakeholder requirements are contradictory. Therefore, there is a need to achieve an appropriate balance of requirements in order to build successful eHealth systems. Towards achieving this balance, a new genre of eHealth systems called Accountable-eHealth (AeH) systems has been proposed. In this paper, an access control model for EHRs is presented that can be utilised by AeH systems to create information usage policies that fulfil both stakeholders’ requirements. These policies are used to accomplish the aforementioned balance of requirements creating a satisfactory eHealth environment for all stakeholders. The access control model is validated using a Web based prototype as a proof of concept.