716 resultados para IT capabilities


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Privacy issues have hindered the evolution of e-health since its emergence. Patients demand better solutions for the protection of private information. Health professionals demand open access to patient health records. Existing e-health systems find it difficult to fulfill these competing requirements. In this paper, we present an information accountability framework (IAF) for e-health systems. The IAF is intended to address privacy issues and their competing concerns related to e-health. Capabilities of the IAF adhere to information accountability principles and e-health requirements. Policy representation and policy reasoning are key capabilities introduced in the IAF. We investigate how these capabilities are feasible using Semantic Web technologies. We discuss with the use of a case scenario, how we can represent the different types of policies in the IAF using the Open Digital Rights Language (ODRL).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A history and introduction to civil unmanned aircraft systems in Australia. Discussion is provided on some of the current challenges facing the civil UAS sector and the research being undertaken to address these challenges.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The next-generation of service-oriented architecture (SOA) needs to scale for flexible service consumption, beyond organizational and application boundaries, into communities, ecosystems and business networks. In wider and, ultimately, global settings, new capabilities are needed so that business partners can efficiently and reliably enable, adapt and expose services. Those services can then be discovered, ordered, consumed, metered and paid for, through new applications and opportunities, driven by third-parties in the global “village”. This trend is already underway, in different ways, through different early adopter market segments. This paper proposes an architectural strategy for the provisioning and delivery of services in communities, ecosystems and business networks – a Service Delivery Framework (SDF). The SDF is intended to support multiple industries and deployments where a SOA platform is needed for collaborating partners and diverse consumers. Specifically, it is envisaged that the SDF allows providers to publish their services into network directories so that they can be repurposed, traded and consumed, and leveraging network utilities like B2B gateways and cloud hosting. To support these different facets of service delivery, the SDF extends the conventional service provider, service broker and service consumer of the Web Services Architecture to include service gateway, service hoster, service aggregator and service channel maker.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Web Service Business Process Execution Language (BPEL) lacks any standard graphical notation. Various efforts have been undertaken to visualize BPEL using the Business Process Modelling Notation (BPMN). Although this is straightforward for the majority of concepts, it is tricky for the full BPEL standard, partly due to the insufficiently specified BPMN execution semantics. The upcoming BPMN 2.0 revision will provide this clear semantics. In this paper, we show how the dead path elimination (DPE) capabilities of BPEL can be expressed with this new semantics and discuss the limitations. We provide a generic formal definition of DPE and discuss resulting control flow requirements independent of specific process description languages.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Reports of increasing numbers of obese Australian children and adolescents have raised the alarm to be proactive in reducing this so called epidemic. It has evoked a call for greater emphasis on teaching physical education in schools, as a measure for attaining fitness not only with obese students but for all students. This paper emphasises how preservice teachers need to be a key target for implementing physical education (PE) reform in schools, as many primary teachers will be generalists and may not be confident enough to implement PE effectively. Through a review of existing literature, teaching practices essential for the effective promotion and implementation of PE were identified under six broad categories: personal-professional skills development, addressing system requirements, pedagogical practices, managing student behaviour, providing feedback to students, and reflecting on practice. Subsequently, the development of these practices in preservice teachers is considered in the context of a university-school collaboration where preservice teachers taught physical education to primary school students for one day per week over a four week period. These authentic teaching experiences provided the preservice teachers with vital opportunities to put theory into practice and interact with “real-world” students. Self-evaluative data from 38 of these preservice teachers, in the form of a five-part Likert scale survey and extended response survey, demonstrated that they were able to develop the majority of the essential teaching practices identified by literature. In particular, the preservice teachers developed self efficacy, enthusiasm, and motivation for teaching PE, facets which are often found to be lacking in generalist primary teachers and yet are essential if children’s perceptions and habits regarding physical activity are to be changed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Observational seatbelt wearing studies are a valuable tool for obtaining up-to-date information about rates of use. Given that one quarter of vehicle occupants killed on Queensland roads in recent years were not wearing seatbelts, it is important that authorities are able to identify non-wearers and take steps to increase compliance with seatbelt laws to reduce the severity of crashes and, therefore, the road toll. An observational study of seatbelt use was conducted in metropolitan, regional and rural locations throughout Queensland in May and June, 2010. Trained observers took note of seatbelt use of all occupants of passenger vehicles, noting their gender, approximate age group, seating position, vehicle type, licence type (i.e. visible L or P plates), mobile phone use, and the date, time and location of the observation. Of 19,579 observations, 99.04% (19,391) of occupants were observed wearing seatbelts, as only 0.96% of occupants (188) were not wearing a seatbelt. There were differences in seatbelt wearing rates for a number of study variables, although most were very small. However, seatbelt wearing rates were 3.84% lower for drivers observed using a mobile phone than for those who were not. While compliance with seatbelt laws seems to be very high, it is still concerning that so few non-wearers represent a disproportionately large proportion of road fatalities and serious injuries in Queensland. Road safety authorities must therefore continue to find ways to improve seatbelt use, as small gains in wearing rates will translate into significant fatality reductions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Airports represent the epitome of complex systems with multiple stakeholders, multiple jurisdictions and complex interactions between many actors. The large number of existing models that capture different aspects of the airport are a testament to this. However, these existing models do not consider in a systematic sense modelling requirements nor how stakeholders such as airport operators or airlines would make use of these models. This can detrimentally impact on the verification and validation of models and makes the development of extensible and reusable modelling tools difficult. This paper develops from the Concept of Operations (CONOPS) framework a methodology to help structure the review and development of modelling capabilities and usage scenarios. The method is applied to the review of existing airport terminal passenger models. It is found that existing models can be broadly categorised according to four usage scenarios: capacity planning, operational planning and design, security policy and planning, and airport performance review. The models, the performance metrics that they evaluate and their usage scenarios are discussed. It is found that capacity and operational planning models predominantly focus on performance metrics such as waiting time, service time and congestion whereas performance review models attempt to link those to passenger satisfaction outcomes. Security policy models on the other hand focus on probabilistic risk assessment. However, there is an emerging focus on the need to be able to capture trade-offs between multiple criteria such as security and processing time. Based on the CONOPS framework and literature findings, guidance is provided for the development of future airport terminal models.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a program’s object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or program’s security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tool’s capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this wall-mounted sculpture, speakers are mounted into a shelf-like object finished with timber veneer. The speakers play a corny groove stock music soundtrack. On top of the shelf sits a digital photographic image approximating a fireplace floating against a colour-gradient background. This work examines how we construct, represent and deploy notions of nature in our contemporary lives. It mixes the languages of furniture design, landscape photography, digital graphics and sculpture. Drawing on Zygmunt Bauman’s theoretical work on “liquid modernity”, this work questions how and where we find space for contemplation and reflection in a contemporary context increasingly defined by temporary social bonds and consumer choices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Understanding information technology’s (ITs) contribution to business value is an imperative issue, and while we have attempted to untangle the relationship between IT and business value with some success, our knowledge of specific factors leading to ITs contribution to business value still remains limited. In this paper we propose that complementing IT resources, by establishing a sound IT platform with capable organisational resources may aid in ITs ability to contribute to business value. We suggest that performance measurement of this contribution be undertaken at the business process level first, and then mapped through to firm level performance measurement to obtain a better understanding of the path of IT business value contribution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information Technology (IT) is an important resource that facilitates growth and development in both the developed and emerging economies. The increasing forces of globalization are creating a wider digital divide between the developed and emerging economies. The smaller emerging economies are the most venerable. Intense competition for IT resources means that these emerging economies would need to acquire a deeper understanding of how to source and evaluate their IT-related efforts. This effort would put these economies in a better position to source funding from various stakeholders. This research presents a complementary approach to securing better IT-related business value in organizations in the South Pacific Island countries – a case of emerging economies. Analysis of data collected from six South Pacific Island countries suggests that organizations that invest in IT and related complementaries are able to better their business processes. The data also suggest that improved business processes lead to overall business processes improvements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

IT Governance (ITG) adoption remains a relevant topic of study. While extensive research has been done looking into the drivers and critical success factors of ITG practice, there seems to be a lack of interest in identifying the barriers to its adoption. This study reports on a survey conducted to first: provide some primary data that suggest ITG adoption and maturity levels are still low, especially in a developing country like Malaysia; and second: to provide initial empirical support for model development. Results obtained supported our assumptions that: (1) ITG adoption and maturity levels are still relatively low in Malaysia, therefore justifying Malaysia as a suitable case; (2) organizational factors, environmental factors and characteristics of the innovation as identified from the literature may serve as possible barriers to adoption.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A whole tradition is said to be based on the hierarchical distinction between the perceptual and conceptual. In art, Niklas Luhmann argues, this schism is played out and repeated in conceptual art. This paper complicates this depiction by examining Ian Burn's last writings in which I argue the artist-writer reviews the challenge of minimal-conceptual art in terms of its perceptual pre-occupations. Burn revisits his own work and the legacy of minimal-conceptual by moving away from the kind of ideology critique he is best known for internationally in order to reassert the long overlooked visual-perceptual preoccupations of the conceptual in art.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most existing requirements engineering approaches focus on the modelling and specification of the IT artefacts ignoring the environment where the application is deployed. Although some requirements engineering approaches consider the stakeholder’s goals, they still focus on the IT artefacts’ specification. However, IT artefacts are embedded in a dynamic organisational environment and their design and specification cannot be separated from the environment’s constant evolution. Therefore, during the initial stages of a requirements engineering process it is advantageous to consider the integration of IT design with organisational design. We proposed the ADMITO (Analysis, Design and Management of IT and Organisations) approach to represent the dynamic relations between social and material entities, where the latter are divided into technological and organisational entities. In this paper we show how by using ADMITO in a concrete case, the Queensland Health Payroll (QHP) case, it is possible to have an integrated representation of IT and organisational design supporting organisational change and IT requirements specification.