468 resultados para Information technology usage
Resumo:
The well-known difficulties students exhibit when learning to program are often characterised as either difficulties in understanding the problem to be solved or difficulties in devising and coding a computational solution. It would therefore be helpful to understand which of these gives students the greatest trouble. Unit testing is a mainstay of large-scale software development and maintenance. A unit test suite serves not only for acceptance testing, but is also a form of requirements specification, as exemplified by agile programming methodologies in which the tests are developed before the corresponding program code. In order to better understand students’ conceptual difficulties with programming, we conducted a series of experiments in which students were required to write both unit tests and program code for non-trivial problems. Their code and tests were then assessed separately for correctness and ‘coverage’, respectively. The results allowed us to directly compare students’ abilities to characterise a computational problem, as a unit test suite, and develop a corresponding solution, as executable code. Since understanding a problem is a pre-requisite to solving it, we expected students’ unit testing skills to be a strong predictor of their ability to successfully implement the corresponding program. Instead, however, we found that students’testing abilities lag well behind their coding skills.
Resumo:
This paper describes an approach to investigate the adoption of Web 2.0 in the classroom using a mixed methods study. By using a combination of qualitative or quantitative data collection and analysis techniques, we attempt to synergize the results and provide a more valid understanding of Web 2.0 adoption for learning by both teachers and students. This approach is expected to yield a better holistic view on the adoption issues associated with the e-learning 2.0 concept in current higher education as opposed to single method studies done previously. This paper also presents some early findings of e-learning 2.0 adoption using this research method
Resumo:
The security of industrial control systems in critical infrastructure is a concern for the Australian government and other nations. There is a need to provide local Australian training and education for both control system engineers and information technology professionals. This paper proposes a postgraduate curriculum of four courses to provide knowledge and skills to protect critical infrastructure industrial control systems. Our curriculum is unique in that it provides security awareness but also the advanced skills required for security specialists in this area. We are aware that in the Australian context there is a cultural gap between the thinking of control system engineers who are responsible for maintaining and designing critical infrastructure and information technology professionals who are responsible for protecting these systems from cyber attacks. Our curriculum aims to bridge this gap by providing theoretical and practical exercises that will raise the awareness and preparedness of both groups of professionals.
Resumo:
The Australian Business Assessment of Computer User Security (ABACUS) survey is a nationwide assessment of the prevalence and nature of computer security incidents experienced by Australian businesses. This report presents the findings of the survey which may be used by businesses in Australia to assess the effectiveness of their information technology security measures.
Resumo:
Background: Cardiac patients with diabetes are at higher readmission rates (22%) compared to only 6% for those patients without diabetes. Evidence shows benefits of peer support and using information technology to improve chronic illness and achieve better health outcomes. However limited evidence suggests that cardiac or diabetes self-management programs incorporating peer supporters (patients with similar conditions) or telephone and text-messaging, have improved health outcomes and reduce health care utilisations. A multidisciplinary research team approach is crucial to accommodate the complex aspects of delivering intervention programs for these at-risk patients. However, challenges such as the inconsistency in significance of key concepts across research fields, as well as practical and operational issues within different contexts are often experienced. Aims: To develop an effective multidisciplinary team approach to deliver a peer support based cardiac-diabetes self-management program incorporating the preparation of lay personnel to provide telephone and text-messaging follow up support. Methods: The approach was used for a multidisciplinary project using randomised controlled trial. Results: The findings from multidisciplinary team approach reveal the feasibility of a Peer support based cardiac-diabetes self-management program.
Resumo:
Purpose - Researchers debate whether tacit knowledge sharing through Information Technology (IT) is actually possible. However, with the advent of social web tools, it has been argued that most shortcomings of tacit knowledge sharing are likely to disappear. This paper has two purposes: firstly, to demonstrate the existing debates in the literature regarding tacit knowledge sharing using IT, and secondly, to identify key research gaps that lay the foundations for future research into tacit knowledge sharing using social web. Design/methodology/approach - This paper reviews current literature on IT-mediated tacit knowledge sharing and opens a discussion on tacit knowledge sharing through the use of social web. Findings - First, the existing schools of thoughts in regards to IT ability for tacit knowledge sharing are introduced. Next, difficulties of sharing tacit knowledge through the use of IT are discussed. Then, potentials and pitfalls of social web tools are presented. Finally, the paper concludes that whilst there are significant theoretical arguments supporting that the social web facilitates tacit knowledge sharing there is a lack of empirical evidence to support these arguments and further work is required. Research limitations/implications - The limitations of the review includes: covering only papers that were published in English, issues of access to full texts of some resources, possibility of missing some resources due to search strings used or limited coverage of databases searched. Originality/value - The paper contributes to the fast growing literature on the intersection of KM and IT particularly by focusing on tacit knowledge sharing in social media space. The paper highlights the need for further studies in this area by discussing the current situation in the literature and disclosing the emerging questions and gaps for future studies.
Resumo:
Intellectual property is crucial to the promotion of innovation. It provides an incentive to innovate as well as security for investment in innovation. The industries of the 21st century-information technology, biotechnology, pharmaceuticals, communications, education and entertainment – are all knowledge-based. The WTO Agreement on Trade-Related Aspects of Intellectual Property Rights (the TRIPS Agreement), adopted in 1994 at the conclusion of the Uruguay Round of trade negotiations, requires all WTO member countries to provide for the protection and enforcement of intellectual property rights. Having forged a link for the first time between intellectual property rights and the international trading system, the adoption of TRIPS means that any country that aims to participate fully in the global economy needs to understand the role of intellectual property and align its intellectual property laws and practices with the international minimum standards prescribed by TRIPS. However, for developing and least-developed countries, the implementation of intellectual property systems and enforcement mechanisms raises questions and challenges. Does recognition and enforcement of intellectual property serve their development needs and objectives? Does TRIPS encourage or hinder the transfer of technologies to developing and least-developed countries, particularly those that meet urgent needs in areas such as public health, food security, water and energy? What is the effect of TRIPS on developing countries’ access to knowledge and information? Is there scope for flexibility in implementation of TRIPS in pursuit of development strategies?
Resumo:
In recent years, enterprise architecture (EA) has captured increasing interest as a means to systematically consolidate and manage various enterprise artefacts in order to provide holistic decision support for business/IT alignment and business/IT landscapes management. To provide a holistic perspective on the enterprise over time, EA frameworks need to co-evolve with the changes in the enterprise and its IT over time. In this paper we focus on the emergence of Service-Oriented Architecture (SOA). There is a need to integrate SOA with EA to keep EA relevant and to use EA products to help drive successful SOA. This paper investigates and compares the integration of SOA elements in five widely used EA frameworks: Archimate, The Open Group Architecture Framework (TOGAF), Federal Enterprise Architecture Framework (FEAF), Department of Defence Architecture Framework (DoDAF) and the Ministry of Defence Architecture Framework (MODAF). It identifies what SOA elements are considered and their relative position in the overall structure. The results show that services and related elements are far from being well-integrated constructs in current EA frameworks and that the different EA frameworks integrated SOA elements in substantially different ways. Our results can support the academic EA and SOA communities with a closer and more consistent integration of EA and SOA and support practitioners in identifying an EA framework that provides the SOA support that matches their requirements.
Resumo:
Robotics is a valuable tool for engaging students in the hands-on application of science, technology, engineering, and mathematics (STEM) concepts. Robotics competitions such as FIRST LEGO League (FLL) can increase students’ interest in the STEM subjects and can foster their problem solving and teamwork skills. This paper reports on a study investigating students’ perceptions on the influence of participating in a FLL competition on their learning. The students completed questionnaires regarding their perceptions of their learning during the FLL challenge and were also interviewed to gain a deeper understanding of their questionnaire responses. The results show that the students were engaged with the FLL challenge and held positive views regarding their experience. The results also suggest that students involved with the FLL challenge improved their learning about real-world applications, problem solving, engagement, communication, and the application of the technology/engineering cycle.
Resumo:
For any discipline to be regarded as a professional undertaking by which its members may be treated as true “professionals” in a specific area, practitioners must clearly understand that discipline’s history as well as the place and significance of that history in current practice as well as its relevance to available technologies and artefacts at the time. This is common for many professional disciplines such as medicine, pharmacy, engineering, law and so on but not yet, this paper submits, in information technology. Based on twenty five elapsed years of experience in developing and delivering Cybersecurity courses at undergraduate and postgraduate levels, this paper proposes a rationale and set of differing perspectives for the planning and development of curricula relevant to the delivery of appropriate courses in the history of cybersecurity or information assurance to information and communications technology (ICT) students and thus to potential information technology professionals.
Resumo:
1. Autonomous acoustic recorders are widely available and can provide a highly efficient method of species monitoring, especially when coupled with software to automate data processing. However, the adoption of these techniques is restricted by a lack of direct comparisons with existing manual field surveys. 2. We assessed the performance of autonomous methods by comparing manual and automated examination of acoustic recordings with a field-listening survey, using commercially available autonomous recorders and custom call detection and classification software. We compared the detection capability, time requirements, areal coverage and weather condition bias of these three methods using an established call monitoring programme for a nocturnal bird, the little spotted kiwi(Apteryx owenii). 3. The autonomous recorder methods had very high precision (>98%) and required <3% of the time needed for the field survey. They were less sensitive, with visual spectrogram inspection recovering 80% of the total calls detected and automated call detection 40%, although this recall increased with signal strength. The areal coverage of the spectrogram inspection and automatic detection methods were 85% and 42% of the field survey. The methods using autonomous recorders were more adversely affected by wind and did not show a positive association between ground moisture and call rates that was apparent from the field counts. However, all methods produced the same results for the most important conservation information from the survey: the annual change in calling activity. 4. Autonomous monitoring techniques incur different biases to manual surveys and so can yield different ecological conclusions if sampling is not adjusted accordingly. Nevertheless, the sensitivity, robustness and high accuracy of automated acoustic methods demonstrate that they offer a suitable and extremely efficient alternative to field observer point counts for species monitoring.
Resumo:
This paper describes the content and delivery of a software internationalisation subject (ITN677) that was developed for Master of Information Technology (MIT) students in the Faculty of Information Technology at Queensland University of Technology. This elective subject introduces students to the strategies, technologies, techniques and current development associated with this growing 'software development for the world' specialty area. Students learn what is involved in planning and managing a software internationalisation project as well as designing, building and using a software internationalisation application. Students also learn about how a software internationalisation project must fit into an over-all product localisation and globalisation that may include culturalisation, tailored system architectures, and reliance upon industry standards. In addition, students are exposed to the different software development techniques used by organizations in this arena and the perils and pitfalls of managing software internationalisation projects.
Resumo:
Business transformations are complex organisational change endeavours that result in a business performing current work differently, or performing different work. Information Technology (IT) is a key enabler of such initiatives, but comes with its challenges, as revamping the IT infrastructure in large-scale organisations implies high complexity, high risk, and often high failure rates. We view business transformations as a collection of management services that are demanded and enacted at a program level, defined as abstract resources that provide the managerial capabilities necessary for business transformations. In this research-in-progress, we explore what triggers the need for management services in response to the challenges in business transformation management. We analyse data from two exploratory case studies using the critical incident technique as our qualitative analysis method. Early findings indicate that management service triggers reside on either the strategic level, which may be internally or externally driven, or at the program management level, which may be situational, influential or reactional. We detail implications for our on-going research.
Resumo:
The contemporary working environment is being rapidly reshaped by technological, industrial and political forces. Increased global competitiveness and an emphasis on productivity have led to the appearance of alternative methods of employment, such as part-time, casual and itinerant work, allowing greater flexibility. This allows for the development of a core permanent staff and the simultaneous utilisation of casual staff according to business needs. Flexible workers across industries are generally referred to as the non-standard workforce and full-time permanent workers as the standard workforce. Even though labour flexibility favours the employer, increased opportunity for flexible work has been embraced by women for many reasons, including the gender struggle for greater economic independence and social equality. Consequently, the largely female nursing industry, both nationally and internationally, has been caught up in this wave of change. This ageing workforce has been at the forefront of the push for flexibility with recent figures showing almost half the nursing workforce is employed in non-standard capacity. In part, this has allowed women to fulfil caring roles outside their work, to ease off nearing retirement and to supplement the family income. More significantly, however, flexibility has developed as an economic management initiative, as a strategy for cost constraint. The result has been the development of a dual workforce and as suggested by Pocock, Buchanan and Campbell (2004), associated deep-seated resentment and the marginalisation of part-time and casual workers by their full-time colleagues and managers. Additionally, as nursing currently faces serious recruitment and retention problems there is urgent need to understand the factors which are underlying present discontent in the nursing profession. There is an identified gap in nursing knowledge surrounding the issues relating to recruitment and retention. Communication involves speaking, listening, reading and writing and is an interactive process which is central to the lives of humans. Workplace communication refers to human interaction, information technology, and multimedia and print. It is the means to relationship building between workers, management, and their external environment and is critical to organisational effectiveness. Communication and language are integral to nursing performance (Hall, 2005), in twenty-four hour service however increasing fragmentation due to part-time and casual work in the nursing industry means that effective communication management has become increasingly difficult. More broadly it is known that disruption to communication systems impacts negatively on consumer outcomes. Because of this gap in understanding how nurses view their contemporary nursing world, an interpretative ethnographic study which progressed to a critical ethnographic study, based on the conceptual framework of constructionism and interpretativism was used. The study site was a division within an acute health care facility, and the relationship between increasing casualisation of the nursing workforce and the experiences of communication of standard and non-standard nurses was explored. For this study, full-time standard nurses were those employed to work in a specific unit for forty hours per week. Non-standard nurses were those employed part-time in specific units or those nurses employed to work as relief pool nurses for shift short falls where needed. Nurses employed by external agencies, but required to fill in for shifts at the facility were excluded from this research. This study involved an analysis of observational, interview and focus group data of standard and non-standard nurses within this facility. Three analytical findings - the organisation of nursing work; constructing the casual nurse as other; and the function of space, situate communication within a broader discussion about non-standard work and organisational culture. The study results suggest that a significant culture of marginalisation exists for nurses who work in a non-standard capacity and that this affects communication for nurses and has implications for the quality of patient care. The discussion draws on the seven elements of marginalisation described by Hall, Stephen and Melius (1994). The arguments propose that these elements underpin a culture which supports remnants of the historically gendered stereotype "the good nurse" and these cultural values contribute to practices and behaviour which marginalise all nurses, particularly those who work less than full-time. Gender inequality is argued to be at the heart of marginalising practices because of long standing subordination of nurses by the powerful medical profession, paralleling historical subordination of women in society. This has denied nurses adequate representation and voice in decision making. The new knowledge emanating from this study extends current knowledge of factors surrounding recruitment and retention and as such contributes to an understanding of the current and complex nursing environment.
Resumo:
One remaining difficulty in the Information Technology (IT) business value evaluation domain is the direct linkage between IT value and the underlying determinants of IT value or surrogates of IT value. This paper proposes a research that examines the interacting effects of the determinants of IT value, and their influences on IT value. The overarching research question is how those determinants interact with each other and affect the IT value at organizational value. To achieve this, this research embraces a multilevel, complex, and adaptive system view, where the IT value emerges from the interacting of underlying determinants. This research is theoretically grounded on three organizational theories – multilevel theory, complex adaptive systems theory, and adaptive structuration theory. By integrating those theoretical paradigms, this research proposes a conceptual model that focuses on the process where IT value is created from interactions of those determinants. To answer the research question, agent-based modeling technique is used in this research to build a computational representation based on the conceptual model. Computational experimentation will be conducted based on the computational representation. Validation procedures will be applied to consolidate the validity of this model. In the end, hypotheses will be tested using computational experimentation data.