312 resultados para HIGH LEVEL CLASSIFICATION


Relevância:

90.00% 90.00%

Publicador:

Resumo:

Objectives Funding for early career researchers in Australia's largest medical research funding scheme is determined by a competitive peer-review process using a panel of four reviewers. The purpose of this experiment was to appraise the reliability of funding by duplicating applications that were considered by separate grant review panels. Study Design and Methods Sixty duplicate applications were considered by two independent grant review panels that were awarding funding for Australia's National Health and Medical Research Council. Panel members were blinded to which applications were included in the experiment and to whether it was the original or duplicate application. Scores were compared across panels using Bland–Altman plots to determine measures of agreement, including whether agreement would have impacted on actual funding. Results Twenty-three percent of the applicants were funded by both panels and 60 percent were not funded by both, giving an overall agreement of 83 percent [95% confidence interval (CI): 73%, 92%]. The chance-adjusted agreement was 0.75 (95% CI: 0.58, 0.92). Conclusion There was a comparatively high level of agreement when compared with other types of funding schemes. Further experimental research could be used to determine if this higher agreement is due to nature of the application, the composition of the assessment panel, or the characteristics of the applicants.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Banana bunchy top is regarded as the most important viral disease of banana, causing significant yield losses worldwide. The disease is caused by Banana bunchy top virus (BBTV), which is a circular ssDNA virus belonging to the genus Babuvirus in the family Nanoviridae. There are currently few effective control strategies for this and other ssDNA viruses. “In Plant Activation” (InPAct) is a novel technology being developed at QUT for ssDNA virus-activated suicide gene expression. The technology exploits the rolling circle replication mechanism of ssDNA viruses and is based on a unique “split” gene design such that suicide gene expression is only activated in the presence of the viral Rep. This PhD project aimed to develop a BBTV-based InPAct system as a suicide gene strategy to control BBTV. The BBTV-based InPAct vector design requires a BBTV intergenic region (IR) to be embedded within an intron in the gene expression cassette. To ensure that the BBTV IR would not interfere with intron splicing, a TEST vector was initially generated that contained the entire BBTV IR embedded within an intron in a β-glucuronidase (GUS) expression vector. Transient GUS assays in banana embryogenic cell suspensions indicated that cryptic intron splice sites were present within the IR. Transcript analysis revealed two cryptic intron splice sites in the Domain III sequence of the CR-M within the IR. Removal of the CR-M from the TEST vector resulted in an enhancement of GUS expression suggesting that the cryptic intron splice sites had been removed. An InPAct GUS vector was subsequently generated that contained the modified BBTV IR, with the CR-M (minus Domain III) repositioned within the InPAct cassette. Using transient histochemical and fluorometric GUS assays in banana embryogenic cells, the InPAct GUS vector was shown to be activated in the presence of the BBTV Rep. However, the presence of both BBTV Rep and Clink was shown to have a deleterious effect on GUS expression suggesting that these proteins were cytotoxic at the levels expressed. Analysis of replication of the InPAct vectors by Southern hybridisation revealed low levels of InPAct cassette-based episomal DNA released from the vector through the nicking/ligation activity of BBTV Rep. However, Rep-mediated episomal replicons, indicative of rolling circle replication of the released circularised cassettes, were not observed. The inability of the InPAct cassette to be replicated was further investigated. To examine whether the absence of Domain III of the CR-M was responsible, a suite of modified BBTV-based InPAct GUS vectors was constructed that contained the CR-M with the inclusion of Domain III, the CR-M with the inclusion of Domain III and additional upstream IR sequence, or no CR-M. Analysis of replication by Southern hybridisation revealed that neither the presence of Domain III, nor the entire CR-M, had an effect on replication levels. Since the InPAct cassette was significantly larger than the native BBTV genomic components (approximately 1 kb), the effect of InPAct cassette size on replication was also investigated. A suite of size variant BBTV-based vectors was constructed that increased the size of a replication competent cassette to 1.1 kbp through to 2.1 kbp.. Analysis of replication by Southern hybridisation revealed that an increase in vector size above approximately 1.5 - 1.7 kbp resulted in a decrease in replication. Following the demonstration of Rep-mediated release, circularisation and expression from the InPAct GUS vector, an InPAct vector was generated in which the uidA reporter gene was replaced with the ribonuclease-encoding suicide gene, barnase. Initially, a TEST vector was generated to assess the cytotoxicity of Barnase on banana cells. Although transient assays revealed a Barnase-induced cytotoxic effect in banana cells, the expression levels were sub-optimal. An InPAct BARNASE vector was generated and tested for BBTV Rep-activated Barnase expression using transient assays in banana embryogenic cells. High levels of background expression from the InPAct BARNASE vector made it difficult to accurately assess Rep-activated Barnase expression. Analysis of replication by Southern hybridisation revealed low levels of InPAct cassette-based episomal DNA released from the vector but no Rep-mediated episomal replicons indicative of rolling circle replication of the released circularised cassettes were again observed. Despite the inability of the InPAct vectors to replicate to enable high level gene expression, the InPAct BARNASE vector was assessed in planta for BBTV Rep-mediated activation of Barnase expression. Eleven lines of transgenic InPAct BARNASE banana plants were generated by Agrobacterium-mediated transformation and were challenged with viruliferous Pentalonia nigronervosa. At least one clonal plant in each line developed bunchy top symptoms and infection was confirmed by PCR. No localised lesions were observed on any plants, nor was there any localised GUS expression in the one InPAct GUS line challenged with viruliferous aphids. The results presented in this thesis are the first study towards the development of a BBTV-based InPAct system as a Rep-activatable suicide gene expression system to control BBTV. Although further optimisation of the vectors is necessary, the preliminary results suggest that this approach has the potential to be an effective control strategy for BBTV. The use of iterons within the InPAct vectors that are recognised by Reps from different ssDNA plant viruses may provide a broad-spectrum resistance strategy against multiple ssDNA plant viruses. Further, this technology holds great promise as a platform technology for the molecular farming of high-value proteins in vitro or in vivo through expression of the ssDNA virus Rep protein.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Recent and current socio-cultural trends are significant factors impacting on how business is conduced and correspondingly, on how work environments are designed. New communication technology is helping to break physical boundaries and change the way and speed of conducting business. One of the main characteristics of these new workplaces is non-permanency wherein the individual employee has no dedicated personally assigned office, work station, or desk. In this non-territorial, nomadic situation, employees undertake their work tasks in a wide variety of work settings inside and outside the office building. Such environments are understood to be must suitable where there is the need for high interaction with others as well as a high level of concentrated, independent work. This thesis reports on a project designed to develop a deeper understanding of the relationships between people (P) and their built environment (E) in the context of everyday work practice in a nomadic and non-territorial work environment. To achieve this, the study focuses on the experiences of employees as they understand them in relation to their work and the designed/ physical work environment. In this sense, the study is qualitative and grounded in nature. It does not assume any previously established theory nor test any presenting hypothesis. Instead it interviews the participants about their situations at work in their workplace, interprets natural interaction and creates a foundation for the development of theory informing workplace design, particularly theory that recognises the human nature of work and the need, as highlighted by several seminal researchers, for a greater understanding of how people manage and adapt in dynamic work environments.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This PhD project has expanded the knowledge in the area of profluorescent nitroxides with regard to the synthesis and characterisations of novel profluorescent nitroxide probes as well as physical characterisation of the probe molecules in various polymer/physical environments. The synthesis of the first example of an azaphenalene-based fused aromatic nitroxide TMAO, [1,1,3,3-tetramethyl-2,3-dihydro-2-azaphenalen-2-yloxyl, was described. This novel nitroxide possesses some of the structural rigidity of the isoindoline class of nitroxides, as well as some properties akin to TEMPO nitroxides. Additionally, the integral aromatic ring imparts fluorescence that is switched on by radical scavenging reactions of the nitroxide, which makes it a sensitive probe for polymer degradation. In addition to the parent TMAO, 5 other azaphenalene derivatives were successfully synthesised. This new class of nitroxide was expected to have interesting redox properties when the structure was investigated by high-level ab initio molecular orbitals theory. This was expected to have implications with biological relevance as the calculated redox potentials for the azaphenalene ring class would make them potent antioxidant compounds. The redox potentials of 25 cyclic nitroxides from four different structural classes (pyrroline, piperidine, isoindoline and azaphenalene) were determined by cyclic voltammetry in acetonitrile. It was shown that potentials related to the one electron processes of the nitroxide were influenced by the type of ring system, ring substituents or groups surrounding the moiety. Favourable comparisons were found between theoretical and experimental potentials for pyrroline, piperidine and isoindoline ring classes. Substitution of these ring classes, were correctly calculated to have a small yet predictable effect on the potentials. The redox potentials of the azaphenalene ring class were underestimated by the calculations in all cases by at least a factor of two. This is believed to be due to another process influencing the redox potentials of the azaphenalene ring class which is not taken into account by the theoretical model. It was also possible to demonstrate the use of both azaphenalene and isoindoline nitroxides as additives for monitoring radical mediated damage that occurs in polypropylene as well as in more commercially relevant polyester resins. Polymer sample doped with nitroxide were exposed to both thermo-and photo-oxidative conditions with all nitroxides showing a protective effect. It was found that isoindoline nitroxides were able to indicate radical formation in polypropylene aged at elevated temperatures via fluorescence build-up. The azaphenalene nitroxide TMAO showed no such build-up of fluorescence. This was believed to be due to the more labile bond between the nitroxide and macromolecule and the protection may occur through a classical Denisov cycle, as is expected for commercially available HAS units. Finally, A new profluorescent dinitroxide, BTMIOA (9,10-bis(1,1,3,3- tetramethylisoindolin-2-yloxyl-5-yl)anthracene), was synthesised and shown to be a powerful probe for detecting changes during the initial stages of thermo-oxidative degradation of polypropylene. This probe, which contains a 9,10-diphenylanthracene core linked to two nitroxides, possesses strongly suppressed fluorescence due to quenching by the two nitroxide groups. This molecule also showed the greatest protective effect on thermo-oxidativly aged polypropylene. Most importantly, BTMIOA was found to be a valuable tool for imaging and mapping free-radical generation in polypropylene using fluorescence microscopy.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Principal topic: Effectuation theory suggests that entrepreneurs develop their new ventures in an iterative way by selecting possibilities through flexibility and interactions with the market; a focus on affordability of loss rather than maximal return on the capital invested, and the development of pre-commitments and alliances from stakeholders (Sarasvathy, 2001, 2008; Sarasvathy et al., 2005, 2006). In contrast, causation may be described as a rationalistic reasoning method to create a company. After a comprehensive market analysis to discover opportunities, the entrepreneur will select the alternative with the higher expected return and implement it through the use of a business plan. However, little is known about the consequences of following either of these two processes. One aspect that remains unclear is the relationship between newness and effectuation. On one hand it can be argued that the combination of a means-centered, interactive (through pre-commitments and alliances with stakeholders from the early phases of the venture creation) and open-minded process (through flexibility of exploiting contingencies) should encourage and facilitate the development of innovative solutions. On the other hand, having a close relationship with their “future first customers” and focussing too much on the resources and knowledge already within the firm may be a constraint that is not conducive to innovation, or at least not to a radical innovation. While it has been suggested that effectuation strategy is more likely to be used by innovative entrepreneurs (Sarasvathy, 2001), this hypothesis has not been demonstrated yet (Sarasvathy, 2001). Method: In our attempt to capture newness in its different aspects we have considered the following four domains where newness may happen: new product/service; new method for promotion and sales; new production methods/sourcing; market creation. We identified how effectuation may be differently associated with these four domains of newness. To test our four sets of hypotheses a dataset of 1329 firms (702 nascent and 627 young firms) randomly selected in Australia was examined through ANOVA Tukey HSD Test. Results and Implications: Results indicate the existence of a curvilinear relationship between effectuation and newness where low and high levels of newness are associated with low level of effectuation while medium level of newness is associated with high level of effectuation. Implications for academia, practitioners and policy makers are also discussed.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Executive Summary The objective of this report was to use the Sydney Opera House as a case study of the application of Building Information Modelling (BIM). The Sydney opera House is a complex, large building with very irregular building configuration, that makes it a challenging test. A number of key concerns are evident at SOH: • the building structure is complex, and building service systems - already the major cost of ongoing maintenance - are undergoing technology change, with new computer based services becoming increasingly important. • the current “documentation” of the facility is comprised of several independent systems, some overlapping and is inadequate to service current and future services required • the building has reached a milestone age in terms of the condition and maintainability of key public areas and service systems, functionality of spaces and longer term strategic management. • many business functions such as space or event management require up-to-date information of the facility that are currently inadequately delivered, expensive and time consuming to update and deliver to customers. • major building upgrades are being planned that will put considerable strain on existing Facilities Portfolio services, and their capacity to manage them effectively While some of these concerns are unique to the House, many will be common to larger commercial and institutional portfolios. The work described here supported a complementary task which sought to identify if a building information model – an integrated building database – could be created, that would support asset & facility management functions (see Sydney Opera House – FM Exemplar Project, Report Number: 2005-001-C-4 Building Information Modelling for FM at Sydney Opera House), a business strategy that has been well demonstrated. The development of the BIMSS - Open Specification for BIM has been surprisingly straightforward. The lack of technical difficulties in converting the House’s existing conventions and standards to the new model based environment can be related to three key factors: • SOH Facilities Portfolio – the internal group responsible for asset and facility management - have already well established building and documentation policies in place. The setting and adherence to well thought out operational standards has been based on the need to create an environment that is understood by all users and that addresses the major business needs of the House. • The second factor is the nature of the IFC Model Specification used to define the BIM protocol. The IFC standard is based on building practice and nomenclature, widely used in the construction industries across the globe. For example the nomenclature of building parts – eg ifcWall, corresponds to our normal terminology, but extends the traditional drawing environment currently used for design and documentation. This demonstrates that the international IFC model accurately represents local practice for building data representation and management. • a BIM environment sets up opportunities for innovative processes that can exploit the rich data in the model and improve services and functions for the House: for example several high-level processes have been identified that could benefit from standardized Building Information Models such as maintenance processes using engineering data, business processes using scheduling, venue access, security data and benchmarking processes using building performance data. The new technology matches business needs for current and new services. The adoption of IFC compliant applications opens the way forward for shared building model collaboration and new processes, a significant new focus of the BIM standards. In summary, SOH current building standards have been successfully drafted for a BIM environment and are confidently expected to be fully developed when BIM is adopted operationally by SOH. These BIM standards and their application to the Opera House are intended as a template for other organisations to adopt for the own procurement and facility management activities. Appendices provide an overview of the IFC Integrated Object Model and an understanding IFC Model Data.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Objectives The procurement research of Sydney Opera House FM Exemplar Project aims to develop innovative methods and guidelines for the procurement of FM services, applicable to iconic and / or performing arts centre facilities, or facilities with similar FM functions. The initial procurement report in June 2005 analysed the strategic objectives and operational requirements that provide ‘demand statements’ as evaluation criteria in the service procurement process. The subsequent interim procurement report in September 2005 discussed the elements contributing to the criteria for decision-making in the service procurement process. This procurement report concentrates on the research on procurement strategies and innovative methods using a case study approach. The objectives of this report are: • to investigate service procurement methods and process in iconic and/or performing arts centre facilities; • to showcase FM innovation in Sydney Opera House through a case study; • to establish a preliminary decision-making framework and guidelines for selection of appropriate FM procurement routes to provide a useful model for FM community. Findings Findings from this procurement research are presented as follows. • FM innovation and experience of Sydney Opera House • Innovative procurement methods and processes, drawn from a case study of Sydney Opera House as exemplar • An integrated performance framework to link maintenance service functions to high level organisational objective and strategies • Procurement methods and contract outcomes, focusing on building maintenance and cleaning services of Sydney Opera House • Multi-dimensional assessment of Service Providers • General decision-making strategies and guidelines for selection of appropriate FM procurement routes Further Research Whilst the Sydney Opera House case study emphasises the experience of Sydney Opera House, a study of procurement strategies and methods from published research and FM good practice will supply facilities managers with alternative procurement routes. Further research on the procurement theme will develop a final decision-making model for the procurement of FM services, drawn from the evaluation of the case study outcomes, as well as FM good practice and findings from current published research.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Policy instruments of education, regulation, fines and inspection have all been utilised by Australian jurisdictions as they attempt to improve the poor performance of occupational health and safety (OH&S) in the construction industry. However, such policy frameworks have been largely uncoordinated across Australia, resulting in differing policy systems, with differing requirements and compliance systems. Such complexity, particularly for construction firms operating across jurisdictional borders, led to various attempts to improve the consistency of OH&S regulation across Australia, four of which will be reviewed in this report. 1. The first is the Occupational Health and Safety Act 1991 (Commonwealth) which enabled certain organisations to opt out of state based regulatory regimes. 2. The second is the development of national standards, codes of practice and guidance documents by the National Occupational Health and Safety Council (NOHSC). The intent was that the OHS requirements, principles and practices contained in these documents would be adopted by state and territory governments into their legislation and policy, thereby promoting regulatory consistency across Australia. 3. The third is the attachment of conditions to special purpose payments from the Commonwealth to the States, in the form of OH&S accreditation with the Office of the Federal Safety Commissioner. 4. The fourth is the development of national voluntary codes of OHS practice for the construction industry. It is interesting to note that the tempo of change has increased significantly since 2003, with the release of the findings of the Cole Royal Commission. This paper examines and evaluates each of these attempts to promote consistency across Australia. It concludes that while there is a high level of information sharing between jurisdictions, particularly from the NOSHC standards, a fragmented OH&S policy framework still remains in place across Australia. The utility of emergent industry initiatives such as voluntary codes and guidelines for safer construction practices to enhance consistency are discussed.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The early stages of the building design process are when the most far reaching decisions are made regarding the configuration of the proposed project. This paper examines methods of providing decision support to building designers across multiple disciplines during the early stage of design. The level of detail supported is at the massing study stage where the basic envelope of the project is being defined. The block outlines on the building envelope are sliced into floors. Within a floor the only spatial divisions supported are the “user” space and the building core. The building core includes vertical transportation systems, emergency egress and vertical duct runs. The current focus of the project described in the paper is multi-storey mixed use office/residential buildings with car parking. This is a common type of building in redevelopment projects within and adjacent to the central business districts of major Australian cities. The key design parameters for system selection across the major systems in multi-storey building projects - architectural, structural, HVAC, vertical transportation, electrical distribution, fire protection, hydraulics and cost – are examined. These have been identified through literature research and discussions with building designers from various disciplines. This information is being encoded in decision support tools. The decision support tools communicate through a shared database to ensure that the relevant information is shared across all of the disciplines. An internal data model has been developed to support the very early design phase and the high level system descriptions required. A mapping to IFC 2x2 has also been defined to ensure that this early information is available at later stages of the design process.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The Guide contains the distilled findings from a major, two-year research project to explore those factors considered by industry practitioners to be critical to the successful adoption of ICT, both within their firms and between their firms and their trading partners. In the context of this project Critical Success Factors (CSFs) have been defined as, “Those things that absolutely, positively must be attended to in order to maximise the likelihood of a successful outcome for the stakeholder, defined in the stakeholder’s terms.” The guide includes: o Perceived benefits of ICT use across the head contractors’ sector o Types and levels of ICT used across the sector o Self-assessment tool o CSFs for high-level ICT users, including o Best Practice Profiles o Action Statements The material contained in this Guide has been generated following a number of principles: o For a given situation there is not a single ‘right answer’, but a number of solutions that have to be evaluated using a range of relevant factors. o Since there are as many solutions as there are ‘solvers’, factors for evaluation will ‘emerge’ from collective wisdom.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The Guide contains the distilled findings from a major, two-year research project to explore those factors considered by industry practitioners to be critical to the successful adoption of ICT, both within their firms and between their firms and their trading partners. In the context of this project Critical Success Factors (CSFs) have been defined as, “Those things that absolutely, positively must be attended to in order to maximise the likelihood of a successful outcome for the stakeholder, defined in the stakeholder’s terms.” The guide includes: o Perceived benefits of ICT use across the consultants’ sector o Types and levels of ICT used across the sector o Self-assessment tool o CSFs for medium- and high-level ICT users, including o Best Practice Profiles o Action Statements o Barriers to ICT use for low-level users o Action Statements The material contained in this Guide has been generated following a number of principles: o For a given situation there is not a single ‘right answer’, but a number of solutions that have to be evaluated using a range of relevant factors. o As there are as many solutions as there are ‘solvers’, factors for evaluation will ‘emerge’ from collective wisdom.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The Guide contains the distilled findings from a major, two-year research project to explore those factors considered by industry practitioners to be critical to the successful adoption of ICT, both within their firms and between their firms and their trading partners. In the context of this project Critical Success Factors (CSFs) have been defined as, “Those things that absolutely, positively must be attended to in order to maximise the likelihood of a successful outcome for the stakeholder, defined in the stakeholder’s terms.” The guide includes: o Perceived benefits of ICT use across the head contractors’ sector o Types and levels of ICT used across the sector o Self-assessment tool o CSFs for medium- and high-level ICT users, including o Best Practice Profiles o Action Statements The material contained in this Guide has been generated following a number of principles: o For a given situation there is not a single ‘right answer’, but a number of solutions that have to be evaluated using a range of relevant factors. o Since there are as many solutions as there are ‘solvers’, factors for evaluation will ‘emerge’ from collective wisdom.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The Guide contains the distilled findings from a major, two-year research project to explore those factors considered by industry practitioners to be critical to the successful adoption of ICT, both within their firms and between their firms and their trading partners. In the context of this project Critical Success Factors (CSFs) have been defined as, “Those things that absolutely, positively must be attended to in order to maximise the likelihood of a successful outcome for the stakeholder, defined in the stakeholder’s terms.” The guide includes: o Perceived benefits of ICT use across the subcontractors’ sector o Types and levels of ICT used across the sector o Self-assessment tool o CSFs for medium- and high-level ICT users, including o Best Practice Profiles o Action Statements o Barriers to ICT use for low-level users o Action Statements The material contained in this Guide has been generated following a number of principles: o For a given situation there is not a single ‘right answer’, but a number of solutions that have to be evaluated using a range of relevant factors. o As there are as many solutions as there are ‘solvers’, factors for evaluation will ‘emerge’ from collective wisdom.