545 resultados para Information technology


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Recurrence relations in mathematics form a very powerful and compact way of looking at a wide range of relationships. Traditionally, the concept of recurrence has often been a difficult one for the secondary teacher to convey to students. Closely related to the powerful proof technique of mathematical induction, recurrences are able to capture many relationships in formulas much simpler than so-called direct or closed formulas. In computer science, recursive coding often has a similar compactness property, and, perhaps not surprisingly, suffers from similar problems in the classroom as recurrences: the students often find both the basic concepts and practicalities elusive. Using models designed to illuminate the relevant principles for the students, we offer a range of examples which use the modern spreadsheet environment to powerfully illustrate the great expressive and computational power of recurrences.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This teaching case describes how SAP, a leading global information technology (IT) solutions provider, embarked on a large-scale transformation program to implement a dual sustainability strategy of: (a) internally transforming the organization, and (b) addressing a business opportunity by developing IT solutions that enable their customers to become more sustainable. This case provides students with significant information about the development of SAP towards sustainability, including the company's underlying motivation, their approach to change and related challenges, and their use of IT to enable the transformation. The teaching case provides an opportunity to critically examine the benefits and risks of using IT in an effort to improve the sustainability of an organization, and to develop appropriate models for sustainable strategies and IT implementation efforts.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This research suggests information technology (IT) governance structures to manage the cloud computing services. The interest in acquiring IT resources as a utility from the cloud computing environment is gaining momentum. The cloud computing services present organizations with opportunities to manage their IT expenditure on an ongoing basis, and access to modern IT resources to innovate and manage their continuity. However, the cloud computing services are no silver bullet. Organizations would need to have appropriate governance structures and policies in place to manage the cloud computing services. The subsequent decisions from these governance structures will ensure the effective management of the cloud computing services. This management will facilitate a better fit of the cloud computing services into organizations’ existing processes to achieve the business (process-level) and the financial (firm-level) objectives. Using a triangulation approach, we suggest four governance structures for managing the cloud computing services. These structures are a chief cloud officer, a cloud management committee, a cloud service facilitation centre, and a cloud relationship centre. We also propose that these governance structures would relate directly to organizations cloud computing services-related business objectives, and indirectly to cloud computing services-related financial objectives. Perceptive field survey data from actual and prospective cloud computing service adopters suggest that the suggested governance structures would contribute directly to cloud computing-related business objectives and indirectly to cloud computing-related financial objectives.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Brain decoding of functional Magnetic Resonance Imaging data is a pattern analysis task that links brain activity patterns to the experimental conditions. Classifiers predict the neural states from the spatial and temporal pattern of brain activity extracted from multiple voxels in the functional images in a certain period of time. The prediction results offer insight into the nature of neural representations and cognitive mechanisms and the classification accuracy determines our confidence in understanding the relationship between brain activity and stimuli. In this paper, we compared the efficacy of three machine learning algorithms: neural network, support vector machines, and conditional random field to decode the visual stimuli or neural cognitive states from functional Magnetic Resonance data. Leave-one-out cross validation was performed to quantify the generalization accuracy of each algorithm on unseen data. The results indicated support vector machine and conditional random field have comparable performance and the potential of the latter is worthy of further investigation.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Due to extension of using CCTVs and the other video security systems in all areas, these sorts of devices have been introduced as the most important digital evidences to search and seizure crimes. Video forensics tools are developed as a part of digital forensics tools to analyze digital evidences and clear vague points of them for presenting in the courts Existing video forensics tools have been facilitated the investigation process by providing different features based on various video editing techniques. In this paper, some of the most popular video forensics tools are discussed and the strengths and shortages of them are compared and consequently, an alternative framework which includes the strengths of existing popular tools is introduced.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The term “Human error” can simply be defined as an error which made by a human. In fact, Human error is an explanation of malfunctions, unintended consequents from operating a system. There are many factors that cause a person to have an error due to the unwanted error of human. The aim of this paper is to investigate the relationship of human error as one of the factors to computer related abuses. The paper beings by computer-relating to human errors and followed by mechanism mitigate these errors through social and technical perspectives. We present the 25 techniques of computer crime prevention, as a heuristic device that assists. A last section discussing the ways of improving the adoption of security, and conclusion.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Curriculum renewal is a constant activity in Information Technology (IT), Information Systems (IS), Information and Communication Technology (ICT) and Computer Science (CS). Guiding documents from curriculum authorities such as AIS, IEEE and ACM assist in this process, as do those from professional societies, but these are often out of date when the institution seeks to refresh its approaches to learning, and position its graduates for emerging roles and technologies. This paper describes and discusses a curriculum renewal project undertaken in response to changing government requirements,student interests and the adoption of a learner-centric, active learning paradigm utilizing new physical collaborative learning facilities. This paper presents the stimulus for change, describes the use of reference resources and discusses the resulting degree structure, its majors and learning approaches.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Active and collaborative learning are becoming essential strategies to attract, engage and retain students. These methods have been adopted within the Science and Engineering Faculty of Queensland University of Technology for use in its Science, Information Technology and Engineering degrees. This paper describes the adoption and application of these techniques in a specific first year unit in a new Bachelor of Information Technology degree which has majors in Computer Science and Information Systems. The paper reports on the design, development and implementation of this foundation subject and discusses how it uses active and collaborative learning to teach design thinking through a series of design challenges, and how it uses critiquing and reflection to ensure that students become more aware of design and team processes.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Research on Green Information Technology (IT) is becoming a prevalent research theme in Green Information Systems (IS) research. This article provides a review of 98 papers published on Green IT between 2007−2013 to facilitate future research and to provide a retrospective analysis of existing knowledge and gaps thereof. While some researchers have discussed phenomena such as Green IT, motivation of Green IT and the Green IT adoption lifecycle, others have researched the importance of Green IT implementation within the organisational and individual level. Throughout the literature, scholars are trying to portray a constructive relationship between IT and the environment. Through our analysis, we can provide an assessment of the status of information systems literature on Green IT and, we provide taxonomy of segments of Green IT publications. Future research opportunities are identified based on the review.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

As of today, online reviews have become more and more important in decision making process. In recent years, the problem of identifying useful reviews for users has attracted significant attentions. For instance, in order to select reviews that focus on a particular feature, researchers proposed a method which extracts all associated words of this feature as the relevant information to evaluate and find appropriate reviews. However, the extraction of associated words is not that accurate due to the noise in free review text, and this affects the overall performance negatively. In this paper, we propose a method to select reviews according to a given feature by using a review model generated based upon a domain ontology called product feature taxonomy. The proposed review model provides relevant information about the hierarchical relationships of the features in the review which captures the review characteristics accurately. Our experiment results based on real world review dataset show that our approach is able to improve the review selection performance according to the given criteria effectively.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Interdisciplinary learning is a form of knowledge production that is increasingly being embraced as an educational approach in higher education. A role of information and communication technologies (ICT) is to enhance interdisciplinary learning. Issues surrounding the mix of interdisciplinary pedagogic methodologies and emerging digital technologies are worthy of investigation. In this paper, the authors report the findings of a study that examined student perceptions of an interdisciplinary course on information technology (IT) and visual design that utilized a learning management system. Using questionnaire instrumentation, the authors sought the perceptions of first-year university students enrolled in a newly formed interdisciplinary IT course. Results indicate that ICT-based interdisciplinary learners prefer a self-directed and collaborative instructional modality, as well as teacher presence and interventions in the online environment. The types of student participation can significantly influence how students perceive ICT-based interdisciplinary learning design.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Abstract Legacy information systems evolved incrementally in response to changes in business strategy and information technology. Organizations are now being forced to change much more radically and quickly than previously and this change places new demands on information systems. Legacy information systems are usually considered from a technical perspective, addressing issues such as age, complexity, maintainability, design and technology. We wish to demonstrate that the business dimension to legacy information systems, represented by the organisation structure, business processes and procedures that are bound up in the design and operation of the existing IT systems, is also significant. This paper identifies the important role of legacy information systems in the formation of new strategies. We show that the move away from a stable to an unstable business environment accelerates the rate of change. Furthermore, the gap between what the legacy information systems can deliver and the strategic vision of the organization widens when the legacy information systems are unable to adapt to meet the new requirements. An analysis of fifteen case studies provides evidence that legacy information systems include business and technical dimensions and that the systems can present problems when there is a misalignment between the strategic vision of the business, the IT legacy and the old business model embodied in the legacy.