695 resultados para Digital literature
Resumo:
This study explores the professional development strategies of digital content professionals in Australian micro businesses. This thesis presents the argument that as these professionals are working in cutting edge creative fields where digital technology drives ongoing change, formal education experiences may be less important than for other professionals, and that specific types of online and face-to-face socially mediated informal learning strategies may be critical to currency. This thesis documents the findings of a broad survey of industry professionals' learning needs and development strategies, in conjunction with rich data from in-depth interviews and social network analyses.
Resumo:
As the boundaries between public and private, human and technology, digital and social, mediated and natural, online and offline become increasingly blurred in modern techno-social hybrid societies, sociology as a discipline needs to adapt and adopt new ways of accounting for these digital cultures. In this paper I use the social networking site Pinterest to demonstrate how people today are shaped by, and in turn shape, the digital tools they are assembled with. Digital sociology is emerging as a sociological subdiscipline that engages with the convergence of the digital and the social. However, there seems to be a focus on developing new methods for studying digital social life, yet a neglect of concrete explorations of its culture. I argue for the need for critical socio-cultural ‘thick description’ to account for the interrelations between humans and technologies in modern digitally mediated cultures.
Resumo:
Digital forensics concerns the analysis of electronic artifacts to reconstruct events such as cyber crimes. This research produced a framework to support forensic analyses by identifying associations in digital evidence using metadata. It showed that metadata based associations can help uncover the inherent relationships between heterogeneous digital artifacts thereby aiding reconstruction of past events by identifying artifact dependencies and time sequencing. It also showed that metadata association based analysis is amenable to automation by virtue of the ubiquitous nature of metadata across forensic disk images, files, system and application logs and network packet captures. The results prove that metadata based associations can be used to extract meaningful relationships between digital artifacts, thus potentially benefiting real-life forensics investigations.
Resumo:
Researchers are increasingly grappling with ways of theorizing social media and its use. This review essay proposes that the theory of Information Grounds (IG) may provide a valuable lens for understanding how social media fosters collaboration and social engagement among information professionals. The paper presents literature that helps us understand how social media can be seen as IG, and maps the characteristics of social media to the seven propositions of IG theory. This work is part of a wider study investigating the ways in which Information Technology (IT) professionals experience social media.
Resumo:
Background Participation in regular physical activity is among the most promising and cost effective strategies to reduce physical and cognitive decline and premature death. However, confusion remains about the amount, frequency, and duration of physical activity that is likely to provide maximum benefit as well as the way in which interventions should be delivered. Aims This paper aimed to review research on the impact of leisure-time and general physical activity levels on physical and cognitive decline in postmenopausal women. In a systematic review of the literature, empirical literature from 2009-2013 is reviewed to explore the potential impact of either commencing or sustaining physical activity on older women’s health. Results All studies found that physical activity was associated with lower rates of cognitive and physical decline and a significant reduction in all-cause mortality. In this review we found that exercise interventions (or lifestyle activities) that improved cardiorespiratory exercise capacity showed the most positive impact on physical health. Conclusions Findings suggest that programs should facilitate and support women to participate in regular exercise by embedding physical activity programs in public health initiatives, by developing home-based exercise programs that require few resources and by creating interventions that can incorporate physical activity within a healthy lifestyle. The review also suggests that clinicians should consider prescribing exercise in a tailored manner for older women to ensure that it is of a high enough intensity to obtain the positive sustained effects of exercise.
Resumo:
Two of the three cross-curriculum priorities for the national Australian Curriculum prescribed by the Australian Curriculum Assessment and Reporting Authority (ACARA) are focussed on what might be called diversity education: “Aboriginal and Torres Strait Islander histories and culture”, and "Asia and Australia's Engagement with Asia” (ACARA, “Cross”). One need not be versed in complex rhetorical theory to understand that, laudable and legitimate as such priorities are, their existence implies that mainstream education in Australia has been or is characterised by the marginalisation or erasure of Australia's history—the original Indigenous cultures are not only living and vibrant today, but also have tens of thousands of years’ “head start” on Australia’s settler cultures—and of its geography—Australia is, after all, located in some physical proximity to Asia. Some might even suggest that Australia is in Asia. These temporal and spatial “forgettings” constitute a kind of cultural perversity which the cross-curricular priorities both seek to address and serve to reinscribe. Even as ACARA requires Australian school students to engage with Aboriginal and Asian histories, cultures, societies, they imply that such histories, cultures, and societies are “diverse”, that they are not those of the students in Australian classrooms; producing them as objects of study rather than as lived experience. This should not necessarily be surprising. Michael W. Apple has provocatively argued that: “one of the perverse effects of a national curriculum actually will be to ‘legitimise inequality.’ It may in fact help create the illusion that whatever the massive differences in schools, they all have something in common” (18). In the Australian context, attempts to mitigate such perversity are articulated via the selection of literary texts. As educators move to resource ACARA’s cross-curricular priorities, ACARA notes that “Teachers and schools are best placed to make decisions about the selection of texts in their teaching and learning programs that address the content in the Australian Curriculum while also meeting the needs of the students in their classes” (ACARA, “Advice”). This assertion appears on a webpage called “Advice on selection of literary texts” which is notable first and foremost for its total lack of any literary texts being named, and its list of weblinks pointing to lists of texts compiled elsewhere, by other organisations, and in the main, compiled to serve agendas other than the Australian curriculum. One of the major resources referred to by ACARA for literary text selection is the Children’s Book Council of Australia (CBCA). Of course, the CBCA’s annual book awards do not share ACARA’s educational priorities, but do have a history of being drawn upon by schools as a curriculum resource. In this paper, I consider the literary texts which have been prized by the CBCA in recent years attending to their engagements with Aboriginal cultures.
Resumo:
Firm-customer digital connectedness for effective sensing and responding is a strategic imperative for contemporary competitive firms. This research-in-progress paper conceptualizes and operationalizes the firm-customer mobile digital connectedness of a smart-mobile customer. The empirical investigation focuses on mobile app users and the impact of mobile apps on customer expectations. Based on pilot data collected from 127 customers, we tested hypotheses pertaining to firm-customer mobile digital connectedness and customer expectations. Our test analysis using linear and non-linear postulations reveals those customers raise their expectations as they increase their digital interactions with a firm.
Resumo:
The power of sharing computation in a cryptosystem is crucial in several real-life applications of cryptography. Cryptographic primitives and tasks to which threshold cryptosystems have been applied include variants of digital signature, identification, public-key encryption and block ciphers etc. It is desirable to extend the domain of cryptographic primitives which threshold cryptography can be applied to. This paper studies threshold message authentication codes (threshold MACs). Threshold cryptosystems usually use algebraically homomorphic properties of the underlying cryptographic primitives. A typical approach to construct a threshold cryptographic scheme is to combine a (linear) secret sharing scheme with an algebraically homomorphic cryptographic primitive. The lack of algebraic properties of MACs rules out such an approach to share MACs. In this paper, we propose a method of obtaining a threshold MAC using a combinatorial approach. Our method is generic in the sense that it is applicable to any secure conventional MAC by making use of certain combinatorial objects, such as cover-free families and their variants. We discuss the issues of anonymity in threshold cryptography, a subject that has not been addressed previously in the literature in the field, and we show that there are trade-offis between the anonymity and efficiency of threshold MACs.
Resumo:
An increasing range of services are now offered via online applications and e-commerce websites. However, problems with online services still occur at times, even for the best service providers due to the technical failures, informational failures, or lack of required website functionalities. Also, the widespread and increasing implementation of web services means that service failures are both more likely to occur, and more likely to have serious consequences. In this paper we first develop a digital service value chain framework based on existing service delivery models adapted for digital services. We then review current literature on service failure prevention, and provide a typology of technolo- gies and approaches that can be used to prevent failures of different types (functional, informational, system), that can occur at different stages in the web service delivery. This makes a contribution to theory by relating specific technologies and technological approaches to the point in the value chain framework where they will have the maximum impact. Our typology can also be used to guide the planning, justification and design of robust, reliable web services.
Resumo:
This chapter addresses children’s development of digital media literacies with iPads in preschool settings. The authors argue that children living in post-industrial societies participate in ‘transmedia’ experiences that call for new understandings of media literacy that recognise children’s ability to successfully participate in complex media ecologies. The chapter outlines a model for digital media literacies that includes the application of digital materials and media concepts through the processes of media production and media analysis. This model is then used as a framework to interpret children’s media production work across the preschools in our project.
Resumo:
Research on Green Information Technology (IT) is becoming a prevalent research theme in Green Information Systems (IS) research. This article provides a review of 98 papers published on Green IT between 2007−2013 to facilitate future research and to provide a retrospective analysis of existing knowledge and gaps thereof. While some researchers have discussed phenomena such as Green IT, motivation of Green IT and the Green IT adoption lifecycle, others have researched the importance of Green IT implementation within the organisational and individual level. Throughout the literature, scholars are trying to portray a constructive relationship between IT and the environment. Through our analysis, we can provide an assessment of the status of information systems literature on Green IT and, we provide taxonomy of segments of Green IT publications. Future research opportunities are identified based on the review.
Resumo:
Dealing with digital medical images is raising many new security problems with legal and ethical complexities for local archiving and distant medical services. These include image retention and fraud, distrust and invasion of privacy. This project was a significant step forward in developing a complete framework for systematically designing, analyzing, and applying digital watermarking, with a particular focus on medical image security. A formal generic watermarking model, three new attack models, and an efficient watermarking technique for medical images were developed. These outcomes contribute to standardizing future research in formal modeling and complete security and computational analysis of watermarking schemes.
Resumo:
The digital era is proving to be one of disruption, where new technologies matched with innovative business models can be harnessed to attack even the most established of companies. For businesses with the relative certainty of captive customer bases, such as airports, the ability to digitally diversify offers the opportunity to venture into new modes of operation. For an airport, this opportunity can also be leveraged to sustain superior customer support regardless of a customer’s location in the world. This research paper presents a case study of the development of an Australian Airport Corporation’s mobile application as part of a greater digital strategy initiative using a design-led approach to innovate. An action research method provides the platform for an intensive embedded practice and study of design-led innovation within the major Australian Airport Corporation. The findings reveal design-led innovation to be a crucial in-house idea generation and concept development capability enabling the bridging of distinct corporate domains associated with commercialisation, operations and customer experience. A Digital Innovation Checklist is presented as an output of this research which structures an organizational approach toward digital channel innovation. The practitioner’s checklist is designed to aid in the future development of digital channels within the broader spectrum of strategy by addressing business assumptions.
Resumo:
While formal definitions and security proofs are well established in some fields like cryptography and steganography, they are not as evident in digital watermarking research. A systematic development of watermarking schemes is desirable, but at present their development is usually informal, ad hoc, and omits the complete realization of application scenarios. This practice not only hinders the choice and use of a suitable scheme for a watermarking application, but also leads to debate about the state-of-the-art for different watermarking applications. With a view to the systematic development of watermarking schemes, we present a formal generic model for digital image watermarking. Considering possible inputs, outputs, and component functions, the initial construction of a basic watermarking model is developed further to incorporate the use of keys. On the basis of our proposed model, fundamental watermarking properties are defined and their importance exemplified for different image applications. We also define a set of possible attacks using our model showing different winning scenarios depending on the adversary capabilities. It is envisaged that with a proper consideration of watermarking properties and adversary actions in different image applications, use of the proposed model would allow a unified treatment of all practically meaningful variants of watermarking schemes.
Resumo:
Seemingly straightforward tasks often have a way of becoming complex. This was the case for our guest editorial team charged with creating Early Childhood Australia’s Best of Sustainability publication drawn from the the Australasian Journal of Early Childhood and Every Child. The complexities we encountered ranged from the varied terminologies and understandings of constructs such as education for sustainable development, environmental education and education for sustainability, through to the fundamental lack of published research on which to draw as the basis for a special issue. It is timely to explore these complexities as we face the global challenges of The Critical Decade (DCCEE, 2011) including rising sea levels, extreme weather events and food security. At a local level, the early childhood field in Australia is seeking to interpret sustainability with systemic support from the National Quality Standards(NQS) (ACECQA, 2011), while elsewhere environmental/sustainability education is encouraged through national curricula documents (for example, Singapore Ministry of Education, 2008; Swedish National Agency for Education,2010; Ministry of Education of Korea, 2011). Both The Critical Decade and the NQS provide imperatives to drive early childhood education’s engagement with sustainability. In other words, sustainability in early childhood education is no longer optional, but essential (Elliott, 2010). While some twenty years of advocacy has led to this somewhat subdued celebratory position, in this publication we do recognise the historical contexts that have led to early childhood education for sustainability (ECEfS), as we (Elliott & Davis) phrase it, becoming almost ‘mainstream not marginal’ (Davis, 1999)— a stitching together of the isolated ‘patches of green’, first identified a decade ago by Elliott (NSW EPA, 2003). Here we weave together, through these articles, a story of the evolving history of ECEfS from our particular perspective. In so doing, we also acknowledge that there are other perspectives or ‘paths’ for this field as identified by Edwards and Cutter-McKenzie in their concluding paper to this compilation.