213 resultados para cyber security, securitization, information technology, U.S CYBERCOM


Relevância:

100.00% 100.00%

Publicador:

Resumo:

A large proportion (over 12 per cent) of international and non-English speaking background (NESB) postgraduate research students enrol in engineering and information technology (IT) programs in Australian universities. They find themselves in an advanced research culture, and are technically and scientifically challenged early in their programs. This is in addition to cultural, social and religious isolation and linguistic barriers they have to contend with. The project team surveyed this cohort at QUT and UWA, on the hypothesis that they face challenges that are more discipline-specific. The results of the survey indicate that existing supervisory frameworks which are limited to linguistic contexts are not fully assisting these students and supervisors to achieve high quality research. The goal of this project is to extend these supervisory frameworks to a holistic model that will address the unique needs and supervisory issues these students face in engineering and IT disciplines. The model will be useable by all other Australian universities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A new era of cyber warfare has appeared on the horizon with the discovery and detection of Stuxnet. Allegedly planned, designed, and created by the United States and Israel, Stuxnet is considered the first known cyber weapon to attack an adversary state. Stuxnet's discovery put a lot of attention on the outdated and obsolete security of critical infrastructure. It became very apparent that electronic devices that are used to control and operate critical infrastructure like programmable logic controllers (PLCs) or supervisory control and data acquisition (SCADA) systems lack very basic security and protection measures. Part of that is due to the fact that when these devices were designed, the idea of exposing them to the Internet was not in mind. However, now with this exposure, these devices and systems are considered easy prey to adversaries.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Information technology (IT) plays a critical role of enabler of activities that improve the performance of business processes. This enabling role of IT resources means continuous investment in IT is a strategic necessity. It is established that organizations’ IT-related capabilities leverage the enabling potential of IT resources. Today’s turbulent and challenging business environment requires organizations to do more from their existing and newly acquired IT resources. To achieve this, organizations need to discover ways or establish environments to nourish their existing IT-related capabilities, and develop new IT-related capabilities. We suggest one such environment, a dynamic IT-learning environment that could contribute to nourishing existing IT-related capabilities, and developing new IT-related capabilities. This environment is a product of coordination of four organizational factors that relate to the ways in which IT-related knowledge is applied to business processes, the accompanying reward structures, and ways in which the IT-related learning and knowledge is shared within the organization. Using 216 field survey responses, this paper shows that two IT-related capabilities of top management commitment to IT initiatives, and shared organizational knowledge between the IT and business unit managers has a stronger positive influence on business process performance in the presence of this dynamic IT-learning environment. The study also shows that a marginal IT-related capability, technical IT skills, has a positive and significant influence on business process performance in the presence of this environment. These outcomes imply that organizations’ internal environments could contribute to the management of their IT-related capabilities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The business value of information technology (IT) is increasingly being cocreated by multiple parties, opening opportunities for new research initiatives. Previous studies on IT value cocreation mainly focus on analyzing sources of cocreated IT value, yet inadequately accommodating the influence of competition relationships in IT value cocreation activities. To fill the gap, this in-progress paper suggests an agent-based modeling (also simulation) approach to investigating potential influences of the dynamic interplay between cooperation and competition relationships in IT value cocreation settings. In particular, the research proposes a high-level conceptual framework to position general IT value cocreation processes. A relational network view is offered, aiming at decomposing and systemizing several typical cooperation and competition scenarios in practical IT value cocreation settings. The application of a simulation approach to analytical insights and to theory building is illustrated.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The value of information technology (IT) is often realized when continuously being used after users’ initial acceptance. However, previous research on continuing IT usage is limited for dismissing the importance of mental goals in directing users’ behaviors and for inadequately accommodating the group context of users. This in-progress paper offers a synthesis of several literature to conceptualize continuing IT usage as multilevel constructs and to view IT usage behavior as directed and energized by a set of mental goals. Drawing from the self-regulation theory in the social psychology, this paper proposes a process model, positioning continuing IT usage as multiple-goal pursuit. An agent-based modeling approach is suggested to further explore causal and analytical implications of the proposed process model.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

While the growth in the number of IT investments remains strong, research in the IT investment field is limited, resulting in suboptimal practical guidance on effectively governing IT investments. Based on resource-based theory, this paper reports the initial work involved in developing a construct names IT investment governance (ITIG), because it can be used to measure organizations' capability to govern their IT investments. This paper then empirically examines the association of ITIG and corporate performance. The preliminary result is a four-factor, 16-item instrument for assessing the ITIG construct. This method's factors are IT investment value governance, IT investment value monitoring, IT investment appraisals and IT investment project management. The impact of ITIG on corporate performance was demonstrated with a significant and positive relationship found to exist between the ITIG construct and corporate performance, thus supporting the effectiveness of the ITIG construct. Corporations with higher levels of ITIG capability are more likely to maximize the contribution of their IT investments to firm value.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis provides a review of 199 papers published on Green IT/IS between 2007−2014, in order to present taxonomy of segments in Green IT/IS publications, where the segments are later used for multiple analyses to facilitate future research and to provide a retrospective analysis of existing knowledge and gaps thereof. This research also attempts to make a unique contribution to our understanding of Green IT/IS, by consolidating papers it observes current patterns of literature through approach analysis and segmentation, as well as allocating studies to the technology, process, or outcome (TPO) stage. Highlighting the necessity of a consolidated approach, these classification systems have been combined into a TPO matrix so that the studies could be arranged according to which stage of the Green IT/IS cycle they were focused on. We believe that these analyses will provide a solid platform from which future Green IT/IS research can be launched.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mobile devices are very popular among tertiary student populations. This study looks at student use of hand-held mobile devices within the context of a first year programming unit. This research sought for ways in which an educational app on these devices could be successfully integrated into such a class's learning.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we describe our investigation of the role of investment in information technology (IT) on economic output and productivity in Australia over a period of about four decades. The framework used in this paper is the aggregate production function, where IT capital is considered as a separate input of production along with non-IT capital and labour. The empirical results from the study indicate the evidence of robust technical progress in the Australian economy in the 1990s. IT capital had a significant impact on output, labour productivity and technical progress in the 1990s. In recent years, however, the contribution of IT capital on output and labour productivity has slowed down. Regaining the IT capital productivity therefore remains as a key challenge for Australia, especially in the context of greater IT investment in the future.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is an uptake of organizations involvement in collaborative organizational structures (COS). As the nature and level of information technology (IT) investment in COS will be similar, the COS IT competencies will leverage the IT investments to create the collaborative rent generating potential of the COS, which would then improve the business value of the COS members. Consistent with the resource-centric views of the firm, we suggest that the COS members need to contribute their managed IT competencies to their COS, whose synergies would create COS IT competencies. We suggest three key IT competencies for COS; proactive top management decision synergy, collaborative and agile IT infrastructure, and cross-functional tactical management synergy. Using survey data, we find evidence of a positive association between these COS IT competencies and the collaborative rent generating potential of the COS. We also find a positive association between the collaborative rent generating potential of the COS and the business value of the COS members. The results suggest that developing COS IT competencies add value to a COS and its members. This study provides guidance for organizations looking to leverage their involvement in a COS.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study investigates how offshore information technology (IT) service providers (vendors) coordinate work with their clients (employers) in order to succeed in the global IT offshore outsourcing industry. We reviewed literature on coordination studies, interviewed offshore service providers in the Philippines, and used thematic analysis to analyse coordination practices from the point of view of these individual vendors in a newly industrialized country. We used Olson and Olson's framework on 'collaboration at a distance' as a lens to structure the results. The study provides an understanding of vendors' individual attitudes towards the coordination of distributed work and draws attention to how differences in power affect the work situation of vendors, and by implication all stakeholders. We offer this insight as a way to enhance existing CSCW frameworks, by imbuing them with the perspective of non-equal relationships. The study found that vendors were generally able to produce outputs that satisfy their clients, however these results were only achieved because individuals were willing to take risks and make sacrifices in their personal lives. The relationship was further characterised by a complex interplay between the client's control of the overall work arrangements and the vendors' ability to establish a level of autonomy in their work practices and their flexible use of coordination tools.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The business value of information technology (IT) is realized through the continuous use of IT subsequent to users’ adoption. Understanding post-adoptive IT usage is useful in realizing potential IT business value. Most previous research on post-adoptive IT usage, however, dismisses the unintentional and unconscious aspects of usage behavior. This paper advances understanding of the unintentional, unconscious, and thereby automatic usage of IT features during the post-adoptive stage. Drawing from Social Psychology literature, we argue human behaviors can be triggered by environmental cues and directed by the person’s mental goals, thereby operating without a person’s consciousness and intentional will. On this basis, we theorize the role of a user’s innovativeness goal, as the desired state of an act to innovate, in directing the user’s unintentional, unconscious, and automatic post-adoptive IT feature usage behavior. To test the hypothesized mechanisms, a human experiment employing a priming technique, is described.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

For any discipline to be regarded as a professional undertaking by which its members may be treated as true “professionals” in a specific area, practitioners must clearly understand that discipline’s history as well as the place and significance of that history in current practice as well as its relevance to available technologies and artefacts at the time. This is common for many professional disciplines such as medicine, pharmacy, engineering, law and so on but not yet, this paper submits, in information technology. Based on twenty five elapsed years of experience in developing and delivering Cybersecurity courses at undergraduate and postgraduate levels, this paper proposes a rationale and set of differing perspectives for the planning and development of curricula relevant to the delivery of appropriate courses in the history of cybersecurity or information assurance to information and communications technology (ICT) students and thus to potential information technology professionals.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper makes a formal security analysis of the current Australian e-passport implementation using model checking tools CASPER/CSP/FDR. We highlight security issues in the current implementation and identify new threats when an e-passport system is integrated with an automated processing system like SmartGate. The paper also provides a security analysis of the European Union (EU) proposal for Extended Access Control (EAC) that is intended to provide improved security in protecting biometric information of the e-passport bearer. The current e-passport specification fails to provide a list of adequate security goals that could be used for security evaluation. We fill this gap; we present a collection of security goals for evaluation of e-passport protocols. Our analysis confirms existing security weaknesses that were previously identified and shows that both the Australian e-passport implementation and the EU proposal fail to address many security and privacy aspects that are paramount in implementing a secure border control mechanism. ACM Classification C.2.2 (Communication/Networking and Information Technology – Network Protocols – Model Checking), D.2.4 (Software Engineering – Software/Program Verification – Formal Methods), D.4.6 (Operating Systems – Security and Privacy Protection – Authentication)