682 resultados para Railway mail service
Resumo:
lnformation technology (IT) and, in particular, the Internet is dramatically impacting on the services sector. This paper specifically investigates the relative impact of several forms of internet use on perceived performance for two groups of service organisations - retail service firms and professlonal health service firms. Using a mailed out self-administered questionnaire, 625 completed questionnaires were obtained and 43 per cent of respondents reported that they used the lternet. Thus the final usable sample in the study comprised 262 respondents. Results showed that the Internet does significantly influence perceived performance in both types of service firms. However,there are differences in the forms of lntemet use between the two service groups and their relative effect on performance. For retail firms, use of transactional function, such as ordering, selling and payment was found to be positively related to increases in perceived performance. In contrast, for professional health service firms, the ability to search for information on products and/or services was found to be positively associated with perceived performance. Finally, theoretical and managerial implications of the findings of this study are discussed.
Resumo:
Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.
Resumo:
With the advent of Service Oriented Architecture, Web Services have gained tremendous popularity. Due to the availability of a large number of Web services, finding an appropriate Web service according to the requirement of the user is a challenge. This warrants the need to establish an effective and reliable process of Web service discovery. A considerable body of research has emerged to develop methods to improve the accuracy of Web service discovery to match the best service. The process of Web service discovery results in suggesting many individual services that partially fulfil the user’s interest. By considering the semantic relationships of words used in describing the services as well as the use of input and output parameters can lead to accurate Web service discovery. Appropriate linking of individual matched services should fully satisfy the requirements which the user is looking for. This research proposes to integrate a semantic model and a data mining technique to enhance the accuracy of Web service discovery. A novel three-phase Web service discovery methodology has been proposed. The first phase performs match-making to find semantically similar Web services for a user query. In order to perform semantic analysis on the content present in the Web service description language document, the support-based latent semantic kernel is constructed using an innovative concept of binning and merging on the large quantity of text documents covering diverse areas of domain of knowledge. The use of a generic latent semantic kernel constructed with a large number of terms helps to find the hidden meaning of the query terms which otherwise could not be found. Sometimes a single Web service is unable to fully satisfy the requirement of the user. In such cases, a composition of multiple inter-related Web services is presented to the user. The task of checking the possibility of linking multiple Web services is done in the second phase. Once the feasibility of linking Web services is checked, the objective is to provide the user with the best composition of Web services. In the link analysis phase, the Web services are modelled as nodes of a graph and an allpair shortest-path algorithm is applied to find the optimum path at the minimum cost for traversal. The third phase which is the system integration, integrates the results from the preceding two phases by using an original fusion algorithm in the fusion engine. Finally, the recommendation engine which is an integral part of the system integration phase makes the final recommendations including individual and composite Web services to the user. In order to evaluate the performance of the proposed method, extensive experimentation has been performed. Results of the proposed support-based semantic kernel method of Web service discovery are compared with the results of the standard keyword-based information-retrieval method and a clustering-based machine-learning method of Web service discovery. The proposed method outperforms both information-retrieval and machine-learning based methods. Experimental results and statistical analysis also show that the best Web services compositions are obtained by considering 10 to 15 Web services that are found in phase-I for linking. Empirical results also ascertain that the fusion engine boosts the accuracy of Web service discovery by combining the inputs from both the semantic analysis (phase-I) and the link analysis (phase-II) in a systematic fashion. Overall, the accuracy of Web service discovery with the proposed method shows a significant improvement over traditional discovery methods.
Resumo:
This research thesis focuses on the experiences of pre-service drama teachers and considers how process drama may assist them to reflect on key aspects of professional ethics such as mandatory codes or standards, principled moral reasoning, moral character, moral agency, and moral literacy. Research from higher education provides evidence that current pedagogical approaches used to prepare pre –professionals for practice in medicine, engineering, accountancy, business, psychology, counselling, nursing and education, rarely address the more holistic or affective dimensions of professional ethics such as moral character. Process drama, a form of educational drama, is a complex improvisational group experience that invites participants to create and assume roles, and select and manage symbols in order to create a fictional world exploring human experience. Many practitioners claim that process drama offers an aesthetic space to develop a deeper understanding of self and situations, expanding the participant’s consciousness and ways of knowing. However, little research has been conducted into the potential efficacy of process drama in professional ethics education for pre-professionals. This study utilizes practitioner research and case study to explore how process drama may contribute to the development of professional ethics education and pedagogy.
Resumo:
Business Service Management describes the emerging discipline dedicated to the IT-enabled management of services as corporate assets. Business Service Management deals with the service orientation of the organisation and the provisioning and use of business services. The term business service describes an autonomous transformational capability that is offered to and consumed by external or internal customers for their benefit. The prefix ‘business’ stresses that such a service has a market value, requires the ability to be managed internally as a corporate asset and that its implementation is technology-agnostic. While business services (or so called capabilities) have attracted the attention of many vendors and organisations, a lack of understanding of the activities required for the successful management of such business services remains a critical issue. In order to fill this gap, a framework consisting of Service Lifecycle Management, Service Value Management, Service Relationship Management and Service Enablement is proposed. This Framework has the potential to provide organisations with the much needed guidance in their attempts to convert current IT-driven service initiatives into successful service-centric business models.
Resumo:
Various reasons have been proffered for female under-representation in tertiary information technology (IT) courses and the IT industry with most relating to cultural moirés. The 2006 Geek Goddess calendar was designed to alter IT’s “geeky image” and the term is used here to represent young women enrolled in pre-service IT teaching courses. Their special mix of IT and teaching draws on conflicting stereotypes and represents a micro-climate which is typically lost in studies of IT occupations because of the aggregation of all IT roles. This paper will report on a small-scale investigation of female students (N=25) at a university in Queensland (Australia) studying to become teachers of secondary IT subjects. They are entering the IT industry, gendered as a “male” occupation, through the safe space of teaching a discipline allied to feminine qualities of nurturing. They are “geek goddesses” who – perhaps to balance the masculine and feminine of these occupations - have decided to go to school rather than into corporations or government.
Resumo:
The service-orientation paradigm has not only become prevalent in the software systems domain in recent years, but is also increasingly applied on the business level to restructure organisational capabilities. In this paper, we present the results of an extensive literature review of 30 approaches related to service identification and analysis for both domains. Based on the consolidation of a superset of comparison criteria for service-oriented methodologies found in related literature, we compare and evaluate the different characteristics of service engineering methods with a focus on service analysis. Although a close business and IT alignment is regarded as one of the core beneficial promises of service-orientation, our analysis suggests that there is a lack of unified, comprehensive methodology for service identification and analysis integrating and addressing both domains. Thus, we discuss how our results can inform directions for future research in this area.
Resumo:
Although the service-oriented paradigm has been well established in the technical domain for quite some time now, service governance is still considered a research gap. To ensure adequate governance, there is a necessity to manage services as first-class assets throughout the lifecycle. Now that the concept of ser-vice-orientation is also increasingly applied on the business level to structure an organisation’s capabili-ties, the problem has become an even bigger chal-lenge. This paper presents a generic business and software service lifecycle and aligns it with the com-mon management layers in organisations. Using ser-vice analysis as an example, it moreover illustrates how activities in the service lifecycle may vary on lower levels of granularity depending on the focus on business or software services.
Resumo:
Digital forensics relates to the investigation of a crime or other suspect behaviour using digital evidence. Previous work has dealt with the forensic reconstruction of computer-based activity on single hosts, but with the additional complexity involved with a distributed environment, a Web services-centric approach is required. A framework for this type of forensic examination needs to allow for the reconstruction of transactions spanning multiple hosts, platforms and applications. A tool implementing such an approach could be used by an investigator to identify scenarios of Web services being misused, exploited, or otherwise compromised. This information could be used to redesign Web services in order to mitigate identified risks. This paper explores the requirements of a framework for performing effective forensic examinations in a Web services environment. This framework will be necessary in order to develop forensic tools and techniques for use in service oriented architectures.
Resumo:
Networks are having a profound impact on the way society is organised at the local, national and international level. Networks are not ‘business as usual’. The defining feature of networks and a key indicator for their success is the strength and quality of the interactions between members. This relational power of networks provides the mechanism to bring together previously dispersed and even competitive entities into a collective venture. Such an operating context demands the ability to work in a more horizontal, relational manner. In addition a social infrastructure must be formed that will support and encourage efforts to become more collaborative. This paper seeks to understand how network members come to know about working in networks, how they work on their relationships and create new meanings about the nature of their linked work. In doing so, it proposes that learning, language and leadership, herein defined as the ‘3Ls’ represent critical mediating aspects for networks.
Resumo:
The purpose of this research is to capture and interpret the stories of “outsider” managers who make the transition to the public sector. These experiences are considered in the context of efforts to shift public management culture in a direction consistent with meeting contemporary demands placed on public sector organisations. It is often noted that an important strategy for changing culture is the infusion of outsiders. Outsiders are thought to bring new perspectives that, through a dialectical process (Van de Ven 1995), create the potential for change. While there have been cross-sector comparisons (Broussine 1990; Silfvast 1994; Redman 1997), little attention has been given to the experience of those who make the transition in the context of efforts to reform public sector management culture. Not only is the infusion of private sector managers into the public sector a potential culture change strategy, it is also a personal experience for those who make the transition. Boundary crossing is typically an anxiety provoking experience (Van Maanen & Schein 1979) and the quality of this experience influences decisions to commit, engage, disengage or exit. The quality of the experience is likely to be affected by how the public organisation responds to people making this transition, that is, their investment in people processing (Saks 2007). The cost of recruitment and selection processes at middle and senior management levels warrants a greater research focus on this transition. In this paper we argue that the experiences of those who make the transition from private to public sectors has much to tell us about the traps that transition managers experience in making this change, the implications for injecting outsider managers as a strategy for achieving public management culture change, and how reform-oriented public organisations can manage the transitions of outsider managers into the public sector in order that best value might be achieved for both the individual and organisational change goals.
Resumo:
Paramedics are at high risk of exposure to infectious diseases because they frequently undertake procedures such as the use and disposal of sharps as components of everyday practice. While the literature demonstrates that the management of sharps is problematic across all health disciplines, there is a paucity of research examining sharps management practices in the Australian pre-hospital paramedic context. This study examines knowledge and practices of sharps control among paramedics in Queensland, Australia. A mail survey focusing on infection control knowledge and practices was sent to all clinical personnel of the Queensland Ambulance Service (QAS) (N = 2274). A total of 1258 surveys were returned, a response rate of 55.3%. Participants responded to 12 true/false statements on the management of sharps and three questions about recapping practices. Most respondents were knowledgeable about the correct management of sharps, with a mean of 11.28 (out of 12, SD = 1.32). When gauging reported practices, more than half (59.1%, n = 736) of participants reported recapping a needle, and 38.5% (n = 479) reported never having done so. These results reflect good knowledge of general management of sharps among respondents, but suggest deficits regarding reported practices. The results suggest that a comprehensive ambulance in-service education programme focusing particularly on sharps management is required. The study highlights the need for further research on sharps management practices in the field, identification of barriers to safe sharps practices in pre-hospital settings, and 'best practice' for translating good sharps management knowledge into practice.
Resumo:
Introduction: Paramedics and other emergency health workers are exposed to infectious disease particularly when undertaking exposure-prone procedures as a component of their everyday practice. This study examined paramedic knowledge of infectious disease aetiology and transmission in the pre-hospital care environment.--------- Methods: A mail survey of paramedics from an Australian ambulance service (n=2274) was conducted.--------- Results: With a response rate of 55.3% (1258/2274), the study demonstrated that paramedic knowledge of infectious disease aetiology and modes of transmission was poor. Of the 25 infectious diseases included in the survey, only three aetiological agents were correctly identified by at least 80% of respondents. The most accurate responses for aetiology of individual infectious diseases were for HIV/AIDS (91.4%), influenza (87.4%), and hepatitis B (85.7%). Poorest results were observed for pertussis, infectious mononucleosis, leprosy, dengue fever, Japanese B encephalitis and vancomycin resistant enterococcus (VRE), all with less than half the sample providing a correct response. Modes of transmission of significant infectious diseases were also assessed. Most accurate responses were found for HIV/AIDS (85.8%), salmonella (81.9%) and influenza (80.1%). Poorest results were observed for infectious mononucleosis, diphtheria, shigella, Japanese B encephalitis, vancomycin resistant enterococcus, meningococcal meningitis, rubella and infectious mononucleosis, with less than a third of the sample providing a correct response.--------- Conclusions: Results suggest that knowledge of aetiology and transmission of infectious disease is generally poor amongst paramedics. A comprehensive in-service education infection control programs for paramedics with emphasis on infectious disease aetiology and transmission is recommended.
Resumo:
An emerging source of competitive advantage for service industries is the knowledge, skills and attitudes of their employees. Indeed, achievement of a 'service quality' culture, considered imperative for competitive advantage in service organisations, supposedly results from the use of best practice human resource management (HRM), and from a strategic approach to their implementation. This paper empirically explores the use of these dimensions of HRM as a source of competitive advantage. It finds high-performing service organisations actively engage best practices across the areas of recruitment and selection, training and development, communication and team working. Evidence of a strategic approach to the implementation of these practices is also found.