879 resultados para Information resourses
Resumo:
Because of its size, its excellent VET history, and its emerging higher education provision, AIM is in a special position to be an exemplar of good practice in the VET-HE transition. Many dual sector providers, by virtue of their size, tend to focus on higher education, on the assumption that VET ‘competence’ implies that their VET entrants to HE are confident and capable in information literacy skills. While this is only one of the many challenges that such students face in their undergraduate programs, it is the most critical for most of them in their quest for academic success. All students (school leavers, gap-year participants, articulating, mature age) entering HE will face specific challenges. For articulating students, the nature of credit transfer arrangements will often mean they commence studies in units that are not designated first year units. In this case, the embedded support structures are not as prominent. The existing literature is not consistent in reports on the rates of completion, retention and attrition of articulating students. There is some evidence that VET-qualified students have higher retention rates than school leavers [1], but limited information literacy skills can lead to attrition [2].
Resumo:
Typing 2 or 3 keywords into a browser has become an easy and efficient way to find information. Yet, typing even short queries becomes tedious on ever shrinking (virtual) keyboards. Meanwhile, speech processing is maturing rapidly, facilitating everyday language input. Also, wearable technology can inform users proactively by listening in on their conversations or processing their social media interactions. Given these developments, everyday language may soon become the new input of choice. We present an information retrieval (IR) algorithm specifically designed to accept everyday language. It integrates two paradigms of information retrieval, previously studied in isolation; one directed mainly at the surface structure of language, the other primarily at the underlying meaning. The integration was achieved by a Markov machine that encodes meaning by its transition graph, and surface structure by the language it generates. A rigorous evaluation of the approach showed, first, that it can compete with the quality of existing language models, second, that it is more effective the more verbose the input, and third, as a consequence, that it is promising for an imminent transition from keyword input, where the onus is on the user to formulate concise queries, to a modality where users can express more freely, more informal, and more natural their need for information in everyday language.
Resumo:
This paper introduces a modified Kano approach to analysing and classifying quality attributes that drive student satisfaction in tertiary education. The approach provides several benefits over the traditional Kano approach. Firstly, it uses existing student evaluations of subjects in the educational institution instead of purpose-built surveys as the data source. Secondly, since the data source includes qualitative comments and feedback, it has the exploratory capability to identify emerging and unique attributes. Finally, since the quality attributes identified could be tied directly to students’ detailed feedback, the approach enables practitioners to easily translate the results into concrete action plans. In this paper, the approach is applied to analysing 26 subjects in the information systems school of an Australia university. The approach has enabled the school to uncover new quality attributes and paves the way for other institutions to use their student evaluations to continually understand and addressed students’ changing needs.
Resumo:
The increasing amount of information that is annotated against standardised semantic resources offers opportunities to incorporate sophisticated levels of reasoning, or inference, into the retrieval process. In this position paper, we reflect on the need to incorporate semantic inference into retrieval (in particular for medical information retrieval) as well as previous attempts that have been made so far with mixed success. Medical information retrieval is a fertile ground for testing inference mechanisms to augment retrieval. The medical domain offers a plethora of carefully curated, structured, semantic resources, along with well established entity extraction and linking tools, and search topics that intuitively require a number of different inferential processes (e.g., conceptual similarity, conceptual implication, etc.). We argue that integrating semantic inference in information retrieval has the potential to uncover a large amount of information that otherwise would be inaccessible; but inference is also risky and, if not used cautiously, can harm retrieval.
Resumo:
Despite a wealth of studies focusing on innovation, types of innovations and their outcomes, the process of innovation has largely been under studied. In 2010, Swanson calls for researchers to address the ‘innovation process black box’, to better understand how IT innovation potential can be exploited upon. This study derives and instantiates three unique and mutually exclusive innovation execution mechanisms: Continual, Progressive and Plug and Play. The innovation execution mechanisms of this study are developed with reference to Swanson (1994) Information Systems innovation types.
Resumo:
‘Spatial governance’ involves a large number of situations where knowledge of place and time is important in achieving acceptable organisational outcomes. This paper argues that spatial governance calls for information-intensive activity in three main areas. The first establishes ‘authority’ in a legal entity to decide issues regarding resources within a territorial jurisdiction. The second involves planning the future use of resources. It engages a language of design, purpose, modeling, visualization, expectations and risk. The third involves monitoring of outcomes to see if expectations are met; and whether changes to authority and planning regimes need to be made in the light of experience. This engages a language of observing, recording, accounting, auditing, statistical indicators and accountability. ‘Authority’, ‘planning’ and ‘monitoring’ regimes can be constructed using a relatively small number of elements, in much the same way that a large number of words with recognisable meanings can be created using a relatively few standardised letters of the alphabet. Words can combine in a similar process of combinatorial explosion to create any message that can be imagined. Similarly, combining authority, planning and monitoring regimes can create a metalanguage of ‘spatial governance’ to give purpose, meaning and value to any spatiotemporal information system that can be imagined, described, interpreted and understood.
Resumo:
The use of seafood ecolabels is expanding in the world marketplace, but so are labels indicating other product attributes, such as country of origin and wild vs. farmed. The interactive effects of these labels and attributes in evaluating consumers' preferences for ecolabeled seafood are relatively unexplored. In this paper we investigate (1) the direct and interactive effects of seafood ecolabels with other common fish labels, and (2) how consumers' perceptions about the state of marine stocks and the valuation of ecolabels may be affected by different information. We find moderate interactive effects between ecolabels and country of origin labels, whereas the valuation for seafood ecolabels is fairly high. In terms of information, we find that consumers' perceptions about fish stock levels changed (negatively) after receiving information on declining stock levels, and more sensationalized information led to increased change. However, valuation for a seafood ecolabel increases only when the information was perceived positively (credible/interesting); whereas exaggerated information (which was also perceived less credible) had insignificant effects on WTP.
Resumo:
Our contribution to this volume is not on the work of the teacher who inspires the child writer, but the teacher as the writer and illustrator of multilingual texts for classroom use that inspires the child reader. This chapter focuses on a first time teacher writer from Fiji, Bereta , who participated in a two day writing workshop known as the Information Text Awareness Project (hereafter ITAP). This chapter commences with an overview of the ITAP which was conducted in Nadi, Fiji, in 2012 with Bereta and 17 teachers from urban, semi-urban and rural contexts within the Nadi educational district. The politics of presenting Western ways of knowing to teachers from diverse cultural and linguistic contexts via a Western pedagogical approach is explored in the second section. We believe that this work involves a moral dimension that needs careful consideration. The third section outlines the eight stages of ITAP where teacher writers such as Bereta produced an English and a vernacular information text for use in their classrooms. The outline of the eight stages of ITAP is justified with links to the research literature. The final section recounts Bereta’s interview data where she talks about using the newly created English and vernacular information texts in the classroom and the community’s response to her inaugural publications. The findings may be of interest to those seeking to establish an adult writing cooperative to produce English and vernacular information texts for classroom use.
Resumo:
Teachers in the Pacific region have often signalled the need for more locally produced information texts in both the vernacular and English, to engage their readers with local content and to support literacy development across the curriculum. The Information Text Awareness Project (ITAP), initially informed by the work of Nea Stewart-Dore, has provided a means to address this need through supporting local teachers to write their own information texts. The article reports on the impact of an ITAP workshop carried out in Nadi, Fiji in 2012. Nine teacher volunteers from the project trialled the use of the texts in their classrooms with positive results in relation to student learning and belief in themselves as writers.
Resumo:
POSTER: Information Accountability Framework (IAF) to mitigate and manage the risk of data breaches and unauthorised used of medical information (e.g., Electronic Health Records)
Resumo:
Building information modelling (BIM) radically changes the practices in architecture, engineering and construction (AEC) and creates new job opportunities. Many governments, such as the United Kingdom, have made BIM a mandatory requirement. This substantially drives the demand for a BIM-literate workforce. Universities are facing the challenge to incorporate BIM into their curricula and produce “BIM ready” graduates to meet the needs of the industry. Like other universities, Queensland University of Technology (QUT) is at the heart of this change and aspires to develop collaborative BIM education across AEC. Previous BIM education studies identify that inadequate BIM awareness of AEC academics is one of the challenges for developing a BIM curriculum and there is a dearth in the learning and teaching support for academics on BIM education. Equipping the AEC academics for a more BIM focused curriculum is all the while more important. This paper aims to leverage knowledge drawn from a Learning & Teaching project currently undertaken at QUT. Its specific objectives are to: 1) review the existing learning and teaching initiatives on BIM education; and 2) briefly describe the learning and teaching activities on collaborative BIM education at QUT. Significance of the paper lies on revealing the importance of building up the capacity of AEC academics for collaborative BIM education. The paper contributes to sparking the interests in better equipping AEC academics to understand what curriculum changes would assist in BIM uptake within the relevant courses to provide context for changes in units; and how the use of BIM can improve the understanding by students of the large amounts of professional knowledge they need to function effectively as graduates.
Resumo:
The advent of the Australian Charities and Not-for-profits Commission (ACNC) in 2012 and submission of Annual Information Statements (AIS) in 2013 by those charities which registered with them, have allowed new measures to be taken of charities and their activities. This report examines the filed AIS data for Queensland charities and compares it with the overall Australian population of charities.
Resumo:
Preface The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13–15 July, 2004. The conference was sponsored by the Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie University and the Australian Computer Society. The aims of the conference are to bring together researchers and practitioners working in areas of information security and privacy from universities, industry and government sectors. The conference program covered a range of aspects including cryptography, cryptanalysis, systems and network security. The program committee accepted 41 papers from 195 submissions. The reviewing process took six weeks and each paper was carefully evaluated by at least three members of the program committee. We appreciate the hard work of the members of the program committee and external referees who gave many hours of their valuable time. Of the accepted papers, there were nine from Korea, six from Australia, five each from Japan and the USA, three each from China and Singapore, two each from Canada and Switzerland, and one each from Belgium, France, Germany, Taiwan, The Netherlands and the UK. All the authors, whether or not their papers were accepted, made valued contributions to the conference. In addition to the contributed papers, Dr Arjen Lenstra gave an invited talk, entitled Likely and Unlikely Progress in Factoring. This year the program committee introduced the Best Student Paper Award. The winner of the prize for the Best Student Paper was Yan-Cheng Chang from Harvard University for his paper Single Database Private Information Retrieval with Logarithmic Communication. We would like to thank all the people involved in organizing this conference. In particular we would like to thank members of the organizing committee for their time and efforts, Andrina Brennan, Vijayakrishnan Pasupathinathan, Hartono Kurnio, Cecily Lenton, and members from ACAC and INSS.
Resumo:
The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.