927 resultados para Information visualisation
Resumo:
Preface The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13–15 July, 2004. The conference was sponsored by the Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie University and the Australian Computer Society. The aims of the conference are to bring together researchers and practitioners working in areas of information security and privacy from universities, industry and government sectors. The conference program covered a range of aspects including cryptography, cryptanalysis, systems and network security. The program committee accepted 41 papers from 195 submissions. The reviewing process took six weeks and each paper was carefully evaluated by at least three members of the program committee. We appreciate the hard work of the members of the program committee and external referees who gave many hours of their valuable time. Of the accepted papers, there were nine from Korea, six from Australia, five each from Japan and the USA, three each from China and Singapore, two each from Canada and Switzerland, and one each from Belgium, France, Germany, Taiwan, The Netherlands and the UK. All the authors, whether or not their papers were accepted, made valued contributions to the conference. In addition to the contributed papers, Dr Arjen Lenstra gave an invited talk, entitled Likely and Unlikely Progress in Factoring. This year the program committee introduced the Best Student Paper Award. The winner of the prize for the Best Student Paper was Yan-Cheng Chang from Harvard University for his paper Single Database Private Information Retrieval with Logarithmic Communication. We would like to thank all the people involved in organizing this conference. In particular we would like to thank members of the organizing committee for their time and efforts, Andrina Brennan, Vijayakrishnan Pasupathinathan, Hartono Kurnio, Cecily Lenton, and members from ACAC and INSS.
Resumo:
The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.
Resumo:
While the growth in the number of IT investments remains strong, research in the IT investment field is limited, resulting in suboptimal practical guidance on effectively governing IT investments. Based on resource-based theory, this paper reports the initial work involved in developing a construct names IT investment governance (ITIG), because it can be used to measure organizations' capability to govern their IT investments. This paper then empirically examines the association of ITIG and corporate performance. The preliminary result is a four-factor, 16-item instrument for assessing the ITIG construct. This method's factors are IT investment value governance, IT investment value monitoring, IT investment appraisals and IT investment project management. The impact of ITIG on corporate performance was demonstrated with a significant and positive relationship found to exist between the ITIG construct and corporate performance, thus supporting the effectiveness of the ITIG construct. Corporations with higher levels of ITIG capability are more likely to maximize the contribution of their IT investments to firm value.
The dual nature of information systems in enabling a new wave of hardware ventures: Towards a theory
Resumo:
Hardware ventures are emerging entrepreneurial firms that create new market offerings based on development of digital devices. These ventures are important elements in the global economy but have not yet received much attention in the literature. Our interest in examining hardware ventures is specifically in the role that information system (IS) resources play in enabling them. We ask how the role of IS resources for hardware ventures can be conceptualized and develop a framework for assessment. Our framework builds on the distinction of operand and operant resources and distinguishes between two key lifecycle stages of hardware ventures: start-up and growth. We show how this framework can be used to discuss the role, nature, and use of IS for hardware ventures and outline empirical research strategies that flow from it. Our work contributes to broadening and enriching the IS field by drawing attention to its role in significant and novel phenomena.
Resumo:
The objective of this review is to locate, critically appraise and synthesize evidence on the effectiveness of communication strategies for providing older people access to information regarding in-home health and social care services. The review question is: What is the effectiveness of communication interventions in providing older people with information about in-home health and social care services?
Resumo:
This thesis provides a review of 199 papers published on Green IT/IS between 2007−2014, in order to present taxonomy of segments in Green IT/IS publications, where the segments are later used for multiple analyses to facilitate future research and to provide a retrospective analysis of existing knowledge and gaps thereof. This research also attempts to make a unique contribution to our understanding of Green IT/IS, by consolidating papers it observes current patterns of literature through approach analysis and segmentation, as well as allocating studies to the technology, process, or outcome (TPO) stage. Highlighting the necessity of a consolidated approach, these classification systems have been combined into a TPO matrix so that the studies could be arranged according to which stage of the Green IT/IS cycle they were focused on. We believe that these analyses will provide a solid platform from which future Green IT/IS research can be launched.
Resumo:
Background The use of the internet to access information is rapidly increasing; however, the quality of health information provided on various online sites is questionable. We aimed to examine the underlying factors that guide parents' decisions to use online information to manage their child's health care, a behaviour which has not yet been explored systematically. Methods Parents (N=391) completed a questionnaire assessing the standard theory of planned behaviour (TPB) measures of attitude, subjective norm, perceived behavioural control (PBC), and intention as well as the underlying TPB belief-based items (i.e., behavioural, normative, and control beliefs) in addition to a measure of perceived risk and demographic variables. Two months later, consenting parents completed a follow-up telephone questionnaire which assessed the decisions they had made regarding their use of online information to manage their child's health care during the previous 2 months. Results We found support for the TPB constructs of attitude, subjective norm, and PBC as well as the additional construct of perceived risk in predicting parents' intentions to use online information to manage their child's health care, with further support found for intentions, but not PBC, in predicting parents' behaviour. The results of the TPB belief-based analyses also revealed important information about the critical beliefs that guide parents' decisions to engage in this child health management behaviour. Conclusions This theory-based investigation to understand parents' motivations and online information-seeking behaviour is key to developing recommendations and policies to guide more appropriate help-seeking actions among parents.
Resumo:
This project examined the role that written specifications play in the building procurement process and the relationship that specifications should have with respect to the use of BIM within the construction industry. A three-part approach was developed to integrate specifications, product libraries and BIM. Typically handled by different disciplines within project teams, these provide the basis for a holistic approach to the development of building descriptions through the design process and into construction.
Resumo:
Skills in spatial sciences are fundamental to understanding our world in context. Increasing digital presence and the availability of data with accurate spatial components has allowed almost everything researchers and students do to be represented in a spatial context. Representing outcomes and disseminating information has moved from 2D to 4D with time series animation. In the next 5 years industry will not only demand QUT graduates have spatial skills along with analytical skills, graduates will be required to present their findings in spatial visualizations that show spatial, spectral and temporal contexts. Domains such as engineering and science will no longer be the leaders in spatial skills as social sciences, health, arts and the business community gain momentum from place-based research including human interactions. A university that can offer students a pathway to advanced spatial investigation will be ahead of the game.
Resumo:
This project developed a visual strategy and graphic outcomes to communicate the results of a scientific collaborative project to the Mackay community. During 2013 and 2014 a team from CSIRO engaged with the community in Mackay to collaboratively develop a set of strategies to improve the management of the Great Barrier Reef. The result of this work was a 300+ page scientific report that needed to be translated and summarised to the general community. The aim of this project was to strategically synthesise information contained in the report and to design and produce an outcome to be distributed to the participant community. By working with the CISRO researchers, an action toolkit was developed, with twelve cards and a booklet. Each card represented the story behind a certain local management issue and the actions that the participants suggested should be taken in order to improve management of The Reef. During the design synthesis it was identified that for all management issues there was a reference to the need to develop some sort of "educational campaign" to the area. That was then translated as an underlying action to support all other actions proposed in the toolkit.
Resumo:
Information security and privacy in the healthcare domain is a complex and challenging problem for computer scientists, social scientists, law experts and policy makers. Appropriate healthcare provision requires specialized knowledge, is information intensive and much patient information is of a particularly sensitive nature. Electronic health record systems provide opportunities for information sharing which may enhance healthcare services, for both individuals and populations. However, appropriate information management measures are essential for privacy preservation...
Resumo:
This research explored the knowledge, skills, qualities, and professional education needs, of information professionals in galleries, libraries, archives and museums (GLAM) in Australia. The findings revealed that although full convergence of these sectors is unlikely, many of the skills, knowledge and qualities would be required across all four sectors. The research used the Grounded Delphi Method, a relatively new methodological extension of the Delphi method that incorporates aspects of Grounded Theory. The findings provide the first empirically based guidelines around what needs to be included in an educational framework for information professionals who will work in the emerging GLAM environment. As the first study of GLAM education requirements in Australia and the wider Asia-Pacific region to take a holistic approach by engaging information professionals across all four sectors, this thesis makes a contribution to the GLAM research field and to information education generally.
Resumo:
This paper reflects on the critical need for an urgent transformation of higher education curriculum globally, to equip society with professionals who can address our 21st Century sustainable living challenges. Specifically it discusses a toolkit called the ‘Engineering Sustainable Solutions Program’, which is a freely available, rigorously reviewed and robust content resource for higher education institutions to access content on innovations and opportunities in the process of evolving the curriculum...
Resumo:
The purpose of this paper is to investigate how social media may support information encountering (i.e., where individuals encounter useful and interesting information while seeking or browsing for some other information) and how this may lead to facilitation of tacit knowledge creation and sharing. The study employed a qualitative survey design that interviewed twenty-four physicians who were active users of social media to better understand the phenomenon of information encountering on social media. The data was analysed using the thematic analysis approach. The study found six main ways through which social media supports information encountering. Furthermore, drawing upon knowledge creation theories, the study concluded that information encountering on social media facilitates tacit knowledge creation and sharing among individuals. The study provides new directions for further empirical investigations to examine whether information encountering on social media actually leads to tacit knowledge creation and sharing. The findings of the study may also provide opportunities for users to adopt social media effectively or gain greater value from social media use.
Resumo:
This paper presents a new active learning query strategy for information extraction, called Domain Knowledge Informativeness (DKI). Active learning is often used to reduce the amount of annotation effort required to obtain training data for machine learning algorithms. A key component of an active learning approach is the query strategy, which is used to iteratively select samples for annotation. Knowledge resources have been used in information extraction as a means to derive additional features for sample representation. DKI is, however, the first query strategy that exploits such resources to inform sample selection. To evaluate the merits of DKI, in particular with respect to the reduction in annotation effort that the new query strategy allows to achieve, we conduct a comprehensive empirical comparison of active learning query strategies for information extraction within the clinical domain. The clinical domain was chosen for this work because of the availability of extensive structured knowledge resources which have often been exploited for feature generation. In addition, the clinical domain offers a compelling use case for active learning because of the necessary high costs and hurdles associated with obtaining annotations in this domain. Our experimental findings demonstrated that 1) amongst existing query strategies, the ones based on the classification model’s confidence are a better choice for clinical data as they perform equally well with a much lighter computational load, and 2) significant reductions in annotation effort are achievable by exploiting knowledge resources within active learning query strategies, with up to 14% less tokens and concepts to manually annotate than with state-of-the-art query strategies.