438 resultados para Conferences


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Traditionally, conceptual modelling of business processes involves the use of visual grammars for the representation of, amongst other things, activities, choices and events. These grammars, while very useful for experts, are difficult to understand by naive stakeholders. Annotations of such process models have been developed to assist in understanding aspects of these grammars via map-based approaches, and further work has looked at forms of 3D conceptual models. However, no one has sought to embed the conceptual models into a fully featured 3D world, using the spatial annotations to explicate the underlying model clearly. In this paper, we present an approach to conceptual process model visualisation that enhances a 3D virtual world with annotations representing process constructs, facilitating insight into the developed model. We then present a prototype implementation of a 3D Virtual BPMN Editor that embeds BPMN process models into a 3D world. We show how this gives extra support for tasks performed by the conceptual modeller, providing better process model communication to stakeholders..

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Networks form a key part of the infrastructure of contemporary governance arrangements and, as such, are likely to continue for some time. Networks can take many forms and be formed for many reasons. Some networks have been explicitly designed to generate a collective response to an issue; some arise from a top down perspective through mandate or coercion; while others rely more heavily on interpersonal relations and doing the right thing. In this paper, these three different perspectives are referred to as the “3I”s: Instrumental, Institutional or Interpersonal. It is proposed that these underlying motivations will affect the process dynamics within the different types of networks in different ways and therefore influence the type of outcomes achieved. This proposition is tested through a number of case studies. An understanding of these differences will lead to more effective design, management and clearer expectations of what can be achieved through networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The emergence of Enterprise Resource Planning systems and Business Process Management have led to improvements in the design, implementation, and overall management of business processes. However, the typical focus of these initiatives has been on internal business operations, assuming a defined and stable context in which the processes are designed to operate. Yet, a lack of context-awareness for external change leads to processes and supporting information systems that are unable to react appropriately and timely enough to change. To increase the alignment of processes with environmental change, we propose a conceptual framework that facilitates the identification of context change. Based on a secondary data analysis of published case studies about process adaptation, we exemplify the framework and identify four general archetypes of context-awareness. The framework, in combination with the learning from the case analysis, provides a first understanding of what, where, how, and when processes are subjected to change.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In a competitive environment, companies continuously innovate to offer superior services at lower costs. ‘Shared services’ have been extensively adopted in practice as one means for improving organisational performance. Shared services is considered most appropriate for support functions, and is widely adopted in Human Resource Management, Finance and Accounting; more recently being employed across the Information Systems function. IS applications and infrastructure are an important enabler and driver of shared services in all functional areas. As computer based corporate information systems have become de facto and the internet pervasive and increasingly the backbone of administrative systems, the technical impediments to sharing have come down dramatically. As this trend continues, CIOs and IT professionals will need a deeper understanding of the shared services phenomenon and its implications. The advent of shared services has consequential implications for the IS academic discipline. Yet, archival analysis of IS the academic literature reveals that shared services, though mentioned in more than 100 articles, has received little in depth attention. This paper is the first attempt to investigate and report on the current status of shared services in the IS literature. The paper presents detailed review of literature from main IS journals and conferences, findings evidencing a lack of focus and definitions and objectives lacking conceptual rigour. The paper concludes with a tentative operational definition, a list of perceived main objectives of shared services, and an agenda for related future research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider a new form of authenticated key exchange which we call multi-factor password-authenticated key exchange, where session establishment depends on successful authentication of multiple short secrets that are complementary in nature, such as a long-term password and a one-time response, allowing the client and server to be mutually assured of each other's identity without directly disclosing private information to the other party. Multi-factor authentication can provide an enhanced level of assurance in higher-security scenarios such as online banking, virtual private network access, and physical access because a multi-factor protocol is designed to remain secure even if all but one of the factors has been compromised. We introduce a security model for multi-factor password-authenticated key exchange protocols, propose an efficient and secure protocol called MFPAK, and provide a security argument to show that our protocol is secure in this model. Our security model is an extension of the Bellare-Pointcheval-Rogaway security model for password-authenticated key exchange and accommodates an arbitrary number of symmetric and asymmetric authentication factors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Success in modern business demands effective information literacy to address the ever-changing business context. This context includes changes in Government policy reflected through legislation and regulations, developments in case law and expectations of professional associations and the public. Students require the skills to continue their own learning beyond the completion of their degree, since learning the subject content of a course alone sufficient. This paper considers the methods utilised to embed information literacy, in the context of generic skills and graduate attributes, into a Business degree’s curriculum. The paper describes how information literacy has been embedded in two sequential third-year Taxation Law courses, allowing for the explicit development of information literacy. Through the development of legal reasoning and research skills, students are empowered to continue their lifelong learning, which successful professional practice demands. The study will draw upon the experience of the course convener in designing, teaching and evaluating the courses, and on students’ experiences as illustrated through evaluation questionnaire responses and interviews. The findings of this study could be relevant to other business courses, especially company law and auditing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Globality generates increasingly diffuse networks of human and non-human innovators, carriers and icons of exotic, polyethnic cosmopolitan difference; and this diffusion is increasingly hard to ignore or police (Latour 1993). In fact, such global networks of material-symbolic exchange can frequently have the unintended consequence of promoting status systems and cultural relationships founded on uncosmopolitan values such as cultural appropriation and status-based social exclusion. Moreover, this materialsymbolic engagement with cosmopolitan difference could also be rather mundane, engaged in routinely without any great reflexive consciousness or capacity to destabilise current relations of cultural power, or interpreted unproblematically as just one component of a person’s social environment. Indeed, Beck’s (2006) argument is that cosmopolitanism, in an age of global risk, is being forced upon us unwillingly, so there should be no surprise if it is a bitter pill for some to swallow. Within these emergent cosmopolitan networks, which we call ‘cosmoscapes’, there is no certainty about the development of ethical or behavioural stances consistent with claims foundational to the current literature on cosmopolitanism. Reviewing historical and contemporary studies of globality and its dynamic generative capacity, this paper considers such literatures in the context of studies of cultural consumption and social status. When one positions these diverse bodies of literature against one another, it becomes clear that the possibility of widespread cosmopolitan cultural formations is largely unpromising.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

New media, as a free and universal communication tool, has had an impact on the power of the general public to comment on a variety of issues. As the public can comment favourably or unfavourably on advertisements, such as on Youtube, the advertising industry must start using weblogs to research reaction to their advertising campaigns. This exploratory study examines the responses of some advertising industry practitioners, both advertisers and agencies, on the impact of new media, specifically weblogs, and the use of new media as a source of research on advertising campaigns.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Few frameworks exist for the teaching and assessment of programming subjects that are coherent and logical. Nor are they sufficiently generic and adaptable to be used outside the particular tertiary institutions in which they were developed. This paper presents the Teaching and Assessment of Software Development (TASD) frame-work. We describe its development and implementation at an Australian university and demonstrate, with examples, how it has been used, with supporting data. Extracts of criteria sheets (grading rubrics) for a variety of assessment tasks are included. The numerous advantages of this new framework are discussed with comparisons made to those reported in the published literature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It has been 150 years since the Queensland public service was established. This paper looks back over the successive civil and public service acts in Queensland from 1859 to 2009, to examine the why the acts were passed, the changing structure of the public sector and the political justifications for the changes. It will establish how much has changed and how much has stayed the same over 150 years. Discussions regarding the success of the public service acts will be approached from an accountability perspective and will work to determine how effective the legislation has been in creating an independent and efficient public sector. The paper will demonstrate that change has occurred but some of it has turned back on itself;proposals that were rejected in the past have reappeared as fresh ideas and innovations. Finally, the paper will make conclusions as to the progress or repetition of public sector legislation in Queensland.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Digital forensics investigations aim to find evidence that helps confirm or disprove a hypothesis about an alleged computer-based crime. However, the ease with which computer-literate criminals can falsify computer event logs makes the prosecutor's job highly challenging. Given a log which is suspected to have been falsified or tampered with, a prosecutor is obliged to provide a convincing explanation for how the log may have been created. Here we focus on showing how a suspect computer event log can be transformed into a hypothesised actual sequence of events, consistent with independent, trusted sources of event orderings. We present two algorithms which allow the effort involved in falsifying logs to be quantified, as a function of the number of `moves' required to transform the suspect log into the hypothesised one, thus allowing a prosecutor to assess the likelihood of a particular falsification scenario. The first algorithm always produces an optimal solution but, for reasons of efficiency, is suitable for short event logs only. To deal with the massive amount of data typically found in computer event logs, we also present a second heuristic algorithm which is considerably more efficient but may not always generate an optimal outcome.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This 90 minute panel session is designed to explore issues relating to the teaching of drama, performance studies, and theatre studies within Higher Education. Some of the issues that will be raised include: developing an understanding of the learning that students believe they are experiencing through performance; contemporary models for teaching; and the suggestion that the body can be an important site for acquiring a variety of different knowledges. Paul Makeham will present a general position paper to commence the session (15 minutes). Maryrose Casey, Gillian Kehoul, and Delyse Ryan will each speak briefly (15 minutes) about aspects of their research into Higher Education teaching before opening the floor for a round-table discussion of issues affecting the teaching of these disciplines.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In 2003, Bill Dunstone, John McCallum and Paul Makeham began a collaboration with researchers at the Centre for the Management of Arid Environments (CMAE) in Kalgoorlie, Western Australia. CMAE researchers are keen to develop 'people-oriented' strategies for implementing agricultural extension initiatives in their region. Traditional hierarchies of knowledge-transfer have impeded the 'connectedness' between community and researchers that gives meaning and relevance to useful practice (Ison and Russell, 2000). Our aim is to establish a partnership between the Live Events Research Network (LERN) and CMAE, investigating ways to link creative, performance-based research and practice with the scientific methodologies associated with natural resources management. This accords with recent work undertaken by Deborah Mills and Paul Brown, showing how community cultural development strategies enhance the implementation of policy concerned with community wellbeing. Mills and Brown 'adopted a concept of wellbeing which builds on a social and environmental view of health', and considered such themes as ecological sustainability, rural economic revitalisation, community strengthening, health and wellbeing (Mills, 2003). We propose that rangeland communities can creatively manage some of the challenges confronting them through performance-based projects which: - activate the stories through which a community enacts its sense of place; - facilitate live events in which the community enacts ownership of its culture and identity; - directly involve the community in the formulation of research issues