124 resultados para Information an communication technologies (ICTs)
Resumo:
Interdisciplinary learning is a form of knowledge production that is increasingly being embraced as an educational approach in higher education. A role of information and communication technologies (ICT) is to enhance interdisciplinary learning. Issues surrounding the mix of interdisciplinary pedagogic methodologies and emerging digital technologies are worthy of investigation. In this paper, the authors report the findings of a study that examined student perceptions of an interdisciplinary course on information technology (IT) and visual design that utilized a learning management system. Using questionnaire instrumentation, the authors sought the perceptions of first-year university students enrolled in a newly formed interdisciplinary IT course. Results indicate that ICT-based interdisciplinary learners prefer a self-directed and collaborative instructional modality, as well as teacher presence and interventions in the online environment. The types of student participation can significantly influence how students perceive ICT-based interdisciplinary learning design.
Resumo:
The Weberian sense of work and life suggests that working is something around which the rest of life flows. Moreover, work life and domestic life have been defined as separate for most people based on physical structures. That is, being physically in a building at work limited your ability to interact with those who are not nearby – not part of work. As such, social conventions regarding the uses of media at work have become part of our cultural sensibilities – we “know” it is not proper to have romantic discourse over the office phone, much less romance during work! Doing so becomes news. Yet, despite the construction of such distinctions, these workspaces and places have always been difficult to render as such. For example, one might consider the relatively recent development of teleworking from the 1980s or the “putting out system”[1] which dates back to the 1400s – both requiring work in the home. The papers in this special issue draw our attention to some of the ethical issues raised by the growing pervasiveness of information and communications technologies (ICTs) in our everyday lives and the fact that it is becoming increasingly difficult to make distinctions between being somewhere (like work) and being away from some things (like one’s friends, social interests and other parts of life that are not integrated into this space or place [2] )...
Resumo:
The ability of new information and communication technologies to pierce previously impenetrable physical, personal, and social boundaries has particular relevance to contemporary society and young people as there is now more information that can be collected, accessed, and distributed about individuals and groups. The ability to know about each other has become a central feature of many young people’s lives. The need to know is further complicated by other questions – Who knows? What do they know? What are the implications of this knowledge?. These questions are a consequence of society having become more mobile and networked enabling increased surveillance, tracking, and spreading of dis/information. With the acceleration of new pervasive and immersive technologies, these questions have taken on a new urgency and significance that go beyond an Orwellian Big Brother scenario. This chapter extends Foucault’s notion of the panopticon to take account of the challenges of an AmI environment of smart networked devices. By drawing on examples of recent young adult fiction, I examine some of the ways in which these texts invite their readers to reflect and speculate on the uneasy relationship between surveillance and democracy and what this means for individual rights and freedom, and a sense of place and belonging.
Resumo:
The travel and tourism industry has come to rely heavily on information and communication technologies to facilitate relations with consumers. Compiling consumer data profiles has become easier and it is widely thought that consumers place great importance on how that data is handled by firms. Lack of trust may cause consumers to have privacy concerns and may, in turn, have an adverse impact on consumers’ willingness to purchase online. Three specific aspects of privacy that have received attention from researchers are unauthorized use of secondary data, invasion of privacy, and errors. A survey study was undertaken to examine the effects of these factors on both prior purchase of travel products via the Internet and future purchase probability. Surprisingly, no significant relationships were found to indicate that such privacy concerns affect online purchase behavior within the travel industry. Implications for managers are discussed.
Resumo:
The integration of Information and Communication Technologies (ICT) into healthcare processes “eHealth” is driving enormous change in healthcare delivery and productivity. The transformations empower patients and present opportunities for new synergies between healthcare professionals, clinical decision makers, policy makers and educators. Technologies that are directly driving changes include Tele-medicine, Electronic health records (EHR), Standards to ensure computer systems inter-operate, Decision support systems, Data mining and easy access to medical information. This workshop provides an introduction to key informatics initiatives in eHealth using real examples and suggests how applications can be applied to modern society.
Resumo:
The Australian construction industry is often criticized for its comparatively low productivity. The most significant future productivity gains are predicted to arise from improvement in the firm’s project management. Information Communication Technologies (ICTs) are thought to offer such improvement. ICT adoption is particularly poor among Small and Medium Enterprises (SMEs). Existing studies provide only a general overview of adoption and diffusion of ICTs in SMEs, with no previous research measuring their readiness to adopt ICT. This paper outlines a theoretical approach to address this gap, exploring how to improve ICT adoption in Australian construction SMEs. A review of literature is undertaken to address the research question ‘What is the best conceptual approach to understanding ICT adoption in SMEs?’ The results emphasize the efficacy of a novel Technology Readiness and Acceptance Model (TRAM) to assess SMEs’ ICT implementation readiness. The proposed model consists of four major constructs to measure readiness comprising: - (1) optimism, - (2) innovativeness, - (3) discomfort and - (4) insecurity; two major constructs to measure technological acceptance comprising: - (1) perceived ease of use and - (2) perceived usefulness; and two extension variables comprising: - (1) self-efficacy and - (2) facilitating conditions. A limitation is that the performance of the conceptual model is yet to be tested empirically. Such research is planned in the coming year by the authors.
Resumo:
Public-private partnerships (PPPs) have generated a lot of interest from governments around the world for leveraging private sector involvement in developing and sustaining public infrastructure and services. Initially, PPPs were favoured by transport, energy, and other large infrastructure-intensive sectors. More recently, the concept has been expanded to include social sectors such as education.
Resumo:
This paper revisits the so-called ‘ICT-productivity paradox’ from a long-run perspective by using annual Australian data for 1965–2013. It provides estimates of long-run and short-run elasticities of labour productivity with respect to ICT capital deepening, and explores the nature of long-run causality among productivity growth and ICT and non-ICT capital deepening. The estimates of long-run elasticities are derived by employing both time-series and panel data econometric techniques. The empirical results provide strong confirmatory evidence of the long-run impact of ICT capital deepening on labour productivity in Australia.
Resumo:
This exploratory article examines the phenomenon of the ‘Quantified Self’—until recently, a subculture of enthusiasts who aim to discover knowledge about themselves and their bodies through self-tracking, usually using wearable devices to do so—and its implications for laws concerned with regulating and protecting health information. Quantified Self techniques and the ‘wearable devices’ and software that facilitate them—in which large transnational technology corporations are now involved—often involve the gathering of what would be considered ‘health information’ according to legal definitions, yet may occur outside the provision of traditional health services (including ‘e-health’) and the regulatory frameworks that govern them. This article explores the legal and regulatory framework for self-quantified health information and wearable devices in Australia and determines the extent to which this framework addresses privacy and other concerns that these techniques engender, along with suggestions for reform.
Resumo:
Since the industrial revolution, our world has experienced rapid and unplanned industrialization and urbanization. As a result, we have had to cope with serious environmental challenges. In this context, explanation of how smart urban ecosystems can emerge, gains a crucial importance. Capacity building and community involvement have always been the key issues in achieving sustainable development and enhancing urban ecosystems. By considering these, this paper looks at new approaches to increase public awareness of environmental decision making. This paper will discuss the role of Information and Communication Technologies (ICT), particularly Web-based Geographic Information Systems (Web-based GIS) as spatial decision support systems to aid public participatory environmental decision making. The paper also explores the potential and constraints of these web-based tools for collaborative decision making.
Resumo:
Health Information Systems (HIS) make extensive use of Information and Communication Technologies (ICT). The use of ICT aids in improving the quality and efficiency of healthcare services by making healthcare information available at the point of care (Goldstein, Groen, Ponkshe, and Wine, 2007). The increasing availability of healthcare data presents security and privacy issues which have not yet been fully addressed (Liu, Caelli, May, and Croll, 2008a). Healthcare organisations have to comply with the security and privacy requirements stated in laws, regulations and ethical standards, while managing healthcare information. Protecting the security and privacy of healthcare information is a very complex task (Liu, May, Caelli and Croll, 2008b). In order to simplify the complexity of providing security and privacy in HIS, appropriate information security services and mechanisms have to be implemented. Solutions at the application layer have already been implemented in HIS such as those existing in healthcare web services (Weaver et al., 2003). In addition, Discretionary Access Control (DAC) is the most commonly implemented access control model to restrict access to resources at the OS layer (Liu, Caelli, May, Croll and Henricksen, 2007a). Nevertheless, the combination of application security mechanisms and DAC at the OS layer has been stated to be insufficient in satisfying security requirements in computer systems (Loscocco et al., 1998). This thesis investigates the feasibility of implementing Security Enhanced Linux (SELinux) to enforce a Role-Based Access Control (RBAC) policy to help protect resources at the Operating System (OS) layer. SELinux provides Mandatory Access Control (MAC) mechanisms at the OS layer. These mechanisms can contain the damage from compromised applications and restrict access to resources according to the security policy implemented. The main contribution of this research is to provide a modern framework to implement and manage SELinux in HIS. The proposed framework introduces SELinux Profiles to restrict access permissions over the system resources to authorised users. The feasibility of using SELinux profiles in HIS was demonstrated through the creation of a prototype, which was submitted to various attack scenarios. The prototype was also subjected to testing during emergency scenarios, where changes to the security policies had to be made on the spot. Attack scenarios were based on vulnerabilities common at the application layer. SELinux demonstrated that it could effectively contain attacks at the application layer and provide adequate flexibility during emergency situations. However, even with the use of current tools, the development of SELinux policies can be very complex. Further research has to be made in order to simplify the management of SELinux policies and access permissions. In addition, SELinux related technologies, such as the Policy Management Server by Tresys Technologies, need to be researched in order to provide solutions at different layers of protection.
Resumo:
Information and communication technologies (particularly websites and e-mail) have the potential to deliver health behavior change programs to large numbers of adults at low cost. Controlled trials using these new media to promote physical activity have produced mixed results. User-centered development methods can assist in understanding the preferences of potential participants for website functions and content, and may lead to more effective programs. Eight focus group discussions were conducted with 40 adults after they had accessed a previously trialed physical activity website. The discussions were audio taped, transcribed and interpreted using a themed analysis method. Four key themes emerged: structure, interactivity, environmental context and content. Preferences were expressed for websites that include simple interactive features, together with information on local community activity opportunities. Particular suggestions included online community notice boards, personalized progress charts, e-mail access to expert advice and access to information on specific local physical activity facilities and services. Website physical activity interventions could usefully include personally relevant interactive and environmentally focused features and services identified through a user-centered development process.