199 resultados para communication and information technology


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the evolving knowledge societies of today, some people are overloaded with information, others are starved for information. Everywhere, people are yearning to freely express themselves,to actively participate in governance processes and cultural exchanges. Universally, there is a deep thirst to understand the complex world around us. Media and Information Literacy (MIL) is a basis for enhancing access to information and knowledge, freedom of expression, and quality education. It describes skills, and attitudes that are needed to value the functions of media and other information providers, including those on the Internet, in societies and to find, evaluate and produce information and media content; in other words, it covers the competencies that are vital for people to be effectively engaged in all aspects of development.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study drew on the notions of institutional theory, legitimacy, and rhetoric, and explored propositions drawn from these concepts to consider the why and how of corporate social responsibility (CSR) communication. In doing so, this thesis found that there was often a disconnect between why the organisations were communicating about CSR activities in their reports and how the organisations were communicating about these activities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper makes a formal security analysis of the current Australian e-passport implementation using model checking tools CASPER/CSP/FDR. We highlight security issues in the current implementation and identify new threats when an e-passport system is integrated with an automated processing system like SmartGate. The paper also provides a security analysis of the European Union (EU) proposal for Extended Access Control (EAC) that is intended to provide improved security in protecting biometric information of the e-passport bearer. The current e-passport specification fails to provide a list of adequate security goals that could be used for security evaluation. We fill this gap; we present a collection of security goals for evaluation of e-passport protocols. Our analysis confirms existing security weaknesses that were previously identified and shows that both the Australian e-passport implementation and the EU proposal fail to address many security and privacy aspects that are paramount in implementing a secure border control mechanism. ACM Classification C.2.2 (Communication/Networking and Information Technology – Network Protocols – Model Checking), D.2.4 (Software Engineering – Software/Program Verification – Formal Methods), D.4.6 (Operating Systems – Security and Privacy Protection – Authentication)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this age of electronic money transactions, the opportunities for electronic crime expanded at the same rate as ever expanding rise of on-line services. With world becoming a global village, crime over the internet transcends no boundaries, borders or jurisdictions. This paper critically examines the available literature on spam, and the control measures available to control spam. This study is followed by the literature overview related to mobility of devices and how the application of mobile technologies as communication medium has impacted the handling of spam. The conclusion of this literature review with proposed direction of study is summarized.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Information technology (IT) plays a critical role of enabler of activities that improve the performance of business processes. This enabling role of IT resources means continuous investment in IT is a strategic necessity. It is established that organizations’ IT-related capabilities leverage the enabling potential of IT resources. Today’s turbulent and challenging business environment requires organizations to do more from their existing and newly acquired IT resources. To achieve this, organizations need to discover ways or establish environments to nourish their existing IT-related capabilities, and develop new IT-related capabilities. We suggest one such environment, a dynamic IT-learning environment that could contribute to nourishing existing IT-related capabilities, and developing new IT-related capabilities. This environment is a product of coordination of four organizational factors that relate to the ways in which IT-related knowledge is applied to business processes, the accompanying reward structures, and ways in which the IT-related learning and knowledge is shared within the organization. Using 216 field survey responses, this paper shows that two IT-related capabilities of top management commitment to IT initiatives, and shared organizational knowledge between the IT and business unit managers has a stronger positive influence on business process performance in the presence of this dynamic IT-learning environment. The study also shows that a marginal IT-related capability, technical IT skills, has a positive and significant influence on business process performance in the presence of this environment. These outcomes imply that organizations’ internal environments could contribute to the management of their IT-related capabilities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Solving indeterminate algebraic equations in integers is a classic topic in the mathematics curricula across grades. At the undergraduate level, the study of solutions of non-linear equations of this kind can be motivated by the use of technology. This article shows how the unity of geometric contextualization and spreadsheet-based amplification of this topic can provide a discovery experience for prospective secondary teachers and information technology students. Such experience can be extended to include a transition from a computationally driven conjecturing to a formal proof based on a number of simple yet useful techniques.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The business value of information technology (IT) is increasingly being cocreated by multiple parties, opening opportunities for new research initiatives. Previous studies on IT value cocreation mainly focus on analyzing sources of cocreated IT value, yet inadequately accommodating the influence of competition relationships in IT value cocreation activities. To fill the gap, this in-progress paper suggests an agent-based modeling (also simulation) approach to investigating potential influences of the dynamic interplay between cooperation and competition relationships in IT value cocreation settings. In particular, the research proposes a high-level conceptual framework to position general IT value cocreation processes. A relational network view is offered, aiming at decomposing and systemizing several typical cooperation and competition scenarios in practical IT value cocreation settings. The application of a simulation approach to analytical insights and to theory building is illustrated.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Introduction This research is the first to investigate the experiences of teacher-librarians as evidence-based practice. An empirically derived model is presented in this paper. Method This qualitative study utilised the expanded critical incident approach, and investigated the real-life experiences of fifteen Australian teacher-librarians, through semi-structured interviews and inductive data analysis. Data collection utilised semi-structured interviews, on-site observations, journaling and the rubric for contextual information. These approaches allowed each of the interviewees to tell their own story and provided richness to the data. Analysis The analysis involved two types of data categorisation: binary and thematic. Binary classification was used to identify factual details. Thematic analysis involved categorising the emerging themes. Results An empirically derived model for evidence-based practice was devised and associated critical findings identified. The results demonstrate that evidence-based practice for teacher-librarians is a holistic practice. It is not a linear, step-by-step process. Conclusions This study is significant for teacher-librarians and library and information professionals as it provides new understanding of evidence-based practice.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis targets on a challenging issue that is to enhance users' experience over massive and overloaded web information. The novel pattern-based topic model proposed in this thesis can generate high-quality multi-topic user interest models technically by incorporating statistical topic modelling and pattern mining. We have successfully applied the pattern-based topic model to both fields of information filtering and information retrieval. The success of the proposed model in finding the most relevant information to users mainly comes from its precisely semantic representations to represent documents and also accurate classification of the topics at both document level and collection level.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article considers the challenges posed to intellectual property law by the emerging field of bioinformatics. It examines the intellectual property strategies of established biotechnology companies, such as Celera Genomics, and information technology firms entering into the marketplace, such as IBM. First this paper argues that copyright law is not irrelevant to biotechnology, as some commentators would suggest. It claims that the use of copyright law and contract law is fundamental to the protection of biomedical and genomic databases. Second this article questions whether biotechnology companies are exclusively interested in patenting genes and genetics sequences. Recent evidence suggests that biotechnology companies and IT firms are patenting bioinformatics software and Internet business methods, as well as underlying instrumentation such as microarrays and genechips. Finally, this paper evaluates what impact the privatisation of bioinformatics will have on public research and scientific communication. It raises important questions about integration, interoperability, and the risks of monopoly. It finally considers whether open source software such as the Ensembl Project and peer to peer technology like DSAS will be able to counter this trend of privatisation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Australian Library and Information Association (ALIA) is the professional association for the Australian library and information services sector. It seeks to empower the profession in the development, promotion and delivery of quality library and information services to the nation, through leadership, advocacy, and mutual support. The ALIA represents the interest of 6000 members, the profession and Australia's 12 million library users. The objects of the Association are listed in its constitution. They are To promote the free flow of information and ideas in the interest of all Australians and a thriving culture, economy, and democracy. To promote and improve the services provided by all kinds of library and information agencies. To ensure the high standard of personnel engaged in information provision and foster their professional interests and aspirations. To represent the interests of members to governments, other organizations, and the community. To encourage people to contribute to the improvement of library and information services through support and membership of the association.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The literature around Library 2.0 remains largely theoretical with few empirical studies and is particularly limited in developing countries such as Indonesia. This study addresses this gap and aims to provide information about the current state of knowledge on Indonesian LIS professionals’ understanding of Library 2.0. The researchers used qualitative and quantitative approaches for this study, asking thirteen closed- and open-ended questions in an online survey. The researchers used descriptive and in vivo coding to analyze the responses. Through their analysis, they identified three themes: technology, interactivity, and awareness of Library 2.0. Respondents demonstrated awareness of Library 2.0 and a basic understanding of the roles of interactivity and technology in libraries. However, overreliance on technology used in libraries to conceptualize Library 2.0 without an emphasis on its core characteristics and principles could lead to the misalignment of limited resources. The study results will potentially strengthen the research base for Library 2.0 practice as well as inform LIS curriculum in Indonesia so as to develop practitioners who are able to adapt to users’ changing needs and expectations. It is expected that the preliminary data from this study could be used to design a much larger and more complex future research project in this area.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is an uptake of organizations involvement in collaborative organizational structures (COS). As the nature and level of information technology (IT) investment in COS will be similar, the COS IT competencies will leverage the IT investments to create the collaborative rent generating potential of the COS, which would then improve the business value of the COS members. Consistent with the resource-centric views of the firm, we suggest that the COS members need to contribute their managed IT competencies to their COS, whose synergies would create COS IT competencies. We suggest three key IT competencies for COS; proactive top management decision synergy, collaborative and agile IT infrastructure, and cross-functional tactical management synergy. Using survey data, we find evidence of a positive association between these COS IT competencies and the collaborative rent generating potential of the COS. We also find a positive association between the collaborative rent generating potential of the COS and the business value of the COS members. The results suggest that developing COS IT competencies add value to a COS and its members. This study provides guidance for organizations looking to leverage their involvement in a COS.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study investigates how offshore information technology (IT) service providers (vendors) coordinate work with their clients (employers) in order to succeed in the global IT offshore outsourcing industry. We reviewed literature on coordination studies, interviewed offshore service providers in the Philippines, and used thematic analysis to analyse coordination practices from the point of view of these individual vendors in a newly industrialized country. We used Olson and Olson's framework on 'collaboration at a distance' as a lens to structure the results. The study provides an understanding of vendors' individual attitudes towards the coordination of distributed work and draws attention to how differences in power affect the work situation of vendors, and by implication all stakeholders. We offer this insight as a way to enhance existing CSCW frameworks, by imbuing them with the perspective of non-equal relationships. The study found that vendors were generally able to produce outputs that satisfy their clients, however these results were only achieved because individuals were willing to take risks and make sacrifices in their personal lives. The relationship was further characterised by a complex interplay between the client's control of the overall work arrangements and the vendors' ability to establish a level of autonomy in their work practices and their flexible use of coordination tools.