17 resultados para Höfische Gesellschaft

em Queensland University of Technology - ePrints Archive


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In Australia, a range of Federal Government services have been provided online for some time, but direct, online citizen consultation and involvement in processes of governance is relatively new. Moves towards more extensive citizen involvement in legislative processes are now being driven in a “top-down” fashion by government agencies, or in a “bottom-up” manner by individuals and third-sector organisations. This chapter focusses on one example from each of these categories, as well as discussing the presence of individual politicians in online social networking spaces. It argues that only a combination of these approaches can achieve effective consultation between citizens and policymakers. Existing at a remove from government sites and the frameworks for public communication which govern them, bottom-up consultation tools may provide a better chance for functioning, self-organising user communities to emerge, but they are also more easily ignored by governments not directly involved in their running. Top-down consultation tools, on the other hand, may seem to provide a more direct line of communication to relevant government officials, but for that reason are also more likely to be swamped by users who wish simply to register their dissent rather than engage in discussion. The challenge for governments, politicians, and user communities alike is to develop spaces in which productive and undisrupted exchanges between citizens and policymakers can take place.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Über die letzten Jahre hat sich einige öffentliche und kommerzielle Aufmerksamkeit auf ein Phänomen gerichtet, das sich anschickt, die Medienlandschaft grundlegend zu verändern. Yahoo! kaufte Flickr. Google erwarb YouTube. Rupert Murdoch kaufte MySpace, und erklärte, die Zukunft seines NewsCorp-Imperiums läge eher in der nutzergesteuerten Inhaltserschaffung innerhalb solcher sozialer Medien als in seinen vielen Zeitungen, Fernsehsendern und anderen Medieninteressen (2005). Schließlich brach TIME mit seiner langetablierten Tradition, eine herausragende Persönlichkeit als „Person des Jahres“ zu nominieren, und wählte stattdessen „You“: uns alle, die wir online in Kollaboration Inhalte schaffen (2006). Allerdings liegt die Bedeutung dieses nutzergesteuerten Phänomens nicht in solchen (letztlich unwichtigen) Ehrungen, oder auch nur in den Inhalten zentraler Websites wie YouTube und Flickr – vielmehr findet man sie in logischer Folge der ihr zugrunde liegenden Prinzipien (die wir hier weiter untersuchen werden) viel flächendeckender über das World Wide Web verbreitet; was wichtig ist am neuen Phänomen ist nicht nur der Erfolg seiner sichtbarsten Exponenten, sondern auch der „Long Tail“ (Anderson 2006) der vielen anderen nutzergesteuerten Projekte, die sich überall in der Online-Welt etabliert haben und jetzt beginnen, sich sogar in die Offline-Welt hinein auszubreiten.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Occidentalism, which treats the other as the same, can be detected in both the criminological and rural sociological treatment of violence in the sociospatial sites of rural countrysides. Criminology tends to mistakenly assume that violence in the modern world is primarily an urban phenomenon (Baldwin & Bottoms, 1976, p. 1; Braithwaite, 1989, p. 47). If violence in rural settings is encountered it tends to be treated as a smaller scale version of the urban problem, or the importation of an otherwise urban problem - as the corrupting influence of the gesellschaft within the gemeinschaft. Within much rural sociology violence is rendered invisible by the assumption that rural communities conform to the idealised conception of the typical gemeinschaft society, small-scale traditional societies based on strong cohesiveness, intimacy and organic forms of solidarity. What these bonds conceal, rather than reveal - violence within the family - remains invisible to the public gaze. The visibility of violence within Aboriginal families and communities presents a major exception to the spatially ordered social relations which render so much white family violence hidden. The need to take into account the complexity and diversity of these sociospatial relations is concretely highlighted in our research which has taken us out of the urban context and confronted us not only with the phenomenon of the violence of other rurals, but also with fundamentally competing claims on, and conceptions of, space and place in the context of a racially divided Australian interior. This article represents the second installment of conceptual reflections on this research, with the first having been published in this journal in 1998.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The recognition that Web 2.0 applications and social media sites will strengthen and improve interaction between governments and citizens has resulted in a global push into new e-democracy or Government 2.0 spaces. These typically follow government-to-citizen (g2c) or citizen-to-citizen (c2c) models, but both these approaches are problematic: g2c is often concerned more with service delivery to citizens as clients, or exists to make a show of ‘listening to the public’ rather than to genuinely source citizen ideas for government policy, while c2c often takes place without direct government participation and therefore cannot ensure that the outcomes of citizen deliberations are accepted into the government policy-making process. Building on recent examples of Australian Government 2.0 initiatives, we suggest a new approach based on government support for citizen-to-citizen engagement, or g4c2c, as a workable compromise, and suggest that public service broadcasters should play a key role in facilitating this model of citizen engagement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In cross-organizational, distributed environments, Business Process Management requires collaborative technologies to facilitate the process of discovering, modeling, and improving business processes across geographical and organizational boundaries. This paper provides a comprehensive understanding of collaborative business process modeling that is based on a review of literature and a case study of three selected modelling tools. The application of the framework reveals that current process modeling tools consider different perspectives on collaboration, and that the included features are orthogonal. This paper informs practitioners about the state of the art in tool support for collaborative process modelling. It also informs vendors about opportunities to enhance the technology support. For research, our paper paper informs social aspects of BPM technology through its explicit focus on the collaboration of BPM stakeholders in the process of distributed modeling.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Securing IT infrastructures of our modern lives is a challenging task because of their increasing complexity, scale and agile nature. Monolithic approaches such as using stand-alone firewalls and IDS devices for protecting the perimeter cannot cope with complex malwares and multistep attacks. Collaborative security emerges as a promising approach. But, research results in collaborative security are not mature, yet, and they require continuous evaluation and testing. In this work, we present CIDE, a Collaborative Intrusion Detection Extension for the network security simulation platform ( NeSSi 2 ). Built-in functionalities include dynamic group formation based on node preferences, group-internal communication, group management and an approach for handling the infection process for malware-based attacks. The CIDE simulation environment provides functionalities for easy implementation of collaborating nodes in large-scale setups. We evaluate the group communication mechanism on the one hand and provide a case study and evaluate our collaborative security evaluation platform in a signature exchange scenario on the other.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Computer worms represent a serious threat for modern communication infrastructures. These epidemics can cause great damage such as financial losses or interruption of critical services which support lives of citizens. These worms can spread with a speed which prevents instant human intervention. Therefore automatic detection and mitigation techniques need to be developed. However, if these techniques are not designed and intensively tested in realistic environments, they may cause even more harm as they heavily interfere with high volume communication flows. We present a simulation model which allows studies of worm spread and counter measures in large scale multi-AS topologies with millions of IP addresses.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a virtual test bed for network security evaluation in mid-scale telecommunication networks. Migration from simulation scenarios towards the test bed is supported and enables researchers to evaluate experiments in a more realistic environment. We provide a comprehensive interface to manage, run and evaluate experiments. On basis of a concrete example we show how the proposed test bed can be utilized.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Indem sie Informationen zusammenstellt, sortiert und aktualisiert, betreibt die Wikipedia eine Form der Nachrichtenkuration. Besonders daran ist aber nicht allein, dass nicht Journalisten die Inhalte produzieren, sondern dass ein Kollektiv aus "Produtzern" dahintersteht: Der Nutzer wird zum Produzenten.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recently, a new approach for structuring acyclic process models has been introduced. The algorithm is based on a transformation between the Refined Process Structure Tree (RPST) of a control flow graph and the Modular Decomposition Tree (MDT) of ordering relations. In this paper, an extension of the algorithm is presented that allows to partially structure process models in the case when a process model cannot be structured completely. We distinguish four different types of unstructuredness of process models and show that only two are possible in practice. For one of these two types of unstructuredness an algorithm is proposed that returns the maximally structured representation of a process model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Real world business process models may consist of hundreds of elements and have sophisticated structure. Although there are tasks where such models are valuable and appreciated, in general complexity has a negative influence on model comprehension and analysis. Thus, means for managing the complexity of process models are needed. One approach is abstraction of business process models-creation of a process model which preserves the main features of the initial elaborate process model, but leaves out insignificant details. In this paper we study the structural aspects of process model abstraction and introduce an abstraction approach based on process structure trees (PST). The developed approach assures that the abstracted process model preserves the ordering constraints of the initial model. It surpasses pattern-based process model abstraction approaches, allowing to handle graph-structured process models of arbitrary structure. We also provide an evaluation of the proposed approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Business processes are an important instrument for understanding and improving how companies provide goods and services to customers. Therefore, many companies have documented their business processes well, often in the Event-driven Process Chains (EPC). Unfortunately, in many cases the resulting EPCs are rather complex, so that the overall process logic is hidden in low level process details. This paper proposes abstraction mechanisms for process models that aim to reduce their complexity, while keeping the overall process structure. We assume that functions are marked with efforts and splits are marked with probabilities. This information is used to separate important process parts from less important ones. Real world process models are used to validate the approach.