391 resultados para arguments by definition

em Queensland University of Technology - ePrints Archive


Relevância:

90.00% 90.00%

Publicador:

Resumo:

The book within which this chapter appears is published as a research reference book (not a coursework textbook) on Management Information Systems (MIS) for seniors or graduate students in Chinese universities. It is hoped that this chapter, along with the others, will be helpful to MIS scholars and PhD/Masters research students in China who seek understanding of several central Information Systems (IS) research topics and related issues. The subject of this chapter - ‘Evaluating Information Systems’ - is broad, and cannot be addressed in its entirety in any depth within a single book chapter. The chapter proceeds from the truism that organizations have limited resources and those resources need to be invested in a way that provides greatest benefit to the organization. IT expenditure represents a substantial portion of any organization’s investment budget and IT related innovations have broad organizational impacts. Evaluation of the impact of this major investment is essential to justify this expenditure both pre- and post-investment. Evaluation is also important to prioritize possible improvements. The chapter (and most of the literature reviewed herein) admittedly assumes a blackbox view of IS/IT1, emphasizing measures of its consequences (e.g. for organizational performance or the economy) or perceptions of its quality from a user perspective. This reflects the MIS emphasis – a ‘management’ emphasis rather than a software engineering emphasis2, where a software engineering emphasis might be on the technical characteristics and technical performance. Though a black-box approach limits diagnostic specificity of findings from a technical perspective, it offers many benefits. In addition to superior management information, these benefits may include economy of measurement and comparability of findings (e.g. see Part 4 on Benchmarking IS). The chapter does not purport to be a comprehensive treatment of the relevant literature. It does, however, reflect many of the more influential works, and a representative range of important writings in the area. The author has been somewhat opportunistic in Part 2, employing a single journal – The Journal of Strategic Information Systems – to derive a classification of literature in the broader domain. Nonetheless, the arguments for this approach are believed to be sound, and the value from this exercise real. The chapter drills down from the general to the specific. It commences with a highlevel overview of the general topic area. This is achieved in 2 parts: - Part 1 addressing existing research in the more comprehensive IS research outlets (e.g. MISQ, JAIS, ISR, JMIS, ICIS), and Part 2 addressing existing research in a key specialist outlet (i.e. Journal of Strategic Information Systems). Subsequently, in Part 3, the chapter narrows to focus on the sub-topic ‘Information Systems Success Measurement’; then drilling deeper to become even more focused in Part 4 on ‘Benchmarking Information Systems’. In other words, the chapter drills down from Parts 1&2 Value of IS, to Part 3 Measuring Information Systems Success, to Part 4 Benchmarking IS. While the commencing Parts (1&2) are by definition broadly relevant to the chapter topic, the subsequent, more focused Parts (3 and 4) admittedly reflect the author’s more specific interests. Thus, the three chapter foci – value of IS, measuring IS success, and benchmarking IS - are not mutually exclusive, but, rather, each subsequent focus is in most respects a sub-set of the former. Parts 1&2, ‘the Value of IS’, take a broad view, with much emphasis on ‘the business Value of IS’, or the relationship between information technology and organizational performance. Part 3, ‘Information System Success Measurement’, focuses more specifically on measures and constructs employed in empirical research into the drivers of IS success (ISS). (DeLone and McLean 1992) inventoried and rationalized disparate prior measures of ISS into 6 constructs – System Quality, Information Quality, Individual Impact, Organizational Impact, Satisfaction and Use (later suggesting a 7th construct – Service Quality (DeLone and McLean 2003)). These 6 constructs have been used extensively, individually or in some combination, as the dependent variable in research seeking to better understand the important antecedents or drivers of IS Success. Part 3 reviews this body of work. Part 4, ‘Benchmarking Information Systems’, drills deeper again, focusing more specifically on a measure of the IS that can be used as a ‘benchmark’3. This section consolidates and extends the work of the author and his colleagues4 to derive a robust, validated IS-Impact measurement model for benchmarking contemporary Information Systems (IS). Though IS-Impact, like ISS, has potential value in empirical, causal research, its design and validation has emphasized its role and value as a comparator; a measure that is simple, robust and generalizable and which yields results that are as far as possible comparable across time, across stakeholders, and across differing systems and systems contexts.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In this paper I examine the recent arguments by Charles Foster, Jonathan Herring, Karen Melham and Tony Hope against the utility of the doctrine of double effect. One basis on which they reject the utility of the doctrine is their claim that it is notoriously difficult to apply what they identify as its 'core' component, namely, the distinction between intention and foresight. It is this contention that is the primarily focus of my article. I argue against this claim that the intention/foresight distinction remains a fundamental part of the law in those jurisdictions where intention remains an element of the offence of murder and that, accordingly, it is essential ro resolve the putative difficulties of applying the intention/foresight distinction so as to ensure the integrity of the law of murder. I argue that the main reasons advanced for the claim that the intention/foresight distinction is difficult to apply are ultimately unsustainable, and that the distinction is not as difficult to apply as the authors suggest.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Monitoring Internet traffic is critical in order to acquire a good understanding of threats to computer and network security and in designing efficient computer security systems. Researchers and network administrators have applied several approaches to monitoring traffic for malicious content. These techniques include monitoring network components, aggregating IDS alerts, and monitoring unused IP address spaces. Another method for monitoring and analyzing malicious traffic, which has been widely tried and accepted, is the use of honeypots. Honeypots are very valuable security resources for gathering artefacts associated with a variety of Internet attack activities. As honeypots run no production services, any contact with them is considered potentially malicious or suspicious by definition. This unique characteristic of the honeypot reduces the amount of collected traffic and makes it a more valuable source of information than other existing techniques. Currently, there is insufficient research in the honeypot data analysis field. To date, most of the work on honeypots has been devoted to the design of new honeypots or optimizing the current ones. Approaches for analyzing data collected from honeypots, especially low-interaction honeypots, are presently immature, while analysis techniques are manual and focus mainly on identifying existing attacks. This research addresses the need for developing more advanced techniques for analyzing Internet traffic data collected from low-interaction honeypots. We believe that characterizing honeypot traffic will improve the security of networks and, if the honeypot data is handled in time, give early signs of new vulnerabilities or breakouts of new automated malicious codes, such as worms. The outcomes of this research include: • Identification of repeated use of attack tools and attack processes through grouping activities that exhibit similar packet inter-arrival time distributions using the cliquing algorithm; • Application of principal component analysis to detect the structure of attackers’ activities present in low-interaction honeypots and to visualize attackers’ behaviors; • Detection of new attacks in low-interaction honeypot traffic through the use of the principal component’s residual space and the square prediction error statistic; • Real-time detection of new attacks using recursive principal component analysis; • A proof of concept implementation for honeypot traffic analysis and real time monitoring.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In their studies, Eley and Meyer (2004) and Meyer and Cleary (1998) found that there are sources of variation in the affective and process dimensions of learning in mathematics and clinical diagnosis specific to each of these disciplines. Meyer and Shanahan (2002) argue that: General purpose models of student learning that are transportable across different discipline contexts cannot, by definition, be sensitive to sources of variation that may be subject-specific (2002. p. 204). In other words, to explain the differences in learning approaches and outcomes in a particular discipline, there are discipline-specific factors, which cannot be uncovered in general educational research. Meyer and Shanahan (2002) argue for a need to "seek additional sources of variation that are perhaps conceptually unique ... within the discourse of particular disciplines" (p. 204). In this paper, the development of an economics-specific construct (called economic thinking ability) is reported. The construct aims to measure discipline-sited ability of students that has important influence on learning in economics. Using this construct, economic thinking abilities of introductory and intermediate level economics students were measured prior to the commencement, and at the end, of their study over one semester. This enabled factors associated with students' pre-course economic thinking ability and their development in economic thinking ability to be investigated. The empirical findings will address the 'nature' versus 'nurture' debate in economics education (Frank, et aI., 1993; Frey et al., 1993; Haucap and Tobias 2003). The implications for future research in economics education will also be discussed.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Today’s evolving networks are experiencing a large number of different attacks ranging from system break-ins, infection from automatic attack tools such as worms, viruses, trojan horses and denial of service (DoS). One important aspect of such attacks is that they are often indiscriminate and target Internet addresses without regard to whether they are bona fide allocated or not. Due to the absence of any advertised host services the traffic observed on unused IP addresses is by definition unsolicited and likely to be either opportunistic or malicious. The analysis of large repositories of such traffic can be used to extract useful information about both ongoing and new attack patterns and unearth unusual attack behaviors. However, such an analysis is difficult due to the size and nature of the collected traffic on unused address spaces. In this dissertation, we present a network traffic analysis technique which uses traffic collected from unused address spaces and relies on the statistical properties of the collected traffic, in order to accurately and quickly detect new and ongoing network anomalies. Detection of network anomalies is based on the concept that an anomalous activity usually transforms the network parameters in such a way that their statistical properties no longer remain constant, resulting in abrupt changes. In this dissertation, we use sequential analysis techniques to identify changes in the behavior of network traffic targeting unused address spaces to unveil both ongoing and new attack patterns. Specifically, we have developed a dynamic sliding window based non-parametric cumulative sum change detection techniques for identification of changes in network traffic. Furthermore we have introduced dynamic thresholds to detect changes in network traffic behavior and also detect when a particular change has ended. Experimental results are presented that demonstrate the operational effectiveness and efficiency of the proposed approach, using both synthetically generated datasets and real network traces collected from a dedicated block of unused IP addresses.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

For fruit flies, fully ripe fruit is preferred for adult oviposition and is superior for offspring performance over unripe or ripening fruit. Because not all parts of a single fruit ripen simultaneously, the opportunity exists for adult fruit flies to selectively choose riper parts of a fruit for oviposition and such selection, if it occurs, could positively influence offspring performance. Such fine scale host variation is rarely considered in fruit fly ecology, however, especially for polyphagous species which are, by definition, considered to be generalist host users. Here we study the adult oviposition preference/larval performance relationship of the Oriental fruit fly, Bactrocera dorsalis (Hendel) (Diptera: Tephritidae), a highly polyphagous pest species, at the “within-fruit” level to see if such a host use pattern occurs. We recorded the number of oviposition attempts that female flies made into three fruit portions (top, middle and bottom), and larval behavior and development within different fruit portions for ripening (color change) and fully-ripe mango, Mangifera indica L. (Anacardiaceae). Results indicate that female B. dorsalis do not oviposit uniformly across a mango fruit, but lay most often in the top (i.e., stalk end) of fruit and least in the bottom portion, regardless of ripening stage. There was no evidence of larval feeding site preference or performance (development time, pupal weight, percent pupation) being influenced by fruit portion, within or across the fruit ripening stages. There was, however, a very significant effect on adult emergence rate from pupae, with adult emergence rate from pupae from the bottom of ripening mango being approximately only 50% of the adult emergence rate from the top of ripening fruit, or from both the top and bottom of fully-ripe fruit. Differences in mechanical (firmness) and chemical (total soluble solids, titratable acidity, total non-structural carbohydrates) traits between different fruit portions were correlated with adult fruit utilisation. Our results support a positive adult preference/offspring performance relationship at within-fruit level for B. dorsalis. The fine level of host discrimination exhibited by B. dorsalis is at odds with the general perception that, as a polyphagous herbivore, the fly should show very little discrimination in its host use behavior.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

It is a startling fact that when in the mid-80s a ‘third wave’ of democracy took hold in Latin America and Eastern Europe, both democracy and violence were simultaneously on the rise worldwide. Almost by definition democracies represent an institutionalized framework and a way of life that ensures non-violent means to share power between communities of people with widely differing values and beliefs. As Keane (2004) points out, ‘violence is anathema to [democracy’s] spirit and substance’ (p. 1). Accordingly, the process of democratization was accompanied by expectations that violence would generally decrease, and that these countries would embark on a process of reducing levels of violence as Western European countries had done earlier in the 19th and 20th century.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Volunteering is a very important part of life in Australia with an estimated 36% of the adult population volunteering in 2010. Voluntary work generates economic benefits, addresses community needs and develops the social networks that form the backbone of civil society. Without volunteers, many essential services would either cease to exist or become too expensive for many people to afford. These volunteers, who by definition are not in receipt of any remuneration for their work and services, are exposed to personal injury and to legal liability in the discharge of their functions. It is therefore appropriate that statutory protection is extended to volunteers and that volunteer organisations procure public liability and personal accident cover where possible. However, given the patchwork quilt of circumstances where statutory or institutional cover is available to volunteers and the existence of many and diverse exclusions, it is important to have regard also to what scope a volunteer may have to avail themselves of protection against liability for volunteering activity by relying upon their own personal insurance cover. This article considers the extent of private insurance cover and its availability to volunteers under home and contents insurance and under comprehensive motor vehicle insurance. The most common policies in the Australian market are examined and the uncertain nature of protection against liability afforded by these policies is discussed. This uncertainty could be reduced should the Federal Government through amendments to the Insurance Contracts Regulations standardise the circumstances and extent to which liability protection was afforded to an insured holding home and contents insurance and comprehensive motor vehicle insurance cover.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Susceptibility to complex traits, by definition, involves aetiological polymorphisms at multiple genetic loci combined with variable contributions by environmental factors. However, the approaches taken to identifying genetic loci implicated in susceptibility to complex traits frequently overlooks the compounding contribution of multiple loci in favour of highlighting a single gene solely responsible for predisposition. It is only in a small minority of cases that this has resulted in clear disease heritability associated with polymorphisms in a single gene. More often, this approach has led to an accumulation of single-gene associations with minor contributions to disease susceptibility. As the genomic era advances and genome-wide screens become higher in resolution and throughput, the need for simultaneous consideration of multiple loci is becoming more important. With special reference to non-Hodgkin’s lymphoma (NHL), this chapter will overview the current progress made in elucidating genetic polymorphisms associated with disease susceptibility. We also present novel data from a high-resolution single nucleotide polymorphism (SNP) microarray screen for susceptibility loci that are involved in NHL. Using an ‘informed approach’, the findings are highlighted within the context of cellular pathways, and provide insight and new ideas for methods of analysis for genome-wide screens for susceptibility.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The car has arguably had more influence on our lifestyle and urban environment than any other consumer product; allowing unprecedented freedom for living, working and recreation where and when we choose. However, problems of pollution, congestion, road trauma, inefficient land use and social inequality are associated with car use. Despite 100 years of design and technology refinements, the aforementioned problems are significant and persistent: many argue that resolving these problems requires a fundamental redesign of the car. Redesigned vehicles have been proposed such as the MIT CityCar and others such as the Renault Twizy, commercialized. None however have successfully brought about significant change and the study of disruptive innovation offers an explanation for this. Disruptive innovation, by definition, disrupts a market. It also disrupts the product ecosystem. The existing product ecosystem has co-evolved to support the conventional car and is not optimized for the new design: which will require a redesigned ecosystem to support it. A literature review identifies a lack of methodology for identifying the components of product ecosystems and the changes required for disruptive innovation implementation. This paper proposes such a methodology based on Design Thinking, Actor Network Theory, Disruptive Innovation and the CityCar scenarios.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Germ cell mutagens are currently classified into three categories in the German List of MAK- and BAT-Values. These categories have been revised and extended in analogy to the new categories for carcinogenic chemicals. Germ cell mutagens produce heritable gene mutations, and heritable structural and numerical chromosome aberrations in germ cells. The original categories 1 and 2 for germ cell mutagens remained unchanged. Two new categories 3 A and 3 B are proposed for chemicals which are suspected to be germ cell mutagens. A new category 5 is proposed for germ cell mutagens with low potency which contribute negligibly to human genetic risk provided the MAK value is observed. The following categories are presented for further discussion. 1. Germ cell mutagens which have been shown to increase the mutant frequency among the progeny of exposed humans. 2. Germ cell mutagens which have been shown to increase the mutant frequency among the progeny of exposed animals. 3 A. Substances which have been shown to induce genetic damage in germ cells of humans or animals, or which are mutagenic in somatic cells and have been shown to reach the germ cells in their active forms. 3 B. Substances which are suspected of being germ cell mutagens because of their genotoxic effects in mammalian somatic cells in vivo or, in exceptional cases in the absence of in vivo data, if they are clearly mutagenic in vitro and structurally related to in vivo mutagens. 4. not applicable (Category 4 was introduced for carcinogenic substances with nongenotoxic modes of action. By definition, germ cell mutagens are genotoxic. Therefore, a Category 4 for germ cell mutagens cannot exist.) 5. Germ cell mutagens, the potency of which is considered to be so low that, provided the MAK value is observed, their contribution to genetic risk is expected not to be significant.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Focus groups show that young men do not have available to them the same resources to learn about healthy sexual development as do young women. A collaborative project led by a leading provider of sexuality education aimed to reach young men with information about healthy sexual development by using a genre that focus groups showed they favoured - vulgar comedy. This project raised two important issues. First, comedy is ambivalent - it is by definition not serious or worthy. This challenges health communication, which traditionally favours the clear presentation of correct information. Second, vulgarity can be challenging to the institutions of health communication, which can be concerned that it is inappropriate or offensive. This article addresses these issues and reports on the materials that emerged from the project.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

By definition, regulatory rules (in legal context called norms) intend to achieve specific behaviour from business processes, and might be relevant to the whole or part of a business process. They can impose conditions on different aspects of process models, e.g., control-flow, data and resources etc. Based on the rules sets, norms can be classified into various classes and sub-classes according to their effects. This paper presents an abstract framework consisting of a list of norms and a generic compliance checking approach on the idea of (possible) execution of processes. The proposed framework is independent of any existing formalism, and provides a conceptually rich and exhaustive ontology and semantics of norms needed for business process compliance checking. The possible uses of the proposed framework include to compare different compliance management frameworks (CMFs).

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Developments of surgical attachments for bone-anchored prostheses are slowly but surely winning over the initial disbelief in the orthopedic community. Clearly, this option is becoming accessible to a wide range of individuals with limb loss. Seminal studies have demonstrated that the pioneering procedure relying on screw-type fixation engenders major clinical benefits and acceptable safety. The surgical procedure for press-fit implants, such as the Integral-Leg-Prosthesis (ILP) has been described Dr Aschoff and his team. Some clinical benefits of press-fit implants have been also established. Here, his team is once again taking a leading role by sharing the progression over 15 years of the rate of deep infections for 69 individuals with transfemoral amputation fitted with three successive refined versions of the ILP. By definition, a double-blind randomized clinical trial to test the effect of different fixation’s design is difficult. Alternatively, Juhnke and colleagues are reporting the outcomes of action-research study for a cohort of participants. The first and foremost important outcome of this study is the confirmation that the current design of the IPL and rehabilitation program are altogether leading to an acceptable rate of deep infection and other adverse events (e.g., structural failure of implant, periprosthetic factures). This study is also providing a strong insight onto the effect of major phases in redesign of an implant on the risk of infection. This is an important reminder that the development of a successful osseointegrated implant is unlikely to be immediate but the results of a learning curve made of empirical and sequential changes led by a reflective clinical practice. Clearly, this study provided better understanding of the safety of the ILP surgical and rehabilitation procedure while establishing standards and benchmark data for future studies focusing on design and infection of press-fit implants. Complementary observations of relationship between infection and cofounders such as loading of the prosthesis and prosthetic components used would be beneficial.Further definitive evidences of the clinical benefits with the latest design would be valuable, although an increase in health related quality of life and functional outcomes are likely to be confirmed. Altogether, the authors are providing compelling evidence that bone-anchored attachments particularly those relying on press-fit implants are an established alternative to socket prostheses.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This special issue features the growing field of Sport for Development. Importantly few questions have been raised about the educative quality of sport for development programs or the pedagogies by which they are delivered. This seems to be something of an oversight since; by definition development infers some sort of learning or educative process. This introductory paper provides an editorial commentary and summary on the papers included in this issue. We also comment on Sport for Development as a growing field of research and identify what might be some fruitful areas of research direction based on the papers included in the issue. Our reading of the papers suggest that there are important concerns related to pedagogy and educational practices in sport for development projects that stem from a dominance of neoliberal agendas, unintended though this may be. At the same time however, it is apparent that this challenge is being met head on by a growing number of researchers, and reports of this progress can be found in this issue.