34 resultados para Electronic mail systems -- Security measures

em University of Queensland eSpace - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Prior studies have shown that innovative information systems (IS) adoption behaviour by small-and medium-sized enterprises (SMEs) is greatly dependent on organizational and environmental characteristics. Government influence (i.e., federal and local government agencies) was found to play an important role in the promotion or enforcement of innovative IS adoption by SMEs, and it is vital for ensuring adoption of nationwide innovative IS, particularly in developing economies. This study introduces the construct of enacted capabilities and examines the enacted capabilities that motivate SMEs to use innovative IS (i.e., a government's electronic procurement systems) to its full potential. A model of how enacted capabilities affect IS adoption behaviour through perceived net benefits and attitude is developed. A survey (and follow-up interviews) of CEOs/owners from Malaysian SMEs was conducted. Results indicate the enacted capabilities possessed by SMEs play a prominent role in determining the adoption of government electronic procurement systems by these enterprises.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Networking North Queensland (NNQ) was a two-year project to improve access to health services in rural and remote communities. The project involved email and Internet access in 61 communities, in a region almost three times the size of the UK. Videoconferencing equipment was also installed at 21 sites and a total of 197 h of videoconferencing was recorded at 10 of the remote sites over 12 months. As a result of the project, health consumers enjoyed improved access to medical, specialist, allied health and primary health services. In addition, health service providers had better access to reliable, up-to-date health-care information via intranet and Internet services. Consideration of local issues-local needs and existing resources-was vital to the achievements of the project. Community involvement and community access were also important factors in its success.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this study, we examine an important factor that affects consumers' acceptance of business-to-commerce (B2C) electronic commerce - perceived risk. The objective of this paper is to examine the definition of perceived risk in the context of B2C electronic commerce. The paper highlights the importance of perceived risk and the interwoven relation between perceived risk and trust. It discusses the problem of defining perceived risk in prior B2C research. This study proposes a new classification of consumers' perceived risk based on sources. It highlights the importance of identifying the sources of consumer's risk perceptions in addition to the consequences dimensions. Two focus group discussion sessions were conducted to verify the proposed classification. Results indicate that Internet consumers perceive three sources of risk in B2C electronic commerce: technology, vendor, and product. © 2003 Elsevier B.V. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

ISSUE ADDRESSED: To explore the feasibility of using the Internet and e-mail to promote physical activity in a defined community. METHODS: An online survey was conducted through a community-based Internet Service Provider (ISP). ISP clients were recruited via electronic newsletter and direct e-mail. Data were collected on preferred sources of assistance for physical activity advice and stage of motivational readiness for physical activity. RESULTS: Valid surveys were completed by 797 (9% response rate). Participants were: 55% men; 56% aged >45 years; 57% worked full time; mean BMI was 28+/-8. Thirty-six per cent were in the early stages of motivational readiness for physical activity. More than 70% were somewhat to extremely interested in having access to a physical activity website. CONCLUSION: Promoting physical activity via the Internet and e-mail is feasible and appealing to some people. Expanding the reach, appeal and use of this technology to deliver physical activity programs will be a challenge.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

One of the obstacles to improved security of the Internet is ad hoc development of technologies with different design goals and different security goals. This paper proposes reconceptualizing the Internet as a secure distributed system, focusing specifically on the application layer. The notion is to redesign specific functionality, based on principles discovered in research on distributed systems in the decades since the initial development of the Internet. Because of the problems in retrofitting new technology across millions of clients and servers, any options with prospects of success must support backward compatibility. This paper outlines a possible new architecture for internet-based mail which would replace existing protocols by a more secure framework. To maintain backward compatibility, initial implementation could offer a web browser-based front end but the longer-term approach would be to implement the system using appropriate models of replication. (C) 2005 Elsevier Ltd. All rights reserved.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

We review the description of noise in electronic circuits in terms of electron transport. The Poisson process is used as a unifying principle. In recent years, much attention has been given to current noise in light-emitting diodes and laser diodes. In these devices, random events associated with electron transport are correlated with photon emission times, thus modifying both the current statistics and the statistics of the emitted light. We give a review of experiments in this area with special emphasis on the ability of such devices to produce subshot-noise currents and light beams. Finally we consider the noise properties of a class of mesoscopic devices based on the quantum tunnelling of an electron into and out of a bound state. We present a simple quantum model of this process which confirms that the current noise in such a device should be subshot-noise.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper discusses a document discovery tool based on Conceptual Clustering by Formal Concept Analysis. The program allows users to navigate e-mail using a visual lattice metaphor rather than a tree. It implements a virtual. le structure over e-mail where files and entire directories can appear in multiple positions. The content and shape of the lattice formed by the conceptual ontology can assist in e-mail discovery. The system described provides more flexibility in retrieving stored e-mails than what is normally available in e-mail clients. The paper discusses how conceptual ontologies can leverage traditional document retrieval systems and aid knowledge discovery in document collections.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

We have previously shown that a division of the f-shell into two subsystems gives a better understanding of the cohesive properties as well the general behavior of lanthanide systems. In this article, we present numerical computations, using the suggested method. We show that the picture is consistent with most experimental data, e.g., the equilibrium volume and electronic structure in general. Compared with standard energy band calculations and calculations based on the self-interaction correction and LIDA + U, the f-(non-f)-mixing interaction is decreased by spectral weights of the many-body states of the f-ion. (c) 2005 Wiley Periodicals, Inc.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Electronic communications devices intended for government or military applications must be rigorously evaluated to ensure that they maintain data confidentiality. High-grade information security evaluations require a detailed analysis of the device's design, to determine how it achieves necessary security functions. In practice, such evaluations are labour-intensive and costly, so there is a strong incentive to find ways to make the process more efficient. In this paper we show how well-known concepts from graph theory can be applied to a device's design to optimise information security evaluations. In particular, we use end-to-end graph traversals to eliminate components that do not need to be evaluated at all, and minimal cutsets to identify the smallest group of components that needs to be evaluated in depth.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Communications devices for government or military applications must keep data secure, even when their electronic components fail. Combining information flow and risk analyses could make fault-mode evaluations for such devices more efficient and cost-effective.