34 resultados para End-user querying


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Organisations have become increasingly dependent on technology in order to compete in their respective markets. As IT technology advances at a rapid pace, so does its complexity, giving rise to new IT security vulnerabilities and methods of attack. Even though the human factors have been recognized to have a crucial role in information security management, the effects of weakness of will and lack of commitment on the stakeholders (i.e., employers and employees) parts has never been factored into the design and delivery of awareness programs. To this end, this paper investigates the impacts of the availability of awareness programs and end-user drive and lack of commitment to information security awareness program design, delivery and success.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Purpose – Celebrex became the first of a new class of drugs known as COX-2 selective non-steroidal anti-inflammatory drugs. It improves treatment for arthritis sufferers without compromising the protective lining of the stomach. The purpose of this paper is to illustrate how direct-to-consumer advertising (DTCA) of prescription medicines can be used to rebuild faith in the cyclooxygenase-2 (COX-2) product category.

Design/methodology/approach – The case is developed using published sources and no input is required from company representatives. The presentation style follows the classic comprehensive case format used in postgraduate teaching programmes.

Findings –
Business executives and strategic marketing students would benefit from a discussion on how external environmental factors can suddenly impose a review of marketing strategy. The reader learns how management addresses the business dilemma using DTCA.

Research limitations/implications –
A blockbuster rival drug Vioxx is withdrawn due to cardiovascular (CV) health safety concerns. A resulting dominant market situation soon becomes a business dilemma. The Federal Drug Administration calls for a “black box” warning label on Celebrex, the most serious type of warning.

Practical implications –
The implications are that having a product in a class of its own is not enough. It highlights the need to communicate to different audiences, to both the medical profession and the end-user. Getting doctors to recommend the medicine and pulling the product through the channel by stimulating patient demand after a health scare are paramount.

Originality/value –
This is the first pharmaceutical business case where the withdrawal of a rival product leaves the dominant competitor in a monopoly situation. Contrary to expectation, market share plummets despite the absence of competition.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Australia’s residential development industry is at least superficially embracing environmental and sustainability issues in urban design. Rapidly emerging use of recycled water, lower impact outfalls, the use of roof water and water sensitive design for both housing and landscapes are all trends of interest to the property profession. There is particular interest in the cost of meeting end-user, local Government, State Government and development industry expectations for a green agenda for the residential sector.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

One of the major challenges of MIS activities is the difficulty in measuring the effectiveness of delivered systems. The principal purpose of my research is to explore this field in order to develop an instrument by which to measure such effectiveness. Conceptualisation of Information System (IS) Effectiveness has been substantially framed by DeLone and McLean's (1992) Success; Model. But with the innovation in Information Technology (IT) over the past decade, and the constant pressure in IT to improve performance, there is merit in undertaking a fresh appraisal of the issue. This study built on the model of IS Success developed by DeLone and MeLean, but was broadened to include related research from the domains of IS, Management and Marketing. This analysis found that an effective IS function is built on three pillars: the systems implemented; the information held and delivered by these systems; and, the service provided in support of the IS function. A common foundation for these pillars is the concept of stakeholder needs. In seeking to appreciate the effectiveness: of delivered IS applications in relation to the job performance of stakeholders, this research developed an understanding of what quality means in an IT context I argue that quality is a more useful criterion for effectiveness than the more customary measures of use and user satisfaction. Respecification of the IS Success Model was then proposed. The second phase of the research was to test this model empirically through judgment panels, focus groups and interviews. Results consistently supported the structure and components of the respecified model. Quality was determined as a multi-dimensional construct, with the key dimensions for the quality of delivered IS differing from those used in the research from other disciplines. Empirical work indicated that end-user stakeholders derived their evaluations of quality by internally evaluating perceived performance of delivered IS in relation to their expectations for such performance. A short trial explored whether, when overt measurement of expectations was concurrent with the measurement of perceptions, a more revealing appraisal of delivered IS quality was provided than when perceptions alone were measured. Results revealed a difference between the two measures. Using the New IS Success Model as the foundation, and drawing upon the related theoretical and empirical research, an instrument was developed to measure the quality/effectiveness of delivered IS applications. Four trials of this instrument, QUALIT, are documented. Analysis of results from preliminary trials indicates promise in terms of business value: the instrument is simple to administer and has the capacity to pinpoint areas of weakness. The research related to the respecification of the New IS Success Model and the associated empirical studies, including the development of QTJALIT, have both contributed to the development of theory about IS Effectiveness. More precisely, my research has reviewed the components of an information system, the dimensions comprising these components and the indicators of each, and based upon these findings, formulated an instrument by which to measure the effectiveness of a delivered IS.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Three-dimensional virtual environments (3dves) are the new generation of digital multi-user social networking platforms. Their immersive character allows users to create a digital humanised representation or avatar, enabling a degree of virtual interaction not possible through conventional text-based internet technologies. As recent international experience demonstrates, in addition to the conventional range of cybercrimes (including economic fraud, the dissemination of child pornography and copyright violations), the 'virtual-reality' promoted by 3dves is the source of great speculation and concern over a range of specific and emerging forms of crime and harm to users. This paper provides some examples of the types of harm currently emerging in 3dves and suggests internal regulation by user groups, terms of service, or end-user licensing agreements, possibly linked to real-world criminological principles. This paper also provides some directions for future research aimed at understanding the role of Australian criminal law and the justice system more broadly in this emerging field.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The majority of current anonymous systems focus on improving anonymity at the network and website level in order to defend against traffic analysis attacks. However, the vulnerability of the connections between end users and the anonymous network do not attract any attention yet. For the first time, we reveal an end user browsing dynamics based attack on anonymous browsing systems at the LAN where the victim locates. This new attack method is fundamentally different from existing attack methodologies. In general, web surfers browse the web following certain patterns, such as requesting a web page, viewing it and requesting another page. The browsing pattern of a victim can be clearly observed by a local adversary when the victim is viewing the web without protection. Unfortunately, browsing dynamics releases rich information for attacking even though the web page content is encrypted. In order to show how a local eavesdropper can decipher which pages have been viewed with the knowledge of user browsing dynamics and the public information of a given website, we established a specific hidden Markov model to represent browsing dynamics for the website. By using this model, we can then identify the optimal of the accessed pages using the Viterbi algorithm. In order to confirm the effectiveness of the revealed attack method, we have conducted extensive experiments on a real data set. The results demonstrated that the attack accuracy can be more than 80%. A few possible counter-attack strategies are discussed at the end of the paper.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Large-scale renewable energy (RE) integration into the distribution network (DN) causes uncertainties due to its intermittent nature and is a challenging task today. In general RE sources are mostly connected near the end user level, i.e., in the low voltage distribution network. RE integration introduces bi-directional power flows across distribution transformer (DT) and hence DN experiences with several potential problems that includes voltage fluctuations, reactive power compensation and poor power factor in the DN. This study identifies the potential effects causes due to large-scale integration of RE into the Berserker Street Feeder, Frenchville Substation under Rockhampton DN. From the model analyses, it has clearly evident that voltage of the Berserker Street Feeder fluctuates with the increased integration of RE and causes uncertainties in the feeder as well as the DN.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Decision support tools for the assessment and management of breast cancer risk may improve uptake of prevention strategies. End-user input in the design of such tools is critical to increase clinical use. Before developing such a computerized tool, we examined clinicians' practice and future needs. Twelve breast surgeons, 12 primary care physicians and 5 practice nurses participated in 4 focus groups. These were recorded, coded, and analyzed to identify key themes. Participants identified difficulties assessing risk, including a lack of available tools to standardize practice. Most expressed confidence identifying women at potentially high risk, but not moderate risk. Participants felt a tool could especially reassure young women at average risk. Desirable features included: evidence-based, accessible (e.g. web-based), and displaying absolute (not relative) risks in multiple formats. The potential to create anxiety was a concern. Development of future tools should address these issues to optimize translation of knowledge into clinical practice.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Objective: We want to support enterprise service modelling and generation using a more end user-friendly metaphor than current approaches, which fail to scale to large organisations with key issues of "cobweb" and "labyrinth" problems and large numbers of hidden dependencies. Method: We present and evaluate an integrated visual approach for business process modelling using a novel tree-based overlay structure that effectively mitigate complexity problems. A tree-overlay based visual notation (EML) and its integrated support environment (MaramaEML) supplement and integrate with existing solutions. Complex business architectures are represented as service trees and business processes are modelled as process overlay sequences on the service trees. Results: MaramaEML integrates EML and BPMN to provide complementary, high-level business service modelling and supports automatic BPEL code generation from the graphical representations to realise web services implementing the specified processes. It facilitates generated service validation using an integrated LTSA checker and provides a distortion-based fisheye and zooming function to enhance complex diagram navigation. Evaluations of EML show its effectiveness. Conclusions: We have successfully developed and evaluated a novel tree-based metaphor for business process modelling and enterprise service generation. Practice implications: a more user-friendly modelling approach and support tool for business end users.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This work demonstrates a model-driven approach to the development of care plan systems, amenable to: (a) a flexible and extensible definition of care plan scope; and (b) deployment of care plan viewing and tracking functionality to a wide range of physical computing devices. The approach utilises a care plan domain model from which guideline implementers formulate care plan templates aligning to specific clinical guidelines. A clinical end user would subsequently constrain that template (e.g., selecting a subset of available activities and specific targets) to create a care plan instance for an individual patient. An XML care plan visualisation definition created using the Marama tool is transformed to OpenLaszlo script from which Shockwave Flash objects can be compiled, creating Flash applications that run on a variety of hardware for both clinical and patient users. The approach is illustrated with respect to an overweight and obesity guideline.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Previous attempts in addressing Access Point (AP) association at overlapping zone of IEEE 802.11 networks have shown some issues. They work passively and estimate load from different network metrics such as frame delay, packet loss, number of users etc. that may not always true. Further the user behaviour is selfish i.e. illegitimate user consume high network resources. This adversely affect existing or new users which in turn motivates them to change locations. To alleviate these issues, we propose the use of a Software Defined Networking (SDN) enabled client side (wireless end user) solution. In this paper, we start by proposing a dynamic AP selection algorithm/framework in wireless user device. The device receive network resource related statistics from SDN Controller and guide the client device to associate itself with the best selected AP. We justify that the use of SDN discourage users to act selfishly. Further, a mathematical modelling of the proposed scheme is derived using Fuzzy membership function and the simulation is carried out. Results obtained from simulation necessitates to implement SDN enabled client side methods.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Additive Manufacturing, a technology which has been in existence since three decades, is now successfully being transitioned from a research setting to finding technologically and financially viable end-user applications. A key sector in which Additive Manufacturing is being used is the medical devices and healthcare sector. Drivers in this sector include the ability to create customized, patient specific devices and implants with quick turnaround time in a cost-effective manner. Doctors and surgeons are important change agents and innovators in the creation of new healthcare devices as well as surgical methods. Often times, they may find it necessary at first to build devices and plan surgeries which are not even being thought of or acted upon by the major healthcare companies. In this sense, they perform the roles of designers, creating new ideas and improving on them until they can be implemented and adopted by others. However, the scope for performing this creative activity is often limited in their workplaces, with resource, time and financial impediments often being present. Additive Manufacturing can be helpful to speed up the iterative process of designing such medical devices or planning surgeries as well as help convince people outside of the surgery room of the feasibility and business case for such innovations. This paper proposes to introduce a framework of design, processes and tools which will enable non-engineers (specifically surgeons) to create custom-built products. It is hoped that this paper will motivate more surgeons and non-engineers to get involved in the process of designing for additive manufacturing.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A common occurrence in almost all full-scale natural disasters is the rapid destruction of the telecommunication infrastructure as the inevitable unfolds, which tends to halt the necessary communications between the humanitarian operators and the people in need. In such scenarios, the deployment of wireless networks would provide fast and temporary remedies, however these networks normally do not provide services to the end-users and ordinary people, instead they provide connectivity between groups of end-users administered by a local service provider. From a range of services provided to the end-users by the humanitarian operators, healthcare is by far the top priority. This is considered through the utilization of smartphones in a Mobile Health (mHealth) perspective, which is an emerging concept for monitoring and tracking end-user health conditions. This article considers an mHealth system used in a tsunami-stricken disaster scenario, including a discussion on the most recent advances of Device to Device (D2D) and LTE-Direct technologies.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Workflow applications require workflow processing in which workflow tasks are processed based on their dependencies. With the emergency of complex distributed systems such as grids and clouds, efficient workflow scheduling (WFS) algorithms have become the core components of the workflow management systems (WfMS). Thus, WFS that allocates each task in the workflow to a relevant resource with the aim of improving system performance and end user satisfaction is fundamentally important. In this paper, we propose a new workflow scheduling algorithm called Layered Workflow Scheduling Algorithm (LWFS) for scheduling workflow applications. We studied the efficacy of the LWFS scheduling experimentally and compared its performance with approaches including Improved Critical Path using Descendant Prediction (ICPDP), Highest Level First with Estimated Time (HLFET), Modified Critical Path (MCP) and Earliest Time First (ETF). The results of the experiments show that the proposed approach outperforms other approaches.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

From a future history of 2025: Continuous development is common for build/test (continuous integration) and operations (devOps). This trend continues through the lifecycle, into what we call `devUsage': continuous usage validation. In addition to ensuring systems meet user needs, organisations continuously validate their legal and ethical use. The rise of end-user programming and multi-sided platforms exacerbate validation challenges. A separate trend isthe specialisation of software engineering for technical domains, including data analytics. This domain has specific validation challenges. We must validate the accuracy of sta-tistical models, but also whether they have illegal or unethical biases. Usage needs addressed by machine learning are sometimes not speci able in the traditional sense, and statistical models are often `black boxes'. We describe future research to investigate solutions to these devUsage challenges for data analytics systems. We will adapt risk management and governance frameworks previously used for soft-ware product qualities, use social network communities for input from aligned stakeholder groups, and perform cross-validation using autonomic experimentation, cyber-physical data streams, and online discursive feedback.