99 resultados para Systems and Information Theory


Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The objective of this paper is to demonstrate the ability of visualization and simulation techniques to aid and simulate current and future directions in coastal planning. The process of visualization will interrogate the coastal cities of Portland, Apollo Bay, Anglesea and Hobsons Bay in south-eastern Australian coastal seaboard through a progression of projections and simulated forecasts from 2014 to 2050 to see if a process(s) or methodology could help in planning the future growth of coastal settlements. The analysis uses Geographic Information Systems (GIS) associated with planning application software.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper identifies novel approaches to future small and medium enterprise (SME) research from a review of articles, and then introduces the papers in this AJIS special section which evidence these approaches. More specifically, the paper makes an important contribution by reviewing 61 articles in high ranked IS journals (2000-2014) and introducing three new facets which are used to analyse research on SME adoption/use of IS (units of analysis, SME sizes and SME types) not considered in previous literature review studies. These facets provide thebasis for proposing various future research opportunities. The editorial then introduces the four papers in this special section covering the research theme on SMEs, and highlights the contributions they make using the three facets.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Computer-aided design decision support has proved to be an elusive and intangible project for many researchers as they seek to encapsulate information and knowledge-based systems as useful multifunctional data structures. Definitions of ‘knowledge', ‘information', ‘facts', and ‘data' become semantic footballs in the struggle to identify what designers actually do, and what level of support would suit them best, and how that support might be offered. The Construction Primer is a database-drivable interactive multimedia environment that provides readily updated access to many levels of information aimed to suit students and practitioners alike. This is hardly a novelty in itself. The innovative interface and metadata structures, however, combine with the willingness of national building control legislators, standards authorities, materials producers, building research organisations, and specification services to make the Construction Primer a versatile design decision support vehicle. It is both compatible with most working methodologies while remaining reasonably future-proof. This paper describes the structure of the project and highlights the importance of sound planning and strict adhesion to library-standard metadata protocols as a means to avoid the support becoming too specific or too paradigmatic.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Secure management of Australia’s commercial critical infrastructure presents ongoing challenges to owners and the government. Although it is currently managed through high-level information sharing via collaboration, but does this suit the commercial sector. One of the issues facing Australia is that the majority of critical infrastructure resides under the control of the business sector and certain aspects such of the critical infrastructure such as Supply Chain Management (SCM) systems are distributed entities and not a single entity. The paper focuses upon the security issues associated with SCM systems and critical infrastructure protection.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

DDoS is a spy-on-spy game between attackers and detectors. Attackers are mimicking network traffic patterns to disable the detection algorithms which are based on these features. It is an open problem of discriminating the mimicking DDoS attacks from massive legitimate network accessing. We observed that the zombies use controlled function(s) to pump attack packages to the victim, therefore, the attack flows to the victim are always share some properties, e.g. packages distribution behaviors, which are not possessed by legitimate flows in a short time period. Based on this observation, once there appear suspicious flows to a server, we start to calculate the distance of the package distribution behavior among the suspicious flows. If the distance is less than a given threshold, then it is a DDoS attack, otherwise, it is a legitimate accessing. Our analysis and the preliminary experiments indicate that the proposed method- can discriminate mimicking flooding attacks from legitimate accessing efficiently and effectively.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper examines the emergent security risk that information warfare poses to critical infrastructure systems, particularly as governments are increasingly concerned with protecting these assets against attack or disruption. Initially it outlines critical infrastructure systems and the notion of information warfare. It then discusses the potential implications and examining the concerns and vulnerabilities such cyber attacks would pose, utilising exemplar online attack occurrences. It then examines the current Australian situation before suggesting some considerations to mitigate the potential risk that information warfare poses to critical infrastructure systems, and by association: government, industry and the wider community.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study investigates information literacy and scholarly communication within the processes of doctoral research and supervision at a distance. Both doctoral candidates and supervisors acknowledge information literacy deficiencies and it is suggested that disintermediation and the proliferation of information may contribute to those deficiencies. Further to this, the influence of pedagogic continuity—particularly in relation to the information seeking behaviour of candidates—is investigated, as is the concomitant aspect of how doctoral researchers practise scholarly communication. The well-documented and enduring problem for candidates of isolation from the research cultures of their universities is also scrutinised. The contentious issue of more formally involving librarians in the doctoral process is also considered, from the perspective of candidates and supervisors. Superimposed upon these topical and timely issues is the theoretical framework of adult learning theory, in particular the tenets of andragogy. The pedagogical-andragogical orientation of candidates and supervisors is established, demonstrating both the differences and similarities between candidates and supervisors, as are a number of independent variables, including a comparison of on-campus and off-campus candidates. Other independent variables include age, gender, DETYA (Department of Education, Training & Youth Affairs) category, enrolment type, stage of candidature, employment and status, type of doctorate, and English/non-English speaking background. The research methodology uses qualitative and quantitative techniques encompassing both data and methodological triangulation. The study uses two sets of questionnaires and a series of in-depth interviews with a sample of on-campus and off-campus doctoral candidates and supervisors from four Australian universities. Major findings include NESB candidates being more pedagogical than their ESB counterparts, and candidates and supervisors from the Sciences are more pedagogical than those from Arts, Humanities and Social Sciences, or Education. Candidates make a transition from a more dependent and pedagogically oriented approach to learning towards more of an independent and andragogical orientation over the duration of their candidature. However, over tune both on-campus and off-campus candidates become more isolated from the research cultures of their universities, and less happy with support received from their supervisors in relation to their literature reviews. Ill The study found large discrepancies in perception between the support supervisors believed they gave to candidates in relation to the literature review, and the support candidates believed they received. Information seeking becomes easier over time, but candidates face a dilemma with the proliferation of information, suggesting that disintermediation has exacerbated the challenges of evaluation and organisation of information. The concept of pedagogic continuity was recognised by supervisors and especially candidates, both negative and positive influences. The findings are critically analysed and synthesised using the metaphor of a scholarly 'Club' of which obtaining a doctorate is a rite of passage. Recommendations are made for changes in professional practice, and topics that may warrant further research are suggested.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Many parties involved in the construction industry have convinced the importance of electronic commerce (EC) for improving business processes, cutting cost, and providing comprehensive information. However, currently the application of EC is relatively limited and ineffective. These systems are always non-interoperable which creates problems for the stakeholders in construction projects. This paper aims to analyze the E-commerce application system and develop a system for the parties to collaborate and share information effectively. In this paper, four information flats are summarized based on the literature survey and field investigation, and the information integration model for EC is built up using IFC and XML. It should provide a useful reference for China to promote the development of EC in the construction industry.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Secure management of Australia's commercial critical infrastructure presents ongoing challenges to both the owners of this infrastructure as well as to the government. It is currently managed through high-level information sharing via collaboration but does this situation suit the commercial sector? One of the issues facing Australia is that the majority of critical infrastructure resides under the control of the business sector and certain aspects such of the critical infrastructure such as supply chain management (SCM) systems are distributed across a number of entities. The paper focuses upon the security and risk issues associated with SCM systems within the realms of critical infrastructure protection.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Case studies of the organizational implementation of traditional business computing have often emphasized the importance of context in research design and data analysis. The emergence of computing phenomena that pervade different contexts within and even beyond the organizational boundary suggests the need to disaggregate the notion of context to allow for finer levels of contextual analysis. Indeed we demonstrate that a failure to consider interdependent levels of context in organizational case studies of computing technologies that even approach ubiquity runs the risk of partial and even incorrect conclusions being drawn. We illustrate this argument by means of two explanatory case studies of intranet and mobile technology implementation in organizations. Based on the extant literature on context in case study design and examples drawn from the cases, we propose a range of interconnected and interrelated contexts to consider in the research design of explanatory cases of ubiquitous technology implementation in organizations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An exploratory survey (n = 57) of the Melbourne Chapter of the Information Systems Audit and Control Association was conducted to ascertain the attitudes and practices relating to corporate governance and the corporate governance of Information Technology (CGIT) in Australia. The survey found the respondents had clear views on corporate governance but most were not engaged with it, the organizational approach to corporate governance and its expected benefits was largely conformance oriented, awareness of CGIT management frameworks and associated standards was high but implementation was not widespread, and although the CGIT standard ISOIIEC 38500 was not widely implemented IT practitioners agreed with its principles. We conclude that the value of the CGIT standard has yet to be recognised by executives in Australia.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An important and difficult issue in designing a Fuzzy Inference System (FIS) is the specification of fuzzy sets and fuzzy rules. In this paper, two useful qualitative properties of the FIS model, i.e., the monotonicity and sub-additivity properties, are studied. The monotonic sufficient conditions of the FIS model with Gaussian membership functions are further analyzed. The aim is to incorporate the sufficient conditions into the FIS modeling process, which serves as a simple (which can be easily understood by domain users), easy-to-use (which can be easily applied to or can be a part of the FIS model), and yet reliable (which has a sound mathematical foundation) method to preserve the monotonicity property of the FIS model. Another aim of this paper is to demonstrate how these additional qualitative information can be exploited and extended to be part of the FIS designing procedure (i.e., for fuzzy sets and fuzzy rules design) via the sufficient conditions (which act as a set of useful governing equations for designing the FIS model). The proposed approach is able to avoid the "trial and error" procedure in obtaining a monotonic FIS model. To assess the applicability of the proposed approach, two practical problems are examined. The first is an FIS-based model for water level control, while the second is an FIS-based Risk Priority Number (RPN) model in Failure Mode and Effect Analysis (FMEA). To further illustrate the importance of the sufficient conditions as the governing equations, an analysis on the consequences of violating the sufficient conditions of the FIS-based RPN model is presented.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Recent re-conceptualizations of the ‘public sphere’ facilitated a much needed shift in thinking about identity politics ‘from a substance … to a movement’ (Weibel and Latour, 2007). This laid the foundation for dissolving the ‘emanatist vision’ (Bourdieu, 1990) of self-explanatory and perpetual systems and structures towards the interrogation of actions and performances that simultaneously constitute and are affected by such wider socio-political realities. Most academic contributions, however, remain on a normative or theoretical level without offering empirical insights.

This article introduces Mana Taonga as an Indigenous Māori concept of cultural politics embedded in current museum practice at the Museum of New Zealand Te Papa Tongarewa (Te Papa). It creates a dialogue between Indigenous Māori practice and Western theory leading to a refined understanding of performative democracy within a museum as forum, or public sphere. The authors argue that a specific museum offers a particular place, space and empirical reality to interrogate seemingly universal concepts such as ‘culture’ and ‘politics’ by blending theoretical notions with an awareness of institutional contexts and practices.