109 resultados para Information technology usage


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The lack of skilled labour that can support digital economies is a worldwide problem, exacerbated by the lack of female participation in the Information Technology (IT) industry. Interventions that promote IT study and career opportunities for girls can be a powerful means to counter the ongoing decline in IT interest amongst females. However, the impact of such interventions is rarely being evaluated. This study is, therefore, aimed at gaining insights into the influence on IT career perceptions of one IT intervention event for secondary school girls conducted in Australia in 2014. The analysis of comprehensive survey data (n=781) using the Partial Least Squares and other statistical techniques revealed that a positive attitude toward the analysed event had significant direct and indirect positive impacts on girls' intentions to choose a career in IT. The indirect influence was supported by such mediating factors as girls' self-efficacy towards IT careers and their intentions to learn more about IT, which the event affected directly. In addition to reporting on the results of testing the research model, further insights into girls' opinions and attitudes towards the intervention and IT in general are provided in the paper.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper explores, through practitioner experience and literature review, the impact of increased use of information technology in a global business environment on relational ethics. These three variables interact in a dynamic field that supports and challenges global managers in entrepreneurial endeavors. While information and communication technology (ICT) is rapidly expanding, the opportunities for global business and relational ethics affects, and is affected by, the interconnections. Drawing on experiences from daily practice, current literature, and insights gained from a relational approach to ethics, readers are invited to reflect on the ways that relationships influence ethical actions—and outcomes—and how they can be improved. This analysis exposes the critical issues, develops a general framework and makes recommendations for ways to work with and further develop the interconnections between global business, ICT and relational ethics.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Building Information Modelling (BIM) is an information technology [IT] enabled approach to managing design data in the AEC/FM (Architecture, Engineering and Construction/ Facilities Management) industry. BIM enables improved interdisciplinary collaboration across distributed teams, intelligent documentation and information retrieval, greater consistency in building data, better conflict detection and enhanced facilities management. Despite the apparent benefits the adoption of BIM in practice has been slow. Workshops with industry focus groups were conducted to identify the industry needs, concerns and expectations from participants who had implemented BIM or were BIM “ready”. Factors inhibiting BIM adoption include lack of training, low business incentives, perception of lack of rewards, technological concerns, industry fragmentation related to uneven ICT adoption practices, contractual matters and resistance to changing current work practice. Successful BIM usage depends on collective adoption of BIM across the different disciplines and support by the client. The relationship of current work practices to future BIM scenarios was identified as an important strategy as the participants believed that BIM cannot be efficiently used with traditional practices and methods. The key to successful implementation is to explore the extent to which current work practices must change. Currently there is a perception that all work practices and processes must adopt and change for effective usage of BIM. It is acknowledged that new roles and responsibilities are emerging and that different parties will lead BIM on different projects. A contingency based approach to the problem of implementation was taken which relies upon integration of BIM project champion, procurement strategy, team capability analysis, commercial software availability/applicability and phase decision making and event analysis. Organizations need to understand: (a) their own work processes and requirements; (b) the range of BIM applications available in the market and their capabilities (c) the potential benefits of different BIM applications and their roles in different phases of the project lifecycle, and (d) collective supply chain adoption capabilities. A framework is proposed to support organizations selection of BIM usage strategies that meet their project requirements. Case studies are being conducted to develop the framework. The results of the preliminary design management case study is presented for contractor led BIM specific to the design and construct procurement strategy.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A folio-based doctoral study comprising a dissertation, a major literature review, and a website. The dissertation identified key dimensions of blended learning environments created by the teachers in the study. These environments were characterised by different media blends and learning activities underpinned by resource-based learning approaches to teaching and learning.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Computers and information technology play an important role in engineering education at the School of Engineering and Technology, Deakin University, Australia. Experience has shown that there are significant demographic differences between on- and off-campus engineering student groups. It was thought that the differences in the student groups might also lead to differences in computer usage patterns between the groups. A survey on computer usage was undertaken to determine the computer usage patterns of students at the commencement of their studies. The survey revealed differences between on- and off-campus students in whether students indicated they were regular computer users (on-campus = 77.2%, off-campus = 94.7%), the average reported hours per week usage of computers (on-campus = 6.0 h, off-campus = 23.3 h), the reported source of computer access, whether students indicated they were regular users of e-mail (on-campus = 29.8%, off-campus = 73.7%), whether students indicated they were regular users of the World Wide Web (on-campus = 38.6%, off-campus = 68.4%), and the reported source of World Wide Web access. It is proposed that the differing personal circumstances of the two student groups may contribute to the difference in survey responses.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This article explores the range of boundaries to negotiate the demands of evidence-based practice. Increasing demands that social work be a profession committed to evidence-based practice have coincided with innovations in information technology, which potentially give social workers unprecedented access to a plethora of sources and types of evidence. Because these innovations can enable access to evidence beyond traditional boundaries, the question of how the author establish the borders of acceptability warrants consideration. Recommendations for a critical approach to selective evidence based for social work interventions are also provided.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Universities are increasingly turning to ‘fashionable’ education programs to attract bright, high-quality students to both under-graduate and post-graduate degree programs. Traditional offerings in technology areas, such as Information Systems and Information Technology are being augmented by newer, more marketable degrees in areas such as eCommerce/eBusiness. This paper analyses the eCommerce/eBusiness and Information Systems (IS) / Information Technology (IT) academic programs in Australian and New Zealand universities on the basis of Kotler and Fox's service offering model of educational institutions; and considers what differences exist between these two apparently similar areas of academic endeavour. Finally we look at the trends of academic program delivery in the e-age and question whether universities need to take a more consumer-product approach to the issue of attracting appropriate students.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Outsourcing of Information Technology (IT) services which are central to business strategy may be risky. Managers have made the outsourcing decision both to concentrate financially on the core competencies and to rid themselves of a troublesome and cost inefficient department. More recent research has, however, cast doubt on the promises of huge savings. In this paper, we consider the likelihood that outsourcing may lead to the loss of organisational knowledge - that organisations outsourcing their total Information Systems operations may also have lost irreplaceable tacit, cross-functional knowledge which subsisted within the minds of the professional systems analysts. The findings of our research revealed that expert systems analysts possess a unique organisational understanding and draw on this knowledge to operate efficiently in their environment. We present a model that will allow future researchers to build on our findings and examine whether outsourcing can lead to a loss of organisational memory.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

With information warfare (IW) becoming a reality, the need for a new security methodology to deal with the new and unique attack threats and vulnerabilities associated with the new information technology security paradigm. With the shift from computer security to information warfare, logical transformation models (LTMS) were looked at as a solution to quantifying information system requirements. The paper will introduce the concepts involved with fourth generational models and it's application to IW. The basic advantages and disadvantages will also be discussed and presented.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Delivered information systems are an integral part of many organisations’ information technology infrastructure. Their dynamic nature creates new challenges, not the least of which is the need to measure the quality/effectiveness of these systems. Given the size of investment in these systems, it would be invaluable for business to formulate a fresh, simple, easy to administer, multi-dimensional instrument capable of measuring the quality of delivered information systems or applications. Such an instrument would provide a practical and efficient means to pinpoint areas that key stakeholders, ranging from end-users to managers, perceive as requiring attention. In this paper, we report on the development of one such instrument. This instrument addresses key areas of performance and uses multiple statements to enhance stakeholders’ understanding of these areas.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Wilh the protection of critical information infrastructure becoming a priority for all levels of management. there is a need for a new security methodology to deal with the new and unique attack threats and vulnerabilities associated with the new information technology security paradigm. The fourth generation security risk analysis melhod which copes wilh the shift from computer/information security to critical information iinfrastructure protectionl is lhe next step toward handling security risk at all levels. The paper will present the methodology of
fourth generation models and their application to critical information infrastructure protection and the associated advantagess of this methodology.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

A new unit named Information Systems in Construction was developed and taught for the first time in the School of Architecture and Building at Deakin University in Semester 1 2003 for first-year construction management students. This paper reports on key issues that arose during the unit development process and the implementation of teaching activities. Special consideration is given to the learners (first year students), the teaching environment (online teaching and learning), the unit background (information technology and information system), and the discipline (international construction). Several suggestions are outlined for improving the unit development and delivery in the next round.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Critical Information Infrastructure (CII) has become a priority for all levels of management, It is one of the key components of efficient business and business continuity plans. There is a need for a new security methodology to deal with the new and unique attack threats and vulnerabilities associated with the new information technology security paradigm. Critical Information Infrastructure Protection - Risk Analysis Methodology
(ClIP-RAM), is a new security risk analysis method which copes with the shift from computer/information security to critical information infrastructure protection. This type of methodology is the next step toward handling information technology security risk at all levels from upper management information security down to firewall configurations. The paper will present the methodology of the new techniques and their application to critical information infrastructure protection. The associated advantages of this methodology will also be discussed.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Building demolition has been undergoing evolutionary development in its technologies for several decades. In order to achieve a high level of demolition material reuse and recycling, new management approaches are also necessitated, in particular in conjunction with the applications of information technologies. The development of an information system for demolition project management is an impactful strategy to support various demolition activities including waste exchange, demolition visualization, and demolition method selection and evaluation. This paper aims to develop a framework of an integrated information system for building demolition project demolition decision-making and waste minimization. The components of this information system and their interactions are demonstrated through a specifical demolition project.