109 resultados para Information technology usage


Relevância:

90.00% 90.00%

Publicador:

Resumo:

Investigates the creation of a method for the connection and communication of commercial off the shelf discrete-event simulation packages for simulation models of manufacturing systems. Through this research a method to connect different commercial off the shelf discrete-event simulation packages was successfully developed facilitating parallel development of models and the creation of extremely large models.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This thesis develops a framework of key influences that must be considered in order to enable development of an information security culture in Australian small and medium enterprises. The study argues that, by ensuring that key influences are in place, an effective information security culture will evolve.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Many organizations still rely on deterrence to control insider threats and on purely preventive strategies to control outsider threats. Such a simple approach to organizational information security is no longer viable given the increasing operational sophistication of current security threat agents and the complexity of information technology infrastructure. Effective implementation of security requires organizations to select a combination of strategies that work in tandem and best suits their security situation. This paper addresses the identification and classification of factors that influence implementation of security strategies in organizations. In this paper, we develop a preliminary architecture that aims to assist organizations in deciding how strategies can be designed to complement each other to improve the cost-effectiveness of security.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This paper attempts to reduce the research gap in the alliance learning literature by reporting the results of a study based on a conceptual model on the Australian ICT industry, which is tested through Structural Equation Modelling (SEM). The conceptual model includes six constructs (alliance performance, learning orientation, market orientation, relational norms, trust and knowledge intensity). Suggestions for practitioners involved in alliances and directions for future research are espoused.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Mobile computing devices such as personal digital assistants, smart mobile phones, and other handheld computing devices hold much promise in terms of their organizational application. Many existing models of the individual acceptance and implementation of information technology in organizational contexts have been developed in the era of “at the office” computing such as MIS, office automation, groupware, and so forth. We conducted two in-depth case studies of the implementation of mobile technology in healthcare organizations. The studies highlight interrelated individual use contexts due to the mobility of the technology: the individual as employee, as professional, as private user, and as member of society. The cases show that influences emanating from these use contexts impacted on the individual adoption of the technology within the organization. While broad extra-organizational influences are incorporated in some existing individual technology adoption models, we show that it becomes relevant to accommodate these influences more specifically in research models of mobile computing in organizations. Based on the extant literature and the case study data we pave the way toward more comprehensive models of the adoption and implementation of mobile technologies in organizations.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Addressing the diversity in information requirements across the enterprise is a central challenge in enterprise content management. Enterprise information portals (EIPs) hold promise in this regard, offering each user a gateway to customized and personalized content. However, in large organizations EIP implementers face the complexity of tailoring portals for potentially thousands of users. A conceptual framework based on marketing fundamentals is developed to inform EIP implementation in this respect. It is argued that EIP implementers should view their user community as a number of distinct segments in order to address divergent needs more specifically (as opposed to a ‘one size fits all’ approach). For each identified segment, a ‘mix’ of content (product), distribution (place), promotion and price (cost) should be considered. The framework is applied to two cases of EIP implementation in large organizations. It is proposed that segmentation enables better planning of the overall EIP implementation effort. Considerations such as the number of user segments, customization, and personalization of content, and the funding of EIP development in large organizations are also discussed. The concepts elaborated here also hold theoretical relevance for other IS implementation contexts that involve very large usercommunities with diverse information

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Information and communication technologies such as email, text messaging and video messaging are commonly used by the general population. However, international research has shown that they are not used routinely by GPs to communicate or consult with patients. Investigating Victorian GPs’ perceptions of doing so is timely given Australia’s new National Broadband Network, which may facilitate web-based modes of doctor-patient interaction. This study therefore aimed to explore Victorian GPs’ experiences of, and attitudes toward, using information and communication technologies to consult with patients. Qualitative telephone interviews were carried out with a maximum variation sample of 36 GPs from across Victoria. GPs reported a range of perspectives on using new consultation technologies within their practice. Common concerns included medico-legal and remuneration issues and perceived patient information technology literacy. Policy makers should incorporate GPs’ perspectives into primary care service delivery planning to promote the effective use of information and communication technologies in improving accessibility and quality of general practice care.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In this paper we introduce the concept of feral practices which we define as the usage of information technology which deviates from the standard organizational norms and which exists beyond the control and/or knowledge of the organizational IT management. We argue towards using a ‘practice’ perspective in understanding noncompliant IT practices where we suggest a greater emphasis on usage of IT artifacts rather than the artifacts itself. We also outline a scope of feral practices by clarifying some of the concepts associated with the phenomenon. We propose a model based on the Merton’s Theory of Anomie, which seeks to explain why feral practices come about and what are the technological and social influences and supporting factors which lead to this phenomenon. This study thus intends to build a conceptual base for future studies on feral practices by providing a holistic view on the phenomenon and also identify directions for future research.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Network technologies are very desirable for social action, allowing activists to achieve more with less, more quickly and with broader impact; on the other hand, the very advantages they bring are equally important to the world of contemporary capitalism that social action seeks to change. Thus, we must look beyond network technologies as the easy solution to every problem, and focus instead on the human relationships which might be enabled by them. This focus on relationships requires us to ‘de-tool’ information technology. Instead, for social action, it is more valuable to think of networked computing as part of the environment within which action can occur; an important purpose for such action; and as a medium that nurtures expression and engagement of self and belief.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

An institutional electronic portfolio called the "iPortfolio" had over 17,000 subscribers one year after its introduction at an Australian university. This paper reports on a study to determine how students use these "iPortfolio" accounts, and factors leading to uptake and effective use. Self-assessed competence with technology skills, factors motivating uptake, and barriers to adoption were examined using an online survey completed by 554 students. Of these, 339 had an "iPortfolio" at the time they completed the survey. Survey results were examined in the context of usage patterns based on data automatically collected for operational and administrative purposes. No statistically significant difference in prior technology use or self-assessed competence with information technology was observed when comparing students with "iPortfolio" accounts to those without. Assessment was found to be the principal driver of "iPortfolio" uptake. However, about two-fifths (42.9%) of students agreed that they were likely to use the "iPortfolio" in the future, even if it was not a course requirement. An additional 29.6% were neutral. Significant use of the "iPortfolio" to reflect on extracurricular activities was not observed. Improved employability outcomes were seen to be a benefit of "iPortfolio" adoption by about half (52%) of the students. Recommendations are made to promote "iPortfolio" uptake and encourage student reflection on "lifewide" experiences that enhance employability and augment learning within the formal curriculum.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

 Dr. Wen's research includes modelling the propagation dynamics of malicious information, exposing the most influential people and source identification of epidemics in social networks. His research is beneficial to both academia and industry in the field of Internet social networks.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

 This research investigated the proliferation of malicious applications on smartphones and a framework that can efficiently detect and classify such applications based on behavioural patterns was proposed. Additionally the causes and impact of unauthorised disclosure of personal information by clean applications were examined and countermeasures to protect smartphone users’ privacy were proposed.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

 The thesis proposed four novel algorithms of information discovery for Multidimensional Autonomous Wireless Sensor Networks (WSNs) that can significantly increase network lifetime and minimize query processing latency, resulting in quality of service improvements that are of immense benefit to Multidimensional Autonomous WSNs are deployed in complex environments (e.g., mission-critical applications).