31 resultados para Computer systems

em Deakin Research Online - Australia


Relevância:

70.00% 70.00%

Publicador:

Resumo:

The paper describes the on-going development of a new computer-based security risk analysis methodology that may be used to determine the computer security requirements of medical computer systems. The methodology has been developed for use within healthcare, with particular emphasis placed upon protecting medical information systems. The paper goes on to describe some of the problems with existing automated risk analysis systems, and how the ODESSA system may overcome the majority of these problems. Examples of security scenarios are also presented.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This study examines student perceptions of the usefulness of Computer-Assisted Learning (CAL) packages in learning accounting concepts in terms of the influence on academic performance. Various additional factors  affecting academic performance [such as gender, prior studies of  accounting, and computer systems, together with entry background] are incorporated in the development of a multiple regression model, together with perceptions of CAL. The study uses a sample of 280 second-year undergraduate accounting students from an Australian university to test the model. In contrast to prior studies (e.g. Lane and Porch, 2002, Accounting Education: an international journal, 11(3), pp. 217-233), this study showed that positive perceptions of the usefulness of CAL significantly influenced performance. Additionally, it was found that international students, many of whom enter university at the second year level having obtained advanced standing credits, had significantly poorer performance than local students. The findings show that gender, prior studies of accounting and computing systems were not significant influences on academic performance. Overall, the results have implications for accounting educators utilising CAL in courses as a means of improving students' understanding of accounting concepts and academic performance.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This action research project set out to develop the competence of senior personnal from a private vocational college in Thailand in the use of administrative computer systems. The findings demonstrate the critical significance of progressive incremental learning that is tailored to the professional personal needs of learners. Learner competence was found to be dependent upon the creation of an environment promoting learner confidence.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

In this paper, typing biometrics is applied as an additional security measure to the password-based or Personal Identification Number (PIN)-based systems to authenticate the identity of computer users. In particular, keystroke pressure and latency signals are analyzed using the Fuzzy Min-Max (FMM) neural network for authentication purposes. A special pressure-sensitive keyboard is designed to collect keystroke pressure signals, in addition to the latency signals, from computer users when they type their passwords. Based on the keystroke pressure and latency signals, the FMM network is employed to classify the computer users into two categories, i.e., genuine users or impostors. To assess the effectiveness of the proposed approach, two sets of experiments are conducted, and the results are compared with those from statistical methods and neural network models. The experimental outcomes positively demonstrate the potentials of using typing biometrics and the FMM network to provide an additional security layer for the current password-based or PIN-based methods in authenticating the identity of computer users.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

The rapid development and increasing complexity of computer systems and communication networks coupled with the proliferation of services and applications in both Internet-based and ad-hoc based environments have brought network and system security issues to the fore. We have been witnessing ever-increasing cyber attacks on the network and system leading to tarnished confidence and trusts in the use of networked distributed systems. As a result, there is an increasing demand for development of new trust, security and privacy approaches to guarantee the privacy, integrity, and availability of resources in networked distributed systems.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Research into Intelligent Agent (IA) technology and how it can assist computer systems in the autonomous completion of common office and home computing tasks is extremely widespread. The use oflA's is becoming more feasible as the functionality moves Into line with what users require for their everyday computing needs. However, this does not mean that IA technology cannot be exploited or developed for use in a malicious manner, such as within an Information Waifare (IW) scenario, where systems may be attacked autonomously by agent system implem-entations. This paper will discuss tne cilrrenlStcite Ofmalicious use of lA's as well as focusing on attack techniques, the difficulties brought about by such attacks as well as security methods, both proactive and reactive, that could be instated within compromised or sensitive systems.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Process management is a crucial issue in developing information or computer systems. Theories of software development process management suggest that the process should be supported and managed based on what the process really is. However, our learning from an action research study reveals that the requirements engineering (RE) process differs significantly from that which the current literature tends to describe. The process is not a systematic, smooth and incremental evolution of the requirements model, but involves occasional simplification and restructuring of the requirements model. This revised understanding of the RE process suggests a new challenge to both the academic and industrial communities, demanding new process management approaches. In this paper, we present our understanding of the RE process and its implications for process management.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Determining the causal structure of a domain is frequently a key task in the area of Data Mining and Knowledge Discovery. This paper introduces ensemble learning into linear causal model discovery, then examines several algorithms based on different ensemble strategies including Bagging, Adaboost and GASEN. Experimental results show that (1) Ensemble discovery algorithm can achieve an improved result compared with individual causal discovery algorithm in terms of accuracy; (2) Among all examined ensemble discovery algorithms, BWV algorithm which uses a simple Bagging strategy works excellently compared to other more sophisticated ensemble strategies; (3) Ensemble method can also improve the stability of parameter estimation. In addition, Ensemble discovery algorithm is amenable to parallel and distributed processing, which is important for data mining in large data sets.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Cluster systems are becoming more prevalent in today’s computer society and users are beginning to request that these systems be reliable. Currently, most clusters have been designed to provide high performance at the cost of providing little to no reliability. To combat this, this report looks at how a recovery facility, based on either a centralised or distributed approach could be implemented into a cluster that is supported by a check pointing facility. This recovery facility can then recover failed user processes by using checkpoints of the processes that have been taken during failure free execution.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Process management is a crucial issue in developing information or computer systems. Theories of software development process management suggest that the process should be supported and managed based on what the process really is. However, our learning from an action research study reveals that the requirements engineering (RE) process differs significantly from what the current literature tends to describe. The process is not a systematic, smooth and incremental evolution of the requirements model, but involves occasional simplification and restructuring of the requirements model. This revised understanding of the RE process suggests a new challenge to both the academic and industrial communities, demanding new process management approaches. In this paper, we present our understanding of the RE process and its implications for process management.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Deakin University in Australia is one of the leading providers of distance education in the South Pacific region. The School of Engineering offers four-year professional engineering-degree programs and three-year technologist programs. The over 600 total students studying engineering at Deakin fall into four categories:

• 18-19 year-old students fresh from high school, who largely study on-campus,
• older students in the technical workforce, seeking a university degree to upgrade their qualifications,
• industry-based students studying in university-industry partnership programs,
• overseas students studying either on-campus, or off-campus through education partners in Malaysia and Singapore.

Geographically these students form a very wide student base. The study programs are designed to produce multi-skilled, broadly focused engineers and technologists with multi-disciplinary technical competence, and the ability to take a systems approach to design and operational performance. A team of around 25 academic staff deliver courses in seven different majors in the general fields of manufacturing, environmental engineering, mechatronics, and computer systems. We discuss here the history of the School, its teaching philosophy, and its unique methods in delivering engineering education to a widely scattered student body.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Experiential simulations have been used effectively for teaching business, medicine and engineering. Many are supported by computer systems that create artificial virtual spaces so learners can safely practice intricate professional skills. Surprising few attempts have been made to utilise such approaches in teaching IT/IS principles and requirements engineering (RE) in particular. This paper reports on FAB ATM, which is one of those few learning environments which rely on computer simulation and which have been designed specifically to train IS professionals, and in particular, develop their RE skills. In its framework, FAB ATM combines and balances elements of video-based computer simulation with activities, such as classroom instructions. This paper explains the principles of the FAB ATM design, its coverage of RE activities and the anecdotal experiences of students and staff that have used this environment in practice.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This text introduces the concepts of information warfare from a non-military, organizational perspective. It is designed to stimulate managers to develop policies, strategies, and tactics for the aggressive use and defence of their data and knowledge base. The book covers the full gambit of information warfare subjects from the direct attack on computer systems to the more subtle psychological technique of perception management. It provides the framework needed to build management strategies in this area. The topics covered include the basics of information warfare, corporate intelligence systems, the use of deception, security of systems, modes of attack, a methodology to develop defensive measures, plus specific issues associated with information warfare.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The development of fault-tolerant computing systems is a very difficult task. Two reasons contributed to this difficulty can be described as follows. The First is that, in normal practice, fault-tolerant computing policies and mechanisms are deeply embedded into most application programs, so that these application programs cannot cope with changes in environments, policies and mechanisms. These factors may change frequently in a distributed environment, especially in a heterogeneous environment. Therefore, in order to develop better fault-tolerant systems that can cope with constant changes in environments and user requirements, it is essential to separate the fault tolerant computing policies and mechanisms in application programs. The second is, on the other hand, a number of techniques have been proposed for the construction of reliable and fault-tolerant computing systems. Many computer systems are being developed to tolerant various hardware and software failures. However, most of these systems are to be used in specific application areas, since it is extremely difficult to develop systems that can be used in general-purpose fault-tolerant computing. The motivation of this thesis is based on these two aspects. The focus of the thesis is on developing a model based on the reactive system concepts for building better fault-tolerant computing applications. The reactive system concepts are an attractive paradigm for system design, development and maintenance because it separates policies from mechanisms. The stress of the model is to provide flexible system architecture for the general-purpose fault-tolerant application development, and the model can be applied in many specific applications. With this reactive system model, we can separate fault-tolerant computing polices and mechanisms in the applications, so that the development and maintenance of fault-tolerant computing systems can be made easier.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In this study of intercultural communication, I investigate the multi-faceted meaning of the expression " cultural fit " in the sense that it is used by recruiters when shortlisting Indian information technologists to fill skills shortages for the Y2K project in Australia. The data is in the form of ten videotaped interviews in Bangalore and the recruiter commentary on those tapes in Melbourne. A crucial decision to be made by recruiters in any shortlisting process is " How will the candidate fit into the workplace?" This question becomes more problematical when applied to overseas-trained professionals. I take a critical approach, drawing principally on the research traditions of linguistics where studies of intercultural communication and workplace interaction intersect, employing chiefly the tools of Critical Discourse Analysis and Interactional Sociolinguistics and the more abstract notions of Bourdieu. A bridge between these different discourse approaches is provided by Sarangi & Roberts < 1999 < who show the connection between the larger institutional order and interactional routines, through an elaboration of frontstage talk and backstage talk following Goffman < 1959 < . An analysis of the interviews < frontstage talk < reveals "cultural fit" to involve a knowledge of institutional talk, in particular, directness. The recruiter commentary < backstage talk < draws attention to issues of intelligibility, body language, technical expertise and workplace values. the study shows that Indian Information Technologists have "partial fit" in that they possess technical fit but do not demonstrate, or lack the opportunity to demonstrate in the interview, Australian workplace values such as small talk, humour and informality. The recruiter judgments were fleeting and apart from checking for intelligibility, were made on the basis of candidates' body language thus highlighting its importance and its relative absence from the discourse approaches mentioned above. This study shows clearly that there is room for more communicative flexibility on the part of all the stakeholders.