111 resultados para Democratization of information

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Information literacy has become an important skill for undergraduate students due to societal changes that have seen information become a valuable commodity, the need for graduates to become lifelong learners, and the recognition that information literacy is an underpinning generic skill for effective learning in higher education. This paper describes a sequence of activities and technologies designed to help students learn and practice information literacy skills. These activities have been purposefully designed and integrated into a first-year engineering and technology study unit as a core syllabus element. A formal evaluation of aspects of these activities was planned and undertaken in semester one 2003.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In response to the forces of globalization, organizations have had to adapt and even transform themselves. Universities have had to recognize the value of practical working knowledge developed in workplace settings, and promote the value of academic forms of knowledge making to the practical concerns of everyday learning. This paper presents a contemporary case of a designed professional curriculum in the field of information technology that situates workplace learning as a central element in the education of students. Key integrative dimensions are considered along with an analysis of the perspectives of teaching staff and students on the educational experience. (Asia-Pacific Journal of Cooperative Education, 2004, 5(2), 1-11)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper reports part of a study that examines how members of a senior management team in a public sector organisation make decisions under urgency. Four regional managers, who are geographically dispersed around New Zealand were interviewed, either face-to-face or via telephone, regarding their experiences of decision making under urgency.

Preliminary results indicate that only three out of a possible seven steps of a conventional decision making process are used during the urgent decision making process. The study also shows that participants do not fully utilise the information and communication technology available during the decision making process. The implications the findings have for practice and research are discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Important eCommerce requirements are a robust and secure technical infrastructure, and the ability to ensuring the security of information, and to satisfying certain related legal requirements. In this paper, based on a literature review, we present a high-level conceptual model of information security in eCommerce, consisting of three strategic dimensions: protecting organizations' information, satisfying certain legal requirements, and enabling trusted and secure electronic transactions. Our conceptual model can be used by eCommerce managers as a tool in the strategic planning and management process, to better understand and communicate the inter-dependencies between business and legal requirements. The model can also be used for devising the goals and objectives relevant to their specific organization, for designing the policies that are needed, and deciding how technology will be managed and what training is required.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In response to the forces of globalisation, societies and organisations have had to adapt and even proactively transform themselves. Universities, as knowledge-based organisations, have recognised that there are now many other important sites of knowledge construction and use. The apparent monopoly over valued forms of knowledge making and knowledge certification is disappearing. Universities have had to recognise the value of practical working knowledge developed in workplace settings beyond university domains, and promote the value of academic forms of knowledge making to the practical concerns of everyday learning. It is within this broader systems view that professional curriculum development undertaken by universities needs to be examined.

University educational planning responds to these external forces in ways that are drawing together formal academic capability/competence and practice-based capability/competence. Both forms of academic and practice-based knowledge and knowing are being equally valued and related one to the other. University planning in turn gives impetus to the development of new forms of professional education curricula. This paper presents a contemporary case of a designed professional curriculum in the field of information technology that situates workplace learning as a central element in the education of Information Technology (IT)/Information Systems (IS) professionals.

The key dimensions of the learning environment of Deakin University’s BIT (Hons) program are considered with a view to identifying areas of strong integration between the worlds of academic and workplace learning from the perspectives of major stakeholders. The dynamic interplay between forms of theorising and practising is seen as critical in educating students for professional capability in their chosen field. From this analysis, an applied research agenda, relating to desired forms of professional learning in higher education, is outlined, with specific reference to the information and communication technology professions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The motivation for detailed study of information systems research subject indexing schemes is explained, along with an analysis of two indexing schemes proposed for use in the area.  A number of reference disciplines are examined for their ability to provide insights and analysis approaches.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The effective management of information and its associated infrastructure is critical in electronic business. Failure to exercise due diligence in information assurance and security may lead to lost revenue or business opportunities, brand and reputation erosion, adverse media publicity, scrutiny from consumer advocates and even lawsuits. Traditionally, information security was approached in terms of goals. Yet, the goalsoriented approach may be a flawed one. In this paper, we adopt a conceptual analytical approach and propose a tri-dimensional understanding of information security in electronic business. Our approach can help managers better understand and communicate the information security’s role in e-business and the inter-dependencies between business and legal requirements, for devising the goals, objectives and policies relevant to their organization.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The tale of research methodology in information systems is told through the fantasy of Tolkien’s Lord of the Rings. The tale is intended to be at once a piece of light hearted fun in its placement of the struggles of research methodology as an epic story but, in the tradition of the court jester, attempts to provide a new perspective on Information Systems (IS) research methodology and our struggles with positivism in particular. Our tale is one of developing a greater maturity and confidence in IS methodology and introduces postmodern methodologies to Information Systems. Our tale, our pastiche, is itself postmodern.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

I show that the principal and the agent may each prefer that the principal or the agent has imperfect information about the principal's technology in a principal-agent environment with moral hazard. Principals expend considerable resources on data cumulation and analysis. However, such investments in information acquisition are benecial only if the agent will know that the principal is not ignorant or it allows the principal to implement a dierent action. When the principal is perfectly informed about her technology, the agent prefers to be ignorant. In addition, the value of perfect information for the agency is negative if the principal would implement the same action with either possible technology. I also investigate the dierences between ex ante and ex post contracting, and the ramications of the principal being ignorant or potentially ignorant about the technology. Finally, I determine if the principal's utility varies continuously with the degree of informativeness of the agent about the principal's technology. In this vein, I determine whether the agent's uncertainty may make the principal better o if she has the less informative technology.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The examination of a practical issue with a web site has led, in this paper, directly to the consideration of the need for, and an assessment of the impact of, an approach based on fundamental theories of ‘what is’, to examine what information systems research is and the relations of its component areas of endeavour. The paper presents an examination of the use of the philosophical field of ontologies, and specifically the use of the ontological approaches upon which to base categories of information systems research activities. This theoretical analysis is intended to be used as the basis from which to develop a methodology to undertake the development of the categorial scheme for the web site that initiated the research.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In recent years, we have witnessed many information security developmental trends. As a consequence, the dimensions of information security - once single disciplinary area - have become multifaceted and convoluted. This paper aims to (1) recapitulate these key developments: (2) argue that the emergence of many complex information security dimensions are the result of 'constant change agents' (CCAs); (3) discuss the implications on Australia's society, i. e. government, companies and individuals; and (4) propose key consideration areas and possible solutions thereof. We hope that the discussion presented here will position Australia to make better aligned information security and strategic plans, such as choosing appropriate investments and adopting effective solutions to strengthen and secure Australia's national information security posture.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As small and medium enterprises develop their capacity to trade  electronically, they and their trading partners stand to gain considerable benefit from the resulting transaction efficiencies and business  relationships. However, this raises the question of how well small business manages its IT security and the threats that security lapses may pose to the wider trading network. It is in the interest of all members of an electronic trading network, as well as governments, to assist smaller companies to secure their business data. This paper considers the relationship between IT security management and IT policy implementation among small  businesses involved in business-to-business eCommerce. It reports the results of a survey of 240 Australian small and medium businesses  operating in a cross-industry environment. The survey found a low level of strategic integration of eCommerce along with inadequate IT security among the respondents, despite the fact that 81% were doing business online and 97% identified their business data as confidential. Businesses which implemented satisfactory levels of security technologies were more likely than others to have an information technology policy within the organisation. The paper proposes a model that outlines the development of security governance and policy implementation for small and medium businesses.