3 resultados para ID transfer

em Deakin Research Online - Australia


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper explores Critical Success Factors (CSFs) in the transfer
of after-sales support-oriented knowledge from Information Technology (IT)
support organisations to enterprise customers, using Web-based self-service Systems (WSS). As it appears that best-in-class companies are ahead of the academic work in this area, we approached the topic through an exploratory CSF study of a best-in-class multinational IT services firm and identified 26 CSFs. Key findings from the study indicate that best-in-class IT service organisations may be cognisant of a range of factors relating to supporting customers, but are less aware of what is needed to support their own frontline support agents. Such organisations also lack an understanding of what is needed to provide enterprise support in the later stages of knowledge transfer, where enterprise customers can experience problems attempting to integrate resolutions. The study further showed that many aspects that might be characterised as encompassing socio-technical issues relating to the provision of web-based self-service are still poorly understood.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Australia and Indonesia have engaged in cooperation on asylum policy since the late 1990s, bilaterally on immigration detention and people-smuggling agreements, and multilaterally through the Bali Process. Seen from a global perspective, this form of cooperation is one of many such bilateral and multilateral agreements that stymie the ability of asylum-seekers to gain effective and durable protection. This article argues that policy transfer theory can explain how these agreements are achieved, their political implications, and their outcome for the refugee regime and the asylum-seekers reliant on the regime for protection. In the case study of Australia and Indonesia, the authors argue that the cooperation is best understood as a form of ‘incentivised policy transfer’, whereby Australia has provided substantial financial and diplomatic incentives to Indonesia to adopt policies consistent with Australia's own. The implications for asylum-seekers in the Asia-Pacific region are substantial, and include an increase in the use of immigration detention in Indonesia and the introduction of border security measures that restrict the ability of asylum-seekers to reach territory where they may claim protection under the Convention Relating to the Status of Refugees.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In RFID system a tag is attached to an object which might own by a number of owners during its life time. This requires the RFID system to transfer ownership of the tag to its new owner. The ownership transfer has to protect privacy of current and new owner. Many ownership tag ownership transfer exists in the literature, however, most of them are impractical or insecure to implement on current passive RFID tags. We are proposing a timer based ownership transfer protocol for closed loop RFID systems. The proposal in this paper includes two implement scenario to cover diverse tags type. The protocol will ensure security and privacy of involved parties in the idle circumstances. Our comparison shows that the proposed protocol is more secure and practical than existing similar ones.