92 resultados para Management of Computing and Information Systems

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

# 1. Introduction. Exploring the gender and IT problem and possible ways forward /​ Julianne Lynch
# 2. The imagined curriculum: who studies Computing and Information Technology subjects at the senior secondary level? /​ Margaret Vickers and My Trinh Ha
# 3. A question of attention: challenges for researching the under representation of girls in Computing and Information Technology subjects /​ Leonie Rowan
# 4. The nature and purpose of Computing and Information Technology subjects in the senior secondary school curriculum in New South Wales /​ Toni Downes
# 5. The social construction of Computing and Information Technology subject subculture /​ Catherine Harris
# 6. Boy nerds, girl nerds: constituting and negotiating Computing and Information Technology and peer groups as gendered subjects in schooling /​ Kerry Robinson and Cristyn Davies
# 7. CIT teachers' cultures in a globalising world /​ Carol Reid and Jose van der Akker
# 8. Perceptions of changing pedagogies in Computing and Information Technology /​ Susanne Gannon

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Certificateless public key encryption can be classified into two types, namely, CLE and CLE † , both of which were introduced by Al-Riyami and Paterson in Asiacrypt 2003. Most works about certificateless public key encryption belong to CLE, where the partial secret key is uniquely determined by an entity’s identity. In CLE † , an entity’s partial secret key is not only determined by the identity information but also by his/her (partial) public key. Such techniques can enhance the resilience of certificateless public key encryption against a cheating KGC. In this paper, we first formalize the security definitions of CLE † . After that, we demonstrate the gap between the security model of CLE † and CLE, by showing the insecurity of a CLE † scheme proposed by Lai and Kou in PKC 2007. We give an attack that can successfully break the indistinguishability of their CLE † scheme, although their scheme can be proved secure in the security model of CLE. Therefore, it does not suffice to consider the security of CLE † in the security model of CLE. Finally, we show how to secure Lai-Kou’s scheme by providing a new scheme with the security proof in the model of CLE †

Relevância:

100.00% 100.00%

Publicador:

Resumo:

IS professionals are primarily concerned with the development of a project to meet the goals of a client. Unfortunately, IS professional do not always pay close attention to the contract or to its management and are often unaware of the legal implications of the contracts to which they are assenting. Legal advice can be sought during pre-contractual processes to help ensure that the contract meets the expectations of all the parties. If the project does not meet stakeholder’s expectations, thus causing a contract to come into dispute, lawyers may be called in to review the contract and to seek a settlement. This paper reports an exploratory study of the differences in perceptions of IS development contracts that exist between IS professionals and legal practitioners.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper identifies novel approaches to future small and medium enterprise (SME) research from a review of articles, and then introduces the papers in this AJIS special section which evidence these approaches. More specifically, the paper makes an important contribution by reviewing 61 articles in high ranked IS journals (2000-2014) and introducing three new facets which are used to analyse research on SME adoption/use of IS (units of analysis, SME sizes and SME types) not considered in previous literature review studies. These facets provide thebasis for proposing various future research opportunities. The editorial then introduces the four papers in this special section covering the research theme on SMEs, and highlights the contributions they make using the three facets.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The advent of the World Wide Web (WWW) and the emergence of Internet commerce have given rise to the web as a medium of information exchange. In recent years, the phenomenon has affected the realm of transaction processing systems, as organizations are moving from designing web pages for marketing purposes, to web-based applications that support business-to-business (WEB) and business-to-consumer (B2C) interactions, integrated with databases and other back-end systems (Isakowitz, Bieber et al., 1998). Furthermore, web-enabled applications are increasingly being used to facilitate transactions even between various business units within a single enterprise. Examples of some of the more popular web-enabled applications in use today include airline reservation systems, internet banking, student enrollment systems in universities, and Human Resource (HR) and payroll systems. The prime motive behind the adoption of web-enabled applications are productivity gains due to reduced processing time, decrease in the usage of paper-based documentation and conventional modes of communication (such as letters, fax, or telephone), and improved quality of services to clients. Indeed, web-based solutions are commonly referred to as customer-centric (Li, 2000), which means that they provide user interfaces that do not necessitate high level of computer proficiency. Thus, organizations implement such systems to streamline routine transactions and gain strategic benefits in the process (Nambisan & Wang, 1999), though the latter are to be expected in the long-term. Notwithstanding the benefits of web technology adoption, the web has ample share of challenges for initiators and developers. Many of these challenges are associated with the unique nature of web-enabled applications. Research in the area of web-enabled information systems has revealed several differences with traditional applications. These differences exist with regards to system development methodology, stakeholder involvement, tasks, and technology (Nazareth, 1998). According to Fraternali (1999), web applications are commonly developed using an evolutionary prototyping approach, whereby the simplified version of the application is deployed as a pilot first, in order to gather user feedback. Thus, web-enabled applications typically undergo continuous refinement and evolution (Ginige, 1998; Nazareth, 1998; Siau, 1998; Standing, 2001). Prototype-based development also leads web-enabled information systems to have much shorter development life cycles, but which, unlike traditional applications, are regrettably developed in a rather adhoc fashion (Carstensen & Vogelsang, 2001). However, the principal difference between the two kinds of applications lies in the broad and diverse group of stakeholders associated with web-based information systems (Gordijn, Akkermans, et al., 2000; Russo, 2000; Earl & Khan, 2001; Carter, 2002; Hasselbring, 2002; Standing, 2002; Stevens & Timbrell, 2002). Stakeholders, or organizational members participating in a common business process (Freeman, 1984), vary in their computer competency, business knowledge, language and culture. This diversity is capable of causing conflict between different stakeholder groups with regards to the establishment of system requirements (Pouloudi & Whitley, 1997; Stevens & Timbrell, 2002). Since, web-based systems transcend organizational, departmental, and even national boundaries, the issue of culture poses a significant challenge to the web systems’ initiators and developers (Miles & Snow, 1992; Kumar & van Dissel, 1996; Pouloudi & Whitley, 1996; Li & Williams, 1999).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Universities are increasingly turning to ‘fashionable’ education programs to attract bright, high-quality students to both under-graduate and post-graduate degree programs. Traditional offerings in technology areas, such as Information Systems and Information Technology are being augmented by newer, more marketable degrees in areas such as eCommerce/eBusiness. This paper analyses the eCommerce/eBusiness and Information Systems (IS) / Information Technology (IT) academic programs in Australian and New Zealand universities on the basis of Kotler and Fox's service offering model of educational institutions; and considers what differences exist between these two apparently similar areas of academic endeavour. Finally we look at the trends of academic program delivery in the e-age and question whether universities need to take a more consumer-product approach to the issue of attracting appropriate students.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Giddens’ structuration theory (ST) offers an account of social life in terms of social practices developing and changing over time and space, which makes no attempt to directly theorize the Information Systems (IS) domain. IS researchers have long been interested in it as a way of deepening understanding; a common application is the analysis of empirical situations using Giddens’ ‘dimensions of the duality of structure’ model. Other writers, most notably Orlikowski, have used it help theorize the field. Often the mode of research employed has been the interpretative case study. However, direct attempts to influence practice (an important component of working in an applied field), perhaps through the vehicle of action research, have yet to be undertaken. There are at least three serious problems with attempting this. The first is the inaccessibility of the theory to IS researchers and practitioners. The second is the absence of specific theories of technology. The third is Giddens’ own disinterest in practical uses of his work – which leaves no obvious path to follow. This paper explores that path, in the context of information system development (ISD). Some frameworks for practice are suggested which are translated into forms of discourse that are more accessible to the IS community. In particular, we include an empirical illustration to demonstrate the potential of ISD tools based on structuration theory.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The quality of drinking water generally degrades when it is delivered through a distribution system due to the decay of disinfectant, which subsequently allows the re-growth of microorganisms in the distribution system. A model that describes the changes that occur in the water quality in distribution system is needed to determine whether to enhance the treatment processes or to improve the distribution system so that microbiological criteria are met. This paper describes how chlorine decay kinetics are modeled and the model output is used in finding the elements that are contributing to the consumption of chlorine at the treatment plant other than the water itself; this allows better control of chlorine dosing at the treatment plant, which in tum will reduce the formation of disinfectant by-products. In addition, the model will accurately predict the decay due to the organic/inorganic and nitrogenous compounds that are remaining in the water at any point in the distribution system, which will indicate the status of the distribution system with respect to its chlorine consumption. Further, if re-chlorination is introduced in the distribution system downstream of the treatment plant, the model will predict the chlorine decay due to the slow reacting organic and nitrogenous compounds accurately.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Information Systems can play an important role in ensuring and improving the quality of education provided. However, lack of acceptance of these information systems and resistance of technology innovations by the end users limit the expected benefits of the system. This research attempts to identify the key determinants for the acceptance of the Unit Guide Information Systems (UGIS) in the Australian higher education sector. The technology acceptance model (TAM), social cognitive theory (SCT) and model of PC utilization (MPCU) are combined to provide a new framework for this analysis. Results of the study are consistent with the technology acceptance factors for explaining the behavioural intention of the academics. The study also shows the effects of application specific self-efficacy, application specific anxiety and social influence on the acceptance of UGIS. Implications of the results are discussed within the context of unit guides and curriculum mapping.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Surveys are mostly challenged by response rates. Among the various types of survey research, web-based (internet-based/electronic/online) surveys are commonly used for data collection for a geographically diverse population. In surveys with high/low response rates, non-response bias can be a major concern. While it is not always possible to measure the actual bias due to non-response there are different approaches and techniques that help to identify reasons of non-response bias. The aims of this paper are twofold. (1) To provide an appropriate, interesting and important non-response bias case study for future web-based surveys that will provide guidance to other Information Systems researchers. The case-study concerns an online-survey to evaluate a technology acceptance model for Unit Guide Information systems (UGIS). (2) To discuss how nonresponse bias in a web-based technology acceptance study of an information system (UGIS in this case) can be contained and managed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Frame analysis has been applied in Information Systems (IS) research to generate understanding of such issues as organisational change and IS implementation. Frames are the unconscious interpretive schemas that people, or groups of people, use to interpret their surroundings, determine what is important, and guide their actions. While framing has been used as a theoretical lens in IS research into organisations, there has been no analysis to date of how frames may play a role in the IS field itself. This paper argues that is relevant and insightful to examine the IS discourse from a framing perspective. In order to demonstrate the potential value of such an approach, a subset of a collection of articles from six journals in the senior scholars’ basket of journals was analysed in an exploratory attempt to locate the frames of reference that predominate in the IS discourse. Three levels of framing were identified and a provisional schema is proposed. We suggest that further investigation of the schema, the frames and their application will provide opportunity for critical reflection on the nature of Information Systems as an academic discipline. Such critical self-examination may even foster purposive frame breaking, in support of recent calls for transformation in the IS field.