55 resultados para Year 2000 date conversion (Computer systems)

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this study of intercultural communication, I investigate the multi-faceted meaning of the expression " cultural fit " in the sense that it is used by recruiters when shortlisting Indian information technologists to fill skills shortages for the Y2K project in Australia. The data is in the form of ten videotaped interviews in Bangalore and the recruiter commentary on those tapes in Melbourne. A crucial decision to be made by recruiters in any shortlisting process is " How will the candidate fit into the workplace?" This question becomes more problematical when applied to overseas-trained professionals. I take a critical approach, drawing principally on the research traditions of linguistics where studies of intercultural communication and workplace interaction intersect, employing chiefly the tools of Critical Discourse Analysis and Interactional Sociolinguistics and the more abstract notions of Bourdieu. A bridge between these different discourse approaches is provided by Sarangi & Roberts < 1999 < who show the connection between the larger institutional order and interactional routines, through an elaboration of frontstage talk and backstage talk following Goffman < 1959 < . An analysis of the interviews < frontstage talk < reveals "cultural fit" to involve a knowledge of institutional talk, in particular, directness. The recruiter commentary < backstage talk < draws attention to issues of intelligibility, body language, technical expertise and workplace values. the study shows that Indian Information Technologists have "partial fit" in that they possess technical fit but do not demonstrate, or lack the opportunity to demonstrate in the interview, Australian workplace values such as small talk, humour and informality. The recruiter judgments were fleeting and apart from checking for intelligibility, were made on the basis of candidates' body language thus highlighting its importance and its relative absence from the discourse approaches mentioned above. This study shows clearly that there is room for more communicative flexibility on the part of all the stakeholders.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study examines student perceptions of the usefulness of Computer-Assisted Learning (CAL) packages in learning accounting concepts in terms of the influence on academic performance. Various additional factors  affecting academic performance [such as gender, prior studies of  accounting, and computer systems, together with entry background] are incorporated in the development of a multiple regression model, together with perceptions of CAL. The study uses a sample of 280 second-year undergraduate accounting students from an Australian university to test the model. In contrast to prior studies (e.g. Lane and Porch, 2002, Accounting Education: an international journal, 11(3), pp. 217-233), this study showed that positive perceptions of the usefulness of CAL significantly influenced performance. Additionally, it was found that international students, many of whom enter university at the second year level having obtained advanced standing credits, had significantly poorer performance than local students. The findings show that gender, prior studies of accounting and computing systems were not significant influences on academic performance. Overall, the results have implications for accounting educators utilising CAL in courses as a means of improving students' understanding of accounting concepts and academic performance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The paper describes the on-going development of a new computer-based security risk analysis methodology that may be used to determine the computer security requirements of medical computer systems. The methodology has been developed for use within healthcare, with particular emphasis placed upon protecting medical information systems. The paper goes on to describe some of the problems with existing automated risk analysis systems, and how the ODESSA system may overcome the majority of these problems. Examples of security scenarios are also presented.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Among the many valuable uses of injury surveillance is the potential to alert health authorities and societies in general to emerging injury trends, facilitating earlier development of prevention measures. Other than road safety, to date, few attempts to forecast injury data have been made, although forecasts have been made of other public health issues. This may in part be due to the complex pattern of variance displayed by injury data. The profile of many injury types displays seasonality and diurnal variance, as well as stochastic variance. The authors undertook development of a simple model to forecast injury into the near term. In recognition of the large numbers of possible predictions, the variable nature of injury profiles and the diversity of dependent variables, it became apparent that manual forecasting was impractical. Therefore, it was decided to evaluate a commercially available forecasting software package for prediction accuracy against actual data for a set of predictions. Injury data for a 4-year period (1996 to 1999) were extracted from the Victorian Emergency Minimum Dataset and were used to develop forecasts for the year 2000, for which data was also held. The forecasts for 2000 were compared to the actual data for 2000 by independent t-tests, and the standard errors of the predictions were modelled by stepwise hierarchical multiple regression using the independent variables of the standard deviation, seasonality, mean monthly frequency and slope of the base data (R = 0.93, R2 = 0.86, F(3, 27) = 55.2, p < 0.0001). Significant contributions to the model included the SD (β = 1.60, p < 0.001), mean monthly frequency (β =  - 0.72, p < 0.002), and the seasonality of the data (β = 0.16, p < 0.02). It was concluded that injury data could be reliably forecast and that commercial software was adequate for the task. Variance in the data was found to be the most important determinant of prediction accuracy. Importantly, automated forecasting may provide a vehicle for identifying emerging trends.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Deakin University in Australia is one of the leading providers of distance education in the South Pacific region. The School of Engineering offers four-year professional engineering-degree programs and three-year technologist programs. The over 600 total students studying engineering at Deakin fall into four categories:

• 18-19 year-old students fresh from high school, who largely study on-campus,
• older students in the technical workforce, seeking a university degree to upgrade their qualifications,
• industry-based students studying in university-industry partnership programs,
• overseas students studying either on-campus, or off-campus through education partners in Malaysia and Singapore.

Geographically these students form a very wide student base. The study programs are designed to produce multi-skilled, broadly focused engineers and technologists with multi-disciplinary technical competence, and the ability to take a systems approach to design and operational performance. A team of around 25 academic staff deliver courses in seven different majors in the general fields of manufacturing, environmental engineering, mechatronics, and computer systems. We discuss here the history of the School, its teaching philosophy, and its unique methods in delivering engineering education to a widely scattered student body.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study is an exploration into the choice of independent accountants made by industrial initial public offering (IPO) companies in Australia between the years 1994 to 2004. The aim of this research is to determine which companies are more likely to use one of the Top 5 accountancy firms and in so doing we seek to offer some insight into understanding the likelihood of IPO companies adopting the services of the big accounting firms. Our findings show, as predicted, that the majority of industrial IPO companies, and particularly the larger companies, used one of the Top 5 accountancy firms as their independent accountant. However, unexpected was that certain industry types were less likely to hire a Top 5 accounting firm for their independent accounting services compared to other industry categories. Our studies also found that after the year 2000 a smaller percentage of companies used independent accountants than between 1994 and 1999. Many factors contribute to the selection of an independent accountant and this paper provides some understanding of identified factors and the influence that they have over the choice of independent accountants by industrial company IPOs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study is an exploration into the choice of independent accountants made by industrial initial public offering (IPO) companies in Australia between the years 1994 to 2004. The aim of this research is to determine which companies are more likely to use one of the Top 5 accountancy firms and in so doing we seek to offer some insight into understanding the likelihood of IPQ companies adopting the services of the big accounting firms. Our findings show, as predicted, that the majority of industrial IPO companies, and particularly the larger companies, used one of the Top 5 accountancy firms as their independent accountant. However, unexpected was that certain industry types were less likely to hire a Top 5 accounting finn for their independent accounting services compared to other industry categories. Our studies also found that after the year 2000 a smaller percentage of companies used independent accountants than between 1994 and 1999. Many factors contribute to the selection of an independent accountant and this paper provides some understanding of identified factors and the influence that they have over the choice of independent accountants by industrial company IPOs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This action research project set out to develop the competence of senior personnal from a private vocational college in Thailand in the use of administrative computer systems. The findings demonstrate the critical significance of progressive incremental learning that is tailored to the professional personal needs of learners. Learner competence was found to be dependent upon the creation of an environment promoting learner confidence.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, typing biometrics is applied as an additional security measure to the password-based or Personal Identification Number (PIN)-based systems to authenticate the identity of computer users. In particular, keystroke pressure and latency signals are analyzed using the Fuzzy Min-Max (FMM) neural network for authentication purposes. A special pressure-sensitive keyboard is designed to collect keystroke pressure signals, in addition to the latency signals, from computer users when they type their passwords. Based on the keystroke pressure and latency signals, the FMM network is employed to classify the computer users into two categories, i.e., genuine users or impostors. To assess the effectiveness of the proposed approach, two sets of experiments are conducted, and the results are compared with those from statistical methods and neural network models. The experimental outcomes positively demonstrate the potentials of using typing biometrics and the FMM network to provide an additional security layer for the current password-based or PIN-based methods in authenticating the identity of computer users.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The rapid development and increasing complexity of computer systems and communication networks coupled with the proliferation of services and applications in both Internet-based and ad-hoc based environments have brought network and system security issues to the fore. We have been witnessing ever-increasing cyber attacks on the network and system leading to tarnished confidence and trusts in the use of networked distributed systems. As a result, there is an increasing demand for development of new trust, security and privacy approaches to guarantee the privacy, integrity, and availability of resources in networked distributed systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Research into Intelligent Agent (IA) technology and how it can assist computer systems in the autonomous completion of common office and home computing tasks is extremely widespread. The use oflA's is becoming more feasible as the functionality moves Into line with what users require for their everyday computing needs. However, this does not mean that IA technology cannot be exploited or developed for use in a malicious manner, such as within an Information Waifare (IW) scenario, where systems may be attacked autonomously by agent system implem-entations. This paper will discuss tne cilrrenlStcite Ofmalicious use of lA's as well as focusing on attack techniques, the difficulties brought about by such attacks as well as security methods, both proactive and reactive, that could be instated within compromised or sensitive systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study focuses on the participation of women in the development of the specialist international accounting history literature. Based on an examination of the three specialist, internationally refereed, accounting history journals in the English language from the time of first publication in each case to the year 2000, the study provides evidence of the involvement of women through publication and also through their membership of editorial boards and editorial advisory boards. In doing so, the study builds on the earlier work of Carnegie and Potter in 2000 and aims to augment our understanding of publishing patterns in the specialist international accounting history literature.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Process management is a crucial issue in developing information or computer systems. Theories of software development process management suggest that the process should be supported and managed based on what the process really is. However, our learning from an action research study reveals that the requirements engineering (RE) process differs significantly from that which the current literature tends to describe. The process is not a systematic, smooth and incremental evolution of the requirements model, but involves occasional simplification and restructuring of the requirements model. This revised understanding of the RE process suggests a new challenge to both the academic and industrial communities, demanding new process management approaches. In this paper, we present our understanding of the RE process and its implications for process management.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Determining the causal structure of a domain is frequently a key task in the area of Data Mining and Knowledge Discovery. This paper introduces ensemble learning into linear causal model discovery, then examines several algorithms based on different ensemble strategies including Bagging, Adaboost and GASEN. Experimental results show that (1) Ensemble discovery algorithm can achieve an improved result compared with individual causal discovery algorithm in terms of accuracy; (2) Among all examined ensemble discovery algorithms, BWV algorithm which uses a simple Bagging strategy works excellently compared to other more sophisticated ensemble strategies; (3) Ensemble method can also improve the stability of parameter estimation. In addition, Ensemble discovery algorithm is amenable to parallel and distributed processing, which is important for data mining in large data sets.