991 resultados para Protection of personal information


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Organisational dependence upon IT continues to grow yet experiences of satisfaction vary widely. Problematic, aged IT is often cited as being a fundamental problem in this respect and this is commonly termed legacy information systems. However, in this paper the author offers an alternative, and arguably more comprehensive, theory of legacy information systems that accommodates multiple viewpoints and recognises its inherent dynamism. The paper suggests a theory of legacy information systems that comprises of the concepts of temporal effects, interpretations and characteristics. It is argued that legacy information systems are constructed of many ‘legacies’ that are handed down continuously, forming an amorphous set of sociotechnical interdependencies and relationships.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis introduces a theory of intellectual property (IP) law informed by Islamic Shari'a. The sources and objectives of Islamic Shari'a support the theoretical framework underpinning IP laws. However, they strongly emphasise the importance of development goals in intellectual property policy making. This thesis argues that an optimal IP system from an Islamic perspective shall not overprotect IP holders but should instead endeavor to empower people to access knowledge resources to enhance access to education, public health and economic opportunities. Taking Libya as a case study, this thesis makes recommendations for the improvement of IP law that have important broader implications for developing countries.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Building information models are increasingly being utilised for facility management of large facilities such as critical infrastructures. In such environments, it is valuable to utilise the vast amount of data contained within the building information models to improve access control administration. The use of building information models in access control scenarios can provide 3D visualisation of buildings as well as many other advantages such as automation of essential tasks including path finding, consistency detection, and accessibility verification. However, there is no mathematical model for building information models that can be used to describe and compute these functions. In this paper, we show how graph theory can be utilised as a representation language of building information models and the proposed security related functions. This graph-theoretic representation allows for mathematically representing building information models and performing computations using these functions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis examines, by way of phenomenographic methodology, the qualitatively different ways in which people engaged in Serious Leisure activities (within the area of 'heritage') experience information literacy. The study identified the presence of four distinct categories of information literacy experience, each with variation in regard to the serious leisure participant's experience of learning and information. In addition it also identified the existence of a further dimension of variation pertaining to the way in which individual identity is experienced during engagement with a serious leisure activity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Based on an investigation of 106 projects involving the use of building information modelling (BIM), this paper examines current BIM practices in China, and assesses how various practices alter their effectiveness. The results reveal that in current practice BIM is principally employed as a visualization tool, and how it is implemented is significantly associated with project characteristics. BIM use in the majority of the surveyed projects is seen to have positive outcomes, with the benefits of improved task effectiveness being more substantial than those related to efficiency improvement. The results also provide evidence that project characteristics significantly influence the success of BIM use; however, more substantial contributing factors to BIM effectiveness are the extent of integrated use and client/owner support. While indicating that current BIM practices involve both technological and organizational problems, the findings also provide insights into how the potential for BIM could be better exploited within the industry.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objectives To address the scarcity of comprehensive, theory-based research in the Australian context, this study, using a theory of planned behaviour (TPB) framework, investigated the role of personal and social norms to identify the key predictors of adult Australians' sun-safe intentions and behaviour. Design The study used a prospective design with two waves of data collection, 1 week apart. Methods Participants were 816 adults (48.2% men) aged between 18 and 88 years recruited from urban, regional, and rural areas of Australia. At baseline, participants completed a questionnaire assessing the standard TPB predictors (attitude, subjective norm, and perceived behavioural control [PBC]), past behaviour, behavioural intention, and additional measures of group norm for the referent groups of friends and family, image norm, personal norm, personal choice/responsibility, and Australian identity. Seventy-one per cent of the participants (n = 577) reported on their sun-safe behaviour in the subsequent week. Results Via path modelling, past behaviour, attitude, group norm (friends), personal norm, and personal choice/responsibility emerged as independent predictors of intentions which, in turn, predicted sun-safe behaviour prospectively. Past behaviour, but not PBC, had direct effects on sun-safe behaviour. The model explained 61.6% and 43.9% of the variance in intention and behaviour, respectively. Conclusions This study provides support for the use of a comprehensive theoretical decision-making model to explain Australian adults' sun-safe intentions and behaviours and identifies viable targets for health-promoting messages in this high-risk context.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The celebrated work of Lortie (1975) alerted teacher educators to the extended period of 'apprenticeship' that student teachers have been through before they arrive at teacher education programmes. The subjective implicit theories (Marland, 1992) developed by prospective teachers are shaped by their lifeworld experiences at school and in the case of physical education teachers, their experiences in sport. The biography of physical education teacher education (PETE) students tends to be characterised by ecto-mesomorphic individuals who have been socialised by the rigours of highly competitive sport (Gore, 1990; Macdonald, 1992; Rossi, 1996). We can add to this, the requirements of teacher preparation in physical education which for the most part are dominated by the traditions and rhetoric of the 'natural' bio-physical sciences; largely a legacy of Henry's (1964) work on physical education as an academic discipline, as well as that of Abernathy and Waltz the same year (Abernathy & Waltz, 1964). In the United Kingdom, Curl (1973) further advanced the argument in an attempt to justify human movement as an independent field of study with its own corpus of knowledge. It is little wonder then, that the dominant pedagogical discourse in physical education is, as Tinning (1991) discusses, one of performance pedagogy (see also Hendry, 1986 for an earlier discussion). The knowledge required to support such a discourse could be described as 'official' (Apple, 1993) and it assumes such status by virtue of the power appropriated by and bestowed upon the scientific community in PETE (Macdonald & Tinning, 1995; Sparkes, 1989, 1993). However, there are social reifiers too, and these tend to relate to the social construction of the body (Kirk, 1993; Kirk & Spiller, 1994; Gilroy, 1994) and what Tinning (1985) has termed the Cult of Slenderness. Furthermore the 'slender image' has become a signifier of 'good health'. This is inextricably linked to what might be considered as a health triplex—'exercise = fitness = health' (see Kirk & Colquhoun, 1989; Tinning & Kirk, 1991) which in Australia, underpins curriculum packages such as Daily Physical Education which teachers (often including physical education primary...

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Despite being used since 1976, Delusions-Symptoms-States-Inventory/states of Anxiety and Depression (DSSI/sAD) has not yet been validated for use among people with diabetes. The aim of this study was to examine the validity of the personal disturbance scale (DSSI/sAD) among women with diabetes using Mater-University of Queensland Study of Pregnancy (MUSP) cohort data. The DSSI subscales were compared against DSM-IV disorders, the Mental Component Score of the Short Form 36 (SF-36 MCS), and Center for Epidemiologic Studies Depression Scale (CES-D). Factor analyses, odds ratios, receiver operating characteristic (ROC) analyses and diagnostic efficiency tests were used to report findings. Exploratory factor analysis and fit indices confirmed the hypothesized two-factor model of DSSI/sAD. We found significant variations in the DSSI/sAD domain scores that could be explained by CES-D (DSSI-Anxiety: 55%, DSSI-Depression: 46%) and SF-36 MCS (DSSI-Anxiety: 66%, DSSI-Depression: 56%). The DSSI subscales predicted DSM-IV diagnosed depression and anxiety disorders. The ROC analyses show that although the DSSI symptoms and DSM-IV disorders were measured concurrently the estimates of concordance remained only moderate. The findings demonstrate that the DSSI/sAD items have similar relationships to one another in both the diabetes and non-diabetes data sets which therefore suggest that they have similar interpretations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Over the last few years, investigations of human epigenetic profiles have identified key elements of change to be Histone Modifications, stable and heritable DNA methylation and Chromatin remodeling. These factors determine gene expression levels and characterise conditions leading to disease. In order to extract information embedded in long DNA sequences, data mining and pattern recognition tools are widely used, but efforts have been limited to date with respect to analyzing epigenetic changes, and their role as catalysts in disease onset. Useful insight, however, can be gained by investigation of associated dinucleotide distributions. The focus of this paper is to explore specific dinucleotides frequencies across defined regions within the human genome, and to identify new patterns between epigenetic mechanisms and DNA content. Signal processing methods, including Fourier and Wavelet Transformations, are employed and principal results are reported.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Two studies documented the “David and Goliath” rule—the tendency for people to perceive criticism of “David” groups (groups with low power and status) as less normatively permissible than criticism of “Goliath” groups (groups with high power and status). The authors confirmed the existence of the David and Goliath rule across Western and Chinese cultures (Study 1). However, the rule was endorsed more strongly in Western than in Chinese cultures, an effect mediated by cultural differences in power distance. Study 2 identified the psychological underpinnings of this rule in an Australian sample. Lower social dominance orientation (SDO) was associated with greater endorsement of the rule, an effect mediated through the differential attribution of stereotypes. Specifically, those low in SDO were more likely to attribute traits of warmth and incompetence to David versus Goliath groups, a pattern of stereotypes that was related to the protection of David groups from criticism.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis considers whether the Australian Privacy Commissioner's use of its powers supports compliance with the requirement to 'take reasonable steps' to protect personal information in National Privacy Principle 4 of the Privacy Act 1988 (Cth). Two unique lenses were used. First, the Commissioner's use of powers was assessed against the principles of transparency, balance and vigorousness and secondly against alignment with an industry practice approach to securing information. Following a comprehensive review of publicly available materials, interviews and investigation file records, this thesis found that the Commissioner's use of his powers has not been transparent, balanced or vigorous, nor has it been supportive of an industry practice approach to securing data. Accordingly, it concludes that the Privacy Commissioner's use of its regulatory powers is unlikely to result in any significant improvement to the security of personal information held by organisations in Australia.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper introduces a modified Kano approach to analysing and classifying quality attributes that drive student satisfaction in tertiary education. The approach provides several benefits over the traditional Kano approach. Firstly, it uses existing student evaluations of subjects in the educational institution instead of purpose-built surveys as the data source. Secondly, since the data source includes qualitative comments and feedback, it has the exploratory capability to identify emerging and unique attributes. Finally, since the quality attributes identified could be tied directly to students’ detailed feedback, the approach enables practitioners to easily translate the results into concrete action plans. In this paper, the approach is applied to analysing 26 subjects in the information systems school of an Australia university. The approach has enabled the school to uncover new quality attributes and paves the way for other institutions to use their student evaluations to continually understand and addressed students’ changing needs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

‘Spatial governance’ involves a large number of situations where knowledge of place and time is important in achieving acceptable organisational outcomes. This paper argues that spatial governance calls for information-intensive activity in three main areas. The first establishes ‘authority’ in a legal entity to decide issues regarding resources within a territorial jurisdiction. The second involves planning the future use of resources. It engages a language of design, purpose, modeling, visualization, expectations and risk. The third involves monitoring of outcomes to see if expectations are met; and whether changes to authority and planning regimes need to be made in the light of experience. This engages a language of observing, recording, accounting, auditing, statistical indicators and accountability. ‘Authority’, ‘planning’ and ‘monitoring’ regimes can be constructed using a relatively small number of elements, in much the same way that a large number of words with recognisable meanings can be created using a relatively few standardised letters of the alphabet. Words can combine in a similar process of combinatorial explosion to create any message that can be imagined. Similarly, combining authority, planning and monitoring regimes can create a metalanguage of ‘spatial governance’ to give purpose, meaning and value to any spatiotemporal information system that can be imagined, described, interpreted and understood.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis provides a review of 199 papers published on Green IT/IS between 2007−2014, in order to present taxonomy of segments in Green IT/IS publications, where the segments are later used for multiple analyses to facilitate future research and to provide a retrospective analysis of existing knowledge and gaps thereof. This research also attempts to make a unique contribution to our understanding of Green IT/IS, by consolidating papers it observes current patterns of literature through approach analysis and segmentation, as well as allocating studies to the technology, process, or outcome (TPO) stage. Highlighting the necessity of a consolidated approach, these classification systems have been combined into a TPO matrix so that the studies could be arranged according to which stage of the Green IT/IS cycle they were focused on. We believe that these analyses will provide a solid platform from which future Green IT/IS research can be launched.