853 resultados para Information Ethics 2012
Resumo:
Having a good automatic anomalous human behaviour detection is one of the goals of smart surveillance systems’ domain of research. The automatic detection addresses several human factor issues underlying the existing surveillance systems. To create such a detection system, contextual information needs to be considered. This is because context is required in order to correctly understand human behaviour. Unfortunately, the use of contextual information is still limited in the automatic anomalous human behaviour detection approaches. This paper proposes a context space model which has two benefits: (a) It provides guidelines for the system designers to select information which can be used to describe context; (b)It enables a system to distinguish between different contexts. A comparative analysis is conducted between a context-based system which employs the proposed context space model and a system which is implemented based on one of the existing approaches. The comparison is applied on a scenario constructed using video clips from CAVIAR dataset. The results show that the context-based system outperforms the other system. This is because the context space model allows the system to considering knowledge learned from the relevant context only.
Resumo:
Design Science Research (DSR) has emerged as an important approach in Information Systems (IS) research. However, DSR is still in its genesis and has yet to achieve consensus on even the fundamentals, such as what methodology / approach to use for DSR. While there has been much effort to establish DSR methodologies, a complete, holistic and validated approach for the conduct of DSR to guide IS researcher (especially novice researchers) is yet to be established. Alturki et al. (2011) present a DSR ‘Roadmap’, making the claim that it is a complete and comprehensive guide for conducting DSR. This paper aims to further assess this Roadmap, by positioning it against the ‘Idealized Model for Theory Development’ (IM4TD) (Fischer & Gregor 2011). The IM4TD highlights the role of discovery and justification and forms of reasoning to progress in theory development. Fischer and Gregor (2011) have applied IM4TD’s hypothetico-deductive method to analyze DSR methodologies, which is adopted in this study to deductively validate the Alturki et al. (2011) Roadmap. The results suggest that the Roadmap adheres to the IM4TD, is reasonably complete, overcomes most shortcomings identified in other DSR methodologies and also highlights valuable refinements that should be considered within the IM4TD.
Resumo:
Business process management (BPM) is becoming the dominant management paradigm. Business process modelling is central to BPM, and the resultant business process model the core artefact guiding subsequent process change. Thus, model quality is at the centre, mediating between the modelling effort and related growing investment in ultimate process improvements. Nonetheless, though research interest in the properties that differentiate high quality process models is longstanding, there have been no past reports of a valid, operationalised, holistic measure of business process model quality. In attention to this gap, this paper reports validation of a Business Process Model Quality measurement model, conceptualised as a single-order, formative index. Such a measurement model has value as the dependent variable in rigorously researching the drivers of model quality; as antecedent of ultimate process improvements; and potentially as an economical comparator and diagnostic for practice.
Resumo:
The demand for Business Process Management (BPM) is rapidly rising and with that, the need for capable BPM professionals is also rising. Yet, only a very few structured BPM training/ education programs are available, across universities and professional trainers globally. The ‘lack of appropriate teaching resources’ has been identified as a critical issue for BPM educators in prior studies. Case-based teaching can be an effective means of educating future BPM professionals. A main reason is that cases create an authentic learning environment where the complexities and challenges of the ‘real world’ can be presented in a narrative enabling the students to develop crucial skills such as problem solving, analysis and creativity-within-constraints, and to apply the tools and techniques within a richer and real (or proxy to real) context. However, so far well documented BPM teaching cases are scarce. This article aims to contribute to address this gap by providing a comprehensive teaching case and teaching notes that facilitates the education of selected process improvement phases, namely identification, modelling, analysis, and improvement. The article is divided into three main parts: (i) Introductory teaching notes, (ii) The case narrative, and (iii) Student activities from the case and teaching notes.
Resumo:
Software as a Service (SaaS) is a promising approach for Small and Medium Enterprises (SMEs) firms, in particular those that are focused on growing fast and leveraging new technology, due to the potential benefits arising from its inherent scalability, reduced total cost of ownership and the ease of access to global innovations. This paper proposes a dynamic perspective on IS capabilities to understand and explain SMEs sourcing and levering SaaS. The model is derived from combining the IS capabilities of Feeny and Willcocks (1998) and the dynamic capabilities of Teece (2007) and contextualizing it for SMEs and SaaS. We conclude that SMEs sourcing and leveraging SaaS require leadership, business systems thinking and informed buying for sensing and seizing SaaS opportunities and require leadership and vendor development for transforming in terms of aligning and realigning specific tangible and intangible assets.
Resumo:
Divergence from a random baseline is a technique for the evaluation of document clustering. It ensures cluster quality measures are performing work that prevents ineffective clusterings from giving high scores to clusterings that provide no useful result. These concepts are defined and analysed using intrinsic and extrinsic approaches to the evaluation of document cluster quality. This includes the classical clusters to categories approach and a novel approach that uses ad hoc information retrieval. The divergence from a random baseline approach is able to differentiate ineffective clusterings encountered in the INEX XML Mining track. It also appears to perform a normalisation similar to the Normalised Mutual Information (NMI) measure but it can be applied to any measure of cluster quality. When it is applied to the intrinsic measure of distortion as measured by RMSE, subtraction from a random baseline provides a clear optimum that is not apparent otherwise. This approach can be applied to any clustering evaluation. This paper describes its use in the context of document clustering evaluation.
Resumo:
The term “business transformation” is a buzzword, often used to signify fundamental changes undergone by organisations. Despite numerous works in enterprise transformation, IT-enabled business transformation and organizational transformation, there appears to be a lack of consensus on what actually constitutes a business transformation as opposed to other types of redesign or organisational improvement projects. Consequently, knowledge about which elements of a business system that are impacted by such an endeavour is largely inconsistent, and partially conflicting. We present a business transformation typology that considers 18 attributes pertaining to the transforming organisation and the transformation initiative. To explore our typology, we analysed 10 published case studies and classified them along two dimensions – one ranging from marginal to fundamental changes, and another on internal and external visibility. Our literature review reveals how the terminology has been misused, and we provide some directions to provide more clarity around transformation phenomena in IS research.
Resumo:
The use of Trusted Platform Module (TPM) is be- coming increasingly popular in many security sys- tems. To access objects protected by TPM (such as cryptographic keys), several cryptographic proto- cols, such as the Object Specific Authorization Pro- tocol (OSAP), can be used. Given the sensitivity and the importance of those objects protected by TPM, the security of this protocol is vital. Formal meth- ods allow a precise and complete analysis of crypto- graphic protocols such that their security properties can be asserted with high assurance. Unfortunately, formal verification of these protocols are limited, de- spite the abundance of formal tools that one can use. In this paper, we demonstrate the use of Coloured Petri Nets (CPN) - a type of formal technique, to formally model the OSAP. Using this model, we then verify the authentication property of this protocol us- ing the state space analysis technique. The results of analysis demonstrates that as reported by Chen and Ryan the authentication property of OSAP can be violated.
Resumo:
Phishing emails cause enormous losses to both users and organisations. The goal of this study is to determine which individuals are more vulnerable to phishing emails. To gain this information an experiment has been developed which involves sending phishing email to users and collecting information about users. The detection deception model has been applied to identify users’ detection behaviour. We find that users who have less email experience and high levels of submissiveness have increased susceptibility. Among those, users who have high susceptibility levels and high openness and extraversion are more likely to carry on the harmful action embedded in phishing emails.
Resumo:
[EN] The following study aims at analyzing which variable changes the average price of cottages in the Basque Autonomous Community. Historically, there have been more cottages in Gipuzkoa and nowadays it remains the same, even if the number of cottages in the other two provinces has raised. Geographically, the fact of having a coast, lakes, reservoirs and mountains in Bizkaia and Gipuzkoa has lead to having more cottages in the two provinces as well as a growing tourism. For this reason, this study analyzes if that is caused by the same variable in the three provinces or if there is a difference between them, and also in which province lies the biggest difference. For achieving the mentioned goals, the information of 2012 taken from the web page of Nekatur Nekazalturismo Elkartea has been a very useful source.
Resumo:
Data in an organisation often contains business secrets that organisations do not want to release. However, there are occasions when it is necessary for an organisation to release its data such as when outsourcing work or using the cloud for Data Quality (DQ) related tasks like data cleansing. Currently, there is no mechanism that allows organisations to release their data for DQ tasks while ensuring that it is suitably protected from releasing business related secrets. The aim of this paper is therefore to present our current progress on determining which methods are able to modify secret data and retain DQ problems. So far we have identified the ways in which data swapping and the SHA-2 hash function alterations methods can be used to preserve missing data, incorrectly formatted values, and domain violations DQ problems while minimising the risk of disclosing secrets. © (2012) by the AIS/ICIS Administrative Office All rights reserved.
Resumo:
This paper describes a methodology for detecting anomalies from sequentially observed and potentially noisy data. The proposed approach consists of two main elements: 1) filtering, or assigning a belief or likelihood to each successive measurement based upon our ability to predict it from previous noisy observations and 2) hedging, or flagging potential anomalies by comparing the current belief against a time-varying and data-adaptive threshold. The threshold is adjusted based on the available feedback from an end user. Our algorithms, which combine universal prediction with recent work on online convex programming, do not require computing posterior distributions given all current observations and involve simple primal-dual parameter updates. At the heart of the proposed approach lie exponential-family models which can be used in a wide variety of contexts and applications, and which yield methods that achieve sublinear per-round regret against both static and slowly varying product distributions with marginals drawn from the same exponential family. Moreover, the regret against static distributions coincides with the minimax value of the corresponding online strongly convex game. We also prove bounds on the number of mistakes made during the hedging step relative to the best offline choice of the threshold with access to all estimated beliefs and feedback signals. We validate the theory on synthetic data drawn from a time-varying distribution over binary vectors of high dimensionality, as well as on the Enron email dataset. © 1963-2012 IEEE.
Resumo:
It is necessary to transform the educative experiences into the classrooms so that they favor the development of intellectual abilities of children and teenagers. We must take advantage of the new opportunities that offer information technologies to organize learning environments which they favor those experiences. We considered that to arm and to program robots, of the type of LEGO Mind Storms or the so called “crickets”, developed by M. Resnik from MIT, like means so that they children them and young people live experiences that favor the development of their intellectual abilities, is a powerful alternative to the traditional educative systems. They are these three tasks those that require a reflective work from pedagogy and epistemology urgently. Robotics could become in the proper instrument for the development of intelligence because it works like a mirror for the intellectual processes of each individual, its abilities like epistemologist and, therefore, is useful to favor those processes in the classroom.
Resumo:
El presente Estudio de Caso tiene como objetivo analizar en qué medida las dinámicas comerciales de la Diplomacia Petrolera China han convertido a Ecuador en un socio estratégico para la RPCh. El petróleo como fuente de energía es primordial para llevar a cabo los procesos de industrialización y mantener el crecimiento económico del león Asiático. Por eso su búsqueda se ha convertido en un tema principal dentro de la agenda de política exterior. Ecuador, el tercer país de Suramérica con más reservas de petróleo, después de Venezuela y Brasil, se ha convertido en zona de influencia de la RPCh y a través de las empresas petroleras estatales se han firmado contratos por la venta de petróleo. A pesar de que las relaciones bilaterales son asimétricas, se buscar establecer si Ecuador es un socio estratégico en la región.
La política exterior energética China y sus implicaciones geopolíticas en Asia Central (2000 - 2010)
Resumo:
El interés de la presente monografía es evaluar las implicaciones geopolíticas que ha tenido la política exterior energética China dentro la región de Asia Central. De esta manera, se analiza el papel de los recursos energéticos en las dinámicas geopolíticas que se están dando en la región centroasiática, al igual que la influencia de grandes potencias en esta zona. Así, teniendo en cuenta la teoría geopolítica de Saúl Bernard Cohen se sostiene que el acercamiento de China, a través de su política exterior energética, ha ayudado a transformar a Asia Central en un shatterbelt debido a su intención de ejercer influencia y control sobre los recursos de la región.