877 resultados para Information resources management.
Resumo:
Mountaintop removal (MTR) coal mining has had a significant influence on the water sources within the Coal River watershed of West Virginia. Using an approach such as Integrated Water Resources Management (IWRM) may improve management for the long-term protection and sustainability of the Coal River watershed‰Ûªs water resources. This Capstone project analyzes current site-specific information related to water quality and quantity and the impacts of MTR in the region, reviews current management challenges, and identifies key stakeholders to be included in IWRM planning. This information provided a foundation for the development of a preliminary IWRM coordination plan for the Coal River watershed based on IWRM principles and guidelines. It is hoped that this preliminary plan will contribute to the development of a final coordinated IWRM plan.
Resumo:
"February 1994."
Resumo:
"February 1992."
Resumo:
"B-219799"--P. [1].
Resumo:
Information systems (IS) managers have become key senior executives for organising the IT resources for delivering support to businesses. Understanding characteristics of IS managers’ employment positions is hence an increasingly important topic in computer personnel research. An investigation in Singapore that included a job advertisement analysis, surveys and case studies was thus conducted to investigate such aspects. This article presents the findings of the job advertisement analysis concerning what kinds of IS managers the market is seeking and what are the basic conditions for such management positions. The literature in this area asserts that job advertisements represent firms’ wishes and the nature of the conditions required of different IS personnel. The results of this analysis therefore reflect a collective market perspective about the changing IS managerial workplace. The results of the analysis benefit both firms and IS employees in formulating personnel development plans and actions, and raise issues for further research.
Resumo:
Increasingly users are seen as the weak link in the chain, when it comes to the security of corporate information. Should the users of computer systems act in any inappropriate or insecure manner, then they may put their employers in danger of financial losses, information degradation or litigation, and themselves in danger of dismissal or prosecution. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of inappropriate behaviours, and in so doing, protecting corporate information, is through the formulation and application of a formal ‘acceptable use policy (AUP). Whilst the AUP has attracted some academic interest, it has tended to be prescriptive and overly focussed on the role of the Internet, and there is relatively little empirical material that explicitly addresses the purpose, positioning or content of real acceptable use policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and composition of a sample of authentic policies – taken from the higher education sector – rather than simply making general prescriptions about what they ought to contain. There are two important conclusions to be drawn from this study: (1) the primary role of the AUP appears to be as a mechanism for dealing with unacceptable behaviour, rather than proactively promoting desirable and effective security behaviours, and (2) the wide variation found in the coverage and positioning of the reviewed policies is unlikely to be fostering a coherent approach to security management, across the higher education sector.
Resumo:
Based on a broad conceptualization of Human Resources Management and Development (HRMD) as a technical, political, and strategic field concerned to managing and developing people within and towards work context(s), this research aims to explore a potential societal role of Human Resources (HR) profession. Framed on a larger project on “New Human Resources roles”, this particular study approaches HR profession by analysing its macro-societal challenges and intervention spaces.
Resumo:
In this work we analyze an optimal control problem for a system of two hydroelectric power stations in cascade with reversible turbines. The objective is to optimize the profit of power production while respecting the system’s restrictions. Some of these restrictions translate into state constraints and the cost function is nonconvex. This increases the complexity of the optimal control problem. The problem is solved numerically and two different approaches are adopted. These approaches focus on global optimization techniques (Chen-Burer algorithm) and on a projection estimation refinement method (PERmethod). PERmethod is used as a technique to reduce the dimension of the problem. Results and execution time of the two procedures are compared.
Resumo:
This qualitative study views international students as information-using learners, through an information literacy lens. Focusing on the experiences of 25 international students at two Australian universities, the study investigates how international students use online information resources to learn, and identifies associated information literacy learning needs. An expanded critical incident approach provided the methodological framework for the study. Building on critical incident technique, this approach integrated a variety of concepts and research strategies. The investigation centred on real-life critical incidents experienced by the international students whilst using online resources for assignment purposes. Data collection involved semi-structured interviews and an observed online resource-using task. Inductive data analysis and interpretation enabled the creation of a multifaceted word picture of international students using online resources and a set of critical findings about their information literacy learning needs. The study’s key findings reveal: • the complexity of the international students’ experience of using online information resources to learn, which involves an interplay of their interactions with online resources, their affective and reflective responses to using them, and the cultural and linguistic dimensions of their information use. • the array of strengths as well as challenges that the international students experience in their information use and learning. • an apparent information literacy imbalance between the international students’ more developed information skills and less developed critical and strategic approaches to using information • the need for enhanced information literacy education that responds to international students’ identified information literacy needs. Responding to the findings, the study proposes an inclusive informed learning approach to support reflective information use and inclusive information literacy learning in culturally diverse higher education environments.
Resumo:
This paper investigates self–Googling through the monitoring of search engine activities of users and adds to the few quantitative studies on this topic already in existence. We explore this phenomenon by answering the following questions: To what extent is the self–Googling visible in the usage of search engines; is any significant difference measurable between queries related to self–Googling and generic search queries; to what extent do self–Googling search requests match the selected personalised Web pages? To address these questions we explore the theory of narcissism in order to help define self–Googling and present the results from a 14–month online experiment using Google search engine usage data.
Resumo:
This thesis argues that in order to establish a sound information security culture it is necessary to look at organisation's information security systems in a socio- technical context. The motivation for this research stems from the continuing concern of ineffective information security in organisations, leading to potentially significant monetary losses. It is important to address both technical and non- technical aspects when dealing with information security management. Culture has been identified as an underlying determinant of individuals' behaviour and this extends to information security culture, particularly in developing countries. This research investigates information security culture in the Saudi Arabia context. The theoretical foundation for the study is based on organisational and national culture theories. A conceptual framework for this study was constructed based on Peterson and Smith's (1997) model of national culture. This framework guides the study of national, organisational and technological values and their relationships to the development of information security culture. Further, the study seeks to better understand how these values might affect the development and deployment of an organisation's information security culture. Drawing on evidence from three exploratory case studies, an emergent conceptual framework was developed from the traditional human behaviour and the social environment perspectives used in social work, This framework contributes to in- formation security management by identifying behaviours related to four modes of information security practice. These modes provide a sound basis that can be used to evaluate individual organisational members' behaviour and the adequacy of ex- isting security measures. The results confirm the plausibility of the four modes of practice. Furthermore, a final framework was developed by integrating the four modes framework into the research framework. The outcomes of the three case stud- ies demonstrate that some of the national, organisational and technological values have clear impacts on the development and deployment of organisations' informa- tion security culture. This research, by providing an understanding the in uence of national, organi- sational and technological values on individuals' information security behaviour, contributes to building a theory of information security culture development within an organisational context. The research reports on the development of an inte- grated information security culture model that highlights recommendations for developing an information security culture. The research framework, introduced by this research, is put forward as a robust starting point for further related work in this area.
Resumo:
This paper reports the findings of a qualitative study which investigated 25 international students’ use of online information resources for study purposes at two Australian universities. Using an expanded critical incident approach, the study viewed international students through an information literacy lens, as information-using learners. The findings are presented in two complementary parts: as a word picture that describes their whole experience of using online information resources to learn; and as a tabulated set of critical findings that summarises their associated information literacy learning needs. The word picture shows international students’ resource use as a complex interplay of eight inter-related elements: students; information-learning environment; interactions (with online resources); strengths-challenges; learning-help; affective responses; reflective responses; cultural-linguistic dimensions. In using online resources, the international students experience an array of strengths and challenges, and an apparent information literacy imbalance between their more developed information skills and less developed critical information use. The critical findings about information literacy needs provide a framework for developing an inclusive informed learning approach that responds to international students’ complex information using experiences and needs. While the study is situated in Australia, the findings are of potential interest to educators, information professionals and researchers worldwide who seek to support learning in culturally diverse higher education contexts.