983 resultados para Communication complexity
Resumo:
The formation of a venture relies, in part, upon the participants reaching a shared understanding of purpose and process. Yet in circumstances of great complexity and uncertainty how can such a shared understanding be created? If the response to complexity and uncertainty is to seek simplicity in order to find commonality then what is lost and what is at risk? Can shared understandings of purpose and process be arrived at by embracing complexity and uncertainty and if so how? These questions led us to explore the process of dialogue and communication of a team in its formative stages. Our interests were not centred upon the behavioural characteristics of the individuals in the 'forming' stage of group dynamics but rather the process of cognitive and linguistic turns, the wax and wan of ideas and, the formation of shared meaning. This process of cognitive and linguistic turns was focused thematically on the areas of foresight, innovation, entrepreneurship, and public policy. This cross disciplinary exploration sought to explore potential synergies between these domains, in particular in developing a conceptual basis for long term thinking that can inform wiser public policy.
Resumo:
The improvement and optimization of business processes is one of the top priorities in an organization. Although process analysis methods are mature today, business analysts and stakeholders are still hampered by communication issues. That is, analysts cannot effectively obtain accurate business requirements from stakeholders, and stakeholders are often confused about analytic results offered by analysts. We argue that using a virtual world to model a business process can benefit communication activities. We believe that virtual worlds can be used as an efficient model-view approach, increasing the cognition of business requirements and analytic results, as well as the possibility of business plan validation. A healthcare case study is provided as an approach instance, illustrating how intuitive such an approach can be. As an exploration paper, we believe that this promising research can encourage people to investigate more research topics in the interdisciplinary area of information system, visualization and multi-user virtual worlds.
Resumo:
This volume represents the proceedings of the 13th ENTER conference, held at Lausanne, Switzerland during 2006. The conference brought together academics and practitioners across four tracks, which were eSolutions, refereed research papers, work-in-progress papers, and a Ph.D workshop. This proceedings contains 40 refereed papers, which is less that the 51 papers presented in 2005. However, the editors advise the scientific committee was stricter than in previous years, to the extent that the acceptance rate was 50%. A significant change in the current proceedings is the inclusion of extended abstracts of the 23 work-in-progress presentations. The papers cover a diverse range of topics across 16 research streams. This reviewer has adopted the approach of succinctly summarising the contribution of each of the 40 refereed papers, in the order in which they appear...
Resumo:
This volume represents the proceedings of the 12th ENTER conference held at Innsbruck in 2005. While the conference also accepts work-in-progress papers and includes a Ph.D. workshop, the proceedings contain 51 research papers by 102 authors. The general theme of the conference was eBusiness is here—what is next? and the papers cover a diverse range of topics across nine tracks. This reviewer has adopted the approach of succinctly summarising the contribution of each of the papers, in the order they appear....
Resumo:
"This volume represents the proceedings of the 10th ENTER conference, held in Helsinki, Finland during January 2003. The conference theme was ‘technology on the move’, and the 476pp. proceedings offer 50 papers by 108 authors. The editors advise all papers were subject to a double blind peer review. The research has been categorised into 18 broad headings, which reflects the diversity of topics addressed. This reviewer has adopted the approach of succinctly summarising each of the papers, in the order they appear, to assist readers of Tourism Management in judging the potential value of the content for their own work..." -- publisher website
Resumo:
Historically, occupational health and safety has primarily presented as attempts to create a safer work environment for employees. The mining industry carries health and safety risks, often greater than other occupations. Whilst the mining industry is regulated by stringent workplace health and safety regulations, the very nature of the work and environmental influences expose employees to a greater number of injury risk factors than many other industries. The application of risk management techniques has resulted in a substantial decline in injury rates observed for mining operations in developed countries (Donoghue, 2004). This essential focus can be complemented by a more comprehensive approach to occupational health and safety that also supports the design and delivery of proactive health promotion programs...
Resumo:
Increasingly societies and their governments are facing important social issues that have science and technology as key features. A number of these socio-scientific issues have two features that distinguish them from the restricted contexts in which school science has traditionally been presented. Some of their science is uncertain and scientific knowledge is not the only knowledge involved. As a result, the concepts of uncertainty, risk and complexity become essential aspects of the science underlying these issues. In this chapter we discuss the nature and role of these concepts in the public understanding of science and consider their links with school science. We argue that these same concepts and their role in contemporary scientific knowledge need to be addressed in school science curricula. The new features for content, pedagogy and assessment of this urgent challenge for science educators are outlined. These will be essential if the goal of science education for citizenship is to be achieved with our students, who will increasingly be required to make personal and collective decisions on issues involving science and technology.
Resumo:
While requiring students to think reflectively is a desirable teaching goal, it is often fraught with complexity and is sometimes poorly implemented in higher education. In this paper, we describe an approach to academic reflective practices that fitted a design subject in fashion education and was perceived as effective in enhancing student learning outcomes. In many design-based disciplines, it is essential to evaluate, through a reflective lens, the quality of tangible design outcomes - referred to here as artefacts. Fashion studio based practice (unlike many other theory based disciplines)requires an artefact to be viewed in order to initiate the reflective process. This reflection is not solely limited to reflective writing; the reflection happens through sight, touch and other non-traditional approaches. Fashion students were asked to reflect before, during and after the development of an artefact. Through a variety of media, a review of the first garment prototype - called a Sample Review - occurred. The reflective practices of students during the Sample Review provided a valuable insight into their own learning, as well as a valid assessment indicator for the lecturer. It also mirrored industry practices for design evaluation. We believe that this deliberative approach, characterised by artefact-prompted reflection, has wide applicability across undergraduate courses in a variety of discipline areas.
Resumo:
The iPhone represents an important moment in both the short history of mobile media and the long history of cultural technologies. Like the Walkman of the 1980s, it marks a juncture in which notions about identity, individualism, lifestyle and sociality require rearticulation. This book explores not only the iPhone’s particular characteristics, uses and "affects," but also how the "iPhone moment" functions as a barometer for broader patterns of change. In the iPhone moment, this study considers the convergent trajectories in the evolution of digital and mobile culture, and their implications for future scholarship. Through the lens of the iPhone—as a symbol, culture and a set of material practices around contemporary convergent mobile media—the essays collected here explore the most productive theoretical and methodological approaches for grasping media practice, consumer culture and networked communication in the twenty-first century.
Resumo:
Urban regeneration is occuring in cities across the world, as cities increase in scale and complexity. This chapter argues that in planning public spaces, greater consideration should be paid to sociability through consideration of the affective dimension of urban life.
Resumo:
In order to support intelligent transportation system (ITS) road safety applications such as collision avoidance, lane departure warnings and lane keeping, Global Navigation Satellite Systems (GNSS) based vehicle positioning system has to provide lane-level (0.5 to 1 m) or even in-lane-level (0.1 to 0.3 m) accurate and reliable positioning information to vehicle users. However, current vehicle navigation systems equipped with a single frequency GPS receiver can only provide road-level accuracy at 5-10 meters. The positioning accuracy can be improved to sub-meter or higher with the augmented GNSS techniques such as Real Time Kinematic (RTK) and Precise Point Positioning (PPP) which have been traditionally used in land surveying and or in slowly moving environment. In these techniques, GNSS corrections data generated from a local or regional or global network of GNSS ground stations are broadcast to the users via various communication data links, mostly 3G cellular networks and communication satellites. This research aimed to investigate the precise positioning system performances when operating in the high mobility environments. This involves evaluation of the performances of both RTK and PPP techniques using: i) the state-of-art dual frequency GPS receiver; and ii) low-cost single frequency GNSS receiver. Additionally, this research evaluates the effectiveness of several operational strategies in reducing the load on data communication networks due to correction data transmission, which may be problematic for the future wide-area ITS services deployment. These strategies include the use of different data transmission protocols, different correction data format standards, and correction data transmission at the less-frequent interval. A series of field experiments were designed and conducted for each research task. Firstly, the performances of RTK and PPP techniques were evaluated in both static and kinematic (highway with speed exceed 80km) experiments. RTK solutions achieved the RMS precision of 0.09 to 0.2 meter accuracy in static and 0.2 to 0.3 meter in kinematic tests, while PPP reported 0.5 to 1.5 meters in static and 1 to 1.8 meter in kinematic tests by using the RTKlib software. These RMS precision values could be further improved if the better RTK and PPP algorithms are adopted. The tests results also showed that RTK may be more suitable in the lane-level accuracy vehicle positioning. The professional grade (dual frequency) and mass-market grade (single frequency) GNSS receivers were tested for their performance using RTK in static and kinematic modes. The analysis has shown that mass-market grade receivers provide the good solution continuity, although the overall positioning accuracy is worse than the professional grade receivers. In an attempt to reduce the load on data communication network, we firstly evaluate the use of different correction data format standards, namely RTCM version 2.x and RTCM version 3.0 format. A 24 hours transmission test was conducted to compare the network throughput. The results have shown that 66% of network throughput reduction can be achieved by using the newer RTCM version 3.0, comparing to the older RTCM version 2.x format. Secondly, experiments were conducted to examine the use of two data transmission protocols, TCP and UDP, for correction data transmission through the Telstra 3G cellular network. The performance of each transmission method was analysed in terms of packet transmission latency, packet dropout, packet throughput, packet retransmission rate etc. The overall network throughput and latency of UDP data transmission are 76.5% and 83.6% of TCP data transmission, while the overall accuracy of positioning solutions remains in the same level. Additionally, due to the nature of UDP transmission, it is also found that 0.17% of UDP packets were lost during the kinematic tests, but this loss doesn't lead to significant reduction of the quality of positioning results. The experimental results from the static and the kinematic field tests have also shown that the mobile network communication may be blocked for a couple of seconds, but the positioning solutions can be kept at the required accuracy level by setting of the Age of Differential. Finally, we investigate the effects of using less-frequent correction data (transmitted at 1, 5, 10, 15, 20, 30 and 60 seconds interval) on the precise positioning system. As the time interval increasing, the percentage of ambiguity fixed solutions gradually decreases, while the positioning error increases from 0.1 to 0.5 meter. The results showed the position accuracy could still be kept at the in-lane-level (0.1 to 0.3 m) when using up to 20 seconds interval correction data transmission.
Resumo:
Information communication and technology (ICT) systems are almost ubiquitous in the modern world. It is hard to identify any industry, or for that matter any part of society, that is not in some way dependent on these systems and their continued secure operation. Therefore the security of information infrastructures, both on an organisational and societal level, is of critical importance. Information security risk assessment is an essential part of ensuring that these systems are appropriately protected and positioned to deal with a rapidly changing threat environment. The complexity of these systems and their inter-dependencies however, introduces a similar complexity to the information security risk assessment task. This complexity suggests that information security risk assessment cannot, optimally, be undertaken manually. Information security risk assessment for individual components of the information infrastructure can be aided by the use of a software tool, a type of simulation, which concentrates on modelling failure rather than normal operational simulation. Avoiding the modelling of the operational system will once again reduce the level of complexity of the assessment task. The use of such a tool provides the opportunity to reuse information in many different ways by developing a repository of relevant information to aid in both risk assessment and management and governance and compliance activities. Widespread use of such a tool allows the opportunity for the risk models developed for individual information infrastructure components to be connected in order to develop a model of information security exposures across the entire information infrastructure. In this thesis conceptual and practical aspects of risk and its underlying epistemology are analysed to produce a model suitable for application to information security risk assessment. Based on this work prototype software has been developed to explore these concepts for information security risk assessment. Initial work has been carried out to investigate the use of this software for information security compliance and governance activities. Finally, an initial concept for extending the use of this approach across an information infrastructure is presented.
Resumo:
Two hundred and twelve Australian mothers completed an online survey examining features of mother-child communication about child sexual abuse prevention. Two-thirds (67.5%) of respondents had discussed child sexual abuse prevention with their children. Proportions of mothers talking with their children about child sexual abuse prevention varied according to age range (highest for mothers with children aged 5-12 years) and only child status (lowest for mothers of only children). The number of topics discussed with their children differed according to child gender (greater number of topics discussed by mothers with both girls and boys) and age range (greater number of topics discussed by mothers with children aged 5-12 years). These findings provide new insights into mother-child communication about child sexual abuse prevention.