931 resultados para IT outsourcing
Resumo:
Computer generated materials are ubiquitous and we encounter them on a daily basis, even though most people are unaware that this is the case. Blockbuster movies, television weather reports and telephone directories all include material that is produced by utilising computer technologies. Copyright protection for materials generated by a programmed computer was considered by the Federal Court and Full Court of the Federal Court in Telstra Corporation Limited v Phone Directories Company Pty Ltd. The court held that the White and Yellow pages telephone directories produced by Telstra and its subsidiary, Sensis, were not protected by copyright because they were computer-generated works which lacked the requisite human authorship. The Copyright Act 1968 (Cth) does not contain specific provisions on the subsistence of copyright in computer-generated materials. Although the issue of copyright protection for computer-generated materials has been examined in Australia on two separate occasions by independently-constituted Copyright Law Review Committees over a period of 10 years (1988 to 1998), the Committees’ recommendations for legislative clarification by the enactment of specific amendments to the Copyright Act have not yet been implemented and the legal position remains unclear. In the light of the decision of the Full Federal Court in Telstra v Phone Directories it is timely to consider whether specific provisions should be enacted to clarify the position of computer-generated works under copyright law and, in particular, whether the requirement of human authorship for original works protected under Part III of the Copyright Act should now be reconceptualised to align with the realities of how copyright materials are created in the digital era.
Resumo:
Objectives The intent of this paper is in the examination of health IT implementation processes – the barriers to and facilitators of successful implementation, identification of a beginning set of implementation best practices, the identification of gaps in the health IT implementation body of knowledge, and recommendations for future study and application. Methods A literature review resulted in the identification of six health IT related implementation best practices which were subsequently debated and clarified by participants attending the NI2012 Research Post Conference held in Montreal in the summer of 2012. Using the framework for implementation research (CFIR) to guide their application, the six best practices were applied to two distinct health IT implementation studies to assess their applicability. Results Assessing the implementation processes from two markedly diverse settings illustrated both the challenges and potentials of using standardized implementation processes. In support of what was discovered in the review of the literature, “one size fits all” in health IT implementation is a fallacy, particularly when global diversity is added into the mix. At the same time, several frameworks show promise for use as “scaffolding” to begin to assess best practices, their distinct dimensions, and their applicability for use. Conclusions Health IT innovations, regardless of the implementation setting, requires a close assessment of many dimensions. While there is no “one size fits all”, there are commonalities and best practices that can be blended, adapted, and utilized to improve the process of implementation. This paper examines health IT implementation processes and identifies a beginning set of implementation best practices, which could begin to address gaps in the health IT implementation body of knowledge.
Resumo:
Construction contracts often provide that decisions under the contract will be made by a certifier. This paper reviews the liability issues when a certifier makes a mistake. We do that in light of recent pronouncements by the High Court of Australia and the New South Wales Court of Appeal on negligence. We look at this question in the context of traditional construction contract arrangements and also consider the implications for Public Private Partnerships and the typical contract arrangements entered into to facilitate these transactions.
Resumo:
This paper examines a Doctoral journey of interdisciplinary exploration, explication, examination...and exasperation. In choosing to pursue a practice-led doctorate I had determined from the outset that ‘writing 100,000 words that only two people ever read’, was not something which interested me. Hence, the oft-asked question of ‘what kind of doctorate’ I was engaged in, consistently elicited the response, “a useful one”. In order to satisfy my own imperatives of authenticity and usefulness, my doctoral research had to clearly demonstrate relevance to; productively inform; engage with; and add value to: wider professional field(s) of practice; students in the university courses I teach; and the broader community - not just the academic community. Consequently, over the course of my research, the question, ‘But what makes it Doctoral?’ consistently resounded and resonated. Answering that question, to satisfy not only the traditionalists asking it but, perhaps surprisingly, some academic innovators - and more particularly, myself as researcher - revealed academic/political inconsistencies and issues which challenged both the fundamental assumptions and actuality of practice-led research. This paper examines some of those inconsistencies, issues and challenges and provides at least one possible answer to the question: ‘But what makes it Doctoral?’
Resumo:
This paper examines art and artefact in the representation and recollection of deeply personal WWII women’s experiences as POW’s under the Japanese. This kind of treatment of internees in the Tjideng Women and Children’s internment camp (and others) in Batavia under the Japanese in WWII, stands in stark and brutal contrast to the idyllic life lived by many families up to that time in what was then known as the Dutch East Indies (Indonesia). The deprivation and brutality of the Japanese incarceration of these women and children evoked responses - not military, but certainly militant, if muted. Representations of those responses – as both art and artefact - may be found in the most unlikely places and unexpected forms - and are still being unearthed to this day. However close we might personally be to these artists and artisans, can we, as observers from a distance, ever truly comprehend through spoken or written words alone, the day-today realities of those extraordinary times?
Resumo:
Every motorised jurisdiction mandates legal driving behaviour which facilitates driver mobility and road user safety through explicit road rules that are enforced by regulatory authorities such as the Police. In road safety, traffic law enforcement has been very successfully applied to modify road user behaviour, and increasingly technology is fundamental in detecting illegal road user behaviour. Furthermore, there is also sound evidence that highly visible and/or intensive enforcement programs achieve long-term deterrent effects. To illustrate, in Australia random breath testing has considerably reduced the incidence and prevalence of driving whilst under the influence of alcohol. There is, however, evidence that many road rules continue to be broken, including speeding and using a mobile phone whilst driving, and there are many instances where drivers are not detected or sufficiently sanctioned for these transgressions. Furthermore, there is a growing body of evidence suggesting that experiences of punishment avoidance – that is, successful attempts at avoiding punishment such as drivers talking themselves out of a ticket, or changing driving routes to evade detection –are associated with and predictive of the extent of illegal driving behaviour and future illegal driving intentions. Therefore there is a need to better understand the phenomenon of punishment avoidance to enhance our traffic law enforcement procedures and therefore safety of all road users. This chapter begins with a review of the young driver road safety problem, followed by an examination of contemporary deterrence theory to enhance our understanding of both the experiences and implications of punishment avoidance in the road environment. It is noteworthy that in situations where detection and punishment remain relatively rare, such as on extensive road networks, the research evidence suggests that experiences of punishment avoidance may have a stronger influence upon risky driving behaviour than experiences of punishment. Finally, data from a case study examining the risky behaviour of young drivers will be presented, and the implications for ‘getting away with it’ will be discussed.
Resumo:
The Control Theory has provided a useful theoretical foundation for Information Systems development outsourcing (ISD-outsourcing) to examine the co-ordination between the client and the vendor. Recent research identified two control mechanisms: structural (structure of the control mode) and process (the process through which the control mode is enacted). Yet, the Control Theory research to-date does not describe the ways in which the two control mechanisms can be combined to ensure project success. Grounded in case study data of eight ISD-outsourcing projects, we derive three ‘control configurations’; i) aligned, ii) negotiated, and 3) self-managed, which describe the combinative patterns of structural and process control mechanisms within and across control modes.
Resumo:
"Food literacy" has emerged as a term to describe the everyday practicalities needed for healthy eating. It is increasingly used in policy, practice, research and in the public arena. This thesis empirically defined the term, identified its components, and developed models of its relationship to nutrition and health. Food literacy was examined from two perspectives; that of food experts and that of individuals using the case study of young people experiencing disadvantage. The research provides a common language and conceptualisation of food literacy which is being used by governments, policy-makers and practitioners to guide investment and practice.
Resumo:
This catalogue essay was written to accompany Clark Beaumont's 2014 exhibition at Kings Artist Run in Melbourne, 'Feeling It Out'. It contextualises Clark Beaumont's work within a history of women's participation and achievement in modern and contemporary art, and suggests that this body of work may work through issues of anxiety, ambivalence and doubt about the art world.
Resumo:
This paper uses data from interviews with representatives of national and state organisations that have a policy interest in student-working in Australia. The interviewees included representatives from employer bodies and trade unions as well as government organisations. The data are used to discuss these stakeholders’ perceptions of the main advantages and disadvantages of working by young full-time students and the ways in which organisations in the business and educational sectors have adapted their policies and practices for student-working. The analysis is then used to inform a discussion about whether this is a legitimate area for public policy formulation and if so, what principles might underpin such policy and what some policies might look like.
Resumo:
We explored the impact of neighborhood walkability on young adults, early-middle adults, middle-aged adults, and older adults' walking across different neighborhood buffers. Participants completed the Western Australian Health and Wellbeing Surveillance System Survey (2003–2009) and were allocated a neighborhood walkability score at 200 m, 400 m, 800 m, and 1600 m around their home. We found little difference in strength of associations across neighborhood size buffers for all life stages. We conclude that neighborhood walkability supports more walking regardless of adult life stage and is relevant for small (e.g., 200 m) and larger (e.g., 1600 m) neighborhood buffers.
Resumo:
Everyone knows there’s a problem with copyright. Artists get paid very little for their work, and legitimate consumers aren’t getting a very fair deal either. Unfortunately, nobody agrees about how we should fix it. Speaking at the Australian Digital Alliance forum last Friday, the Attorney-General and Arts Minister George Brandis said we might have to ask Internet Service Providers (ISPs) to police copyright, in order to deal with “piracy”. In 2012, the High Court in the iiNet case thought it wasn’t a good idea to make ISPs responsible for protecting the rights of third parties...
Resumo:
The purpose of this paper is to empirically examine the state of cloud computing adoption in Australia. I specifically focus on the drivers, risks, and benefits of cloud computing from the perspective of IT experts and forensic accountants. I use thematic analysis of interview data to answer the research questions of the study. The findings suggest that cloud computing is increasingly gaining foothold in many sectors due to its advantages such as flexibility and the speed of deployment. However, security remains an issue and therefore its adoption is likely to be selective and phased. Of particular concern are the involvement of third parties and foreign jurisdictions, which in the event of damage may complicate litigation and forensic investigations. This is one of the first empirical studies that reports on cloud computing adoption and experiences in Australia.