963 resultados para cyber security, securitization, information technology, U.S CYBERCOM


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The technologies that empower biometrics have been around for a number of years, but until recently these technologies have been viewed as exotic. In the not too distant future biometrics will be used to regulate internal processes and to improve services in the hospitality and tourism industries. This paper provides an understanding of the current use of biometrics in general and its practical value for the future in hospitality and tourism. The study presents a review of current practices of biometrics with special reference to the hospitality and tourism businesses, addresses key issues imposed by this technology, and identifies business and marketing implications for these industries.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In outsourcing relationships with China, the Electronic Manufacturing (EM) and Information Technology Services (ITS) industry in Taiwan may possess such advantages as the continuing growth of its production value, complete manufacturing supply chain, low production cost and a large-scale Chinese market, and language and culture similarity compared to outsourcing to other countries. Nevertheless, the Council for Economic Planning and Development of Executive Yuan (CEPD) found that Taiwan's IT services outsourcing to China is subject to certain constraints and might not be as successful as the EM outsourcing (Aggarwal, 2003; CEPD, 2004a; CIER, 2003; Einhorn and Kriplani, 2003; Kumar and Zhu, 2006; Li and Gao, 2003; MIC, 2006). Some studies examined this issue, but failed to (1) provide statistical evidence about lower prevalence rates of IT services outsourcing, and (2) clearly explain the lower prevalence rates of IT services outsourcing by identifying similarities and differences between both types of outsourcing contexts. This research seeks to fill that gap and possibly provide potential strategic guidelines to ITS firms in Taiwan. This study adopts Transaction Cost Economics (TCE) as the theoretical basis. The basic premise is that different types of outsourcing activities may incur differing transaction costs and realize varying degrees of outsourcing success due to differential attributes of the transactions in the outsourcing process. Using primary data gathered from questionnaire surveys of ninety two firms, the results from exploratory analysis and binary logistic regression indicated that (1) when outsourcing to China, Taiwanese firms' ITS outsourcing tends to have higher level of asset specificity, uncertainty and technical skills relative to EM outsourcing, and these features indirectly reduce firms' outsourcing prevalence rates via their direct positive impacts on transaction costs; (2) Taiwanese firms' ITS outsourcing tends to have lower level of transaction structurability relative to EM outsourcing, and this feature indirectly increases firms' outsourcing prevalence rates via its direct negative impacts on transaction costs; (3) frequency does influence firms' transaction costs in ITS outsourcing positively, but does not bring impacts into their outsourcing prevalence rates, (4) relatedness does influence firms' transaction costs positively and prevalence rates negatively in ITS outsourcing, but its impacts on the prevalence rates are not caused by the mediation effects of transaction costs, and (5) firm size of outsourcing provider does not affect firms' transaction costs, but does affect their outsourcing prevalence rates in ITS outsourcing directly and positively. Using primary data gathered from face-to-face interviews of executives from seven firms, the results from inductive analysis indicated that (1) IT services outsourcing has lower prevalence rates than EM outsourcing, and (2) this result is mainly attributed to Taiwan's core competence in manufacturing and management and higher overall transaction costs of IT services outsourcing. Specifically, there is not much difference between both types of outsourcing context in the transaction characteristics of reputation and most aspects of overall comparison. Although there are some differences in the feature of firm size of the outsourcing provider, the difference doesn't cause apparent impacts on firms' overall transaction costs. The medium or above medium difference in the transaction characteristics of asset specificity, uncertainty, frequency, technical skills, transaction structurability, and relatedness has caused higher overall transaction costs for IT services outsourcing. This higher cost might cause lower prevalence rates for ITS outsourcing relative to EM outsourcing. Overall, the interview results are consistent with the statistical analyses and provide support to my expectation that in outsourcing to China, Taiwan's electronic manufacturing firms do have lower prevalence rates of IT services outsourcing relative to EM outsourcing due to higher transaction costs caused by certain attributes. To solve this problem, firms' management should aim at identifying alternative strategies and strive to reduce their overall transaction costs of IT services outsourcing by initiating appropriate strategies which fit their environment and needs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Acknowledgements: This research was carried out through a grant from the EPSRC: Communities and Cultures Network+ EP/K003585 and forms part of the dot.rural Rural Digital Economy Research Hub EP/G066051

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Acknowledgements: This research was carried out through a grant from the EPSRC: Communities and Cultures Network+ EP/K003585 and forms part of the dot.rural Rural Digital Economy Research Hub EP/G066051

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study provides novel evidence on the extent to which auditors perceive the usage and importance of audit technology in an emerging market. It explores the types of audit technology tools used and factors influencing the use of these; it tests the association between the perceived use and importance of the tools and firm-specific/ auditor-specific characteristics. Using interviews and questionnaires from auditors at Big 4 and international non-Big 4 audit firms, the findings reflect the highly perceived importance of using audit technology in technical and administrative procedures, specifically to assess risk. We find that the perceived use and importance of audit technology is relatively higher for those in Big 4 firms, with less years of auditor experience and higher auditor technology expertise, and those in management positions. The results provide policy makers with guidance on the opportunities and challenges of using information technology in the audit process.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The business model of an organization is an important strategic tool for its success, and should therefore be understood by business professionals and information technology professionals. By this context and considering the importance of information technology in contemporary business models, this article aims to verify the use of the business model components in the information technology (IT) projects management process in enterprises. To achieve this goal, this exploratory research has investigated the use of the Business Model concept in the information technology projects management, by a survey applied to 327 professionals from February to April 2012. It was observed that the business model concept, as well as its practices or its blocks, are not so well explored in its whole potential, possibly because it is relatively new. One of the benefits of this conceptual tool is to provide an understanding in terms of the core business for different areas, enabling a higher level of knowledge in terms of the essential activities of the enterprise IT professionals and the business area.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This year the School of Library, Documentation and Information is twenty years from its beginning as Unit Library.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The universities rely on the Information Technology (IT) projects to support and enhance their core strategic objectives of teaching, research, and administration. The researcher’s literature review found that the level of IT funding and resources in the universities is not adequate to meet the IT demands. The universities received more IT project requests than they could execute. As such, universities must selectively fund the IT projects. The objectives of the IT projects in the universities vary. An IT project which benefits the teaching functions may not benefit the administrative functions. As such, the selection of an IT project is challenging in the universities. To aid with the IT decision making, many universities in the United States of America (USA) have formed the IT Governance (ITG) processes. ITG is an IT decision making and accountability framework whose purpose is to align the IT efforts in an organization with its strategic objectives, realize the value of the IT investments, meet the expected performance criteria, and manage the risks and the resources (Weil & Ross, 2004). ITG in the universities is relatively new, and it is not well known how the ITG processes are aiding the nonprofit universities in selecting the right IT projects, and managing the performance of these IT projects. This research adds to the body of knowledge regarding the IT project selection under the governance structure, the maturity of the IT projects, and the IT project performance in the nonprofit universities. The case study research methodology was chosen for this exploratory research. The convenience sampling was done to choose the cases from two large, research universities with decentralized colleges, and two small, centralized universities. The data were collected on nine IT projects from these four universities using the interviews and the university documents. The multi-case analysis was complemented by the Qualitative Comparative Analysis (QCA) to systematically analyze how the IT conditions lead to an outcome. This research found that the IT projects were selected in the centralized universities in a more informed manner. ITG was more authoritative in the small centralized universities; the ITG committees were formed by including the key decision makers, the decision-making roles, and responsibilities were better defined, and the frequency of ITG communication was higher. In the centralized universities, the business units and colleges brought the IT requests to ITG committees; which in turn prioritized the IT requests and allocated the funds and the resources to the IT projects. ITG committee members in the centralized universities had a higher awareness of the university-wide IT needs, and the IT projects tended to align with the strategic objectives. On the other hand, the decentralized colleges and business units in the large universities were influential and often bypassed the ITG processes. The decentralized units often chose the “pet” IT projects, and executed them within a silo, without bringing them to the attention of the ITG committees. While these IT projects met the departmental objectives, they did not always align with the university’s strategic objectives. This research found that the IT project maturity in the university could be increased by following the project management methodologies. The IT project management maturity was found higher in the IT projects executed by the centralized university, where a full-time project manager was assigned to manage the project, and the project manager had a higher expertise in the project management. The IT project executed under the guidance of the Project Management Office (PMO) has exhibited a higher project management maturity, as the PMO set the standards and controls for the project. The IT projects managed by the decentralized colleges by a part-time project manager with lower project management expertise have exhibited a lower project management maturity. The IT projects in the decentralized colleges were often managed by the business, or technical leads, who often lacked the project management expertise. This research found that higher the IT project management maturity, the better is the project performance. The IT projects with a higher maturity had a lower project delay, lower number of missed requirements, and lower number of IT system errors. This research found that the quality of IT decision in the university could be improved by centralizing the IT decision-making processes. The IT project management maturity could be improved by following the project management methodologies. The stakeholder management and communication were found critical for the success of the IT projects in the university. It is hoped that the findings from this research would help the university leaders make the strategic IT decisions, and the university’s IT project managers make the IT project decisions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

It is important for students to develop informed and realistic career aspirations to gain the most value from their university studies towards achieving their initial career goals. However developing students’ career aspirations, goals, and expectations is a complex and discipline-specific process. In Information Technology (IT) no clear career development framework is evident in the literature. Recent research in Australia argues that electronic portfolios are a useful way for students to develop, articulate and document career objectives to enhance their employability. IT students at Deakin engage in formal training and assessment with respect to developing their professional skills and career understandings. Currently electronic portfolios feature as a useful method for evidencing professional competencies for employability. Through a combined quantitative and qualitative analysis of 306 students’ articulated current career aspirations, qualitative analysis of 7 staff opinions of desired student career competencies, and a quantitative analysis of 28 students’ current work personality traits assessments (Work Personality Index), this work presents an analysis of the current state of IT students’ career development. The results indicate that while students reported short-term career aspirations, navigating to their long-term career goals is going to require addressing difficult barriers such as confidence (self-perception) and motivation. This research will influence a larger program-wide endeavour to build student career competencies for employability in IT at Deakin University.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Two recent reviews report that the empirical findings in information technology outsourcing (ITO) research are frequently inconsistent with the prevailing dominant analytical framework of transaction cost economics (TCE). While employing similar methodologies, the two reviews propose different strategies to resolve the inconsistencies. One is to improve the methodological rigor, specifically, the operationalization of TCE constructs. The other is to abandon TCE in favor of a new analytical framework. This paper presents a meta-analysis of the empirical findings on the choice of contract type as a function of task uncertainty. The results support both strategies. Refining the operationalization of TCE constructs, specifically of task uncertainty, would have improved the reliability of findings on TCE-based relationships between task uncertainty and the choice of contract type. However, independent of such methodological improvements, TCE is of limited relevance in recent ITO research for predicting the choice of contract type. Generalizing these findings, we conclude that ITO research requires a new analytical framework to further develop the theory of ITO and to provide sound guidance to the ITO industry.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents a distributed multi-agent scheme for enhancing the cyber security of smart grids which integrates computational resources, physical processes, and communication capabilities. Smart grid infrastructures are vulnerable to various cyber attacks and noises whose influences are significant for reliable and secure operations. A distributed agent-based framework is developed to investigate the interactions between physical processes and cyber activities where the attacks are considered as additive sensor fault signals and noises as randomly generated disturbance signals. A model of innovative physical process-oriented counter-measure and abnormal angle-state observer is designed for detection and mitigation against integrity attacks. Furthermore, this model helps to identify if the observation errors are caused either by attacks or noises.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents a distributed multi-agent scheme for enhancing the cyber security of smart grids which integrates computational resources, physical processes, and communication capabilities. Smart grid infrastructures are vulnerable to various cyber attacks and noises whose influences are significant for reliable and secure operations. A distributed agent-based framework is developed to investigate the interactions between physical processes and cyber activities where the attacks are considered as additive sensor fault signals and noises as randomly generated disturbance signals. A model of innovative physical process-oriented counter-measure and abnormal angle-state observer is designed for detection and mitigation against integrity attacks. Furthermore, this model helps to identify if the observation errors are caused either by attacks or noises.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Chinese Medicine (CM) has become increasingly demanding globally. Recent World Health Organisation traditional and complementary medicine strategy of integrating CM to Western Medicine (WM) indicates that it is crucial that CM developments have strong literature, scientific, and evidence-based medical approval and support. To achieve this, there is a need to form a synthesis foundation or platform for future studies. This chapter serves to discover this synthesis that is suitable for CM by discussing the basics of inquiring and Knowledge Management (KM) systems. It suggests that CM should follow a combination of Hegelian and Kantian inquiring systems with the support of Singerian and Leibnizian inquiring systems and KM features. This proposed synthesis is one of the first, if not the first study to apply Churchman's inquiring systems into the context of CM and differentiate them from WM.