810 resultados para cyber security, securitization, information technology, U.S CYBERCOM
Resumo:
Designers need to develop good observational skills in order to conduct user studies that reveal the subtleties of human interactions and adequately inform design activity. In this paper we describe a game format that we have used in concert with wiki-web technology, to engage our IT and Information Environments students in developing much sharper observational skills. The Video Card Game is a method of video analysis that is suited to design practitioners as well as to researchers. It uses the familiar format of a card game similar to "Happy Families,, to help students develop themes of interactions from watching video clips. Students then post their interaction themes on wiki-web pages, which allows the teaching team and other students to edit and comment on them. We found that the tangible (cards), game, role playing and sharing aspects of this method led to a much larger amount of interaction and discussion between student groups and between students and the teaching team, than we have achieved using our traditional teaching methods, while taking no more time on the part of the teaching staff. The quality of the resulting interaction themes indicates that this method fosters development of observational skills.In the paper we describe the motivations, method and results in full. We also describe the research context in which we collected the videotape data, and how this method relates to state of the art research methods in interaction design for ubiquitous computing technology.
Resumo:
In the globalizing world, knowledge and information (and the social and technological settings for their production and communication) are now seen as keys to economic prosperity. The economy of a knowledge city creates value-added products using research, technology, and brainpower. The social benefit of knowledge-based urban development (KBUD); however, extends beyond aggregate economic growth.
Resumo:
Information and communication technologies (ICTs) had occupied their position on knowledge management and are now evolving towards the era of self-intelligence (Klosterman, 2001). In the 21st century ICTs for urban development and planning are imperative to improve the quality of life and place. This includes the management of traffic, waste, electricity, sewerage and water quality, monitoring fire and crime, conserving renewable resources, and coordinating urban policies and programs for urban planners, civil engineers, and government officers and administrators. The handling of tasks in the field of urban management often requires complex, interdisciplinary knowledge as well as profound technical information. Most of the information has been compiled during the last few years in the form of manuals, reports, databases, and programs. However frequently, the existence of these information and services are either not known or they are not readily available to the people who need them. To provide urban administrators and the public with comprehensive information and services, various ICTs are being developed. In early 1990s Mark Weiser (1993) proposed Ubiquitous Computing project at the Xerox Palo Alto Research Centre in the US. He provides a vision of a built environment which digital networks link individual residents not only to other people but also to goods and services whenever and wherever they need (Mitchell, 1999). Since then the Republic of Korea (ROK) has been continuously developed national strategies for knowledge based urban development (KBUD) through the agenda of Cyber Korea, E-Korea and U-Korea. Among abovementioned agendas particularly the U-Korea agenda aims the convergence of ICTs and urban space for a prosperous urban and economic development. U-Korea strategies create a series of U-cities based on ubiquitous computing and ICTs by a means of providing ubiquitous city (U-city) infrastructure and services in urban space. The goals of U-city development is not only boosting the national economy but also creating value in knowledge based communities. It provides opportunity for both the central and local governments collaborate to U-city project, optimize information utilization, and minimize regional disparities. This chapter introduces the Korean-led U-city concept, planning, design schemes and management policies and discusses the implications of U-city concept in planning for KBUD.
Resumo:
The challenges of maintaining a building such as the Sydney Opera House are immense and are dependent upon a vast array of information. The value of information can be enhanced by its currency, accessibility and the ability to correlate data sets (integration of information sources). A building information model correlated to various information sources related to the facility is used as definition for a digital facility model. Such a digital facility model would give transparent and an integrated access to an array of datasets and obviously would support Facility Management processes. In order to construct such a digital facility model, two state-of-the-art Information and Communication technologies are considered: an internationally standardized building information model called the Industry Foundation Classes (IFC) and a variety of advanced communication and integration technologies often referred to as the Semantic Web such as the Resource Description Framework (RDF) and the Web Ontology Language (OWL). This paper reports on some technical aspects for developing a digital facility model focusing on Sydney Opera House. The proposed digital facility model enables IFC data to participate in an ontology driven, service-oriented software environment. A proof-of-concept prototype has been developed demonstrating the usability of IFC information to collaborate with Sydney Opera House’s specific data sources using semantic web ontologies.
Resumo:
This research investigates how the world’s leading companies, the Fortune Global 500, use sportsrelated terms and phrases on their Web site. An automated process mirrored leading transnational corporations’ Web presence and then searched their sites. Analysis of about four gigabytes of Webbased text revealed regional and industry differences in how the world’s largest corporations use sports terms on their sites.
Resumo:
Relationship dissolution has been somewhat ignored in the study of relationship marketing paradigm. While there has been an abundance of literature giving broad conceptualizations on how to master the intricacies of relationships, very little has discussed the concept of relationship dissolution. This is especially true of the sporting industry, which does not yet understand the factors that contribute to members relinquishing their membership and severing relationship ties with the club. Team performance was found to be the most powerful predictor of relationship dissolution; however, both satisfaction with the sportscape and emotional bonds had a significant influence on the decision for a member not to renew their membership. Although team performance is mostly out of the hands of sport marketers, greater focus should be given to implementing strategies that enhance the emotional aspects of the club-member relationship while also improving aspects of the service facility.
Resumo:
Building Information Modelling (BIM) is an information technology [IT] enabled approach to managing design data in the AEC/FM (Architecture, Engineering and Construction/ Facilities Management) industry. BIM enables improved interdisciplinary collaboration across distributed teams, intelligent documentation and information retrieval, greater consistency in building data, better conflict detection and enhanced facilities management. Despite the apparent benefits the adoption of BIM in practice has been slow. Workshops with industry focus groups were conducted to identify the industry needs, concerns and expectations from participants who had implemented BIM or were BIM “ready”. Factors inhibiting BIM adoption include lack of training, low business incentives, perception of lack of rewards, technological concerns, industry fragmentation related to uneven ICT adoption practices, contractual matters and resistance to changing current work practice. Successful BIM usage depends on collective adoption of BIM across the different disciplines and support by the client. The relationship of current work practices to future BIM scenarios was identified as an important strategy as the participants believed that BIM cannot be efficiently used with traditional practices and methods. The key to successful implementation is to explore the extent to which current work practices must change. Currently there is a perception that all work practices and processes must adopt and change for effective usage of BIM. It is acknowledged that new roles and responsibilities are emerging and that different parties will lead BIM on different projects. A contingency based approach to the problem of implementation was taken which relies upon integration of BIM project champion, procurement strategy, team capability analysis, commercial software availability/applicability and phase decision making and event analysis. Organizations need to understand: (a) their own work processes and requirements; (b) the range of BIM applications available in the market and their capabilities (c) the potential benefits of different BIM applications and their roles in different phases of the project lifecycle, and (d) collective supply chain adoption capabilities. A framework is proposed to support organizations selection of BIM usage strategies that meet their project requirements. Case studies are being conducted to develop the framework. The results of the preliminary design management case study is presented for contractor led BIM specific to the design and construct procurement strategy.
Resumo:
SITDRM 1 is a privacy protection system that protects private data through the enforcement of MPEG REL licenses provided by consumers. Direct issuing of licenses by consumers has several usability problems that will be mentioned in this paper. Further, we will describe how SITDRM incorporates P3P language to provide a consumer-centered privacy protection system.
Resumo:
The neXus2 research project has sought to investigate the library and information services (LIS) workforce in Australia, from the institutional or employer perspective. The study builds on the neXus1 study, which collected data from individuals in the LIS workforce in order to present a snapshot of the profession in 2006, highlighting the demographics, educational background and career details of library and information professionals in Australia. To counterbalance this individual perspective, library institutions were invited to participate in a survey to contribute further data as employers. This final report on the neXus2 project compares the findings from the different library sectors, ie academic libraries, TAFE libraries, the National and State libraries, public libraries, special libraries and school libraries.
Resumo:
Effective information and knowledge management (IKM) is critical to corporate success; yet, its actual establishment and management is not yet fully understood. We identify ten organizational elements that need to be addressed to ensure the effective implementation and maintenance of information and knowledge management within organizations. We define these elements and provide key characterizations. We then discuss a case study that describes the implementation of an information system (designed to support IKM) in a medical supplies organization. We apply the framework of organizational elements in our analysis to uncover the enablers and barriers in this systems implementation project. Our analysis suggests that taking the ten organizational elements into consideration when implementing information systems will assist practitioners in managing information and knowledge processes more effectively and efficiently. We discuss implications for future research.
Resumo:
Public key cryptography, and with it,the ability to compute digital signatures, have made it possible for electronic commerce to flourish. It is thus unsurprising that the proposed Australian NECS will also utilise digital signatures in its system so as to provide a fully automated process from the creation of electronic land title instrument to the digital signing, and electronic lodgment of these instruments. This necessitates an analysis of the fraud risks raised by the usage of digital signatures because a compromise of the integrity of digital signatures will lead to a compromise of the Torrens system itself. This article will show that digital signatures may in fact offer greater security against fraud than handwritten signatures; but to achieve this, digital signatures require an infrastructure whereby each component is properly implemented and managed.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.