793 resultados para Collaborations and Networking


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article provides a general review of the literature on the nature and role of empathy in social interaction for information professionals working in a variety of information and knowledge environments. Relational agency theory (Edwards, 2005) is used asa framework to re-conceptualize education for empathic social interaction between information professionals and their clients. Past, present and future issues relevant to empathic interaction in information and knowledge management are discussed in the context of three shifts identified from the literature: (a) the continued increase in communication channels, both physical and virtual, for reference, information and re-search services, (b) the transition from the information age to the conceptual age and(c) the growing need for understanding of the affective paradigm in the information and knowledge professions. Findings from the literature review on the relationships between empathy and information behavior, social networking, knowledge management and information and knowledge services are presented. Findings are discussed in relation to the development of guidelines for the affective education and training of information and knowledge professionals and the potential use of virtual learning software such as Second Life in developing empathic communication skills

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Ben Light puts forward an alternative way of thinking about how we engage with social networking sites, going beyond the emphasis upon connectivity that has been associated with research in the area to date. Analysing our engagements and disengagements social networking sites in public (in cafes and at bus stops), at work (at desks, photocopiers and whilst cleaning), in our personal lives (where we cull friends and gossip on backchannels) and as related to our health and wellbeing (where we restrict our updates), he emphasises the importance of disconnection instead of connection. The book produces a theory of disconnective practice. This theory requires our attention to geographies of disconnection that include relations with a site, within a site, between sites and between sites and a physical world. Attention to disconnectors, as human and non-human is required, and the modes by which disconnection can occur can then be revealed. Light argues that diversity in the exercise of power is key to understanding disconnective practice where social networking sites are concerned, and he suggests that the ethics of disconnection may also require interrogation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper attends to the idea of disconnection as a way of theorising people’s lived experience of social networking sites. Enrolling and extending a disconnective practice lens we suggest that the disconnective strategies of suspension and prevention are operational necessities for those we might see as the users and owners of sites such as Facebook. Indeed, our work demonstrates that disconnection in these contexts need not be associated only with modes of resistance and departure, but can also act as socioeconomic lubricant.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Science, Art and Science Art collaborations are generally presented and understood in terms of their products. We argue that the process of Science art can be a significant, even principal benefit of these collaborations, even though it may be largely invisible to anyone other than the collaborators. Hosting the Centenary of Canberra Science Art Commission at the Commonwealth Scientific and Industrial Research Organisation (CSIRO) has shown us that while Science and Art pursue orthogonal dimensions of creativity and innovation, collaborators can combine these directions to access new areas of imagination and ideas.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Supervisory Control and Data Acquisition (SCADA) systems are one of the key foundations of smart grids. The Distributed Network Protocol version 3 (DNP3) is a standard SCADA protocol designed to facilitate communications in substations and smart grid nodes. The protocol is embedded with a security mechanism called Secure Authentication (DNP3-SA). This mechanism ensures that end-to-end communication security is provided in substations. This paper presents a formal model for the behavioural analysis of DNP3-SA using Coloured Petri Nets (CPN). Our DNP3-SA CPN model is capable of testing and verifying various attack scenarios: modification, replay and spoofing, combined complex attack and mitigation strategies. Using the model has revealed a previously unidentified flaw in the DNP3-SA protocol that can be exploited by an attacker that has access to the network interconnecting DNP3 devices. An attacker can launch a successful attack on an outstation without possessing the pre-shared keys by replaying a previously authenticated command with arbitrary parameters. We propose an update to the DNP3-SA protocol that removes the flaw and prevents such attacks. The update is validated and verified using our CPN model proving the effectiveness of the model and importance of the formal protocol analysis.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Information security and privacy in the healthcare domain is a complex and challenging problem for computer scientists, social scientists, law experts and policy makers. Appropriate healthcare provision requires specialized knowledge, is information intensive and much patient information is of a particularly sensitive nature. Electronic health record systems provide opportunities for information sharing which may enhance healthcare services, for both individuals and populations. However, appropriate information management measures are essential for privacy preservation...

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This essay makes three related claims about digital media creative clusters through a case study of the Hub in Glasgow, Scotland. First, online social networking platforms are an increasingly “common sense” feature that property developers include to attract media workers to purpose-built properties. Second, integrating and managing professional identities through the construction of place are considered necessary to promote that place to a larger audience. Finally, reorganizing place in this way refashions creative work as a more nebulous concept, a process that integrates formerly distinct aspects of our work and nonwork lives into the common pursuit of innovation for economic gain.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article considers the artistic and legal practices of Bangarra Dance Theatre in a case study of copyright law management in relation to Indigenous culture. It is grounded in the particular local experience, knowledge and understanding of copyright law displayed by the performing arts company. The first part considers the special relationship between Bangarra Dance Theatre and the Munyarrun Clan. It examines the contractual arrangements developed to recognise communal ownership. The next section examines the role of the artistic director and choreographer. It looks at the founder, Carole Johnson, and her successor, Stephen Page. The third part of the article focuses on the role of the composer, David Page. It examines his ambition to set up a Indigenous recording company, Nikinali. Part 4 focuses upon the role of the artistic designers. It looks at the contributions of artistic designers such as Fiona Foley. Part 5 deals with broadcasts of performances on television, film, and multi-media. Part 6 considers the collaborations of Bangarra Dance Theatre with the Australian Ballet, and the Sydney Organising Committee for the Olympic Games. The conclusion considers how Bangarra Dance Theatre has played a part ina general campaign to increase protection of Indigenous copyright law.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In his 1987 book, The Media Lab: Inventing the Future at MIT, Stewart Brand provides an insight into the visions of the future of the media in the 1970s and 1980s. 1 He notes that Nicolas Negroponte made a compelling case for the foundation of a media laboratory at MIT with diagrams detailing the convergence of three sectors of the media—the broadcast and motion picture industry; the print and publishing industry; and the computer industry. Stewart Brand commented: ‘If Negroponte was right and communications technologies really are converging, you would look for signs that technological homogenisation was dissolving old boundaries out of existence, and you would expect an explosion of new media where those boundaries used to be’. Two decades later, technology developers, media analysts and lawyers have become excited about the latest phase of media convergence. In 2006, the faddish Time Magazine heralded the arrival of various Web 2.0 social networking services: You can learn more about how Americans live just by looking at the backgrounds of YouTube videos—those rumpled bedrooms and toy‐strewn basement rec rooms—than you could from 1,000 hours of network television. And we didn’t just watch, we also worked. Like crazy. We made Facebook profiles and Second Life avatars and reviewed books at Amazon and recorded podcasts. We blogged about our candidates losing and wrote songs about getting dumped. We camcordered bombing runs and built open‐source software. America loves its solitary geniuses—its Einsteins, its Edisons, its Jobses—but those lonely dreamers may have to learn to play with others. Car companies are running open design contests. Reuters is carrying blog postings alongside its regular news feed. Microsoft is working overtime to fend off user‐created Linux. We’re looking at an explosion of productivity and innovation, and it’s just getting started, as millions of minds that would otherwise have drowned in obscurity get backhauled into the global intellectual economy. The magazine announced that Time’s Person of the Year was ‘You’, the everyman and everywoman consumer ‘for seizing the reins of the global media, for founding and framing the new digital democracy, for working for nothing and beating the pros at their own game’. This review essay considers three recent books, which have explored the legal dimensions of new media. In contrast to the unbridled exuberance of Time Magazine, this series of legal works displays an anxious trepidation about the legal ramifications associated with the rise of social networking services. In his tour de force, The Future of Reputation: Gossip, Rumor, and Privacy on the Internet, Daniel Solove considers the implications of social networking services, such as Facebook and YouTube, for the legal protection of reputation under privacy law and defamation law. Andrew Kenyon’s edited collection, TV Futures: Digital Television Policy in Australia, explores the intersection between media law and copyright law in the regulation of digital television and Internet videos. In The Future of the Internet and How to Stop It, Jonathan Zittrain explores the impact of ‘generative’ technologies and ‘tethered applications’—considering everything from the Apple Mac and the iPhone to the One Laptop per Child programme.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take priority in many circumstances. As such the overall security and performance metrics of those cryptographic functions in their embedded context needs to be understood. Understanding those metrics has been the main aim of this research activity. This research reports on an implementation of one network security technology, Internet Protocol Security (IPSec), to assess security performance. This research simulates sensitive healthcare information being transferred over networks, and then measures data delivery times with selected security parameters for various communication scenarios on Linux-based and Windows-based systems. Based on our test results, this research has revealed a number of network security metrics that need to be considered when designing and managing network security for healthcare-specific or non-healthcare-specific systems from security, performance and manageability perspectives. This research proposes practical recommendations based on the test results for the effective selection of network security controls to achieve an appropriate balance between network security and performance

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In 2013, social networking was the second most popular online activity after internet banking for Australians (ABS, 2014). The popularity and apparent ubiquity of social media is one of the most obvious and compelling arguments for integrating such technologies into higher education. Already, social media impacts a wide range of activities ranging in scope from marketing and communication to teaching and learning in higher education (Hrastinski & Dennen, 2012). Social media presents many exciting possibilities and opportunities for higher education. This session will focus on one staff focussed and one student focussed social media innovation currently underway at QUT. First, it will focus on the actions of QUT’s social media working group. The working group’s aim is to ensure an overarching social media policy for the university is developed and implemented that supports staff in the use of social media across a range of activities. Second, it will discuss the eResponsible and eProfessional Online resources for students project. The focus of this project is to develop a suite of online resources targeted at the devel opment of social media skills for undergraduate students at QUT. These initiatives are complementary and both aim to minimise risk while maximising opportuniti es for the university

Relevância:

30.00% 30.00%

Publicador:

Resumo:

With the ever increasing amount of eHealth data available from various eHealth systems and sources, Health Big Data Analytics promises enticing benefits such as enabling the discovery of new treatment options and improved decision making. However, concerns over the privacy of information have hindered the aggregation of this information. To address these concerns, we propose the use of Information Accountability protocols to provide patients with the ability to decide how and when their data can be shared and aggregated for use in big data research. In this paper, we discuss the issues surrounding Health Big Data Analytics and propose a consent-based model to address privacy concerns to aid in achieving the promised benefits of Big Data in eHealth.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Concerns over the security and privacy of patient information are one of the biggest hindrances to sharing health information and the wide adoption of eHealth systems. At present, there are competing requirements between healthcare consumers' (i.e. patients) requirements and healthcare professionals' (HCP) requirements. While consumers want control over their information, healthcare professionals want access to as much information as required in order to make well-informed decisions and provide quality care. In order to balance these requirements, the use of an Information Accountability Framework devised for eHealth systems has been proposed. In this paper, we take a step closer to the adoption of the Information Accountability protocols and demonstrate their functionality through an implementation in FluxMED, a customisable EHR system.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This tutorial primarily focuses on the implementation of Information Accountability (IA) protocols defined in an Information Accountability Framework (IAF) in eHealth systems. Concerns over the security and privacy of patient information are one of the biggest hindrances to sharing health information and the wide adoption of eHealth systems. At present, there are competing requirements between healthcare consumers' (i.e. patients) requirements and healthcare professionals' (HCP) requirements. While consumers want control over their information, healthcare professionals want access to as much information as required in order to make well-informed decisions and provide quality care. This conflict is evident in the review of Australia's PCEHR system and in recent studies of patient control of access to their eHealth information. In order to balance these requirements, the use of an Information Accountability Framework devised for eHealth systems has been proposed. Through the use of IA protocols, so-called Accountable-eHealth systems (AeH) create an eHealth environment where health information is available to the right person at the right time without rigid barriers whilst empowering the consumers with information control and transparency. In this half-day tutorial, we will discuss and describe the technical challenges surrounding the implementation of the IAF protocols into existing eHealth systems and demonstrate their use. The functionality of the protocols and AeH systems will be demonstrated, and an example of the implementation of the IAF protocols into an existing eHealth system will be presented and discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis investigates the role of Chinese microblogging platform Sina Weibo in how the people of Guangzhou understand and negotiate their sense of locality. The geo-identity approach used in this thesis opens up a new approach to explore the complex power relationships that structure our society in and through digital media. It finds that although the Chinese government is trying to orchestrate a homogeneous sense of national belonging, Weibo is constantly reinforcing people's awareness of and identification with the local. The findings show that as new communication technologies and practices reconfigure people's daily experience and social lives, they redefine our sense of self and belonging.