800 resultados para Information technology Australia Management


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Solving indeterminate algebraic equations in integers is a classic topic in the mathematics curricula across grades. At the undergraduate level, the study of solutions of non-linear equations of this kind can be motivated by the use of technology. This article shows how the unity of geometric contextualization and spreadsheet-based amplification of this topic can provide a discovery experience for prospective secondary teachers and information technology students. Such experience can be extended to include a transition from a computationally driven conjecturing to a formal proof based on a number of simple yet useful techniques.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This teaching case describes how SAP, a leading global information technology (IT) solutions provider, embarked on a large-scale transformation program to implement a dual sustainability strategy of: (a) internally transforming the organization, and (b) addressing a business opportunity by developing IT solutions that enable their customers to become more sustainable. This case provides students with significant information about the development of SAP towards sustainability, including the company's underlying motivation, their approach to change and related challenges, and their use of IT to enable the transformation. The teaching case provides an opportunity to critically examine the benefits and risks of using IT in an effort to improve the sustainability of an organization, and to develop appropriate models for sustainable strategies and IT implementation efforts.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This research suggests information technology (IT) governance structures to manage the cloud computing services. The interest in acquiring IT resources as a utility from the cloud computing environment is gaining momentum. The cloud computing services present organizations with opportunities to manage their IT expenditure on an ongoing basis, and access to modern IT resources to innovate and manage their continuity. However, the cloud computing services are no silver bullet. Organizations would need to have appropriate governance structures and policies in place to manage the cloud computing services. The subsequent decisions from these governance structures will ensure the effective management of the cloud computing services. This management will facilitate a better fit of the cloud computing services into organizations’ existing processes to achieve the business (process-level) and the financial (firm-level) objectives. Using a triangulation approach, we suggest four governance structures for managing the cloud computing services. These structures are a chief cloud officer, a cloud management committee, a cloud service facilitation centre, and a cloud relationship centre. We also propose that these governance structures would relate directly to organizations cloud computing services-related business objectives, and indirectly to cloud computing services-related financial objectives. Perceptive field survey data from actual and prospective cloud computing service adopters suggest that the suggested governance structures would contribute directly to cloud computing-related business objectives and indirectly to cloud computing-related financial objectives.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

INTRODUCTION: I want to argue that understanding masculinity is an important part of understanding gender and sexuality as it relates to information and communications technologies (ICTs), specifically those under the lens of the information-systems community. In order to do this, the landscape of gender and sexuality research in general is referred to along with such research in the field of information systems (IS), with reference as necessary to masculinity studies. I will then suggest some possible areas where a more thorough going theorization may prove useful. In sum, future research might focus on the relation-ship between marginalised masculinities and the construction and consumption of is in work organisations and society…

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Introduction This research is the first to investigate the experiences of teacher-librarians as evidence-based practice. An empirically derived model is presented in this paper. Method This qualitative study utilised the expanded critical incident approach, and investigated the real-life experiences of fifteen Australian teacher-librarians, through semi-structured interviews and inductive data analysis. Data collection utilised semi-structured interviews, on-site observations, journaling and the rubric for contextual information. These approaches allowed each of the interviewees to tell their own story and provided richness to the data. Analysis The analysis involved two types of data categorisation: binary and thematic. Binary classification was used to identify factual details. Thematic analysis involved categorising the emerging themes. Results An empirically derived model for evidence-based practice was devised and associated critical findings identified. The results demonstrate that evidence-based practice for teacher-librarians is a holistic practice. It is not a linear, step-by-step process. Conclusions This study is significant for teacher-librarians and library and information professionals as it provides new understanding of evidence-based practice.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Determination of sequence similarity is a central issue in computational biology, a problem addressed primarily through BLAST, an alignment based heuristic which has underpinned much of the analysis and annotation of the genomic era. Despite their success, alignment-based approaches scale poorly with increasing data set size, and are not robust under structural sequence rearrangements. Successive waves of innovation in sequencing technologies – so-called Next Generation Sequencing (NGS) approaches – have led to an explosion in data availability, challenging existing methods and motivating novel approaches to sequence representation and similarity scoring, including adaptation of existing methods from other domains such as information retrieval. In this work, we investigate locality-sensitive hashing of sequences through binary document signatures, applying the method to a bacterial protein classification task. Here, the goal is to predict the gene family to which a given query protein belongs. Experiments carried out on a pair of small but biologically realistic datasets (the full protein repertoires of families of Chlamydia and Staphylococcus aureus genomes respectively) show that a measure of similarity obtained by locality sensitive hashing gives highly accurate results while offering a number of avenues which will lead to substantial performance improvements over BLAST..

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Supervisory Control and Data Acquisition systems (SCADA) are widely used to control critical infrastructure automatically. Capturing and analyzing packet-level traffic flowing through such a network is an essential requirement for problems such as legacy network mapping and fault detection. Within the framework of captured network traffic, we present a simple modeling technique, which supports the mapping of the SCADA network topology via traffic monitoring. By characterizing atomic network components in terms of their input-output topology and the relationship between their data traffic logs, we show that these modeling primitives have good compositional behaviour, which allows complex networks to be modeled. Finally, the predictions generated by our model are found to be in good agreement with experimentally obtained traffic.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Identifying product families has been considered as an effective way to accommodate the increasing product varieties across the diverse market niches. In this paper, we propose a novel framework to identifying product families by using a similarity measure for a common product design data BOM (Bill of Materials) based on data mining techniques such as frequent mining and clus-tering. For calculating the similarity between BOMs, a novel Extended Augmented Adjacency Matrix (EAAM) representation is introduced that consists of information not only of the content and topology but also of the fre-quent structural dependency among the various parts of a product design. These EAAM representations of BOMs are compared to calculate the similarity between products and used as a clustering input to group the product fami-lies. When applied on a real-life manufacturing data, the proposed framework outperforms a current baseline that uses orthogonal Procrustes for grouping product families.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this essay, I present a reflective and generative analysis of Business Process Management research, in which I analyze process management and the surrounding research program from the viewpoint of a theoretical paradigm embracing analytical, empirical, explanatory and design elements. I argue that this view not only reconciles different perceptions of BPM and different research streams, but that it also informs ways in which the BPM research program could develop into a much richer, more inclusive and overall more significant body of work than it has to date. I define three perspectives on a BPM research agenda, give several examples of exciting existing research, and offer key opportunities for further research that can (a) strengthen the core of BPM, (b) generate novel theory from BPM in relevant and topical big issue domains, and (c) explore more rigorously and comprehensively the protective belt of BPM assumptions that much of the present research abides by. The essay ends with some recommendations for continuing the debate about what constitutes BPM and some suggestions for how future research in this area might be carried out.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Information Technology (IT) value is amongst the most important concepts in the Information Systems (IS) research field. Yet, a clear, well-formulated conceptualization of IT value, cumulatively built upon, is lacking. Drawing from the Facet Theory literature, this paper broaches several meta-theoretical considerations addressing an “ideal” conceptualization of IT value. We argue these considerations may shed light on the advancement of IT value conceptualization methodology.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Hong Kong construction industry is currently facing ageing problem and labour shortage. There are opportunities for employing ethnic minority construction workers to join this hazardous industry. These ethnic minority workers are prone to accidents due to communication barriers. Safety communication is playing an important role for avoiding the accidents on construction sites. However, the ethnic minority workers are not very fluent in the local language and facing safety communication problems while working with local workers. Social network analysis (SNA), being an effective tool to identify the safety communication flow on the construction site, is used to attain the measures of safety communication like centrality, density and betweenness within the ethnic minorities and local workers, and to generate sociograms that visually represent communication pattern within the effective and ineffective safety networks. The aim of this paper is to present the application of SNA for improving the safety communication of ethnic minorities in the construction industry of Hong Kong. The paper provides the theoretical background of SNA approaches for the data collection and analysis using the software UCINET and NetDraw, to determine the predominant safety communication network structure and pattern of ethnic minorities on site.