861 resultados para personal information management model


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Many data mining techniques have been proposed for mining useful patterns in databases. However, how to effectively utilize discovered patterns is still an open research issue, especially in the domain of text mining. Most existing methods adopt term-based approaches. However, they all suffer from the problems of polysemy and synonymy. This paper presents an innovative technique, pattern taxonomy mining, to improve the effectiveness of using discovered patterns for finding useful information. Substantial experiments on RCV1 demonstrate that the proposed solution achieves encouraging performance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This book aims to provide an overview of approaches to assist researchers and practitioners to explore ways of undertaking research in the information literacy field. The first chapter provides an introductory overview of research by Dr Kirsty Williamson (author of Research Methods for Students, Academics and Professionals: Information Management and Systems) and this sets the scene for the rest of the chapters where each author explores the key aspects of a specific method and explains how it may be applied in practice. The methods covered include those representing qualitative, quantitative and mixed methods. Both a chapter on the topical evidence-based practice approach, and another critiquing it, are also included. The final chapter points the way towards potential new directions for the burgeoning field

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mainstream business process modelling techniques promote a design paradigm wherein the activities to be performed within a case, together with their usual execution order, form the backbone of a process model, on top of which other aspects are anchored. This paradigm, while eective in standardised and production-oriented domains, shows some limitations when confronted with processes where case-by-case variations and exceptions are the norm. In this thesis we develop the idea that the eective design of exible process models calls for an alternative modelling paradigm, one in which process models are modularised along key business objects, rather than along activity decompositions. The research follows a design science method, starting from the formulation of a research problem expressed in terms of requirements, and culminating in a set of artifacts that have been devised to satisfy these requirements. The main contributions of the thesis are: (i) a meta-model for object-centric process modelling incorporating constructs for capturing exible processes; (ii) a transformation from this meta-model to an existing activity-centric process modelling language, namely YAWL, showing the relation between object-centric and activity-centric process modelling approaches; and (iii) a Coloured Petri Net that captures the semantics of the proposed meta-model. The meta-model has been evaluated using a framework consisting of a set of work ow patterns. Moreover, the meta-model has been embodied in a modelling tool that has been used to capture two industrial scenarios.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this conceptual paper we investigate how corporate venturing influences an organization's competences. The impact of various types of corporate ventures on the portfolio of strategic options of a firm's competence modes (Sanchez, 2004a; Sanchez & Heene, 2002) will be assessed by distinguishing two fundamentally different dimensions of corporate venturing: technology and product (Block & MacMillan, 1993). We argue that the level of product and factor market dynamism mediates the effect of corporate venturing on a firm's competence modes. Corporate ventures that significantly increase the level of product or factor market dynamics will increase the flexibility in all five competence modes. These ventures have a direct effect on the lower-order competence modes and an indirect, lagged effect on higher-order competence modes through feedback loops. The developed framework and the propositions contribute to managing the ability of a firm to change its coordination, resource, and operating flexibility in order to sustain value creation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A study of Australian nurses on their use of information technology in the workplace was undertaken by the Australian Nursing Federation (ANF) in 2007. This study of over 4000 nurses highlighted that nurses recognise benefits to adopting more information technology in the workplace although there are significant barriers to their use. It also identified gross deficits in the capacity of the nursing workforce to engage in the digital processing of information. Following the release of the study last year, the ANF commenced work on a number of key recommendations from the report in order to overcome identified barriers and provide opportunities for nurses to better utilise information technology and information management systems. One of these recommendations was to seek research funding to develop national information technology and information management competency standards for nurses. This project has now received Federal Government funding to undertake this development. This project is being developed in collaboration with the ANF and the Queensland University of Technology. This paper will discuss the methodology, development and publication of the Australian Nursing Informatics Competency Standards Project which is currently underway and due for completion in May 2009. The Australian Nursing Informatics Competencies will be presented at the conference.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With the advancement of Service-Oriented Architecture in the technical and business domain, the management & engineering of services requires a thorough and systematic understanding of the service lifecycle for both business and software services. However, while service-oriented approaches acknowledge the importance of the service ecosystem, service lifecycle models are typically internally focused, paying limited attention to processes related to offering services to or using services from other actors. In this paper, we address this need by discussing the relations between a comprehensive service lifecycle approach for service management & engineering and the sourcing & purchasing of services. In particular we pay attention to the similarities and differences between sourcing business and software services, the alignment between service management & engineering and sourcing & purchasing, the role of sourcing in the transformation of an organization towards a service-oriented paradigm, the role of architectural approaches to sourcing in this transformation, and the sourcing of specific services at different levels of granularity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

• For the purposes of this chapter, “health law” encapsulates regulation of the medical and health professions, the administration of health services and the maintenance of public health to the extent that it is connected to the provision of health services. • There are diverging views as to whether health law can be regarded as a discrete “area of law”. • Health law draws on other areas of law such as tort law, criminal law and family law. It is also draws upon other disciplines, most notably medical and health ethics. • Social and economic forces have influenced the development and direction of health law, and these forces may become even more influential as the century develops. • The increasingly globalised world has implications for Australia’s health systems and raises questions and creates commitments in respect of the international community. • Technological developments, including in respect of treatment, diagnosis and information management, create ongoing challenges for health law. • Patient rights, human rights and consumerism are increasingly key drivers in the development of health law. • Health law is significant to contemporary Australian society because of the gravity of the topics that fall within its ambit, its social relevance to so many aspects of human existence and endeavour, the important role it plays in protecting the vulnerable, and the extent to which it engages with fundamental principles of justice.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The advent of data breach notification laws in the United States (US) has unearthed a significant problem involving the mismanagement of personal information by a range of public and private sector organisations. At present, there is currently no statutory obligation under Australian law requiring public or private sector organisations to report a data breach of personal information to law enforcement agencies or affected persons. However, following a comprehensive review of Australian privacy law, the Australian Law Reform Commission (ALRC) has recommended the introduction of a mandatory data breach notification scheme. The issue of data breach notification has ignited fierce debate amongst stakeholders, especially larger private sector entities. The purpose of this article is to document the perspectives of key industry and government representatives to identify their standpoints regarding an appropriate regulatory approach to data breach notification in Australia.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Public and private sector organisations are now able to capture and utilise data on a vast scale, thus heightening the importance of adequate measures for protecting unauthorised disclosure of personal information. In this respect, data breach notification has emerged as an issue of increasing importance throughout the world. It has been the subject of law reform in the United States and in other jurisdictions. This article reviews US, Australian and EU legal developments regarding the mandatory notification of data breaches. The authors highlight areas of concern based on the extant US experience that require further consideration in Australia and in the EU.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Ideas of 'how we learn' in formal academic settings have changed markedly in recent decades. The primary position that universities once held on shaping what constitutes learning has come into question from a range of experience-led and situated learning models. Drawing on findings from a study conducted across three Australian universities, the article focuses on the multifarious learning experiences indicative of practice-based learning exchanges such as student placements. Building on both experiential and situated learning theories, the authors found that students can experience transformative and emotional elucidations of learning, that can challenge tacit assumptions and transform the ways they understand the world. It was found that all participants (hosts, students, academics) both teach and learn in these educative scenarios and that, contrary to common (mis)perceptions that academics live in 'ivory towers', they play a crucial role in contributing to learning that takes place in the so-called 'real world'.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Consumer personal information is now a valuable commodity for most corporations. Concomitant with increased value is the expansion of new legal obligations to protect personal information. Mandatory data breach notification laws are an important new development in this regard. Such laws require a corporation that has suffered a data breach, which involves personal information, such as a computer hacking incident, to notify those persons who may have been affected by the breach. Regulators may also need to be notified. Australia currently does not have a mandatory data breach notification law but this may be about to change. The Australian Law Reform Commission has suggested that a data breach notification scheme be implemented through the Privacy Act 1988 (Cth). However, the notification of data breaches may already be required under the continuous disclosure regime stipulated by the Corporations Act 2001 (Cth) and the Australian Stock Exchange (ASX) Listing Rules. Accordingly, this article examines whether the notification of data breaches is a statutory requirement of the existing continuous disclosure regime and whether the ASX should therefore be notified of such incidents.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mandatory data breach notification has become a matter of increasing concern for law reformers. In Australia, this issue was recently addressed as part of a comprehensive review of privacy law conducted by the Australian Law Reform Commission (ALRC) which recommended a uniform national regime for protecting personal information applicable to both the public and private sectors. As in all federal systems, the distribution of powers between central and state governments poses problems for national consistency. In the authors’ view, a uniform approach to mandatory data breach notification has greater merit than a ‘jurisdiction specific’ approach epitomized by US state-based laws. The US response has given rise to unnecessary overlaps and inefficiencies as demonstrated by a review of different notification triggers and encryption safe harbors. Reviewing the US response, the authors conclude that a uniform approach to data breach notification is inherently more efficient.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Despite recent public attention to e-health as a solution to rising healthcare costs and an ageingpopulation, there have been relatively few studies examining the geographical pattern of e-health usage. This paper argues for an equitable approach to e-health and attention to the way in which e-health initiatives can produce locational health inequalities, particularly in socioeconomically disadvantaged areas. In this paper, we use a case study to demonstrate geographical variation in Internet accessibility, Internet status and prevalence of chronic diseases within a small district. There are signifi cant disparities in access to health information within socioeconomically disadvantaged areas. The most vulnerable people in these areas are likely to have limited availability of, or access to Internet healthcare resources. They are also more likely to have complex chronic diseases and, therefore, be in greatest need of these resources. This case study demonstrates the importance of an equitable approach to e-health information technologies and telecommunications infrastructure.