822 resultados para Consumerization of IT


Relevância:

80.00% 80.00%

Publicador:

Resumo:

This article explores new the realities of the permissions culture and “all rights reserved copyright” in the networked environment and poses the question: why is lending a copy of a book sharing but emailing a PDF of it piracy? It explores new approaches to publishing and distribution of books by highlighting two books in the Aduki Independent Press catalogue. It was modeled on a presentation delivered by Elliott Bledsoe at the Changing Climates in Arts Publishing forum run by Artlink and the Copyright Agency Limited in Adelaide, Australia on 9 May 2009 and in Sydney, Australia on 27 June 2009.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

It has been 150 years since the Queensland public service was established. This paper looks back over the successive civil and public service acts in Queensland from 1859 to 2009, to examine the why the acts were passed, the changing structure of the public sector and the political justifications for the changes. It will establish how much has changed and how much has stayed the same over 150 years. Discussions regarding the success of the public service acts will be approached from an accountability perspective and will work to determine how effective the legislation has been in creating an independent and efficient public sector. The paper will demonstrate that change has occurred but some of it has turned back on itself;proposals that were rejected in the past have reappeared as fresh ideas and innovations. Finally, the paper will make conclusions as to the progress or repetition of public sector legislation in Queensland.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

So much has been made over the crisis in English literature as field, as corpus, and as canon in recent years, that some of it undoubtedly has spilled over into English education. This has been the case in predominantly English-speaking Anglo-American and Commonwealth nations, as well as in those postcolonial states where English remains the medium of instruction and lingua franca of economic and cultural elites. Yet to attribute the pressures for change in pedagogic practice to academic paradigm shift per se would prop up the shaky axiom that English education is forever caught in some kind of perverse evolutionary time-lag, parasitic of university literary studies. I, too, believe that English education has reached a crucial moment in its history, but that this moment is contingent upon the changing demographics, cultural knowledges, and practices of economic globalization.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The attention paid by the British music press in 1976 to the release of The Saints first single “I’m Stranded” was the trigger for a commercial and academic interest in the Brisbane music scene which still has significant energy. In 2007, Brisbane was identifed by Billboard Magazine as a “hot spot” of independent music. A place to watch. Someone turned a torch on this town, had a quick look, moved on. But this town has always had music in it. Some of it made by me. So, I’m taking this connection of mine, and working it into a contextual historical analysis of the creative lives of Brisbane musicians. I will be interviewing a number of Brisbane musicians. These interviews have begun, and will continue to be be conducted in 2011/2012. I will ask questions and pursue memories that will encompass family, teenage years, siblings, the suburbs, the city, venues, television and radio; but then widen to welcome the river, the hills and mountains, foes and friends, beliefs and death. The wider research will be a contextual historical analysis of the creative lives of Brisbane musicians. It will explore the changing nature of their work practices over time and will consider the notion, among other factors, of ‘place’ in both their creative practice and their creative output. It will also examine how the presence of the practitioners and their work is seen to contribute to the cultural life of the city and the creative lives of its citizens into the future. This paper offers an analysis of this last notion: how does this city see its music-makers? In addition to the interviews, over 300 Brisbane musicians were surveyed in September 2009 as part of a QUT-initiated recorded music event (BIGJAM). Their responses will inform the production of this paper.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The studio-gameon event was supported by the Institute of the Creative Industries and Innovation and the Faculty of IT as part of the State Library of Queensland GAME ON exhibition (ex Barbican, UK) The studio produced a full game in six weeks. It was a curated event, a live web-based exhibition, a performance for the public and the team produced a digital / creative work which is available for download. The studio enabled a team of students to experience the pressures of a real game studio within the space of the precincts but also very much in the public eye. It was a physical hypothesis of the University's mantra - "for the real world" statement: Studio GameOn is an opportunity running alongside the GAME ON exhibition at the State Library of Queensland. The exhibition itself is open to the public from November 17th through to February 15th. The studio runs from January 5th to February 13th 2009. The Studio GameOn challenge? To put together a team of game developers and make a playable game in six weeks! The studio-game on team consists of a group of game developers in training - the team members are all students who are either half-way through or completing a qualification in game design and all its elements - we have designers, artists, programmers and productionteam members. We are also fortunate to have an Industry Board consisting of local Queensland Games professionals: John Passfield (Red Sprite Studios), Adrian Cook (WIldfire Studios) and Duncan Curtis and Marko Grgic (The 3 Blokes). We also invite the public to play with us - there is an ideas box both on-site at the State Library and a number of ways to communicate with us on this studio website.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This approach to sustainable design explores the possibility of creating an architectural design process which can iteratively produce optimised and sustainable design solutions. Driven by an evolution process based on genetic algorithms, the system allows the designer to “design the building design generator” rather than to “designs the building”. The design concept is abstracted into a digital design schema, which allows transfer of the human creative vision into the rational language of a computer. The schema is then elaborated into the use of genetic algorithms to evolve innovative, performative and sustainable design solutions. The prioritisation of the project’s constraints and the subsequent design solutions synthesised during design generation are expected to resolve most of the major conflicts in the evaluation and optimisation phases. Mosques are used as the example building typology to ground the research activity. The spatial organisations of various mosque typologies are graphically represented by adjacency constraints between spaces. Each configuration is represented by a planar graph which is then translated into a non-orthogonal dual graph and fed into the genetic algorithm system with fixed constraints and expected performance criteria set to govern evolution. The resultant Hierarchical Evolutionary Algorithmic Design System is developed by linking the evaluation process with environmental assessment tools to rank the candidate designs. The proposed system generates the concept, the seed, and the schema, and has environmental performance as one of the main criteria in driving optimisation.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This Chapter provides an overview of available corrent data measuring crime in Australia's States and Territories broken down into regions and localities The data is limited, has reliability problems and lots of gaps. Nevertheless when the data are analysed according to offence type (in particulary violence versus property offences) an interesting but complicated empirical picture emerges that departs from what most scholars and policy makes have commonly assumed about crime and rural communities - that there is not much of it! The chapter begins with an assessment of the uses and limitations of different ways of measuring crime for those interested in a spatialised analysis of crome dispersion in rural communities.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We review and discuss the literature on small firm growth with an intention to provide a useful vantage point for new research studies regarding this important phenomenon. We first discuss conceptual and methodological issues that represent critical choices for those who research growth and which make it challenging to compare results from previous studies. The substantial review of past research is organized into four sections representing two smaller and two larger literatures. The first of the latter focuses on internal and external drivers of small firm growth. Here we find that much has been learnt and that many valuable generalizations can be made. However, we also conclude that more research of the same kind is unlikely to yield much. While interactive and non-linear effects may be worth pursuing it is unlikely that any new and important growth drivers or strong, linear main effects would be found. The second large literature deals with organizational life-cycles or stages of development. While deservedly criticized for unwarranted determinism and weak empirics this type of approach addresses problems of high practical and also theoretical relevance, and should not be shunned by researchers. We argue that with a change in the fundamental assumptions and improved empirical design, research on the organizational and managerial consequences of growth is an important line of inquiry. With this, we overlap with one of the smaller literatures, namely studies focusing on the effects of growth. We argue that studies too often assume that growth equals success. We advocate instead the use of growth as an intermediary variable that influences more fundamental goals in ways that should be carefully examined rather than assumed. The second small literature distinguishes between different modes or forms of growth, including, e.g., organic vs. acquisition-based growth, and international expansion. We note that modes of growth is an important topic that has been under studied in the growth literature, whereas in other branches of research aspects of it may have been studied intensely, but not primarily from a growth perspective. In the final section we elaborate on ways forward for research on small firm growth. We point at rich opportunities for researchers who look beyond drivers of growth, where growth is viewed as a homogenous phenomenon assumed to unambiguously reflect success, and instead focus on growth as a process and a multi-dimensional phenomenon, as well as on how growth relates to more fundamental outcomes.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Computer profiling is the automated forensic examination of a computer system in order to provide a human investigator with a characterisation of the activities that have taken place on that system. As part of this process, the logical components of the computer system – components such as users, files and applications - are enumerated and the relationships between them discovered and reported. This information is enriched with traces of historical activity drawn from system logs and from evidence of events found in the computer file system. A potential problem with the use of such information is that some of it may be inconsistent and contradictory thus compromising its value. This work examines the impact of temporal inconsistency in such information and discusses two types of temporal inconsistency that may arise – inconsistency arising out of the normal errant behaviour of a computer system, and inconsistency arising out of deliberate tampering by a suspect – and techniques for dealing with inconsistencies of the latter kind. We examine the impact of deliberate tampering through experiments conducted with prototype computer profiling software. Based on the results of these experiments, we discuss techniques which can be employed in computer profiling to deal with such temporal inconsistencies.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Aim. This paper is a report of a review conducted to identify (a) best practice in information transfer from the emergency department for multi-trauma patients; (b) conduits and barriers to information transfer in trauma care and related settings; and (c) interventions that have an impact on information communication at handover and beyond. Background. Information transfer is integral to effective trauma care, and communication breakdown results in important challenges to this. However, evidence of adequacy of structures and processes to ensure transfer of patient information through the acute phase of trauma care is limited. Data sources. Papers were sourced from a search of 12 online databases and scanning references from relevant papers for 1990–2009. Review methods. The review was conducted according to the University of York’s Centre for Reviews and Dissemination guidelines. Studies were included if they concerned issues that influenced information transfer for patients in healthcare settings. Results. Forty-five research papers, four literature reviews and one policy statement were found to be relevant to parts of the topic, but not all of it. The main issues emerging concerned the impact of communication breakdown in some form, and included communication issues within trauma team processes, lack of structure and clarity during handovers including missing, irrelevant and inaccurate information, distractions and poorly documented care. Conclusion. Many factors influence information transfer but are poorly identified in relation to trauma care. The measurement of information transfer, which is integral to patient handover, has not been the focus of research to date. Nonetheless, documented patient information is considered evidence of care and a resource that affects continuing care.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Using GIS to evaluate travel behaviour is an important technique to increase our understanding of the relationship between accessibility and transport demand. In this paper, the activity space concept was used to identify the nature of participation in activities (or lack of it) amongst a group of students using a 2 day travel-activity diary. Three different indicators such as the number of unique locations visited, average daily distance travelled, and average daily activity duration were used to measure the size of activity spaces. These indicators reflect levels of accessibility, personal mobility, and the extent of participation respectively. Multiple regression analyses were used to assess the impacts of students socio-economic status and the spatial characteristics of home location. Although no differences were found in the levels of accessibility and the extent of participation measures, home location with respect to a demand responsive transport (DRT) service was found to be the most important determinant of their mobility patterns. Despite being able to travel longer distances, students who live outside of the DRT service area were found to be temporally excluded from some opportunities. Student activity spaces were also visualised within a GIS environment and a spatial analysis was conducted to underpin the evaluation of the performance of the DRT. This approach was also used to identify the activity spaces of individuals that are geographically excluded from the service. Evaluation of these results indicated that although the service currently covers areas of high demand, 90% of the activity spaces remained un-served by the DRT service. Using this data six new routes were designed to meet the coverage goal of public transport based on a measure of network impedance based on inverse activity density. Following assessment of public transport service coverage, the study was extended using a Spatial Multi Criteria Evaluation (SMCE) technique to assess the effect of service provision on patronage.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Previous studies exploring the incidence and readmission rates of cardiac patients admitted to a coronary care unit (CCU) with type 2 diabetes [1] have been undertaken by the first author. Interviews of these patients regarding their experiences in managing their everyday conditions [2] provided the basis for developing the initial cardiac–diabetes self-management programme (CDSMP) [3]. Findings from each of these previous studies highlighted the complexity of self-management for patients with both conditions and contributed to the creation of a new self-management programme, the CDSMP, based on Bandura’s (2004) self-efficacy theory [4]. From patient and staff feedback received for the CDSMP [3], it became evident that further revision of the programme was needed to improve self-management levels of patients and possibility of incorporating methods of information technology (IT). Little is known about the applicability of different methods of technology for delivering self-management programmes for patients with chronic diseases such as those with type 2 diabetes and cardiac conditions. Although there is some evidence supporting the benefits and the great potential of using IT in supporting self-management programmes, it is not strong, and further research on the use of IT in such programmes is recommended [5–7]. Therefore, this study was designed to pilot test feasibility of the CDSMP incorporating telephone and text-messaging as follow-up approaches.