848 resultados para Technology-based Companies
Resumo:
Based on the model of ‘The Smile of Value Creation' (Mudambi 2007) and the theory of concept marketing, this study aims to examine the top 20 Taiwanese environmental marks companies, and explore their circumstances, innovation patterns and value chain system in Taiwan. It found out all of them are information technology product and household appliances companies. In addition, they make special efforts in two parts of value creation: product (including basic and applied ‘R and D' (Research and Design), design, commercialization) and marketing (including advertising and brand management, specialized logistics, after-sales services). They also locate their branches depending on different stages of the value chain, and expand them globally.
Resumo:
US state-based data breach notification laws have unveiled serious corporate and government failures regarding the security of personal information. These laws require organisations to notify persons who may be affected by an unauthorized acquisition of their personal information. Safe harbours to notification exist if personal information is encrypted. Three types of safe harbour have been identified in the literature: exemptions, rebuttable presumptions and factors. The underlying assumption of exemptions is that encrypted personal information is secure and therefore unauthorized access does not pose a risk. However, the viability of this assumption is questionable when examined against data breaches involving encrypted information and the demanding practical requirements of effective encryption management. Recent recommendations by the Australian Law Reform Commission (ALRC) would amend the Privacy Act 1988 (Cth) to implement a data breach scheme that includes a different type of safe harbour, factor based analysis. The authors examine the potential capability of the ALRC’s proposed encryption safe harbour in relation to the US experience at the state legislature level.
Resumo:
Evidence-based practice is increasingly being recognised as an important issue in a range of professional contexts including education, nursing, occupational therapy and librarianship. Many of these professions have observed a relationship or interface between evidence-based practice and information literacy. Using a phenomenographic approach this research explores variation in the how library and information professionals are experiencing evidence-based practice as part of their professional work. The findings of the research provide a basis for arguing that evidence-based practice represents the professional's enactment of information literacy in the workplace.
Resumo:
This report presents the results of the largest study ever conducted into the law, policy and practice of primary school teachers’ reporting of child sexual abuse in New South Wales, Queensland and Western Australia. The study included the largest Australian survey of teachers about reporting sexual abuse, in both government and non-government schools (n=470). Our research has produced evidence-based findings to enhance law, policy and practice about teachers’ reporting of child sexual abuse. The major benefits of our findings and recommendations are to: • Show how the legislation in each State can be improved; • Show how the policies in government and non-government school sectors can be improved; and • Show how teacher training can be improved. These improvements can enhance the already valuable contribution that teachers are making to identify cases of child sexual abuse. Based on the findings of our research, this report proposes solutions to issues in seven key areas of law, policy and practice. These solutions are relevant for State Parliaments, government and non-government educational authorities, and child protection departments. The solutions in each State are practicable, low-cost, and align with current government policy approaches. Implementing these solutions will: • protect more children from sexual abuse; • save cost to governments and society; • develop a professional teacher workforce better equipped for their child protection role; and • protect government and school authorities from legal liability.
Resumo:
The application of near-infrared and infrared spectroscopy has been used for identification and distinction of basic Cu-sulphates that include devilline, chalcoalumite and caledonite. Near-infrared spectra of copper sulphate minerals confirm copper in divalent state. Jahn-Teller effect is more significant in chalcoalumite where 2B1g ® 2B2g transition band shows a larger splitting (490 cm-1) confirming more distorted octahedral coordination of Cu2+ ion. One symmetrical band at 5145 cm-1 with shoulder band 5715 cm-1 result from the absorbed molecular water in the copper complexes are the combinations of OH vibrations of H2O. One sharp band at around 3400 cm-1 in IR common to the three complexes is evidenced by Cu-OH vibrations. The strong absorptions observed at 1685 and 1620 cm-1 for water bending modes in two species confirm strong hydrogen bonding in devilline and chalcoalumite. The multiple bands in v3 and v4(SO4)2- stretching regions are attributed to the reduction of symmetry to the sulphate ion from Td to C2V. Chalcoalumite, the excellent IR absorber over the range 3800-500 cm-1 is treated as most efficient heat insulator among the Cu-sulphate complexes.
Resumo:
Piezoelectric polymers based on polyvinylidene flouride (PVDF) are of interest as adaptive materials for large aperture space-based telescopes. In this study, two piezoelectric polymers, PVDF and P(VDF-TrFE), were exposed to conditions simulating the thermal, radiative and atomic oxygen conditions of low Earth orbit. The degradation pathways were governed by a combination of chemical and physical degradation processes with the molecular changes primarily induced via radiative damage, and physical damage from temperature and atomic oxygen exposure, as evident from depoling, loss of orientation and surface erosion. The piezoelectric responsiveness of each polymer was strongly dependent on exposure temperature. Radiation and atomic oxygen exposure caused physical and chemical degradation, which would ultimately cause terminal damage of thin films, but did not adversely affect the piezoelectric properties.
Resumo:
The effects of simulated low earth orbit conditions on vinylidene-fluoride based thin-film piezoelectrics for use in lightweight, large surface area spacecraft such as telescope mirrors and antennae is presented. The environmental factors considered as having the greatest potential to cause damage are temperature, atomic oxygen and vacuum UV radiation. Using the piezoelectric strain coefficients and bimorph deflection measurements the piezoelectric performance over the temperature range -100 to +150°C was studied. The effects of simultaneous AO/VUV exposure were also examined and films characterized by their piezoelectric, surface, and thermal properties. Two fluorinated piezoelectric polymers, poly(vinylidene fluoride) and poly(vinylidene fluoride-co-trifluoroethylene), were adversely affected at elevated temperatures due to depoling caused by randomization of the dipole orientation, while AO/VUV contributed little to depoling but did cause significant surface erosion and, in the case of P(VDF-TrFE), bulk crosslinking. These results highlight the importance of materials selection for use in space environments.
Resumo:
Insight into the unique structure of hydrotalcites has been obtained using Raman spectroscopy. Gallium containing hydrotalcites of formula Mg4Ga2(CO3)(OH)12•4H2O (2:1 Ga-HT) to Mg8Ga2(CO3)(OH)20•4H2O (4:1 Ga-HT) have been successfully synthesised and characterized by X-ray diffraction and Raman spectroscopy. The d(003) spacing varied from 7.83 Å for the 2:1 hydrotalcite to 8.15 Å for the 3:1 gallium containing hydrotalcite. Raman spectroscopy complemented with selected infrared data has been used to characterise the synthesised gallium containing hydrotalcites of formula Mg6Ga2(CO3)(OH)16•4H2O. Raman bands observed at around 1046, 1048 and 1058 cm-1 were attributed to the symmetric stretching modes of the (CO32-) units. Multiple ν3 CO32- antisymmetric stretching modes are found at around 1346, 1378, 1446, 1464 and 1494 cm-1. The splitting of this mode indicates the carbonate anion is in a perturbed state. Raman bands observed at 710 and 717 cm-1 assigned to the ν4 (CO32-) modes support the concept of multiple carbonate species in the interlayer.
Resumo:
Purpose – One of the critical issues for change management, particularly in relation to the implementation of new technologies, is the existence of prior knowledge and established mental models which may hinder change efforts. Understanding unlearning and how it might assist during organizational change is a way to address this resistance. The purpose of this paper is to present research designed to identify specific factors that facilitate unlearning. Design/methodology/approach – Drawing together issues identified as potential influencers of unlearning, a survey questionnaire was developed and administered in an Australian corporation undergoing large-scale change due to the implementation of an enterprise information system. The results were analyzed to identify specific factors that impact on unlearning. Findings – Findings from this paper identify factors that hinder or help the unlearning process during times of change including understanding the need for change, the level of organizational support and training, assessment of the change, positive experience and informal support, the organization's history of change, individual's prior outlooks, and individuals' feelings and expectations. Research limitations/implications – The use of only one organization does not allow for comparisons between organizations of different sizes, cultures or industries and therefore extension of this research is recommended. Practical implications – For practitioners, this paper provides specific elements at both the level of individuals and the organization that need to be considered for optimal unlearning during times of change. Originality/value – Previous literature on unlearning has been predominantly conceptual and theoretical. These empirical findings serve to further an earlier model based on qualitative research into potential influencers of unlearning.
Resumo:
A decade ago, Queensland University of Technology (QUT) developed an innovative annual Courses Performance Report, but through incremental change, this report became quite labour-intensive. A new risk-based approach to course quality assurance, that consolidates voluminous data in a simple dashboard, responds to the changing context of the higher education sector. This paper will briefly describe QUT’s context and outline the second phase of implementation of this new approach to course quality assurance. The main components are: Individual Course Reports (ICRs), the Consolidated Courses Performance Report (CCPR), Underperforming Courses Status Update and the Strategic Faculty Courses Update (SFCU). These components together form a parsimonious and strategic annual cycle of reporting and place QUT in a positive position to respond to future sector change
Resumo:
The ad hoc networks are vulnerable to attacks due to distributed nature and lack of infrastructure. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. The clustering protocols can be taken as an additional advantage in these processing constrained networks to collaboratively detect intrusions with less power usage and minimal overhead. Existing clustering protocols are not suitable for intrusion detection purposes, because they are linked with the routes. The route establishment and route renewal affects the clusters and as a consequence, the processing and traffic overhead increases due to instability of clusters. The ad hoc networks are battery and power constraint, and therefore a trusted monitoring node should be available to detect and respond against intrusions in time. This can be achieved only if the clusters are stable for a long period of time. If the clusters are regularly changed due to routes, the intrusion detection will not prove to be effective. Therefore, a generalized clustering algorithm has been proposed that can run on top of any routing protocol and can monitor the intrusions constantly irrespective of the routes. The proposed simplified clustering scheme has been used to detect intrusions, resulting in high detection rates and low processing and memory overhead irrespective of the routes, connections, traffic types and mobility of nodes in the network. Clustering is also useful to detect intrusions collaboratively since an individual node can neither detect the malicious node alone nor it can take action against that node on its own.
Resumo:
Purpose – The purpose of this paper is to examine the buyer awareness and acceptance of environmental and energy efficiency measures in the New Zealand residential property markets. This study aims to provide a greater understanding of consumer behaviour in the residential property market in relation to green housing issues ---------- Design/methodology/approach – The paper is based on an extensive survey of Christchurch real estate offices and was designed to gather data on the factors that were considered important by buyers in the residential property market. The survey was designed to allow these factors to be analysed on a socio-economic basis and to compare buyer behaviour based on property values. ---------- Findings – The results show that regardless of income levels, buyers still consider that the most important factor in the house purchase decision is the location of the property and price. Although the awareness of green housing issues and energy efficiency in housing is growing in the residential property market, it is only a major consideration for young and older buyers in the high income brackets and is only of some importance for all other buyer sectors of the residential property market. Many of the voluntary measures introduced by Governments to improve the energy efficiency of residential housing are still not considered important by buyers, indicating that a more mandatory approach may have to be undertaken to improve energy efficiency in the established housing market, as these measures are not valued by the buyer. ---------- Originality/value – The paper confirms the variations in real estate buyer behaviour across the full range of residential property markets and the acceptance and awareness of green housing issues and measures. These results would be applicable to most established and transparent residential property markets.
Resumo:
Cloud computing is a latest new computing paradigm where applications, data and IT services are provided over the Internet. Cloud computing has become a main medium for Software as a Service (SaaS) providers to host their SaaS as it can provide the scalability a SaaS requires. The challenges in the composite SaaS placement process rely on several factors including the large size of the Cloud network, SaaS competing resource requirements, SaaS interactions between its components and SaaS interactions with its data components. However, existing applications’ placement methods in data centres are not concerned with the placement of the component’s data. In addition, a Cloud network is much larger than data center networks that have been discussed in existing studies. This paper proposes a penalty-based genetic algorithm (GA) to the composite SaaS placement problem in the Cloud. We believe this is the first attempt to the SaaS placement with its data in Cloud provider’s servers. Experimental results demonstrate the feasibility and the scalability of the GA.
Resumo:
TCP is a dominant protocol for consistent communication over the internet. It provides flow, congestion and error control mechanisms while using wired reliable networks. Its congestion control mechanism is not suitable for wireless links where data corruption and its lost rate are higher. The physical links are transparent from TCP that takes packet losses due to congestion only and initiates congestion handling mechanisms by reducing transmission speed. This results in wasting already limited available bandwidth on the wireless links. Therefore, there is no use to carry out research on increasing bandwidth of the wireless links until the available bandwidth is not optimally utilized. This paper proposed a hybrid scheme called TCP Detection and Recovery (TCP-DR) to distinguish congestion, corruption and mobility related losses and then instructs the data sending host to take appropriate action. Therefore, the link utilization is optimal while losses are either due to high bit error rate or mobility.
Resumo:
We describe the design and implementation of a public-key platform, secFleck, based on a commodity Trusted Platform Module (TPM) chip that extends the capability of a standard node. Unlike previous software public-key implementations this approach provides E- Commerce grade security; is computationally fast, energy efficient; and has low financial cost — all essential attributes for secure large-scale sen- sor networks. We describe the secFleck message security services such as confidentiality, authenticity and integrity, and present performance re- sults including computation time, energy consumption and cost. This is followed by examples, built on secFleck, of symmetric key management, secure RPC and secure software update.