873 resultados para security management


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The trend of diminished funding, demands for greater efficiency and higher public accountability have led to a rapid expansion of interest in the bibliometric assessment of research performance of universities. A pilot research is conducted to provide a preliminary overview of the research performance of the building and construction schools or departments through the analysis of bibliometric indicators including the journal impact factor (JIF) published by Institute for Scientific Information (ISI). The suitability of bibliometric evaluation approaches as a measure of research quality in building and construction management research field is discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The increasing scarcity of water in the world, along with rapid population increase in urban areas, gives reason for concern and highlights the need for integrating water and wastewater management practices. The uncontrolled growth in urban areas has made planning, management and expansion of water and wastewater infrastructure systems very difficult and expensive. In order to achieve sustainable wastewater treatment and promote the conservation of water and nutrient resources, this chapter advocates the need for a closed-loop treatment system approach, and the transformation of the traditional linear treatment systems into integrated cyclical treatment systems. The recent increased understanding of integrated resource management and a shift towards sustainable management and planning of water and wastewater infrastructure are also discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Australia, road crash trauma costs the nation A$15 billion annually whilst the US estimates an economic impact of around US$ 230 billion on its network. Worldwide economic cost of road crashes is estimated to be around US$ 518 billion each year. Road accidents occur due to a number of factors including driver behaviour, geometric alignment, vehicle characteristics, environmental impacts, and the type and condition of the road surfacing. Skid resistance is considered one of the most important road surface characteristics because it has a direct effect on traffic safety. In 2005, Austroads (the Association of Australian and New Zealand Road Transport and Traffic Authorities) published a guideline for the management of skid resistance and Queensland Department of Main Roads (QDMR) developed a skid resistance management plan (SRMP). The current QDMR strategy is based on rationale analytical methodology supported by field inspection with related asset management decision tools. The Austroads’s guideline and QDMR's skid resistance management plan have prompted QDMR to review its skid resistance management practice. As a result, a joint research project involving QDMR, Queensland University of Technology (QUT) and the Corporative Research Centre for Integrated Engineering Asset Management (CRC CIEAM) was formed. The research project aims at investigating whether there is significant relationship between road crashes and skid resistance on Queensland’s road networks. If there is, the current skid resistance management practice of QDMR will be reviewed and appropriate skid resistance investigatory levels will be recommended. This paper presents analysis results in assessing the relationship between wet crashes and skid resistance on Queensland roads. Attributes considered in the analysis include surface types, annual average daily traffic (AADT), speed and seal age.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many infrastructure and necessity systems such as electricity and telecommunication in Europe and the Northern America were used to be operated as monopolies, if not state-owned. However, they have now been disintegrated into a group of smaller companies managed by different stakeholders. Railways are no exceptions. Since the early 1980s, there have been reforms in the shape of restructuring of the national railways in different parts of the world. Continuous refinements are still conducted to allow better utilisation of railway resources and quality of service. There has been a growing interest for the industry to understand the impacts of these reforms on the operation efficiency and constraints. A number of post-evaluations have been conducted by analysing the performance of the stakeholders on their profits (Crompton and Jupe 2003), quality of train service (Shaw 2001) and engineering operations (Watson 2001). Results from these studies are valuable for future improvement in the system, followed by a new cycle of post-evaluations. However, direct implementation of these changes is often costly and the consequences take a long period of time (e.g. years) to surface. With the advance of fast computing technologies, computer simulation is a cost-effective means to evaluate a hypothetical change in a system prior to actual implementation. For example, simulation suites have been developed to study a variety of traffic control strategies according to sophisticated models of train dynamics, traction and power systems (Goodman, Siu and Ho 1998, Ho and Yeung 2001). Unfortunately, under the restructured railway environment, it is by no means easy to model the complex behaviour of the stakeholders and the interactions between them. Multi-agent system (MAS) is a recently developed modelling technique which may be useful in assisting the railway industry to conduct simulations on the restructured railway system. In MAS, a real-world entity is modelled as a software agent that is autonomous, reactive to changes, able to initiate proactive actions and social communicative acts. It has been applied in the areas of supply-chain management processes (García-Flores, Wang and Goltz 2000, Jennings et al. 2000a, b) and e-commerce activities (Au, Ngai and Parameswaran 2003, Liu and You 2003), in which the objectives and behaviour of the buyers and sellers are captured by software agents. It is therefore beneficial to investigate the suitability or feasibility of applying agent modelling in railways and the extent to which it might help in developing better resource management strategies. This paper sets out to examine the benefits of using MAS to model the resource management process in railways. Section 2 first describes the business environment after the railway 2 Modelling issues on the railway resource management process using MAS reforms. Then the problems emerge from the restructuring process are identified in section 3. Section 4 describes the realisation of a MAS for railway resource management under the restructured scheme and the feasible studies expected from the model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The term “cloud computing” has emerged as a major ICT trend and has been acknowledged by respected industry survey organizations as a key technology and market development theme for the industry and ICT users in 2010. However, one of the major challenges that faces the cloud computing concept and its global acceptance is how to secure and protect the data and processes that are the property of the user. The security of the cloud computing environment is a new research area requiring further development by both the academic and industrial research communities. Today, there are many diverse and uncoordinated efforts underway to address security issues in cloud computing and, especially, the identity management issues. This paper introduces an architecture for a new approach to necessary “mutual protection” in the cloud computing environment, based upon a concept of mutual trust and the specification of definable profiles in vector matrix form. The architecture aims to achieve better, more generic and flexible authentication, authorization and control, based on a concept of mutuality, within that cloud computing environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aim: This paper is a report of a study conducted to determine the effectiveness of a community case management collaborative education intervention in terms of satisfaction, learning and performance among public health nurses. Background: Previous evaluation studies of case management continuing professional education often failed to demonstrate effectiveness across a range of outcomes and had methodological weaknesses such as small convenience samples and lack of control groups. Method: A cluster randomised controlled trial was conducted between September 2005 and February 2006. Ten health centre clusters (5 control, 5 intervention) recruited 163 public health nurses in Taiwan to the trial. After pre-tests for baseline measurements, public health nurses in intervention centres received an educational intervention of four half-day workshops. Post-tests for both groups were conducted after the intervention. Two-way repeated measures analysis of variance was performed to evaluate the effect of the intervention on target outcomes. Results: A total of 161 participants completed the pre- and post-intervention measurements. This was almost a 99% response rate. Results revealed that 97% of those in the experimental group were satisfied with the programme. There were statistically significant differences between the two groups in knowledge (p = 0.001), confidence in case management skills (p = 0.001), preparedness for case manager role activities (p = 0.001), self-reported frequency in using skills (p = 0.001), and role activities (p = 0.004). Conclusion: Collaboration between academic and clinical nurses is an effective strategy to prepare nurses for rapidly-changing roles.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Organisations owning and managing infrastructure asset are constantly striving to obtain the greatest lifetime value from their infrastructure assets. Many such organisations have adopted the concept of “asset management” with the aim of improving the performance of their infrastructure assets. This paper evaluates the adoption of asset management to improve performance in the context of organisations managing infrastructure assets. Relevant previous research studies on main barriers to the adoption of asset management are reviewed. Analysis of these findings, together with deductive reasoning, leads to the development of the proposed improvement strategies. Three issues were identified as barrier to the advancement of the concept of asset management. They are (1) lack of recognition, (2) fragmentation; and (3) growing complexity. To overcome these issues, this paper suggests that the organisations manage infrastructure assets must (1) adopt a more strategic approach in the management of infrastructure assets, (2) develop a framework of strategic infrastructure asset management processes, and (3) identify the core capabilities needed in the management of infrastructure assets. This paper presents the direction for further research to advance the concept of asset management in the management of infrastructure asset.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Infrastructure organisations such as airport, seaport, rail and road are operating in an increasingly challenging business environment as a result of globalisation, privatisation and deregulation. These organisations must ensure that their main resource i.e. their infrastructure assets are well managed in order to support their business operations. Brisbane Airport is used as a case study to understand the challenges faced in the management of infrastructure assets as well as the approaches used to overcome them. The findings can be useful in helping asset managers to identify the resources they should seek to manipulate in order to make improvement to their activities and contribute to the overall performance of their organisation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Real-world business processes are resource-intensive. In work environments human resources usually multitask, both human and non-human resources are typically shared between tasks, and multiple resources are sometimes necessary to undertake a single task. However, current Business Process Management Systems focus on task-resource allocation in terms of individual human resources only and lack support for a full spectrum of resource classes (e.g., human or non-human, application or non-application, individual or teamwork, schedulable or unschedulable) that could contribute to tasks within a business process. In this paper we develop a conceptual data model of resources that takes into account the various resource classes and their interactions. The resulting conceptual resource model is validated using a real-life healthcare scenario.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Type unions, pointer variables and function pointers are a long standing source of subtle security bugs in C program code. Their use can lead to hard-to-diagnose crashes or exploitable vulnerabilities that allow an attacker to attain privileged access over classified data. This paper describes an automatable framework for detecting such weaknesses in C programs statically, where possible, and for generating assertions that will detect them dynamically, in other cases. Exclusively based on analysis of the source code, it identifies required assertions using a type inference system supported by a custom made symbol table. In our preliminary findings, our type system was able to infer the correct type of unions in different scopes, without manual code annotations or rewriting. Whenever an evaluation is not possible or is difficult to resolve, appropriate runtime assertions are formed and inserted into the source code. The approach is demonstrated via a prototype C analysis tool.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sustainable urban development and the liveability of a city are increasingly important issues in the context of land use planning and infrastructure management. In recent years, the promotion of sustainable urban development in Australia and overseas is facing various physical, socio-economic and environmental challenges. These challenges and problems arise from the lack of capability of local governments to accommodate the needs of the population and economy in a relatively short timeframe. The planning of economic growth and development is often dealt with separately and not included in the conventional land use planning process. There is also a sharp rise in the responsibilities and roles of local government for infrastructure planning and management. This increase in responsibilities means that local elected officials and urban planners have less time to prepare background information and make decisions. The Brisbane Urban Growth Model has proven initially successful in providing a dynamic platform to ensure timely and coordinated delivery of urban infrastructure. Most importantly, this model is the first step for local governments in moving toward a systematic approach to pursuing sustainable and effective urban infrastructure management.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Efficient and effective urban management systems for Ubiquitous Eco Cities require having intelligent and integrated management mechanisms. This integration includes bringing together economic, socio-cultural and urban development with a well orchestrated, transparent and open decision-making system and necessary infrastructure and technologies. In Ubiquitous Eco Cities telecommunication technologies play an important role in monitoring and managing activities via wired and wireless networks. Particularly, technology convergence creates new ways in which information and telecommunication technologies are used and formed the backbone of urban management. The 21st Century is an era where information has converged, in which people are able to access a variety of services, including internet and location based services, through multi-functional devices and provides new opportunities in the management of Ubiquitous Eco Cities. This chapter discusses developments in telecommunication infrastructure and trends in convergence technologies and their implications on the management of Ubiquitous Eco Cities

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Office building retrofit projects are increasingly more intensified as existing buildings are aging. At the same time, building owners and occupants are looking for environmentally sustainable products. These retrofit projects usually take place in center business district (CBDs) with on-site waste becoming one of the critical issues. Small and Medium Enterprises (SMEs) carry out most of the work in retrofit projects as subcontractors. Despite their large involvement, they often do not have adequate resources to deal with the specific technical challenges and project risks related to waste. Few research has been done on their performance of waste management operations. This paper identifies characteristics of on-site waste in office building retrofit projects. It examines the specific requirements for contractors to manage waste in the projects before exploring the existing performance of SMEs. By comparing requirements for SMEs and their potential areas for improvement, a framework is established for performance promotion of SMEs in on-site waste management of office building retrofit projects. The paper will raise the consciousness and commitment of SMEs as sub-contractors to waste management. It also explores ways of supporting SMEs for experience accumulation, performance promotion and project culture establishment towards effective and efficient on-site waste management in the growing sector of office building retrofit and upgrade.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Before making a security or privacy decision, Internet users should evaluate several security indicators in their browser, such as the use of HTTPS (indicated via the lock icon), the domain name of the site, and information from extended validation certificates. However, studies have shown that human subjects infrequently employ these indicators, relying on other indicators that can be spoofed and convey no cryptographic assurances. We identify four simple security indicators that accurately represent security properties of the connection and then examine 125 popular websites to determine if the sites' designs result in correctly displayed security indicators during login. In the vast majority of cases, at least some security indicators are absent or suboptimal. This suggests users are becoming habituated to ignoring recommended security indicators.