822 resultados para Consumerization of IT
Resumo:
While the productive relationship between praxis and feminist research has been well established, the situation is more complicated for female artist/researchers in the fraught field of creative practice-led research. Firstly, their research is being conducted in the context of ongoing debate, as Andrea Phillips has summarized, over whether practice-led research has been embraced in order to potentially produce emancipatory knowledge, or whether it is simply the rationalization and quantification of creative processes. Secondly, there is a pervasive paradox whereby, rather than feeling empowered by the process of critical and reflective self-analysis, many women are inhibited by enduring insecurities about the value of their work and/or their ownership of it. The reasons for this appear to be twofold: they are disheartened by the ongoing disproportion of successful women artists, and they are intimidated by the fundamentally masculine discourse surrounding research in the university. Many of these anxieties appear to have been exacerbated by the research quality assessment process, the Excellence in Research for Australia Initiative (ERA). This collaborative paper draws on the authors' experiences as both artist-researchers and educators to contextualize this paradox and also discuss what forms of praxis intervention may be useful in the preparation for, and supervision of, creative practice-led research by women.
Resumo:
Executive Summary The Australian Psychological Society categorically condemns the practice of detaining child asylum seekers and their families, on the grounds that it is not commensurate with psychological best practice concerning children’s development and mental health and wellbeing. Detention of children in this fashion is also arguably a violation of the UN Convention on the Rights of the Child. A thorough review of relevant psychological theory and available research findings from international research has led the Australian Psychological Society to conclude that: • Detention is a negative socialisation experience. • Detention is accentuates developmental risks. • Detention threatens the bonds between children and significant caregivers. • Detention limits educational opportunities. • Detention has traumatic impacts on children of asylum seekers. • Detention reduces children’s potential to recover from trauma. • Detention exacerbates the impacts of other traumas. • Detention of children from these families in many respects is worse for them than being imprisoned. In the absence of any indication from the Australian Government that it intends in the near future to alter the practice of holding children in immigration detention, the Australian Psychological Society’s intermediate position is that the facilitation of short-term and long-term psychological development and wellbeing of children is the basic tenet upon which detention centres should be audited and judged. Based on that position, the Society has identified a series of questions and concerns that arise directly from the various psychological perspectives that have been brought to bear on estimating the effects of detention on child asylum seekers. The Society argues that, because these questions and concerns relate specifically to improvement and maintenance of child detainees’ educational, social and psychological wellbeing, they are legitimate matters for the Inquiry to consider and investigate. • What steps are currently being taken to monitor the psyc hological welfare of the children in detention? In particular, what steps are being taken to monitor the psychological wellbeing of children arriving from war-torn countries? • What qualifications and training do staff who care for children and their families in detention centres have? What knowledge do they have of psychological issues faced by people who have been subjected to traumatic experiences and are suffering high degrees of anxiety, stress and uncertainty? • What provisions have been made for psycho-educational assessment of children’s specific learning needs prior to their attending formal educational programmes? • who are suffering chronic and/or vicarious trauma as a result of witnessing threatening behaviour whilst in detention? • What provisions have been made for families who have been seriously affected by displacement to participate in family therapy? • What critical incident debriefing procedures are in place for children who have witnessed their parents, other family members, or social acquaintances engaging in acts of self-harm or being harmed while in detention? What psychotherapeutic support is in place for children who themselves have been harmed or have engaged in self- harmful acts while in detention? • What provisions are in place for parenting programmes that provide support for parents of children under extremely difficult psychological and physical circumstances? • What efforts are being made to provide parents with the opportunity to model traditional family roles for children, such as working to earn an income, meal preparation, other household duties, etc.? • What opportunities are in place for the assessment of safety issues such as bullying, and sexual or physical abuse of children or their mothers in detention centres? • How are resources distributed to children and families in detention centres? • What socialization opportunities are available either within detention centres or in the wider community for children to develop skills and independence, engage in social activities, participate in cultural traditions, and communicate and interaction with same-age peers and adults from similar ethnic and religious backgrounds? • What access do children and families have to videos, music and entertainment from their cultures of origin? • What provisions are in place to ensure the maintenance of privacy in a manner commensurate with usual cultural practice? • What is the Government’s rationale for continuing to implement a policy of mandatory detention of child asylum seekers that on the face of it is likely to have a pernicious impact on these children’s mental health? • In view of the evidence on the potential long-term impact of mandatory detention on children, what processes may be followed by Government to avoid such a practice and, more importantly, to develop policies and practices that will have a positive impact on these children’s psychological development and mental health?
Resumo:
Purpose - Researchers debate whether tacit knowledge sharing through Information Technology (IT) is actually possible. However, with the advent of social web tools, it has been argued that most shortcomings of tacit knowledge sharing are likely to disappear. This paper has two purposes: firstly, to demonstrate the existing debates in the literature regarding tacit knowledge sharing using IT, and secondly, to identify key research gaps that lay the foundations for future research into tacit knowledge sharing using social web. Design/methodology/approach - This paper reviews current literature on IT-mediated tacit knowledge sharing and opens a discussion on tacit knowledge sharing through the use of social web. Findings - First, the existing schools of thoughts in regards to IT ability for tacit knowledge sharing are introduced. Next, difficulties of sharing tacit knowledge through the use of IT are discussed. Then, potentials and pitfalls of social web tools are presented. Finally, the paper concludes that whilst there are significant theoretical arguments supporting that the social web facilitates tacit knowledge sharing there is a lack of empirical evidence to support these arguments and further work is required. Research limitations/implications - The limitations of the review includes: covering only papers that were published in English, issues of access to full texts of some resources, possibility of missing some resources due to search strings used or limited coverage of databases searched. Originality/value - The paper contributes to the fast growing literature on the intersection of KM and IT particularly by focusing on tacit knowledge sharing in social media space. The paper highlights the need for further studies in this area by discussing the current situation in the literature and disclosing the emerging questions and gaps for future studies.
Resumo:
Enterprise Systems (ES) provide standardized, off-theshelf support for operations and management within organizations. With the advent of ES based on a serviceoriented architecture (SOA) and an increasing demand of IT-supported interorganizational collaboration, implementation projects face paradigmatically new challenges. The configuration of ES is costly and error-prone. Dependencies between business processes and business documents are hardly explicit and foster component proliferation instead of reuse. Configurative modeling can support the problem in two ways: First, conceptual modeling abstracts from technical details and provides more intuitive access and overview. Second, configuration allows the projection of variants from master models providing manageable variants with controlled flexibility. We aim at tackling the problem by proposing an integrated model-based framework for configuring both, processes and business documents, on an equal basis; as together, they constitute the core business components of an ES.
Resumo:
The ABC’s 50-year TV partnership with the BBC is at breaking point after a landmark deal between the British broadcaster and pay TV provider Foxtel was announced in April 2013. Under the new deal Foxtel will host a new BBC channel that will screen first-run, “fast-tracked” British programming, meaning ABC viewers will no longer have free-to-air access to popular shows such as Silent Witness and The Thick of It. The deal between Foxtel and the BBC’s commercial arm, BBC Worldwide, has major implications not only for the two partners, but also for the ABC and potentially for Australian screen content.
Resumo:
The current global economic instability and the vulnerability of small island nations are providing the impetus for greater integration between the countries of the South Pacific region. This exercise is critical for their survival in today’s turbulent economic environment. Past efforts of regional integration in the South Pacific have not been very successful. Reasons attributed to this outcome include issues related to damage of sovereignty, and lack of a shared integration infrastructure. Today, the IT resources with collaborative capacities provide the opportunity to develop a shared IT infrastructure to facilitate integration in the South Pacific. In an attempt to develop a model of regional integration with an IT-backed infrastructure, we identify and report on the antecedents of the current stage of regional integration, and the stakeholders’ perceived benefits of an IT resources backed regional integration in the South Pacific. Employing a case study based approach, the study finds that while most stakeholders were positive about the potential of IT-backed regional integration, significant challenges exist that hinder the realisation of this model. The study finds that facilitating IT-backed regional integration requires enabling IT infrastructure, equitable IT development in the region, greater awareness on the potential of the modern IT resources, market liberalisation of the information and telecommunications sector and greater political support for IT initiatives.
Resumo:
The denial of civil rights to convicts has a long history. Its origins lie in the idea of ‘civil death’. Convicts who were not punished by execution would instead suffer civil death which stripped them of inheritance, family and political rights (Davidson, 2004). In Australia and internationally the removal of prisoners’ voting rights has been a controversial topic which has been a subject of much debate and a number of legislation changes (Davidson, 2004). This article argues that even though the latest amendment to the Australian Electoral legislation is, on the face of it, democratic and inclusive, it is in fact a denial of prisoners’ civil rights, which has its roots in the concept of civil death. My argument is in keeping with the themes of the Crime and Governance thematic group and focuses on my research interests in sociology of deviance, social reactions to crime, and socio-legal topics.
Resumo:
Structural Dynamics is the study of the response of structures to dynamic or time varying loads. This topic has emerged to be one of importance to all structural engineers due to three important issues with structural engineering in the new millennium. These are: (1) vibration and problems in slender structures that have emerged due to new material technology and aesthetic requirements, (ii) ageing structures such as bridges whoese health needs to be monitored and appropriate retrofitting carried out to prevent failure and (iii) increased vulnerability of structures to random loads such as seismic, impact and blast loads. Knowledge of structural dynamics is necessary to address these issues and their consequences. During the past two decades, research in structural dynamics has generated considerable amount of new information to address these issues. This new knowledge is not readily made available to practicing engineers and very little or none of it enters the classrooms. There is no universal emphasis on including structural dynamics and their recently generated new knowledge into the civil/structural curriculum. This paper argues for the need to include structural dynamics into the syllabus of all civil engineering courses especially those having a first or second major in structural engineering. This will enable our future structural engineers to design and maintain safe and efficient structures.
Resumo:
Asking why is an important foundation of inquiry and fundamental to the development of reasoning skills and learning. Despite this, and despite the relentless and often disruptive nature of innovations in information and communications technology (ICT), sophisticated tools that directly support this basic act of learning appear to be undeveloped, not yet recognized, or in the very early stages of development. Why is this so? To this question, there is no single satisfactory answer; instead, numerous plausible explanations and related questions arise. After learning something, however, explaining why can be revealing of a person’s understanding (or lack of it). What then differentiates explanation from information; and, explanatory from descriptive content? What ICT scaffolding might support inquiry instigated by why-questioning? What is the role of reflective practice in inquiry-based learning? These and other questions have emerged from this investigation and underscore that why-questions often propagate further questions and are a catalyst for cognitive engagement and dialogue. This paper reports on a multi-disciplinary, theoretical investigation that informs the broad discourse on e-learning and points to a specific frontier for design and development of e-learning tools. Probing why reveals that versatile and ambiguous semantics present the core challenge – asking, learning, knowing, understanding, and explaining why.
Resumo:
In the space of the past decade, the technologies, business models, everyday uses and public understandings of social media have co-evolved rapidly. In the early to mid 2000s, websites like MySpace, Facebook or Twitter were garnering interest in both the press and academia as places for amateur creativity, political subversion or trivial time-wasting on the behalf of subcultures of geeks or ‘digital natives’, but such websites were not seen as legitimate, mainstream media organisations, nor were they generally understood as respectable places for professionals (other than new media professionals) to conduct business. By late 2011, online marketing company Comscore was reporting that social networking was “the most popular online activity worldwide accounting for nearly 1 in every 5 minutes spent online”, reaching 82 percent of the world’s Internet population, or 1.2 billion users (Comscore, 2011). Today, social media is firmly established as an industry sector in its own right, and is deeply entangled with and embedded in the practices and everyday lives of media professionals, celebrities and ordinary users. We might now think of it as an embedded communications infrastructure extending across culture, society and the economy – ranging from local government Facebook pages alerting us to kerbside collection, to Tumblr blogs providing humorous cultural commentary by curating animated .gifs, to Telstra Twitter accounts responding to user requests for tech help, and to Yelp reviews helping us find somewhere to grab dinner in a strange town. As well as at least appearing to be near-ubiquitous, social media is increasingly seen as highly significant by scholars researching issues as diverse as journalistic practice (Hermida, 2012), the coordination of government and community responses to natural disasters (Bruns & Burgess, 2012), and the activities of global social and political protest movements (Howard & Hussain, 2013)...
Resumo:
There is no doubt that social engineering plays a vital role in compromising most security defenses, and in attacks on people, organizations, companies, or even governments. It is the art of deceiving and tricking people to reveal critical information or to perform an action that benefits the attacker in some way. Fraudulent and deceptive people have been using social engineering traps and tactics using information technology such as e-mails, social networks, web sites, and applications to trick victims into obeying them, accepting threats, and falling victim to various crimes and attacks such as phishing, sexual abuse, financial abuse, identity theft, impersonation, physical crime, and many other forms of attack. Although organizations, researchers, practitioners, and lawyers recognize the severe risk of social engineering-based threats, there is a severe lack of understanding and controlling of such threats. One side of the problem is perhaps the unclear concept of social engineering as well as the complexity of understand human behaviors in behaving toward, approaching, accepting, and failing to recognize threats or the deception behind them. The aim of this paper is to explain the definition of social engineering based on the related theories of the many related disciplines such as psychology, sociology, information technology, marketing, and behaviourism. We hope, by this work, to help researchers, practitioners, lawyers, and other decision makers to get a fuller picture of social engineering and, therefore, to open new directions of collaboration toward detecting and controlling it.
Resumo:
The purpose of this paper is to empirically examine the state of cloud computing adoption in Australia. I specifically focus on the drivers, risks, and benefits of cloud computing from the perspective of IT experts and forensic accountants. I use thematic analysis of interview data to answer the research questions of the study. The findings suggest that cloud computing is increasingly gaining foothold in many sectors due to its advantages such as flexibility and the speed of deployment. However, security remains an issue and therefore its adoption is likely to be selective and phased. Of particular concern are the involvement of third parties and foreign jurisdictions, which in the event of damage may complicate litigation and forensic investigations. This is one of the first empirical studies that reports on cloud computing adoption and experiences in Australia.
Resumo:
Newman and Nelson (2012) describe three ‘dances’ to explain the vacillating psychological states of trauma survivors: the dance of approach and avoidance; the dance of fragmentation and integration; and the dance of resilience and vulnerability. The first pair of seemingly opposite responses describes how survivors at times cope by ‘approaching’ the trauma, for example by gathering information about what happened; whilst at other times, the same person will cope by ‘avoiding’ the trauma by engaging in activities which distract them from the memory of the trauma or having to deal with the consequences of it. The ‘dance’ of fragmentation and integration describes the opposing individual or group experiences encountered after traumas or disasters. Individuals may experience fragmentation, or emotional disconnection, from the trauma as an adaptive means of survival. The ‘dance’ of resilience and vulnerability refers to an individual’s ability to ‘process’ trauma and return to a resilient state in which they re-learn to trust people and the world around them and ‘bounce back’ to a state of being resilient again. This paper will illustrate how an understanding of the three dances can be used to enable survivors of child sexual assault to engage with the media to tell their stories. I will give current examples from six months of journalism research, collaboration and writing of a series of news stories and features which broke an exclusive story simultaneously in The Australian and The Times in London during 2013.
Resumo:
Information technology (IT) plays a critical role of enabler of activities that improve the performance of business processes. This enabling role of IT resources means continuous investment in IT is a strategic necessity. It is established that organizations’ IT-related capabilities leverage the enabling potential of IT resources. Today’s turbulent and challenging business environment requires organizations to do more from their existing and newly acquired IT resources. To achieve this, organizations need to discover ways or establish environments to nourish their existing IT-related capabilities, and develop new IT-related capabilities. We suggest one such environment, a dynamic IT-learning environment that could contribute to nourishing existing IT-related capabilities, and developing new IT-related capabilities. This environment is a product of coordination of four organizational factors that relate to the ways in which IT-related knowledge is applied to business processes, the accompanying reward structures, and ways in which the IT-related learning and knowledge is shared within the organization. Using 216 field survey responses, this paper shows that two IT-related capabilities of top management commitment to IT initiatives, and shared organizational knowledge between the IT and business unit managers has a stronger positive influence on business process performance in the presence of this dynamic IT-learning environment. The study also shows that a marginal IT-related capability, technical IT skills, has a positive and significant influence on business process performance in the presence of this environment. These outcomes imply that organizations’ internal environments could contribute to the management of their IT-related capabilities.