927 resultados para Ethics of information


Relevância:

100.00% 100.00%

Publicador:

Resumo:

DUE TO COPYRIGHT RESTRICTIONS ONLY AVAILABLE FOR CONSULTATION AT ASTON UNIVERSITY LIBRARY AND INFORMATION SERVICES WITH PRIOR ARRANGEMENT

Relevância:

100.00% 100.00%

Publicador:

Resumo:

DUE TO COPYRIGHT RESTRICTIONS ONLY AVAILABLE FOR CONSULTATION AT ASTON UNIVERSITY LIBRARY AND INFORMATION SERVICES WITH PRIOR ARRANGEMENT

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Information and Communications Technology (ICT) is widely regarded as a key integration enabler in contemporary supply chain configurations. Furthermore, recent years have seen the vertical disintegration of supply chains as increasing numbers of manufacturers and retailers outsource significant parts of their supply chain functionality. In this environment, Third Party Logistics (3PL) providers - the majority of which are small companies - play a pivotal role. This raises important questions about the usage of ICT in this sector. However, there is a paucity of research in the field of small 3PLs with little empirical investigation into the usage of ICT by such firms. This paper presents the results of a survey on ICT systems usage in a sample of small Italian 3PLs. The results provide a technological profile of the surveyed companies, as well as an analysis of the role of ICT in customising services and of the factors influencing technology adoption.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper a possibility for quantitative measuring of information security of objects, exposed to information attacks and processed with methods of compression, is represented. A co-efficient of information security, which reflects the influence of the level of compression obtained after applying methods of compression to objects and the time, required by the attack to get access to the corresponding object, is proposed. Methods’ groups with the highest and respectively the lowest values of the co-efficient of information security for all methods’ groups in relation to all attacks’ groups are determined. Assessments and conclusions for future investigations are proposed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper a methodology for evaluation of information security of objects under attacks, processed by methods of compression, is represented. Two basic parameters for evaluation of information security of objects – TIME and SIZE – are chosen and the characteristics, which reflect on their evaluation, are analyzed and estimated. A co-efficient of information security of object is proposed as a mean of the coefficients of the parameter TIME and SIZE. From the simulation experiments which were carried out methods with the highest co-efficient of information security had been determined. Assessments and conclusions for future investigations are proposed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The compact and visualized documenting of information business modeling is a major prerequisite for comprehending its basic concepts, as well as for its effective application and improvement. The documenting of this process is related to its modeling. Thus, the process of information business modeling can be represented by its own tools. Being based on this thesis, the authors suggest an approach to representing the process of information business modeling. A profile for its documenting has been developed for the purpose.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article describes the approach, which allows to develop information systems without taking into consideration details of physical storage of the relational model and type database management system. Described in terms of graph model, this approach allows to construct several algorithms, for example, for verification application domain. This theory was introduced into operation testing as a part of CASE-system METAS.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The article proposes the model of management of information about program flow analysis for conducting computer experiments with program transformations. It considers the architecture and context of the flow analysis subsystem within the framework of Specialized Knowledge Bank on Program Transformations and describes the language for presenting flow analysis methods in the knowledge bank.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Unlike other works of art (painting, sculpture, etc.) a musical composition should be performed, it should sound to become accessible. Therefore, the role of the musical masterly performance is extremely important. But presently it has increased in importance when music through mass communication media i.e. radio, television, sound recording becomes in the full sense of the word the property of millions. Art in all its genres as a means of information helps to recreate a picture of one or other epoch as a whole. Moreover, art has a profound impact on education: it can be positive or negative, creative or destructive. Let us dwell on such aspect of music as means of information and the value of musical mastery activity for brining information to hearers of the alternating generations. Unlike other works of art (painting, sculpture etc.) a musical composition should be performed, it should sound to become intelligible. Therefore, the role of the musical masterly performance is extremely important. But presently it becomes particularly great in the XXI century when music becomes a true property of the masses due to mass media – radio, television, sound recording.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the paper we consider the structure of information dialogues. Our study is based on Estonian dialogue corpus which contains two kinds of dialogues – transcriptions of spoken conversations, and dialogues collected with the Wizard of Oz method. We are using two ways for describing the structure of dialogues – a typology of dialogue acts, and a system of communicative strategies. We depart from the notion of communicative strategy introduced by Kristiina Jokinen in her Constructive Dialogue Model. The analysis of our empirical material shows that people are using similar communicative strategies in telephone conversations and computer interactions. In the same time, the structure of human-human conversation is much more complicated.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The aim was to develop an archive containing detailed description of church bells. As an object of cultural heritage the bell has general properties such as geometric dimensions, weight, sound of each of the bells, the pitch of the tone as well as acoustical diagrams obtained using contemporary equipment. The audio, photo and video archive is developed by using advanced technologies for analysis, reservation and data protection.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

2000 Mathematics Subject Classification: 62P20, 91B42