822 resultados para Consumerization of IT
Resumo:
Indigenous Australians living in remote areas have little access to the Internet and make little use of it. This article investigates the various dimensions of Internet take-up in remote Indigenous communities in Australia and considers the implications for broadband policy. It focuses specifically on the circumstances and experiences of three remote Indigenous communities in central Australia. Residents in these communities provided significant insight into the social, economic and cultural aspects of communications access and use. This evidence is used to examine the drivers and barriers to home Internet for remote Indigenous communities and to discuss a complex set of issues, including: the dynamics of remote living, economic priorities, cultural engagement with technology, and the characteristics of domestic life in remote Indigenous communities.
Resumo:
Most urban dwelling Australians take secure and safe water supplies for granted. That is, they have an adequate quantity of water at a quality that can be used by people without harm from human and animal wastes, salinity and hardness or pollutants from agriculture and manufacturing industries. Australia wide urban and peri-urban dwellers use safe water for all domestic as well as industrial purposes. However, this is not the situation remote regions in Australia where availability and poor quality water can be a development constraint. Nor is it the case in Sri Lanka where people in rural regions are struggling to obtain a secure supply of water, irrespective of it being safe because of the impact of faecal and other contaminants. The purposes of this paper are to overview: the population and environmental health challenges arising from the lack of safe water in rural and remote communities; response pathways to address water quality issues; and the status of and need for integrated catchment management (ICM) in selected remote regions of Australia and vulnerable and lagging rural regions in Sri Lanka. Conclusions are drawn that focus on the opportunity for inter-regional collaborations between Australia and Sri Lanka for the delivery of safe water through ICM.
Resumo:
Enterprise Systems have been touted as a key driver of delivering benefits through innovation in corporate Information Systems. The advent of such systems expects to deliver best practices that improve organizational performance. Yet, most Enterprise System installations struggle to see lifecycle-wide value of it. Considering that Enterprise Systems deliver lifecycle-wide innovation; we observe organizational readiness for lifecycle-wide Enterprise Systems innovation. The A VICTORY apriori model compares contributions of eight constructs for organizational readiness for continuous Enterprise Systems innovation. The model is tested responses of both client and implementation partner. Results indicate that six of the eight constructs of readiness make significant contributions to organizational readiness for Enterprise Systems innovation.
Resumo:
The business value of information technology (IT) is increasingly being cocreated by multiple parties, opening opportunities for new research initiatives. Previous studies on IT value cocreation mainly focus on analyzing sources of cocreated IT value, yet inadequately accommodating the influence of competition relationships in IT value cocreation activities. To fill the gap, this in-progress paper suggests an agent-based modeling (also simulation) approach to investigating potential influences of the dynamic interplay between cooperation and competition relationships in IT value cocreation settings. In particular, the research proposes a high-level conceptual framework to position general IT value cocreation processes. A relational network view is offered, aiming at decomposing and systemizing several typical cooperation and competition scenarios in practical IT value cocreation settings. The application of a simulation approach to analytical insights and to theory building is illustrated.
Resumo:
Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs.
Resumo:
This book attempts to persuade a new generation of scholars, criminologists, activists, and policy makers sympathetic to the quest for global justice to open the envelope, to step out of their comfort zones and typical frames of analysis to gaze at a world full of injustice against the female sex, much of it systemic, linked to culture, custom and religion. In some instances the sources of these injustices intersect with those that produce global inequality, imperialism and racism. This book also investigates circumstances where the globalising forces cultivate male on male violence in the anomic spaces of supercapitalism – the border zones of Mexico and the United States, and the frontier mining communities in the Australian desert. However systemic gendered injustices, such as forced marriage of child female brides, sati the cremation of widows, genital cutting, honour crimes, rape and domestic violence against women, are forms of violence only experienced by the female sex. The book does not shirk away from female violence either. Carrington argues that if feminism wants to have a voice in the public, cultural, political and criminological debates about heightened, albeit often exaggerated, social concerns about growing female violence and engagement in terrorism, then new directions in theorising female violence are required. Feminist silences about the violent crimes, atrocities and acts of terrorism committed by the female sex leave anti-feminist explanations uncontested. This allows a discursive space for feminist backlash ideologues to flourish. This book contests those ideologies to offer counter explanations for the rise in female violence and female terrorism, in a global context where systemic gendered violence against women is alarming and entrenched. The world needs feminism to take hold across the globe, now more than ever.
Resumo:
Problem solving is an essential element of civil engineering education. It has been observed that students are best able to understand civil engineering theory when there is a practical application of it. Teaching theory alone has led to lower levels of comprehension and motivation and a correspondingly higher rate of failure and “drop-out”. This paper analyses the effectiveness of introducing practical design projects at an early stage within a civil engineering undergraduate program at Queensland University of Technology. In two of the essential basic subjects, Engineering Mechanics and Steel Structures, model projects which simulate realistic engineering exercises were introduced. Students were required to work in small groups to analyse, design and build the lightest / most efficient model bridges made of specific materials such as spaghetti, drinking straw, paddle pop sticks and balsa wood and steel columns for a given design loading/target capacity. The paper traces the success of the teaching strategy at each stage from its introduction through to the final student and staff evaluation.
Resumo:
This chapter is focussed on the various financial instruments and incentives that have been implemented in a range of countries to encourage sustainable developments in all property sectors. It is an area that has undergone substantial change globally since 2008. Sustainable property development has been impacted by the Global Financial Crisis, particularly with regards to the availability of private sector funding and the requirements of funders who now have a more cautious approach to risk. Sustainability, and sometimes a lack of it, is increasingly viewed as a risk in some markets; it is also seen as an area in which governments, through creation of markets and through the use of fiscal instruments can seek to speed up the pace at which the economics of sustainable development makes good business sense. However, it is not just governments that provide the incentive for sustainability- or the dis-incentive for non-sustainable behaviours.
Resumo:
Aboriginal protocol usually links the right to tell a story with a declaration of involvement or connection to the story. I am Aboriginal . . . I am a woman, daughter, sister, aunty and wife. I am also a mother to three beautiful children aged 6, 4 and 2 years. To my children at this point in their lives, I am their provider, nurturer, teacher, cook, taxi driver, mediator, stylist, Elder, slave, and expert on all there is to know in the world. Being the centre of the universe to three impressionable young minds is a role that I cherish deeply, and I take the responsibilities of it very seriously. I love the job of parenting. As any parent would agree, it is the most challenging and difficult job of all, but the opportunity to bring a life into the world and shape and mould a little person into a big person brings rewards that no career can.
Resumo:
The DeLone and McLean (D&M) model (2003) has been broadly used and generally recognised as a useful model for gauging the success of IS implementations. However, it is not without limitations. In this study, we evaluate a model that extends the D&M model and attempts to address some of it slimitations by providing a more complete measurement model of systems success. To that end, we augment the D&M (2003) model and include three variables: business value, institutional trust, and future readiness. We propose that the addition of these variables allows systems success to be assessed at both the systems level and the business level. Consequently, we develop a measurement model rather than a structural or predictive model of systems success.
Reactive reaching and grasping on a humanoid: Towards closing the action-perception loop on the iCub
Resumo:
We propose a system incorporating a tight integration between computer vision and robot control modules on a complex, high-DOF humanoid robot. Its functionality is showcased by having our iCub humanoid robot pick-up objects from a table in front of it. An important feature is that the system can avoid obstacles - other objects detected in the visual stream - while reaching for the intended target object. Our integration also allows for non-static environments, i.e. the reaching is adapted on-the-fly from the visual feedback received, e.g. when an obstacle is moved into the trajectory. Furthermore we show that this system can be used both in autonomous and tele-operation scenarios.
Resumo:
Boron carbide is produced in a heat resistance furnace using boric oxide and petroleum coke as the raw materials. The product yield is very low. Heat transfer plays an important role in the formation of boron carbide. Temperature at the core reaches up to 2600 K. No experimental study is available in the open literature for this high temperature process particularly in terms of temperature measurement and heat transfer. Therefore, a laboratory scale hot model of the process has been setup to measure the temperatures in harsh conditions at different locations in the furnace using various temperature measurement devices such as pyrometer and various types of thermocouple. Particular attention was paid towards the accuracy and reliability of the measured data. The recorded data were analysed to understand the heat transfer process inside the reactor and the effect of it on the formation of boron carbide.
Resumo:
A relay network with N relays and a single source-destination pair is called a partially-coherent relay channel (PCRC) if the destination has perfect channel state information (CSI) of all the channels and the relays have only the phase information of the source-to-relay channels. In this paper, first, a new set of necessary and sufficient conditions for a space-time block code (STBC) to be single-symbol decodable (SSD) for colocated multiple antenna communication is obtained. Then, this is extended to a set of necessary and sufficient conditions for a distributed STBC (DSTBC) to be SSD for. a PCRC. Using this, several SSD DSTBCs for PCRC are identified. It is proved that even if a SSD STBC for a co-located MIMO channel does not satisfy the additional conditions for the code to be SSD for a PCRC, single-symbol decoding of it in a PCRC gives full-diversity and only coding gain is lost. It is shown that when a DSTBC is SSD for a PCRC, then arbitrary coordinate interleaving of the in-phase and quadrature-phase components of the variables does not disturb its SSD property for PCRC. Finally, it is shown that the possibility of channel phase compensation operation at the relay nodes using partial CSI at the relays increases the possible rate of SSD DSTBCs from (2)/(N) when the relays do not have CSI to(1)/(2), which is independent of N.
Resumo:
This study examines both theoretically an empirically how well the theories of Norman Holland, David Bleich, Wolfgang Iser and Stanley Fish can explain readers' interpretations of literary texts. The theoretical analysis concentrates on their views on language from the point of view of Wittgenstein's Philosophical Investigations. This analysis shows that many of the assumptions related to language in these theories are problematic. The empirical data show that readers often form very similar interpretations. Thus the study challenges the common assumption that literary interpretations tend to be idiosyncratic. The empirical data consists of freely worded written answers to questions on three short stories. The interpretations were made by 27 Finnish university students. Some of the questions addressed issues that were discussed in large parts of the texts, some referred to issues that were mentioned only in passing or implied. The short stories were "The Witch à la Mode" by D. H. Lawrence, "Rain in the Heart" by Peter Taylor and "The Hitchhiking Game" by Milan Kundera. According to Fish, readers create both the formal features of a text and their interpretation of it according to an interpretive strategy. People who agree form an interpretive community. However, a typical answer usually contains ideas repeated by several readers as well as observations not mentioned by anyone else. Therefore it is very difficult to determine which readers belong to the same interpretive community. Moreover, readers with opposing opinions often seem to pay attention to the same textual features and even acknowledge the possibility of an opposing interpretation; therefore they do not seem to create the formal features of the text in different ways. Iser suggests that an interpretation emerges from the interaction between the text and the reader when the reader determines the implications of the text and in this way fills the "gaps" in the text. Iser believes that the text guides the reader, but as he also believes that meaning is on a level beyond words, he cannot explain how the text directs the reader. The similarity in the interpretations and the fact that the agreement is strongest when related to issues that are discussed broadly in the text do, however, support his assumption that readers are guided by the text. In Bleich's view, all interpretations have personal motives and each person has an idiosyncratic language system. The situation where a person learns a word determines the most important meaning it has for that person. In order to uncover the personal etymologies of words, Bleich asks his readers to associate freely on the basis of a text and note down all the personal memories and feelings that the reading experience evokes. Bleich's theory of the idiosyncratic language system seems to rely on a misconceived notion of the role that ostensive definitions have in language use. The readers' responses show that spontaneous associations to personal life seem to colour the readers' interpretations, but such instances are rather rare. According to Holland, an interpretation reflects the reader's identity theme. Language use is regulated by shared rules, but everyone follows the rules in his or her own way. Words mean different things to different people. The problem with this view is that if there is any basis for language use, it seems to be the shared way of following linguistic rules. Wittgenstein suggests that our understanding of words is related to the shared ways of using words and our understanding of human behaviour. This view seems to give better grounds for understanding similarity and differences in literary interpretations than the theories of Holland, Bleich, Fish and Iser.
Resumo:
The use of the multiple Fourier method to analyses the stress distribution in the and regions of as a post-tensioned prestressed concrete beam had shown. The multiple Fourier method demonstrated have is a relatively new method for solving those problems for which the “Saint Vansant principle” is not applicable, The actual three-dimensional problem and a two-dimensional simplified representation of it are treated. The two-dimensional case is treated first and rather completely to gain further experience with multiple Fourier procedure, the appropriate Galerkin Vector for the three-dimensional case is found and the required relations between the arbitrary functions are stated.