963 resultados para cyber security, securitization, information technology, U.S CYBERCOM


Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is increasing pressure to capture of video within Higher Education. Although much research has looked at how communication technologies enhance information transfer during playback of video, consideration of technical issues seems incongruous if we do not consider how presentation mode affects information assimilated by, and satisfaction of, learners with a range of individual differences, and from a range of different backgrounds. This paper considers whether a relationship exists between the media and presentation mode used in recorded content, and the level of information assimilation and satisfaction perceived by learners with a range of individual differences. Results aim to inform learning practitioners whether generic delivery is justified, or whether tailoring content delivery enhances the experience of specific learner groups.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The use of computers and information technology is becoming more widespread in chemical education and in the wider community and workforce. Universities are increasing the use of computers and information technology in their teaching and learning programs. The Australian situation, reported here, can be viewed as a microcosm, reflecting a world-wide trend.

The penetration of general IT literacy and ability amongst Australian undergraduate students is rising rapidly. This paper reports surveys of the detailed IT skills of Australian undergraduate students. To the best of our knowledge, apart from our own work, there have been no other published surveys of specific IT skills. Most students have some reasonable computer skills at the start of their university studies, but the level of skill is not uniformly high. In fact, many IT literate students lack a sufficient level of skill to use the new technologies, including full use of web-based flexible learning. There is an urgent need for IT training for university students in order to achieve successful learning outcomes using IT and to satisfy the needs of future employers.

This article, which is the second in a series (1) of investigations on the computer skills of undergraduate students at the start of university, is an expanded version of a paper presented at the World Chemistry Congress held in Brisbane (Australia) during 1-6 July 2001.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article explores the range of boundaries to negotiate the demands of evidence-based practice. Increasing demands that social work be a profession committed to evidence-based practice have coincided with innovations in information technology, which potentially give social workers unprecedented access to a plethora of sources and types of evidence. Because these innovations can enable access to evidence beyond traditional boundaries, the question of how the author establish the borders of acceptability warrants consideration. Recommendations for a critical approach to selective evidence based for social work interventions are also provided.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Universities are increasingly turning to ‘fashionable’ education programs to attract bright, high-quality students to both under-graduate and post-graduate degree programs. Traditional offerings in technology areas, such as Information Systems and Information Technology are being augmented by newer, more marketable degrees in areas such as eCommerce/eBusiness. This paper analyses the eCommerce/eBusiness and Information Systems (IS) / Information Technology (IT) academic programs in Australian and New Zealand universities on the basis of Kotler and Fox's service offering model of educational institutions; and considers what differences exist between these two apparently similar areas of academic endeavour. Finally we look at the trends of academic program delivery in the e-age and question whether universities need to take a more consumer-product approach to the issue of attracting appropriate students.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Outsourcing of Information Technology (IT) services which are central to business strategy may be risky. Managers have made the outsourcing decision both to concentrate financially on the core competencies and to rid themselves of a troublesome and cost inefficient department. More recent research has, however, cast doubt on the promises of huge savings. In this paper, we consider the likelihood that outsourcing may lead to the loss of organisational knowledge - that organisations outsourcing their total Information Systems operations may also have lost irreplaceable tacit, cross-functional knowledge which subsisted within the minds of the professional systems analysts. The findings of our research revealed that expert systems analysts possess a unique organisational understanding and draw on this knowledge to operate efficiently in their environment. We present a model that will allow future researchers to build on our findings and examine whether outsourcing can lead to a loss of organisational memory.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Delivered information systems are an integral part of many organisations’ information technology infrastructure. Their dynamic nature creates new challenges, not the least of which is the need to measure the quality/effectiveness of these systems. Given the size of investment in these systems, it would be invaluable for business to formulate a fresh, simple, easy to administer, multi-dimensional instrument capable of measuring the quality of delivered information systems or applications. Such an instrument would provide a practical and efficient means to pinpoint areas that key stakeholders, ranging from end-users to managers, perceive as requiring attention. In this paper, we report on the development of one such instrument. This instrument addresses key areas of performance and uses multiple statements to enhance stakeholders’ understanding of these areas.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There have been many standards and guides written for the implementation of computer security and information security concentrating on appropriate implementation of procedures for effective information security management. Such guides are limited when dealing with e-business and its implementation by Small and Medium Business Enterprises (SMEs). In Australia the National Office for the Information Economy (NOIE) has released a small business guide for e-security for performing such services while fulfilling the necessary security requirements. This paper presents an overview of this current small business guide to e-security with special reference to deriving a common set of criteria for implementing security measures in the SME e-business environment.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A new unit named Information Systems in Construction was developed and taught for the first time in the School of Architecture and Building at Deakin University in Semester 1 2003 for first-year construction management students. This paper reports on key issues that arose during the unit development process and the implementation of teaching activities. Special consideration is given to the learners (first year students), the teaching environment (online teaching and learning), the unit background (information technology and information system), and the discipline (international construction). Several suggestions are outlined for improving the unit development and delivery in the next round.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Building demolition has been undergoing evolutionary development in its technologies for several decades. In order to achieve a high level of demolition material reuse and recycling, new management approaches are also necessitated, in particular in conjunction with the applications of information technologies. The development of an information system for demolition project management is an impactful strategy to support various demolition activities including waste exchange, demolition visualization, and demolition method selection and evaluation. This paper aims to develop a framework of an integrated information system for building demolition project demolition decision-making and waste minimization. The components of this information system and their interactions are demonstrated through a specifical demolition project.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We determine the affine equivalence classes of the eight variable degree three homogeneous bent functions using a new algorithm. Our algorithm applies to general bent functions and can systematically determine the automorphism groups. We provide a partial verification of the computer enumeration of bent functions by Meng et al.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper discusses in its entirety, the CIO (Chief Information Officer) position in the public sector. Governments are increasingly adopting Information Technology for internal processes and for the delivery of service to their citizens. It includes literature on CIO roles and responsibilities which is heavily based on the private sector, due to the recognition of the role in this sector over twenty years. The position is just evolving in the public sector, and due to the context in which the public sector operates there are some similarities as well as vast differences. An evaluation of existing CIO models and theories form the basis for research on CIO roles, responsibilities and future within the public sector.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The issue of information sharing and exchanging is one of the most important issues in the areas of artificial intelligence and knowledge-based systems (KBSs), or even in the broader areas of computer and information technology. This paper deals with a special case of this issue by carrying out a case study of information sharing between two well-known heterogeneous uncertain reasoning models: the certainty factor model and the subjective Bayesian method. More precisely, this paper discovers a family of exactly isomorphic transformations between these two uncertain reasoning models. More interestingly, among isomorphic transformation functions in this family, different ones can handle different degrees to which a domain expert is positive or negative when performing such a transformation task. The direct motivation of the investigation lies in a realistic consideration. In the past, expert systems exploited mainly these two models to deal with uncertainties. In other words, a lot of stand-alone expert systems which use the two uncertain reasoning models are available. If there is a reasonable transformation mechanism between these two uncertain reasoning models, we can use the Internet to couple these pre-existing expert systems together so that the integrated systems are able to exchange and share useful information with each other, thereby improving their performance through cooperation. Also, the issue of transformation between heterogeneous uncertain reasoning models is significant in the research area of multi-agent systems because different agents in a multi-agent system could employ different expert systems with heterogeneous uncertain reasonings for their action selections and the information sharing and exchanging is unavoidable between different agents. In addition, we make clear the relationship between the certainty factor model and probability theory.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The American Bar Association Technology show the largest tech show for the legal profession was held over three days and divided into ten sections - general, solo and small firms - strategies - collaboration/nets - Security - in-house and government lawyers - my favourite tools - litigation - enterprise - ethical challenges.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Building Information Modelling (BIM) is an information technology [IT] enabled approach to managing design data in the AEC/FM (Architecture, Engineering and Construction/ Facilities Management) industry. BIM enables improved interdisciplinary collaboration across distributed teams, intelligent documentation and information retrieval, greater consistency in building data, better conflict detection and enhanced facilities management. Despite the apparent benefits the adoption of BIM in practice has been slow. Workshops with industry focus groups were conducted to identify the industry needs, concerns and expectations from participants who had implemented BIM or were BIM “ready”. Factors inhibiting BIM adoption include lack of training, low business incentives, perception of lack of rewards, technological concerns, industry fragmentation related to uneven ICT adoption practices, contractual matters and resistance to changing current work practice. Successful BIM usage depends on collective adoption of BIM across the different disciplines and support by the client. The relationship of current work practices to future BIM scenarios was identified as an important strategy as the participants believed that BIM cannot be efficiently used with traditional practices and methods. The key to successful implementation is to explore the extent to which current work practices must change. Currently there is a perception that all work practices and processes must adopt and change for effective usage of BIM. It is acknowledged that new roles and responsibilities are emerging and that different parties will lead BIM on different projects. A contingency based approach to the problem of implementation was taken which relies upon integration of BIM project champion, procurement strategy, team capability analysis, commercial software availability/applicability and phase decision making and event analysis. Organizations need to understand: (a) their own work processes and requirements; (b) the range of BIM applications available in the market and their capabilities (c) the potential benefits of different BIM applications and their roles in different phases of the project lifecycle, and (d) collective supply chain adoption capabilities. A framework is proposed to support organizations selection of BIM usage strategies that meet their project requirements. Case studies are being conducted to develop the framework. The results of the preliminary design management case study is presented for contractor led BIM specific to the design and construct procurement strategy.