883 resultados para information as a property good
Resumo:
We all know that the future of news is digital. But mainstream news providers are still grappling with how to entice more customers to their online sites. This paper provides context for a survey currently underway on user intentions towards online news and entertainment, by exploring: 1. Consumer behaviours and intentions with regards to accessing online news and information; 2. Current trends in the Australian online news and information sector; and 3. Key issues and emerging opportunities in the Australian (and global) environment. Key influences on use of online news and information are pricing and access. The paper highlights emerging technical opportunities and flags service gaps. These gaps include multiple disconnects between: 1. Changing user intentions towards online and location based news (news based on a specific locality as chosen by the user) and information; 2. The ability by consumers to act on these intentions via the availability and cost of technologies; 3. Younger users may prefer entertainment to news, or ‘infotainment’; and 4. Current online offerings of traditional news providers and opportunities. These disconnects present an opportunity for online news suppliers to appraise and resolve. Doing so may enhance their online news and information offering, attract consumers and improve loyalty. Outcomes from this paper will be used to identify knowledge gaps and contribute to the development of further analysis on Australian consumers and their behaviours and intentions towards online news and information. This will be undertaken via focus groups as part of a broader study.
Resumo:
This article presents a survey of authorisation models and considers their ‘fitness-for-purpose’ in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerging business models based on the concept of a ‘virtual organisation’. The article argues that present authorisation models are inflexible and poorly scalable in such dynamic environments due to their assumption that the future needs of the system can be predicted, which in turn justifies the use of persistent authorisation policies. The article outlines the motivation and requirement for a new flexible authorisation model that addresses the needs of information sharing. It proposes that a flexible and scalable authorisation model must allow an explicit specification of the objectives of the system and access decisions must be made based on a late trade-off analysis between these explicit objectives. A research agenda for the proposed Objective-based Access Control concept is presented.
Resumo:
The Journal of Strategic Information Systems (JSIS) has been an international outlet for Information Systems research that focuses on strategic issues since 1991. This paper reports on an analysis of the research published in JSIS to date. The paper presents a preliminary classification system for research topics related to Strategic Information Systems into which all 316 JSIS research papers as at end 2009 are classified. Discussion on changing emphases in topics over time is provided, in the context of the editorial philosophy of the journal. The paper seeks to stimulate discussion on future directions for research in Strategic Information Systems.
Resumo:
Researching administrative history is problematical. A trail of authoritative documents is often hard to find; and useful summaries can be difficult to organise, especially if source material is in paper formats in geographically dispersed locations. In the absence of documents, the reasons for particular decisions and the rationale underpinning particular policies can be confounded as key personnel advance in their professions and retire. The rationale for past decisions may be lost for practical purposes; and if an organisation’s memory of events is diminished, its learning through experience is also diminished. Publishing this document tries to avoid unnecessary duplication of effort by other researchers that need to venture into how policies of charging for public sector information have been justified. The author compiled this work within a somewhat limited time period and the work does not pretend to be a complete or comprehensive analysis of the issues.----- A significant part of the role of government is to provide a framework of legally-enforceable rights and obligations that can support individuals and non-government organisations in their lawful activities. Accordingly, claims that governments should be more ‘business-like’ need careful scrutiny. A significant supply of goods and services occurs as non-market activity where neither benefits nor costs are quantified within conventional accounting systems or in terms of money. Where a government decides to provide information as a service; and information from land registries is archetypical, the transactions occur as a political decision made under a direct or a clearly delegated authority of a parliament with the requisite constitutional powers. This is not a market transaction and the language of the market confuses attempts to describe a number of aspects of how governments allocate resources.----- Cost recovery can be construed as an aspect of taxation that is a sole prerogative of a parliament. The issues are fundamental to political constitutions; but they become more complicated where states cede some taxing powers to a central government as part of a federal system. Nor should the absence of markets be construed necessarily as ‘market failure’ or even ‘government failure’. The absence is often attributable to particular technical, economic and political constraints that preclude the operation of markets. Arguably, greater care is needed in distinguishing between the polity and markets in raising revenues and allocating resources; and that needs to start by removing unhelpful references to ‘business’ in the context of government decision-making.
Resumo:
This study explores strategic decision-making (SDM) in micro-firms, an economically significant business subsector. As extant large- and small-firm literature currently proffers an incomplete characterization of SDM in very small enterprises, a multiple-case methodology was used to investigate how these firms make strategic decisions. Eleven Australian Information Technology service micro-firms participated in the study. Using an information-processing lens, the study uncovered patterns of SDM in micro-firms and derived a theoretical micro-firm SDM model. This research also identifies several implications for micro-firm management and directions for future research, contributing to the understanding of micro-firm SDM in both theory and practice.
Resumo:
The impact of technology on the health and well-being of workers has been a topic of interest since computers and computerized technology were widely introduced in the 1980s. Of recent concern is the impact of rapid technological advances on individuals’ psychological well-being, especially due to advancements in mobile technology which have increased many workers’ accessibility and expected productivity. In this chapter we focus on the associations between occupational stress and technology, especially behavioral and psychological reactions. We discuss some key facilitators and barriers associated with users’ acceptance of and engagement with information and communication technology. We conclude with recommendations for ongoing research on managing occupational health and well-being in conjunction with technological advancements.
Resumo:
In this paper you will be introduced to a number of principles which can be used to inform good teaching practice and rigorous curriculum design. Principles relate to: * Application of a common sequence of events for how learners learn; * Accommodating different learning styles; * Adopting a purposeful approach to teaching and learning; * Using assessment as a central driving force in the curriculum and as an organising structure leading to coherence of teaching and learning approach; and * The increasing emphasis that is being placed on the development of generic graduate competencies over and above discipline content knowledge. The principles are particularly significant in relation to adult learning. The paper will use three specific applications as illustrations to help you to learn how these principles can be applied. The illustrations are taken from a second year subject in supercomputing that uses scientific case studies. The subject has been developed (with support from Silicon Graphics Inc. and Intel) to be taught entirely via the Internet.
Resumo:
The focus of this study is the phenomenon of teams and teamwork. Currently the Professional Standards of Queensland’s teachers state that teams are critical to teachers’ work. This study uses a phenomenographic approach to investigate science teachers’ conceptions of teams and teamwork in the science departments of fifteen Queensland State secondary schools. The research identifies eight conceptions of teams and teamwork. The research findings suggest that the team represents a collective of science teachers bounded by the Science Department and their current timetabled subject. Collaboration was found in the study to be an activity that occurred between teachers in the same social space. The research recognises a new category of relationship between teachers, designated as ‘ask-and-receive’. The research identifies a lack of teamwork within the science department and the school. There appears to be no teaming with other subject departments. The research findings highlight the non-supportive team and teamwork policies, procedures and structures in the schools and identify the lack of recognition of the specialised skills of science teachers. The implications for the schools and science teachers are considerable, as the current Professional Standards of Education Queensland and the Queensland College of Teachers provide benchmarks of knowledge and practice of teams and teamwork for teachers. The research suggests that the professional standards relating to teams and teamwork cannot be achieved in the present school environment.
Resumo:
Increasingly, major insurers and reinsurers are operating on a global basis. For example, General Re Corporation and Cologne Re operate in almost 150 countries : see "General Re Corporation 1999 Annual Report". This is also true for the world's major brokers, and the emergence of large broking conglomerates such as Aon and Marsh are good examples of global service providers. Against the background of this increasingly global insurance market with global participants, there are a range of common legal issues in this article but a selection of certain critical matters are canvassed in the secitons below. First there are a range of regulatory issues that must be addressed. Secondly globalisation of the industry does create added incentive for a common legal regime to cover the formation of insurance transactions and the resolution of disputes about claims, coverage and termination. In this contect codifcation of insurance laws is a critical issue. Thirdly, major advances in genetic research and biotechnology over recent years have resulted in a dramatic increase in the availability of genetic testing. These developments have given rise to concerns worldwide about the potential for misuse of genetic information by third parties such as insurers and employers. Fourthly, the essence of an insurance transaction is the transference of risk from one person to anther. It is generally accepted that this transference should occur in informed circumstances and without undue advantage being bestowed upon either party. Finally this article will consider some legal matter in relation to transacting insurance on the internet
Resumo:
"Know How" protection varies enormously from country to country and is a complex equation of legal, political, cultural and economic factors. A contrast between Japan and Australia serves to highlight some of these factors. For the purposes of this article, a working definition of "know how" is required. In Australia and other common law systems, no statutory definition of "know how" exists, "confidential information" proving the closest comparative term in Australia ('trade secret law' in the United States).
Resumo:
This article examines the importance of accurate classification and identification of risk with particular reference to the problem of adverse selection. It is argued that, historically, this concern was the paramount consideration influencing standard form contract formation and disclosure laws. The scope of its relevance today however is less apparent in that contemporary insurance contracting is conducted in a vastly different environment from that which prevailed at the time Lloyd's was better known as a coffee house. Accordingly, the second part of this article looks at the contemporary framework of information disclosure and those dynamics within it designed to elicit information weighing on risk forecasting : specifically, (a) direct inquiry and testing requirements; (b) signaling - or incentive based structuring of insurance contractual and (c) bargaining in the shadow of the utmost good faith doctrine. Finally, certain conclusions arising out of contemporary and historical economic considerations underpinning disclosure in insurance law are outlined.
Resumo:
Considerable attention has been devoted to the duty or doctrine of utmost good faith in the academic literature and in the courts. This attention ranges from an analysis of the precise legal basis for the duty through a consideration of the continuing nature of that duty in the post-contract environment.It is quite clear that all contracts of insurance are subject to this duty of utmost good faith. What is less clear and certain are the incidents attendant upon such a duty and the scope of the obligations that such a duty imposes. This article examines the relative positions that have been reached in England and Australia and concludes with some recommendations for legislative reform to this area of the law.
Resumo:
Monitoring Internet traffic is critical in order to acquire a good understanding of threats to computer and network security and in designing efficient computer security systems. Researchers and network administrators have applied several approaches to monitoring traffic for malicious content. These techniques include monitoring network components, aggregating IDS alerts, and monitoring unused IP address spaces. Another method for monitoring and analyzing malicious traffic, which has been widely tried and accepted, is the use of honeypots. Honeypots are very valuable security resources for gathering artefacts associated with a variety of Internet attack activities. As honeypots run no production services, any contact with them is considered potentially malicious or suspicious by definition. This unique characteristic of the honeypot reduces the amount of collected traffic and makes it a more valuable source of information than other existing techniques. Currently, there is insufficient research in the honeypot data analysis field. To date, most of the work on honeypots has been devoted to the design of new honeypots or optimizing the current ones. Approaches for analyzing data collected from honeypots, especially low-interaction honeypots, are presently immature, while analysis techniques are manual and focus mainly on identifying existing attacks. This research addresses the need for developing more advanced techniques for analyzing Internet traffic data collected from low-interaction honeypots. We believe that characterizing honeypot traffic will improve the security of networks and, if the honeypot data is handled in time, give early signs of new vulnerabilities or breakouts of new automated malicious codes, such as worms. The outcomes of this research include: • Identification of repeated use of attack tools and attack processes through grouping activities that exhibit similar packet inter-arrival time distributions using the cliquing algorithm; • Application of principal component analysis to detect the structure of attackers’ activities present in low-interaction honeypots and to visualize attackers’ behaviors; • Detection of new attacks in low-interaction honeypot traffic through the use of the principal component’s residual space and the square prediction error statistic; • Real-time detection of new attacks using recursive principal component analysis; • A proof of concept implementation for honeypot traffic analysis and real time monitoring.
Resumo:
Information Retrieval is an important albeit imperfect component of information technologies. A problem of insufficient diversity of retrieved documents is one of the primary issues studied in this research. This study shows that this problem leads to a decrease of precision and recall, traditional measures of information retrieval effectiveness. This thesis presents an adaptive IR system based on the theory of adaptive dual control. The aim of the approach is the optimization of retrieval precision after all feedback has been issued. This is done by increasing the diversity of retrieved documents. This study shows that the value of recall reflects this diversity. The Probability Ranking Principle is viewed in the literature as the “bedrock” of current probabilistic Information Retrieval theory. Neither the proposed approach nor other methods of diversification of retrieved documents from the literature conform to this principle. This study shows by counterexample that the Probability Ranking Principle does not in general lead to optimal precision in a search session with feedback (for which it may not have been designed but is actively used). Retrieval precision of the search session should be optimized with a multistage stochastic programming model to accomplish the aim. However, such models are computationally intractable. Therefore, approximate linear multistage stochastic programming models are derived in this study, where the multistage improvement of the probability distribution is modelled using the proposed feedback correctness method. The proposed optimization models are based on several assumptions, starting with the assumption that Information Retrieval is conducted in units of topics. The use of clusters is the primary reasons why a new method of probability estimation is proposed. The adaptive dual control of topic-based IR system was evaluated in a series of experiments conducted on the Reuters, Wikipedia and TREC collections of documents. The Wikipedia experiment revealed that the dual control feedback mechanism improves precision and S-recall when all the underlying assumptions are satisfied. In the TREC experiment, this feedback mechanism was compared to a state-of-the-art adaptive IR system based on BM-25 term weighting and the Rocchio relevance feedback algorithm. The baseline system exhibited better effectiveness than the cluster-based optimization model of ADTIR. The main reason for this was insufficient quality of the generated clusters in the TREC collection that violated the underlying assumption.
Resumo:
In mid 2007, the Australian Learning and Teaching Council (ALTC), formerly the Carrick Institute for Learning and Teaching in Higher Education, commissioned an intensive research project to examine the use of ePortfolios by university students in Australia. The project was awarded to a consortium of four universities: Queensland University of Technology as lead institution, The University of Melbourne, University of New England and University of Wollongong.---------- The overarching aim of the research project, which was given the working title of the Australian ePortfolio Project, was to examine the current levels of ePortfolio practice in Australian higher education. The principal project goals sought to provide an overview and analysis of the national and international ePortfolio contexts, document the types of ePortfolios used in Australian higher education, examine the relationship with the National Diploma Supplement project funded by the Federal government, identify any significant issues relating to ePortfolio implementation, and offer guidance about future opportunities for ePortfolio development. The research findings revealed that there was a high level of interest in the use of ePortfolios in the context of higher education, particularly in terms of the potential to help students become reflective learners who are conscious of their personal and professional strengths and weaknesses, as well as to make their existing and developing skills more explicit. There were some good examples of early adoption in different institutions, although this tended to be distributed across the sector. The greatest use of ePortfolios was recorded in coursework programs, rather than in research programs, with implementation generally reflecting subject-specific or program-based activity, as opposed to faculty- or university-wide activity. Accordingly, responsibility for implementation frequently rested with the individual teaching unit, although an alternative centralised model of coordination by ICT services, careers and employment or teaching and learning support was beginning to emerge. The project report concludes with a series of recommendations to guide the process, drawing on the need for open dialogue and effective collaboration between the stakeholders across the range of contexts: government policy, international technical standards, academic policy, and learning and teaching research and practice.