987 resultados para INFORMATION SCIENCE


Relevância:

60.00% 60.00%

Publicador:

Resumo:

This paper reports on the application of systems modelling benchmarks to determine the viability of systems modelling software and its suitability for modelling critical infrastructure systems. This research applies the earlier research that related to developing benchmarks that when applied to systems modelling software will indicate its likely suitability to modelling critical infrastructure systems. In this context, the systems modelling benchmarks will assess the practicality of CPNTools to the task of modelling critical infrastructure systems.<br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Secure management of Australia&rsquo;s commercial critical infrastructure presents ongoing challenges to owners and the government. Although it is currently managed through high-level information sharing via collaboration, but does this suit the commercial sector. One of the issues facing Australia is that the majority of critical infrastructure resides under the control of the business sector and certain aspects such of the critical infrastructure such as Supply Chain Management (SCM) systems are distributed entities and not a single entity. The paper focuses upon the security issues associated with SCM systems and critical infrastructure protection.<br />

Relevância:

60.00% 60.00%

Publicador:

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This chapter analyses local government&rsquo;s response to the pressure to modernise its structures through its use of Information Communication Technologies (ICT) to execute its broad range of tasks. The chapter begins by discussing Chadwick and May&rsquo;s (2003) three basic models of e-government; managerial, consultative and participatory. Using data collected from an analysis of 658 local government websites in Australia together with existing survey research the chapter then analyses the extent to which local government sites fit into the three models. The chapter concludes with a discussion of the issues and problems faced by local government in its attempt to develop e-governance as both an extension of administrative as well as democratic functions.<br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

&quot;This book combines research on the cultural, technical, organizational, and human issues surrounding the creation, capture, transfer, and use of knowledge in today's organizations. Topics such as organizational memory, knowledge management in enterprises, enablers and inhibitors of knowledge sharing and transfer, and emerging technologies of knowledge management, offering information to practitioners and scholars in a variety of settings&quot;--Provided by publisher. <br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

For the past 15 years, governments in the developed, Western world have been contracting out, or outsourcing, services as a key part of public sector reforms. Outsourcing has been argued to lead to cost savings, improved discipline, better services, access to scarce skills, and the capacity for managers to focus more time on the core business of their organizations (Domberger, 1998). Government outsourcing initiatives have encompassed a range of services, but given the large sums of money invested in IT assets, the outsourcing of IT services (IT outsourcing, or ITO) has been a major initiative for many agencies. Lacity and Willcocks (1998, p. 3) defined ITO as &quot;handing over to a third party [the] management of IS/IT assets, resources and/or activities for required results.&quot; For public-sector outsourcing, this handover is usually made by way of a competitive tender. Case studies have reported ITO successes and failures (e.g., Currie &amp; Willcocks, 1998; Rouse &amp; Corbitt, 2003; Willcocks &amp; Currie, 1997; Willcocks &amp; Lacity, 2001; Willcocks &amp; Kern, 1998), but much of the evidence presented to public-sector decision makers to justify this reform is anecdotal and unsystematic, and when investigated in depth, does not necessarily support widespread conclusions.<br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Understanding and managing information infrastructure (II) security risks is a priority to most organizations dealing with information technology and information warfare (IW) scenarios today (Libicki, 2000). Traditional security risk analysis (SRA) was well suited to these tasks within the paradigm of computer security, where the focus was on securing tangible items such as computing and communications equipment (NCS,1996; Cramer, 1998). With the growth of information interchange and reliance on information infrastructure, the ability to understand where vulnerabilities lie within an organization, regardless of size, has become extremely difficult (NIPC, 1996). To place a value on the information that is owned and used by an organization is virtually an impossible task. The suitability of risk analysis to assist in managing IW and information infrastructure-related security risks is unqualified, however studies have been undertaken to build frameworks and methodologies for modeling information warfare attacks (Molander, Riddile, &amp; Wilson, 1996; Johnson, 1997; Hutchinson &amp; Warren, 2001) which will assist greatly in applying risk analysis concepts and methodologies to the burgeoning information technology security paradigm, information warfare.<br />

Relevância:

60.00% 60.00%

Publicador: