886 resultados para applicazioni, web, event, driven, programming, linguaggio, DARTAgent-Oriented ProgrammingJaCaMo


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper explores how game authoring tools can teach processes that transform everyday places into engaging learning spaces. It discusses the motivation inherent in playing games and creating games for others, and how this stimulates an iterative process of creation and reflection and evokes a natural desire to engage in learning. The use of MiLK at the Adelaide Botanic Gardens is offered as a case in point. MiLK is an authoring tool that allows students and teachers to create and share SMS games for mobile phones. A group of South Australian high school students used MiLK to play a game, create their own games and play each other’s games during a day at the gardens. This paper details the learning processes involved in these activities and how the students, without prompting, reflected on their learning, conducted peer assessment, and engaged in a two-way discussion with their teacher about new technologies and their implications for learning. The paper concludes with a discussion of the needs and requirements of 21st century learners and how MiLK can support constructivist and connectivist teaching methods that engage learners and will produce an appropriately skilled future workforce.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research investigates the prevalence of sports-related terms among the Web sites of the world’s leading companies, the Fortune Global 500. An automated process copied about four gigabytes of textual data, around 70 million words, from their sites. The subsequent analysis revealed regional and industry differences in the distribution of sports-related terms, the popularity of tennis stars and few references to sports stars, especially in Asia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Demonstrating socially responsible behaviour has become increasingly important for corporations. Using the Psychological Continuum Model (PCM) as its theoretical framework, this paper examines the meditational role of corporate social responsibility (CSR) on the relationship between sport participation motivation, event attachment and purchase intent of a sport event’s sponsors’ products. A questionnaire was distributed to a sample of sport event participants (N=689) to measure sport participation motivation (recreation and charity), attachment to the event, CSR, and purchase intent of sponsors’ products. Results reveal that CSR fully mediates the link between purchase intent and sport participation motivation and partially mediates the influence of attachment on purchase intent. The authors propose that corporations strategically align with sport events in which participants are attached to allow for CSR and the meaning elicited by the event to work jointly.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The computing tools and technologies with urban information systems are designed to enhance planners’ capability to deal with complex urban environments and to plan for prosperous and liveable communities. This paper examines the role of Online Urban Information Systems or in another words Internet based Geographic Information Systems as spatial decision support systems to aid local planning process. This paper introduces a prototype Internet GIS model that aims to integrate a public oriented interactive decision support system for urban planning process. This model, referred as a ‘Community based Internet GIS’, incorporates advanced information technologies and community involvement in decision making processes on the web environment. This innovative model has been recently applied to a pilot case in Tokyo and this paper concludes with the preliminary results of this project.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose – Financial information about costs and return on investments are of key importance to strategic decision-making but also in the context of process improvement or business engineering. In this paper we propose a value-oriented approach to business process modeling based on key concepts and metrics from operations and financial management, to aid decision making in process re-design projects on the basis of process models. Design/methodology/approach – We suggest a theoretically founded extension to current process modeling approaches, and delineate a framework as well as methodical support to incorporate financial information into process re-design. We use two case studies to evaluate the suggested approach. Findings – Based on two case studies, we show that the value-oriented process modeling approach facilitates and improves managerial decision-making in the context of process re-design. Research limitations / implications – We present design work and two case studies. More research is needed to more thoroughly evaluate the presented approach in a variety of real-life process modeling settings. Practical implications – We show how our approach enables decision makers to make investment decisions in process re-design projects, and also how other decisions, for instance in the context of enterprise architecture design, can be facilitated. Originality/value – This study reports on an attempt to integrate financial considerations into the act of process modeling, in order to provide more comprehensive decision making support in process re-design projects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this paper is to extend marketing knowledge into perceived risk in online transactions beyond the current positivistic, hypotheses-driven research by providing qualitative insights into how individuals construct their accounts of perceived risk online. Additionally, the study reported in this paper aims to explore how communication sources influence both these subjective constructions and individuals' behavioural experiences with transaction activity on the web. Design/methodology/approach - The study was developed within a grounded theory method.Ten in-depth interviews were conducted which were analysed using constant comparison of incidents procedures to provide rich descriptions of the interviewees' subjective perceptions and lived experiences with online transaction activity. Findings - The findings provide insights into how the human clement is present in individuals'perceptions and constructions of their accounts of the risk involved online.The findings also identify the influence of mass communication sources on the construction of these accounts. The study provides insights into whether change agent communication sources, such as marketers or web designers,influence consumers' behaviours towards online transaction activity through mediating their perceptions of the risks involved. The study also reveals how social communication networks influence the interviewees' decisions to use the web (or transaction activities, in particular online purchasing, and how the group in this study might act as a communication source to influence others. Research limitations/Implications - While the findings cannot be generalised to the internet population overall, the sample used was able to provide relevant information regarding the phenomenon of interest. Future research should continue to examine perceived risk and the influence of communications sources, such as e-mail, discussion groups and virtual communities. Originality/value - The value of the paper lies in permitting the participants to account for perceived risk for themselves. The findings ex.plore what this means at increasing levels of personal relevance and the influence of communication sources to create, sustain or mediate perceptions of this phenomenon.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite the increased offering of online communication channels to support web-based retail systems, there is limited marketing research that investigates how these channels act singly, or in combination with online channels, to influence an individual' s intention to purchase online. If the marketer's strategy is to encourage online transactions, this requires a focus on consumer acceptance of the web-based transaction technology, rather than the purchase of the products per se. The exploratory study reported in this paper examines normative influences from referent groups in an individual's on and offline social communication networks that might affect their intention to use online transaction facilities. The findings suggest that for non-adopters, there is no normative influence from referents in either network. For adopters, one online and one offline referent norm positively influenced this group's intentions to use online transaction facilities. The implications of these findings are discussed together with future research directions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although internet chat is a significant aspect of many internet users’ lives, the manner in which participants in quasi-synchronous chat situations orient to issues of social and moral order remains to be studied in depth. The research presented here is therefore at the forefront of a continually developing area of study. This work contributes new insights into how members construct and make accountable the social and moral orders of an adult-oriented Internet Relay Chat (IRC) channel by addressing three questions: (1) What conversational resources do participants use in addressing matters of social and moral order? (2) How are these conversational resources deployed within IRC interaction? and (3) What interactional work is locally accomplished through use of these resources? A survey of the literature reveals considerable research in the field of computer-mediated communication, exploring both asynchronous and quasi-synchronous discussion forums. The research discussed represents a range of communication interests including group and collaborative interaction, the linguistic construction of social identity, and the linguistic features of online interaction. It is suggested that the present research differs from previous studies in three ways: (1) it focuses on the interaction itself, rather than the ways in which the medium affects the interaction; (2) it offers turn-by-turn analysis of interaction in situ; and (3) it discusses membership categories only insofar as they are shown to be relevant by participants through their talk. Through consideration of the literature, the present study is firmly situated within the broader computer-mediated communication field. Ethnomethodology, conversation analysis and membership categorization analysis were adopted as appropriate methodological approaches to explore the research focus on interaction in situ, and in particular to investigate the ways in which participants negotiate and co-construct social and moral orders in the course of their interaction. IRC logs collected from one chat room were analysed using a two-pass method, based on a modification of the approaches proposed by Pomerantz and Fehr (1997) and ten Have (1999). From this detailed examination of the data corpus three interaction topics are identified by means of which participants clearly orient to issues of social and moral order: challenges to rule violations, ‘trolling’ for cybersex, and experiences regarding the 9/11 attacks. Instances of these interactional topics are subjected to fine-grained analysis, to demonstrate the ways in which participants draw upon various interactional resources in their negotiation and construction of channel social and moral orders. While these analytical topics stand alone in individual focus, together they illustrate different instances in which participants’ talk serves to negotiate social and moral orders or collaboratively construct new orders. Building on the work of Vallis (2001), Chapter 5 illustrates three ways that rule violation is initiated as a channel discussion topic: (1) through a visible violation in open channel, (2) through an official warning or sanction by a channel operator regarding the violation, and (3) through a complaint or announcement of a rule violation by a non-channel operator participant. Once the topic has been initiated, it is shown to become available as a topic for others, including the perceived violator. The fine-grained analysis of challenges to rule violations ultimately demonstrates that channel participants orient to the rules as a resource in developing categorizations of both the rule violation and violator. These categorizations are contextual in that they are locally based and understood within specific contexts and practices. Thus, it is shown that compliance with rules and an orientation to rule violations as inappropriate within the social and moral orders of the channel serves two purposes: (1) to orient the speaker as a group member, and (2) to reinforce the social and moral orders of the group. Chapter 6 explores a particular type of rule violation, solicitations for ‘cybersex’ known in IRC parlance as ‘trolling’. In responding to trolling violations participants are demonstrated to use affiliative and aggressive humour, in particular irony, sarcasm and insults. These conversational resources perform solidarity building within the group, positioning non-Troll respondents as compliant group members. This solidarity work is shown to have three outcomes: (1) consensus building, (2) collaborative construction of group membership, and (3) the continued construction and negotiation of existing social and moral orders. Chapter 7, the final data analysis chapter, offers insight into how participants, in discussing the events of 9/11 on the actual day, collaboratively constructed new social and moral orders, while orienting to issues of appropriate and reasonable emotional responses. This analysis demonstrates how participants go about ‘doing being ordinary’ (Sacks, 1992b) in formulating their ‘first thoughts’ (Jefferson, 2004). Through sharing their initial impressions of the event, participants perform support work within the interaction, in essence working to normalize both the event and their initial misinterpretation of it. Normalising as a support work mechanism is also shown in relation to participants constructing the ‘quiet’ following the event as unusual. Normalising is accomplished by reference to the indexical ‘it’ and location formulations, which participants use both to negotiate who can claim to experience the ‘unnatural quiet’ and to identify the extent of the quiet. Through their talk participants upgrade the quiet from something legitimately experienced by one person in a particular place to something that could be experienced ‘anywhere’, moving the phenomenon from local to global provenance. With its methodological design and detailed analysis and findings, this research contributes to existing knowledge in four ways. First, it shows how rules are used by participants as a resource in negotiating and constructing social and moral orders. Second, it demonstrates that irony, sarcasm and insults are three devices of humour which can be used to perform solidarity work and reinforce existing social and moral orders. Third, it demonstrates how new social and moral orders are collaboratively constructed in relation to extraordinary events, which serve to frame the event and evoke reasonable responses for participants. And last, the detailed analysis and findings further support the use of conversation analysis and membership categorization as valuable methods for approaching quasi-synchronous computer-mediated communication.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cultural policy settings attempting to foster the growth and development of the Australian feature film industry in era of globalisation are coming under increasing pressure. Global forces and emerging production and distribution models are challenging the “narrowness” of cultural policy – mandating a particular film culture, circumscribing certain notions of value and limiting the variety of films produced through cultural policy driven subvention models. Australian horror film production is an important case study. Horror films are a production strategy well suited to the financial limitations of the Australian film industry with competitive advantages for producers against international competitors. However, emerging within a “national” cinema driven by public subsidy and social/cultural objectives, horror films – internationally oriented with a low-culture status – have been severely marginalised within public funding environments. This paper introduces Australian horror film production, and examines the limitations of cultural policy, and the impacts of these questions for the Producer Offset.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Business Service Management describes the emerging discipline dedicated to the IT-enabled management of services as corporate assets. Business Service Management deals with the service orientation of the organisation and the provisioning and use of business services. The term business service describes an autonomous transformational capability that is offered to and consumed by external or internal customers for their benefit. The prefix ‘business’ stresses that such a service has a market value, requires the ability to be managed internally as a corporate asset and that its implementation is technology-agnostic. While business services (or so called capabilities) have attracted the attention of many vendors and organisations, a lack of understanding of the activities required for the successful management of such business services remains a critical issue. In order to fill this gap, a framework consisting of Service Lifecycle Management, Service Value Management, Service Relationship Management and Service Enablement is proposed. This Framework has the potential to provide organisations with the much needed guidance in their attempts to convert current IT-driven service initiatives into successful service-centric business models.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Debates concerning the veracity, ethics and politics of the documentary form circle endlessly around the function of those who participate in it, and the meaning attributed to their participation. Great significance is attached to the way that documentary filmmakers do or do not participate in the world they seek to represent, just as great significance is attached to those subjects whose participation extends beyond playing the part of eyewitness or expert, such that they become part of the very filmmaking process itself. This Ph.D. explores the interface between documentary practice and participatory culture by looking at how their practices, discursive fields and histories intersect, but also by looking at how participating in one might mean participating in the other. In short, the research is an examination of participatory culture through the lens of documentary practice and documentary criticism. In the process, however, this examination of participatory culture will in turn shed light on documentary thinking, especially the meaning and function of ‘the participant’ in contemporary documentary practice. A number of ways of conceiving of participation in documentary practice are discussed in this research, but one of the ideas that gives purpose to that investigation is the notion that the participant in contemporary documentary practice is someone who belongs to a participatory culture in particular. Not only does this mean that those subjects who play a part in a documentary are already informed by their engagement with a range of everyday media practices before the documentary apparatus arrives, the audience for such films are similarly informed and engaged. This audience have their own expectations about how they should be addressed by media producers in general, a fact that feeds back into their expectations about participatory approaches to documentary practice too. It is the ambition of this research to get closer to understanding the relationship between participants in the audience, in documentary and ancillary media texts, as well as behind the camera, and to think about how these relationships constitute a context for the production and reception of documentary films, but also how this context might provide a model for thinking about participatory culture itself. One way that documentary practice and participatory culture converge in this research is in the kind of participatory documentary that I call the ‘Camera Movie’, a narrow mode of documentary filmmaking that appeals directly to contemporary audiences’ desires for innovation and participation, something that is achieved in this case by giving documentary subjects control of the camera. If there is a certain inevitability about this research having to contend with the notion of the ‘participatory documentary’, the ‘participatory camera’ also emerges strongly in this context, especially as a conduit between producer and consumer. Making up the creative component of this research are two documentaries about the reality television event Band In A Bubble, and participatory media practices more broadly. The single-screen film, Hubbub , gives form to the collective intelligence and polyphonous voice of contemporary audiences who must be addressed and solicited in increasingly innovative ways. One More Like That is a split-screen, DVD-Video with alternate audio channels selected by a user who thereby chooses who listens and who speaks in the ongoing conversation between media producers and media consumers. It should be clear from the description above that my own practice does not extend to highly interactive, multi-authored or web-enabled practices, nor the distributed practices one might associate with social media and online collaboration. Mine is fundamentally a single authored, documentary video practice that seeks to analyse and represent participatory culture on screen, and for this reason the Ph.D. refrains from a sustained discussion of the kinds of collaborative practices listed above. This is not to say that such practices don’t also represent an important intersection of documentary practice and participatory culture, they simply represent a different point of intersection. Being practice-led, this research takes its procedural cues from the nature of the practice itself, and sketches parameters that are most enabling of the idea that the practice sets the terms of its own investigation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper deals with the problem of using the data mining models in a real-world situation where the user can not provide all the inputs with which the predictive model is built. A learning system framework, Query Based Learning System (QBLS), is developed for improving the performance of the predictive models in practice where not all inputs are available for querying to the system. The automatic feature selection algorithm called Query Based Feature Selection (QBFS) is developed for selecting features to obtain a balance between the relative minimum subset of features and the relative maximum classification accuracy. Performance of the QBLS system and the QBFS algorithm is successfully demonstrated with a real-world application

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Australia has no nationally accepted building products life cycle inventory (LCI) database for use in building Ecologically Sustainable Development (ESD) assessment (BEA) tools. More information about the sustainability of the supply chain is limited by industry’s lack of real capacity to deliver objective information on process and product environmental impact. Recognition of these deficits emerged during compilation of a National LCI database to inform LCADesign, a prototype 3 dimensional object oriented computer aided design (3-D CAD) commercial building design tool. Development of this Australian LCI represents 24 staff years of effort here since 1995. Further development of LCADesign extensions is proposed as being essential to support key applications demanded from a more holistic theoretical framework calling for modules of new building and construction industry tools. A proposed tool, conceptually called LCADetails, is to serve the building product industries own needs as well as that of commercial building design amongst other industries’ prospective needs. In this paper, a proposition is examined that the existing national LCI database should be further expanded to serve Australian building product industries’ needs as well as to provide details for its client-base from a web based portal containing a module of practical supply and procurement applications. Along with improved supply chain assessment services, this proposed portal is envisaged to facilitate industry environmental life cycle improvement assessment and support decision-making to provide accredited data for operational reporting capabilities, load-based reasoning as well as BEA applications. This paper provides an overview of developments to date, including a novel 3-D CAD information and communications technology (ICT) platform for more holistic integration of existing tools for true cost assessment. Further conceptualisation of future prospects, based on a new holistic life cycle assessment framework LCADevelop, considering stakeholder relationships and their need for a range of complementary tools leveraging automated function off such ICT platforms to inform dimensionally defined operations for such as automotive, civil, transport and industrial applications are also explored.