969 resultados para Information Attacks


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The environmental performance of a listed firm could affect its level of investment in pollution prevention and its access to financial markets. Previous studies using Tobin's q that explore market response to environmental performance do not distinguish between the impact of performance on investment and market response, which may mislead conclusions. To overcome this problem, we simultaneously estimate the functions of the intangible asset, the replacement cost, and the toxic chemical risk. We find that the Japanese financial market does not value risk associated with toxic chemical releases. Nevertheless, even without market valuation, firms increase investment to reduce pollution. © 2010 by the Board of Regents of the University of Wisconsin System.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose The purpose of this paper is to investigate the reality of financial and management accounting in a small group of small firms. Specifically, from the owner's perspective, an exploration is undertaken to see what financial information is collected, how it is used (or not) to make business decisions and evaluate the firm's performance, and the role played by the accountant in that process. Design/methodology/approach A phenomenological paradigm underpins this exploratory study. Semi‐structured interviews were undertaken with the owners of ten small firms, where the focus was on understanding what happens in an organisational setting, as opposed to theory and textbook practice. Findings The qualitative data supported prior research in other countries. The in‐depth analysis revealed a very basic understanding of accounting information and problems with the financial literacy amongst these small firm owners. Accounting reports were not widely produced or used, so an informal assessment, such as how much cash was in the bank, was the primary means of assessing business performance. Accountants were used for taxation services, although some owners sought more general business advice. Originality/value An understanding is developed of why there might be a gap between textbook rhetoric and reality of accounting practice in small firms. The conclusion is that accounting textbooks need to include more information about the reality of financial management in small firms.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A system requiring a waste management license from an enforcement agency has been introduced in many countries. A license system is usually coupled with fines, a manifest, and a disposal tax. However, these policy devices have not been integrated into an optimal policy. In this paper we derive an optimal waste management policy by using those policy devices. Waste management policies are met with three difficult problems: asymmetric information, the heterogeneity of waste management firms, and non-compliance by waste management firms and waste disposers. The optimal policy in this paper overcomes all three problems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The policy instruments that provide information on a firm's or facility's environmental performance, such as the U.S. Toxic Release Inventory (TRI) and the Pollutant Release and Transfer Register system (PRTRs) used in some European countries and Japan, play an important role in encouraging firms or facilities to improve their environmental performance, if investors, consumers and residents recognize their environmental performance. This study uses a hedonic approach to explore how the Japanese rental housing market responds to carcinogenic risk arising from releases and transfers of chemical substances produced and used at close facilities. We found that residents do not perceive carcinogenic risk generated more than 1.0 km away from their residence and that they seem to recognize the increased carcinogenic risk at distances from 0.5 km to 1.0 km away; a 1% increase in carcinogenic risk reduces the average rent by 0.0007%. The distance at which residents perceive the risk arising from such facilities is less than in previous studies. This suggests that the risk perception recognized in previous studies may capture the other externalities in addition to the chemical risk because the risk is measured by the distance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

INTRODUCTION: I want to argue that understanding masculinity is an important part of understanding gender and sexuality as it relates to information and communications technologies (ICTs), specifically those under the lens of the information-systems community. In order to do this, the landscape of gender and sexuality research in general is referred to along with such research in the field of information systems (IS), with reference as necessary to masculinity studies. I will then suggest some possible areas where a more thorough going theorization may prove useful. In sum, future research might focus on the relation-ship between marginalised masculinities and the construction and consumption of is in work organisations and society…

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract: Social network technologies, as we know them today have become a popular feature of everyday life for many people. As their name suggests, their underlying premise is to enable people to connect with each other for a variety of purposes. These purposes however, are generally thought of in a positive fashion. Based on a multi-method study of two online environments, Habbo Hotel and Second Life, which incorporate social networking functionality, we she light on forms of what can be conceptualized as antisocial behaviours and the rationales for these. Such behaviours included: scamming, racist/homophobic attacks, sim attacks, avatar attacks, non-conformance to contextual norms, counterfeiting and unneighbourly behaviour. The rationales for sub behaviours included: profit, fun, status building, network disruption, accidental acts and prejudice. Through our analysis we are able to comment upon the difficulties of defining antisocial behaviour in such environments, particularly when such environments are subject to interpretation vis their use and expected norms. We also point to the problems we face in conducting our public and private lives given the role ICTs are playing in the convergence of these two spaces and also the convergence of ICTs themselves.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Organisational dependence upon IT continues to grow yet experiences of satisfaction vary widely. Problematic, aged IT is often cited as being a fundamental problem in this respect and this is commonly termed legacy information systems. However, in this paper the author offers an alternative, and arguably more comprehensive, theory of legacy information systems that accommodates multiple viewpoints and recognises its inherent dynamism. The paper suggests a theory of legacy information systems that comprises of the concepts of temporal effects, interpretations and characteristics. It is argued that legacy information systems are constructed of many ‘legacies’ that are handed down continuously, forming an amorphous set of sociotechnical interdependencies and relationships.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of spoken term detection (STD) is to find all occurrences of a specified query term in a large audio database. This process is usually divided into two steps: indexing and search. In a previous study, it was shown that knowing the topic of an audio document would help to improve the accuracy of indexing step which results in a better performance for STD system. In this paper, we propose the use of topic information not only in the indexing step, but also in the search step. Results of our experiments show that topic information could also be used in search step to improve the STD accuracy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis presents new methods for classification and thematic grouping of billions of web pages, at scales previously not achievable. This process is also known as document clustering, where similar documents are automatically associated with clusters that represent various distinct topic. These automatically discovered topics are in turn used to improve search engine performance by only searching the topics that are deemed relevant to particular user queries.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This practice framework is designed for health practitioners and allied health care workers. The framework provides empirically-based descriptions of ageing Australians’ experiences of health information literacy and suggests how these may provide a foundation for helping ageing Australians enhance their health information literacy. Health information literacy is understood here to be people’s use of relevant information to learn about health.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction This research is the first to investigate the experiences of teacher-librarians as evidence-based practice. An empirically derived model is presented in this paper. Method This qualitative study utilised the expanded critical incident approach, and investigated the real-life experiences of fifteen Australian teacher-librarians, through semi-structured interviews and inductive data analysis. Data collection utilised semi-structured interviews, on-site observations, journaling and the rubric for contextual information. These approaches allowed each of the interviewees to tell their own story and provided richness to the data. Analysis The analysis involved two types of data categorisation: binary and thematic. Binary classification was used to identify factual details. Thematic analysis involved categorising the emerging themes. Results An empirically derived model for evidence-based practice was devised and associated critical findings identified. The results demonstrate that evidence-based practice for teacher-librarians is a holistic practice. It is not a linear, step-by-step process. Conclusions This study is significant for teacher-librarians and library and information professionals as it provides new understanding of evidence-based practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

WikiLeaks has become a global phenomenon, and its founder and spokesman Julian Assange an international celebrity (or terrorist, depending on one’s perspective). But perhaps this focus on Assange and his website is as misplaced as the attacks against Napster and its founders were a decade ago: WikiLeaks itself only marks a new phase in a continuing shift in the balance of power between states and citizens, much as Napster helped to undermine the control of major music labels over the music industry. If the history of music filesharing is any guide, no level of punitive action against WikiLeaks and its supporters is going to re-contain the information WikiLeaks has set loose.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This digital poster (which was on display at "The Cube", Queensland University of Technology) demonstrates how specification parameters can be extracted from a product library repository for use in augmenting the information contents of the objects in a local BIM tool (Revit in this instance).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Building information models have created a paradigm shift in how buildings are built and managed by providing a dynamic repository for building data that is useful in many new operational scenarios. This change has also created an opportunity to use building information models as an integral part of security operations and especially as a tool to facilitate fine-grained access control to building spaces in smart buildings and critical infrastructure environments. In this paper, we identify the requirements for a security policy model for such an access control system and discuss why the existing policy models are not suitable for this application. We propose a new policy language extension to XACML, with BIM specific data types and functions based on the IFC specification, which we call BIM-XACML.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Building information models are increasingly being utilised for facility management of large facilities such as critical infrastructures. In such environments, it is valuable to utilise the vast amount of data contained within the building information models to improve access control administration. The use of building information models in access control scenarios can provide 3D visualisation of buildings as well as many other advantages such as automation of essential tasks including path finding, consistency detection, and accessibility verification. However, there is no mathematical model for building information models that can be used to describe and compute these functions. In this paper, we show how graph theory can be utilised as a representation language of building information models and the proposed security related functions. This graph-theoretic representation allows for mathematically representing building information models and performing computations using these functions.