987 resultados para Information science


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Remote technologies are changing our way of life. The radio frequency identification (RFJD) system is a new technology which uses the open air to transmit information. This information transmission needs to be protected to provide user safety and privacy. Business will look for a 5ystem that hasfraud resilience to prevent the misuse of information to take dishonest advantage. The business and the user need to be assured that the transmitted information has no content which is capable of undertaking malicious activities. Public awareness of RFID security will help users and organizations to understand the need for security protection. Publishing a security guideline from the regulating body and monitoring implementation of that guideline in RFID 5ystems will ensure that businesses and users are protected. This chapter explains the importance of security in a RFID system and will outline the protective measures. It also points out the research direction of RFID 5ystems.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This chapter examines the impact of eLearning and Web 2.0 social media in a socially conservative environment in Indonesia that has nevertheless proven surprisingly adroit at change management. Web 2.0 social media has proven enormously popular in Indonesia but traditional Islamic schools (which are known in Java as pesantren but elsewhere in the Muslim world as madrasah) the focus of this study is often unable to access Web 2.0 or the Internet in general. Progressive non-national government organizations (NGOs) seek to remedy this situation by providing satellite broadband links to remote schools and this chapter examines one particular project. Despite the impoverished and conservative nature of their community, the leaders of this school have led their students in a surprisingly enthusiastic reception of eLearning technology, recognizing its great capacity to produce and enhance social networks and provide new opportunities for learning. Particular attention in this case study is given to factors relating to social capital, attitudes, and patterns of behavior in leadership and change management. A case study approach was chosen to enable a richer and more finely-grained analysis of the issues. The case study is based on semi-structured interviews and observations conducted over several years. This research shows that whilst the adoption and uptake of eLearning with emerging technologies is strongly shaped by cultural and social factors, it plays out in very different ways than might first have been expected.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Organizational memory, the knowledge gained from organizational experience, has significant potential for competitive advantage. Many authors in the knowledge management and human resource management literatures consider mentoring to be a particularly effective method of transferring organizational memory. In addition, older workers are often considered ideal mentors in organizations because of their experience and alleged willingness to pass on their knowledge to less experienced employees. There is an associated assumption that these workers also anticipate and experience positive outcomes when mentoring others. This chapter considers whether these assumptions hold up in the workplaces of the 21st century, particularly within Western countries. Individualistic cultural norms and some discriminatory practices towards older workers, along with a changing career contract that no longer guarantees employment in one organization for life, may discourage knowledge sharing in organizations. This chapter discusses the constraints and motivations that may operate when older experienced workers consider mentoring others. It considers relevant global and organizational cultural characteristics that may influence mentoring to transfer knowledge, and accordingly suggests strategies for those eager to capitalise on the knowledge experienced employees possess.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Expectations of, and by, students and staff in the classroom have been well researched. Yet, still there is a gap between the expectations of students and what they experience in their studies. The classroom itself is changing with the introduction of Web 2.0 technologies into the mix. Further changes are being driven by the changing profile of a tertiary student in the twenty first century. Education will not fulfill its goal if the gap in expectations is not addressed. The discrepancy in expectations is explored from the perspective of students and staff and strategies for bridging the gap and enhancing eLearning in the Web 2.0 environment are offered. The chapter begins with a scenario that demonstrates the issues and concludes with suggestions to avoid them in the future. In doing so, the key drivers of change in the learning landscape in Australia are identified and the impact these may have on staff and student expectations is explored.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This chapter explores the engagement of tertiary students in interviewing “green” experts. Using Engeström’s expansive activity model, the study finds that integrating podcasting into a course with strong links to other activities and resources helped students assimilate and develop the concepts of the course. The project promotes functionalist values of independent, experimental learning and deep engagement with learning material, it invokes authentic field experience, accommodates different learning styles and it provides considerable motivation.

The study suggests that mobile learning embodies the means to change relationships between learner and expert and that such connecting is a key attribute of contemporary subjective association and recontextualization. The chapter provides a brief review of the literature on podcasting in education, followed by the teaching and learning context and the application of Engeström’s “expansive activity model” (1994, 2001, 2002, 2004, 2008, 2010). I describe the student group undertaking the exercises in a Level 5 Sociology course, and the project (which subsequently extended into a later course: “The Sustainable Business Environment”, because many of the podcast students had pre-enrolled in that course).

The paper discusses the methodological approach that was used, offering two strands of analysis: students’ use of the podcasts and how the latter were placed in their learning about sustainable development. The discussion section elaborates the model and offers suggestions for advancing the educational use of podcasts. Last, I offer some thoughts on how Engeström’s model might be extended in education to develop not just new objects, but also the new use of objects.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Content adaptation is used to adapt multimedia content to a version required by users. In the service-oriented scheme, adaptation functions are provided as services by third-party service providers. Clients pay for the consumed services and thus demand service quality. Providers advertise their services; each with varied quality-of-services (QoS). Some of these QoS however, may not be deliverable accordingly during the actual service execution due to heavy load. Thus, the provider should able to determine a current deliverable QoS before the service level agreement (SLA) is settled with the requesters. In this paper, we propose a strategy for service providers to evaluate incoming requests and capable of offering the new QoS to the requests potentially being initially rejected. The proposed strategy takes into account the current server load and requests' priority. We analysed the performance of the proposed strategy in terms of SLA settlement under various conditions. The results indicate that the proposed strategy performs well. © 2014 IEEE.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Subsequent to the Australian 'Black Saturday' bushfires there were a number of issues arising from investigations with regard to the functional stability and resilience of communications systems and the flow of information between emergency response organisations, and their ability to provide relevant information to the general public. In some cases, the transference of information failed or was late or ineffective with regard to decisions, advice and information broadcasting during the crisis. This was particularly evident in terms of managing emergency organisational information requests and field situational advice both to and from emergency response management teams and the delivery of informative advice to the public. This paper analyses one such case study with a view of applying a systems modelling technique to determine the viability of the communication systems and information exchange structures associated with an emergency response agency.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

With the increasing trends of mobile interactions, voice authentication applications are in a higher demand, giving rise to new rounds of research activities. Authentication is an important security mechanism that requires the intended communication parties to present valid credentials to the communication network. In a stronger sense, all the involved parties are required to be authenticated to one another (mutual authentication). In the voice authentication technique described in this paper, the voice characteristics of an intended individual wishing to take part in a communication channel will be classified and processed. This involves a low overhead voice authentication scheme, which features equalization and scaling of the voice frequency harmonics. The performance of this system is discussed in a Labview 8.5 visual development environment, following a complete security analysis. © 2013 Elsevier Ltd. All rights reserved.

Relevância:

60.00% 60.00%

Publicador:

Relevância:

60.00% 60.00%

Publicador:

Resumo:

OBJECTIVE: To conduct a cost-effectiveness analysis of a hospital electronic medication management system (eMMS). METHODS: We compared costs and benefits of paper-based prescribing with a commercial eMMS (CSC MedChart) on one cardiology ward in a major 326-bed teaching hospital, assuming a 15-year time horizon and a health system perspective. The eMMS implementation and operating costs were obtained from the study site. We used data on eMMS effectiveness in reducing potential adverse drug events (ADEs), and potential ADEs intercepted, based on review of 1 202 patient charts before (n = 801) and after (n = 401) eMMS. These were combined with published estimates of actual ADEs and their costs. RESULTS: The rate of potential ADEs following eMMS fell from 0.17 per admission to 0.05; a reduction of 71%. The annualized eMMS implementation, maintenance, and operating costs for the cardiology ward were A$61 741 (US$55 296). The estimated reduction in ADEs post eMMS was approximately 80 actual ADEs per year. The reduced costs associated with these ADEs were more than sufficient to offset the costs of the eMMS. Estimated savings resulting from eMMS implementation were A$63-66 (US$56-59) per admission (A$97 740-$102 000 per annum for this ward). Sensitivity analyses demonstrated results were robust when both eMMS effectiveness and costs of actual ADEs were varied substantially. CONCLUSION: The eMMS within this setting was more effective and less expensive than paper-based prescribing. Comparison with the few previous full economic evaluations available suggests a marked improvement in the cost-effectiveness of eMMS, largely driven by increased effectiveness of contemporary eMMs in reducing medication errors.

Relevância:

60.00% 60.00%

Publicador:

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Alison Macrina is the founder and director of the Library Freedom Project, an initiative that aims to make real the promise of intellectual freedom in libraries. The Library Freedom Project trains librarians on the state of global surveillance, privacy rights, and privacy-protecting technology, so that librarians may in turn teach their communities about safeguarding privacy. In 2015, Alison was named one of Library Journal‘s Movers and Shakers. Read more about the Library Freedom Project at libraryfreedomproject.org.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Each year search engines like Google, Bing and Yahoo, complete trillions of search queries online. Students are especially dependent on these search tools because of their popularity, convenience and accessibility. However, what students are unaware of, by choice or naiveté is the amount of personal information that is collected during each search session, how that data is used and who is interested in their online behavior profile. Privacy policies are frequently updated in favor of the search companies but are lengthy and often are perused briefly or ignored entirely with little thought about how personal web habits are being exploited for analytics and marketing. As an Information Literacy instructor, and a member of the Electronic Frontier Foundation, I believe in the importance of educating college students and web users in general that they have a right to privacy online. Class discussions on the topic of web privacy have yielded an interesting perspective on internet search usage. Students are unaware of how their online behavior is recorded and have consistently expressed their hesitancy to use tools that disguise or delete their IP address because of the stigma that it may imply they have something to hide or are engaging in illegal activity. Additionally, students fear they will have to surrender the convenience of uber connectivity in their applications to maintain their privacy. The purpose of this lightning presentation is to provide educators with a lesson plan highlighting and simplifying the privacy terms for the three major search engines, Google, Bing and Yahoo. This presentation focuses on what data these search engines collect about users, how that data is used and alternative search solutions, like DuckDuckGo, for increased privacy. Students will directly benefit from this lesson because informed internet users can protect their data, feel safer online and become more effective web searchers.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In recent decades, library associations have advocated for the adoption of privacy and confidentiality policies as practical support to the Library Code of Ethics with a threefold purpose to (1) define and uphold privacy practices within the library, (2) convey privacy practices to patrons and, (3) protect against potential liability and public relations problems. The adoption of such policies has been instrumental in providing libraries with effective responses to surveillance initiatives such as warrantless requests and the USA PATRIOT ACT. Nevertheless, as reflected in recent news stories, the rapid emergence of data brokerage relationships and technologies and the increasing need for libraries to utilize third party vendor services have increased opportunities for data surveillers to access patrons’ personal information and reading habits, which are funneled and made available through multiple online library service platforms. Additionally, the advice that libraries should “contract for the same level of privacy reflected in their privacy policies” is no longer realistic given that the existence of multiple vendor contracts negotiated at arms length is likely to produce varying privacy terms and even varying definitions of what constitutes personal information (PII). These conditions sharply threaten the effectiveness and relevance of library privacy policies and privacy initiatives in that such policies increasingly offer false comfort by failing to reflect privacy weaknesses in the data sharing landscape and vendor contracts when library-vendor contracts fail to keep up with vendor data sharing capabilities. While some argue that library privacy ethics are antiquated and rendered obscure in the current online sharing economy PEW studies point to pronounced public discomfort with increasing privacy erosion. At the same time, new directions in FTC enforcement raise the possibility that public institutions’ privacy policies may serve as swords to unfair or deceptive commercial trade practices – offering the potential of renewed relevance for library privacy and confidentiality policies. This dual coin of public concern and the potential for enhanced FTC enforcement suggests that when crafting privacy polices libraries must now walk the knife’s edge by offering patrons both realistic notice about the limitations of protections the library can ensure while at the same time publicly holding vendors accountable to library privacy ethics and expectations. Potential solutions for how to walk this edge are developed and offered as a subject for further discussion to assist the modification of model policies for both public and academic libraries alike.