788 resultados para Information protection and management
Resumo:
An Asset Management (AM) life-cycle constitutes a set of processes that align with the development, operation and maintenance of assets, in order to meet the desired requirements and objectives of the stake holders of the business. The scope of AM is often broad within an organization due to the interactions between its internal elements such as human resources, finance, technology, engineering operation, information technology and management, as well as external elements such as governance and environment. Due to the complexity of the AM processes, it has been proposed that in order to optimize asset management activities, process modelling initiatives should be adopted. Although organisations adopt AM principles and carry out AM initiatives, most do not document or model their AM processes, let alone enacting their processes (semi-) automatically using a computer-supported system. There is currently a lack of knowledge describing how to model AM processes through a methodical and suitable manner so that the processes are streamlines and optimized and are ready for deployment in a computerised way. This research aims to overcome this deficiency by developing an approach that will aid organisations in constructing AM process models quickly and systematically whilst using the most appropriate techniques, such as workflow technology. Currently, there is a wealth of information within the individual domains of AM and workflow. Both fields are gaining significant popularity in many industries thus fuelling the need for research in exploring the possible benefits of their cross-disciplinary applications. This research is thus inspired to investigate these two domains to exploit the application of workflow to modelling and execution of AM processes. Specifically, it will investigate appropriate methodologies in applying workflow techniques to AM frameworks. One of the benefits of applying workflow models to AM processes is to adapt and enable both ad-hoc and evolutionary changes over time. In addition, this can automate an AM process as well as to support the coordination and collaboration of people that are involved in carrying out the process. A workflow management system (WFMS) can be used to support the design and enactment (i.e. execution) of processes and cope with changes that occur to the process during the enactment. So far few literatures can be found in documenting a systematic approach to modelling the characteristics of AM processes. In order to obtain a workflow model for AM processes commonalities and differences between different AM processes need to be identified. This is the fundamental step in developing a conscientious workflow model for AM processes. Therefore, the first stage of this research focuses on identifying the characteristics of AM processes, especially AM decision making processes. The second stage is to review a number of contemporary workflow techniques and choose a suitable technique for application to AM decision making processes. The third stage is to develop an intermediate ameliorated AM decision process definition that improves the current process description and is ready for modelling using the workflow language selected in the previous stage. All these lead to the fourth stage where a workflow model for an AM decision making process is developed. The process model is then deployed (semi-) automatically in a state-of-the-art WFMS demonstrating the benefits of applying workflow technology to the domain of AM. Given that the information in the AM decision making process is captured at an abstract level within the scope of this work, the deployed process model can be used as an executable guideline for carrying out an AM decision process in practice. Moreover, it can be used as a vanilla system that, once being incorporated with rich information from a specific AM decision making process (e.g. in the case of a building construction or a power plant maintenance), is able to support the automation of such a process in a more elaborated way.
Resumo:
Information security policy defines the governance and implementation strategy for information security in alignment with the corporate risk policy objectives and strategies. Research has established that alignment between corporate concerns may be enhanced when strategies are developed concurrently using the same development process as an integrative relationship is established. Utilizing the corporate risk management framework for security policy management establishes such an integrative relationship between information security and corporate risk management objectives and strategies. There is however limitation in the current literature on presenting a definitive approach that fully integrates security policy management with the corporate risk management framework. This paper presents an approach that adopts a conventional corporate risk management framework for security policy development and management to achieve alignment with the corporate risk policy. A case example is examined to illustrate the alignment achieved in each process step with a security policy structure being consequently derived in the process. It is shown that information security policy management outcomes become both integral drivers and major elements of the corporate-level risk management considerations. Further study should involve assessing the impact of the use of the proposed framework in enhancing alignment as perceived in this paper.
Contextualizing the tensions and weaknesses of information privacy and data breach notification laws
Resumo:
Data breach notification laws have detailed numerous failures relating to the protection of personal information that have blighted both corporate and governmental institutions. There are obvious parallels between data breach notification and information privacy law as they both involve the protection of personal information. However, a closer examination of both laws reveals conceptual differences that give rise to vertical tensions between each law and shared horizontal weaknesses within both laws. Tensions emanate from conflicting approaches to the implementation of information privacy law that results in different regimes and the implementation of different types of protections. Shared weaknesses arise from an overt focus on specified types of personal information which results in ‘one size fits all’ legal remedies. The author contends that a greater contextual approach which promotes the importance of social context is required and highlights the effect that contextualization could have on both laws.
Resumo:
Efficient and effective urban management systems for Ubiquitous Eco Cities require having intelligent and integrated management mechanisms. This integration includes bringing together economic, socio-cultural and urban development with a well orchestrated, transparent and open decision-making system and necessary infrastructure and technologies. In Ubiquitous Eco Cities telecommunication technologies play an important role in monitoring and managing activities via wired and wireless networks. Particularly, technology convergence creates new ways in which information and telecommunication technologies are used and formed the backbone of urban management. The 21st Century is an era where information has converged, in which people are able to access a variety of services, including internet and location based services, through multi-functional devices and provides new opportunities in the management of Ubiquitous Eco Cities. This chapter discusses developments in telecommunication infrastructure and trends in convergence technologies and their implications on the management of Ubiquitous Eco Cities.
Resumo:
In today’s information society, electronic tools, such as computer networks for the rapid transfer of data and composite databases for information storage and management, are critical in ensuring effective environmental management. In particular environmental policies and programs for federal, state, and local governments need a large volume of up-to-date information on the quality of water, air, and soil in order to conserve and protect natural resources and to carry out meteorology. In line with this, the utilization of information and communication technologies (ICTs) is crucial to preserve and improve the quality of life. In handling tasks in the field of environmental protection a range of environmental and technical information is often required for a complex and mutual decision making in a multidisciplinary team environment. In this regard e-government provides a foundation of the transformative ICT initiative which can lead to better environmental governance, better services, and increased public participation in environmental decision- making process.
Resumo:
Transcending traditional national borders, the Internet is an evolving technology that has opened up many new international market opportunities. However, ambiguity remains, with limited research and understanding of how the Internet influences the firm’s internationalisation process components. As a consequence, there has been a call for further investigation of the phenomenon. Thus, the purpose of this study was to investigate the Internet’s impact on the internationalisation process components, specifically, information availability, information usage, interactive communication and international market growth. Analysis was undertaken using structural equation modelling. Findings highlight the mediating impact of the Internet on information and knowledge transference in the internationalisation process. Contributions of the study test conceptualisations and give statistical validation of interrelationships, while illuminating the Internet’s impact on firm internationalisation.
Resumo:
In the last 10 years, the third sector has seen an eruption of texts, websites, discussion forums, conferences, new journals, new research centres and sector-specific degrees. This growing abundance of information allows for hitherto impossible networking, collaboration and general awareness of what is happening in the sector. At the same time, however, like staff in many industries, nonprofit professionals can suffer from an increasingly common 21st century malaise known as ‘information anxiety’. It is worth examining the sector through the lens of Information Studies theory, to question what the information technology needs of nonprofits are and how their information management techniques may differ from those in the public and private sectors. There are implications of this both for those within the industry (in terms of governance, training and public relations) and those external to it (who may form relationships with nonprofits on the basis of access to information).
Resumo:
Understanding information technology’s (ITs) contribution to business value is an imperative issue, and while we have attempted to untangle the relationship between IT and business value with some success, our knowledge of specific factors leading to ITs contribution to business value still remains limited. In this paper we propose that complementing IT resources, by establishing a sound IT platform with capable organisational resources may aid in ITs ability to contribute to business value. We suggest that performance measurement of this contribution be undertaken at the business process level first, and then mapped through to firm level performance measurement to obtain a better understanding of the path of IT business value contribution.
Resumo:
Availability of health information is rapidly increasing and the expansion and proliferation of health information is inevitable. The Electronic Healthcare Record, Electronic Medical Record and Personal Health Record are at the core of this trend and are required for appropriate and practicable exchange and sharing of health information. However, it is becoming increasingly recognized that it is essential to preserve patient privacy and information security when utilising sensitive information for clinical, management and administrative processes. Furthermore, the usability of emerging healthcare applications is also becoming a growing concern. This paper proposes a novel approach for integrating consideration of information accountability with a perspective from usability engineering that can be applied when developing healthcare information technology applications. A social networking user case in the healthcare information exchange will be presented in the context of our approach.
Resumo:
Effective management of chronic diseases is a global health priority. A healthcare information system offers opportunities to address challenges of chronic disease management. However, the requirements of health information systems are often not well understood. The accuracy of requirements has a direct impact on the successful design and implementation of a health information system. Our research describes methods used to understand the requirements of health information systems for advanced prostate cancer management. The research conducted a survey to identify heterogeneous sources of clinical records. Our research showed that the General Practitioner was the common source of patient's clinical records (41%) followed by the Urologist (14%) and other clinicians (14%). Our research describes a method to identify diverse data sources and proposes a novel patient journey browser prototype that integrates disparate data sources.
Resumo:
Design and design thinking are identified as making valuable contributions to business and management. The numbers of higher education programs that teach design thinking to business students and executives are growing, however to date little information about the outcomes of these initiatives has emerged. This paper presents the findings from the incorporation of design thinking and methods in one unit of an MBA program. All 90 participants from three MBA classes wholeheartedly expressed their support for this initiative. An evaluation of this experiment found positive reactions, learning, changes in behaviour and positive results for their companies. The challenges and future directions for the inclusion of design thinking and design methods in management education programs are proposed.
Resumo:
Preface The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13–15 July, 2004. The conference was sponsored by the Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie University and the Australian Computer Society. The aims of the conference are to bring together researchers and practitioners working in areas of information security and privacy from universities, industry and government sectors. The conference program covered a range of aspects including cryptography, cryptanalysis, systems and network security. The program committee accepted 41 papers from 195 submissions. The reviewing process took six weeks and each paper was carefully evaluated by at least three members of the program committee. We appreciate the hard work of the members of the program committee and external referees who gave many hours of their valuable time. Of the accepted papers, there were nine from Korea, six from Australia, five each from Japan and the USA, three each from China and Singapore, two each from Canada and Switzerland, and one each from Belgium, France, Germany, Taiwan, The Netherlands and the UK. All the authors, whether or not their papers were accepted, made valued contributions to the conference. In addition to the contributed papers, Dr Arjen Lenstra gave an invited talk, entitled Likely and Unlikely Progress in Factoring. This year the program committee introduced the Best Student Paper Award. The winner of the prize for the Best Student Paper was Yan-Cheng Chang from Harvard University for his paper Single Database Private Information Retrieval with Logarithmic Communication. We would like to thank all the people involved in organizing this conference. In particular we would like to thank members of the organizing committee for their time and efforts, Andrina Brennan, Vijayakrishnan Pasupathinathan, Hartono Kurnio, Cecily Lenton, and members from ACAC and INSS.
Resumo:
Mitigating the environmental effects of global population growth, climatic change and increasing socio-ecological complexity is a daunting challenge. To tackle this requires synthesis: the integration of disparate information to generate novel insights from heterogeneous, complex situations where there are diverse perspectives. Since 1995, a structured approach to inter-, multi- and trans-disciplinary1 collaboration around big science questions has been supported through synthesis centres around the world. These centres are finding an expanding role due to ever-accumulating data and the need for more and better opportunities to develop transdisciplinary and holistic approaches to solve real-world problems. The Australian Centre for Ecological Analysis and Synthesis (ACEAS
Resumo:
Data on seasonal population abundance of Bemisia tabaci biotype B (silverleaf whitefly (SLW)) in Australian cotton fields collected over four consecutive growing seasons (2002/2003-2005/2006) were used to develop and validate a multiple-threshold-based management and sampling plan. Non-linear growth trajectories estimated from the field sampling data were used as benchmarks to classify adult SLW field populations into six density-based management zones with associated control recommendations in the context of peak flowering and open boll crop growth stages. Control options based on application of insect growth regulators (IGRs) are recommended for high-density populations (>2 adults/leaf) whereas conventional (non-IGR) products are recommended for the control of low to moderate population densities. A computerised re-sampling program was used to develop and test a binomial sampling plan. Binomial models with thresholds of T=1, 2 and 3 adults/leaf were tested using the field abundance data. A binomial plan based on a tally threshold of T=2 adults/leaf and a minimum sample of 20 leaves at nodes 3, 4 or 5 below the terminal is recommended as the most parsimonious and practical sampling protocol for Australian cotton fields. A decision support guide with management zone boundaries expressed as binomial counts and control options appropriate for various SLW density situations is presented. Appropriate use of chemical insecticides and tactics for successful field control of whiteflies are discussed.
Resumo:
Over 1 billion ornamental fish comprising more than 4000 freshwater and 1400 marine species are traded internationally each year, with 8-10 million imported into Australia alone. Compared to other commodities, the pathogens and disease translocation risks associated with this pattern of trade have been poorly documented. The aim of this study was to conduct an appraisal of the effectiveness of risk analysis and quarantine controls as they are applied according to the Sanitary and Phytosanitary (SPS) agreement in Australia. Ornamental fish originate from about 100 countries and hazards are mostly unknown; since 2000 there have been 16-fold fewer scientific publications on ornamental fish disease compared to farmed fish disease, and 470 fewer compared to disease in terrestrial species (cattle). The import quarantine policies of a range of countries were reviewed and classified as stringent or non-stringent based on the levels of pre-border and border controls. Australia has a stringent policy which includes pre-border health certification and a mandatory quarantine period at border of 1-3 weeks in registered quarantine premises supervised by government quarantine staff. Despite these measures there have been many disease incursions as well as establishment of significant exotic viral, bacterial, fungal, protozoal and metazoan pathogens from ornamental fish in farmed native Australian fish and free-living introduced species. Recent examples include Megalocytivirus and Aeromonas salmonicida atypical strain. In 2006, there were 22 species of alien ornamental fish with established breeding populations in waterways in Australia and freshwater plants and molluscs have also been introduced, proving a direct transmission pathway for establishment of pathogens in native fish species. Australia's stringent quarantine policies for imported ornamental fish are based on import risk analysis under the SPS agreement but have not provided an acceptable level of protection (ALOP) consistent with government objectives to prevent introduction of pests and diseases, promote development of future aquaculture industries or maintain biodiversity. It is concluded that the risk analysis process described by the Office International des Epizooties under the SPS agreement cannot be used in a meaningful way for current patterns of ornamental fish trade. Transboundary disease incursions will continue and exotic pathogens will become established in new regions as a result of the ornamental fish trade, and this will be an international phenomenon. Ornamental fish represent a special case in live animal trade where OIE guidelines for risk analysis need to be revised. Alternatively, for countries such as Australia with implied very high ALOP, the number of species traded and the number of sources permitted need to be dramatically reduced to facilitate hazard identification, risk assessment and import quarantine controls. Lead papers of the eleventh symposium of the International Society for Veterinary Epidemiology and Economics (ISVEE), Cairns, Australia