894 resultados para DATA INTEGRATION
Resumo:
Collaboration has been enacted as a core strategy by both the government and nongovernment sectors to address many of the intractable issues confronting contemporary society. The cult of collaboration has become so pervasive that it is now an elastic term referring generally to any form of ‘working together’. The lack of specificity about collaboration and its practice means that it risks being reduced to mere rhetoric without sustained practice or action. Drawing on an extensive data set (qualitative, quantitative) of broadly collaborative endeavours gathered over ten years in Queensland, Australia, this paper aims to fill out the black box of collaboration. Specifically it examines the drivers for collaboration, dominant structures and mechanisms adopted, what has worked and unintended consequences. In particular it investigates the skills and competencies required in an embeded collaborative endeavour within and across organisations. Social network analysis is applied to isolate the structural properties of collaborations over other forms of integration as well as highlighting key roles and tasks. Collaboration is found to be a distinctive form of working together, characterised by intense and interdependent relationships and exchanges, higher levels of cohesion (density) and requiring new ways of behaving, working, managing and leading. These elements are configured into a practice framework. Developing an empirical evidence base for collaboration structure, practice and strategy provides a useful foundation for theory extension. The paper concludes that for collaboration, to be successfully employed as a management strategy it must move beyond rhetoric and develop a coherent model for action.
Resumo:
The delivery of human services occurs through a complex and often volatile system characterised by both competing and cooperating efforts. A recent strategic intention of government has been to integrate disparate service providers and programs into a more effective and efficient system using competitive funding regimes. A program of amalgamation has also been forecast and promoted as a further mechanism by which to link up smaller agencies thus creating economy and efficiency in the scale and scope of their service modes. Despite the current reliance on competitive funding models and amalgamation as the preferred ways forward for the sector little is known about their integrative capacity including their ability to predict outcomes and their consequences : the ‘unknown unknowns’. Drawing on an extensive data set of human services integration initiatives in Queensland, Australia, this paper examines the impact of government policy and service models and the risks arising from the tensions between competition and accountability on the one hand and the established good will and trust on the other. It is argued that unresolved, these tensions can lead to a weakening of the social infrastructure and make the system more vulnerable to inherent systemic risks. The paper finds that government’s efforts to externalise risk to the non-government sector leads to fragmentation of the service system and fractured collaborative capability. These unintended outcomes themselves have the unintended consequence of leaving governments disconnected from the service system and unable to provide the leadership role and direction necessary for sustained integration. Moreover, facilitating such a leadership role is undermined by behaviours that are directly contrary to collective integration models.
Resumo:
This paper presents a practical framework to synthesize multi-sensor navigation information for localization of a rotary-wing unmanned aerial vehicle (RUAV) and estimation of unknown ship positions when the RUAV approaches the landing deck. The estimation performance of the visual tracking sensor can also be improved through integrated navigation. Three different sensors (inertial navigation, Global Positioning System, and visual tracking sensor) are utilized complementarily to perform the navigation tasks for the purpose of an automatic landing. An extended Kalman filter (EKF) is developed to fuse data from various navigation sensors to provide the reliable navigation information. The performance of the fusion algorithm has been evaluated using real ship motion data. Simulation results suggest that the proposed method can be used to construct a practical navigation system for a UAV-ship landing system.
Resumo:
In recent years, enterprise architecture (EA) has captured a growing attention as a means to systematically consolidate and interrelate diverse business and IT artefacts in order to provide holistic decision support. The recent popularity of a service-orientation has added “service “and related constructs as a new element that requires consideration within an Enterprise Architecture. Since the emergence of the Service-Oriented Architecture (SOA), many attempts have been made to incorporate SOA artefacts in existing EA frameworks. Yet, the approaches taken to achieve this goal differ substantially for the most commonly used EA frameworks to date. SOA in the context of enterprise architecture is one of the future research challenges. Several authors argue that further research is needed in order to understand how SOA impacts prior enterprise architecture frameworks. This study explores SOA integration within EA, identifies SOA integration approaches within EA and identifies factors that impact SOA integration within Enterprise Architecture.
Resumo:
Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.
Collaboration : developing integration in multi-purpose services in rural New South Wales, Australia
Resumo:
Introduction: The Multi-purpose Service (MPS) Program was introduced to rural Australia in 1991 as a solution to poor health outcomes in rural compared with metropolitan populations, difficulty in attracting healthcare staff and a lack of viability and range of health services in rural areas. The aim of this study was to describe the main concerns of participants involved in the development of multi-purpose services in rural New South Wales (NSW). This article is abstracted from a larger study and discusses the extent to which collaboration occurred within the new multi-purpose service. Methods: A constructivist grounded theory methodology was used. Participants were from 13 multi-purpose services in rural NSW and 30 in-depth interviews were conducted with 6 community members, 11 managers and 13 staff members who had been involved in the process of developing a multi-purpose service. Results: The main concern of all participants was their anticipation of risk. This anticipation of risk manifested itself in either trust or suspicion and explained their progression through a phase of collaborating. Participants who had trust in other stakeholders were more likely to embrace an integrated health service identity. Those participants, who were suspicious that they would lose status or power, maintained that the previous hospital services provided a better health service and described a coexistence of services within the multi-purpose service. Conclusions: This study provided an insight into the perceptions of community members, staff members and managers involved in the process of developing a multi-purpose service. It revealed that the anticipation of risk was intrinsic to a process of changing from a traditional hospital service to collaborating in a new model of health care provided at a multi-purpose service.