799 resultados para Static average-case analysis


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Individuals, organizations, and governments are increasingly becoming aware of the necessity of sustainability in living, organizing, performing, and managing work. In this context, “green IS” has become an established colloquial term, acknowledging that information technology, corporate information systems, and the surrounding practices are both a contributor to the sustainability challenge and a potential enabler for green and sustainable practices. To date, however, there are few reported studies on the role of information systems for the challenge, and solution, of sustainability. This paper presents results from a case study of a world-wide operating IT software solution provider that is engaged in the development and adoption of sustainable practices. Our study suggests that the adoption of sustainable practices comes along with a number of particularities. We found information technology to be a key enabler of transparency about the progress of sustainability operations. We further found personal, motivator factors as well as organizational factors such as business inclusion, strategy definition, and a dialectic top-management and bottom-up support, to play a role in enabling a company to manage their sustainability. We describe a set of conjectures forthcoming from our case analysis, and detail some implications for further research in this area.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The adoption of Internet technologies by the small business sector (SMEs)The adoption of Internet technologies by the small business sector is important to their on-going survival. Yet, given the opportunities and benefits that Internet technologies can provide it has been shown that Australian small businesses are relatively slow in adopting them. This paper develops a model from recent literature on the facilitators and inhibitors to the adoption of Internet technologies by small business. Cross-case analysis of findings from three case studies are presented. Findings indicate that perceived lack of business benefit, mistrust of the IT industry and lack of understanding of Internet technologies are major inhibitors to Internet adoption by small business.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This book examines the principles and practice of real estate mortgages in an easily accessible text referenced to all the Australian States. It specifically deals with the major theoretical and practical aspects of the land mortgage including vitiating factors in formation, mortgagees powers and duties and mortgagors’ rights both statutory and other, assignment, insurance and discharge. As a successor to Mortgages Law in Australia, this book adopts an exclusive focus on real estate mortgages in Australia and provides a thorough account of the law through analysis of the plethora of court decisions and statutory provisions in this area. Duncan and Dixon analyse the substance of the mortgage transaction from creation through to rights of enforcement. This analysis includes detailed consideration of the rights and obligations of both mortgagors and mortgagees covering topics such as priorities and tacking, insurance, variation and assignment, rights of discharge, entry into possession, foreclosure and power of sale. In addition, the book contains a separate chapter on factors that may affect the validity and enforcement of a mortgage together with separate consideration of a mortgagee’s right to enforce a guarantee provided on behalf of a mortgagor and the rights and liabilities associated with a receivership regime initiated by a mortgagee. Written for the national market, the book is one of the few substantial works on this subject for practitioners throughout Australia. It is a very accessible text which enables readers to decide whether or not they have a problem and provides primary guidance to its solution. The book has been deliberately, heavily referenced to incorporate statutory references from across Australia and contains extensive case analysis in order to satisfy both these objectives.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In 2008, extra-curricular career development programs developed for psychology undergraduates at the Queensland University of Technology were incorporated into the formal curriculum. While a whole of course approach has been adopted, this session will explore the impact of a new introductory unit, Psychology in Professional Contexts, which adopts a constructivist approach to student career exploration. First-year students are introduced to key theories, models, and processes of career development, and the diversity of contexts in which their psychological knowledge can be applied, while developing and highlighting the value of important generic abilities such as critical thinking, team communication, critical reflection, and information literacy. Materials are drawn from the media, guest speakers’ professional profiles, the students’ own experiences, and traditional and emerging areas of psychology. Assessment and learning activities involve case analysis, problem-based learning, and discussion-based classes. The content of these professional development classes is also aligned with that of the core discipline units studied concurrently, to encourage the transfer of career development skills and knowledge across the psychology curriculum. This presentation will focus on 4 years of curriculum development in Psychology in Professional Contexts, and discuss changes initiated in 2011 which incorporate interactive online environments and extend the role of problem-based learning.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The question "what causes variety in organisational routines" is of considerable interest to organisational scholars, and one to which this thesis seeks to answer. To this end an evolutionary theory of change is advanced which holds that the dynamics of selection, adaptation and retention explain the creation of variety in organisational routines. A longitudinal, multi-level, multi-case analysis is undertaken in this thesis, using multiple data collection strategies. In each case, different types of variety were identified, according to a typology, together with how selection, adaptation and retention contribute to variety in a positive or negative sense. Methodologically, the thesis makes a contribution to our understanding of variety, as certain types of variety only become evident when examined by specific types of research design. The research also makes a theoretical contribution by explaining how selection, adaptation and retention individually and collectively contribute to variety in organisational routines. Moreover, showing that routines could be stable, diverse, adaptive and dynamic at the same time; is a significant, and novel, theoretical contribution.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Non-state insurgent actors are too weak to compel powerful adversaries to their will, so they use violence to coerce. A principal objective is to grow and sustain violent resistance to the point that it either militarily challenges the state, or more commonly, generates unacceptable political costs. To survive, insurgents must shift popular support away from the state and to grow they must secure it. State actor policies and actions perceived as illegitimate and oppressive by the insurgent constituency can generate these shifts. A promising insurgent strategy is to attack states in ways that lead angry publics and leaders to discount the historically established risks and take flawed but popular decisions to use repressive measures. Such decisions may be enabled by a visceral belief in the power of coercion and selective use of examples of where robust measures have indeed suppressed resistance. To avoid such counterproductive behaviours the cases of apparent 'successful repression' must be understood. This thesis tests whether robust state action is correlated with reduced support for insurgents, analyses the causal mechanisms of such shifts and examines whether such reduction is because of compulsion or coercion? The approach is founded on prior research by the RAND Corporation which analysed the 30 insurgencies most recently resolved worldwide to determine factors of counterinsurgent success. This new study first re-analyses their data at a finer resolution with new queries that investigate the relationship between repression and insurgent active support. Having determined that, in general, repression does not correlate with decreased insurgent support, this study then analyses two cases in which the data suggests repression seems likely to be reducing insurgent support: the PKK in Turkey and the insurgency against the Vietnamese-sponsored regime after their ousting of the Khmer Rouge. It applies 'structured-focused' case analysis with questions partly built from the insurgency model of Leites and Wolf, who are associated with the advocacy of US robust means in Vietnam. This is thus a test of 'most difficult' cases using a 'least likely' test model. Nevertheless, the findings refute the deterrence argument of 'iron fist' advocates. Robust approaches may physically prevent effective support of insurgents but they do not coercively deter people from being willing to actively support the insurgency.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Recent Australian early childhood policy and curriculum guidelines promoting the use of technologies invite investigations of young children’s practices in classrooms. This study examined the practices of one preparatory year classroom, to show teacher and child interactions as they engaged in Web searching. The study investigated the in situ practices of the teacher and children to show how they accomplished the Web search. The data corpus consists of eight hours of videorecorded interactions over three days where children and teachers engaged in Web searching. One episode was selected that showed a teacher and two children undertaking a Web search. The episode is shown to consist of four phases: deciding on a new search subject, inputting the search query, considering the result options, and exploring the selected result. The sociological perspectives of ethnomethodology and conversation analysis were employed as the conceptual and methodological frameworks of the study, to analyse the video-recorded teacher and child interactions as they co-constructed a Web search. Ethnomethodology is concerned with how people make ‘sense’ in everyday interactions, and conversation analysis focuses on the sequential features of interaction to show how the interaction unfolds moment by moment. This extended single case analysis showed how the Web search was accomplished over multiple turns, and how the children and teacher collaboratively engaged in talk. There are four main findings. The first was that Web searching featured sustained teacher-child interaction, requiring a particular sort of classroom organisation to enable the teacher to work in this sustained way. The second finding was that the teacher’s actions recognised the children’s interactional competence in situ, orchestrating an interactional climate where everyone was heard. The third finding was that the teacher drew upon a range of interactional resources designed to progress the activity at hand, that of accomplishing the Web search. The teacher drew upon the interactional resources of interrogatives, discourse markers, and multi-unit turns during the Web search, and these assisted the teacher and children to co-construct their discussion, decide upon and co-ordinate their future actions, and accomplish the Web search in a timely way. The fourth finding explicates how particular social and pedagogic orders are accomplished through talk, where children collaborated with each other and with the teacher to complete the Web search. The study makes three key recommendations for the field of early childhood education. The study’s first recommendation is that fine-grained transcription and analysis of interaction aids in understanding interactional practices of Web searching. This study offers material for use in professional development, such as using transcribed and videorecorded interactions to highlight how teachers strategically engage with children, that is, how talk works in classroom settings. Another strategy is to focus on the social interactions of members engaging in Web searches, which is likely to be of interest to teachers as they work to engage with children in an increasingly online environment. The second recommendation involves classroom organisation; how teachers consider and plan for extended periods of time for Web searching, and how teachers accommodate children’s prior knowledge of Web searching in their classrooms. The third recommendation is in relation to future empirical research, with suggested possible topics focusing on the social interactions of children as they engage with peers as they Web search, as well as investigations of techno-literacy skills as children use the Internet in the early years.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Smartphones are steadily gaining popularity, creating new application areas as their capabilities increase in terms of computational power, sensors and communication. Emerging new features of mobile devices give opportunity to new threats. Android is one of the newer operating systems targeting smartphones. While being based on a Linux kernel, Android has unique properties and specific limitations due to its mobile nature. This makes it harder to detect and react upon malware attacks if using conventional techniques. In this paper, we propose an Android Application Sandbox (AASandbox) which is able to perform both static and dynamic analysis on Android programs to automatically detect suspicious applications. Static analysis scans the software for malicious patterns without installing it. Dynamic analysis executes the application in a fully isolated environment, i.e. sandbox, which intervenes and logs low-level interactions with the system for further analysis. Both the sandbox and the detection algorithms can be deployed in the cloud, providing a fast and distributed detection of suspicious software in a mobile software store akin to Google's Android Market. Additionally, AASandbox might be used to improve the efficiency of classical anti-virus applications available for the Android operating system.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Enterprise resource planning (ERP) software is a dominant approach for dealing with legacy information system problems. In order to avoid invalidating maintenance and development support from the ERP vendor, most organizations reengineer their business processes in line with those implicit within the software. Regardless, some customization is typically required. This paper presents two case studies of ERP projects where customizations have been performed. The case analysis suggests that while customizations can give true organizational benefits, careful consideration is required to determine whether a customization is viable given its potential impact upon future maintenance. Copyright © 2001 John Wiley & Sons, Ltd.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

One of the most common ways to share project knowledge is to capture the positive and negative aspects of projects in the form of lessons learned (LL). If effectively used, this process can assist project managers in reusing project knowledge and preventing future projects from repeating mistakes. Nevertheless, the process of capturing, storing, reviewing and reusing LL often remains suboptimal. Despite the potential for rich knowledge capture, lessons are often documented as simple, line-item statements devoid of context. Findings from an empirical investigation across four cases revealed a range of reasons related to the perceived quality, process and visibility of LL that lead to their limited use and application. Drawn from the cross-case analysis, this paper investigates an integrated approach to LL involving the use of a collaborative Web-based tool, which is easily accessible, intelligible and user-friendly, allowing more effective sharing of project knowledge and overcoming existing problems with LL.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Current research into project management offices (PMOs) has stressed the PMOs' potential to act as knowledge brokers between projects, and between project and top management. Nonetheless, the literature does not provide sufficient evidence of the brokering role of PMOs. The research reported here aims to examine PMO's functions from a knowledge sharing perspective and explore whether or not these functions reflect the knowledge sharing needs of project managers (PMs). These issues are investigated through a cross-case analysis of seven organisations. The main contribution is insight into how PMs share knowledge and awareness of the need to structure PMOs to align with PMs' nature, needs and expectations in order to improve knowledge sharing in PBOs. Finally, some practical steps for helping PMOs to better adapt their functions to the needs of PMs and their learning and knowledge sharing style are proposed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Research on opportunity has been extensively studied in contexts of new firm or new venture creation (Choi & Shepherd, 2004; Mullins & Forlani, 2005; Ozgen & Baron, 2007) where start-ups and new ventures use both opportunity discovery and opportunity creation (Alvarez & Barney 2005, 2007). Less research is found on examining the relationship between opportunity and innovation in existing firms (with Drucker (1985) an exception). In large firms, opportunity recognition has been analysed in terms of antecedent conditions, elements and outcomes (Ireland, Covin & Kuratko, 2009), but to date less attention has been given to how small and medium enterprises capture and use opportunities to remain competitive. Little research has been carried out regarding how smaller firms use opportunities to create new business with existing customers or use technological advances with new customers to create new economic activity, growth and competitive advantage. This study presents findings from a comparative case analysis of 20 diverse firms in the spatial information industry and identifies constructs associated with identifying opportunities that lead to better business performance and firm level innovation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This research was commissioned by Metecno Pty Ltd, trading as Bondor®. The InsulLiving house was designed and constructed by Bondor®. The house instrumentation (electricity circuits, indoor environment, weather station) was provided by Bondor and supplied and installed by independent contractors. This report contains analysis of data collected from the InsulLiving house at Burpengary during 1 year of occupancy by a family of four for the period 1 April 2012 – 31 March 2013. The data shows a daily average electricity consumption 48% less than the regional average. The analysis confirms that the 9 star house performed thermally slightly better than the simulated performance. The home was 'near zero energy', with its modest 2.1kW solar power system meeting all of the needs for space heating and cooling, lighting and most water heating.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

BACKGROUND Research on engineering design is a core area of concern within engineering education and a fundamental understanding of how engineering students approach and undertake design is necessary in order to develop effective design models and pedagogies. Understanding the factors related to design experiences in education and how they affect student practice can help educators as well as designers to leverage these factors as part of the design process. PURPOSE This study investigated the design practices of first-year engineering students’ and their experiences with a first-year engineering course design project. The research questions that guided the investigation were: 1. From a student perspective, what design parameters or criteria are most important? 2. How does this perspective impact subsequent student design practice throughout the design process? DESIGN/METHOD The authors employed qualitative multi-case study methods (Miles & Huberman, 1994) in order to the answer the research questions. Participant teams were observed and video recorded during team design meetings in which they researched the background for the design problem, brainstormed and sketched possible solutions, as well as built prototypes and final models of their design solutions as part of a course design project. Analysis focused on explanation building (Yin, 2009) and utilized within-case and cross-case analysis (Miles & Huberman, 1994). RESULTS We found that students focused disproportionally on the functional parameter, i.e. the physical implementation of their solution, and the possible/applicable parameter, i.e. a possible and applicable solution that benefited the user, in comparison to other given parameters such as safety and innovativeness. In addition, we found that individual teams focused on the functional and possible/ applicable parameters in early design phases such as brainstorming/ ideation and sketching. When prompted to discuss these non-salient parameters (from the student perspective) in the final design report, student design teams often used a post-hoc justification to support how the final designs fit the parameters that they did not initially consider. CONCLUSIONS This study suggests is that student design teams become fixated on (and consequently prioritize) certain parameters they interpret as important because they feel these parameters were described more explicitly in terms how they were met and assessed. Students fail to consider other parameters, perceived to be less directly assessable, unless prompted to do so. Failure to consider other parameters in the early design phases subsequently affects their approach in design phases as well. Case studies examining students’ study strategies within three Australian Universities illustrate similarities with some student approaches to design.