940 resultados para private interest theory


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Process modelling – the design and use of graphical documentations of an organisation’s business processes – is a key method to document and use information about business processes. Still, despite current interest in process modelling, this research area faces essential challenges. Key unanswered questions concern the impact of process modelling in organisational practice, and the mechanisms through which impacts are developed. To answer these questions and to provide a better understanding of process modelling impact, I turn to the concept of affordances. Affordances describe the possibilities for goal-oriented action that technical objects offer to specified users. This notion has received growing attention from IS researchers. I report on my efforts to further develop the IS discipline’s understanding of affordances and impacts from informational objects, such as process models used by analysts for purposes of information systems analysis and design. Specifically, I seek to extend existing theory on the emergence and actualisation of affordances. I develop a research model that describes the process by which affordances are perceived and actualised and explain their dependence on available information and actualisation effort. I present my plans for operationalising and testing this research model empirically, and provide details about my design of a full-cycle, mixed methods study currently in progress.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Criminal law scholarship is enjoying a renaissance in normative theory, evident in a growing list of publications from leading scholars that attempt to elucidate a set of principles on which criminalisation and criminal law might — indeed should — be based. This development has been less marked in Australia, where a stream of criminologically influenced criminal law scholarship, teaching and practice has emerged over nearly three decades. There are certain tensions between this predominantly contextual, process-oriented and criminological tradition that has emerged in Australia, characterised by a critical approach to the search for ‘general principles’ of the criminal law, and the more recent revival of interest in developing a set of principles on which a ‘normative theory of criminal law’ might be founded. Aspects of this tension will be detailed through examination of recent examples of criminalisation in New South Wales that are broadly representative of trends across all Australian urisdictions. The article will then reflect on the links between these particular features of criminalisation and attempts to develop a ‘normative theory’ of criminalisation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The rapid development of the World Wide Web has created massive information leading to the information overload problem. Under this circumstance, personalization techniques have been brought out to help users in finding content which meet their personalized interests or needs out of massively increasing information. User profiling techniques have performed the core role in this research. Traditionally, most user profiling techniques create user representations in a static way. However, changes of user interests may occur with time in real world applications. In this research we develop algorithms for mining user interests by integrating time decay mechanisms into topic-based user interest profiling. Time forgetting functions will be integrated into the calculation of topic interest measurements on in-depth level. The experimental study shows that, considering temporal effects of user interests by integrating time forgetting mechanisms shows better performance of recommendation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Proxy re-encryption (PRE) is a highly useful cryptographic primitive whereby Alice and Bob can endow a proxy with the capacity to change ciphertext recipients from Alice to Bob, without the proxy itself being able to decrypt, thereby providing delegation of decryption authority. Key-private PRE (KP-PRE) specifies an additional level of confidentiality, requiring pseudo-random proxy keys that leak no information on the identity of the delegators and delegatees. In this paper, we propose a CPA-secure PK-PRE scheme in the standard model (which we then transform into a CCA-secure scheme in the random oracle model). Both schemes enjoy highly desirable properties such as uni-directionality and multi-hop delegation. Unlike (the few) prior constructions of PRE and KP-PRE that typically rely on bilinear maps under ad hoc assumptions, security of our construction is based on the hardness of the standard Learning-With-Errors (LWE) problem, itself reducible from worst-case lattice hard problems that are conjectured immune to quantum cryptanalysis, or “post-quantum”. Of independent interest, we further examine the practical hardness of the LWE assumption, using Kannan’s exhaustive search algorithm coupling with pruning techniques. This leads to state-of-the-art parameters not only for our scheme, but also for a number of other primitives based on LWE published the literature.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article reports on a review of selected theory and practice in sports journalism to determine if the prominence of female journalists reporting the news of a major sporting movement, and industry, the Australian Football League (AFL) could be attributed to a feminist response to the traditional domination of male values in the sports media complex. The article reviews selected literature to establish that, on the evidence presented, male values have traditionally dominated the news. It then considers feminist theory and alternative feminist responses to the domination of male values in the newsroom. Consideration is also given to Australian research on the ‘seriousness’ of sports news and its coverage (or lack thereof) of more ‘feminine’ news values including human interest stories, stories about culture and those on serious social issues. Interviews with a select group of female journalists who write about the AFL for The Age newspaper in Melbourne are recounted, with a focus on the journalists’ work experiences. The article concludes by drawing together the research findings to demonstrate that, although feminine news values are represented in only a small proportion of AFL news stories, there is evidence to suggest they are afforded a high degree of presentational prominence which reflects the needs and expectations of a female audience. It shows that female journalists do play a meaningful role in the AFL media and that, given the evidence presented, a feminist response to the traditional domination of male values in the sports media complex could indeed be applicable, and taking place.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

At Eurocrypt’04, Freedman, Nissim and Pinkas introduced a fuzzy private matching problem. The problem is defined as follows. Given two parties, each of them having a set of vectors where each vector has T integer components, the fuzzy private matching is to securely test if each vector of one set matches any vector of another set for at least t components where t < T. In the conclusion of their paper, they asked whether it was possible to design a fuzzy private matching protocol without incurring a communication complexity with the factor (T t ) . We answer their question in the affirmative by presenting a protocol based on homomorphic encryption, combined with the novel notion of a share-hiding error-correcting secret sharing scheme, which we show how to implement with efficient decoding using interleaved Reed-Solomon codes. This scheme may be of independent interest. Our protocol is provably secure against passive adversaries, and has better efficiency than previous protocols for certain parameter values.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The interest in utilising multiple heterogeneous Unmanned Aerial Vehicles (UAVs) in close proximity is growing rapidly. As such, many challenges are presented in the effective coordination and management of these UAVs; converting the current n-to-1 paradigm (n operators operating a single UAV) to the 1-to-n paradigm (one operator managing n UAVs). This paper introduces an Information Abstraction methodology used to produce the functional capability framework initially proposed by Chen et al. and its Level Of Detail (LOD) indexing scale. This framework was validated through comparing the operator workload and Situation Awareness (SA) of three experiment scenarios involving multiple autonomously heterogeneous UAVs. The first scenario was set in a high LOD configuration with highly abstracted UAV functional information; the second scenario was set in a mixed LOD configuration; and the final scenario was set in a low LOD configuration with maximal UAV functional information. Results show that there is a significant statistical decrease in operator workload when a UAV’s functional information is displayed at its physical form (low LOD - maximal information) when comparing to the mixed LOD configuration.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper is a modified version of a lecture which describes the synthesis, structure and reactivity of some neutral molecules of stellar significance. The neutrals are formed in the collision cell of a mass spectrometer following vertical Franck-Condon one electron oxidation of anions of known bond connectivity. Neutrals are characterised by conversion to positive ions and by extensive theoretical studies at the CCSD(T)/aug-cc-pVDZ//B3LYP/6-31G(d) level of theory. Four systems are considered in detail, viz (i) the formation of linear C-4 and its conversion to the rhombus C-4, (ii) linear C-5 and the atom scrambling of this system when energised, (iii) the stable cumulene oxide CCCCCO, and (iv) the elusive species O2C-CO. This paper is not intended to be a review of interstellar chemistry: examples are selected from our own work in this area. (C) 2002 Elsevier Science Inc. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This is the third TAProViz workshop being run at BPM. The intention this year is to consolidate on the results of the previous successful workshops by further developing this important topic, identifying the key research topics of interest to the BPM visualization community. We note this year the continuing interest in the visualisation of process mining data and resultant process models. More info at: http://wst.univie.ac.at/topics/taproviz14/

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Queensland University of Technology Research Team has recently edited a book on the idea of information experience. Authors from many parts of the world and focussed on many contexts have contributed chapters. The book represents the first attempt to profile and discuss information experience as a research domain and a research object, together with emphasis on different theories and methods being used in workplace, educational and community contexts. In this session members of the editorial team will introduce the book. We anticipate it will be of interest to any information professionals, students or researchers interested in understanding peoples' information experience.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Enterprise social networks provide benefits especially for knowledge-intensive work as they enable communication, collaboration and knowledge exchange. These platforms should therefore lead to increased adoption and use by knowledge-intensive workers such as consultants or indeed researchers. Our interest is in ascertaining whether scientific researchers use enterprise social networks as part of their work practices. This focus is motivated by an apparent schism between a need for researchers to exchange knowledge and profile themselves, and the aversion to sharing breakthrough ideas and joining in an ever-increasing publishing and marketing game. We draw on research on academic work practices and impression management to develop a model of academics’ ESN usage for impression management tactics. We describe important constructs of our model, offer strategies for their operationalization and give an outlook to our ongoing empirical study of the use of an ESN platform by 20 schools across six faculties at an Australian university.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Process modeling – the design and use of graphical documentations of an organization’s business processes – is a key method to document and use information about the operations of businesses. Still, despite current interest in process modeling, this research area faces essential challenges. Key unanswered questions concern the impact of process modeling in organizational practice, and the mechanisms through which impacts are developed. To answer these questions and to provide a better understanding of process modeling impact, I turn to the concept of affordances. Affordances describe the possibilities for goal-oriented action that a technical object offers to a user. This notion has received growing attention from IS researchers. The purpose of my research is to further develop the IS discipline’s understanding of affordances and impacts from information objects, such as process models used by analysts for information systems analysis and design. Specifically, I seek to extend existing theory on the emergence, perception and actualization of affordances. I develop a research model that describes the process by which affordances emerge between an individual and an object, how affordances are perceived, and how they are actualized by the individual. The proposed model also explains the role of available information for the individual, and the influence of perceived actualization effort. I operationalize and test this research model empirically, using a full-cycle, mixed methods study consisting of case study and experiment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A long-held assumption in entrepreneurship research is that normal (i.e., Gaussian) distributions characterize variables of interest for both theory and practice. We challenge this assumption by examining more than 12,000 nascent, young, and hyper-growth firms. Results reveal that variables which play central roles in resource-, cognition-, action-, and environment-based entrepreneurship theories exhibit highly skewed power law distributions, where a few outliers account for a disproportionate amount of the distribution's total output. Our results call for the development of new theory to explain and predict the mechanisms that generate these distributions and the outliers therein. We offer a research agenda, including a description of non-traditional methodological approaches, to answer this call.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Hardware ventures are emerging entrepreneurial firms that create new market offerings based on development of digital devices. These ventures are important elements in the global economy but have not yet received much attention in the literature. Our interest in examining hardware ventures is specifically in the role that information system (IS) resources play in enabling them. We ask how the role of IS resources for hardware ventures can be conceptualized and develop a framework for assessment. Our framework builds on the distinction of operand and operant resources and distinguishes between two key lifecycle stages of hardware ventures: start-up and growth. We show how this framework can be used to discuss the role, nature, and use of IS for hardware ventures and outline empirical research strategies that flow from it. Our work contributes to broadening and enriching the IS field by drawing attention to its role in significant and novel phenomena.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This is the fourth TAProViz workshop being run at the 13th International Conference on Business Process Management (BPM). The intention this year is to consolidate on the results of the previous successful workshops by further developing this important topic, identifying the key research topics of interest to the BPM visualization community. Towards this goal, the workshop topics were extended to human computer interaction and related domains. Submitted papers were evaluated by at least three program committee members, in a double blind manner, on the basis of significance, originality, technical quality and exposition. Three full and one position papers were accepted for presentation at the workshop. In addition, we invited a keynote speaker, Jakob Pinggera, a postdoctoral researcher at the Business Process Management Research Cluster at the University of Innsbruck, Austria.