100,015 research outputs found

    Information technology as boundary object for transformational learning

    Get PDF
    Collaborative work is considered as a way to improve productivity and value generation in construction. However, recent research demonstrates that socio-cognitive factors related to fragmentation of specialized knowledge may hinder team performance. New methods based on theories of practice are emerging in Computer Supported Collaborative Work and organisational learning to break these knowledge boundaries, facilitating knowledge sharing and the generation of new knowledge through transformational learning. According to these theories, objects used in professional practice play a key role in mediating interactions. Rules and methods related to these practices are also embedded in these objects. Therefore changing collaborative patterns demand reconfiguring objects that are at the boundary between specialized practices, namely boundary objects. This research is unique in presenting an IT strategy in which technology is used as a boundary object to facilitate transformational learning in collaborative design work

    Electronic Security Implications of NEC: A Tactical Battlefield Scenario

    No full text
    In [1] three principal themes are identified by the UK MoD (Ministry of Defence) in order to deliver the vision of NEC (Network Enabled Capability): Networks, People and Information. It is the security of information, which is discussed in this article. The drive towards NEC is due to many factors; one defining factor is to provide an increase in operational tempo in effect placing one ahead of their enemy in terms of acting within their OODA (Observe, Orient, Decide, Act) loop. However as technical and procedural systems are being advanced to achieve the vision of NEC, what impact does this have on the traditional information security triangle, of preserving the confidentiality, integrity and availability of information? And how does this influence current security engineering and accreditation practices, particularly in light of the proliferation problem? This article describes research conducted into answering these questions, building upon the findings of the NITEworks® [2] ISTAR (Intelligence, Surveillance, Target Acquisition and Reconnaissance) Theme studies and focusing on a tactical battlefield scenario. This scenario relates to the IFPA (Indirect Fire Precision Attack) [3] project where the efficient synchronisation of potentially numerous sources of information is required, providing real-time decisions and delivery of effects, in accordance with the requirements of NEC. It is envisaged that the IFPA systems will consist of numerous sub-systems each of which will provide a unique effecting capability to the UK army with differing levels of speed, accuracy and range

    The silver lining: cloud computing and small and medium enterprises

    Get PDF
    This paper shows how Australian businesses can get the most out of one of the biggest global innovations: information communications technology. Overview: Innovation – the successful application of new ideas – drives Australia’s productivity. Australia’s biggest innovation opportunity lies in creatively exploiting global innovations. One of the biggest of these is information and communications technology. Small and medium enterprises (SMEs) are an engine of the Australian economy. They employ two-thirds of Australian private sector workers and contribute half of Australia’s private sector GDP. Yet many SMEs have low productivity. Innovations may spread slowly to many smaller firms because they lack the capital or market intelligence that large firms can access. Online innovations – including mobile devices, e-commerce, and cloud computing – offer opportunities for firms of all sizes to become far more productive. This paper explores issues raised at a workshop run by Grattan Institute and Google on how policymakers and business can accelerate the spread of cloud computing among SMEs. It uses cloud computing – the delivery of on-demand information technology services over the Internet – as a case study for how online technologies can benefit smaller firms. Cloud computing can help level the playing field for smaller firms. It allows them to access sophisticated IT services that were previously out of reach. For example, it can allow them to manage and monitor their sales, operations and finances in real time. The cloud also offers capabilities that were previously unavailable to firms of any scale. For example, it allows multiple users to access applications or update documents at the same time from mobile devices. Cloud computing makes it easier for small firms to take new ideas to market. Firms that use cloud computing report more growth in revenue and profit than others do. But many Australian SMEs say they do not use cloud services. Many are not aware of the benefits or believe they do not have skills to capture them. Some are concerned about transition costs, data security and privacy. Networks are too slow or unreliable for cloud services in some areas of the country. Workshop participants agreed that government and industry can remove obstacles to the use of cloud computing and help SMEs capture its benefits. The industry itself should lead the education of SMEs on the case for cloud computing. Yet government can:  Choose policy settings that promote broader productivity growth and innovation;  Ensure interaction with government over the internet is the default for all businesses;  Provide an appropriate policy environment for investment in broadband networks that meet the needs of small business. Information technology’s contribution to productivity is just getting started. Small and medium enterprises should get on board
    • …
    corecore