100,015 research outputs found
Information technology as boundary object for transformational learning
Collaborative work is considered as a way to improve productivity and value generation in
construction. However, recent research demonstrates that socio-cognitive factors related to fragmentation of specialized knowledge may hinder team performance. New methods based on theories of practice are emerging in Computer Supported Collaborative Work and organisational learning to break these knowledge boundaries,
facilitating knowledge sharing and the generation of new knowledge through transformational learning. According to these theories, objects used in professional practice play a key role in mediating interactions. Rules and methods related to these practices are also embedded in these objects. Therefore changing collaborative
patterns demand reconfiguring objects that are at the boundary between specialized practices, namely boundary objects. This research is unique in presenting an IT strategy in which technology is used as a boundary object to facilitate transformational learning in collaborative design work
Recommended from our members
Exploring knowledge management integration through EAI in local government domain
Information Technology (IT) infrastructure integration and knowledge management share communal objectives e.g. to make organisations more effective and efficient, agile and innovative, and more responsive to market changes. Such association when assimilates bona fide knowledge management philosophy, it offers the IT departments a headship opportunity for organisational transformation in affiliation with the rest of the establishment. Notwithstanding, in the context of Local Government Authorities (LGAs), the non-integrated nature of the IT infrastructure is associated with inefficient data and knowledge exchange and reduction in LGA services’ quality. Therefore, numerous data inconsistencies and redundancies occur that impact LGA services to their citizenry. LGAs have deployed Enterprise Application Integration (EAI) technological solutions to integrate their legacy with new developed Information Systems (IS). Literature indicates that EAI achieves integration at five layers namely: (a) connectivity, (b) transportation, (c) transformation, (d) process integration and (e) knowledge integration. This research adapts a Revised Model for Integration Layers (REAL) and tests through a case study in a local authority. The results indicate that cases leading to data inconsistencies and replication can be prevented by integrating knowledge through EAI
Recommended from our members
Current state of e-services in Saudi Arabia: the case of intermediaries in facilitating government services in Madinah city
The government of Madinah has launched ‘Khdamatec’ electronic Offices (e-Offices) concept under their national electronic Government (e-Government) modernisation agenda to facilitate service delivery to citizens and seamless interaction to communicate their needs. By offering e-Offices around the government departments, Madinah government hopes to increase accessibility of e-Government services and make steps forward to electronic age, encourage Medina' citizens to participate and use e-Services and bridging digital divide. However, the empirical findings illustrate that the adoption and diffusion of the e-Office concept and e-Government in the wider context at a lethargic pace. This paper highlights some of the challenges faced by the Madinah city in implementing the e-Office concept and e-Government
Electronic Security Implications of NEC: A Tactical Battlefield Scenario
In [1] three principal themes are identified by the UK MoD (Ministry of Defence) in order to deliver the vision of NEC (Network Enabled Capability): Networks, People and Information. It is the security of information, which is discussed in this article. The drive towards NEC is due to many factors; one defining factor is to provide an increase in operational tempo in effect placing one ahead of their enemy in terms of acting within their OODA (Observe, Orient, Decide, Act) loop. However as technical and procedural systems are being advanced to achieve the vision of NEC, what impact does this have on the traditional information security triangle, of preserving the confidentiality, integrity and availability of information? And how does this influence current security engineering and accreditation practices, particularly in light of the proliferation problem? This article describes research conducted into answering these questions, building upon the findings of the NITEworks® [2] ISTAR (Intelligence, Surveillance, Target Acquisition and Reconnaissance) Theme studies and focusing on a tactical battlefield scenario. This scenario relates to the IFPA (Indirect Fire Precision Attack) [3] project where the efficient synchronisation of potentially numerous sources of information is required, providing real-time decisions and delivery of effects, in accordance with the requirements of NEC. It is envisaged that the IFPA systems will consist of numerous sub-systems each of which will provide a unique effecting capability to the UK army with differing levels of speed, accuracy and range
The silver lining: cloud computing and small and medium enterprises
This paper shows how Australian businesses can get the most out of one of the biggest global innovations: information communications technology.
Overview: Innovation – the successful application of new ideas – drives Australia’s productivity. Australia’s biggest innovation opportunity lies in creatively exploiting global innovations. One of the biggest of these is information and communications technology.
Small and medium enterprises (SMEs) are an engine of the Australian economy. They employ two-thirds of Australian private sector workers and contribute half of Australia’s private sector GDP. Yet many SMEs have low productivity. Innovations may spread slowly to many smaller firms because they lack the capital or market intelligence that large firms can access.
Online innovations – including mobile devices, e-commerce, and cloud computing – offer opportunities for firms of all sizes to become far more productive.
This paper explores issues raised at a workshop run by Grattan Institute and Google on how policymakers and business can accelerate the spread of cloud computing among SMEs. It uses cloud computing – the delivery of on-demand information technology services over the Internet – as a case study for how online technologies can benefit smaller firms.
Cloud computing can help level the playing field for smaller firms. It allows them to access sophisticated IT services that were previously out of reach. For example, it can allow them to manage and monitor their sales, operations and finances in real time.
The cloud also offers capabilities that were previously unavailable to firms of any scale. For example, it allows multiple users to access applications or update documents at the same time from mobile devices. Cloud computing makes it easier for small firms to take new ideas to market. Firms that use cloud computing report more growth in revenue and profit than others do.
But many Australian SMEs say they do not use cloud services. Many are not aware of the benefits or believe they do not have skills to capture them. Some are concerned about transition costs, data security and privacy. Networks are too slow or unreliable for cloud services in some areas of the country.
Workshop participants agreed that government and industry can remove obstacles to the use of cloud computing and help SMEs capture its benefits. The industry itself should lead the education of SMEs on the case for cloud computing. Yet government can:
Choose policy settings that promote broader productivity growth and innovation;
Ensure interaction with government over the internet is the default for all businesses;
Provide an appropriate policy environment for investment in broadband networks that meet the needs of small business.
Information technology’s contribution to productivity is just getting started. Small and medium enterprises should get on board
- …