31,089 research outputs found

    Multilingual manager: a new strategic role in organizations

    Get PDF
    Today?s knowledge management (KM) systems seldom account for language management and, especially, multilingual information processing. Document management is one of the strongest components of KM systems. If these systems do not include a multilingual knowledge management policy, intranet searches, excessive document space occupancy and redundant information slow down what are the most effective processes in a single language environment. In this paper, we model information flow from the sources of knowledge to the persons/systems searching for specific information. Within this framework, we focus on the importance of multilingual information processing, which is a hugely complex component of modern organizations

    Challenges in the delivery of e-government through kiosks

    Get PDF
    Kiosks are increasingly being heralded as a technology through which governments, government departments and local authorities or municipalities can engage with citizens. In particular, they have attractions in their potential to bridge the digital divide. There is some evidence to suggest that the citizen uptake of kiosks and indeed other channels for e-government, such as web sites, is slow, although studies on the use of kiosks for health information provision offer some interesting perspectives on user behaviour with kiosk technology. This article argues that the delivery of e-government through kiosks presents a number of strategic challenges, which will need to be negotiated over the next few years in order that kiosk applications are successful in enhancing accessibility to and engagement with e-government. The article suggests that this involves consideration of: the applications to be delivered through a kiosk; one stop shop service and knowledge architectures; mechanisms for citizen identification; and, the integration of kiosks within the total interface between public bodies and their communities. The article concludes by outlining development and research agendas in each of these areas.</p

    An active, ontology-driven network service for Internet collaboration

    No full text
    Web portals have emerged as an important means of collaboration on the WWW, and the integration of ontologies promises to make them more accurate in how they serve users’ collaboration and information location requirements. However, web portals are essentially a centralised architecture resulting in difficulties supporting seamless roaming between portals and collaboration between groups supported on different portals. This paper proposes an alternative approach to collaboration over the web using ontologies that is de-centralised and exploits content-based networking. We argue that this approach promises a user-centric, timely, secure and location-independent mechanism, which is potentially more scaleable and universal than existing centralised portals

    Secure Mobile Social Networks using USIM in a Closed Environment

    Get PDF
    Online social networking and corresponding mobile based applications are gaining popularity and now considered a well-integrated service within mobile devices. Basic security mechanisms normally based on passwords for the authentication of social-network users are widely deployed and poses a threat for the user security. In particular, for dedicated social groups with high confidentiality and privacy demands, stronger and user friendly principles for the authentication and identification of group members are needed. On the other hand, most of the mobile units already provide strong authentication procedures through the USIM/ISIM module. This paper explores how to build an architectural framework for secure enrollment and identification of group members in dedicated closed social groups using the USIM/SIM authentication and in particular, the 3GPP Generic Authentication Architecture (GAA), which is built upon the USIM/SIM capabilities. One part of the research is to identify the marketable use-cases with corresponding security challenges to fulfill the requirements that extend beyond the online connectivity. This paper proposes a secure identification design to satisfy the security dimensions for both online and offline peers. We have also implemented an initial proof of the concept prototype to simulate the secure identification procedure based on the proposed design. Our implementation has demonstrated the flexibility of the solution to be applied independently for applications requiring secure identification

    F-R-O-N-T: 5 ways to make ‘exploring’ (in an ESL classroom) a shared adventure, rather than a disembodied barrage

    Get PDF
    Combining cooperative learning strategies, storytelling-as-a-performance-art skills, and public speaking fundamentals can make “Exploring” (in an ESL classroom) a shared adventure, rather than a disembodied barrage (resulting from misused tools. Audience analysis when applied to a classroom of students helps instructors to accurately target initial and ongoing needs, so that “change for the better” becomes a healthy habit. All too often language instructors face non-responsive students. There are reasons, other than “this group just seems to be that way,” for such behavior. Employing some simple techniques could turn your classroom into a fun-filled adventure. This paper puts forth the FRONT approach to engage students, rather than to repel them (or, worse yet, to accept apathy), within the classroom. Framing, then Painting; Reactive and Proactive; Own, Don’t Moan; No Techno Babble; and Tales – when applied in YOUR classroom - will lead to students wanting to return and participate. Developing such a win-win learning situation helps everyone to come out in FRONT in (second) language acquisition efforts
    • 

    corecore