24,188 research outputs found
Recommended from our members
Integrating information and knowledge for enterprise innovation
It has widely been accepted that enterprise integration, can be a source of socio-technical and cultural problems within organisations wishing to provide a focussed end-to-end business service. This can cause possible âstraitjacketingâ of business process architectures, thus suppressing responsive business re-engineering and competitive advantage for some companies. Accordingly, the current typology and emergent forms of Enterprise Resource Planning (ERP) and Enterprise Application Integration (EAI) technologies are set in the context of understanding information and knowledge integration philosophies. As such, key influences and trends in emerging IS integration choices, for end-to-end, cost-effective and flexible knowledge integration, are examined. As touch points across and outside organisations proliferate, via work-flow and relationship management-driven value innovation, aspects of knowledge refinement and knowledge integration pose challenges to maximising the potential of innovation and sustainable success, within enterprises. This is in terms of the increasing propensity for data fragmentation and the lack of effective information management, in the light of information overload. Furthermore, the nature of IS mediation which is inherent within decision making and workflow-based business processes, provides the basis for evaluation of the effects of information and knowledge integration. Hence, the authors propose a conceptual, holistic evaluation framework which encompasses these ideas. It is thus argued that such trends, and their implications regarding enterprise IS integration to engender sustainable competitive advantage, require fundamental re-thinking
The Value of User-Visible Internet Cryptography
Cryptographic mechanisms are used in a wide range of applications, including
email clients, web browsers, document and asset management systems, where
typical users are not cryptography experts. A number of empirical studies have
demonstrated that explicit, user-visible cryptographic mechanisms are not
widely used by non-expert users, and as a result arguments have been made that
cryptographic mechanisms need to be better hidden or embedded in end-user
processes and tools. Other mechanisms, such as HTTPS, have cryptography
built-in and only become visible to the user when a dialogue appears due to a
(potential) problem. This paper surveys deployed and potential technologies in
use, examines the social and legal context of broad classes of users, and from
there, assesses the value and issues for those users
Quality improvement of manuka honey through the application of high pressure processing
The quality of honey is known to be compromised when it goes through thermal
processing due to its negative impact on the unstable and thermolabile honey components
which originated from the nectar and bees themselves. This present work is undertaken to
access the use of an emerging food preservation technique known as âHigh Pressure
Processingâ for treating honey, as an alternative to the conventional thermal processing. In
this thesis, honey quality has been addressed by measuring the effects of high pressure
processing parameters (pressure, time and temperature) on nutritional properties of honey,
namely total phenolic content and antioxidant activity. Honey samples, contained in small
pouches, were subjected to different pressures (200-600 MPa) at close to ambient
temperatures (25-33°C) for different holding times (10 to 30 min). Thermal processing (49-
70°C) was also carried out for comparison purpose. Results demonstrated that high pressure
processing operated at 600 MPa for 10 min has capability to increase significantly the total
phenolic content and antioxidant activity by 47% and 30%, respectively. Besides, the result
showed that high pressure processing can maintain the natural colour of honey which relates
directly to consumer perception, while retaining its shear-thinning behaviour and viscosity
with no significant changes (p > 0.05). High pressure processing can also control
hydroxymethylfurfural (HMF) concentration in honey during process within the standard
limit, 16.93 to 18.76 mg/kg (which is below than the maximum allowed limit of 40 mg/kg).
This work also reveals that high pressure processing can enhance antibacterial activity of
Manuka honey significantly. It shows an increase in the percentage inhibition of
Staphylococcus epidermidis from 64.15 ± 5.86% to 84.34 ± 7.62% when honey was
subjected to 600 MPa. Storage studies for one year at room temperature (25°C) demonstrated
that high pressure-treated samples have a good retention to the physicochemical, nutritional
and rheological properties of honey throughout storage, which confirms that the positive
effect of high pressure on honey is not a temporary effect. Whereas, an insight study on the
safety part showed that the Saccharomyces cerevisiae cell varied linearly with ° Brix,
indicating that food compressibility has a significant role in the microbial inactivation
Recommended from our members
Evaluating global e-government sites: A view using web diagnostics tools
This is the post-print version of the Article. The official published version can be accessed from the link below - Copyright @ 2004 The AuthorsSeveral governments across the world have embraced the digital revolution and continue to take advantage of the information and communication facilities offered by the Internet to offer public services. Conversely, citizensâ awareness and expectations of Internet based online-public-services have also increased in recent times. Although the numbers of the different national e-Government web portals have rapidly increased in the last three years, the success of these portals will largely depend on their accessibility, quality and privacy. This paper reports the results of an
evaluative study of a cross-section of e-Government portals from these three perspectives, using a common set of performance metrics and Web diagnostic engines. Results show that not only are there wide variations in the spectrum of information and services provided by these portals, but that significant work still needs to be undertaken in order to make the portals examples of âbest practiceâ e-Government services
Usability and Trust in Information Systems
The need for people to protect themselves and their assets is as old as humankind. People's physical safety and their possessions have always been at risk from deliberate attack or accidental damage. The advance of information technology means that many individuals, as well as corporations, have an additional range of physical (equipment) and electronic (data) assets that are at risk. Furthermore, the increased number and types of interactions in cyberspace has enabled new forms of attack on people and their possessions. Consider grooming of minors in chat-rooms, or Nigerian email cons: minors were targeted by paedophiles before the creation of chat-rooms, and Nigerian criminals sent the same letters by physical mail or fax before there was email. But the technology has decreased the cost of many types of attacks, or the degree of risk for the attackers. At the same time, cyberspace is still new to many people, which means they do not understand risks, or recognise the signs of an attack, as readily as they might in the physical world. The IT industry has developed a plethora of security mechanisms, which could be used to mitigate risks or make attacks significantly more difficult. Currently, many people are either not aware of these mechanisms, or are unable or unwilling or to use them. Security experts have taken to portraying people as "the weakest link" in their efforts to deploy effective security [e.g. Schneier, 2000]. However, recent research has revealed at least some of the problem may be that security mechanisms are hard to use, or be ineffective. The review summarises current research on the usability of security mechanisms, and discusses options for increasing their usability and effectiveness
Alter ego, state of the art on user profiling: an overview of the most relevant organisational and behavioural aspects regarding User Profiling.
This report gives an overview of the most relevant organisational and\ud
behavioural aspects regarding user profiling. It discusses not only the\ud
most important aims of user profiling from both an organisationâs as\ud
well as a userâs perspective, it will also discuss organisational motives\ud
and barriers for user profiling and the most important conditions for\ud
the success of user profiling. Finally recommendations are made and\ud
suggestions for further research are given
Recommended from our members
Towards successful e-Payment systems: An empirical identification and analysis of critical factors
This research aims to explore the factors relating to e-payment system to be implemented where electronic processes enable the facilitation of online transactions. A secondary analysis revealed six factors which are argued to be âcriticalâ for customer adoption of these systems. The findings were further augmented by an online survey of 155 respondents where the perceived importance of the critical factors were correlated through: security, trust, perceived advantage, assurance seals, perceived risk and usability. The results demonstrate that three of the critical factors were necessary (security, advantage, web assurance seals) and three were relatively sufficient (perceived risk, trust and usability) through customer intentions to adopt an e-payment system. The study provides a valid overall awareness that these critical factors are important in designing a successful e-payment system
- âŠ