30,390 research outputs found

    The Fascinator - Desktop eResearch and Flexible Portals

    Get PDF
    4th International Conference on Open RepositoriesThis presentation was part of the session : Conference PostersThe Fascinator is an Apache Solr front end to the Fedora commons repository. This project was originally funded by ARROW, as part of the mini project scheme. The Fascinator is written in Java. It drops into the Tomcat server that comes with Fedora. There are two ways this software can be used. It can be used as a server to deliver one or more portals with faceted searching and browsing or as an (experimental) desktop tool for managing eResearch assets and synchronising them with other repositories.ARROW project; Monash Universit

    2012 Grantmakers Information Technology Survey Report

    Get PDF
    Together the Technology Affinity Group (TAG) and Grants Managers Network (GMN) conducted an information technology survey of grantmaking organizations in July 2012. This survey serves as a follow?up to similar surveys TAG has conducted in collaboration with the Council on Foundation (The Council) in April 2003, July 2005, and June 2007, and then independently in 2010

    Infrastructure interdependencies and business-level impacts: a new approach to climate risk assessment

    Get PDF
    This report examines some of the physical impacts of climate change on the infrastructure sector and the resulting cascade of consequences for the broader economy.The report summarises findings from a workshop conducted in December 2012 by The Climate Institute, Manidis Roberts (a part of the RPS Group) and KPMG, which piloted a process for analysing the climate-related risks associated with interdependent infrastructure systems of a major city. The workshop was informed by a range of sources: a desktop review of academic, business and government documents; analysis from experts in the fields of risk, resilience, sustainability and infrastructure planning; analysis of historical events; interdependency mapping and quantitative modelling.This workshop report follows The Climate Institute’s recently published report Coming Ready or Not: Managing climate risks to Australian infrastructure, which synthesised research on the physical impacts and flow-on consequences of climate change and  analysed preparations for climate change impacts in Australia amongst owners and operators of major infrastructure assets

    Securing library information system: Vulnerabilities and threats

    Get PDF
    Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet. Library Information Systems is also vulnerable to attack since it is a public access institution. Majority of users are naive when it comes to computer and network securities. Some breaches in Library Information System are intentional and some are unintentional. Risks analysis should be done to find the threats and risks in designing the Library Information System. Threats are made possible due to lack of proper procedures, software flaws and policies. The administrators should anticipate all the possible attacks and their mitigation techniques. In this paper, we will try to address various issues arise from this vulnerabilities and threats. We will also describe how we can reduce and overcome this vulnerabilities and threats

    Mobile Social Media as a Strategic Capability: Expanding Opportunties Social Media Has to Offer to B2B Firms

    Get PDF
    Mobile social media (MSM), an interaction, exchange of information and creation of user-generated content, mediated by mobile devices is becoming the locomotive that drives forward evolution of online world. So far, limited number of academic studies touched upon the MSM subject with all the papers being of conceptual nature. No empirical evidence is available to prove whether and how firms utilise MSM for their best advantage. This paper addresses this gap by employing the grounded theory approach (GT) to analyse interviews conducted in twenty-six B2B firms. This study found that eighteen firms use mobile technology primarily as a platform to access social media sites, understand canons of MSM consumption and utilise MSM as a strategic capability to reinforce the strategic position of a firm. Our data illustrates that the MSM strategic capability includes four main activities: (1) market sensing; (2) managing relationships; (3) branding and (4) developing content. These activities can results in the decreased research and development spendings without sacrificing innovativeness because MSM is a valuable source of information about the market and a source of ideas for new products/services. In practical terms firms can examine MSM activities and decide whether there is an opportunity to utilise MSM advantageously

    Enhancing cyber assets visibility for effective attack surface management : Cyber Asset Attack Surface Management based on Knowledge Graph

    Get PDF
    The contemporary digital landscape is filled with challenges, chief among them being the management and security of cyber assets, including the ever-growing shadow IT. The evolving nature of the technology landscape has resulted in an expansive system of solutions, making it challenging to select and deploy compatible solutions in a structured manner. This thesis explores the critical role of Cyber Asset Attack Surface Management (CAASM) technologies in managing cyber attack surfaces, focusing on the open-source CAASM tool, Starbase, by JupiterOne. It starts by underlining the importance of comprehending the cyber assets that need defending. It acknowledges the Cyber Defense Matrix as a methodical and flexible approach to understanding and addressing cyber security challenges. A comprehensive analysis of market trends and business needs validated the necessity of asset security management tools as fundamental components in firms' security journeys. CAASM has been selected as a promising solution among various tools due to its capabilities, ease of use, and seamless integration with cloud environments using APIs, addressing shadow IT challenges. A practical use case involving the integration of Starbase with GitHub was developed to demonstrate the CAASM's usability and flexibility in managing cyber assets in organizations of varying sizes. The use case enhanced the knowledge graph's aesthetics and usability using Neo4j Desktop and Neo4j Bloom, making it accessible and insightful even for non-technical users. The thesis concludes with practical guidelines in the appendices and on GitHub for reproducing the use case

    Towards a human resources management approach in supply chain management

    Get PDF
    Supply chain management (SCM) has grown as a discipline since the field attracted attention in the 1980s. However, it is observed that effective implementation of SCM is limited because the current focus is too task-based and information-centric. The concept is often conflated, in practice, with subcontractor management, where numerical flexibility is pertinent. At the same time, consideration of human resources management (HRM) in SCM has been limited. Strategic fit within supply chains tends to emphasise taskbased numerical flexibility, rather than genuine consideration and development of human resources. On the other hand, HRM has, until recently, rarely taken into account interorganisational characteristics that typify the construction industry. Therefore, this research intends to plug the gap by examining the use of human resources in construction supply chains, with a view of developing good practice for HRM in construction SCM. To achieve this, a two-phase research methodology comprising a scoping phase and case study phase will be ensued

    Digital collection building : a case study

    Get PDF
    The Digital Library plays an important role in creating, preserving, indexing, and retrieving the various forms of digital assets. The ISRO HQ Digital Library provides cost effective facility for systematic archiving of research results and other documents of the institution. This paper discusses about various E-collections at ISRO HQ Library and explains the infrastructure (Hardware, Software and Network) and other requirements for creating and managing E-collections. It provides web-based mechanism to deposit and access the same to the user community on to their desktop through ISRO SPACENET (Intranet). This paper illustrates how to set up Digital Library using DSpace software and how to create different communities and under each community, many collections and how to customize the metadata fields according to institutional requirement
    • …
    corecore