47,725 research outputs found

    Examining the issues & challenges of email & e-communications. 2nd Northumbria Witness Seminar Conference, 24-25 Oct 2007 Northumbria University, Newcastle upon Tyne.

    Get PDF
    These proceedings capture the content of the second Witness Seminar hosted by Northumbria University’s School of Computing, Engineering and Information Sciences. It followed the success of the first witness seminar in terms of its format and style but differed in that it focused on one topic - managing email and other electronic communications technologies from a records perspective. As before the witnesses were invited to share their views and opinions on a specific aspect taking as their starting point a pertinent published article(s). Three seminars explored the business, people and technology perspectives of email and e-communications, asking the following questions: What are the records management implications and challenges of doing business electronically? Are people the problem and the solution? Is technology the problem or panacea? The final seminar, 'Futurewatch', focused on moving forward, exploring new ways of working, potential new technologies and what records professionals and others need to keep on their radar screens

    Students and mobile devices: choosing which dream

    Get PDF
    There is a crisis looming and a paradox emerging. Many educators advocate, promote and encourage the dreams of agency, control, ownership and choice amongst students whilst educational institutions take the responsibility for provision, equity, access, participation and standards. The institutions traditionally procure, provide and control the technology for learning but now students are acquiring their own personal technologies for learning and institutions are challenged to keep pace. These allow students to produce, store, transmit and consume information, images and ideas; this potentially realises the educators’ dream but is for institutions potentially a nightmare, one of loss of control and loss of the quality, consistency, uniformity and stability that delivered the dreams of equity, access and participation. This paper traces the conflicting dreams and responsibilities

    ARIES WP3 – Needs and Requirements Analyses

    Get PDF
    Information and communication technologies have increasingly influenced and changed our daily life. They allow global connectivity and easy access to distributed applications and digital services over the Internet. This report analysis security requirements on trust establishment and trust evaluation based on two different use case scenarios: "Trusted Communication using COTS" and "Trust Establishment for Cross-organizational Crises Management". A systematic needs analysis is performed on both scenarios which haver resulted in a large and well documented set of requirements. This is the first step in a large effort to define a security architecture for the two use case scenarios.

    MENUING SOFTWARE: APPLICATION TO THE GENERAL MANAGER'S NEED

    Get PDF
    This paper demonstrates a robust approach to general manager computer use. The approach is shown to systematically integrate a diverse collection of user selected applications. It is implemented through the use of currently available shareware and public domain software at low cost. The developed prototype follows accepted psychological choice, Management Information System (MIS) and/or Decision Support System (DDS) principles. It is easily modified by a user, said to be any general management team member, as the environment changes. Team member roles, concerns, styles, and interests can be accommodated in the design or re-design. The prototype and approach is friendly to occasional users. One basic installation can serve several users. It will work on a network of computers. It offers a sense of staying in control to the individual. Complexities of application choice and access are hidden. Data transfer between applications is automated. Extension educators and business consultants can also use a similar approach for accessing a wide variety of applications. Further work will likely improve the basic approach. In the meantime, the gain from using this approach as it stands is quickly available.Research Methods/ Statistical Methods,

    Wicked Problems and Gnarly Results: Reflecting on Design and Evaluation Methods for Idiosyncratic Personal Information Management Tasks

    No full text
    This paper is a case study of an artifact design and evaluation process; it is a reflection on how right thinking about design methods may at times result in sub-optimal results. Our goal has been to assess our decision making process throughout the design and evaluation stages for a software prototype in order to consider where design methodology may need to be tuned to be more sensitive to the domain of practice, in this case software evaluation in personal information management. In particular, we reflect on design methods around (1) scale of prototype, (2) prototyping and design process, (3) study design, and (4) study population
    corecore