4 research outputs found

    Web Mashups in the Supply Chain

    Get PDF
    Many supply chains include multiple parties with the goods exchanged several times from the time of their production until they are sold. The liability issues that arise from goods changing hands several times along the way, as well as the exporting and importing regulations that have to be considered, add considerable complexity to the system. Furthermore weather, traffic, and market fluctuations make supply chains less reliable. Many of these issues in supply chain management could be solved or their adverse effects lessened by having information more readily shared among parties. Using Web 2.0 technologies such as a Service-Oriented Architecture, web mashups, blogs, wikis, and social networking sites could be used to facilitate sharing information between parties in a supply chain. This paper focuses on analyzing the potential use of web mashups by enterprises in the supply chain industry. Web mashups, the supply chain, and the security implications of using web mashups in the supply chain are analyzed to determine if it would be worthwhile to use web mashups in the supply chain industry

    A review of Web 2.0 technologies and how they increase participation and transparency in government

    Get PDF
    AIM Terminal ProjectWeb 2.0 has revolutionized the way individuals communicate, participate and engage information. Governments have been slow to adopt Web2.0 technologies, while at the same time are criticized for a lack of participation and transparency. Literature from 1999 to 2010 is reviewed to provide examples of how technologies such as blogs, mashups, social networking and wikis can be used to create citizen-focused services that support better decision making, access to collective intelligence, and improved citizen orientation

    Enhancing Key Digital Literacy Skills: Information Privacy, Information Security, and Copyright/Intellectual Property

    Get PDF
    Key Messages Background Knowledge and skills in the areas of information security, information privacy, and copyright/intellectual property rights and protection are of key importance for organizational and individual success in an evolving society and labour market in which information is a core resource. Organizations require skilled and knowledgeable professionals who understand risks and responsibilities related to the management of information privacy, information security, and copyright/intellectual property. Professionals with this expertise can assist organizations to ensure that they and their employees meet requirements for the privacy and security of information in their care and control, and in order to ensure that neither the organization nor its employees contravene copyright provisions in their use of information. Failure to meet any of these responsibilities can expose the organization to reputational harm, legal action and/or financial loss. Context Inadequate or inappropriate information management practices of individual employees are at the root of organizational vulnerabilities with respect to information privacy, information security, and information ownership issues. Users demonstrate inadequate skills and knowledge coupled with inappropriate practices in these areas, and similar gaps at the organizational level are also widely documented. National and international regulatory frameworks governing information privacy, information security, and copyright/intellectual property are complex and in constant flux, placing additional burden on organizations to keep abreast of relevant regulatory and legal responsibilities. Governance and risk management related to information privacy, security, and ownership are critical to many job categories, including the emerging areas of information and knowledge management. There is an increasing need for skilled and knowledgeable individuals to fill organizational roles related to information management, with particular growth in these areas within the past 10 years. Our analysis of current job postings in Ontario supports the demand for skills and knowledge in these areas. Key Competencies We have developed a set of key competencies across a range of areas that responds to these needs by providing a blueprint for the training of information managers prepared for leadership and strategic positions. These competencies are identified in the full report. Competency areas include: conceptual foundations risk assessment tools and techniques for threat responses communications contract negotiation and compliance evaluation and assessment human resources management organizational knowledge management planning; policy awareness and compliance policy development project managemen

    Privacy protection in government mashups

    No full text
    corecore