84,929 research outputs found

    Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science

    Get PDF
    e-Science projects face a difficult challenge in providing access to valuable computational resources, data and software to large communities of distributed users. Oil the one hand, the raison d'etre of the projects is to encourage members of their research communities to use the resources provided. Oil the other hand, the threats to these resources from online attacks require robust and effective Security to mitigate the risks faced. This raises two issues: ensuring that (I) the security mechanisms put in place are usable by the different users of the system, and (2) the security of the overall system satisfies the security needs of all its different stakeholders. A failure to address either of these issues call seriously jeopardise the success of e-Science projects.The aim of this paper is to firstly provide a detailed understanding of how these challenges call present themselves in practice in the development of e-Science applications. Secondly, this paper examines the steps that projects can undertake to ensure that security requirements are correctly identified, and security measures are usable by the intended research community. The research presented in this paper is based Oil four case studies of c-Science projects. Security design traditionally uses expert analysis of risks to the technology and deploys appropriate countermeasures to deal with them. However, these case studies highlight the importance of involving all stakeholders in the process of identifying security needs and designing secure and usable systems.For each case study, transcripts of the security analysis and design sessions were analysed to gain insight into the issues and factors that surround the design of usable security. The analysis concludes with a model explaining the relationships between the most important factors identified. This includes a detailed examination of the roles of responsibility, motivation and communication of stakeholders in the ongoing process of designing usable secure socio-technical systems such as e-Science. (C) 2007 Elsevier Ltd. All rights reserved

    Conceptualising managerial and leadership wisdom - how many wise managers and leaders do you know?

    Get PDF
    The term ‘wisdom’ is used frequently in terms of managerial and leadership functioning and development. However, when asked ‘How many wise managers and leaders do you know?’ most people struggle to firstly name people and secondly, to explain what ‘wise or wisdom’ means because they tend to consider wisdom from a particular paradigm – philosophical, spiritual, cultural, psychological or ethical. This conceptual paper raises different perceptions of the meaning of ‘wisdom’ before broadly critiquing literature that deals with wisdom in terms of philosophical, spiritual, cultural, psychological and ethical constructs. This leads to summations that wisdom is largely contextual –someone might be considered wise in one context but not in another – and that a knowledgeable person is not necessarily a wise person. However, wisdom appears to comprise elements of knowledge, integrity and compassion. The paper then discusses wisdom as an ethical construct in management and leadership and concludes with a conceptual discussion of the vexed question ‘can wisdom be developed?

    Legal Ontologies for the spanish e-Government

    Full text link
    The Electronic Government is a new field of applications for the semantic web where ontologies are becoming an important research technology. The e-Government faces considerable challenges to achieve interoperability given the semantic differences of interpretation, complexity and width of scope. In this paper we present the results obtained in an ongoing project commissioned by the Spanish government that seeks strategies for the e-Government to reduce the problems encountered when delivering services to citizens. We also introduce an e-Government ontology model; within this model a set of legal ontologies are devoted to representing the Real-estate transaction domain used to illustrate this paper

    Suitability of BIM for enhancing value on PPP projects for the benefit of the public sector

    Get PDF
    Collaborative integrated working and stakeholder’s interest have been among key drivers that underpin and encourage the use of Building Information Modelling (BIM) within the AEC industry. BIM is becoming a major means to deliver projects with better improved product, and reduced risk within the construction industry. Furthermore, using BIM in areas like buildability, quality assurance, cost and scheduling can be justified through BIM-nD modelling application. What is not so obvious is how the utilisation of BIM visualisation and knowledge embedment will enhance these areas to refine and achieve better value for PPP procurement projects for the long term benefit especially during post-construction phase for the public sector. As of now there is no well-defined guidance with respect to BIM usage incorporating all of the above. Do we really need to revisit the way we specify projects within the contractual framework under PPP? This paper examines the possibility of how BIM can be utilised in the realisation of augmented formal database information management system under the PPP procurement routes with respect to operation and maintenance support. The paper concludes with additional measures that BIM can offer at the post-construction phase for the public sector at learning organisations

    A Cognitive-based scheme for user reliability and expertise assessment in Q&A social networks

    Get PDF
    Q&A social media has gained a great deal of attention during recent years. People rely on these sites to obtain information due to the number of advantages they offer as compared to conventional sources of knowledge (e.g., asynchronous and convenient access). However, for the same question one may find highly contradictory answers, causing ambiguity with respect to the correct information. This can be attributed to the presence of unreliable and/or non-expert users. In this work, we propose a novel approach for estimating the reliability and expertise of a user based on human cognitive traits. Every user can individually estimate these values based on local pairwise interactions. We examine the convergence performance of our algorithm and we find that it can accurately assess the reliability and the expertise of a user and can successfully react to the latter's behavior change. © 2011 IEEE

    Making physical education relevant: Increasing the impact of initial teacher training

    Get PDF
    This paper is developed from concern that, despite a number of developments and initiatives in physical education over recent years, there has been little change in the teaching of the subject. This has resulted in many young people being alienated from physical education and therefore physical activity. The paper focuses on how initial teacher training (ITT) contributes to this lack of change by focusing on the development of knowledge for teaching and the technical competence to deliver this. It then considers ways in which ITT could contribute to developing ‘knowledgeable teachers’ who are able to make change. The paper focuses on two aspects identified as relevant for trainee physical education teachers: socialisation and knowledge for teaching. It recognises that the issues are complex and that change is difficult. It also recognises that ITT cannot change things by itself. However, it argues that by maintaining the status quo, the subject will not develop so that it is relevant to today’s youngsters

    Application of Fuzzy Cognitive Mapping in Livelihood Vulnerability Analysis

    Get PDF
    Feedback mechanisms are important in the analysis of vulnerability and resilience of social-ecological systems, as well as in the analysis of livelihoods, but how to evaluate systems with direct feedbacks has been a great challenge. We applied fuzzy cognitive mapping, a tool that allows analysis of both direct and indirect feedbacks and can be used to explore the vulnerabilities of livelihoods to identified hazards. We studied characteristics and drivers of rural livelihoods in the Great Limpopo Transfrontier Conservation Area in southern Africa to assess the vulnerability of inhabitants to the different hazards they face. The process involved four steps: (1) surveys and interviews to identify the major livelihood types; (2) description of specific livelihood types in a system format using fuzzy cognitive maps (FCMs), a semi-quantitative tool that models systems based on people’s knowledge; (3) linking variables and drivers in FCMs by attaching weights; and (4) defining and applying scenarios to visualize the effects of drought and changing park boundaries on cash and household food security. FCMs successfully gave information concerning the nature (increase or decrease) and magnitude by which a livelihood system changed under different scenarios. However, they did not explain the recovery path in relation to time and pattern (e.g., how long it takes for cattle to return to desired numbers after a drought). Using FCMs revealed that issues of policy, such as changing situations at borders, can strongly aggravate effects of climate change such as drought. FCMs revealed hidden knowledge and gave insights that improved the understanding of the complexity of livelihood systems in a way that is better appreciated by stakeholders

    Promoting Adherence to Influenza Vaccination Recommendations in Pediatric Practice.

    Get PDF
    OBJECTIVES: In the United States, nonadherence to seasonal influenza vaccination guidelines for children and adolescents is common and results in unnecessary morbidity and mortality. We conducted a quality improvement project to improve vaccination rates and test effects of 2 interventions on vaccination guidelines adherence. METHODS: We conducted a cluster randomized control trial with 11 primary care practices (PRACTICE) that provided care for 11 293 individual children and adolescents in a children\u27s health care system from September 2015 through April 2016. Practice sites (with their clinicians) were randomly assigned to 4 arms (no intervention [Control], computerized clinical decision support system [CCDSS], web-based training [WBT], or CCDSS and WBT [BOTH]). RESULTS: During the study, 55.8% of children and adolescents received influenza vaccination, which improved modestly during the study period compared with the prior influenza season ( P = .009). Actual adherence to recommendations, including dosing, timeliness, and avoidance of missed opportunities, was 46.4% of patients cared for by the PRACTICE. The WBT was most effective in promoting adherence with vaccination recommendations with an estimated average odds ratio = 1.26, P \u3c .05, to compare between preintervention and intervention periods. Over the influenza season, there was a significantly increasing trend in odds ratio in the WBT arm ( P \u3c .05). Encouraging process improvements and providing longitudinal feedback on monthly rate of vaccination sparked some practice changes but limited impact on outcomes. CONCLUSIONS: Web-based training at the start of influenza season with monthly reports of adherence can improve correct dose and timing of influenza vaccination with modest impact on overall vaccination rate
    • …
    corecore