54 research outputs found

    CPA WebTrust practitioners\u27 guide

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/1788/thumbnail.jp

    Genre, Database, and the Anatomy of the Digital Archive

    Get PDF
    The purpose of this study was to define shared characteristics of literary digital archives, specifically to explore how conceptual and structural qualities of such archives express generic qualities. In order to describe digital media such as database or digital archives, scholars resort to metaphors, and this study offers the metaphor of anatomy as a generic inscription with historical and methodological implications. The definition of the anatomy genre draws from Northrop Frye\u27s in Anatomy of Criticism, in which Frye describes how anatomies are characterized by proliferating lists, the mixing of prose and non-prose forms, and self-reflexivity--under the guise of knowledge accrual, investigation, and discovery. Criticism from digital humanities, new media, historiography, literature, and archival studies informed this research, in particular critical theory on genre and epistemology, and research on physical and digital archives. Because the definitions we apply to our digital technologies are under development, this dissertation participates in the overall emergence of terms in digital humanities theory. Several case studies analyzed the interface and underlying structures of four literary digital archives to consider how they represent the material past, and how design of visual elements and functionality manifest characteristics of the anatomy genre. The case studies suggest that literary websites. exhibits, and archives participate in the anatomy genre. but that some sites are more anatomical than others, and some sites do not align with the genre at all. The ability to designate a digital project as an anatomy depends more on encyclopedism, detailism, and its continual updating, than on any other factors. In addition, my own experience constructing a literary digital archive from historical manuscripts informs this investigation of genre, in particular my role as the researcher-archivist and how identity affects my approach to the archive. Historically, metacommentary has always been part of the anatomy genre, and this study positions methodological criticism as an expression of metacommentary. The study concludes by considering the implications of literary digital archives for scholarship and research, including effects of power, institutional impact, and the profession of English itself, especially in light of the anatomy genre\u27s tendency towards proliferation and unfinishability

    Constructing the Learning Environment in Classroom Convivial Computer Tools for Higher Education

    Get PDF
    New education technologies are coming on stream, enabling connectivity among teachers, facilitators and students. Students have to learn how to access Managed Learning Environments each time they move to different course websites. These barriers can hinder the real understanding of the subject matter for a course. This research calls for a rethink of pedagogical process towards blending together commonly used emerging social software and legacy educational tools rather than developing new tools for the classroom. Indeed, a learning tool should fit well to the learning model and philosophy of that course. Three case studies were conducted through different courses in the Digital Media master program and Informatik program at the University of Bremen, Germany. Students worked in small groups to design digital media and learning portal that should make learning more interesting and meaningful for them. At the end, this research proposes the concept of Constructing the Learning Environment in classroom and Convivial Computer Tools for higher education, where students and teachers, via dialogues in the class, can negotiate to deploy a set of selected tools and functions to match their learning needs. It is also to show that a tool with too many functions can cause confusion, rather than enhance effectiveness. To empower collaborative, interactive and personal learning, this work proposes the blended learning and classroom procedures for a convivial selection of educational tools. At the end, our innovative attempt is to bring constructionist learning into the higher education context

    A strategic perspective on the emergence and evolution of e-Banking in Saudi Arabia

    Get PDF
    The aim of the thesis is to look at the emergence and evolution of e-banking in Saudi Arabia, with particular emphasis on the processes of how banks implement e-banking to build their capabilities and create new value strategies. The research process focuses on understanding (1) how banks implement e-banking to build their capabilities as well as to create new value strategies, (2) how e-banking capabilities have been built, and (3) the role played by e-banking in shaping the strategic direction of banks. This requires understanding of a variety of aspects (i) the value created by e-banking products and services within different banks, (ii) the process of e-banking development within the different banks, (iii) how banks approach e-banking products and services, and (iv) how the banks align the demand and supply factors surrounding e-banking products and servicesThe theoretical approach blends inputs from different disciplines relevant to understand and deal with the subject matter of this thesis, including value creation and capability-building literature, technology implementation literature, with particular emphasis on the processes of implementing network technologies and e-businesses, as well as literature on process approaches. The methodological approach makes use of the case study strategy (Yin 2003) as research strategy, a multiple-case embedded design, as research design strategy, and three sources of evidence: (1) a survey distributed to all Saudi Arabian banks, (2) semi-structured interviews, and (3) archival records of e-banking transactions. The main fieldwork is longitudinal and takes place during three rounds: SeptemberOctober 2003, December 2003-March 2004, and December 2005-January 2006.The thesis investigates the emergence and evolution of e-banking at six Saudi Arabian banks: Samba Financial Group (Samba), AlRajhi Bank (AlRajhi), Saudi Investment Bank (Saib), Saudi Hollandi Bank (Hollandi), National Commercial Bank (AlAhli), and Riyad Bank (Riyad). This is followed by an investigation of the emergence and evolution of electronic securities trading systems at the Saudi Capital Market (i. e., Tadawul), providing an external view of the emergence and evolution of ebanking in Saudi Arabia.The analysis of the empirical material implements the theoretical propositions strategy via utilisation of the "sociotechnical constituencies" approach (Molina 1990; 1993) and its associated analytical tools of the "diamond of alignment" (Molina 1995), "alignment web" (Molina 2003) and "dynamic strategy mapping" (DSM) (Molina 2005). The aim is not only to use the approach to reveal how banks build their e-banking capabilities and create new value strategies, but also to test critically the applicability of the "sociotechnical constituencies" approach and its associated analytical tools for understanding e-banking value creation and capability-building strategies.The overall result of the investigation conducted by this thesis suggests that the Saudi Arabian ebanking' constituency-building process shows distinctive processes of sociotechnical alignment by each one of the specific Saudi banks' e-banking constituencies in the study. In addition, the use of Molina's "alignment web" to assess the state of each of the specific e-banking constituency-building processes helps identify the areas of strengths and weaknesses in these processes of sociotechnical alignment. The distinctiveness of development by each sociotechnical constituency is also highlighted by the application of the Molina's "dynamic strategy mapping" (DSM), showing that each constituency has its own combination of strategic ingredients.Although this thesis demonstrates strengths in the areas of logic replication, narrative writing, and validating procedure, in future studies it would be interesting to enhance its theoretical background, chronological structure, and quantitative assessment. This thesis contributes to providing a rich insight into the emergence and evolution of e-banking in Saudi Arabia, particularly at six of eleven Saudi banks as well as the technological systems of the Saudi Capital Market. Such contribution may be used to inform the future alignment strategy pursued by each the Saudi Arabian e-banking constituencies

    Conferentie informatiewetenschap 1999 : Centrum voor Wiskunde en Informatica, 12 november 1999 : proceedings

    Get PDF

    Conferentie informatiewetenschap 1999 : Centrum voor Wiskunde en Informatica, 12 november 1999 : proceedings

    Get PDF

    A formalised ontology for network attack classification

    Get PDF
    One of the most popular attack vectors against computers are their network connections. Attacks on computers through their networks are commonplace and have various levels of complexity. This research formally describes network-based computer attacks in the form of a story, formally and within an ontology. The ontology categorises network attacks where attack scenarios are the focal class. This class consists of: Denial-of- Service, Industrial Espionage, Web Defacement, Unauthorised Data Access, Financial Theft, Industrial Sabotage, Cyber-Warfare, Resource Theft, System Compromise, and Runaway Malware. This ontology was developed by building a taxonomy and a temporal network attack model. Network attack instances (also know as individuals) are classified according to their respective attack scenarios, with the use of an automated reasoner within the ontology. The automated reasoner deductions are verified formally; and via the automated reasoner, a relaxed set of scenarios is determined, which is relevant in a near real-time environment. A prototype system (called Aeneas) was developed to classify network-based attacks. Aeneas integrates the sensors into a detection system that can classify network attacks in a near real-time environment. To verify the ontology and the prototype Aeneas, a virtual test bed was developed in which network-based attacks were generated to verify the detection system. Aeneas was able to detect incoming attacks and classify them according to their scenario. The novel part of this research is the attack scenarios that are described in the form of a story, as well as formally and in an ontology. The ontology is used in a novel way to determine to which class attack instances belong and how the network attack ontology is affected in a near real-time environment

    E-Governance: Strategy for Mitigating Non-Inclusion of Citizens in Policy Making in Nigeria

    Get PDF
    The Nigerian federation that currently has 36 states structure adopted the Weberian Public Administrative system before now as an ideal way of running government, which was characterized with the traditional way of doing things without recourse to the deployment of Information Communication Technology (ICT). Today e-governance is seen as a paradigm shift from the previous way of governance. Research has shown that, the adoption and implementation of e-governance is more likely to bring about effective service delivery, mitigate corruption and ultimately enhance citizens’ participation in governmental affairs. However, it has been argued that infrastructure such as regular electricity power and access to the Internet, in addition to a society with high rate of literacy level are required to effectively implement and realize the potentials of e-governance for improved delivery of services. Due to the difficulties currently experienced, developing nations need to adequately prepare for the implementation of e-governance on the platform of Information Communication Technology (ICT). Hence, this study seeks to examine whether the adoption and implementation of e-governance in the context of Nigeria would mitigate the hitherto non-inclusion of citizens in the formulation and implementation of government policies aimed at enhanced development. To achieve the objective of the study, data were sourced and analyzed majorly by examining government websites of 20 states in the Nigerian federation to ascertain if there are venues for citizens to interact with government in the area of policy making and feedback on government actions, as a way of promoting participatory governance. The study revealed that the adoption and implementation of e-governance in the country is yet to fully take place. This is due to lack of infrastructure, low level of literacy rate and government inability to provide the necessary infrastructure for e-governance to materialize. The paper therefore, recommends among others the need for the Federal Government to involve a sound and clear policy on how to go about the adoption and implementation of egovernance through deliberate effort at increasing budgetary allocation towards infrastructural development and mass education of citizens
    • …
    corecore