5,825 research outputs found

    Network strategies for the new economy

    Get PDF
    In this paper we argue that the pace and scale of development in the information and communication technology industries (ICT) has had and continues to have major effects on the industry economics and competitive dynamics generally. We maintain that the size of changes in demand and supply conditions is forcing companies to make significant changes in the way they conceive and implement their strategies. We decompose the ICT industries into four levels, technology standards, supply chains, physical platforms, and consumer networks. The nature of these technologies and their cost characteristics coupled with higher degrees of knowledge specialisation is impelling companies to radical revisions of their attitudes towards cooperation and co-evolution with suppliers and customers. Where interdependencies between customers are particularly strong, we anticipate the possibility of winner-takes-all strategies. In these circumstances industry risks become very high and there will be significant consequences for competitive markets

    Metadata enrichment for digital heritage: users as co-creators

    Get PDF
    This paper espouses the concept of metadata enrichment through an expert and user-focused approach to metadata creation and management. To this end, it is argued the Web 2.0 paradigm enables users to be proactive metadata creators. As Shirky (2008, p.47) argues Web 2.0’s social tools enable “action by loosely structured groups, operating without managerial direction and outside the profit motive”. Lagoze (2010, p. 37) advises, “the participatory nature of Web 2.0 should not be dismissed as just a popular phenomenon [or fad]”. Carletti (2016) proposes a participatory digital cultural heritage approach where Web 2.0 approaches such as crowdsourcing can be sued to enrich digital cultural objects. It is argued that “heritage crowdsourcing, community-centred projects or other forms of public participation”. On the other hand, the new collaborative approaches of Web 2.0 neither negate nor replace contemporary standards-based metadata approaches. Hence, this paper proposes a mixed metadata approach where user created metadata augments expert-created metadata and vice versa. The metadata creation process no longer remains to be the sole prerogative of the metadata expert. The Web 2.0 collaborative environment would now allow users to participate in both adding and re-using metadata. The case of expert-created (standards-based, top-down) and user-generated metadata (socially-constructed, bottom-up) approach to metadata are complementary rather than mutually-exclusive. The two approaches are often mistakenly considered as dichotomies, albeit incorrectly (Gruber, 2007; Wright, 2007) . This paper espouses the importance of enriching digital information objects with descriptions pertaining the about-ness of information objects. Such richness and diversity of description, it is argued, could chiefly be achieved by involving users in the metadata creation process. This paper presents the importance of the paradigm of metadata enriching and metadata filtering for the cultural heritage domain. Metadata enriching states that a priori metadata that is instantiated and granularly structured by metadata experts is continually enriched through socially-constructed (post-hoc) metadata, whereby users are pro-actively engaged in co-creating metadata. The principle also states that metadata that is enriched is also contextually and semantically linked and openly accessible. In addition, metadata filtering states that metadata resulting from implementing the principle of enriching should be displayed for users in line with their needs and convenience. In both enriching and filtering, users should be considered as prosumers, resulting in what is called collective metadata intelligence

    Medical Cyber-Physical Systems Development: A Forensics-Driven Approach

    Full text link
    The synthesis of technology and the medical industry has partly contributed to the increasing interest in Medical Cyber-Physical Systems (MCPS). While these systems provide benefits to patients and professionals, they also introduce new attack vectors for malicious actors (e.g. financially-and/or criminally-motivated actors). A successful breach involving a MCPS can impact patient data and system availability. The complexity and operating requirements of a MCPS complicates digital investigations. Coupling this information with the potentially vast amounts of information that a MCPS produces and/or has access to is generating discussions on, not only, how to compromise these systems but, more importantly, how to investigate these systems. The paper proposes the integration of forensics principles and concepts into the design and development of a MCPS to strengthen an organization's investigative posture. The framework sets the foundation for future research in the refinement of specific solutions for MCPS investigations.Comment: This is the pre-print version of a paper presented at the 2nd International Workshop on Security, Privacy, and Trustworthiness in Medical Cyber-Physical Systems (MedSPT 2017

    Analytic Metaphysics versus Naturalized Metaphysics: The Relevance of Applied Ontology

    Get PDF
    The relevance of analytic metaphysics has come under criticism: Ladyman & Ross, for instance, have suggested do discontinue the field. French & McKenzie have argued in defense of analytic metaphysics that it develops tools that could turn out to be useful for philosophy of physics. In this article, we show first that this heuristic defense of metaphysics can be extended to the scientific field of applied ontology, which uses constructs from analytic metaphysics. Second, we elaborate on a parallel by French & McKenzie between mathematics and metaphysics to show that the whole field of analytic metaphysics, being useful not only for philosophy but also for science, should continue to exist as a largely autonomous field

    Object lessons : a learning object approach to e-learning for social work education

    Get PDF
    Learning objects are bite-sized digital learning resources designed to tackle the e-learning adoption problem by virtue of their scale, adaptability, and interoperability. The learning object approach advocates the creation of small e-learning resources rather than whole courses: resources that can be mixed and matched; used in a traditional or online learning environment; and adapted for reuse in other discipline areas and in other countries. Storing learning objects within a subject specific digital repository to enable search, discovery, sharing and use adds considerable value to the model. This paper explores the rationale for a learning object approach to e-learning and reflects on early experiences in developing a national learning object repository for social work education in Scotland

    Representing the family: how does the state 'think family'?

    Get PDF
    Over the last decade the family and family-centred policies and practices have received increasing attention within the public service agenda, culminating in the emphatic instruction to ‘think family’ individually, collectively and institutionally. This has occurred at a time when the sociology of the family has increasingly emphasised the difficulties of thinking family in a coherent way. In this article we explore this agenda through an examination of the representational tools with which public service professionals and managers have been recently equipped. We conclude by questioning the adequacy of these tools for effectively representing family relations

    A 'likely benefit' from aligning Web 2.0 technologies with an institutions learning and teaching agenda

    Get PDF
    This paper demonstrates a ‘likely benefit’, and a practical view of expected challenges, when incorporating Web 2.0 technologies in a contemporary higher education context. After first exploring which factors potentially influence a shift in thinking about learning and teaching in a Web 2.0 context this paper then addresses the important role, or the affordance, of an integrated Learning Management System (LMS) and the pedagogical applications of Web 2.0 technologies. It then uses a series of case study from the University of Southern Queensland, a large distance education provider in Australia, to support these propositions. Overall, this paper suggests that the goals and ideals of Web 2.0/ Pedagogy 2.0 can be achieved, or at least stimulated, within an institutional LMS environment, as long as the LMS environment is aligned with these ideals

    Personalised Learning: Developing a Vygotskian Framework for E-learning

    Get PDF
    Personalisation has emerged as a central feature of recent educational strategies in the UK and abroad. At the heart of this is a vision to empower learners to take more ownership of their learning and develop autonomy. While the introduction of digital technologies is not enough to effect this change, embedding the affordances of new technologies is expected to offer new routes for creating personalised learning environments. The approach is not unique to education, with consumer technologies offering a 'personalised' relationship which is both engaging and dynamic, however the challenge remains for learning providers to capture and transpose this to educational contexts. As learners begin to utilise a range of tools to pursue communicative and collaborative actions, the first part of this paper will use analysis of activity logs to uncover interesting trends for maturing e-learning platforms across over 100 UK learning providers. While personalisation appeals to marketing theories this paper will argue that if learning is to become personalised one must ask what the optimal instruction for any particular learner is? For Vygotsky this is based in the zone of proximal development, a way of understanding the causal-dynamics of development that allow appropriate pedagogical interventions. The second part of this paper will interpret personalised learning as the organising principle for a sense-making framework for e-learning. In this approach personalised learning provides the context for assessing the capabilities of e-learning using Vygotsky’s zone of proximal development as the framework for assessing learner potential and development

    Rethinking Anticircumvention\u27s Interoperability Policy

    Get PDF
    Interoperability is widely touted for its ability to spur incremental innovation, increase competition and consumer choice, and decrease barriers to accessibility. In light of these attributes, intellectual property law generally permits follow-on innovators to create products that interoperate with existing systems, even without permission. The anticircumvention provisions of the Digital Millennium Copyright Act ( DMCA ) represent a troubling departure from this policy, resulting in patent-like rights to exclude technologies that interoperate with protected platforms. Although the DMCA contains internal safeguards to preserve interoperability, judicial misinterpretation and narrow statutory text render those safeguards largely ineffective. One approach to counteracting the DMCA\u27s restrictions on interoperability is to rely on antitrust scrutiny and the resulting mandatory disclosure of technical information. But both doctrinal and policy considerations suggest that antitrust offers a less than ideal means of lessening the DMCA\u27s impact on interoperability. Rather than relying on antitrust, this Article proposes a solution that addresses the restriction of interoperability at its source. This approach broadens the DMCA\u27s existing interoperability exemption to create an environment more hospitable to interoperable technologies. To preserve the protections the DMCA offers copyright holders, this expanded exemption would disaggregate control over interoperable software and devices from the control over access and copying that Congress intended the DMCA to enable

    Rethinking Anticircumvention\u27s Interoperability Policy

    Get PDF
    Interoperability is widely touted for its ability to spur incremental innovation, increase competition and consumer choice, and decrease barriers to accessibility. In light of these attributes, intellectual property law generally permits follow-on innovators to create products that interoperate with existing systems, even without permission. The anticircumvention provisions of the Digital Millennium Copyright Act ( DMCA ) represent a troubling departure from this policy, resulting in patent-like rights to exclude technologies that interoperate with protected platforms. Although the DMCA contains internal safeguards to preserve interoperability, judicial misinterpretation and narrow statutory text render those safeguards largely ineffective. One approach to counteracting the DMCA\u27s restrictions on interoperability is to rely on antitrust scrutiny and the resulting mandatory disclosure of technical information. But both doctrinal and policy considerations suggest that antitrust offers a less than ideal means of lessening the DMCA\u27s impact on interoperability. Rather than relying on antitrust, this Article proposes a solution that addresses the restriction of interoperability at its source. This approach broadens the DMCA\u27s existing interoperability exemption to create an environment more hospitable to interoperable technologies. To preserve the protections the DMCA offers copyright holders, this expanded exemption would disaggregate control over interoperable software and devices from the control over access and copying that Congress intended the DMCA to enable
    • 

    corecore