12,010 research outputs found
TOWARDS ENHANCED E-COLLABORATION IN ACADEMIA A HOLISTIC MODEL FOR DEVELOPMENT OF E-COLLABORATION SOFTWARE
Henriksson, Aron. Neculau, Andrei. 2008. Towards Enhanced E-collaboration in Academia. A Holistic Model for Development E-collaboration Software. The Royal Institute of Technology, Stockholm, Sweden. Information and Communication Technology.E-collaboration is an inherently complex activity that encompasses many factors that supplement the pivotal technical elements. This paper investigates the various aspects of e-collaboration from an academic viewpoint, and reiterates the call for a holistic approach towards e-collaboration research and development. Moreover, the use of collaboration tools by IT students is surveyed, which substantiates the belief that e-collaboration needs to be further promoted in academia. We present a conceptual model that hopefully can provide some guidance for further research on e-collaboration and development of e-collaboration suites.E-collaboration, Academia, Requirements, Boundaries, Holistic
A document management methodology based on similarity contents
The advent of the WWW and distributed information systems have made it possible to share documents between different users and organisations. However, this has created many problems related to the security, accessibility, right and most importantly the consistency of documents. It is important that the people involved in the documents management process have access to the most up-to-date version of documents, retrieve the correct documents and should be able to update the documents repository in such a way that his or her document are known to others. In this paper we propose a method for organising, storing and retrieving documents based on similarity contents. The method uses techniques based on information retrieval, document indexation and term extraction and indexing. This methodology is developed for the E-Cognos project which aims at developing tools for the management and sharing of documents in the construction domain
Mechanisms of Endogenous Institutional Change
This paper proposes an analytical-cum-conceptual framework for understanding the nature of institutions as well as their changes. In doing so, it attempts to achieve two things: First, it proposes a way to reconcile an equilibrium (endogenous) view of institutions with the notion of agents’ bounded rationality by introducing such concepts as a summary representation of equilibrium as common knowledge of agents. Second, it specifies some generic mechanisms of institutional coherence and change -- overlapping social embededdness, Schumpeterian innovation in bundling games and dynamic institutional complementarities -- useful for understanding the dynamic interactions of economic, political, social and organizational factors.
Continuous Improvement Through Knowledge-Guided Analysis in Experience Feedback
Continuous improvement in industrial processes is increasingly a key element of competitiveness for industrial systems. The management of experience feedback in this framework is designed to build, analyze and facilitate the knowledge sharing among problem solving practitioners of an organization in order to improve processes and products achievement. During Problem Solving Processes, the intellectual investment of experts is often considerable and the opportunities for expert knowledge exploitation are numerous: decision making, problem solving under uncertainty, and expert configuration. In this paper, our contribution relates to the structuring of a cognitive experience feedback framework, which allows a flexible exploitation of expert knowledge during Problem Solving Processes and a reuse such collected experience. To that purpose, the proposed approach uses the general principles of root cause analysis for identifying the root causes of problems or events, the conceptual graphs formalism for the semantic conceptualization of the domain vocabulary and the Transferable Belief Model for the fusion of information from different sources. The underlying formal reasoning mechanisms (logic-based semantics) in conceptual graphs enable intelligent information retrieval for the effective exploitation of lessons learned from past projects. An example will illustrate the application of the proposed approach of experience feedback processes formalization in the transport industry sector
Gaming security by obscurity
Shannon sought security against the attacker with unlimited computational
powers: *if an information source conveys some information, then Shannon's
attacker will surely extract that information*. Diffie and Hellman refined
Shannon's attacker model by taking into account the fact that the real
attackers are computationally limited. This idea became one of the greatest new
paradigms in computer science, and led to modern cryptography.
Shannon also sought security against the attacker with unlimited logical and
observational powers, expressed through the maxim that "the enemy knows the
system". This view is still endorsed in cryptography. The popular formulation,
going back to Kerckhoffs, is that "there is no security by obscurity", meaning
that the algorithms cannot be kept obscured from the attacker, and that
security should only rely upon the secret keys. In fact, modern cryptography
goes even further than Shannon or Kerckhoffs in tacitly assuming that *if there
is an algorithm that can break the system, then the attacker will surely find
that algorithm*. The attacker is not viewed as an omnipotent computer any more,
but he is still construed as an omnipotent programmer.
So the Diffie-Hellman step from unlimited to limited computational powers has
not been extended into a step from unlimited to limited logical or programming
powers. Is the assumption that all feasible algorithms will eventually be
discovered and implemented really different from the assumption that everything
that is computable will eventually be computed? The present paper explores some
ways to refine the current models of the attacker, and of the defender, by
taking into account their limited logical and programming powers. If the
adaptive attacker actively queries the system to seek out its vulnerabilities,
can the system gain some security by actively learning attacker's methods, and
adapting to them?Comment: 15 pages, 9 figures, 2 tables; final version appeared in the
Proceedings of New Security Paradigms Workshop 2011 (ACM 2011); typos
correcte
Creationism and evolution
In Tower of Babel, Robert Pennock wrote that
“defenders of evolution would help their case
immeasurably if they would reassure their
audience that morality, purpose, and meaning are
not lost by accepting the truth of evolution.” We
first consider the thesis that the creationists’
movement exploits moral concerns to spread its
ideas against the theory of evolution. We analyze
their arguments and possible reasons why they are
easily accepted. Creationists usually employ two
contradictive strategies to expose the purported
moral degradation that comes with accepting the
theory of evolution. On the one hand they claim
that evolutionary theory is immoral. On the other
hand creationists think of evolutionary theory as
amoral. Both objections come naturally in a
monotheistic view. But we can find similar
conclusions about the supposed moral aspects of
evolution in non-religiously inspired discussions.
Meanwhile, the creationism-evolution debate
mainly focuses — understandably — on what
constitutes good science. We consider the need for
moral reassurance and analyze reassuring
arguments from philosophers. Philosophers may
stress that science does not prescribe and is
therefore not immoral, but this reaction opens the
door for the objection of amorality that evolution
— as a naturalistic world view at least —
supposedly endorses. We consider that the topic of
morality and its relation to the acceptance of
evolution may need more empirical research
Recommended from our members
Small and Medium sized Enterprises’ Collaborative Buyer-Supplier Relationships: Boundary Spanning Individual Perspectives
Boundary-spanning individuals (BSIs) play a critical role in supply chain management, especially in small and medium sized enterprises (SMEs) where interactions with buyers and suppliers can depend heavily on just a few individuals. This study, utilizing data from Korean manufacturing-sector SMEs, explores whether cooperative social value orientations of SMEs’ BSIs influence the effects of collaborative buyer-supplier initiatives. The results suggested that the performance implication of decision-sharing initiative increases when BSIs have a high level of cooperative social value orientation. However, it also negatively moderates the relationship between risk/benefit sharing (involving financial losses or gains) and performance suggesting possible negative side-effects. However, we found that such orientation also negatively moderates the relationship between risk/benefit sharing (involving direct financial losses or gains) and relationship performance suggesting possible negative side-effects
- …