Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 545

Full-Text Articles in Social and Behavioral Sciences

“The Role Of Switching Costs In The Markets For Pc Operating Systems, Online Search, Internet Access And Mobile Service: Implications For Australian Competition And Consumer Protection Policy”, Robert G. Harris Dec 2012

“The Role Of Switching Costs In The Markets For Pc Operating Systems, Online Search, Internet Access And Mobile Service: Implications For Australian Competition And Consumer Protection Policy”, Robert G. Harris

Robert G Harris

This paper addresses the role of switching costs in computing, communications and information technologies. Switching costs (and closely related network effects) play an increasingly important role in competitive analysis and competition policy. This paper considers the interplay of switching costs and the emergence of the digital, online economy, and examines the implications of switching costs for competition and competition policies in Australia.


Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy Dec 2012

Ict For Poverty Alleviation In Pacific Island Nations: Study Of Icts4d In Fiji, Deogratias Harorimana, Opeti Rokotuinivono, Emali Sewale, Fane Salaiwai, Marica Naulu, Evangelin Roy

Dr Deogratias Harorimana

ICT for Poverty Alleviation in Pacific Island Nations: Study of ICTs4D in Fiji There has been a vague and little knowledge on the role or potential of Information and Communications Technologies (ICTs) in relation to addressing poverty in Fiji. This may be probably due to the newness of the technology in the South Pacific Region as a whole but also probably due to the fact that only 9.7% of the current Fiji 931,000 populations are internet users (ITC Figures 2011). This paper reports on finding how ICTs is contributing towards poverty alleviation in Fiji. On the basis of reviewed best …


The Librarian/Lecturer: Successful Course Development Based On Km Principles, Stuart Basefsky Dec 2012

The Librarian/Lecturer: Successful Course Development Based On Km Principles, Stuart Basefsky

Stuart Basefsky

This presentation focuses on a highly successful and award winning course taught by a librarian/lecturer. It was specifically designed to serve the knowledge needs and aspirations of students, faculty, companies, publishers and the educational institution to which all these parties are connected. The unique manner in which the KM needs of the parties are met by establishing synergies is highlighted as well as how it is assessed.


Impact Of Psychological Factors On Investment Decision Making Mediating By Risk Perception: A Conceptual Study, Lubna Riaz, Ahmed Imran Hunjra, Rauf I. Azam Dec 2012

Impact Of Psychological Factors On Investment Decision Making Mediating By Risk Perception: A Conceptual Study, Lubna Riaz, Ahmed Imran Hunjra, Rauf I. Azam

Ahmed Imran Hunjra (PhD)

Every individual is different from others due to various factors which include demographic factors, age, race and sex, education level, social and economic background; same is the situation with the investors. The most critical challenge faced by them is the investment decision; they act in a rational manner and usually follow their instincts and emotional biases while making investment decisions. The investigation of previous studies reveals the importance of various psychological factors which affect their investment decision. Keeping this in view, a study model has been developed to describe the impact of risk propensity, asymmetric information and problem framing on …


An Estate Dilemma - Inaccessible Assets Hiding Behind Passwords And Encryption, Douglas J. Henderson Dec 2012

An Estate Dilemma - Inaccessible Assets Hiding Behind Passwords And Encryption, Douglas J. Henderson

DOUGLAS J HENDERSON

Every person living in the modern world holds valuable assets, data, or information in digital mediums. Digital mediums include not only digital hardware storage mediums in personal possession (like external hard drives and internal hard drives within laptop and desktop computers, personal digital assistants, cell phones, and the like), but also those only accessible through a network. Because so much is held in digital mediums, when an individual dies or becomes incapacitated, another person must know how to access the incapacitated person’s digital assets and other important information (this person is known herein as the ‘Responsible Party’). There are potential …


The Influence Of Infrastructural Trust On Electronic Commerce Development In Indonesia, Mira Kartiwi, Robert C. Macgregor Dec 2012

The Influence Of Infrastructural Trust On Electronic Commerce Development In Indonesia, Mira Kartiwi, Robert C. Macgregor

Dr Mira Kartiwi

The advent of E-commerce opens an opportunity for fostering an environment that promotes the globa/isation of markets throughout the world, especially those in developing countries /ike Indonesia. The importance of trust as a key facilitator of E-commerce is increasingly being recognized in academic and practitioner communities. However, empirical research in this area has been overwhelmed by contradictory conceptions of the trust construct, while inadequate attention is paid to the influence of trust constructs on E-commerce development in different cultural environments and settings. It is, therefore, the aim of this paper to address the gap by providing an exploratory study on …


Complex Modeling In Marketing Using Component Based Sem, Shahriar Akter, Umme Hani Dec 2012

Complex Modeling In Marketing Using Component Based Sem, Shahriar Akter, Umme Hani

Shahriar Akter

Structural equation modeling (SEM) is an important tool for marketing researchers to estimate a network of causal relationships linking two or more complex concepts. The PLS approach to SEM, also known as component based SEM, is becoming more prominent in estimating complex models due to its soft modeling assumptions. This study elucidates the use of component based SEM in estimating a complex higher order model with a small sample size. The utility of the approach is illustrated empirically by estimating a third-order, reflective, hierarchical service quality model in the context of mHealth. The findings of the study confirm the conceptual …


Electronic Documentation In Residential Aged Care Facilities - A Review Of The Literature On Organisational Issues And Early Findings On Initial Conditions From A Case Study, Kieren Diment, Ping Yu, Karin H. Garrety Dec 2012

Electronic Documentation In Residential Aged Care Facilities - A Review Of The Literature On Organisational Issues And Early Findings On Initial Conditions From A Case Study, Kieren Diment, Ping Yu, Karin H. Garrety

Dr Ping Yu

This paper discusses the theoretical rationale for an empirical study of organisational change arising from introduction of electronic nursing documentation in residential aged care facilities. The study draws on a processual view of organisational change, which is related to the theory of complex adaptive systems. First we review existing literature on electronic nursing documentation with an organisational focus to provide a context to help outline the research aims of the present study. Then we describe a method to explore the hierarchical nature of the work environment based on the sociological theory of Institutional Ethnography. Finally we use this approach to …


Source Of Value Online For Recreational Travellers: Customer Information Needs In The Buying Process And Internet Capability, Robert Grant Dec 2012

Source Of Value Online For Recreational Travellers: Customer Information Needs In The Buying Process And Internet Capability, Robert Grant

Robert Grant

The information needs of buyers of high involvement recreational travel products are potentially a source of customer value in their decision making process. The internet's ability to provide large amounts of information in real time with high levels of customer convenience are compounded by the ability to deliver information from multiple sources. In theory then, the internet seems able to largely replace the value delivered by retail travel intermediaries in the physical world. This critical review suggests however that the physical world intermediaries and online information sources are more likely to be complementary rather than competitive resources for shoppers for …


Online Information Values For Recreational Travellers: A Review Of Online Sources In Decision Making For An Unfamiliar Long Haul Destination, Robert Grant Dec 2012

Online Information Values For Recreational Travellers: A Review Of Online Sources In Decision Making For An Unfamiliar Long Haul Destination, Robert Grant

Robert Grant

Acquisition or purchase of travel arrangements involves an exchange of information which is theoretically suited for transfer from offline to online interaction. The ability to digitise material and ease access through searchability based on metatags (Reedy and Schullo, 2004, p 276) make the internet a potentially ideal medium for information gathering and exchange. This paper reviews the value of information sources for consumer decision making for a high involvement experience product with multiple and variable components and points to further research which help our understanding of the value of electronic networks.


Towards Executable Specification: Combining I* And Agentspeak(L), Farzad Salim, Chee Fon Chang, Aneesh Krishna, Aditya K. Ghose Dec 2012

Towards Executable Specification: Combining I* And Agentspeak(L), Farzad Salim, Chee Fon Chang, Aneesh Krishna, Aditya K. Ghose

Professor Aditya K. Ghose

Agent-oriented conceptual modeling(AoCM) approaches in Requirements Engineering (RE) have received considerable attention recently. Semi-formal modeling frameworks such as i* assist analysts in requirements elicitation and reasoning of early-phase RE. AgentSpeak( L) is a widely accepted agent programming language. The Strategic Rationale (SR) model of the i* framework naturally lends itself to AgentSpeak(L) programs. Furthermore, the Strategic Dependency (SD) component of the i* framework prescribes the interaction between the agents in a multi-agent environment. This paper proposes a formal methodology for transforming a SR model to an AgentSpeak( L) agent. The constructed AgentSpeak(L) agents will then form the essential components of …


Designing A Regional E-Logistics Portal, Adrian Collins, George Ditsa, Aditya K. Ghose, Peter N. Hyland, Sim K. Lau Dec 2012

Designing A Regional E-Logistics Portal, Adrian Collins, George Ditsa, Aditya K. Ghose, Peter N. Hyland, Sim K. Lau

Professor Aditya K. Ghose

A variety of optimization and negotiation technologies hold the promise of delivering value to the logistics processes of businesses both small and large, yet they tend to remain inaccessible to SMEs (largely due to price and complexity concerns). This paper describes the early-phase steps in a project to develop a regional e- logistics portal. The project seeks to make constraint-based optimization and automated negotiation technologies accessible to SMEs within a portal that also serves their information needs. The paper highlights several novel aspects of the design of the portal, as well as a novel requirements gathering process involving community consultation.


Organisational Control And The Self: Critiques And Normative Expectations, Karin Garrety Dec 2012

Organisational Control And The Self: Critiques And Normative Expectations, Karin Garrety

Karin Garrety

This article explores the normative assumptions about the self that are implicitly and explicitly embedded in critiques of organisational control. Two problematic aspects of control are examined – the capacity of some organisations to produce unquestioning commitment, and the elicitation of ‘false’ selves. Drawing on the work of Rom Harré, and some examples of organisational-self processes gone awry, I investigate the dynamics involved and how they violate the normative expectations that we hold regarding the self, particularly its moral autonomy and authenticity. The paper concludes by arguing that, despite post-structuralist challenges, some notion of a ‘core’ or ‘real’ self still …


Accounting For Corruption: Abuse Of Rank And Privilege, Kathleen A. Cooper, Ian K. Fargher Dec 2012

Accounting For Corruption: Abuse Of Rank And Privilege, Kathleen A. Cooper, Ian K. Fargher

Ian Fargher

Rank, privilege and responsibility should be inseparable. However, investigations ofcorporate scandals typically reveal rank, privilege and irresponsible behaviour gohand in hand. The publicity and recriminations surrounding corporate scandals tendto focus first on corporate executives implicated in poor management or otherinappropriate behaviour and then on the relevant regulators. Where financialmanipulation is revealed, the external auditor also comes under scrutiny. Thedeficiencies in corporate regulation including accounting and audit standards aresubject to less public inspection but are often the subject of enquiry by governmentappointedbodies. Recommendations for regulatory reform follow and the public isassured the risk of similar scandals is minimised or at least …


Association Between Corporate Disclosure And Information Needs Of Company Annual Report Users In Sri Lanka, Anura De Zoysa Dec 2012

Association Between Corporate Disclosure And Information Needs Of Company Annual Report Users In Sri Lanka, Anura De Zoysa

Anura De Zoysa

This paper examines the extent of disclosures in company annual reports of Sri Lankan listedcompanies and the user perceptions on the importance of information disclosed in company annualreports. For this purpose, annul reports of 65 Sri Lankan listed companies were analysed using adisclosure index. Furthermore, a questionnaire survey was conducted covering seven user groups toexamine the importance they attached to various information items disclosed in company annualreports. The results of the study revealed a fairly high level of overall disclosure (69.8%) in Sri Lankancompany annual reports with 90 per cent of the sample companies disclosing 43 per cent ofinformation items …


Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg Dec 2012

Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg

Jan Kallberg

La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …


Performance Audit: A Case Of Indian R&D Unit, Parulian Silaen, Shyam S. Bhati Dec 2012

Performance Audit: A Case Of Indian R&D Unit, Parulian Silaen, Shyam S. Bhati

Parulian Silaen

The purpose of this paper is to study the outcome of performance audit of anIndian research and development organisation, NIB and explore the utility of performanceaudit tools in determining the causes which lead to the failure of this particular organisation.A set of control tools developed by Silaen and Williams (2009) for the study of Research andDevelopment organisation are applied in this case. The elements of the tools developed bySilaen and Williams (2009) consist of dimensions and value of representation. Fourdimensions of control tools are given as directional, bureaucratic, scientific and financial.Three values of representation are given as external, internal and …


Identity-Based On-Line/Off-Line Signcryption, Dongdong Sun, Xinyi Huang, Yi Mu, Willy Susilo Dec 2012

Identity-Based On-Line/Off-Line Signcryption, Dongdong Sun, Xinyi Huang, Yi Mu, Willy Susilo

Professor Willy Susilo

We present an identity-based on-line/off-line signcryption scheme, where most of computations are carried out when the message is not available(i.e., off-line stage) and the on-line part of our scheme does not require any exponent computations and therefore is very efficient. It combines the functionalities of signature and encryption and is provably secure in the random oracle model. We also show that our scheme is indistinguishable against adaptive chosen-ciphertext attacks (IND-IDSC-CCA2) and is existentially unforgeable against adaptive chosen-message attacks (EF-IDSC-ACMA).


User Interfaces For The Exploration Of Hierarchical Multi-Dimensional Data, Mark Sifer Dec 2012

User Interfaces For The Exploration Of Hierarchical Multi-Dimensional Data, Mark Sifer

Dr Mark Sifer

A variety of user interfaces have been developed to support the querying of hierarchical multi-dimensional data in an OLAP setting such as pivot tables and more recently Polaris. They are used to regularly check portions of a dataset and to explore a new dataset for the first time. In this paper, we establish criteria for OLAP user interface capabilities to facilitate comparison. Two criteria are the number of displayed dimensions along which comparisons can be made and the number of dimensions that are viewable at once¿visual comparison depth and width. We argue that interfaces with greater visual comparison depth support …


Capital Intelectual, Guillermo Arosemena Dec 2012

Capital Intelectual, Guillermo Arosemena

Guillermo Arosemena

No abstract provided.


The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther Nov 2012

The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther

Jan Kallberg

With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.


Fai La Macroeconomia Giusta. Le Molte Ragioni Del Libro Di Paul Krugman Fuori Da Questa Crisi, Adesso!, Mario Pianta Nov 2012

Fai La Macroeconomia Giusta. Le Molte Ragioni Del Libro Di Paul Krugman Fuori Da Questa Crisi, Adesso!, Mario Pianta

Mario Pianta

L’analisi della crisi e le proposte di politica economica avanzate nel nuovo libro di Paul Krugman sono esaminate sul piano delle idee e del ruolo dei governi. Il volume riprende l’approccio di Keynes, arricchito dei contributi di economisti come Fisher, Kalecki e Minsky, e offre un quadro convincente degli aspetti macroeconomici. Si affrontano le questioni della domanda, della politica monetaria e le misure di austerità che hanno aggravato la depressione in Usa ed Europa. L’analisi di Krugman, tuttavia, trascura i problemi dell’apertura internazionale, del sistema produttivo e della distribuzione del reddito. Sono discusse infine le lezioni che si possono trarre …


Open Access Week 2012: Digital Asset Management Systems (Dams), Lisa Zillinski, Sonia Lorenz Nov 2012

Open Access Week 2012: Digital Asset Management Systems (Dams), Lisa Zillinski, Sonia Lorenz

Lisa Zilinski

No abstract provided.


Identity-Based On-Line/Off-Line Signcryption, Dongdong Sun, Xinyi Huang, Yi Mu, Willy Susilo Nov 2012

Identity-Based On-Line/Off-Line Signcryption, Dongdong Sun, Xinyi Huang, Yi Mu, Willy Susilo

Professor Yi Mu

We present an identity-based on-line/off-line signcryption scheme, where most of computations are carried out when the message is not available(i.e., off-line stage) and the on-line part of our scheme does not require any exponent computations and therefore is very efficient. It combines the functionalities of signature and encryption and is provably secure in the random oracle model. We also show that our scheme is indistinguishable against adaptive chosen-ciphertext attacks (IND-IDSC-CCA2) and is existentially unforgeable against adaptive chosen-message attacks (EF-IDSC-ACMA).


Collaboration In Supply Chain: A Multi-Agent Approach, Xin Li, Sim K. Lau Nov 2012

Collaboration In Supply Chain: A Multi-Agent Approach, Xin Li, Sim K. Lau

Dr Sim Kim Lau

Supply chain collaboration has become a critical success factor for supply chain management. Supply chain collaboration builds on information sharing, collaborative planning and execution. Many information systems have been developed for supply chain management. However, these systems do not sufficiently support collaborative supply chain. Recently, intelligent agent technology has received a great potential in supporting transparency in information flows and modeling the dynamic supply chain for collaborative supply chain. This paper explores the similarities between multi-agent system and supply chain to investigate the appropriateness of multi-agent based technology to model supply chain system and support collaborative supply chain planning and …


The Development Of A User Self-Help Knowledge Management System For Help Desk: Deployment Of Knowledge Management Approach And Software Agent Technology, Kar Yin Leung, Sim K. Lau Nov 2012

The Development Of A User Self-Help Knowledge Management System For Help Desk: Deployment Of Knowledge Management Approach And Software Agent Technology, Kar Yin Leung, Sim K. Lau

Dr Sim Kim Lau

Most help desks have admitted their call volume has increased in the past decade while “help unavailable when needed” is the major reason for service delivery failure and user dissatisfaction. The habit of calling help desk for simple problems has prompted the investigation of transferring part of first-level troubleshooting duty from help desk to user. This research proposes the development of user self-help knowledge management system that allows user to solve simple and routine technical enquiries. The proposed approach incorporates software agent to allow autonomous handling of enquiries so that the most appropriate solution and user communication can be facilitated.


Knowledge Management In Information Technology Help Desk: Past, Present And Future, Kar Yin Leung, Sim K. Lau Nov 2012

Knowledge Management In Information Technology Help Desk: Past, Present And Future, Kar Yin Leung, Sim K. Lau

Dr Sim Kim Lau

Information technology has changed the way organizations function. This resulted in the reliance of help desks to deal with information technology related areas such as hardware, software, and telecommunication. Besides, the adoption of business process reengineering and downsizing have led to the shrinkage of the size of help desk. The shorter information technology product life cycle has worsened the situation by increasing the already sizeable help desk’s user base. Consequently, the help desk has to cover more information technology products and resolute more technical enquiries with less staff. Thus, the outcome is clear that users have to wait comparably longer …


A Multi-Agent Approach Towards Collaborative Supply Chain Management, Xin Li, Sim K. Lau Nov 2012

A Multi-Agent Approach Towards Collaborative Supply Chain Management, Xin Li, Sim K. Lau

Dr Sim Kim Lau

Supply chain collaboration has become a critical success factor for supply chain management and effectively improves the performance of organizations in various industries. Supply chain collaboration builds on information sharing, collaborative planning and execution. Information technology is an important enabler of collaborative supply chain management. Many information systems have been developed for supply chain management from legacy systems and enterprise resource planning (ERP) into the newly developed advanced planning and scheduling system (APS) and e-commerce solutions. However, these systems do not provide sufficient support to achieve collaborative supply chain. Recently, intelligent agent technology and multi-agent system (MAS) have received a …


A Framework Of Ontology Revision On The Semantic Web: A Belief Revision Approach, Seung Hwan Kang, Sim K. Lau Nov 2012

A Framework Of Ontology Revision On The Semantic Web: A Belief Revision Approach, Seung Hwan Kang, Sim K. Lau

Dr Sim Kim Lau

The focus of the research in ontologies shifts from ontology representation to ontology evolution perspectives that become an important field of ontology research. Even though ontology refers to specification of conceptualisation that provides a useful way to represent the semantics of the Web resources, there is a still need for maintaining and handling ontologies. Because ontologies may change as a result of accepting new information, when this occurs, ontology needs to be revised. However the new information may contradict what was initially defined in the ontology when ontology revision is performed. To discuss this revision perspective, this research proposes an …


Developing Web Services Using Workflow Model: An Interorganisational Perspective, Geng Liang, Sim K. Lau, Zhaohao Sun Nov 2012

Developing Web Services Using Workflow Model: An Interorganisational Perspective, Geng Liang, Sim K. Lau, Zhaohao Sun

Dr Sim Kim Lau

This paper discusses how a workflow model can be used in the design and development of web services composition. We particularly investigate the development of web services composition in an inter-organizational workflow environment. We discuss respectively how to design an inter-organizational workflow from scratch when there is no existing internal workflow, and how to make existing internal workflows work together in an inter-organizational workflow environment.