Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Physical Sciences and Mathematics

The Representation Of Context In Computer Software, Hisham Assal, Kym Pohl, Jens G. Pohl Feb 2013

The Representation Of Context In Computer Software, Hisham Assal, Kym Pohl, Jens G. Pohl

Hisham Assal

Computers do not have the equivalent of a human cognitive system and therefore store data simply as the numbers and words that are entered into the computer. For a computer to interpret data it requires an information structure that provides at least some level of context. This can be accomplished utilizing an ontology of objects with characteristics, semantic behavior, and a rich set of relationships to create a virtual version of real world situations and provide the context within which intelligent logic (e.g., agents) can automatically operate. This paper discusses the process of developing ontologies that serve to provide context …


Data Security And Information Privacy For Pda Accessible Clinical-Log For Medical Education In Problem-Based Learning (Pbl) Approach, Rattiporn Luanrattana, Khin Than Win, John A. Fulcher Dec 2012

Data Security And Information Privacy For Pda Accessible Clinical-Log For Medical Education In Problem-Based Learning (Pbl) Approach, Rattiporn Luanrattana, Khin Than Win, John A. Fulcher

Dr Khin Win

Data security and information privacy are the important aspects to consider for the use of mobile technology for recording clinical experience and encounter in medical education. Objective: This study aims to address the qualitative findings of the appropriate data security and information privacy for PDA accessible clinical-log in problem-based learning (PBL) approach in medical education. Method: The semi-structured interviews were conducted with the medical faculty members, honorary clinical academics and medical education technology specialists. Results: Data security and information access plan were determined for managing clinical-log data. The results directed the guideline for the future development and implementation of clinical-log …


Study Of Characteristics Of Effective Online Help Systems To Facilitate Nurses Interacting With Nursing Information Systems, Yiyu Qiu, Ping Yu Dec 2012

Study Of Characteristics Of Effective Online Help Systems To Facilitate Nurses Interacting With Nursing Information Systems, Yiyu Qiu, Ping Yu

Dr Ping Yu

Topic area and paper objectives: Through identifying characteristics of Online Help System (OHS) that could facilitate nurses effectively interacting with information system, this paper proposes a framework that could guide the development of OHS written for a Nursing Information System (NIS). Background and concise literature review: User training is an important mechanism to guarantee the success of information system implementation. This is particularly true for a user group such as nurses. When faced with unfamiliar tasks, a user requires assistance to get the system to work. An OHS is supposed to be helpful in such situation. However, to date it …


Critical Factors For The Successful Introduction Of Information And Communication Technologies Into Health Care Organisations, Ping Yu, Hui Yu, Tracey Mcdonald Dec 2012

Critical Factors For The Successful Introduction Of Information And Communication Technologies Into Health Care Organisations, Ping Yu, Hui Yu, Tracey Mcdonald

Dr Ping Yu

The paper discusses critical factors for the successful introduction of information and communication technologies (ICT) into health care organisations. The proven evidence around the world suggests that introducing health ICT is a mutual transformation process that actively involves people, organisation and technology. The key people factors include personal attributes of the change agent, user ownership and positive user attitudes. The organisational facilitators are adequate funding, strong leadership and project management, integration of IT with work practices, managing change and end user expectations, and end user training and support. User friendly and useful systems can be achieved by involving both management …


A Multi-Method Approach To Evaluate Health Information Systems, Ping Yu Dec 2012

A Multi-Method Approach To Evaluate Health Information Systems, Ping Yu

Dr Ping Yu

Systematic evaluation of the introduction and impact of health information systems (HIS) is a challenging task. As the implementation is a dynamic process, with diverse issues emerge at various stages of system introduction, it is challenge to weigh the contribution of various factors and differentiate the critical ones. A conceptual framework will be helpful in guiding the evaluation effort; otherwise data collection may not be comprehensive and accurate. This may again lead to inadequate interpretation of the phenomena under study. Based on comprehensive literature research and own practice of evaluating health information systems, the author proposes a multimethod approach that …


A Cloud-Based Design Of Smart Car Information Services, Yi Xu, Jun Yan Dec 2012

A Cloud-Based Design Of Smart Car Information Services, Yi Xu, Jun Yan

Dr Jun Yan

"Although modern Smart Car technologies are growing rapidly, there are many challenges to be addressed. The limited processing capabilities of the contemporary in-car computers in smart cars may cause bottlenecks in smart control. The content in smart car applications can hardly be extended. In addition, the traditional software installation approach that is used in smart cars is neither economical nor convenient. To address these issues in smart cars, this paper presents a Cloud-based Information Integration Platform that has the ability to improve flexibility and enhance the value of smart cars. In this work, the architecture of the Cloud-based Information Integration …


A Preliminary Investigation Of Complex Adaptive Systems As A Model For Explaining Organisational Change Caused By The Introduction Of Health Information Systems, Kieren Diment, Ping Yu, Karin Garrety Dec 2012

A Preliminary Investigation Of Complex Adaptive Systems As A Model For Explaining Organisational Change Caused By The Introduction Of Health Information Systems, Kieren Diment, Ping Yu, Karin Garrety

Karin Garrety

This paper documents the preliminary development of a framework for evaluating organisational change processes during the implementation of an electronic nursing documentation system in residential aged care facilities. It starts with a brief outline of organisational change processes. This is followed by a more detailed exposition of the principles underlying complex adaptive systems (CAS) theory, where we explain how mathematical concepts can be used to illuminate qualitative research approaches. Finally we present some preliminary findings on the facilitators and barriers for the introduction of the electronic documentation system, explained with reference to the CAS theory, based on analysis of interviews …


Can The Love Of Learning Be Taught?, R. Nillsen Nov 2012

Can The Love Of Learning Be Taught?, R. Nillsen

Professor Rodney Nillsen

This paper is an expanded version of a talk given at a Generic Skills Workshop at the University of Wollongong, and was originally intended for academic staff from any discipline and general staff with an interest in teaching. The issues considered in the paper include the capacity of all to learn, the distinction between learning as understanding and learning as information, the interaction between the communication and the content of ideas, the tension between perception and content in communication between persons, and the human functions of a love of learning. In teaching, the creation of a fear-free environment is emphasised, …


Optimization Of Task Processing Schedules In Distributed Information Systems, Janusz R. Getta Nov 2012

Optimization Of Task Processing Schedules In Distributed Information Systems, Janusz R. Getta

Dr Janusz Getta

The performance of data processing in distributed information systems strongly depends on theefficient scheduling of the applications that access data at the remote sites. This work assumes atypical model of distributed information system where a central site is connected to a number ofremote and highly autonomous remote sites. An application started by a user at a central site isdecomposed into several data processing tasks to be independently processed at the remote sites.The objective of this work is to find a method for optimization of task processing schedules at acentral site. We define an abstract model of data and a system …


Data Security And Information Privacy For Pda Accessible Clinical-Log For Medical Education In Problem-Based Learning (Pbl) Approach, Rattiporn Luanrattana, Khin Than Win, John A. Fulcher Nov 2012

Data Security And Information Privacy For Pda Accessible Clinical-Log For Medical Education In Problem-Based Learning (Pbl) Approach, Rattiporn Luanrattana, Khin Than Win, John A. Fulcher

Professor John Fulcher

Data security and information privacy are the important aspects to consider for the use of mobile technology for recording clinical experience and encounter in medical education. Objective: This study aims to address the qualitative findings of the appropriate data security and information privacy for PDA accessible clinical-log in problem-based learning (PBL) approach in medical education. Method: The semi-structured interviews were conducted with the medical faculty members, honorary clinical academics and medical education technology specialists. Results: Data security and information access plan were determined for managing clinical-log data. The results directed the guideline for the future development and implementation of clinical-log …


Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael Apr 2012

Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael

Professor Katina Michael

Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.


Prescriptive System For Performance Information Management System, Dr. Dipo Theophilus Akomolafe Mbcs, Mncs, Mcpn,, B A. Onyekwelu Mrs, Oniyide Bello Dec 2011

Prescriptive System For Performance Information Management System, Dr. Dipo Theophilus Akomolafe Mbcs, Mncs, Mcpn,, B A. Onyekwelu Mrs, Oniyide Bello

Dr. Dipo Theophilus Akomolafe MBCS, MNCS, MCPN,

Information can be briefly defined as processed data. Information is crucial to the success of any organization because it must be exchanged in one form or the other before activities can be carried out. However, too much information can be overwhelming and lead to poor decision-making. Further, as organizations face an ever-growing wave of digital data, they need to analyze that data and make timely decisions to achieve effective management .Formerly, information was viewed simply as a means of expression, they now serve as the foundation for an organization’s effectiveness and efficiency. Additionally, increased pressures to manage information appropriately, communicate …


Bridging Micro And Macro Through Experimental Information Acceleration, Tim R. Coltman, Pierre Richard Feb 2011

Bridging Micro And Macro Through Experimental Information Acceleration, Tim R. Coltman, Pierre Richard

Tim Coltman

Among leading organizations in all sectors there is evidence that successful managers possess the capability to deal with contradictory tensions within their “macro” competitive and institutional environments. Furthermore, the strategic thinking and decision-making capabilities expected of managers highlight the importance of “micro” processes within organizations. Although macro and micro perspectives are intuitively linked, the empirical literature often separates these two perspectives into either strategy content or process. This paper demonstrates how an experimental method based on “discrete choice analysis” and “information acceleration” can be used to bridge the divide between “micro” managerial processes and the “macro” environmental contexts framing them. …


The Information Warfare Lifecycle Model, Manoj Maharaj, Brett Van Nikerk Jan 2011

The Information Warfare Lifecycle Model, Manoj Maharaj, Brett Van Nikerk

Manoj Maharaj

No abstract provided.


A Model For Determining The Degree Of Contradictions In Information, Ram Gopal Raj Jan 2011

A Model For Determining The Degree Of Contradictions In Information, Ram Gopal Raj

Ram Gopal Raj

Conversational systems are gaining popularity rapidly. Consequently, the believability of the conversational systems or chatterbots is becoming increasingly important. Recent research has proven that learning chatterbots tend to be rated as being more believable by users. Based on Raj’s Model for Chatterbot Trust, we present a model for allowing chatterbots to determine the degree of contradictions in contradictory statements when learning thereby allowing them to potentially learn more accurately via a form of discourse. Some information that is learnt by a chatterbot may be contradicted by other information presented subsequently. Choosing correctly which information to use is critical in chatterbot …


A Dynamic Information Generation Approach For He: Ig3 Characteristics, Jeffrey Barker, K. Sabry Jan 2010

A Dynamic Information Generation Approach For He: Ig3 Characteristics, Jeffrey Barker, K. Sabry

Jeffrey Barker

This paper proposes the integration of Information Generation 3 (IG3) principles to education systems to advance curriculum and instruction from traditional static designs to build dynamic learning communities and courses in higher education. Dynamic information should stimulate and support methodological flexibility for converging learner-centred and knowledge-centred education environments. This convergence is achieved through a complex mix of connected digital devices and pedagogical methods proven effective by any number of learning theories. Flexibility and diversity are important principles in the IG3 approach to permit the application of multiple scalable digital communication tools, teaching methods and decision-making to advance this new direction. …


Gis @ Ut Libraries, Allison Roberts Jan 2010

Gis @ Ut Libraries, Allison Roberts

Allison Roberts

Information handout/poster for GIS services at UT


Data, Information, And Knowledge In The Context Of Sils, Michael A. Zang, Jens G. Pohl Jul 2008

Data, Information, And Knowledge In The Context Of Sils, Michael A. Zang, Jens G. Pohl

Jens G. Pohl

Data, information, and knowledge are becoming increasingly common terms in the literature of the software industry. This terminology originated some time ago in the disciplines of cognitive science and artificial intelligence to reference three closely related but distinct concepts. Traditionally, mainstream software engineering has lumped all three concepts together as data and has only recently begun to distinguish between them. Unfortunately, the popular desire to distinguish between data, information, and knowledge within the mainstream has blurred the individual meanings of the words to the point where there is no longer a clear-cut distinction between them for most people. This problem …


Knowledge Management Enterprise Services (Kmes): Concepts And Implementation Principles, Jens G. Pohl Apr 2008

Knowledge Management Enterprise Services (Kmes): Concepts And Implementation Principles, Jens G. Pohl

Jens G. Pohl

The purpose of this paper is to present concepts and implementation principles related to the design and development of reusable software services that are capable of assisting users at the operational level. Knowledge Management Enterprise Services (KMES) are an implementation of the service-oriented architecture paradigm, with a focus on the exchange of data within the meaningful context of a particular application (i.e., knowledge) domain. This requires a KMES service to incorporate a high level representation of this knowledge domain in the form of an ontology that is shared among all collaborating services within the application environment and at the same …


The Attitudes Of Educators To Information Technology Adoption In Schools Settings, Manoj Maharaj, Wesley Govender Jan 2005

The Attitudes Of Educators To Information Technology Adoption In Schools Settings, Manoj Maharaj, Wesley Govender

Manoj Maharaj

No abstract provided.


Using Dynamic Information In The Supply Network, Jeffrey Barker Dec 2003

Using Dynamic Information In The Supply Network, Jeffrey Barker

Jeffrey Barker

No abstract provided.