Dissertations / Theses on the topic 'Intranets (Computer networks) Australia'

To see the other types of publications on this topic, follow the link: Intranets (Computer networks) Australia.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 35 dissertations / theses for your research on the topic 'Intranets (Computer networks) Australia.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Myerscough, Mark Alan. "Organizational Considerations for and Individual Perceptions of Web-Based Intranet Systems." Thesis, University of North Texas, 1999. https://digital.library.unt.edu/ark:/67531/metadc278678/.

Full text
Abstract:
Utilization of World Wide Web style Web-Based Intranet Systems (W-BIS) is a rapidly expanding information delivery technique in many organizations. Published reports concerning these systems have cited return on investment values exceeding 1300% and direct payback time periods as low as six to twelve weeks. While these systems have been widely implemented, little theoretically grounded research has been conducted in relation to users' acceptance, utilization or the perceived quality of these systems. The study employed a two-site investigation of corporate Web-Based Intranet Systems, with surveys distributed via the traditional mail system. The complete survey instrument distributed to employees included the ServQual/ServPerf, User Information Satisfaction, Ease of Use/Usefulness, and Computer Playfulness instruments. In addition to these previously developed instruments, the survey instrument for this study included measures of Web-Based Intranet Systems utilization and usefulness along with respondent demographics and subordinate-reported managerial commitment. This study investigated the reliability and validity of the ServQual/ServPerf instrument in an information systems service environment. The same analysis was conducted of the more generally accepted User Information Satisfaction instrument.
APA, Harvard, Vancouver, ISO, and other styles
2

Stuckert, Donald H. "A study of corporate intranets and their impacts on current and future training needs." Online version, 2000. http://www.uwstout.edu/lib/thesis/2000/2000stuckertd.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gubanich, Bradford C. "How are U.S. corporations using Intranets for their company's internal communication?" Instructions for remote access. Click here to access this electronic resource. Access available to Kutztown University faculty, staff, and students only, 1998. http://www.kutztown.edu/library/services/remote_access.asp.

Full text
Abstract:
Thesis (M.S.)--Kutztown University of Pennsylvania, 1998.
Source: Masters Abstracts International, Volume: 45-06, page: 2700. Typescript. Abstract precedes thesis as preliminary leaves [1-2]. Includes bibliographical references (leaves 75-77).
APA, Harvard, Vancouver, ISO, and other styles
4

Cervera, Barbara R. "Intranet design for a multi-site university library system : a case study /." View abstract, 2000. http://library.ctstateu.edu/ccsu%5Ftheses/1583.html.

Full text
Abstract:
Thesis (M.S.)--Central Connecticut State University, 2000.
Thesis advisor: Yunan Ju. " ... in partial fulfillment of the requirements for the degree of Master of Science in [the Department of Communication]." Includes bibliographical references (leaves 54-57).
APA, Harvard, Vancouver, ISO, and other styles
5

Lenaburg, Allen Gregg. "Intranet concept for small business." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2710.

Full text
Abstract:
The purpose of this project is to build a working intranet containing core applications that create the framework for a small business intranet. Small businesses may benefit from an intranet because of its ability to effectively streamline the processes for retrieving and distributing information. Intranets are internal networks using TCP/IP protocols, Web server software, and browser client software to share information created in HTML within an organization, and to access company databases.
APA, Harvard, Vancouver, ISO, and other styles
6

Jacoby, Grant A. "A metric model for Intranet portal business requirements." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FJacoby%5FPhD.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sing, Min Yvonne Monica. "The development of a model for organising educational resources on an Intranet." Thesis, Port Elizabeth Technikon, 2003. http://hdl.handle.net/10948/221.

Full text
Abstract:
The twenty-first century has found education at the crossroads of change. There are burgeoning challenges facing the modern educator. To rise to the importuning, educators find themselves turning to Information Technology for the answers. The technologies utilised in attempts to overcome the challenges often include the Internet and electronic educational resources. Although the Internet is not unduly called the Information Highway, it is also fraught with misleading and incorrect information. Educators’ arduous searches result in few good and useable resources. Thus, to store, organise and efficiently retrieve the discovered resources is a matter of time-saving. The aim of the study was to develop a method to organise and retrieve educational resources in an efficient and personalised manner. In order to do this, an exploration into pedagogy and educational paradigms was undertaken. The current educational paradigm, constructivism, proposes that each learner is an individual with unique learning and personal needs. To develop a new model, the current models need to be understood. The current solutions for the organising of educational resources are realised as several software packages, also called e-learning packages. A list of criteria that describes the essential requirements for organising educational resources was established. These criteria were based upon the pedagogical principles prescribed by educators and the practical technological frameworks necessary to fulfil the needs of the teaching/learning situation. These criteria were utilised to critique and explore the available solutions. It was found that although the available e-learning packages fulfil a need within their genre, it does not meet with the core requirements of constructivism. The resource base model seeks to address these needs by focussing on the educational aspects of resource delivery over an Intranet. For the purposes of storing, organising and delivering the resources, a database had to be established. This database had to have numerous qualities, including the ability to search and retrieve resources with great efficiency. Retrieving data in an efficient manner is the forte of the star schema, while the storing and organising of data is the strength of a normalised schema. It is not standard practice to utilise both types of schemas within the same database. A star schema is usually reserved for data warehouses because of its data retrieval abilities. It is customary to utilise a normalised schema for operational databases. The resource base model, however, needs both the storage facilities of an operational database and the efficient query facilities of a data warehouse. The resource base model, therefore, melds both schemas into one database with interlinking tables. This database forms the foundation (or the back-end) of the resource base. The resource base model utilises web browsers as its user interface (or front-end). The results of the study on the pedagogy, the current e-learning solutions and the resource base were written up within this dissertation. The contribution that this dissertation makes is the development of a technique to efficiently store, organise and retrieve educational resources in such a manner that both the requirements of constructivism and outcomes-based education are fulfilled. To this end, a list of technological and pedagogical criteria on which to critique a resource delivery technique has been developed. This dissertation also elaborates on the schema designs chosen for the resource base, namely the normalised schema and the star schema. From this schema, a prototype has been developed. The prototype’s function was two-fold. The first function is to determine the feasibility of the technique. Secondly, to determine the success of the technique in fulfilling the needs expressed in the list of criteria
APA, Harvard, Vancouver, ISO, and other styles
8

Bullock, Kenneth F. "Navy Marine Corps Intranet : an analysis of its approach to the challenges associated with seat management contracting." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBullock.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Albuquerque, Edison de Queiroz. "Um protocolo multicast bi-direcional para educação a distancia." [s.n.], 2005. http://repositorio.unicamp.br/jspui/handle/REPOSIP/260530.

Full text
Abstract:
Orientador: Hugo Enrique Hernandez Figueroa
Tese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação
Made available in DSpace on 2018-08-05T07:05:01Z (GMT). No. of bitstreams: 1 Albuquerque_EdisondeQueiroz_D.pdf: 2450262 bytes, checksum: 1142d9b235574921d845ac5246fbe250 (MD5) Previous issue date: 2005
Resumo: Este trabalho está baseado em uma experiência real, vivida no dia-a-dia do nosso trabalho na Empresa Brasileira de Telecomunicações S.A, EMBRATEL, quando da busca de ferramentas capazes de viabilizar o permanente treinamento dos Consultores Técnicos da empresa, localizados em diferentes partes do nosso país, em face da escassez de recursos financeiros e de tempo. Para tanto, iniciamos com uma retrospectiva histórica da Educação a Distância no mundo, seu presente e suas tendências visíveis. Depois, apresentamos uma descrição dos protocolos multicasting existentes, seguido de nossa proposta. Apresentamos, também, uma simulação usando o Simulador ns-2 de maneira a comprovar o correto funcionamento do protocolo proposto e avaliar seu desempenho. O núcleo desta tese é a proposta de um novo protocolo multicasting, elemento essencial para a otimização da rede de suporte, um imperativo para a eficiência de seu funcionamento e, principalmente, da diminuição de seu custo, tendo em vista a situação ideal de se transmitir voz e vídeo para garantir que uma aula a distância será o mais próximo possível de uma aula presencial, conforme aponta o resultado de pesquisas referenciadas no presente texto, uma vez que vídeo é uma aplicação que demanda grande largura de banda
Abstract: This work is based on a real life situation, experienced in our daily work at Empresa Brasileira de Telecomunicações S.A, EMBRATEL, when pursuing tools that would allow the continuous training of its staff of Technical Consultants. The Technical Consultants were spread all over Brasil, a country of continental dimensions. Time and cost were obstac1es to achieve the above mentioned training. This thesis starts providing a short account of the historical milestones on Distance Learning. We added considerations on the state-of-the-art and scenarios of future developments, which were drawn taking into account social and economical policies. Routing and existing multicasting protocols are described and compared with the bidirectional multicast protocol proposed in this thesis. The main purpose of this thesis is the proposal of a new Multicasting Protocol, to support a new concept on which a teacher can be a student on a different subject by taking into account that we aim a Distance Learning environment inside a corporation. The ns-2 Simulator is used to simulate the perfect operation of the proposed protocol and evaluate its performance. The use of video is mandatory in order to achieve a maximum efficiency at c1ass. The rapid switching of video transmission from the teacher to a remote student that asks a question (so that all other students spread around the country can also see who is asking) and back to the teacher is mandatory and is what motivated the development of this new Multicast Protocol
Doutorado
Telecomunicações e Telemática
Doutor em Engenharia Elétrica
APA, Harvard, Vancouver, ISO, and other styles
10

Dalaklis, Dimitrios. "Monitoring the progress of the Navy Marine Corps Intranet (NMCI) : implementation, performance and impact /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FDalaklis.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management and M.S. in Defense Analysis)--Naval Postgraduate School, March 2004.
Thesis advisor(s): Glenn R. Cook. Includes bibliographical references (p. 147-151). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
11

Hicks, Michael. "Organisational barriers and their relationship to the effective use of information system audit trails." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2006. https://ro.ecu.edu.au/theses/335.

Full text
Abstract:
Audit trails are important asa detection and monitoring mechanism for unethical or unauthorised behaviour from internal, as well as external users. In addition, they can be used to demonstrate a proof of business process or as an evidentiary record to assess the integrityof an information system. Their effective use is promoted as being an essential component of a well-balanced and complete security policy. Despite the widespread acknowledgrnent of the importance of audit trails, surveys have repeatedly shown they are often neglected in terms of both the degree of implementation and effectiveness. This study explores the evidence that suggests that organisational issues, rather than technical problems may be the cause of deficiencies in audit trail effectiveness. Organisational barriers identified in current and prior studies include, lack of appropriate training, lack of comprehensive security policies and procedures, and an absence of IT staff recruitment policy.
APA, Harvard, Vancouver, ISO, and other styles
12

Cripps, Helen. "Collaborative business relationships and the use of ICT: The case of the marine, defence and resources cluster, Western Australia." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/301.

Full text
Abstract:
The research project was developed from an Australian Research Council Grant designed to investigate collaborative commerce and its impact on regional economic development. Through a process of consultation with the industry partner, the South West Group, the research was designed to investigate the drivers and inhibitors of collaborative relationships and the factors that impact on the creation and sustaining of these relationships. The role of Information Communication Technology (ICT) in facilitating and sustaining collaborative relationships and the perceived benefits and drawbacks of collaborative relationships were also investigated. The research sought to identify models of the best adoption of collaborative relationships.
APA, Harvard, Vancouver, ISO, and other styles
13

Stockdale, Rosemary. "Identification and realisation of the benefits of participating in an electronic marketplace : An interpretive evaluation approach." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1333.

Full text
Abstract:
Electronic marketplaces have proliferated as use of the Internet has become widespread in business. A rapid growth in the number of marketplaces, followed by a period of stringent consolidation, as market makers develop a greater understanding of effective business models, has resulted in a climate of uncertainty and confusion. As with many aspects of e-commerce the drive towards participation is fuelled less by strategy planning than by a fear of lagging behind competitors or losing first mover advantage. In this climate of uncertainty organisations often bypass effective evaluation of the benefits that can be realised from participation in e-marketplaces, thereby exacerbating the process facing them and hampering effective decision-making. Evaluation is perceived as a fraught subject within the Information System field, and particularly within the business community which adheres to tried and trusted, albeit often inappropriate, methods such as financial or technical evaluation. The difficulties involved in effective evaluation of systems are well documented; these will increase as systems become more pervasive throughout organisations and those of their trading partners. Calls for a more holistic approach to evaluation are increasing, based on a developing appreciation of interpretive methods of research within the Information Systems discipline. However, the understanding that the social, political and cultural factors affecting and organisation have an impact on the uses and advantages of systems is by no means universal, and empirical evidence of this view is only slowly emerging. This research examines the benefits that can be realised from participation in an electronic marketplace by taking an interpretive approach to the evaluation. It examines the nature of electronic marketplaces to provide clarity to a confused and dynamic environment. The study then focuses on the development of evaluation studies within the IS discipline to identify how an effective evaluation method for assessing the benefits of e-marketplace participation can be achieved. An empirical examination of an organisation’s participation in an electronic marketplace is used to identify the benefits that are realisable and the issues that impact on them. The case study is conducted through an interpretive lens, using a content, context, process (CCP) approach based on existing IS literature. This enables a crucial understanding of the internal and external environments influencing the organisation and its realisation of potential benefits. To allow for the range of interpretations and reflections required to fully address the complexity of the issues involved in such a case study, a variety of research influences such as dialect hermeneutics, critical realism and case study theory are drawn into the research model. The case study organisation’s motivation for participating in an e-marketplace was primarily cost savings. Over the two years of the study, several more potential benefits were identified, such as supply chain efficiencies, greater market awareness and a widening of the supplier base. However, the organisation’s commitments to its local and regional communities, its need to retain status and some consideration of existing relationships needed to be balanced against the gains that might be realised. In some cases the organisation chose to forgo a potential benefit in favour of socially or politically motivated actions. Cultural factors also influenced their actions, particularly as they moved towards extending participation in the marketplace to gain from a global sourcing strategy. The contribution of this research lies in two areas. Firstly, it was existing evaluation literature to development a framework for the evaluation of benefits in the complex area of electronic marketplaces, thereby extending and informing the call for more inclusive and interpretive evaluation studies. Secondly, the research contributes empirical evidence to support the recognition of benefits to be gained from electronic marketplaces and shows how the realisation of the economic benefits is impacted by the social, political and cultural factors that influence an organisation.
APA, Harvard, Vancouver, ISO, and other styles
14

Bligh, W. O. M. "Application of machine learning and connectionist modeling to an Australian dairy database." Thesis, Queensland University of Technology, 2000. https://eprints.qut.edu.au/36851/1/36851_Bligh_2000.pdf.

Full text
Abstract:
The Australian Dairy Herd Improvement Scheme (ADIDS) provides a database containing both raw and processed data relating to milk production in Australia. This thesis provides estimations of potential milk production for dairy breeding using dairy animal data and artificial neural networks (ANNs). By predicting daughter milk production from data representative of dams in a herd and artificial insemination sires, an evaluation of those potential daughter results can lead to the selection of a breeding sire for that herd. Relevant data fields and derived attributes from the dairy database that significantly affect the daughter milk production are utilised in the development of a prediction model. Further research of data fields proven to influence daughter milk production, results in a set of rules extracted for human interpretation. Only Victorian data is used in this study.
APA, Harvard, Vancouver, ISO, and other styles
15

Harte, David. "Internet content control in Australia : data topology, topography and the data deficit." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2001. https://ro.ecu.edu.au/theses/1073.

Full text
Abstract:
The success of the online adult industry has provoked a public policy controversy over the need for internet censorship, and in recent times there has emerged desire to protect minors from possibly unsuitable content. On January 1st 2000, the Broadcasting Services Amendment (Online Services) Act (Cwlth, 1999) (BSA) was proclaimed. The Act purports to regulate and control Internet content in Australia. Operating in tandem with the Act is the Internet Industry Association Code of Practice, giving Australia a co-regulatory approach to Internet content control. The Australian Broadcasting Authority (ABA) is charged with implementing the regime. This study sets out examine the Internet content control problem in the Australian context. The political issues surrounding the topic of Internet censorship and the lack of reliable operational statistics, revealed the difficulty of estimating the effectiveness of the current control regime. Pivotal questions for the study concerned the scope and scale of content control in the Australian context and trends in hosting. This study used website typology, as defined by data topology and data topography, to examine the scope and scale of the content control task, and the implications for the effectiveness of the BSA. It was expected that if the BSA was to have an impact, that a discernible change in user download behaviour should ensue. This study used information provided by the adult Internet Content Provider (ICP) industry to gauge the BSA's impact-on user download behaviour as a measure of the control regime’s effectiveness. It was suggested by some observers that the so-called 'data deficit' between Australia and the US would be exacerbated by the new content control regime, with possible negative implications for the conduct of e-commerce in Australia generally. A study of Australian adult website hosting arrangements and data topography was conducted to examine the implications of the control regime for the "data deficit'. This study suggests that most Australian online adult content is in fact hosted in the US. The reasons for offshore hosting are almost totally financial and pre-date the introduction of the Broadcasting Services Act (Online Services) Amendment Act 1999. The study also suggests that any effect on the 'data deficit' should be minimal, and that the typology of adult content websites in such that the current co-regulatory regime may prove ineffective in controlling access to adult content.
APA, Harvard, Vancouver, ISO, and other styles
16

Ash, Colin. "Exploring The Antecedents Of Successful E-business Implementations Through ERP : A Longitudinal Study of SAP-based Organisations 1999-2003." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1486.

Full text
Abstract:
This research was carried out between 1999 and 2003 on the use of e-business applications in ERP-based organisations. A composite research method based on structured case studies was developed for this study. It combined the application of case methods by Carroll et al. (1998], Klein and Myer (1998), and Eisenhardt (1989). This was used to provide a focused, yet flexible structure, as a dynamic approach to case study interpretive research. The research method used three distinct models at three progressive stages of the study, to provide a multi-faceted view of each case. This composite case-based method was developed to maintain the balance between research rigour and relevance. A pilot case study of nine Australian SAP sites helped ground the theory of the study. This was followed by three stages of study of eleven international cases within a diverse industry context. The method revealed the antecedents of e-business success using the findings from case analyses against three separate research models B2B interaction, e-business change, and virtual organising. A final conceptual framework was developed as new theory of e-business transformation. The theory views e-business transformation as realising the benefits from virtual organising within complex B2B interactions by utilising the facilitators of successful e-business change. The research demonstrates that successful e-business transformation with ERP occurs when value propositions are realised through integration and differentiation of technologies used to support new business models to deliver products and services online. The associated management practice evolves through efficiency from self-service, effectiveness through empowerment towards customer care, and value enhancement from extensive relationship building with multiple alliances. The new theory of e-business transformation identifies the stages of e-business growth and development as a comprehensive plan that should assist managers of ERP-based organisations in migrating their company towards a successful e-business organisation. The detailed analysis of the findings offers a foundational per11pectlve of strategies, tactics and performance objectives for e-ERP implementations. The strength of the theory lies in the synthesis of multiple case analyses using three different lenses over three separate time periods. The triangulation of the three research frameworks provides a method for study at appropriate levels of complexity. It is evolutionary in nature and is content driven. Other researchers are urged to apply similar multi-viewed analysis.
APA, Harvard, Vancouver, ISO, and other styles
17

Renzi, Stefano. "Differences in university teaching after Learning Management System adoption : an explanatory model based on Ajzen's Theory of Planned Behavior." University of Western Australia. Graduate School of Management, 2008. http://theses.library.uwa.edu.au/adt-WU2008.0193.

Full text
Abstract:
[Truncated abstract] Current literature about university teaching argues that online teaching requires online social learning based on social interaction to be effective. This implies a shift in pedagogy based on engagement and collaboration, instead of trying to reproduce face-to- face teaching, in online environments. However, when a university adopts an elearning platform (or Learning Management System, LMS), most teachers tend to reproduce their traditional teaching, delivering, through the LMS, educational material. This study explored factors which influence university teachers to adopt teaching models based on online social interaction (OSI) when an e-learning platform is used to complement undergraduate classroom teaching. Online teaching model adoption was considered in the framework of technology adoption and post-adoption behavior, i.e., adoption and use by individuals after an organization has adopted an ICT-based innovation (Jasperson, Carter, & Zmud, 2005). Behaviors were investigated using a model based on Ajzen's (1991) Theory of Planned Behavior (TPB). In total, 26 university teachers 15 from Australia and 11 from Italy holding undergraduate courses, were recruited. They responded to a semi-structured interview based on the TPB, built on purpose for this research. Teachers were divided into three different groups on the basis of their approach to online teaching, corresponding to three different levels of adoption of OSI. The three different online teaching models were:
APA, Harvard, Vancouver, ISO, and other styles
18

Valli, Craig. "Non-business use of the World Wide Web : A study of selected Western Australian organisations." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1311.

Full text
Abstract:
Employees undertake a wide range of activities when they use the World Wide Web in the work place. Some of these activities may leave the modem Internet connected organisation vulnerable to undue or unknown risk, potential productivity losses and expense us a result of misuse or abuse or the Internet provision. Much of the existing literature on this subject points to a purported epidemic of misuse in the workplace. If this practice is so prevalent and widespread, what can modem Internet connected organisations do to identify the abuse and reduce the risks and losses that these abuses represent? To what extent is the World Wide Web used by employees for non-business related activities in organisations and can filtering or organisational policies impact on this activity? This research specifically examines contextually, the level of misuse with respect to the use of the World Wide Web in three selected Western Australian organisations using multiple interpretive case study as the vehicle for the study. The research is significant internationally to all organisations that use Internet in their everyday work. The research has discovered anomalous behaviour on the part of non-business users who have employed a variety of techniques and tactics to mask their activities. Also, organisational management in the cases examined had demonstrated shortfalls in their perception of misuse within their organisations and, the implementation of effective policy.
APA, Harvard, Vancouver, ISO, and other styles
19

Martinus, Ian. "Can B2G portals be used effectively to stimulate business in SMEs?: A case analysis of the 2Cities Business To Government portal." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2004. https://ro.ecu.edu.au/theses/1611.

Full text
Abstract:
Small and Medium Enterprises (SMEs) have many options when purchasing goods or services. These include personal contacts and networks, familiar centralised supply sources and other ad hoc means. One purchasing possibility is to buy from and sell to other businesses within a similar geographic area. The benefits of buying and selling locally may not occur to SMEs. They seek, like other consumers, to get value for money, fast and efficient service, and a reasonable level of quality. Many factors can impinge upon an SME's decision to purchase locally. It can be assumed that, given a reasonable local option, SMEs wish to buy from and sell to other local businesses. It can also be reasonably expected that if government purchasers were willing to purchase within their geographic area, SMEs would be interested in supplying local government as well. This study investigates SMEs in the Wanneroo and Joondalup Regions of Western Australia and considers the factors that may influence their decision to use the 2Cities Business-to-Government (B2G) portal. The study is concerned with gaining an insight into particular phenomena from a participants' perspective (SME) with the researcher as the primary instrument for data collection and analysis. The study requires the researcher to get close to the natural setting of the study and interact with the small business owners. This study triangulated results from three major sources. One source of data was contemporary Wanneroo and Joondalup secondary data gathered from research reports relating to local SME matters. This was combined with the semi-structured interviews of forty SMEs and two focus groups. Participant SMEs were invited to discuss factors affecting their decision to use or not use the 2Cities B2G portal. SMEs have a clear perception of what impedes and assists them in running their business and this comes through strongly. The problem facing the 2Cities portal management board is the extent to which it can influence the SME decision to buy and sell within the local area using the portal. The results form the basis of an improved model for B2G participation.
APA, Harvard, Vancouver, ISO, and other styles
20

Ashley, Paul. "Security technologies for intranet computing." Thesis, Queensland University of Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Van, Jaarsveld J. I. "Internal control with specific reference to the intranet." Thesis, 2014. http://hdl.handle.net/10210/9125.

Full text
Abstract:
M.Com. (Computer Auditing)
Intranets and related technology, can be used to solve many problems in the local computing environment. But the use of the Intranet and the related technology also raises several control concerns. Because of the increased use of Intranets within the business environment, the internal control related to the Intranet has become an issue that needs to be addressed by management and the auditor. Computerization in the accounting environment has made it virtually impossible to audit around the computer. It is therefore essential that the auditor, and more specifically the computer auditor, should assess the influence of the Intranet on the audit objectives. The objective of this short dissertation is to evaluate the influence of Intranet technology on the audit objectives (within the Intranet's different spheres of application) in terms of the risks posed for the auditor and management. It was also aimed at identifying the security risks in relationship with the audit objectives...
APA, Harvard, Vancouver, ISO, and other styles
22

Van, der Walt Celeste. "Knowledge sharing via enterprise intranets." Thesis, 2008. http://hdl.handle.net/10210/820.

Full text
Abstract:
Successful enterprises are those that consistently create new knowledge, disseminate it widely throughout the enterprise and quickly embed it in new technologies and products. These ‘knowledge-creating’ enterprises understand what knowledge is and what they should do to exploit it. In other words, they successfully manage and share their knowledge throughout their enterprise. When launching a knowledge management initiative, it is important to identify which knowledge management processes are most relevant to the enterprise’s environment and systems, and steps should be taken to support these activities and integrate them into daily operations. Broader elements and issues should also be identified and recognised for the influence they have on the knowledge management process. For example that enterprises should encourage individuals to interact, to work together on projects, or to share their ideas on an informal basis and systems are needed to codify the knowledge of individuals so that others can use it. Applying these elements involves: information technology; formal and informal structures; and specific knowledge management tools. Another important factor in the success of a knowledge management project is to ground knowledge management and knowledge sharing within the context of the enterprise’s business strategy seeing that the intranet can assist in the creation of economic value and competitive advantage for the enterprise. The knowledge sharing or knowledge contribution part of the knowledge management process seems to be the most difficult for enterprises. Knowledge sharing often takes place in enterprises via employees’ informal networks. Knowledge management could turn this informal, ad hoc process into a more systematic process. Creating a corporate culture where knowledge is valued and shared effectively is a challenge. Part of the solution could be for an enterprise to be aware of their specific corporate culture and how it influences their behaviour and attitude towards knowledge sharing. Because the employee’s behaviour determines the sharing of knowledge, leadership has an important role to play and they could use various motivational practices to encourage knowledge sharing. Leadership should commit to creating an environment, within which employees are able to share, assess and experiment with new knowledge gained. The corporate intranet could be used as such an environment, but employees need to be trained to use their knowledge management IT tools, making it as easy as possible for employees to contribute to the enterprise knowledge base. Effective intranet usage should be embedded in the enterprise’s general corporate and knowledge sharing culture. The intranet should be seen as an essential part of the enterprise’s knowledge management system and should be designed to suit and enhance the enterprise knowledge sharing activities and culture. It is also important that intranets should be evaluated regularly to determine its current contribution to as well as future potential of the knowledge sharing capability of the enterprise. The importance of evaluating and measuring the enterprise intranet and various measurement tools were discussed in depth, which consequently led to the formulation of an intranet evaluation tool in the form of a questionnaire. The prototype questionnaire was compiled by using measurement tools developed previously. The questionnaire brought together the concepts of knowledge management, knowledge sharing cultures and intranet functionalities. The evaluation tool was then applied to measure the effectiveness of a management consulting business’s intranet in enhancing the enterprise’s knowledge sharing culture. Recommendations were made to enterprises use the questionnaire when using the questionnaire in similar environments. An intranet represents a tool of potentially high value to any enterprise, but in order to realise this value, the intranets should be properly measured and managed and every employee needs to take ownership and buy into the concept of the intranet as a knowledge sharing enabler. This calls for an employee to be motivated to participate in knowledge sharing, so that they can experience the value they could add and receive by using the intranet for knowledge sharing activities.
Prof. P.A. van Brakel Mnr. J.A. Kok
APA, Harvard, Vancouver, ISO, and other styles
23

Barry, Christopher. "Artificial intelligence and knowledge management principles in secure corporate intranets." Thesis, 2010. http://hdl.handle.net/10210/3035.

Full text
Abstract:
M.Sc. (Computer Science)
Corporations throughout the world are facing numerous challenges in today’s competitive marketplace and are continuously looking for new and innovative means and methods of gaining competitive advantage. One of the means used to gain this advantage is that of information technology, and all the associated technologies and principles. These are primarily used to facilitate business processes and procedures that are designed to provide this competitive advantage. Significant attention has been given to each of the individual technologies and principles of Artificial Intelligence, Knowledge Management, Information Security, and Intranets and how they can be leveraged in order to improve efficiency and functionality within a corporation. However, in order to truly reap the benefits of these technologies and principles, it is necessary to look at them as a collaborative system, rather as individual components. This dissertation therefore investigates each of these individual technologies and principles in isolation, as well as in combination with each other to outline potential advantages, associated risks, and disadvantages when combining them within the corporate world. Based on these, the Intelligently Generated Knowledge (IGK) framework is outlined to implement such a collaborative system. Thereafter, an investigation of a theoretical situation is conducted based on this framework to examine the impact of the implementation of this type of collaborative system. The potential increase in cost savings, efficiency and functionality of corporations that would employ the IGK framework is clearly outlined in the theoretical example, and should this approach be adopted, it would be able to provide significant competitive advantage for any corporation.
APA, Harvard, Vancouver, ISO, and other styles
24

Barwell, Janet Maureen. "Issues in the ongoing operation and maintenance of the organizational intranet." 2002. http://wwwlib.umi.com/cr/utexas/fullcit?p3108453.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Van, den Berg Pierre. "Distributed image processing in an intranet environment." Thesis, 2012. http://hdl.handle.net/10210/6742.

Full text
Abstract:
M.Sc.
Image Processing/Computer Vision and Computer Networks (in particular Intranets) may seem to have very little in common if one only looks at these fields of study superficially. In this dissertation we will look at some fundamentals and characteristics of Image Processing and examine them to see where the problem areas lie, focusing on the problem of computational requirements. We will also examine the fundamental characteristics of Computer Networks and Distributed Processing, looking for areas where we can potentially find a synergy with computational problems inherent in Computer Vision/Image Processing. To accomplish the goals stated above, the dissertation is divided into three parts. The first part examines Computer Vision and Image Processing and is followed by a section examining Distributed Computing models and Computer Networks. The final part is dedicated to suggesting a model to solve the problem of computational load associated with Image Processing. The aim of the model is to take advantage of and use the latent processing power available in an Intranet environment by distributing the processing among the machines on the network. The model is also intended to be flexible and to minimize the network load incurred by distributing the processing. In order to do so, the model is split into units that deliver specialized functionality in order to keep the components small and also to incur the minimum load on a specific machine.
APA, Harvard, Vancouver, ISO, and other styles
26

"Application possibilities of agricultural information portals." Thesis, 2009. http://hdl.handle.net/10210/1833.

Full text
Abstract:
D. Litt. et Phil.
Today, more and more organisations are adopting the use of the Internet and webbased technologies in the management of and provision of access to information and knowledge resources and services in digital formats. However, it appears that innovative use of the web is more pronounced in corporate organisations. For example, corporate organisations are using portals or sophisticated websites to conduct electronic commerce via the web and provide access to both internal and external information resources and services, accessed via the Internet, intranets, and extranets. The view of the researcher is that innovative use of the Internet and web-based technologies, such as portals, should not be the domain of the corporate world alone. The focus of this thesis is, therefore, to establish the potential application possibilities of portals in other types of organisations, especially agricultural research organisations in the Southern African Development Community (SADC) region. The main research problem addressed in this thesis was What is the nature and application possibility of agricultural information portals in the provision of webbased, value-added information services for researchers? To address the above research problem, literature relating to the historical development of the Internet and the World Wide Web, intranet and extranet applications in organisations, as well as portals and their applications, was reviewed. In addition, a study was made of international trends regarding the provision of access to digital agricultural information resources and services via the web, and a questionnaire survey was conducted to establish whether it was necessary to use portals to provide access to digital-based agricultural information resources and services in agricultural research organisations in the SADC region. ii Resulting from the literature reviews, the study of websites of international agricultural organisations, and the survey on the need for portals in agricultural research organisations in the SADC region, the study established that: · There are several potential applications of portals in agricultural research organisations. This led to the definition of the nature and major components of the type of portal that could serve the needs of researchers in agricultural research organisations. · There is a need for portals in agricultural research organisations in the SADC region. The current use of the web in these organisations in the region is largely limited to the development of brochureware types of websites, providing access to information contained in the organisations’ brochures. Therefore, there is need to upgrade from basic Web sites to advanced sites or portals, and the study concluded that in this regard there is a need for clear guidelines to assist agricultural research organisations to plan the deployment of their information portals. Currently, most organisations are using ad hoc approaches when developing their Web sites. The dissertation, furthermore, develops the definition of an agricultural information portal as a web-based application that is accessed via the intranet or extranet and provides a personalised and adaptive interface that enables agricultural researchers to discover, track, and interact with colleagues and other people, software applications, information resources, services and tools relevant to their research interests and work. Taking into account the major components and definition of an agricultural information portal, the study proposes guidelines for use in planning the deployment of portals in agricultural research organisations. The proposed guidelines are independent of specific portal design or development methodology, application domains, and techniques.
APA, Harvard, Vancouver, ISO, and other styles
27

Moodley, Raj. "Business strategy for the application of internet and intranet technology in Eskom." Thesis, 2014. http://hdl.handle.net/10210/11470.

Full text
Abstract:
M.B.A.
Eskom, South Africa's electricity utility, is the electricity supplier for South Africa. It has 20 power stations with a nominal capacity of 39 154 megawatts. Eskom is among the top five electricity utilities in the world in terms of size and sales and strives to remain one of the lowest-cost producers of electricity in the world. Eskom supplies 98% of the country's electricity requirements, which amounts to more than half of the electricity generated on the African continent. Eskom supports the development of a Southern African transmission grod to encourage cooperation and accelerate economic growth in the region. Eskom support employment equity and encourages employees to develop to their full potential through training. Eskom sees itself as a respected corporate citizen and is working towards environmental sustainability and socio-economic improvement (Eskom report, 1997). The growth of Internet technologies (and within Eskom the Intranet) has been phenomenal. On 23 July 1998, after extensive consultation and compilation, an Eskom Internet / Intranet strategy was approved. The strategy defines the way in which Eskom will employ this technology to support their business, to ensure synergy in organisational efforts. This chapter gives an overview of the strategy (Eskom Report, 1997). The strategy positions Eskom to be able to derive significant business benefit. from the technology, and ensures we will not be "left behind" by our competitors and customers, but ensures that our use of the technology and the resulting costs can be properly managed. It accommodates the different cultures in the business groups, from progressive through conservative, in terms of the deployment of the technology ...
APA, Harvard, Vancouver, ISO, and other styles
28

Mahomva, Sarudzai. "Devising a common vocabulary for a knowledge management university intranet." Thesis, 2003. http://hdl.handle.net/10413/4220.

Full text
Abstract:
For the past few years, the University of Natal has been using an HTML-driven InnerWeb as its intranet system. The advantages of database driven intranet technologies over static HTML pages are now well established. It was felt that the University should change to a database driven intranet system which would better serve the needs of the University community. The first part of this study was conducted to establish user perceptions and requirements of such an intranet. Results from this study suggested that the functionalities and needs expressed by participants are synonymous with functionalities offered by database driven intranets. The second part of this study was therefore to follow up and prioritise the identified requirements for the main intranet interface to establish a controlled vocabulary and investigate current debate on the possibilities and limitations of intranets as a knowledge management tool. Part of the study took cognisance of Stoke's use inspired research premise by adapting constructivist research philosophy as well as Van den Akker's development research strategy to guide the study. Eclectic mixed methodology as suggested by Reeves guided the research design for this study. Thus data gathering methods which included group and on-line card sorting, semi-structured interviews, category membership expectation tests and prototype validation were used to validate each stage of the development process. Data analysis procedures included using Microsoft Excel to calculate the total score assigned to each item for possible inclusion on the intranet, cluster analysis using IBM EZSort software, analysing interview transcripts using QSR NVlvo software as well as simple eye balling of the category membership expectation data. The initial 93 items for possible inclusion, which were identified at the first part of the study were reduced to 60 items. Some distinct themes, which were identified, include research activities, library, social notices, corporate notices, learning activities, University Policies and Procedures, student activities, staff activities and on-line collaboration . The results of this study suggest that it is challenging to establish vocabulary which is common to the majority of prospective users. Thus, some of the suggested vocabulary for category labels did not have majority consensus. This study also suggests that participants expect a process driven intranet, which offers multidimensional access points and multiple ways to navigate. This implies analysing same data from different viewpoints. Participants want more from an intranet than simple document publishing though a few can not see the intranet beyond a document retrieval tool. The study suggests that users have different needs which could be better addressed by offering customisation and personalisation functionalities to suit users' individual needs. Participants expect to use the intranet as a reliable institutional memory which offers seamless remote access to synchronous and asynchronous communicating tools, access to various forms of digital media, interactive on-line administration functionalities as well as access to on-line academic related activities.
Thesis (M.A.)-University of Natal, Durban, 2003.
APA, Harvard, Vancouver, ISO, and other styles
29

"The internet as a strategic business management tool." Thesis, 2012. http://hdl.handle.net/10210/5662.

Full text
Abstract:
M.Comm.
This study was conducted with the intent of understanding and evaluating the commercial use and possibilities that the Internet offers, as well as the strategic approach businesses should take when commencing with electronic commerce on the Internet. The potential value of Intranets and Extranets has also been examined briefly. The Internet is a very useful mechanism for marketing as well as sales of products or services on a domestic or international basis. Various other commercial possibilities and uses exist for the Internet, as well as for its derivatives — the Intranet and Extranet. In the fiercely competitive market of today, companies research, develop and invest resources in various methods and tools in the hope to gain competitive advantage over their rivals. The Internet, Intranet and Extranet, used in isolation or conjunction, pose an extremely attractive alternative to gaining competitive advantage in a specific sector or market niche.The success of the Internet as a business tool depends directly on the overall business strategy that is driving the approach. For optimum success the main business strategy must be aligned with the Information Technology Strategy, and especially include thorough consideration as well as planning when implementing the Internet or one of its derivatives as a business tool.
APA, Harvard, Vancouver, ISO, and other styles
30

Jordaan, Leonore Leatishia Truter. "Internal communication media selection in the University of Pretoria with emphasis on computer-mediated communication media." Diss., 2001. http://hdl.handle.net/2263/26463.

Full text
Abstract:
The selection of one medium of communication above another may appear to be a matter of personal choice, and of little research consequence. Yet, insight into media preference when it comes to receiving internal communication messages may mean the difference between effective communication and lack of communication within an organisation. A number of theoretical perspectives have been advanced to explain communication media choice decisions. For the purpose of this study, the Media Richness Theory (MRT) and the Symbolic Interactionism Theory (SIT) were used to explore media selection at the University of Pretoria (UP). The MRT is concerned with identifying the most appropriate medium in terms of "medium richness" for communication situations characterised by equivocality and uncertainty. The SIT concurs with the MRT, but goes further and predicts that situational determinants such as distance and time and the symbolic cues provided by a medium, also influence media choice. The hypotheses were tested with data obtained from 174 employees (academic and non-academic) based on the main campus of the UP. A mail questionnaire was used to gather data. The questionnaire was developed to test MRT and SIT predictions with regard to media selection. The gathered data were analysed to reach general findings from the descriptive statistics and to test the hypotheses by using inferential statistics such as (a) chi-square tests, (b) analysis of variance (ANOVA) and (c) factor analysis. Research findings indicate that employees at UP tend to select face-to-face media for highly equivocal messages and written media for clear, objective messages. The results also indicate that where situational constraints such as distance and time pressure are present, people tend to choose "leaner" media, such as telephone and computer-mediated communication media, irrespective of the contents of the message. When symbolic meaning is intended, however, such as a desire for teamwork and trust, a "rich" medium is preferred. These findings are in support of MRT and SIT predictions. The results from the factor analysis indicate that organisational culture in UP plays a more significant role than the communicator or recipient where media selection is concerned. Based on this research, it can be accepted (at a 95% confidence level) that:
  • media selection is determined by message equivocality, message uncertainty, situational constraints and symbolic meaning;
  • there is no significant dependence between years service and media selection;
  • there is a tendency to use computer-mediated communication media as much as or more than conventional media where messages of a non¬personal nature are concerned; this is, however not true for messages of a personal nature.r
In conclusion, although the findings of this study are only of an exploratory nature and based on a small section of the employees at UP, the results indicate the existence of a significant relationship between message contents, situational factors and media selection. Thus, effective internal communication may mean selecting the right medium to fit message contents and the situation in order to achieve mutual understanding and success.
Dissertation (MA)--University of Pretoria, 2006.
Communication Management
MA
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
31

Van, Buuren Suzi. "Information security in a distributed banking environment, with specific reference to security protocols." Thesis, 2012. http://hdl.handle.net/10210/6484.

Full text
Abstract:
M.Comm.
The principal aim of the present dissertation is to determine the nature of an electronicbanking environment, to determine the threats within such an environment and the security functionality needed to ward off these threats. Security solutions for each area at risk will be provided in short. The main focus of the dissertation will fall on the security protocols that can be used as solutions to protect a banking system. In the dissertation, indication will also be given of what the security protocols, in their turn, depend on to provide protection to a banking system. There are several security protocols that can be used to secure a banking system. The problem, however, is to determine which protocol will provide the best security for a bank in a specific application. This dissertation is also aimed at providing a general security framework that banks could use to evaluate various security protocols which could be implemented to secure a banking system. Such framework should indicate which security protocols will provide a bank in a certain banking environment with the best protection against security threats. It should also indicate which protocols could be used in combination with others to provide the best security.
APA, Harvard, Vancouver, ISO, and other styles
32

Bowden, G. J. (Gavin James). "Forecasting water resources variables using artificial neural networks." 2003. http://web4.library.adelaide.edu.au/theses/09PH/09phb7844.pdf.

Full text
Abstract:
"February 2003." Corrigenda for, inserted at back Includes bibliographical references (leaves 475-524 ) A methodology is formulated for the successful design and implementation of artificial neural networks (ANN) models for water resources applications. Attention is paid to each of the steps that should be followed in order to develop an optimal ANN model; including when ANNs should be used in preference to more conventional statistical models; dividing the available data into subsets for modelling purposes; deciding on a suitable data transformation; determination of significant model inputs; choice of network type and architecture; selection of an appropriate performance measure; training (optimisation) of the networks weights; and, deployment of the optimised ANN model in an operational environment. The developed methodology is successfully applied to two water resorces case studies; the forecasting of salinity in the River Murray at Murray Bridge, South Australia; and the the forecasting of cyanobacteria (Anabaena spp.) in the River Murray at Morgan, South Australia.
APA, Harvard, Vancouver, ISO, and other styles
33

Chen, Peter John. "Australia's online censorship regime : the advocacy coalition framework and governance compared." Phd thesis, 2000. http://hdl.handle.net/1885/147789.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

"Contingency planning models for Government agencies." University of Technology, Sydney. School of Computing Sciences, 1996. http://hdl.handle.net/2100/245.

Full text
Abstract:
This report describes a research study into the current situation within Federal, State Government and selected private sector agencies, assessing contingency plans for Information Systems and suggests models for state-wide planning against Information Systems disasters. Following a brief look at various phases of contingency plan development, the study looks into the factors that prompt organisations to prepare contingency plans. The project involved a survey of current Information Systems contingency plans in the government agencies in the states of Victoria, Western Australia, South Australia, New South Wales and in the Australian Capital Territory. It also included two major banks, an insurance company and two computer services bureaux in the private sector within New South Wales. The survey determined that particular factors play important roles in the decision by organisations to commence contingency planning. These include actual disaster experience, senior management support, auditor's comments, legal requirements, risk analysis and business impact study, economic considerations, insurance requirements, contract commitment, new staff and introduction of new hardware and software. The critical success factors in contingency planning include regular maintenance and testing of the plan. The project also discusses the current contingency planning environment within New South Wales Government agencies and suggests cost-effective models for state-wide adoption.
APA, Harvard, Vancouver, ISO, and other styles
35

Sullivan, Clare Linda. "Digital identity: an emergent legal concept; an analysis of the role and legal nature of digital identity in a transactional context." 2009. http://hdl.handle.net/2440/54148.

Full text
Abstract:
This thesis examines the emergent legal concept of digital identity under the United Kingdom National Identity Scheme ('NIS') and its Australian counterpart, the Access Card Scheme('ACS') proposed in 2007. The Identity Cards Act 2006 UK c 15 ('Identity Cards Act’) and the Human Services (Enhanced Service Delivery) Bill (Cth) 2007 ('Access Card Bill') reveal a remarkably similar concept of identity in terms of its constitution and especially its functions. The United Kingdom scheme is currently being established, whereas the proposed Australian Scheme has been shelved following a change of government late in 2007. The NIS is therefore used as the model for this study but the analysis applies to any such scheme based on digital technology, including the ACS, should it be resurrected. The emergent concept of digital identity which is the subject of this thesis arises from legislation. It is a legal construct which consists of a collection of information that is stored and transmitted in digital form, and which has specific functions under the identity scheme. In this study, the information recorded about an individual for an identity scheme is referred to as an individual's 'database identity.' Database identity consists of information prescribed by legislation. Collectively, that information comprises an individual's registered identity. Under the United Kingdom scheme, it includes an individual's name/s, gender, date and place of birth and date of death, photograph, signature and biometrics, and other information such as citizenship and residential status including residential address/es, nationality, identity card number, passport number, work permit number, driver‘s licence number, and administrative information such as security and verification details. Within database identity is a small subset of information which is an individual‘s transactional identity, that is, an individual‘s identity for transactional purposes. In this study, that subset of database identity is called an individual‘s 'token identity'. Under the NIS, token identity consists of name, gender, date and place of birth, date of death and biometrics. Token identity is the gateway to the other information which makes up database identity and token identity has specific functions at the time of a transaction which give it legal character. In effect, it operates as the individual‘s transactional 'key.' Presentation of the required token identity at the time of the transaction enables the system to recognise, and to deal with, the registered identity. This thesis is therefore not about identity in the deep philosophical sense of 'who am I?' or 'what makes me, me?' It is about a legal concept of individual identity for specific purposes under a national identity scheme. In many ways, though, the concept of digital identity which is the subject of this thesis is just as important in a modern legal context. Under a national identity scheme, the response to the question 'who am I? ' is 'you are who the scheme (and in particular, the National Identity Register ('NIR')) says you are.' As the first conceptual legal analysis of identity in a transactional context, this thesis examines the functions and legal nature of database identity, and particularly token identity. Token identity has specific functions at the time of a transaction which are analysed from a legal perspective to determine whether token identity is a form of legal personality. This thesis also contends that individual personal and proprietary rights necessarily apply as a result of the functions and legal nature of this emergent concept of identity. In addition to the well- recognised right to privacy, this thesis argues that the concept gives rise to the right to identity which has been overlooked in this context. For the first time, identity as a legal concept is distinguished from privacy which is the focus of legal scholarship and jurisprudence in this area. The right to identity is contrasted with the right to privacy and the protection afforded by the right to identity in this context by those human rights in the United Kingdom is considered. The protection afforded to an individual in the United Kingdom is contrasted with the situation in Australia which does not currently have a comprehensive national human rights charter. In view of the limited protection which is currently provided to token identity by the civil law, the protection provided by the criminal law in both the United Kingdom and Australia becomes particularly significant in considering the obligations and rights which arise under the scheme. The adequacy of the criminal law in addressing the nature and consequences of the dishonest use by a person of another person‘s identity information is therefore also examined. Identity theft is defined and distinguished from identity fraud, having regard to the emergent concept of digital identity and the wrong and the harm caused by its misuse. In particular, the nature of token identity is examined and the consequences of its misuse by another person are considered in determining whether token identity is property which is capable of being the subject of theft and criminal damage. The thesis concludes by summarising the major insights provided by chapters 1-6 with a view to the future when national identity schemes like that of the United Kingdom, and indeed international schemes, will be commonplace and token identity routinely required for most commercial transactions. In that environment, being asked to provide one‘s token identity is likely to be as common and as routine as being asked one's name.
Thesis (Ph.D.) -- University of Adelaide, Law School, 2009
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography