Journal articles on the topic 'Intranets (Computer networks) Australia'

To see the other types of publications on this topic, follow the link: Intranets (Computer networks) Australia.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Intranets (Computer networks) Australia.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Regli, W. "Intranets." IEEE Internet Computing 1, no. 5 (September 1997): 6–7. http://dx.doi.org/10.1109/mic.1997.623962.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lichtenstein, Sharman, Craig M. Parker, and Alexia Hunter. "Dynamic Knowledge Integration in Socio-Technical Networks: An Interpretive Study of Intranet Use for Knowledge Integration." Journal of Information & Knowledge Management 06, no. 02 (June 2007): 91–103. http://dx.doi.org/10.1142/s021964920700172x.

Full text
Abstract:
A major challenge facing firms competing in electronic business markets is the dynamic integration of knowledge within and beyond the firm, enabled by internet-based infrastructure and emergent fluid socio-technical networks. This paper explores how social actors dynamically employ intranets to integrate formal and informal knowledge within evolving socio-technical networks that emerge, permeate and extend beyond the organisational boundary. The paper presents two case studies that illustrate how static intranets can be useful for dynamically integrating knowledge when they are interwoven with other knowledge channels such as e-mail through which flows the informal knowledge needed to make sense of and situate formal organisational knowledge. The findings suggest that businesses should carefully examine how employees integrate intranets with other channels in their work, and the shaping of knowledge outcomes that flows from such use. There are practical implications for the proper skilling of the people who share and integrate knowledge in this way. The paper also provides a framework for dynamic knowledge integration in socio-technical networks, which can help underpin future research in this area.
APA, Harvard, Vancouver, ISO, and other styles
3

Chellappa, Ramnath K., and Alok Gupta. "Managing computing resources in active intranets." International Journal of Network Management 12, no. 2 (2002): 117–28. http://dx.doi.org/10.1002/nem.427.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

McCracken, D. "Review: Intranets: The Surf Within." Computer Bulletin 40, no. 1 (January 1, 1998): 31. http://dx.doi.org/10.1093/combul/40.1.31-a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ashley, P., M. Vandenwauver, and F. Siebenlist. "Applying authorization to intranets: architectures, issues and APIs." Computer Communications 23, no. 17 (November 2000): 1613–20. http://dx.doi.org/10.1016/s0140-3664(00)00247-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Phaltankar, Kaustubh. "Practical Guide for Implementing Secure Intranets and Extranets." EDPACS 27, no. 12 (June 2000): 1–2. http://dx.doi.org/10.1201/1079/43258.27.12.20000601/30345.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Elmorshidy, Ahmed. "Determinates of Live Support Chat in Organizational Intranets." Journal of Electronic Commerce in Organizations 17, no. 3 (July 2019): 16–34. http://dx.doi.org/10.4018/jeco.2019070102.

Full text
Abstract:
Live support chat (LSC) is a relatively new type of online customer support that is growing significantly in e-commerce websites. LSC bypasses the traditional types of customer support like phone, e-mail and web forms and it provides instant answers to customers' questions and concerns. Few researchers have empirically examined the factors affecting LSC at the individual level, however there is no evidence of research that explored the determinates of LSC in an organizational context and how it affects employees. This study attempts to fill this research gap by empirically examining the factors that affect LSC in the context of the organizational Intranets. Survey data from 389 employees at private and public organizations in Kuwait were collected to test the study hypotheses. The study findings have important implications at both the theoretical and practice levels.
APA, Harvard, Vancouver, ISO, and other styles
8

Wilson, Tom. "Mastering intranets: The windows 95/NT edition." International Journal of Information Management 17, no. 6 (December 1997): 469–70. http://dx.doi.org/10.1016/s0268-4012(97)84382-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lamb, Roberta, and Elizabeth Davidson. "Understanding intranets in the context of end-user computing." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 36, no. 1 (February 7, 2005): 64–85. http://dx.doi.org/10.1145/1047070.1047076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sinickas, Angela D. "The Role of Intranets and Other E-Channels in Employee Communication Preferences." Journal of Website Promotion 1, no. 1 (April 18, 2005): 31–51. http://dx.doi.org/10.1300/j238v01n01_04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Vukatana, Kreshnik, Elira Hoxha, and Kozeta Sevrani. "Knowledge Transfer through Computer-based Systems in Manufacturing Networks: A Study on Albanian Plants." Academic Journal of Interdisciplinary Studies 11, no. 1 (January 3, 2022): 180. http://dx.doi.org/10.36941/ajis-2022-0016.

Full text
Abstract:
This study shows a general view about knowledge transfer between manufacturing plants in developing countries like Albania, which are part of multinational companies’ network (MCN). Part of this goal is the study of computer-based systems from conference calls and intranets to more advanced ones like data warehouses, management information systems (MIS) and executive information systems (EIS), as enablers of knowledge flow and absorptive capacity. The paper examines four case studies based on semi-structured interviews, where the data collected highlight a good coverage of computer-based systems in function of knowledge sharing. In half of the cases, this is done internally in the plant and not over the network of plants. We propose to upgrade where possible the systems used in a distributed way to have data and information connections across the network. In some cases, emerge barriers such as lack of time, lack of tolerance for errors, or the need for assistance. Conclusions show that staff training related to computer-based systems in the optics of knowledge enablers is important for the companies, while the incentives are not considered as a key factor for knowledge transfer. Received: 15 July 2021 / Accepted: 23 September 2021 / Published: 3 January 2022
APA, Harvard, Vancouver, ISO, and other styles
12

Zhou, Xujuan, Raj Gururajan, Yuefeng Li, Revathi Venkataraman, Xiaohui Tao, Ghazal Bargshady, Prabal D. Barua, and Srinivas Kondalsamy-Chennakesavan. "A survey on text classification and its applications." Web Intelligence 18, no. 3 (September 30, 2020): 205–16. http://dx.doi.org/10.3233/web-200442.

Full text
Abstract:
Text classification (a.k.a text categorisation) is an effective and efficient technology for information organisation and management. With the explosion of information resources on the Web and corporate intranets continues to increase, it has being become more and more important and has attracted wide attention from many different research fields. In the literature, many feature selection methods and classification algorithms have been proposed. It also has important applications in the real world. However, the dramatic increase in the availability of massive text data from various sources is creating a number of issues and challenges for text classification such as scalability issues. The purpose of this report is to give an overview of existing text classification technologies for building more reliable text classification applications, to propose a research direction for addressing the challenging problems in text mining.
APA, Harvard, Vancouver, ISO, and other styles
13

Mahmood, Shahid, Moneeb Gohar, Jin-Ghoo Choi, Seok-Joo Koh, Hani Alquhayz, and Murad Khan. "Digital Certificate Verification Scheme for Smart Grid using Fog Computing (FONICA)." Sustainability 13, no. 5 (February 26, 2021): 2549. http://dx.doi.org/10.3390/su13052549.

Full text
Abstract:
Smart Grid (SG) infrastructure is an energy network connected with computer networks for communication over the internet and intranets. The revolution of SGs has also introduced new avenues of security threats. Although Digital Certificates provide countermeasures, however, one of the issues that exist, is how to efficiently distribute certificate revocation information among Edge devices. The conventional mechanisms, including certificate revocation list (CRL) and online certificate status protocol (OCSP), are subjected to some limitations in energy efficient environments like SG infrastructure. To address the aforementioned challenges, this paper proposes a scheme incorporating the advantages and strengths of the fog computing. The fog node can be used for this purpose with much better resources closer to the edge. Keeping the resources closer to the edge strengthen the security aspect of smart grid networks. Similarly, a fog node can act as an intermediate Certification Authority (CA) (i.e., Fog Node as an Intermediate Certification Authority (FONICA)). Further, the proposed scheme has reduced storage, communication, processing overhead, and latency for certificate verification at edge devices. Furthermore, the proposed scheme reduces the attack surface, even if the attacker becomes a part of the network.
APA, Harvard, Vancouver, ISO, and other styles
14

Seneviratne, Aruna, and Terry Percival. "National ICT Australia (NICTA)." ACM SIGCOMM Computer Communication Review 35, no. 3 (July 2005): 61–64. http://dx.doi.org/10.1145/1070873.1070880.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Wang, Rongxia, Zhifang Liu, Shufeng Yang, and Jianxing Wang. "Implementation of Driving Safety Early Warning System Based on Trajectory Prediction on the Internet of Vehicles Environment." Security and Communication Networks 2022 (May 19, 2022): 1–6. http://dx.doi.org/10.1155/2022/2922507.

Full text
Abstract:
Traffic accidents cause a large number of casualties and economic losses every year. The primary causes of traffic accidents are the inadvertent response and inappropriate disposal of drivers. The Internet of Vehicles system is a large network based on intranets, the Internet, and mobile Internet. It performs wireless communication and information exchange between vehicles and roadways in accordance with the agreed-upon communication protocol and data exchange standards. It provides technical assistance in the implementation of vehicle hazard detection and opens up new avenues for safety early warning. In this study, a driving safety early warning system is proposed based on trajectory prediction on the Internet of Vehicles environment. After analyzing the system requirements, the driving safety system based on trajectory prediction is designed according to the demand analysis and tested. The trajectory prediction error is detected, and the collected trajectory is predicted. Data are divided into 3 groups, and to validate the performance of the system, the experiment is repeated five times. The test results show that the trajectory prediction accuracy of the trajectory prediction system designed is 89.4%, as compared to the accuracy of existing driving safety early warning systems, most of which are concentrated at accuracy lower than 89%. The proposed early warning method has the potential to reduce vehicle collisions and road traffic accidents.
APA, Harvard, Vancouver, ISO, and other styles
16

Slay, J., and B. Turnbull. "Computer Security Education and Research in Australia." IEEE Security & Privacy Magazine 4, no. 5 (September 2006): 60–63. http://dx.doi.org/10.1109/msp.2006.115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Goodall, Alex. "Railway route planning in Australia." Data Processing 28, no. 3 (April 1986): 136–38. http://dx.doi.org/10.1016/0011-684x(86)90004-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Preece, A. "Al in Australia and New Zealand." IEEE Intelligent Systems 19, no. 4 (July 2004): 96. http://dx.doi.org/10.1109/mis.2004.21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

BRAUN, PATRICE. "REGIONAL TOURISM NETWORKS: THE NEXUS BETWEEN ICT DIFFUSION AND CHANGE IN AUSTRALIA." Information Technology & Tourism 6, no. 4 (January 1, 2003): 231–43. http://dx.doi.org/10.3727/1098305032781139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Et. al., Tarun Dhar Diwan,. "AN INVESTIGATION AND ANALYSIS OF CYBER SECURITY INFORMATION SYSTEMS: LATEST TRENDS AND FUTURE SUGGESTION." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 2 (March 25, 2021): 477–92. http://dx.doi.org/10.17762/itii.v9i2.372.

Full text
Abstract:
Network protection includes of the strategies and procedures implemented in this paper to avoid and monitor intrusion attempts, infringement, manipulation or violation of a computer system and services accessed by the network. Network protection applies to the different countermeasures put in place to secure or flow through the network and data collected on or through it. Protection for web applications is the method of securing websites and internet resources from multiple security attacks that target weaknesses in an application. Security for web apps is a data management division that primarily deals with the security of websites, web applications and web services. Risks to cyber security include a broad range of allegedly criminal practices on the web. For years, computer security risks against utility assets were identified, cyber-attacks arising from the exploitation of data device weaknesses by unauthorized access users This study is a cyber infrastructure assault, vulnerability and vulnerabilities, including hardware and software devices, networks, business networks, intranets, and cyber intrusion usage. Only big organisations are at risk of cyber-attacks, a widespread misunderstanding. Even then, the targeting of small and medium sized enterprises has seen a large improvement. This is since less-sophisticated cyber defence mechanisms appear to be used by these smaller organisations. As many as 50% of all cyber-attacks hit small companies, wasting $200,000 on average, sufficient to get out of business for less-established entities. an enterprise-grade protection device and awareness of the various forms of cyber threats facing corporations in 2025 to safeguard company from hacking attacks. fight cyber threats successfully and decrease the exposure of enterprise.
APA, Harvard, Vancouver, ISO, and other styles
21

Jajszczyk, A. "Distinguished lecturer tour in Australia." IEEE Communications Magazine 43, no. 1 (January 2005): 2. http://dx.doi.org/10.1109/mcom.2005.1381869.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

McAuley, Elise, Chandana Unnithan, and Sofie Karamzalis. "Implementing Scanned Medical Record Systems in Australia." International Journal of E-Adoption 4, no. 4 (October 2012): 29–54. http://dx.doi.org/10.4018/jea.2012100103.

Full text
Abstract:
In recent years, influenced by the pervasive power of technology, standards and mandates, Australian hospitals have begun exploring digital forms of keeping this record. The main rationale is the ease of accessing different data sources at the same time by varied staff members. The initial step in this transition was implementation of scanned medical record systems, which converts the paper based records to digitised form, which required process flow redesign and changes to existing modes of work. For maximising the benefits of scanning implementation and to better prepare for the changes, Austin Hospital in the State of Victoria commissioned this research focused on elective admissions area. This structured case study redesigned existing processes that constituted the flow of external patient forms and recommended a set of best practices at the same time highlighting the significance of user participation in maximising the potential benefits anticipated. In the absence of published academic studies focused on Victorian hospitals, this study has become a conduit for other departments in the hospital as well as other hospitals in the incursion.
APA, Harvard, Vancouver, ISO, and other styles
23

Sinnott, Richard O., Christopher Bayliss, Andrew Bromage, Gerson Galang, Guido Grazioli, Philip Greenwood, Angus Macaulay, et al. "The Australia urban research gateway." Concurrency and Computation: Practice and Experience 27, no. 2 (April 23, 2014): 358–75. http://dx.doi.org/10.1002/cpe.3282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Rein, Tony. "Case studies II — Australia." Computer Law & Security Review 6, no. 6 (March 1991): 33–36. http://dx.doi.org/10.1016/0267-3649(91)90180-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Kankanamge, Nayomi, Tan Yigitcanlar, and Ashantha Goonetilleke. "Gamifying Community Education for Enhanced Disaster Resilience: An Effectiveness Testing Study from Australia." Future Internet 14, no. 6 (June 9, 2022): 179. http://dx.doi.org/10.3390/fi14060179.

Full text
Abstract:
Providing convenient and effective online education is important for the public to be better prepared for disaster events. Nonetheless, the effectiveness of such education is questionable due to the limited use of online tools and platforms, which also results in narrow community outreach. Correspondingly, understanding public perceptions of disaster education methods and experiences for the adoption of novel methods is critical, but this is an understudied area of research. The aim of this study is to understand public perceptions towards online disaster education practices for disaster preparedness and evaluate the effectiveness of the gamification method in increasing public awareness. This study utilizes social media analytics and conducts a gamification exercise. The analysis involved Twitter posts (n = 13,683) related to the 2019–2020 Australian bushfires, and surveyed participants (n = 52) before and after experiencing a gamified application—i.e., STOP Disasters! The results revealed that: (a) The public satisfaction level is relatively low for traditional bushfire disaster education methods; (b) The study participants’ satisfaction level is relatively high for an online gamified application used for disaster education; and (c) The use of virtual and augmented reality was found to be promising for increasing the appeal of gamified applications, along with using a blended traditional and gamified approach.
APA, Harvard, Vancouver, ISO, and other styles
26

Case, Gary N., Mladen A. Vouk, and John M. Mackenzie. "Real-Time Full Motion Stereo Microscopy Over Internet." Microscopy and Microanalysis 5, S2 (August 1999): 368–69. http://dx.doi.org/10.1017/s1431927600015166.

Full text
Abstract:
One of the problems with remote imaging which purports to represent the real world (Tele-presence) is that the images are two-dimensional and the “real” world is three dimensional. When viewing many objects, the lack of depth perceptiorican be a serious deficiency. For example, one would want a micro-surgeon to have a good idea how deep to cut into tissue during a tele-presence operation. There is a wealth of three dimensional information in light, SEM, AFM, confocal, and computer reconstructed or simulated objects. To transfer that information faithfully over the networks using broadcast quality high definition video transmission technologies such as MPEG2 may require as much as 20 Mbps per channel. Furthermore, stereo imaging is particularly sensitive to any phase delays and jitter between the two eye channels. Control of these parameters requires advance quality of service features that current internet does not provide, but that may be available on high-performance intranets. All this may present a problem for routine use of the stereo facility .The next generation of Internet, however, will be able to routinely provision much higher bandwidth and other quality of service, in general through protocols that will allow for not only full screen full resolution television but also the use of two channels (left and right) that can stay in fairly close synchrony.
APA, Harvard, Vancouver, ISO, and other styles
27

Manwaring, Kayleen. "Network neutrality: Issues for Australia." Computer Law & Security Review 26, no. 6 (November 2010): 630–39. http://dx.doi.org/10.1016/j.clsr.2010.09.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Hughes, Gordon, Sophie Dawson, and Tim Brookes. "Considering New Privacy Laws in Australia." IEEE Security & Privacy Magazine 6, no. 3 (May 2008): 57–59. http://dx.doi.org/10.1109/msp.2008.60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Garnett, Stephen T., and Jennifer Haydon. "Mapping Research Capacity in North-Western Tropical Australia." Journal of Information & Knowledge Management 04, no. 03 (September 2005): 141–56. http://dx.doi.org/10.1142/s0219649205001122.

Full text
Abstract:
Research capacity in two jurisdictions in tropical northwestern Australia was mapped to a searchable website. The website provides ready access to all research organisations in the region with the underlying database providing a baseline against which developments in research and research networks can be measured. Of 202 research entities entered into the database, 38 were businesses, 12 civil society organisations, five cooperative research centres, 10 government research institutes, 64 government agencies within three jurisdictions and 70 university research groups within seven universities. The data were analysed by sector to describe the size and linkages between organisations, areas of research strength and socioeconomic objectives of research. Most enterprises undertaking research in tropical Western Australia and the Northern Territory are small with the majority having fewer than 10 research staff. The primary area of expertise for research entities in tropical Western Australia and the Northern Territory is agricultural and environmental research, which is also the area where there is greatest breadth of capacity. Similarly, the socioeconomic objective of most research entities is in fields related to environmental management and social development with the breadth of capacity greatest in environmental policy frameworks. There were substantial differences between the skills and direction of research in government and the universities and those in business.
APA, Harvard, Vancouver, ISO, and other styles
30

Liu, Yue. "Privacy regulations on biometrics in Australia." Computer Law & Security Review 26, no. 4 (July 2010): 355–67. http://dx.doi.org/10.1016/j.clsr.2010.05.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Oh, Sangjo, Song Yang, Sherah Kurnia, Heejin Lee, Marisa Maio Mackay, and Kieran O'Doherty. "The characteristics of mobile data service users in Australia." International Journal of Mobile Communications 6, no. 2 (2008): 217. http://dx.doi.org/10.1504/ijmc.2008.016578.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Box, Kiernan, and Greg Aronson. "Protest Songs From Indonesia And Australia: A Musicological Comparison." Journal of Urban Society's Arts 9, no. 1 (December 19, 2022): 48–59. http://dx.doi.org/10.24821/jousa.v9i1.7146.

Full text
Abstract:
Protest music is both commercially viable and an important tool for shaping community awareness of socio-political issues. Indonesian and Australian artists have produced protest music which has stimulated significant effect upon community attitudes and behaviours. Socio-political issues can be described and examined in songs using various lyrical methods, including strategic use of characters and narrative. Iwan Fals is a Javanese singer-songwriter who frequently employs satire and parody in relation to weighty political issues. Cold Chisel, Midnight Oil and Paul Kelly are Australian rock artists who have used real-life events as the inspiration for protest songs, many of which are delivered with a confrontational mode of lyric and performance. Compared to Australian acts, Indonesian artists have faced greater risk to personal freedom by engaging in protest music; this may explain why Indonesian protest songs are often presented with more subtle characteristics. from the abstract or from the body of the text, or from the thesaurus of the discipline. Lagu Protes dari Indonesia dan Australia: Perbandingan Musikologi. Musik protes layak secara komersial dan peranti penting untuk membentuk kesadaran masyarakat tentang masalah sosial-politik. Seniman Indonesia dan Australia telah menghasilkan musik protes yang memberikan pengaruh signifikan terhadap sikap dan perilaku masyarakat. Isu sosial-politik dapat dideskripsikan dan dikaji dalam lagu dengan menggunakan berbagai metode lirik, termasuk penggunaan karakter dan narasi yang strategis. Iwan Fals adalah penyanyi-penulis lagu Jawa yang sering menggunakan sindiran dan parodi terkait dengan isu-isu politik yang berat. Cold Chisel, Midnight Oil, dan Paul Kelly adalah artis rock Australia yang telah menggunakan peristiwa kehidupan nyata sebagai inspirasi untuk lagu-lagu protes, banyak di antaranya dibawakan dengan gaya lirik dan penampilan yang konfrontatif. Dibandingkan dengan artis Australia, artis Indonesia menghadapi risiko yang lebih besar terhadap kebebasan pribadi dengan terlibat dalam musik protes; ini mungkin menjelaskan mengapa lagu-lagu protes Indonesia seringkali disajikan dengan ciri-ciri yang lebih halus. dari abstrak atau dari tubuh teks, atau dari tesaurus disiplin.
APA, Harvard, Vancouver, ISO, and other styles
33

HILLEY, S. "CTOSE branches out to US and Australia." Information Security Technical Report 9, no. 4 (December 2004): 7. http://dx.doi.org/10.1016/s1363-4127(04)00044-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Mathews-Hunt, Kate. "CookieConsumer: Tracking online behavioural advertising in Australia." Computer Law & Security Review 32, no. 1 (February 2016): 55–90. http://dx.doi.org/10.1016/j.clsr.2015.12.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Rolfe, John, Shirley Gregor, and Don Menzies. "Reasons why farmers in Australia adopt the Internet." Electronic Commerce Research and Applications 2, no. 1 (March 2003): 27–41. http://dx.doi.org/10.1016/s1567-4223(03)00004-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Cathro, Warwick S. "The development of national bibliographic and document access services in Australia." New Review of Information Networking 2, no. 1 (January 1996): 111–19. http://dx.doi.org/10.1080/13614579609516872.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Nourmohammadi, Fatemeh, Mohammadhadi Mansourianfar, Sajjad Shafiei, Ziyuan Gu, and Meead Saberi. "An Open GMNS Dataset of a Dynamic Multi-Modal Transportation Network Model of Melbourne, Australia." Data 6, no. 2 (February 19, 2021): 21. http://dx.doi.org/10.3390/data6020021.

Full text
Abstract:
Simulation-based dynamic traffic assignment models are increasingly used in urban transportation systems analysis and planning. They replicate traffic dynamics across transportation networks by capturing the complex interactions between travel demand and supply. However, their applications particularly for large-scale networks have been hindered by the challenges associated with the collection, parsing, development, and sharing of data-intensive inputs. In this paper, we develop and share an open dataset for reproduction of a dynamic multi-modal transportation network model of Melbourne, Australia. The dataset is developed consistently with the General Modeling Network Specification (GMNS), enabling software-agnostic human and machine readability. GMNS is a standard readable format for sharing routable transportation network data that is designed to be used in multimodal static and dynamic transportation operations and planning models.
APA, Harvard, Vancouver, ISO, and other styles
38

Moorhead, Simon. "Marconi Wireless Telegraphy Trialled in Australia." Journal of Telecommunications and the Digital Economy 10, no. 4 (December 28, 2022): 103–11. http://dx.doi.org/10.18080/jtde.v10n4.652.

Full text
Abstract:
A historic paper from 2010, republished here, describes a demonstration of wireless transmission between Victoria and Tasmania by the Marconi Wireless Telegraph Company in 1906. The subsequent debate and delays in adopting the new wireless communication system highlight the influence of imperial politics on Australian telecommunications, post Federation. The impasse with Marconi over his initial refusal to license his patent was eventually resolved by the creation of Amalgamated Wireless Holdings (AWA) in 1911.
APA, Harvard, Vancouver, ISO, and other styles
39

Sun, Ling, and Dali Gao. "Security Attitude Prediction Model of Secret-Related Computer Information System Based on Distributed Parallel Computing Programming." Mathematical Problems in Engineering 2022 (March 25, 2022): 1–13. http://dx.doi.org/10.1155/2022/3141568.

Full text
Abstract:
In recent years, there has been an upward trend in the number of leaked secrets. Among them, secret-related computers or networks are connected to the Internet in violation of regulations, cross-use of mobile storage media, and poor security management of secret-related intranets, which are the main reasons for leaks. Therefore, it is of great significance to study the physical isolation and protection technology of classified information systems. Physical isolation is an important part of the protection of classified information systems, which cuts off the possibility of unauthorized outflow of information from the network environment. To achieve the physical isolation of the network environment and build a safe and reliable network, it is necessary to continuously improve the level of network construction and strengthen network management capabilities. At present, the realization of physical isolation technology mainly relies on security products such as firewall, intrusion detection, illegal outreach, host monitoring, and auditing. This study analyzes network security systems such as intrusion detection, network scanning, and firewall. Establishing a model based on network security vulnerabilities and making up for network security hidden dangers caused by holes are generally a passive security system. In a network, the leader of network behavior—human behavior—needs to be constrained according to the requirements of the security management system and monitoring. Accordingly, this study proposes a security monitoring system for computer information network involving classified computer. The system can analyze, monitor, manage, and process the network behavior of the terminal computer host in the local area network, to achieve the purpose of reducing security risks in the network system. Based on the evaluation value sequence, the initial prediction value sequence is obtained by sliding adaptive triple exponential smoothing method. The time-varying weighted Markov chain is used for error prediction, the initial prediction value is corrected, and the accuracy of security situation prediction is improved. According to the security protection requirements of secret-related information systems, a complete, safe, reliable, and controllable security protection system for secret-related information systems is constructed, and the existing security risks and loopholes in secret-related information systems are eliminated to the greatest extent possible. This enables the confidentiality, integrity, and availability of confidential data and information in the computer information system to be reliably protected.
APA, Harvard, Vancouver, ISO, and other styles
40

Davey, Bill, and Arthur Tatnall. "Two Computer Systems in Victorian Schools and the Actors and Networks Involved in their Implementation and Use." International Journal of Actor-Network Theory and Technological Innovation 5, no. 3 (July 2013): 37–46. http://dx.doi.org/10.4018/jantti.2013070104.

Full text
Abstract:
As in Australia school education is the responsibility of State Governments, this article will consider two computer systems in the Australian State of Victoria. The article takes a socio-technical stance to examine two computer systems currently in use in schools in Victoria: CASES21 and the Ultranet. After describing these systems, the article makes use of actor-network theory to explore the actors involved in their creation, development, implementation and use (or in one case non-use), and the networks they established in doing so. It looks at the associations involving both the human and non-human actors and how these contributed to successful adoption and use of these systems. A comparison of two systems within the same organisational environment allows a unique perspective on the formation of networks. The ANT approach permits an understanding of the difference in adoption where very few factors differ between the cases.
APA, Harvard, Vancouver, ISO, and other styles
41

Waite, Catherine. "Making place with mobile media: Young people’s blurred place-making in regional Australia." Mobile Media & Communication 8, no. 1 (May 31, 2019): 124–41. http://dx.doi.org/10.1177/2050157919843963.

Full text
Abstract:
This paper investigates young people living in a regional Australian town and explores the ways that they negotiate place-making using mobile media. Australia has been characterised as a country of vast distances, and young people living in rural and regional areas are at the centre of narratives that position digital technologies as enablers or disruptors. This paper puts such deterministic discourses aside to focus on the ways place is made by young people living outside the city according to their own perspectives and experiences. Focus groups with 62 participants aged 16–28 years pointed to many of those in-the-background place-making practices and signalled the near seamless way that making places was simultaneously done online as well as in material, face-to-face contexts. The forms of place made by the young people of this study comprised a range of elasticised neighbourhoods and public spaces that were materially anchored, though extended digitally through territorially embedded socialities and shared locational information. Regional geographies retained their meaning, though traditional constraints could be renegotiated to reflect youthful relationships with local place.
APA, Harvard, Vancouver, ISO, and other styles
42

Zyngier, Suzanne. "The Role of Technology in Knowledge Management Strategies in Australia: Recent Trends." Journal of Information & Knowledge Management 02, no. 02 (June 2003): 165–78. http://dx.doi.org/10.1142/s0219649203000061.

Full text
Abstract:
Research in the UK, Europe and the USA has shown different understandings of the concept of knowledge management and of the role of technology in implementation strategies. Theorists currently place knowledge management in its third phase where technological approaches have given way to strategies focused on human issues in the transfer of knowledge. This paper focuses on findings on attitudes to the use of technology in organisational strategies to manage knowledge disclosed in field research by survey of the current business understanding of the concept of knowledge management and of its uptake trends in the Australian corporate environment. This will be done by providing background to the study, by reference to results and discussion of further research possibilities.
APA, Harvard, Vancouver, ISO, and other styles
43

Hooper, Christopher, Ben Martini, and Kim-Kwang Raymond Choo. "Cloud computing and its implications for cybercrime investigations in Australia." Computer Law & Security Review 29, no. 2 (April 2013): 152–63. http://dx.doi.org/10.1016/j.clsr.2013.01.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Campbell, J., R. Coutts, A. Martin, and R. Reid. "Observations and Conclusions from a Three Year Digital Radio Field Experiment in Australia." IEEE Journal on Selected Areas in Communications 5, no. 3 (April 1987): 416–26. http://dx.doi.org/10.1109/jsac.1987.1146550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Abduljabbar, Rusul L., Hussein Dia, and Pei-Wei Tsai. "Unidirectional and Bidirectional LSTM Models for Short-Term Traffic Prediction." Journal of Advanced Transportation 2021 (March 26, 2021): 1–16. http://dx.doi.org/10.1155/2021/5589075.

Full text
Abstract:
This paper presents the development and evaluation of short-term traffic prediction models using unidirectional and bidirectional deep learning long short-term memory (LSTM) neural networks. The unidirectional LSTM (Uni-LSTM) model provides high performance through its ability to recognize longer sequences of traffic time series data. In this work, Uni-LSTM is extended to bidirectional LSTM (BiLSTM) networks which train the input data twice through forward and backward directions. The paper presents a comparative evaluation of the two models for short-term speed and traffic flow prediction using a common dataset of field observations collected from multiple freeways in Australia. The results showed BiLSTM performed better for variable prediction horizons for both speed and flow. Stacked and mixed Uni-LSTM and BiLSTM models were also investigated for 15-minute prediction horizons resulting in improved accuracy when using 4-layer BiLSTM networks. The optimized 4-layer BiLSTM model was then calibrated and validated for multiple prediction horizons using data from three different freeways. The validation results showed a high degree of prediction accuracy exceeding 90% for speeds up to 60-minute prediction horizons. For flow, the model achieved accuracies above 90% for 5- and 10-minute prediction horizons and more than 80% accuracy for 15- and 30-minute prediction horizons. These findings extend the set of AI models available for road operators and provide them with confidence in applying robust models that have been tested and evaluated on different freeways in Australia.
APA, Harvard, Vancouver, ISO, and other styles
46

Mackie, Tom. "Proving liability for highly and fully automated vehicle accidents in Australia." Computer Law & Security Review 34, no. 6 (December 2018): 1314–32. http://dx.doi.org/10.1016/j.clsr.2018.09.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Gharib, Padid Akbarzadeh. "The Determination of User Satisfaction with Personal Internet Banking Services in the Context of Australia." Journal of Electronic Commerce in Organizations 14, no. 3 (July 2016): 57–79. http://dx.doi.org/10.4018/jeco.2016070104.

Full text
Abstract:
Based on previous studies a theoretical framework of the determinants of an individual's satisfaction using Personal Internet Banking services is formulated incorporating information system success factors complemented by elements of behavioral and environmental uncertainties (multidimensional trust and perceived risk). Data was collected using an online self-administered questionnaire from a sample of 370 users in Australia and analyzed in order to determine the relationships among factors that have significant causal effects on customer satisfaction. The results confirm the importance of some of the factors reported in previous studies but also reveal unreported significant direct and indirect causal effects on customer satisfaction. Practical conclusions provide new perspectives for Australian banks on keeping customers highly satisfied with online banking services, as the main objective of this study.
APA, Harvard, Vancouver, ISO, and other styles
48

Zhou, Albert Z. "Managing Knowledge Strategically: A Comparison of Managers' Perceptions between the Private and Public Sector in Australia." Journal of Information & Knowledge Management 03, no. 03 (September 2004): 213–22. http://dx.doi.org/10.1142/s0219649204000833.

Full text
Abstract:
This paper compares the perceptions of private and public sector managers in regard to knowledge management (KM), using data derived from a survey conducted in Australia. The objective is to develop understanding of the current practice to assist in developing strategies to improve public sector KM practice. Findings revealed that public sector respondents in Australia had a less developed understanding in KM and intellectual capital (IC), as compared to the private sector respondents. This poorer understanding had led to a much weaker KM practice in the public sector: KM initiatives were not commonly addressed at the strategic level; employees were less trained and developed; few measurement systems were developed and almost no incentive and reward measures were established. In addition, public sector respondents were less confident about the roles of organisational culture, organisational structure and IT in KM in their organisation. They had lower agreement on the role of organisational structure, culture and IT as knowledge creation and sharing facilitators. The study, to a certain extent, supports the proposition that industrial context has an effect on managers' perceptions of KM.
APA, Harvard, Vancouver, ISO, and other styles
49

Martinovic, Marietta. "GPS-EM Sanctions for Serious Sex Offenders: The Application and Outcomes in the United States and Australia." Journal of Technology in Human Services 34, no. 1 (January 2, 2016): 82–101. http://dx.doi.org/10.1080/15228835.2016.1140111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Naylor, David, and Andrew Jaworski. "Linking your way to liability? – Cooper v. Universal Music Australia Ltd [2006]." Computer Law & Security Review 23, no. 3 (January 2007): 285–89. http://dx.doi.org/10.1016/j.clsr.2007.03.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography