Search results

1 – 10 of over 22000
Article
Publication date: 1 January 1977

DEREK J. RICHARDS

In order to survive, the actions of a purposeful system must be governed in such a way that its more prepotent needs are satisfied. A purposeful system's actions are largely…

Abstract

In order to survive, the actions of a purposeful system must be governed in such a way that its more prepotent needs are satisfied. A purposeful system's actions are largely governed by its representation of its world, and hence if it has an inappropriate representation it will not survive. Our premise is that intelligence is a property only reasonably attributable to purposeful systems which compute a representation of their world. Using this premise, we consider cognition to be the continual process of computing/recomputing representations and argue that it implies forms of computation, described in this paper, which make distinctions.

Details

Kybernetes, vol. 6 no. 1
Type: Research Article
ISSN: 0368-492X

Content available
Article
Publication date: 11 April 2008

D.M. Hutton

47

Abstract

Details

Kybernetes, vol. 37 no. 3/4
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 22 March 2013

Judith Mavodza

The purpose of this paper is to discuss issues involved in navigating the modern information environment where the relevance of cloud computing is unavoidable. This is a way of…

6927

Abstract

Purpose

The purpose of this paper is to discuss issues involved in navigating the modern information environment where the relevance of cloud computing is unavoidable. This is a way of shifting from the hardware and software demands of storing and organizing data, to information access concerns. That is because with the exponential growth in information sources and all accompanying complexities, the limited capacity of libraries to host their own in its entirety necessitates opting for alternatives in the cloud.

Design/methodology/approach

A review of current literature about the topic was performed

Findings

Literature used reveals that currently, libraries are using the cloud for putting together user resources, i.e. using Software as a Service (SaaS), such as in library catalogues, WorldCat, Googledocs, and the aggregated subject gateways like SUMMON, and others; the web Platform as a Service (PaaS) as in the use of GoogleApp Engine; or Infrastructure as a Service (IaaS) as in the use of D‐Space, FEDORA, and others. The cloud is confirmed as a facilitator in storing and accessing information in addition to providing a unified web presence with reduced local storage capacity challenges.

Originality/value

The value of these findings is to remind librarians of the shift in focus towards which devices provide the easiest access to data and applications. This is one of the reasons they in many instances are currently having to address issues relating to the use of electronic media tools such as smartphones, iPad, e‐book readers, and other handheld devices. The largely borderless information resources also bring to the forefront considerations about digital rights management, fair use, information security, ownership and control of data, privacy, scholarly publishing, copyright guidance, and licensing that the librarian has to be knowledgeable about. It has become necessary for librarians who make use of commercial cloud services to be conversant with the implications on institutional data. To avert the ever present dangers and risks involving cyber‐security, it is usually practical for institutions to keep policies, procedures, fiscal, and personnel data in private clouds that have carefully crafted access permissions. Being aware of these implications enables thoughtful, adaptive planning strategies for the future of library practice and service.

Details

New Library World, vol. 114 no. 3/4
Type: Research Article
ISSN: 0307-4803

Keywords

Article
Publication date: 1 August 2005

Jinbao Li, Yingshu Li, My T. Thai and Jianzhong Li

This paper investigates query processing in MANETs. Cache techniques and multi‐join database operations are studied. For data caching, a group‐caching strategy is proposed. Using…

Abstract

This paper investigates query processing in MANETs. Cache techniques and multi‐join database operations are studied. For data caching, a group‐caching strategy is proposed. Using the cache and the index of the cached data, queries can be processed at a single node or within the group containing this single node. For multi‐join, a cost evaluation model and a query plan generation algorithm are presented. Query cost is evaluated based on the parameters including the size of the transmitted data, the transmission distance and the query cost at each single node. According to the evaluations, the nodes on which the query should be executed and the join order are determined. Theoretical analysis and experiment results show that the proposed group‐caching based query processing and the cost based join strategy are efficient in MANETs. It is suitable for the mobility, the disconnection and the multi‐hop features of MANETs. The communication cost between nodes is reduced and the efficiency of the query is improved greatly.

Details

International Journal of Pervasive Computing and Communications, vol. 1 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 January 1982

Niels Bjørn‐Andersen

The office as we know it is gradually being changed as more electronic applications are introduced. To a large extent, information technology based on micro‐electronics is used…

Abstract

The office as we know it is gradually being changed as more electronic applications are introduced. To a large extent, information technology based on micro‐electronics is used today to carry out specific tasks in more efficient ways while largely disregarding or failing to cope with the overall effectivenes of an organization. Short‐term tactical productivity gains take priority over long‐term strategic development. Rationalistic and reductionistic procedures take priority over emotional, creative, judgement‐centered activities. Quantitative evaluation takes precedence over qualitative. Employee initiative is expropriated by the technology, leaving the operator little discretion in his or her task and a limited need for training and education to operate the devices.

Details

Office Technology and People, vol. 1 no. 1
Type: Research Article
ISSN: 0167-5710

Abstract

Details

The Definitive Guide to Blockchain for Accounting and Business: Understanding the Revolutionary Technology
Type: Book
ISBN: 978-1-78973-865-0

Article
Publication date: 1 January 1983

BRUCE ENGLAND

Second‐order cybernetics, as developed by Foerster, has shown that the perceived environment is our invention. Cyberneticians also need to realize that this invented environment…

Abstract

Second‐order cybernetics, as developed by Foerster, has shown that the perceived environment is our invention. Cyberneticians also need to realize that this invented environment occurs within a particular operational state of the nervous system in humans, and that a basic modification of this state creates another operational state. In the first state, cybernetic operations create an experienced reality of differentiated duality. The second state is noncybernetic because information creation does not occur, thus it has no content and is experienced as undifferentiated unity. The transition between states depends upon the shifting of attention away and back to from content creation. Awareness of the duality‐unity model creates a framework for a cybernetic theory of reality recomputation in which the content experience of duality is impacted and changed by the no‐content experience of unity. This theory within cyberneticians can be based upon the experience of others or upon personal experience.

Details

Kybernetes, vol. 12 no. 1
Type: Research Article
ISSN: 0368-492X

Article
Publication date: 20 December 2007

Jun‐Zhao Sun, Jukka Riekki, Jaakko Sauvola and Marko Jurmu

An infrastructure based on multiple heterogeneous access networks is one of the leading enablers for the emerging paradigm of pervasive computing. The optimal management of…

Abstract

Purpose

An infrastructure based on multiple heterogeneous access networks is one of the leading enablers for the emerging paradigm of pervasive computing. The optimal management of diverse networking resources is a challenging problem. This paper aims to present a context‐aware policy mechanism with related end‐to‐end (E2E) evaluation algorithm for adaptive connectivity management in multi‐access wireless networks.

Design/methodology/approach

A policy is used to express the criteria for adaptive selection of the best local and remote network interfaces. The best connection can then be used for the establishment of a channel as well as for the maintenance of on‐going data transmission. Rich context information is considered in the policy representation with respect to user profile and preference, application characteristics, device capability, and network quality of service conditions. The decision of the best access networks to be used is made on the basis of an E2E evaluation process. The decision can be made in both master–slave and peer‐to‐peer modes, according to the decision matrixes generated in both ends. The paper focuses on the policy representation and connection evaluation algorithm. A case study is presented to show the usability of the proposed policy mechanism and decision‐making algorithm in the adaptiv management of heterogeneous networking resources.

Findings

The proposed policy mechanism is for the adaptive decision of connection selection in channel establishment and vertical handoff between heterogeneous access networks. A policy is represented as a four‐tuple, including the direction and the class of traffic, requirement expression, and concrete evaluation items. Three steps are involved in the evaluation process, namely policy traverse, decision matrix calculation, and decision‐making.

Originality/value

The policy mechanism can be easily extended to include adaptive selection of multiple user devices in addition to multiple connections.

Details

International Journal of Pervasive Computing and Communications, vol. 3 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 18 April 2016

Itamir de Morais Barroca Filho and Gibeon Soares Aquino Júnior

This paper aims to present a case study of the Metamorphosis process in the development of a mobile application based on an existing web information system.

1351

Abstract

Purpose

This paper aims to present a case study of the Metamorphosis process in the development of a mobile application based on an existing web information system.

Design/methodology/approach

The paper presents the design and execution of a case study to investigate the feasibility of using the Metamorphosis process to create mobile applications based on existing web information systems. This case study reports the development of a mobile version from SIGEventos web information system.

Findings

The use of Metamorphosis process for the development of SIGEventos Mobile, based on SIGEventos web version, allowed the investigation of the feasibility of it on creation of mobile applications based on existing web information systems. This process was considered useful for creating mobile applications based on existing information systems.

Originality/value

This paper presents a case study of Metamorphosis process.

Details

International Journal of Web Information Systems, vol. 12 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 31 March 2020

Ivano Bongiovanni, Karen Renaud and George Cairns

To investigate the links between IC and the protection of data, information and knowledge in universities, as organizations with unique knowledge-related foci and challenges.

Abstract

Purpose

To investigate the links between IC and the protection of data, information and knowledge in universities, as organizations with unique knowledge-related foci and challenges.

Design/methodology/approach

The authors gathered insights from existing IC-related research publications to delineate key foundational aspects of IC, identify and propose links to traditional information security that impact the protection of IC. They conducted interviews with key stakeholders in Australian universities in order to validate these links.

Findings

The authors’ investigation revealed two kinds of embeddedness characterizing the organizational fabric of universities: (1) vertical and (2) horizontal, with an emphasis on the connection between these and IC-related knowledge protection within these institutions.

Research limitations/implications

There is a need to acknowledge the different roles played by actors within the university and the relevance of information security to IC-related preservation.

Practical implications

Framing information security as an IC-related issue can help IT security managers communicate the need for knowledge security with executives in higher education, and secure funding to preserve and secure such IC-related knowledge, once its value is recognized.

Originality/value

This is one of the first studies to explore the connections between data and information security and the three core components of IC's knowledge security in the university context.

Details

Journal of Intellectual Capital, vol. 21 no. 3
Type: Research Article
ISSN: 1469-1930

Keywords

1 – 10 of over 22000