scholarly journals The State of Information Systems in Australian Universities – South Australia Report

Author(s):  
Andy Koronios ◽  
Paula Swatman
2012 ◽  
Vol 1 (1) ◽  
pp. 48 ◽  
Author(s):  
Alan Hamilton ◽  
Shengji Pei ◽  
Huyin Huai ◽  
Seona Anderson

Compared to other groups of organisms, plants require distinctive approaches in their conservation because of their keystone roles in ecosystems and economies. The state of the whole plant cover of the Earth should be of concern to conservationists – for its capacity to ensure the survival of plant species, deliver ecosystem services (locally to globally) and provide produce from plants in ecologically sustainable ways. The primary targets of attention in ecosystem-based plant conservation are the relationships between people and plants, as relevant to every locality, rather than the species-centric approach of conventional plant conservation. Moving plant conservation to an ecosystem-based approach will require the development of training programmes for field practitioners and of information systems for their use.


i-com ◽  
2017 ◽  
Vol 16 (2) ◽  
pp. 181-193 ◽  
Author(s):  
Christian Reuter ◽  
Katja Pätsch ◽  
Elena Runft

AbstractThe Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.


Author(s):  
Dmitry Dvoretsky ◽  
Natalia Kolesnikova ◽  
Oksana Makarkina ◽  
Kira Lagvilava

The mass introduction of information technologies in the activities of state structures has made it possible to transfer the efficiency of their functioning to a qualitatively new level. Unfortunately, as a means of action, they have characteristic vulnerabilities and can be used not only for good, but also for harm. For the state, as a guarantor of the stability of a civilized society, the issue of ensuring the security of information processing is particularly important. Despite the automation of many information processes, the most vulnerable link in the work of information systems remains a person. A person acts as an operator of information systems and a consumer of information. The entire service process depends on the competence of the operator and the quality of his perception. There are areas of government activity where the cost of error is particularly high. These include ensuring the life and health of citizens, protecting public order and the state system, and ensuring territorial integrity. The specifics of the spheres must be taken into account when ensuring the security of information. This study concerns official activities that are provided by paramilitary groups. Currently, there is a discrepancy in the level of competence of new personnel in the first months of service. The author traces the shortcomings of general and special professional qualities in the field of information security. The purpose of the study is to substantiate certain pedagogical means of forming cadets ' readiness to ensure information security. As forms of theoretical knowledge, we will use the traditional hypothesis and model, as well as functionally distinguishable judgments – problem, assumption, idea and principle. Empirical forms of knowledge will be observation (experimental method) and fixation of facts. To evaluate the effectiveness of the developed pedagogical tools, we use statistical methods: observation (documented and interrogated) and calculation of generalizing indicators. To formulate conclusions, we will use logical methods: building conclusions and argumentation. The approbation of certain pedagogical tools described in this article showed a significant positive trend in terms of competence in information security issues.


Author(s):  
Olha Husak

The article aims at defining the competence-based approach to training the future professionals in communication security and development of the advanced fields of their high-qualitative training. The main results of the study are represented in the list of specialists’ professional competencies in the field of communication security, which includes: capability to identify communication threats; peculiarities of civilized, manipulative and barbaric influences at the state, corporate and personal levels; categories of manipulators, types of manipulative traps, existing manipulative techniques; capability for using effective means to neutralize or counteract to manipulative influences; skills required for organization, planning and implementation of one’s actions in terms of information attacks; acquisition of communicative, organizational and technical methods of information protection in the existing information systems and networks.


2020 ◽  
pp. 95-106
Author(s):  
Halyna KULYNA ◽  
Nataliya NALUKOVA

Introduction. In the conditions of digital society formation, the informatization of the social security sphere is a necessary component and guarantee of successful implementation of social policy aimed at quality and timely satisfaction of citizens' needs. Therefore, a prerequisite for the effective functioning of social protection and public service authorities is the development and technical innovation of social services and channels for their implementation through automated information systems, should be consistent with the innovation strategy of development of the social sphere as a composite digital economy of the state. Purpose is to substantiate the expediency of application of the newest digital technologies in the sphere of social security and novelization of social services on this basis, as well as to reveal features and advantages of social protection of the population through automated information systems and channels of their implementation. Results. The necessity and role of informatization in the modern digital society and the main challenges that lead to its implementation in the field of social security have been substantiated. The key automated information systems, which contribute to the construction of a common information space of the social sphere and allow to increase social protection of the population in domestic conditions, as well as the emergence of a new service-oriented social service with a wide range of information and communication services, have been analyzed. The necessity of training and retraining of highly qualified creative specialists of new specialties was noted and generalized principles of systems of skills development in the conditions of informatization, which are important in the selection of social workers, were defined. Conclusions. Social protection and social welfare institutions, when formulating their own strategies, should consider the information and communications technology vector of development as an essential means of improving their functioning, since this will determine the effectiveness of social policy implementation in the State and the level of satisfaction of citizens with social services. The results of informatization of social processes are manifested in the implementation of automated information systems and the construction of a single unified information space of social security, the development of new service products, electronic filing of documentation and simplification of procedures for obtaining social security, transparency of social security and, as a result, successful social policy.


Sign in / Sign up

Export Citation Format

Share Document