Abstract: New ways of working- refers to non-traditional work practices, settings and locations with information and communication technologies (ICT) to supplement or replace traditional ways of working. It questions the contemporary work practices and settings still very much used in knowledge-intensive organizations today. In this study new ways of working is seen to consist of two elements: work environment (incl. physical, virtual and social) and work practices. This study aims to gather the scattered information together and deepen the understanding on new ways of working. Moreover, the objective is to provide some evidence of the unclear productivity impacts of new ways of working using case study approach.
Abstract: Students with high level skills are in demand, especially in scare skill environments. If universities wish to be successful and competitive, its students need to be adequately equipped with the necessary tools. Work Integrated Learning (WIL) is an essential component of the education of a student. The relevance of higher education should be assessed in terms of how it meets the needs of society and the world of work in a global economy. This paper demonstrates how to use Habermas's theory of communicative action to reflect on students- perceptions on their integration in the work environment to achieve social integration and financial justification. Interpretive questionnaires are used to determine the students- view of how they are integrated into society, and contributing to the economy. This paper explores the use of Habermas-s theory of communicative action to give theoretical and methodological guidance for the practice of social findings obtained in this inquiry.
Abstract: In this paper we describes the authentication for DHCP
(Dynamic Host Configuration Protocol) message which provides the
efficient key management and reduces the danger replay attack without
an additional packet for a replay attack. And the authentication for
DHCP message supports mutual authentication and provides both
entity authentication and message authentication. We applied the
authentication for DHCP message to the home network environments
and tested through a home gateway.
Abstract: With the advent of new technologies, factors related to
mental health in e-workspaces are taken into consideration more than
ever. Studies have revealed that one of the factors affecting the
productivity of employees in an organization is occupational stress.
Another influential factor is quality of work life which is important in
the improvement of work environment conditions and organizational
efficiency. In order to uncover the quality of work life level and to
investigate the impact of occupational stress on quality of work life
among information technology employees in Iran, a cross-sectional
study design was applied and data were gathered using a
questionnaire validated by a group of experts. The results of the study
showed that information technology staffs have average level of both
occupational stress and quality of work life. Furthermore, it was
found that occupational stress has a negative impact on quality of
work life. In addition, the same results were observed for role
ambiguity, role conflict, role under-load, work-pace, work
repetitiveness and tension toward quality of work life. No significant
relation was found between role overload and quality of work life.
Finally, directions for future research are proposed and discussed.
Abstract: This research study examines cases of Saudi Arabian
universities and female academics for work environment issues
within the context of design management applications. The study
proposes use of design research, ergonomics and systems design
thinking to develop the university design which facilitates removal of
physical and cognitive barriers for female academics. Review of
literature demonstrates that macro and micro ergonomic combined
with design management and system design strategies can
significantly improve the workplace design for female academics.
The university design model would be prepared based on the analyses
of primary data obtained from archived documents, participants'
observation logs, photo audits, focus groups and semi-structured
interviews of currently employed female academics in the selected
case universities.
Abstract: The home in these days has not one computer connected to the Internet but rather a network of many devices within the home, and that network might be connected to the Internet. In such an environment, the potential for attacks is greatly increased. The general security technology can not apply because of the use of various wired and wireless network, middleware and protocol in digital home environment and a restricted system resource of home information appliances. To offer secure home services home network environments have need of access control for various home devices and information when users want to access. Therefore home network access control for user authorization is a very important issue. In this paper we propose access control model using RBAC in home network environments to provide home users with secure home services.
Abstract: A pilot project was carried out in 2007 by the senior
students of Cyprus International University, aiming to minimize the
total cost of waste collection in Northern Cyprus. Many developed
and developing countries have cut their transportation costs – which
lies between 30-40% – down at a rate of 40% percent, by
implementing network models for their route assignments.
Accordingly, a network model was implemented at Göçmenköy
district, to optimize and standardize waste collection works. The
work environment of the employees were also redesigned to provide
maximum ergonomy and to increase productivity, efficiency and
safety. Following the collection of the required data including waste
densities, lengths of roads and population, a model was constructed
to allocate the optimal route assignment for the waste collection
trucks at Göçmenköy district.
Abstract: This study is a descriptive-normative research. It
attempted to investigate the restaurants’ firm performance in terms of
the customers and restaurant personnel’s degree of satisfaction. A
total of 12 restaurants in Bangkok, Thailand that offer Thai cuisine
were included in this study. It involved 24 stockholders/managers,
120 subordinates and 360 customers. General Managers and
restaurants’ stockholders, 10 staffs, and 30 costumers for each
restaurant were chosen for random sampling. This study found that
respondents are slightly satisfied with their work environment but are
generally satisfied with the accessibility to transportation, to malls,
convenience, safety, recreation, noise-free, and attraction; customers
find the Quality of Food in most Thai Cuisines like services, prices of
food, sales promotion, and capital and length of service satisfactory.
Therefore, both stockholder-related and personnel-related factors
which are influenced by restaurant, personnel, and customer-related
factors are partially accepted whereas; customer-related factors which
are influenced by restaurant, personnel and customer-related factors
are rejected.
Abstract: Magetan area is going to be the object of this research
which is located in East Java, Indonesia. The data were obtained
from 270 civil servants working at the Magetan District government.
The data were analyzed using the Structural Equation Modeling with
Partial Least Square program. The research showed the following
findings: (1) job motivation variable has a positive and significant
effect on organizational citizenship behavior (OCB); (2) work
environment has positive and significant effect on OCB; (3)
leadership variable has positive and significant effect on OCB; (4)
job motivation variable has no significant effect on job satisfaction;
(5) work environment variable has no significant effect on job
satisfaction; (6) leadership variable has no significant effect on job
satisfaction; (7) OCB is positively and significantly associated with
job satisfaction; (8) job satisfaction variable is positively and
significantly correlated with quality of public service at the Magetan
District government.
Abstract: Australia, while being a large and eager consumer of
innovative and cutting edge Information and Communication
Technologies (ICT), continues to struggle to remain a leader in
Technological Innovation. This paper has two main contributions to
address certain aspects of this complex issue. The first being the
current findings of an ongoing research project on Information and
Innovation Management in the Australian Information and
Communication Technologies (ICT) sector. The major issues being
considered by the project include: investigation of the possible
inherent entrepreneurial nature of ICT; how to foster ICT innovation;
and examination of the inherent difficulties currently found within
the ICT industry of Australia in regards to supporting the
development of innovative and creative ideas. The second major
contribution is details of the I.-C.A.N. (Innovation by Collaborative
Anonymous Networking) software application information
management tool created and evolving in our research group. I-CAN,
besides having a positive reinforcement acronym, is aimed at
facilitating productive collaborative innovation in an Australian
workplace. Such a work environment is frequently subjected to
cultural influences such as the 'tall poppy syndrome' and 'negative'
or 'unconstructive' peer-pressure. There influences are frequently
seen as inhibitors to employee participation, entrepreneurship and
innovation.
Abstract: Extensive information is required within a R&D environment,
and a considerable amount of time and efforts are being
spent on finding the necessary information. An adaptive information
providing system would be beneficial to the environment, and a
conceptual model of the resources, people and context is mandatory
for developing such applications. In this paper, an information model
on various contexts and resources is proposed which provides the
possibility of effective applications for use in adaptive information
systems within a R&D project and meeting environment.
Abstract: This study aims to explore the differences and
similarities in perceptions of affective climate antecedents at the
workplace (intimacy, flexibility, employment stability, and team)
among Japanese and Thai Generations X and Y. The samples in this
study were Thai and Japanese workers who completed a work
environment questionnaire and provided demographic information.
Generational differences in perceptions (beliefs) of what factors
contribute to affective climate were investigated using t-test analysis.
Mean scores for each antecedent were ranked to determine how each
generation in each group prioritized the importance of all affective
climate antecedents. Japanese Generation Y perceived the importance
of employment stability for affective climate of their workplaces to be
significantly higher than did Japanese Generation X. Thai Generation
Y considered flexibility with a higher priority than did Thai
Generation X. Intimacy was perceived as highly important across
generations and countries in regard to affective climate. Results
suggest that managers should design workplaces for a mixture of
diverse generations, resulting in a better affective climate. Differences
in the importance of antecedents for affective climate among
Generations X and Y in two countries were clarified. In addition,
different preferences regarding work environment across Japanese
Generations X and Y and Thai Generations X and Y were discussed.
Abstract: This paper provides an introduction into the evolution
of information and communication technology and illustrates its
usage in the work domain. The paper is sub-divided into two parts.
The first part gives an overview over the different phases of
information processing in the work domain. It starts by charting the
past and present usage of computers in work environments and shows
current technological trends, which are likely to influence future
business applications. The second part starts by briefly describing,
how the usage of computers changed business processes in the past,
and presents first Ambient Intelligence applications based on
identification and localization information, which are already used in
the production and retail sector. Based on current systems and
prototype applications, the paper gives an outlook of how Ambient
Intelligence technologies could change business processes in the
future.
Abstract: The rapid advance of communication technology is
evolving the network environment into the broadband convergence
network. Likewise, the IT services operated in the individual network
are also being quickly converged in the broadband convergence
network environment. VoIP and IPTV are two examples of such new
services. Efforts are being made to develop the video phone service,
which is an advanced form of the voice-oriented VoIP service.
However, the new IT services will be subject to stability and reliability
vulnerabilities if the relevant security issues are not answered during
the convergence of the existing IT services currently being operated in
individual networks within the wider broadband network
environment. To resolve such problems, this paper attempts to analyze
the possible threats and identify the necessary security measures
before the deployment of the new IT services. Furthermore, it
measures the quality of the encryption algorithm application example
to describe the appropriate algorithm in order to present security
technology that will have no negative impact on the quality of the
video phone service.
Abstract: Malware is software which was invented and meant for doing harms on computers. Malware is becoming a significant threat in computer network nowadays. Malware attack is not just only involving financial lost but it can also cause fatal errors which may cost lives in some cases. As new Internet Protocol version 6 (IPv6) emerged, many people believe this protocol could solve most malware propagation issues due to its broader addressing scheme. As IPv6 is still new compares to native IPv4, some transition mechanisms have been introduced to promote smoother migration. Unfortunately, these transition mechanisms allow some malwares to propagate its attack from IPv4 to IPv6 network environment. In this paper, a proof of concept shall be presented in order to show that some existing IPv4 malware detection technique need to be improvised in order to detect malware attack in dual-stack network more efficiently. A testbed of dual-stack network environment has been deployed and some genuine malware have been released to observe their behaviors. The results between these different scenarios will be analyzed and discussed further in term of their behaviors and propagation methods. The results show that malware behave differently on IPv6 from the IPv4 network protocol on the dual-stack network environment. A new detection technique is called for in order to cater this problem in the near future.
Abstract: Social interest and demand on Home-Network has
been increasing greatly. Although various services are being
introduced to respond to such demands, they can cause serious
security problems when linked to the open network such as Internet.
This paper reviews the security requirements to protect the service
users with assumption that the Home-Network environment is
connected to Internet and then proposes the security model based on
the requirement. The proposed security model can satisfy most of the
requirements and further can be dynamically applied to the future
ubiquitous Home-Networks.
Abstract: Work stress causes the organizational work-life
imbalance of employees. Because of this imbalance, workers perform
with lower effort to finish assignments and thus an organization will
experience reduced productivity. In order to investigate the problem
of an organizational work-life imbalance, this qualitative case study
focuses on an organizational work-life imbalance among Thai
software developers in a German-owned company in Chiang Mai,
Thailand. In terms of knowledge management, fishbone diagram is
useful analysis tool to investigate the root causes of an organizational
work-life imbalance systematically in focus-group discussions.
Furthermore, fishbone diagram shows the relationship between
causes and effects clearly. It was found that an organizational worklife
imbalance among Thai software developers is influenced by
management team, work environment, and information tools used in
the company over time.
Abstract: The purpose of this paper is to conceptualize a futureoriented
human work environment and organizational activity in
deep mines that entails a vision of good and safe workplace. Futureoriented
technological challenges and mental images required for
modern work organization design were appraised. It is argued that an
intelligent-deep-mine covering the entire value chain, including
environmental issues and with work organization that supports good
working and social conditions towards increased human productivity
could be designed. With such intelligent system and work
organization in place, the mining industry could be seen as a place
where cooperation, skills development and gender equality are key
components. By this perspective, both the youth and women might
view mining activity as an attractive job and the work environment
as a safe, and this could go a long way in breaking the unequal
gender balance that exists in most mines today.
Abstract: Nowadays wireless technology plays an important
role in public and personal communication. However, the growth of
wireless networking has confused the traditional boundaries between
trusted and untrusted networks. Wireless networks are subject to a
variety of threats and attacks at present. An attacker has the ability to
listen to all network traffic which becoming a potential intrusion.
Intrusion of any kind may lead to a chaotic condition. In addition,
improperly configured access points also contribute the risk to
wireless network. To overcome this issue, a security solution that
includes an intrusion detection and prevention system need to be
implemented. In this paper, first the security drawbacks of wireless
network will be analyzed then investigate the characteristics and also
the limitations on current wireless intrusion detection and prevention
system. Finally, the requirement of next wireless intrusion prevention
system will be identified including some key issues which should be
focused on in the future to overcomes those limitations.
Abstract: As the Internet continues to grow at a rapid pace as
the primary medium for communications and commerce and as
telecommunication networks and systems continue to expand their
global reach, digital information has become the most popular and
important information resource and our dependence upon the
underlying cyber infrastructure has been increasing significantly.
Unfortunately, as our dependency has grown, so has the threat to the
cyber infrastructure from spammers, attackers and criminal
enterprises. In this paper, we propose a new machine learning based
network intrusion detection framework for cyber security. The
detection process of the framework consists of two stages: model
construction and intrusion detection. In the model construction stage,
a semi-supervised machine learning algorithm is applied to a
collected set of network audit data to generate a profile of normal
network behavior and in the intrusion detection stage, input network
events are analyzed and compared with the patterns gathered in the
profile, and some of them are then flagged as anomalies should these
events are sufficiently far from the expected normal behavior. The
proposed framework is particularly applicable to the situations where
there is only a small amount of labeled network training data
available, which is very typical in real world network environments.