Matteo Interlandi, S. Bergamaschi, M. Vincini, Fabio Ferrari
{"title":"A web-based platform for multimedia content authoring exploiting keyword search engine and Data Cloud","authors":"Matteo Interlandi, S. Bergamaschi, M. Vincini, Fabio Ferrari","doi":"10.1109/I-SOCIETY18435.2011.5978438","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978438","url":null,"abstract":"The composition of multimedia presentations is a time- and resource-consuming task if not afforded in a well-defined manner. This is particularly true when people having different roles and following different high-level directives, collaborate in the authoring and assembling of a final product. For this reason we adopt the Select, Assemble, Transform and Present (SATP) approach to coordinate the presentation authoring and a tag cloud-based search engine in order to help users in efficiently retrieving useful assets. In this paper we present MediaPresenter, the framework we developed to support companies in the creation of multimedia communication means, providing an instrument that users can exploit every time new communication channels have to be created.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124428506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An effect of trust and attitude in the initial adoption of online shopping: An empirical study","authors":"Tsung-li Wang","doi":"10.1109/I-SOCIETY18435.2011.5978490","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978490","url":null,"abstract":"While on-line shopping is considered as a special type of e-service, the adoption rate of this service in Taiwan has been paid attention recently. The initial adoption of on-line shopping is the important driving force to further influence the use and continued use of this service. The model of Trust and technology acceptance model (TAM) in Gefen et al. [1] has been well studied in on-line shopping and showed that understanding both the Internet technology and trust issue is important in determining behavioral intention to use. The model of Trust in Wu and Chen [2] has been well discussed the consumer intention in on-lion tax. An extension of Trust and Attitude with TAM model would be in more comprehensive manner to understand behavioral intention to use on-line shopping. Furthermore, a large sample survey is used to empirically examine this framework.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116873009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Pouyioutas, H. Gjermundrød, I. Dionysiou, M. Michael
{"title":"MAPQFTOOL: A software tool to support national qualifications frameworks","authors":"P. Pouyioutas, H. Gjermundrød, I. Dionysiou, M. Michael","doi":"10.1109/I-SOCIETY18435.2011.5978538","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978538","url":null,"abstract":"This paper presents MapQFTool, a software tool that provides support to the understanding and comparability of the National Qualifications Frameworks (NQFs) of the various European countries. The paper starts by providing background information on the Bologna Process and the Qualifications Frameworks. It then addresses the limitations of trying to map the various NQFs against the European Qualifications Framework (EQF), and through the EQF against each other and explains the advantages of automating this process using a software tool. The paper finally presents the software tool and its functionality; this is done by giving the design of the underlying database, sample data, sample queries and their results, as well as its system architecture and development platform.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117110392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Al-Rababah, S. Shatnawi, AbdelMahdi Saleh Al-Rababah
{"title":"Identifying significant single phrases in submitted free - Order arabic natural language questions","authors":"K. Al-Rababah, S. Shatnawi, AbdelMahdi Saleh Al-Rababah","doi":"10.1109/I-SOCIETY18435.2011.5978494","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978494","url":null,"abstract":"In this paper, we propose a technique for extracting significant phrases from Arabic natural language questions to databases. An Arabic natural language (ANL) question is accepted as an input and then outputs all possible relations and its corresponding attributes. Arabic morphological, ontological, and syntactical analyses were applied in this paper. A lexicon is derived from the database which consists of all forms of database artifacts through morphological and ontological analysis for each relation and attribute in the database. In addition the lexicon contains all possible synonyms for each artifact in the database. The system exhibits a high degree of autonomy since it can be applied to different domains by plugging the new data elements of the database and the system will process the database schema and generate the lexicon.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117185534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Managing and mapping data lineage for business intelligence and analytics applications in health care","authors":"Mana Azarm, F. Nargesian, L. Peyton","doi":"10.1109/I-SOCIETY18435.2011.5978521","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978521","url":null,"abstract":"The data delivery architectures in most enterprises are complex and under documented. When a Healthcare manager looks at a report, they want to know exactly what each element or technical expression on a report means, where the values shown originate from and how often they are getting updated. We propose a tool framework that includes: a meta-data repository for each step in the data delivery architecture; a web based interface to access and manage that repository; and mapping tools that capture data lineage to support step by step automation of data delivery. We illustrate and evaluate our approach with a prototype implementation and a case study using a health care analytics dashboard for managing hospital acquired infections.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121132307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The intertwining of human and technological in a digital native community","authors":"Laura Carletti","doi":"10.1109/I-SOCIETY18435.2011.5978447","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978447","url":null,"abstract":"Unprecedented learning opportunities are offered by the Web 2.0 tools development and dissemination. Although many of those applications have not been developed for learning purposes, they are contributing to spread a culture of collaboration and to provide virtual spaces to exchange information, ‘know-how’ and knowledge. As part of an ongoing study on web-based informal learning, the research preliminary findings show that the increasing pervasiveness of technology into daily life is not only engendering novel social configurations, but also digital practices. So far, technology, in the instructional design, has been commonly considered as a subsidiary means akin to a simple blackboard, whilst the applications functionalities are allowing and determining new learning perspectives. It can be thorny to advocate the mutual influence of human and technological facets on the basis of a limited research, nevertheless the work suggests a further investigation of the online communities and groupings as a recent object of inquiry in which human and technological aspects are originally intertwined.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127216201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Work allocations governed by social profiles for large scale heterogeneous infrastructure","authors":"Peter Lavin","doi":"10.1109/I-SOCIETY18435.2011.5978452","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978452","url":null,"abstract":"This paper outlines research in to resource allocation using software agents where allocations are influenced by social and economic backgrounds. Furthermore, it explores developing existing software agents to provision a multiple-agent system (MAS) where each agent is described and created based on a single text file and where the addition, reconfiguration and removal of agents is possible. Several heterogeneous computer resources exist, each having different backgrounds, origins and motivations. Several large scale computing challenges of a humanitarian, commercial or scientific nature also exist. The problems arising in the assemble of resources to address such challenges are distributed and decentralized in nature. Software agents have become a mainstream technology for addressing such problems by modeling organisation and the interactions within them. Agents intending to engage in such social behaviour need a mechanism to consider social, economic and cultural backgrounds as this is an initial step in formation of organisations. In this work, a textual description of an entity's social and economic outlook will be called a social profile. Search technology will be used within agents to differentiate such descriptions. This text file will also contain the agent configuration details, but will also be extensible to allow future developments.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127379360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modern computer architecture teaching and learning support: An experience in evaluation","authors":"Besim Mustafa","doi":"10.1109/I-SOCIETY18435.2011.5978481","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978481","url":null,"abstract":"A set of integrated educational simulators supporting teaching and learning of computer architecture concepts at degree level have been used to engage students and enhance their understanding of modern computer system architecture. Examples of practical exercises using an integrated set of simulations are described and a methodology for evaluating the educational value of the simulations is explained. The results are presented and it is noted that the statistical analysis of the results provided some support for the positive educational value of the simulations.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116156178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Almasri, Saleh A. Alshumrani, Ali Maqousi, T. Balikhina
{"title":"Assessment of 3.5G network and Wireless broadband in developing world: Jordan as a case study","authors":"S. Almasri, Saleh A. Alshumrani, Ali Maqousi, T. Balikhina","doi":"10.1109/I-SOCIETY18435.2011.5978523","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978523","url":null,"abstract":"The number of 3.5G (beyond third generation) users was emerged throughout the world during the last few years. This is because it provides very advanced services such as Wireless Internet broadband and good quality video/voice telephone calls. In developing countries, this service is still at the initial phase. There are still some obstacles facing people of these countries to use this new service. This paper provides an overview about 3.5G in these countries: Jordan as a case study. It also discusses people's expectations about this service via conducting a questionnaire targeted Internet users. The paper also presents a network assessment experimental test carried out to evaluate the network QoS at selected places of the area where this service is provided. The test was performed on three main network performance metrics: throughput, delay and packet loss.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116736227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A backbone assisted hybrid key management scheme for WSN","authors":"Ali Tufail, Ki-Hyung Kim","doi":"10.1109/I-SOCIETY18435.2011.5978514","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978514","url":null,"abstract":"Wireless Sensor Networks (WSNs) are receiving increased focus due to their applicability to crucial applications like military, healthcare, habitat monitoring etc. However, wireless communication poses additional threats to the critical information being sent over the wireless media. Therefore there is a dire need to have a secure way of communication for a WSN. Public Key Cryptography (PKC) holds the capacity to provide much needed security to WSN; however it is considered an expensive option for already constrained network. On the contrary, Symmetric Key Cryptography (SKC) is considered ideal for resource hungry WSN, nevertheless it has drawbacks too. In this paper we present a secure and reliable key management scheme for backbone assisted WSNs. Our scheme deploys both the symmetric and public key cryptography. We utilize PKC for node authentication and to share the initial secret key. SKC is then used for subsequent communication. We analyze performance of our proposed scheme and compare it with the existing approaches. We prove that our scheme is much more secure and stable and outperforms other schemes in terms of communication and memory overheads.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117010918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}