{"title":"Collective intelligence and online learning communities","authors":"M. Gea, Rosana Montes Soldado, Vanesa Gamiz","doi":"10.1109/I-SOCIETY18435.2011.5978461","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978461","url":null,"abstract":"Information society brings new forms of communication models where citizens live with multiple digital identities on nomadic online communities. These collectives are capable of interact themselves to create new forms of knowledge sharing experiences and recycling old fashioned model of information management, and thus creating learning communities through informal practices. In this paper we analyze these digital communities representing new forms of learning styles and new approaches for open knowledge as a new trend for the next decade society","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"587 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123417135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The fight against phishing: Technology, the end user and legislation","authors":"Carly Wilson, David Argles","doi":"10.1109/I-SOCIETY18435.2011.5978553","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978553","url":null,"abstract":"Phishing is an ongoing problem which is constantly on the rise, with at least 221,271 unique phishing websites being reported in the first half of 2009. Currently, no solutions exist which wholly combat phishing, leading to large economic losses and personal distress. Phishing largely targets human vulnerabilities over technical ones, meaning there is an ongoing battle between anti-phishing solutions and the perpetrators. This paper presents a combined solution of producing international legislation, increasing user awareness of the dangers of phishing, and continuing and improving the current technical solutions that exist.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121585909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pathway-based gene selection for disease classification","authors":"M. Ibrahim, S. Jassim, M. Cawthorne, K. Langlands","doi":"10.1109/I-SOCIETY18435.2011.5978470","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978470","url":null,"abstract":"The identification of disease biomarkers from genetic data such as high-throughput transcriptional profiling screens has attracted a great deal of recent interest due to relevance in prognostication and drug discovery. Biomarker discovery can be modelled as a feature selection problem that aims to find the most discriminating features (genes) for accurate disease classification e.g. healthy vs. diseased samples. Typical feature selection algorithms identify individual genes, and the disease discrimination power of each gene is considered separately. In this paper, we propose a gene selection method incorporating prior biological knowledge about gene pathways to find a group(s) of strongly correlated genes to accurately discriminate complex as well as simple diseases. The proposed method involves a ranking process to identify the most relevant biological pathways in a microarray dataset. A specified number of differentially- expressed genes from relevant pathways is then selected for accurate disease classification. The advantage of this method is that it searches for a group of strongly correlated genes rather than individual genes. We argue that selecting a group of informative and correlated genes from disease-associated pathways is particularly relevant to the disease type or grade. To evaluate the performance of our method, we compare it to five well-known feature selection and ranking methods using two classifiers: K-Nearest Neighbour (KNN) and Support Vector Machine (SVM). Using publicly-available microarray datasets, we found that our algorithm outperforms other methods in terms of disease classification accuracy. Moreover, we were able to reduce the number of genes required to accurately discriminate disease states.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121877275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The virtual world in the general chemistry education - experience in developing the pregraduate teachers' competences in the Czech Republic","authors":"M. Bílek, V. Machkova, I. Šimonová","doi":"10.1109/I-SOCIETY18435.2011.5978478","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978478","url":null,"abstract":"In the paper the process of implementation of computer animations and simulations within the primary chemistry education is described. The research project focusing on the pre-graduate chemistry teachers' training in the field of ICT competences is presented. The main problem appears in the meaningful application of computer animations and simulations in the phases of preparation, running and evaluation of the process of instruction. Authors provide crucial characteristics of both applications, learning activities suitable for implementation, quality criteria and didactic recommendations. The data were collected from the direct and indirect observation and the questionnaire, and they evoke discussions on problems of the virtual world, which is steadily been involved in everyday life of the developing i-society.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121981729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fauziah Baharom, N. Muhd Darus, Haslina Mohd, M. M. Kasim, Z. M. Matt, N. M. Nawawi
{"title":"Constructing a standardized Multi-Criteria Tender Evaluation for IT projects using Balanced Scorecard","authors":"Fauziah Baharom, N. Muhd Darus, Haslina Mohd, M. M. Kasim, Z. M. Matt, N. M. Nawawi","doi":"10.1109/I-SOCIETY18435.2011.5978533","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978533","url":null,"abstract":"Tender evaluation is one of the most important parts in tendering process. In this process, tender bidding by the contractors will be evaluated based on certain criteria and only the most suitable contractor will be selected and awarded the project. In Information Technology (IT) industry, large IT projects are often acquired through a tendering process. Thus, performing effective tender evaluation with proper and accurate method and criteria is crucial to ensure the quality of the tendering process and produce the best outcome. This paper discusses on the construction of standardized Multi-Criteria Tender Evaluation for IT projects. The standardized criteria are developed to provide conformity upon technical standard of tender evaluation. The criteria were identified using multiple fact finding techniques which are case study, survey and documents review. The identified criteria were mapped with the four perspectives of Balanced Scorecard (BSC) in order to obtain ‘balance’ tender evaluation results.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131124679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Kirkham, Serge Ravet, Sandra Winfield, Sampo Kellomaki
{"title":"A personal data store for an Internet of Subjects","authors":"T. Kirkham, Serge Ravet, Sandra Winfield, Sampo Kellomaki","doi":"10.1109/I-SOCIETY18435.2011.5978515","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978515","url":null,"abstract":"Person centric architectures put the user at the centre of personal data access control. This is a change from current service orientated applications where often the service provider is control of the person's data. Within a personal data store (PDS) users can link to and edit metadata / policies of remote data and host local data that they own. The PDS concept is part of a wider network of trust that provides users with notifications when data that is personal to them is used. Users can access the results of the applications that use their personal data in an anonymous way using the Internet of Subjects (IoS) PDS protocol Instant Social Networking ID (ISNID). The IoS PDS presents an entire application environment based around trust and the protection of the individual's privacy.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130881879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recommendations to reduce teachers' cognitive overload in authoring hypermedia","authors":"Arnoldo Rodriguez","doi":"10.1109/I-SOCIETY18435.2011.5978466","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978466","url":null,"abstract":"This paper presents the general design of an assistant, ARIALE (Authoring Resources for Implementing Adaptive Learning Environments), that helps decrease the teacher's cognitive load when he has to deal with traditional help techniques, complex tasks or unknown environments in the workplace. The assistant adapts learning support and problem-solving support according to teachers' characteristics, while they are authoring learning sessions to teach decision-making in Network Design. ARIALE applies on-the-job training when a teacher can not spend time learning how to use a tool or how to solve a problem. Our methods for problem-solving support include Bayesian learning to recommend network topologies and our assistant provides adapted help to use a tool rather than teach how to use it.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114633010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hidden assumption of face recognition evaluation under different quality conditions","authors":"H. Al-Assam, Ali J. Abboud, S. Jassim","doi":"10.1109/I-SOCIETY18435.2011.5978491","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978491","url":null,"abstract":"Automatic face recognition remains a challenging task due to factors such as variations in recording condition, pose, and age. Many schemes have emerged to enhance the performance of face recognition to deal with poor quality facial images. It has been shown that reporting average accuracy, to cover a wide range of image quality, does not reflect the system's for any specific quality levels. This raises the need to evaluate biometric system's performance at each quality level separately. Challenging face databases have been recorded with varied face image qualities. Unfortunately, the performance of face recognition schemes under different quality conditions, reported in the literature, are evaluated under hidden assumption which cannot be achieved in real-life applications. In fact, this problem could be a source of attack that interferes with the verification through manipulating the recording condition. In order to remedy this problem, two requirements are to be imposed: 1) the matching criteria should be based an Adaptive Quality-Based Threshold (AQBT) and 2) at the verification stage the quality level of an input face image should be determined and classified into one of a non-overlapping predefined quality levels. We illustrate our idea by experiments conducted on the extended Yale B face benchmark dataset. Our experimental results indicate that if AQBT is not adopted, false rejection rates becomes very high (always reject) when using low quality face images.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114022084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and development of TPACK template: Planning effective blended courses","authors":"Mohammed M. Alsofyani, Baharuddin Aris","doi":"10.1109/I-SOCIETY18435.2011.5978459","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978459","url":null,"abstract":"The need for a quality planning of online learning is crucial. When planning for face to face environment and online environment, it is required to clarify when learning will take place online and which pedagogy and technology will be used. Thus, in this paper, we introduce TPACK lesson plan template. This template is designed to facilitate and accelerate the process of planning blended online courses in social science's field. It includes a list of learning activities, types of activities and mode of activities. Choosing the most suitable activity is left up to the instructors' point of view after examining the nature of behavioral objectives and the learning context. Using such a template may contribute to understanding the relation between pedagogy, technology and content as well as reducing the planning time to teach online.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"59 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123762297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The geography and organisation of the global knowledge economy - The example of ICT in India and its interactions with Sweden","authors":"B. Hermelin, R. Demir, H. Verhagen","doi":"10.1109/I-SOCIETY18435.2011.5978489","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978489","url":null,"abstract":"This position paper presents the outline for a study of the changes in geography and organisation of the global knowledge economy and how the development of outsourcing and localisation of firms from the “global south” in the “global north” within ICT industry is supported by ICT tools.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122746546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}