International Conference on Information Society (i-Society 2011)最新文献

筛选
英文 中文
An exploration of gender difference in knowledge sharing- social capital perspective 知识共享中的性别差异探析——社会资本视角
International Conference on Information Society (i-Society 2011) Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978537
Y. Liu, Mei-Lien Tung
{"title":"An exploration of gender difference in knowledge sharing- social capital perspective","authors":"Y. Liu, Mei-Lien Tung","doi":"10.1109/I-SOCIETY18435.2011.5978537","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978537","url":null,"abstract":"Little has been known in the understanding of how gender difference in knowledge sharing. This study forms a framework by incorporating social capital and SECI model and examines it by an experiment with 65 student virtual teams collaborating in a Wiki platform. The results show that the only difference across gender is the significant path from socialization to performance for female. This study also confirms that social capital has significant impacts on knowledge sharing for both genders and knowledge sharing has a significant impact on virtual team performance.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123150813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel centroid localization algorithm for Zigbee wireless sensor networks Zigbee无线传感器网络质心定位新算法
International Conference on Information Society (i-Society 2011) Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978468
Chia-Ping Huang, P. Lee
{"title":"A novel centroid localization algorithm for Zigbee wireless sensor networks","authors":"Chia-Ping Huang, P. Lee","doi":"10.1109/I-SOCIETY18435.2011.5978468","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978468","url":null,"abstract":"There are many algorithms demonstrated effectively for wireless sensor network (WSN). Some approaches aim to provide precise position and others demonstrate identification purpose. Even though there is a growing awareness for Zigbee-based sensor networks applications that an integrated coordination of hardware and software is needed for current applications. Especially, the previous research efforts could not clearly establish the impact of protocols or topology management issues. This paper intends to design a more convenient and efficient localization algorithm for Zigbee wireless sensor networks for the paint-ball game. A RSSI-based algorithm (Received Signal Strength Indicator, RSSI) and fixed nodes topology is developed to illustrate the performance of a novel mixed centroid localization algorithm within the paint-ball game scenarios. The experiment data and algorithm actually help the paint-ball game simulation project. The next step for this project is getting beacons motion figure which may expand this algorithm further applications.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117176882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards e-learning security: A machine learning approach 迈向电子学习安全:一种机器学习方法
International Conference on Information Society (i-Society 2011) Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978544
T. Ayodele, C. Shoniregun, G. Akmayeva
{"title":"Towards e-learning security: A machine learning approach","authors":"T. Ayodele, C. Shoniregun, G. Akmayeva","doi":"10.1109/I-SOCIETY18435.2011.5978544","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978544","url":null,"abstract":"E-learning allows us to learn anywhere, any place and any time as long as there is access to a configured computer system. E-learning can be network-based, intranet-based, internet-based, cd/dvd-based. It can include audio, video, text, animation and virtual environments. However, the increase of e-learning tools by allowing the creation learning environments does create loop holes for security bridges such as: inadequate authentication for online assessments, identity theft, and impersonation. We propose a new framework that can reduce the security risks, and provide an intelligent e-learning preventive mechanism (IEPM) to identify users' pattern of behaviour in order to determine the level of risks and recommend preventive measures.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133233992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Exploiting the Search Computing paradigm in e-government 电子政务中搜索计算范式的开发
International Conference on Information Society (i-Society 2011) Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978535
A. Campi
{"title":"Exploiting the Search Computing paradigm in e-government","authors":"A. Campi","doi":"10.1109/I-SOCIETY18435.2011.5978535","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978535","url":null,"abstract":"People shop online, compare online, book hotels and flights online. This happens because the data needed to complete these tasks are easily accessible and a lot of Web sites allows users to query the Web to obtain enough information to be confident. The aim of this work is to propose a framework tailored to extend the internet revolution to public administration. This work is the first step towards an infrastructure allowing people to know in a very easy way the information they need. This paper exploits the Search Computing paradigm. It is a new way for composing data. While state-of-art search systems answer generic or domain-specific queries, Search Computing enables answering questions via a constellation of cooperating data sources, called search services, which are correlated by means of join operations. Search Computing aims at responding to queries over multiple semantic fields of interest; thus, Search Computing fills the gap between generalized search systems, which are unable to find information spanning multiple topics, and domain-specific search systems, which cannot go beyond their domain limits.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123629619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sliding doors: Random mobile encounters 滑动门:随机移动遭遇战
International Conference on Information Society (i-Society 2011) Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978499
John P. T. Moore, Sujan Shrestha
{"title":"Sliding doors: Random mobile encounters","authors":"John P. T. Moore, Sujan Shrestha","doi":"10.1109/I-SOCIETY18435.2011.5978499","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978499","url":null,"abstract":"Imagine when you sit on the same train everyday commuting to work. You see the same people. What do you know about these people? Do they move in similar social circles to you? In this paper we describe how technology can be used in evasive ways to obtain information about some people who you come into contact with. We describe how to implement the technology as well as highlight issues of personal privacy.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124868564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey report on mobile eye-based Human-Computer Interaction 基于移动眼的人机交互调查报告
International Conference on Information Society (i-Society 2011) Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978526
S. Srinivas, J. Blustein
{"title":"A survey report on mobile eye-based Human-Computer Interaction","authors":"S. Srinivas, J. Blustein","doi":"10.1109/I-SOCIETY18435.2011.5978526","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978526","url":null,"abstract":"Eye-based Human Computer Interaction techniques have thus far been limited to closed environments. However advancement in technology and the advent of mobile computing promises to bring eye-based interaction techniques to wearable and handled mobile devices. This paper investigates recent methods to track eye movements in the mobile environment. Methods were evaluated by comparing the techniques they rely on, type of work, use of theoretical proofs and simulations.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121687497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mobile portals: An extension to corporate knowledge portals 移动门户:企业知识门户的扩展
International Conference on Information Society (i-Society 2011) Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978476
Hanadi Al-Zegaier, Abderrahim Barakat
{"title":"Mobile portals: An extension to corporate knowledge portals","authors":"Hanadi Al-Zegaier, Abderrahim Barakat","doi":"10.1109/I-SOCIETY18435.2011.5978476","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978476","url":null,"abstract":"Corporate knowledge portals are used by organizations for sharing, storing and retrieving knowledge by all its customers, employees, vendors and partners. Corporate knowledge portals allow organizations to become more competitive and innovative. A knowledge portal are constructed through the use of web and internet technology and are accessed to add, retrieve or update knowledge and is done through a web browser using a computer system. This paper discusses the use of mobile portals as a new form of accessing corporate knowledge through the use of the mobile devices.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122480919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Business Process Management and the challenge of dynamic services 业务流程管理和动态服务的挑战
International Conference on Information Society (i-Society 2011) Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978530
T. Kirkham, Sandra Winfield, M. Raza, Thorsten Haberecht
{"title":"Business Process Management and the challenge of dynamic services","authors":"T. Kirkham, Sandra Winfield, M. Raza, Thorsten Haberecht","doi":"10.1109/I-SOCIETY18435.2011.5978530","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978530","url":null,"abstract":"Advances in mobile and embedded computing are presenting computing environment that embrace personalisation, mobility and real-time computing. As a result Service Oriented Architectures (SOA) has to adopt new methods of service security, service management and service execution. For the business process these adaptations yield challenges in terms of process modeling, delivery and execution. In order to make Business Process Management (BPM) work in practice in these new environments, what changes are needed in order to support increasingly dynamic and decentralised services in BPM?","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122754268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Forensic extraction of user information in continuous block of evidence 在连续取证块中提取用户信息
International Conference on Information Society (i-Society 2011) Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978501
F. Olajide, N. Savage
{"title":"Forensic extraction of user information in continuous block of evidence","authors":"F. Olajide, N. Savage","doi":"10.1109/I-SOCIETY18435.2011.5978501","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978501","url":null,"abstract":"Extraction of user information in the physical memory of Windows application is vital in today's digital investigation. Digital forensic community feels the urge for the development of tools and techniques in volatile memory analysis. However, there have been few investigations into the amount of relevant information that can be recovered from the application memory. In this research, we present the quantitative and qualitative results of experiments carried out on Windows applications. In conducting this research; we have identified the most commonly used applications on Windows systems, designed a methodology to capture data and processed that data. This research report the amount of evidence that was stored over time and recovered in continuous block of evidence in the physical memory.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121079679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Web application security: Improving critical web-based applications quality through in-depth security analysis Web应用程序安全性:通过深入的安全性分析提高关键的基于Web的应用程序质量
International Conference on Information Society (i-Society 2011) Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978496
Nuno Teodoro, C. Serrão
{"title":"Web application security: Improving critical web-based applications quality through in-depth security analysis","authors":"Nuno Teodoro, C. Serrão","doi":"10.1109/I-SOCIETY18435.2011.5978496","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978496","url":null,"abstract":"The Internet, and in particular the World Wide Web, have become one of the most common communication mediums in the World. Millions of users connect everyday to different web-based applications to search for information, exchange messages, interact with each other, conduct business, pay taxes, perform financial operations and many more. Some of these critical web-based services are targeted by several malicious users intending to exploit possible weaknesses and vulnerabilities, which could cause not only the disruption of the service, but also compromise the users and organizations information. Most of the times, these malicious users succeed in exploiting different types of vulnerabilities and the consequences can be disastrous. Most of these vulnerabilities are directly related with the web-based applications lack of quality as a result from a poorly implemented software development life cycle (SDLC). This paper will discuss the direct implication of the lack of security and the importance of quality on the SDLC, and the major factors that influence them. On the other hand the authors propose a set of security automated tools and methodologies that can be used throughout the SDLC as a mean to improve critical web-based applications security and quality.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131971272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信