{"title":"An exploration of gender difference in knowledge sharing- social capital perspective","authors":"Y. Liu, Mei-Lien Tung","doi":"10.1109/I-SOCIETY18435.2011.5978537","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978537","url":null,"abstract":"Little has been known in the understanding of how gender difference in knowledge sharing. This study forms a framework by incorporating social capital and SECI model and examines it by an experiment with 65 student virtual teams collaborating in a Wiki platform. The results show that the only difference across gender is the significant path from socialization to performance for female. This study also confirms that social capital has significant impacts on knowledge sharing for both genders and knowledge sharing has a significant impact on virtual team performance.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123150813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel centroid localization algorithm for Zigbee wireless sensor networks","authors":"Chia-Ping Huang, P. Lee","doi":"10.1109/I-SOCIETY18435.2011.5978468","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978468","url":null,"abstract":"There are many algorithms demonstrated effectively for wireless sensor network (WSN). Some approaches aim to provide precise position and others demonstrate identification purpose. Even though there is a growing awareness for Zigbee-based sensor networks applications that an integrated coordination of hardware and software is needed for current applications. Especially, the previous research efforts could not clearly establish the impact of protocols or topology management issues. This paper intends to design a more convenient and efficient localization algorithm for Zigbee wireless sensor networks for the paint-ball game. A RSSI-based algorithm (Received Signal Strength Indicator, RSSI) and fixed nodes topology is developed to illustrate the performance of a novel mixed centroid localization algorithm within the paint-ball game scenarios. The experiment data and algorithm actually help the paint-ball game simulation project. The next step for this project is getting beacons motion figure which may expand this algorithm further applications.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117176882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards e-learning security: A machine learning approach","authors":"T. Ayodele, C. Shoniregun, G. Akmayeva","doi":"10.1109/I-SOCIETY18435.2011.5978544","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978544","url":null,"abstract":"E-learning allows us to learn anywhere, any place and any time as long as there is access to a configured computer system. E-learning can be network-based, intranet-based, internet-based, cd/dvd-based. It can include audio, video, text, animation and virtual environments. However, the increase of e-learning tools by allowing the creation learning environments does create loop holes for security bridges such as: inadequate authentication for online assessments, identity theft, and impersonation. We propose a new framework that can reduce the security risks, and provide an intelligent e-learning preventive mechanism (IEPM) to identify users' pattern of behaviour in order to determine the level of risks and recommend preventive measures.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133233992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploiting the Search Computing paradigm in e-government","authors":"A. Campi","doi":"10.1109/I-SOCIETY18435.2011.5978535","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978535","url":null,"abstract":"People shop online, compare online, book hotels and flights online. This happens because the data needed to complete these tasks are easily accessible and a lot of Web sites allows users to query the Web to obtain enough information to be confident. The aim of this work is to propose a framework tailored to extend the internet revolution to public administration. This work is the first step towards an infrastructure allowing people to know in a very easy way the information they need. This paper exploits the Search Computing paradigm. It is a new way for composing data. While state-of-art search systems answer generic or domain-specific queries, Search Computing enables answering questions via a constellation of cooperating data sources, called search services, which are correlated by means of join operations. Search Computing aims at responding to queries over multiple semantic fields of interest; thus, Search Computing fills the gap between generalized search systems, which are unable to find information spanning multiple topics, and domain-specific search systems, which cannot go beyond their domain limits.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123629619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sliding doors: Random mobile encounters","authors":"John P. T. Moore, Sujan Shrestha","doi":"10.1109/I-SOCIETY18435.2011.5978499","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978499","url":null,"abstract":"Imagine when you sit on the same train everyday commuting to work. You see the same people. What do you know about these people? Do they move in similar social circles to you? In this paper we describe how technology can be used in evasive ways to obtain information about some people who you come into contact with. We describe how to implement the technology as well as highlight issues of personal privacy.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124868564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey report on mobile eye-based Human-Computer Interaction","authors":"S. Srinivas, J. Blustein","doi":"10.1109/I-SOCIETY18435.2011.5978526","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978526","url":null,"abstract":"Eye-based Human Computer Interaction techniques have thus far been limited to closed environments. However advancement in technology and the advent of mobile computing promises to bring eye-based interaction techniques to wearable and handled mobile devices. This paper investigates recent methods to track eye movements in the mobile environment. Methods were evaluated by comparing the techniques they rely on, type of work, use of theoretical proofs and simulations.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121687497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile portals: An extension to corporate knowledge portals","authors":"Hanadi Al-Zegaier, Abderrahim Barakat","doi":"10.1109/I-SOCIETY18435.2011.5978476","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978476","url":null,"abstract":"Corporate knowledge portals are used by organizations for sharing, storing and retrieving knowledge by all its customers, employees, vendors and partners. Corporate knowledge portals allow organizations to become more competitive and innovative. A knowledge portal are constructed through the use of web and internet technology and are accessed to add, retrieve or update knowledge and is done through a web browser using a computer system. This paper discusses the use of mobile portals as a new form of accessing corporate knowledge through the use of the mobile devices.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122480919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Kirkham, Sandra Winfield, M. Raza, Thorsten Haberecht
{"title":"Business Process Management and the challenge of dynamic services","authors":"T. Kirkham, Sandra Winfield, M. Raza, Thorsten Haberecht","doi":"10.1109/I-SOCIETY18435.2011.5978530","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978530","url":null,"abstract":"Advances in mobile and embedded computing are presenting computing environment that embrace personalisation, mobility and real-time computing. As a result Service Oriented Architectures (SOA) has to adopt new methods of service security, service management and service execution. For the business process these adaptations yield challenges in terms of process modeling, delivery and execution. In order to make Business Process Management (BPM) work in practice in these new environments, what changes are needed in order to support increasingly dynamic and decentralised services in BPM?","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122754268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forensic extraction of user information in continuous block of evidence","authors":"F. Olajide, N. Savage","doi":"10.1109/I-SOCIETY18435.2011.5978501","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978501","url":null,"abstract":"Extraction of user information in the physical memory of Windows application is vital in today's digital investigation. Digital forensic community feels the urge for the development of tools and techniques in volatile memory analysis. However, there have been few investigations into the amount of relevant information that can be recovered from the application memory. In this research, we present the quantitative and qualitative results of experiments carried out on Windows applications. In conducting this research; we have identified the most commonly used applications on Windows systems, designed a methodology to capture data and processed that data. This research report the amount of evidence that was stored over time and recovered in continuous block of evidence in the physical memory.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121079679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web application security: Improving critical web-based applications quality through in-depth security analysis","authors":"Nuno Teodoro, C. Serrão","doi":"10.1109/I-SOCIETY18435.2011.5978496","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978496","url":null,"abstract":"The Internet, and in particular the World Wide Web, have become one of the most common communication mediums in the World. Millions of users connect everyday to different web-based applications to search for information, exchange messages, interact with each other, conduct business, pay taxes, perform financial operations and many more. Some of these critical web-based services are targeted by several malicious users intending to exploit possible weaknesses and vulnerabilities, which could cause not only the disruption of the service, but also compromise the users and organizations information. Most of the times, these malicious users succeed in exploiting different types of vulnerabilities and the consequences can be disastrous. Most of these vulnerabilities are directly related with the web-based applications lack of quality as a result from a poorly implemented software development life cycle (SDLC). This paper will discuss the direct implication of the lack of security and the importance of quality on the SDLC, and the major factors that influence them. On the other hand the authors propose a set of security automated tools and methodologies that can be used throughout the SDLC as a mean to improve critical web-based applications security and quality.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131971272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}