2017 International Conference on Information Society (i-Society)最新文献

筛选
英文 中文
Product innovation with scrum: A longitudinal case study scrum下的产品创新:纵向案例研究
2017 International Conference on Information Society (i-Society) Pub Date : 2017-07-19 DOI: 10.23919/I-SOCIETY.2017.8354664
A. Abdul, J. Bass, H. Ghavimi, P. Adam
{"title":"Product innovation with scrum: A longitudinal case study","authors":"A. Abdul, J. Bass, H. Ghavimi, P. Adam","doi":"10.23919/I-SOCIETY.2017.8354664","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354664","url":null,"abstract":"This paper describes the innovation processes used in a partnership between a company that provides asset integrity and maintenance management consulting services in the energy sector and a university. The challenge faced by the company is to make their in-house expertise more readily available to a worldwide audience. A longitudinal embedded case study has been used to investigate how installable desktop software applications have been redesigned to create a new set of cloud hosted software services. The innovation team adapted an agile scrum process to include exploratory prototyping and manage the geographical distribution of the team members. A minimum viable product was developed that integrated functional elements of previous software tools into an end-to-end data collection, analysis and visualisation product called AimHi which uses a cloud-hosted web services approach. The paper illustrates how the scrum software development method was tailored for a product innovation context. Extended periods of evaluation and reflection (field trials), prototyping and requirement refinement were combined with periods of incremental feature development using sprints. The AimHi product emerged from a technology transfer and innovation project that has successfully reconciled conflicting demands from customers, universities, partner companies and project staff members.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"197 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120983357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Making the move to microservice architecture 转向微服务架构
2017 International Conference on Information Society (i-Society) Pub Date : 2017-07-17 DOI: 10.23919/I-SOCIETY.2017.8354675
Arne Koschel, Irina Astrova, Jeremias Dötterl
{"title":"Making the move to microservice architecture","authors":"Arne Koschel, Irina Astrova, Jeremias Dötterl","doi":"10.23919/I-SOCIETY.2017.8354675","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354675","url":null,"abstract":"Microservice architecture is an architectural style suitable for large software projects. The main goals of microservices are flexible on-demand scalability and short release cycles. Microservice architecture decomposes applications into multiple independent components (called microservices), each running in its own process. This sets microservice applications apart from monoliths, which run in a single process. This paper describes the characteristics of both architectures and explores under which circumstances a shift from a monolith towards the more costly microservice architecture is justified. Furthermore, the paper describes (non-)technical challenges that arise in that shift.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128411459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Numbering plan for M2M and IoT services — A study of United States, Japan, China and Taiwan M2M和IoT业务的编号计划-美国、日本、中国和台湾的研究
2017 International Conference on Information Society (i-Society) Pub Date : 2017-07-17 DOI: 10.23919/I-SOCIETY.2017.8354667
Chih-Nan Hu, Shih-Hsiung Lee, Chu-Sing Yang
{"title":"Numbering plan for M2M and IoT services — A study of United States, Japan, China and Taiwan","authors":"Chih-Nan Hu, Shih-Hsiung Lee, Chu-Sing Yang","doi":"10.23919/I-SOCIETY.2017.8354667","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354667","url":null,"abstract":"Triggered by the explosion of mobile subscriptions and emerging services such as machine-to-machine (M2M) and internet of things (IoT) in the coming 5th generation era, an appropriate numbering plan is an essential element to facilitate access of businesses and citizens to communications services. The field of M2M and IoT communications is rapidly expanding, and this will have impact on national numbering plans because machines need to be uniquely identified and addressed in order to communicate with them. The potential amount of M2M and IoT devices could be large. A mobile access E.164 numbering resource is the most viable solution for addressing M2M and IoT applications at least in the short and medium run. This paper examines and analyzes strategies for national numbering plans for M2M and IoT services.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114300303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The feasibility of managing electronic Patient Health Records (ePHRs): The case of public clinics in Potchefstroom, South Africa 管理电子病人健康记录的可行性:以南非Potchefstroom的公共诊所为例
2017 International Conference on Information Society (i-Society) Pub Date : 2017-07-17 DOI: 10.23919/I-SOCIETY.2017.8354687
Motlhabane Jacobus Maboe, O. Abatan
{"title":"The feasibility of managing electronic Patient Health Records (ePHRs): The case of public clinics in Potchefstroom, South Africa","authors":"Motlhabane Jacobus Maboe, O. Abatan","doi":"10.23919/I-SOCIETY.2017.8354687","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354687","url":null,"abstract":"Due to the presence of Information and Communication Technologies (ICT), there is a need for patients in public clinics in Potchefstroom, South Africa to move from paper-based patient records towards electronic Patient Health Records (ePHRs). This paper, based on qualitative research, investigates the perceptions of nurses on the feasibility of managing ePHRs at public clinics in Potchefstroom. The study identifies factors that will influence the use of ePHRs at these clinics. The findings of the study indicate that patients who visit clinics in Potchefstroom will each have an individual ePHR which will allow their specific data to be securely stored. The integration of ePHRs will ensure that one patient will have one health record across these clinics in Potchefstroom, which will further provide efficiency in record-keeping and shorter consultations at clinics.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127280707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image-based memes as sentiment predictors 基于图像的模因作为情绪预测因子
2017 International Conference on Information Society (i-Society) Pub Date : 2017-07-17 DOI: 10.23919/I-SOCIETY.2017.8354676
J. French
{"title":"Image-based memes as sentiment predictors","authors":"J. French","doi":"10.23919/I-SOCIETY.2017.8354676","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354676","url":null,"abstract":"This paper explores the correlation between the implied semantic meaning of image-based memes and the textual content of discussions in social media. The behavior of a meme is also distinctive as memes replicate and mutate, similar to genes in human evolution, during propagation in social media networks. This research focuses on the use of sentiment analysis to discover affective meanings of textual comments in social media that are emphasized by the use of memes. Social media provides an interesting challenge in the field of semantic textual analysis due to the prevalence of slang within casual communications. The research supports that the affective nature of a topic in social media can be emphasized by the type of meme applied to the communication. It is the relationship between the unusual multimedia element — the meme — and social media textual communications at motivate the research. In addition to identifying correlations between text and memes, trends in the use of popular memes are also identified. This research successfully demonstrated that memes are used to emphasize the semantic content in social media communications and that the meanings of memes correlate to the topics of the discussion threads.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124337666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
DBaaS comparison: Amazon vs. Microsoft DBaaS比较:亚马逊与微软
2017 International Conference on Information Society (i-Society) Pub Date : 2017-07-17 DOI: 10.23919/I-SOCIETY.2017.8354663
Irina Astrava, Arne Koschel, Chris Eickemeyer, Jan Kersten, Norman Offel
{"title":"DBaaS comparison: Amazon vs. Microsoft","authors":"Irina Astrava, Arne Koschel, Chris Eickemeyer, Jan Kersten, Norman Offel","doi":"10.23919/I-SOCIETY.2017.8354663","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354663","url":null,"abstract":"Cloud-based computing holds promise for businesses that no longer need to own and maintain costly fixed-hardware assets. Seeing the benefits of lower costs and scale-as-needed capability, businesses are pursuing the cloud in ever increasing numbers. Database-as-a-Service (DBaaS) offerings are increasingly attractive to IT professionals. Many DBaaS offerings are relational database management systems requiring the use of SQL, but some are based on alternative technologies like NoSQL databases. In this paper, we look at both. In particular, we select DBaaS offerings from Amazon and Microsoft (viz., Amazon RDS, Amazon DynamoDB, Azure SQL Database and Azure DocumentDB) and parse out similarities and differences in their features.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124024787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards a cloud intrusion detection and prevention system for M-voting in South Africa 南非移动投票的云入侵检测和防御系统
2017 International Conference on Information Society (i-Society) Pub Date : 2017-07-17 DOI: 10.23919/I-SOCIETY.2017.8354666
Dina Moloja, Noluntu Mpekoa
{"title":"Towards a cloud intrusion detection and prevention system for M-voting in South Africa","authors":"Dina Moloja, Noluntu Mpekoa","doi":"10.23919/I-SOCIETY.2017.8354666","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354666","url":null,"abstract":"Information and Communication Technology has given rise to new technologies and solutions that were not possible few years ago. One of these technologies is mobile voting, which is the use of any mobile devices to cast a vote. Due to the fact that mobile phones are universal; they provide flexibility and convenience to its users, M-voting has been attracting a lot of attention for the past few years all over the world. M-voting offers remarkable advantages over traditional paper-based voting. However, utilizing a fast growing device such as mobile phone to cast a vote poses various new security threats and challenges. This paper designed and developed a security solution termed a cloud intrusion detection and prevention system to enhance the security of mobile phone while casting a vote. Simulations were used to evaluate the system and results indicated that the security system is efficient, reliable and secure. This paper complements a significant contribution to the body of knowledge because no research has been conducted that combines Intrusion detection and prevention system, cloud computing and M-voting in one system.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121893544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards a motivational based model for effective use of human resource information system in South African Universities 在南非大学建立有效利用人力资源信息系统的激励模式
2017 International Conference on Information Society (i-Society) Pub Date : 2017-07-17 DOI: 10.23919/I-SOCIETY.2017.8354672
O. Randle, Alfred Coleman, Ray Kekwaletswe
{"title":"Towards a motivational based model for effective use of human resource information system in South African Universities","authors":"O. Randle, Alfred Coleman, Ray Kekwaletswe","doi":"10.23919/I-SOCIETY.2017.8354672","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354672","url":null,"abstract":". Human Resource Information System (HRIS) is a good example of an information system being used in organizations for leveraging and enabling HR practices. The current problem is that South African Universities are investing heavily in HRIS but the system is highly underutilized. Our objective in this study focuses on the factors that influence the underutilization of Human Resource Information System (HRIS) within the South African University environment. Our solution is to investigate through the lens of the Self-deterministic theory of work motivation and see the role of intrinsic and extrinsic factors within the university environment. The significant contribution was the provision of a theoretical model that has the possibility of promoting effective use of HRIS within the South African University Context. Further investigation will focus on the validation of the model through a quantitative research approach.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117080979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure autonomous process communication 安全的自主过程通信
2017 International Conference on Information Society (i-Society) Pub Date : 2017-07-17 DOI: 10.23919/I-SOCIETY.2017.8354680
Aspen Olmsted
{"title":"Secure autonomous process communication","authors":"Aspen Olmsted","doi":"10.23919/I-SOCIETY.2017.8354680","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354680","url":null,"abstract":"Communications is one of the major domains of cyber security. Private Key Infrastructure (PKI) has become the defacto standard for encrypting messages between two processes. Using PKI, an autonomous process can use the private key stored on the local machine to encrypt a message and send it to a remote machine. The remote machine can use the public key from the certificate to decrypt the message. A trusted third party Certificate Authority (CA) previously signed a certificate to allow the receiving party to trust that the sender is who they say they are. The same certificate can be used to sign the message to allow the recipient to trust that the message has not been altered. Unfortunately, certificates are issued to machine names, not process identifiers. In this paper, we utilize a secure data store that can validate who a process is to ensure that the certificate is coming from a trusted process.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132099029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting Twitter for next-place prediction 利用Twitter预测下一个位置
2017 International Conference on Information Society (i-Society) Pub Date : 2017-07-01 DOI: 10.23919/I-SOCIETY.2017.8354690
C. Comito
{"title":"Exploiting Twitter for next-place prediction","authors":"C. Comito","doi":"10.23919/I-SOCIETY.2017.8354690","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354690","url":null,"abstract":"The time- and geo-coordinates associated with a sequence of tweets manifest the spatial-temporal movements of people in real life. This paper aims to analyze such movements to predict the next location of an individual based on the observations of his mobility behavior over some period of time and the recent locations that he has visited. To this end, we defined a prediction methodology based on a set of spatio-temporal features characterizing locations and movements among them. We then combined the features in a supervised learning approach based on M5 model trees. The experimental results obtained by using a real-world dataset show that the supervised method is effective in predicting the users next places achieving a remarkable accuracy.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132520708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信