{"title":"Product innovation with scrum: A longitudinal case study","authors":"A. Abdul, J. Bass, H. Ghavimi, P. Adam","doi":"10.23919/I-SOCIETY.2017.8354664","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354664","url":null,"abstract":"This paper describes the innovation processes used in a partnership between a company that provides asset integrity and maintenance management consulting services in the energy sector and a university. The challenge faced by the company is to make their in-house expertise more readily available to a worldwide audience. A longitudinal embedded case study has been used to investigate how installable desktop software applications have been redesigned to create a new set of cloud hosted software services. The innovation team adapted an agile scrum process to include exploratory prototyping and manage the geographical distribution of the team members. A minimum viable product was developed that integrated functional elements of previous software tools into an end-to-end data collection, analysis and visualisation product called AimHi which uses a cloud-hosted web services approach. The paper illustrates how the scrum software development method was tailored for a product innovation context. Extended periods of evaluation and reflection (field trials), prototyping and requirement refinement were combined with periods of incremental feature development using sprints. The AimHi product emerged from a technology transfer and innovation project that has successfully reconciled conflicting demands from customers, universities, partner companies and project staff members.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"197 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120983357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Making the move to microservice architecture","authors":"Arne Koschel, Irina Astrova, Jeremias Dötterl","doi":"10.23919/I-SOCIETY.2017.8354675","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354675","url":null,"abstract":"Microservice architecture is an architectural style suitable for large software projects. The main goals of microservices are flexible on-demand scalability and short release cycles. Microservice architecture decomposes applications into multiple independent components (called microservices), each running in its own process. This sets microservice applications apart from monoliths, which run in a single process. This paper describes the characteristics of both architectures and explores under which circumstances a shift from a monolith towards the more costly microservice architecture is justified. Furthermore, the paper describes (non-)technical challenges that arise in that shift.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128411459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Numbering plan for M2M and IoT services — A study of United States, Japan, China and Taiwan","authors":"Chih-Nan Hu, Shih-Hsiung Lee, Chu-Sing Yang","doi":"10.23919/I-SOCIETY.2017.8354667","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354667","url":null,"abstract":"Triggered by the explosion of mobile subscriptions and emerging services such as machine-to-machine (M2M) and internet of things (IoT) in the coming 5th generation era, an appropriate numbering plan is an essential element to facilitate access of businesses and citizens to communications services. The field of M2M and IoT communications is rapidly expanding, and this will have impact on national numbering plans because machines need to be uniquely identified and addressed in order to communicate with them. The potential amount of M2M and IoT devices could be large. A mobile access E.164 numbering resource is the most viable solution for addressing M2M and IoT applications at least in the short and medium run. This paper examines and analyzes strategies for national numbering plans for M2M and IoT services.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114300303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The feasibility of managing electronic Patient Health Records (ePHRs): The case of public clinics in Potchefstroom, South Africa","authors":"Motlhabane Jacobus Maboe, O. Abatan","doi":"10.23919/I-SOCIETY.2017.8354687","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354687","url":null,"abstract":"Due to the presence of Information and Communication Technologies (ICT), there is a need for patients in public clinics in Potchefstroom, South Africa to move from paper-based patient records towards electronic Patient Health Records (ePHRs). This paper, based on qualitative research, investigates the perceptions of nurses on the feasibility of managing ePHRs at public clinics in Potchefstroom. The study identifies factors that will influence the use of ePHRs at these clinics. The findings of the study indicate that patients who visit clinics in Potchefstroom will each have an individual ePHR which will allow their specific data to be securely stored. The integration of ePHRs will ensure that one patient will have one health record across these clinics in Potchefstroom, which will further provide efficiency in record-keeping and shorter consultations at clinics.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127280707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image-based memes as sentiment predictors","authors":"J. French","doi":"10.23919/I-SOCIETY.2017.8354676","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354676","url":null,"abstract":"This paper explores the correlation between the implied semantic meaning of image-based memes and the textual content of discussions in social media. The behavior of a meme is also distinctive as memes replicate and mutate, similar to genes in human evolution, during propagation in social media networks. This research focuses on the use of sentiment analysis to discover affective meanings of textual comments in social media that are emphasized by the use of memes. Social media provides an interesting challenge in the field of semantic textual analysis due to the prevalence of slang within casual communications. The research supports that the affective nature of a topic in social media can be emphasized by the type of meme applied to the communication. It is the relationship between the unusual multimedia element — the meme — and social media textual communications at motivate the research. In addition to identifying correlations between text and memes, trends in the use of popular memes are also identified. This research successfully demonstrated that memes are used to emphasize the semantic content in social media communications and that the meanings of memes correlate to the topics of the discussion threads.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124337666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Irina Astrava, Arne Koschel, Chris Eickemeyer, Jan Kersten, Norman Offel
{"title":"DBaaS comparison: Amazon vs. Microsoft","authors":"Irina Astrava, Arne Koschel, Chris Eickemeyer, Jan Kersten, Norman Offel","doi":"10.23919/I-SOCIETY.2017.8354663","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354663","url":null,"abstract":"Cloud-based computing holds promise for businesses that no longer need to own and maintain costly fixed-hardware assets. Seeing the benefits of lower costs and scale-as-needed capability, businesses are pursuing the cloud in ever increasing numbers. Database-as-a-Service (DBaaS) offerings are increasingly attractive to IT professionals. Many DBaaS offerings are relational database management systems requiring the use of SQL, but some are based on alternative technologies like NoSQL databases. In this paper, we look at both. In particular, we select DBaaS offerings from Amazon and Microsoft (viz., Amazon RDS, Amazon DynamoDB, Azure SQL Database and Azure DocumentDB) and parse out similarities and differences in their features.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124024787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a cloud intrusion detection and prevention system for M-voting in South Africa","authors":"Dina Moloja, Noluntu Mpekoa","doi":"10.23919/I-SOCIETY.2017.8354666","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354666","url":null,"abstract":"Information and Communication Technology has given rise to new technologies and solutions that were not possible few years ago. One of these technologies is mobile voting, which is the use of any mobile devices to cast a vote. Due to the fact that mobile phones are universal; they provide flexibility and convenience to its users, M-voting has been attracting a lot of attention for the past few years all over the world. M-voting offers remarkable advantages over traditional paper-based voting. However, utilizing a fast growing device such as mobile phone to cast a vote poses various new security threats and challenges. This paper designed and developed a security solution termed a cloud intrusion detection and prevention system to enhance the security of mobile phone while casting a vote. Simulations were used to evaluate the system and results indicated that the security system is efficient, reliable and secure. This paper complements a significant contribution to the body of knowledge because no research has been conducted that combines Intrusion detection and prevention system, cloud computing and M-voting in one system.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121893544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a motivational based model for effective use of human resource information system in South African Universities","authors":"O. Randle, Alfred Coleman, Ray Kekwaletswe","doi":"10.23919/I-SOCIETY.2017.8354672","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354672","url":null,"abstract":". Human Resource Information System (HRIS) is a good example of an information system being used in organizations for leveraging and enabling HR practices. The current problem is that South African Universities are investing heavily in HRIS but the system is highly underutilized. Our objective in this study focuses on the factors that influence the underutilization of Human Resource Information System (HRIS) within the South African University environment. Our solution is to investigate through the lens of the Self-deterministic theory of work motivation and see the role of intrinsic and extrinsic factors within the university environment. The significant contribution was the provision of a theoretical model that has the possibility of promoting effective use of HRIS within the South African University Context. Further investigation will focus on the validation of the model through a quantitative research approach.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117080979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure autonomous process communication","authors":"Aspen Olmsted","doi":"10.23919/I-SOCIETY.2017.8354680","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354680","url":null,"abstract":"Communications is one of the major domains of cyber security. Private Key Infrastructure (PKI) has become the defacto standard for encrypting messages between two processes. Using PKI, an autonomous process can use the private key stored on the local machine to encrypt a message and send it to a remote machine. The remote machine can use the public key from the certificate to decrypt the message. A trusted third party Certificate Authority (CA) previously signed a certificate to allow the receiving party to trust that the sender is who they say they are. The same certificate can be used to sign the message to allow the recipient to trust that the message has not been altered. Unfortunately, certificates are issued to machine names, not process identifiers. In this paper, we utilize a secure data store that can validate who a process is to ensure that the certificate is coming from a trusted process.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132099029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploiting Twitter for next-place prediction","authors":"C. Comito","doi":"10.23919/I-SOCIETY.2017.8354690","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354690","url":null,"abstract":"The time- and geo-coordinates associated with a sequence of tweets manifest the spatial-temporal movements of people in real life. This paper aims to analyze such movements to predict the next location of an individual based on the observations of his mobility behavior over some period of time and the recent locations that he has visited. To this end, we defined a prediction methodology based on a set of spatio-temporal features characterizing locations and movements among them. We then combined the features in a supervised learning approach based on M5 model trees. The experimental results obtained by using a real-world dataset show that the supervised method is effective in predicting the users next places achieving a remarkable accuracy.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132520708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}