2017 International Conference on Information Society (i-Society)最新文献

筛选
英文 中文
An implementation framework of business intelligence in e-government systems for developing countries: Case study: Morocco e-government system 商业智能在发展中国家电子政务系统中的实施框架:案例研究:摩洛哥电子政务系统
2017 International Conference on Information Society (i-Society) Pub Date : 2017-07-01 DOI: 10.23919/I-SOCIETY.2017.8354689
Yassine Jadi, Lin Jie
{"title":"An implementation framework of business intelligence in e-government systems for developing countries: Case study: Morocco e-government system","authors":"Yassine Jadi, Lin Jie","doi":"10.23919/I-SOCIETY.2017.8354689","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354689","url":null,"abstract":"He increase of information societies in developing countries makes governing process a great challenge, and governments who want to step up to the technological plate and deliver services to their citizen in an electronic manner, need to keep track of an immense amount of data collected each day for making “just-in time” decision or forecasting for the long term management. In spite of taking lots of initiative for computerization, launching, and implementing e-government system, the government decision makers are currently having difficulty in obtaining meaningful information in a timely manner. Therefore the accompanying business intelligence functions to create highly efficient, productive environments in which transactional and analytical functions operate cooperatively and efficiently should be applied in a parallel manner with data collecting process. In our paper, we analyze and suggest an implementation framework of Business intelligence in Morocco e-government system.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116041213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection of JPEG compression on bitmap image based on phase spectrum statistical features 基于相位谱统计特征的位图图像JPEG压缩检测
2017 International Conference on Information Society (i-Society) Pub Date : 2017-07-01 DOI: 10.23919/I-SOCIETY.2017.8354683
Edi Morales-Cruz, José Juan García-Hernández
{"title":"Detection of JPEG compression on bitmap image based on phase spectrum statistical features","authors":"Edi Morales-Cruz, José Juan García-Hernández","doi":"10.23919/I-SOCIETY.2017.8354683","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354683","url":null,"abstract":"In image forensics, JPEG compression history estimation problem consists of three stages: JPEG compression detection, color model identification and subsampling, and estimation of quantization steps. Although, it is well known the importance of the phase spectrum information of digital signals and its application in image processing, the phase spectrum has been poorly explored for image forensics. In this paper, a novel method for detecting JPEG compression using statistical moments of the phase spectrum is presented. The experimentation results show that the detection rates achieved by the proposed strategy are competitive with other methods reported in the state-of-the-art.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127470080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A performance evaluation of multi-tenant data tier design patterns in a containerized environment 在容器化环境中对多租户数据层设计模式进行性能评估
2017 International Conference on Information Society (i-Society) Pub Date : 2017-07-01 DOI: 10.23919/I-SOCIETY.2017.8354684
A. Abdul, J. Bass, H. Ghavimi, P. Adam
{"title":"A performance evaluation of multi-tenant data tier design patterns in a containerized environment","authors":"A. Abdul, J. Bass, H. Ghavimi, P. Adam","doi":"10.23919/I-SOCIETY.2017.8354684","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354684","url":null,"abstract":"Software as a Service (SaaS) has become one of de facto approach for deploying cloud base services or applications for many businesses. At the core of SaaS is Multi-tenancy; multi-tenancy gives customers (i.e. tenants) and software provider vast opportunities to leverage the power of cloud infrastructure by consolidating operational entities. The drive toward multi-tenancy in SaaS application is a result of the economical benefit derived by shared development and maintenance cost. This paper empirically evaluates the performance of multi-tenancy models in a containerized environment. Our results show that in a containerized environment, dedicated and isolated schema performed reasonably well in terms of latency compared to shared schema model. Although the shared schema model proved to more resource efficient, it performance is greatly affected by finite resources shared by many concurrent tenants.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115195522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cache correctness 缓存的正确性
2017 International Conference on Information Society (i-Society) Pub Date : 2017-07-01 DOI: 10.23919/i-society.2017.8354686
Aspen Olmsted
{"title":"Cache correctness","authors":"Aspen Olmsted","doi":"10.23919/i-society.2017.8354686","DOIUrl":"https://doi.org/10.23919/i-society.2017.8354686","url":null,"abstract":"In this paper, we investigate the problem of providing application scalability through the caching of data persisted in a database system. We develop algorithms for ensuring the cache remains semantically fresh while providing high availability. We utilize memory tables and hashmap indexes on the server to decrease access time to the data in the server.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132718489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-marketing system for a restaurant to enhance customer action 自助营销系统为餐厅提升顾客行动
2017 International Conference on Information Society (i-Society) Pub Date : 2017-07-01 DOI: 10.23919/I-SOCIETY.2017.8354671
Noriko Yokoyama, S. Hashimoto
{"title":"Self-marketing system for a restaurant to enhance customer action","authors":"Noriko Yokoyama, S. Hashimoto","doi":"10.23919/I-SOCIETY.2017.8354671","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354671","url":null,"abstract":"Co-creation is a new marketing strategy currently gaining attention. We focus on self-marketing services as a form of co-creation because especially at restaurants, popular forms of co-creation, such as self-production and self-service, do not match a restaurant's atmosphere in some cases. Traditional services, such as a restaurant's page on a social network service and paper-based questionnaires at restaurants are some examples of self-marketing services; however, a limited number of people use these services. Our goal is to identify a more comprehensive self-marketing approach by not only considering the disadvantages of traditional self-marketing services, but also creating a new self-marketing system that motivates customer actions, such as the use of this system and return visits. We conduct a user experiment, the results of which confirm that our self-marketing system yields effective motivation compared to traditional services.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126051009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Critical factors influencing employees compliance with information security policies of an organization: Systematic review and Meta-analysis 影响员工遵守组织信息安全政策的关键因素:系统回顾和元分析
2017 International Conference on Information Society (i-Society) Pub Date : 2017-07-01 DOI: 10.23919/I-SOCIETY.2017.8354665
O. Randle, Melo Yolanda Solange
{"title":"Critical factors influencing employees compliance with information security policies of an organization: Systematic review and Meta-analysis","authors":"O. Randle, Melo Yolanda Solange","doi":"10.23919/I-SOCIETY.2017.8354665","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354665","url":null,"abstract":"Information security policies are rules and regulations that assist employees to handle information confidentially, sensitively and privately but understanding the factors which influence employees to comply with this policies are crucial. This study uses a systematic literature review and meta-analysis to identify the key factors and sub factors that influence employee decision to comply with information security policies. Our research approach investigated 508 articles which focused on information security policies and influences on employees, after elimination duplicates and research with no empirical results we identified 22 unique articles. Three major dependent factors or variables were identified from the 22 unique studies investigated, these dependent variables were (1) employees' actual compliance, (2) employees' attitude towards compliance and (3) employees intention to comply. The significant contribution of this meta-analysis was the revelation that actual compliance was strongly influenced by intention to comply, perceived legitimacy and self-efficacy.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115492499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mobile natural language database interface for accessing relational data 用于访问关系数据的移动自然语言数据库接口
2017 International Conference on Information Society (i-Society) Pub Date : 2017-07-01 DOI: 10.23919/I-SOCIETY.2017.8354677
Kaitlyn Fulford, Aspen Olmsted
{"title":"Mobile natural language database interface for accessing relational data","authors":"Kaitlyn Fulford, Aspen Olmsted","doi":"10.23919/I-SOCIETY.2017.8354677","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354677","url":null,"abstract":"Information is constantly being stored and retrieved, from searching through and narrowing down millions of items on Amazon to uploading posts on Facebook. Without databases, information could not be as easily shared and found. Most users are only able to search keywords to find information in a database or are not given many options to find the information they need. In order to directly access and manage a database, SQL, Structured Query Language, is needed. Of course, most users are not technically savvy and are not familiar with the syntax of SQL. The best way seems to be if users were able to ask a question naturally in their own native language and have SQL statements, CRUD operations, like insert, update, etc. generated from that initial question or statement. Therefore, using natural language instead of SQL, a non-technical user could easily manipulate a database, or a certain view of a database, while not being time-consuming. The contribution of this work is to take the idea of Natural Language, apply it to databases, and examine the advantages and disadvantages of creating a new, lightweight, Natural Language Database Interface.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129098884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Human resources in computer sciences in Costa Rica: The elusive gap between supply and demand 哥斯达黎加计算机科学的人力资源:供需之间难以捉摸的差距
2017 International Conference on Information Society (i-Society) Pub Date : 2017-07-01 DOI: 10.23919/I-SOCIETY.2017.8354674
F. Mata, A. Quesada
{"title":"Human resources in computer sciences in Costa Rica: The elusive gap between supply and demand","authors":"F. Mata, A. Quesada","doi":"10.23919/I-SOCIETY.2017.8354674","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354674","url":null,"abstract":"We analyze in this paper the supply and demand of human resources in computer sciences in Costa Rica. This is done with the aim of validating claims made by the local media about a large deficit of professionals for ICT occupations in this country. On the supply side, we find an increase in the number of university graduates in computer sciences, which is greater than the increase in the total number of academic degrees granted. On the demand side, we find that the expected demand-using the available data-does not seem to largely exceed the supply, apparently contradicting the existence of a large deficit. However, limitations in the data obtained, as well as methodological problems for measuring the gap between supply and demand, might be affecting these results. These limitations are discussed and solutions to overcome them are presented.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128117503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gamifying STEM education STEM教育游戏化
2017 International Conference on Information Society (i-Society) Pub Date : 2017-07-01 DOI: 10.23919/I-SOCIETY.2017.8354688
A. Hol
{"title":"Gamifying STEM education","authors":"A. Hol","doi":"10.23919/I-SOCIETY.2017.8354688","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354688","url":null,"abstract":"This research in progres demonstrates how Lego Robots could be used to teach Science Technology, Engineering and Mathematics (STEM) by applying the Gamification principles and simulating real life business environments.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127259093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A taxonomy of distributed denial of service attacks 分布式拒绝服务攻击的分类
2017 International Conference on Information Society (i-Society) Pub Date : 2017-07-01 DOI: 10.23919/I-SOCIETY.2017.8354681
Michele De Donno, A. Giaretta, N. Dragoni, A. Spognardi
{"title":"A taxonomy of distributed denial of service attacks","authors":"Michele De Donno, A. Giaretta, N. Dragoni, A. Spognardi","doi":"10.23919/I-SOCIETY.2017.8354681","DOIUrl":"https://doi.org/10.23919/I-SOCIETY.2017.8354681","url":null,"abstract":"The Internet of Things revolution promises to make our lives much easier by providing us cheap and convenient smart devices, but all that glitters is not gold. This plethora of devices that flooded the market, generally poorly designed with respect to security aspects, brought back to the top Distributed Denial of Service (DDoS) attacks which are now even more powerful and easier to achieve than the past. Understanding how these attacks work, in all their different forms, represents a first crucial step to tackle this urgent issue. To this end, in this paper we propose a new up-to-date taxonomy and a comprehensive classification of current DDoS attacks.","PeriodicalId":285075,"journal":{"name":"2017 International Conference on Information Society (i-Society)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126204825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信