2016 International Conference on Information Society (i-Society)最新文献

筛选
英文 中文
Online marketing — The case of Macedonia 网络营销——马其顿的案例
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854173
Jasminka Varnalieva, Smilka Janeska Sarkanjac
{"title":"Online marketing — The case of Macedonia","authors":"Jasminka Varnalieva, Smilka Janeska Sarkanjac","doi":"10.1109/I-SOCIETY.2016.7854173","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854173","url":null,"abstract":"Online marketing is identified as one of the key drivers of European digital economy. Recent studies have shown that advertising is not adding direct value for the advertisers only, but it creates significant additional indirect value and jobs while boosting innovation and creativity. In Europe online advertising has grown dramatically. It is expected that online advertising revenues will surpass television advertising in 2016. Online marketing in Macedonia is still in its nascent stage. It significantly lags behind countries in the region and far behind the developed countries in the European Union at all possible parameters. Online marketing ad spend in Macedonia is still very low. It is estimated to be 3% to 4% of total ad spending. The reasons why Macedonia's online marketing use is still very low, in spite of the relatively high level of Internet penetration and solid infrastructure, are numerous and multifaceted: distorted market forces, lack of official independent company that measures internet traffic, lack of knowledge on online marketing of Macedonian companies, legal framework etc. Policy makers in Macedonia could address the most important obstacles to increased use of online marketing by designing and implementing specific policy instruments and carrying out existing strategies in this area.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129756779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of things technologies in manufacturing: Application areas, challenges and outlook 制造业物联网技术:应用领域、挑战与展望
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854194
N. Papakostas, J. O'Connor, G. Byrne
{"title":"Internet of things technologies in manufacturing: Application areas, challenges and outlook","authors":"N. Papakostas, J. O'Connor, G. Byrne","doi":"10.1109/I-SOCIETY.2016.7854194","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854194","url":null,"abstract":"This paper discusses the latest developments in the area of Internet of Things (IoT) technologies with regard to their potential application in the manufacturing sector and logistics. A series of enabling technologies are identified and described in relation to how they may foster the further development and wider adoption of IoT technologies. A number of potential application areas together with some early prototype IoT-based developments are reviewed and the major challenges to be addressed in the near future are listed. IoT technologies may play a very important role towards improving the performance and flexibility of manufacturing operations and logistics processes and may also enable the more efficient design and lifecycle management of products.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126255361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Management and evaluation of tasks using an online system 使用在线系统管理和评估任务
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854168
Rami Rashkovits, I. Lavy
{"title":"Management and evaluation of tasks using an online system","authors":"Rami Rashkovits, I. Lavy","doi":"10.1109/I-SOCIETY.2016.7854168","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854168","url":null,"abstract":"In this study, we present an online tool for course task management. It serves both educators and students. While educators use it to upload online class tasks, define criteria and weights for assessment, and assess the submitted assignment online, students use it to receive the assignment, upload the answers, and observe the assessment. The uniqueness of this tool lies in the visual reports generated for both students and educators, and the ability to easily track students and class achievements.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121700721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Password reinforcement leveraging social media 利用社交媒体强化密码
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854197
Callum Brill, Aspen Olmsted
{"title":"Password reinforcement leveraging social media","authors":"Callum Brill, Aspen Olmsted","doi":"10.1109/I-SOCIETY.2016.7854197","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854197","url":null,"abstract":"With an increasing population, social media is a trendy form of sharing information, which can be a massive pitfall for unwary users. With a number of users that are largely untrained in proper password creation methodologies, this influx of information can be damaging. This paper aims to describe current measures of password strength, the current user mindset of password generation and how social media could be used to generate stronger passwords and prevent users from selecting weaker passwords. This paper puts forth an algorithm to aid in the password creation process.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132787550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Decentralised, dynamic network path selection in high performance computing 高性能计算中的分散、动态网络路径选择
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854183
John Anderson, M. Piazza, Aspen Olmsted
{"title":"Decentralised, dynamic network path selection in high performance computing","authors":"John Anderson, M. Piazza, Aspen Olmsted","doi":"10.1109/I-SOCIETY.2016.7854183","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854183","url":null,"abstract":"In this paper, we investigate the problem of providing highly available, decentralized, dynamic path selection in high performance computing networking. We look at a use case for dynamic path selection that better utilizes bandwidth available in the network. The network architecture we propose is a partial mesh grid whereby each host is directly connected to four forwarding devices. We propose an approach that decouples artificial network information and state from the devices making forwarding decisions. This method constructs a path one hop at a time while at each hop, selecting the next link based on the status of the link. The goal of this approach is to create a network topology in which new transmissions are routed around congestion. It also allows us to build a network with low-cost, lower bandwidth links instead of a few high cost, high bandwidth links. The goal of this work is to take the ideas of a controller based SDN solution and examine the merits of distributing that functionary to the actual nodes in the network.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114654906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Examining international information conflict: Estonian and Georgian case study 审视国际信息冲突:爱沙尼亚和格鲁吉亚的案例研究
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854207
Callum Brill, Aspen Olmsted
{"title":"Examining international information conflict: Estonian and Georgian case study","authors":"Callum Brill, Aspen Olmsted","doi":"10.1109/I-SOCIETY.2016.7854207","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854207","url":null,"abstract":"This paper will examine two cases of Information Conflicts in post-Soviet Eastern Europe, Estonia in 2007 and Georgia in 2008, both existing in the shadow of Russian influence. This paper will be a case study of the historical and political differences between the countries, the differences between the two conflicts and the differences in how both countries have since reacted to the conflicts. Prior work in the subject analyzes each incident as more-or-less isolated events, whereas this paper aims to focus, in part, on the intertwined history the two nations share, and on their present conditions.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"318 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116436834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Factors affecting successful implementation of m-voting in South Africa 影响南非移动投票成功实施的因素
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854174
Noluntu Mpekoa, Darelle van Greunen
{"title":"Factors affecting successful implementation of m-voting in South Africa","authors":"Noluntu Mpekoa, Darelle van Greunen","doi":"10.1109/I-SOCIETY.2016.7854174","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854174","url":null,"abstract":"The phenomenon of the use of Information Technology in the election process is rapidly gaining momentum. This advancement referred to as e-voting offers advantages than the paper-based voting system. The field of e-voting and especially m-voting is mostly an undiscovered sphere and its true extensity is still mostly uncharted. Very few countries have successfully implemented m-voting and diminutive research has been conducted to investigate the factors and components that influence the successful implementation of m-voting in the African context. Successful m-voting implementation depends on a collection of factors, which may be unique given the local context where it is implemented. This study found it vital to interrogate the literature to investigate common factors that may influence the successful implementation of m-voting. This paper documents a systematic review of various research studies seeking to find factors for m-voting implementation and collates results from 11 studies, where 14 common factors were found. The factors discovered for m-voting implementation include: ICT infrastructure, legal and institutional factors, security and trust, acceptance and adoption of ICT, political factors, voter education, finances and many other factors. This study contributes to the body of knowledge by identifying key factors that affect the successful implementation of m-voting.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128336791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Selfie phenomenon in the visual content of social media 社交媒体视觉内容中的自拍现象
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854191
E. Orekh, O. Sergeyeva, E. Bogomiagkova
{"title":"Selfie phenomenon in the visual content of social media","authors":"E. Orekh, O. Sergeyeva, E. Bogomiagkova","doi":"10.1109/I-SOCIETY.2016.7854191","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854191","url":null,"abstract":"This paper analyzes popular visual practices of the self-presentation in the visual content of social media in nowadays Russia. Our key question was to understand wide spreading and specificity of social practice of selfie. Using the iconographic method (E. Panofsky), we study visual content of selfie aiming to reveal the hidden rules of their reproduction. The results of an empirical study of random sample of 200 pictures are the following. First of all, selfie and similar visual practices are a means of gaining social approval and support. In order to provide the scientific view on the fascination with such practices the ways of information spreading as well as obtaining social support and approval must be taken into consideration. Secondly, in making selfie, the traditional function of photos such as preservation of memories of oneself at certain moment or memories of social circles together with situations is no longer important. Moreover, identification function of a picture is of fundamental importance, namely, obtaining social approval for the external qualities, imagination, compliance with standards of living, which are considered to be valuable and correct (for instance, geographic mobility, availability of exclusive places and things, originality).","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128024695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Learning through ill-structured problems: A technology-enabled co-creation approach 从结构不良的问题中学习:一种技术支持的共同创造方法
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854210
L. G. Pee
{"title":"Learning through ill-structured problems: A technology-enabled co-creation approach","authors":"L. G. Pee","doi":"10.1109/I-SOCIETY.2016.7854210","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854210","url":null,"abstract":"A co-creation approach to tackling ill-structured problems (ISPs) for tertiary students is proposed. Key findings of a preliminary study assessing the approach's learning effectiveness are discussed. The new approach is more in line with problem solving in the real world and improves cognitive, meta-cognitive, and epistemic cognitive learning.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129229261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing the deployment of cloud-hosted application components for guaranteeing multitenancy isolation 优化云托管应用程序组件的部署,以保证多租户隔离
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854180
L. Ochei, Andrei V. Petrovski, J. Bass
{"title":"Optimizing the deployment of cloud-hosted application components for guaranteeing multitenancy isolation","authors":"L. Ochei, Andrei V. Petrovski, J. Bass","doi":"10.1109/I-SOCIETY.2016.7854180","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854180","url":null,"abstract":"The sharing of components of a cloud-hosted application and the underlying cloud resources between tenants have the potential to reduce resource consumption and running cost per tenant. However, this sharing may allow the behaviour of one component to affect the performance, resource consumption and access privileges of other components, for example, if the application fails to scale-up when the workload of one of the component increases suddenly. This problem becomes even more acute when components are associated with different or higher degrees of isolation among them. This paper presents a mathematical optimization model and a metaheuristic (based on simulated annealing) solution for providing near-optimal solutions for deploying components of a cloud-hosted application in a way that guarantees the required degree of isolation between the components. Our experiments showed that the near-optimal solutions obtained from our model had low variability and percent deviation, when compared with the optimal solution. We also provide some recommendations in deploying components associated with varying degrees of isolation.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121244525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信