2016 International Conference on Information Society (i-Society)最新文献

筛选
英文 中文
Overview of factors that influence the adoption of mobile telephony by students in higher education institutions 影响高等教育机构学生采用移动电话的因素概述
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854169
O. Abatan, Nurudeen Ajayi
{"title":"Overview of factors that influence the adoption of mobile telephony by students in higher education institutions","authors":"O. Abatan, Nurudeen Ajayi","doi":"10.1109/I-SOCIETY.2016.7854169","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854169","url":null,"abstract":"Universal telecommunications growth is largely attributed to rapid technological innovation and progressively more liberal policy environments. In the past decade, many developing countries have implemented technical and legislative reforms that have resulted in increased adoption of telecommunications technology. This has in turn led to productivity improvements and the successful adoption of mobile telephony. The adoption of mobile telephony is influenced by many factors and the study identifies the factors that influence Information Technology (IT) students' perceptions on the adoption of mobile telephony and the quality of mobile telecommunication services for academic and social purposes at the University of KwaZulu-Natal (UKZN), Durban, South Africa. The findings suggests that students understand and are fully aware of the use of mobile telecommunication services. Mobile telecommunication technology and its services could serve as an important pedagogical tools in higher education institution. The understanding of the significance of the various factors influencing the adoption and usage of mobile telecommunication services by students engenders opportunities to explore ways through which mobile technology could be integrated into teaching and learning processes at higher education institutions. The integration of mobile telecommunication technology into teaching and learning at universities will facilitate student-centered learning.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132709433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exposing wiktionary translations with performance in mind 在考虑性能的情况下公开字典翻译
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854182
Chris Cargile, Gayathri Santhanakrishnan, Aspen Olmsted
{"title":"Exposing wiktionary translations with performance in mind","authors":"Chris Cargile, Gayathri Santhanakrishnan, Aspen Olmsted","doi":"10.1109/I-SOCIETY.2016.7854182","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854182","url":null,"abstract":"In this paper, we explore some of the challenges to extracting Wiktionary data so it can be used for machine translation. We provide a use case of considerations made in the development of a web service that transforms raw data in a wiktionary xml dump file into a web-service that provides language translation. Our case study focuses on the performance of this service in comparison to a service using remote calls to the Wiktionary API.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"36 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131890356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovation diffusion of wearable mobile computing: Pervasive computing perspective 可穿戴移动计算的创新扩散:普适计算视角
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854185
S. Taib, R. De Coster, J. Nyamu
{"title":"Innovation diffusion of wearable mobile computing: Pervasive computing perspective","authors":"S. Taib, R. De Coster, J. Nyamu","doi":"10.1109/I-SOCIETY.2016.7854185","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854185","url":null,"abstract":"Wearable technology has become mainstream in this information age, it is needed to understand how the potential users of this emerging technology gain value from the innovation of the technology, consequently increasing users' diffusion. Extant literature on the acceptance of mobile computing has been developing such as in mobile banking services and in healthcare service, however, the study of users' acceptance about the emergence of wearable mobile computing is still at the early stages. This paper examines the development of a conceptual framework to understand the technology adoption factors for wearable mobile computing utilizing the Technology Acceptance Model (TAM), the Diffusion of Innovation Theory (DOI) and related factors on mobility and pervasive computing. Data of 272 respondents were collected using quantitative approach of survey based questionnaires conducted in Malaysia. The findings of this research revealed the factors of mobility (MOB), personalization (PN) and perceived enjoyment (PE) achieved the highest average score by respondents, followed by perceived usefulness (PU) and perceived ease of use (PEU), observability (OBS), facilitating condition (FC) and social influence (SI). As wearable technology is perceived to be pervasive, mobility (MOB) and perceived enjoyment (PE) contribute the dominant factor for usage acceptance, while Perceived Usefulness (PU) from established model TAM, still plays an important factors in predicting innovation adoption of wearable mobile computing.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115213235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Integration of it governance and security risk management: A systematic literature review 信息技术治理与安全风险管理的集成:系统的文献综述
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854200
D. De Smet, Nicolas Mayer
{"title":"Integration of it governance and security risk management: A systematic literature review","authors":"D. De Smet, Nicolas Mayer","doi":"10.1109/I-SOCIETY.2016.7854200","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854200","url":null,"abstract":"GRC is an umbrella acronym covering the three disciplines of governance, risk management and compliance. In this context, IT GRC is the subset of GRC dealing with IT aspects of GRC. The main challenge of GRC is to have an approach as integrated as possible of the three domains. The objective of our paper is to study one facet of IT GRC: the links and integration between IT governance and risk management that we consider today as the least integrated. To do so, the method followed in this paper is a systematic literature review, in order to identify the existing research works in this field. The resulting contribution of the paper is a set of recommendations established for practitioners and for researchers on how better deal with the integration between IT governance and risk management.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115103320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Experimenting with docker: Linux container and base OS attack surfaces docker试验:Linux容器和基础操作系统攻击面
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854163
Amr A. Mohallel, J. Bass, Ali Dehghantaha
{"title":"Experimenting with docker: Linux container and base OS attack surfaces","authors":"Amr A. Mohallel, J. Bass, Ali Dehghantaha","doi":"10.1109/I-SOCIETY.2016.7854163","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854163","url":null,"abstract":"Linux containers showed great superiority when compared to virtual machines and hypervisors in terms of networking, disk and memory management, start-up and compilation speed, and overall processing performance. In this research, we are questioning whether it is more secure to run services inside Linux containers than running them directly on a host base operating system or not. We used Docker v1.10 to conduct a series of experiments to assess the attack surface of hosts running services inside Docker containers compared to hosts running the same services on the base operating system represented in our paper as Debian Jessie. Our vulnerability assessment shows that using Docker containers increase the attack surface of a given host, not the other way around.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125175730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Security risk factors that influence cloud computing adoption in Saudi Arabia government agencies 影响沙特阿拉伯政府机构采用云计算的安全风险因素
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854165
M. Alassafi, Abdulrahman Alharthi, R. Walters, G. Wills
{"title":"Security risk factors that influence cloud computing adoption in Saudi Arabia government agencies","authors":"M. Alassafi, Abdulrahman Alharthi, R. Walters, G. Wills","doi":"10.1109/I-SOCIETY.2016.7854165","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854165","url":null,"abstract":"Cloud computing technologies play a substantial role in public organizations and private sector companies since it reduces the cost of using information technology services and allows users to access the service anytime and everywhere, whilst only paying for what they use. In developing countries, such as Saudi Arabia, the cloud computing is still not widely adopted, compared to countries in the west. In order to promote the adoption of cloud computing, it is important to recognize that an important and specific issue related to cloud computing is the potential and perceived security risks posed by implementing such technology. Therefore, the aim of this research is to investigate the security risk factors that influence organization to adopt cloud computing in a Saudi Arabia context. This research proposed a framework for the successful adoption of cloud computing, focused on risks when implementing security in the cloud system.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131862221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Map data representation for indoor navigation a design framework towards a construction of indoor map 室内导航地图数据表示是一种面向室内地图构建的设计框架
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854184
Watthanasak Jeamwatthanachai, M. Wald, G. Wills
{"title":"Map data representation for indoor navigation a design framework towards a construction of indoor map","authors":"Watthanasak Jeamwatthanachai, M. Wald, G. Wills","doi":"10.1109/I-SOCIETY.2016.7854184","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854184","url":null,"abstract":"A map is a basic component used in a part of navigation in everyday life, which helps people to find information regarding locations, landmarks, and routes. By GPS and online service map e.g. Google maps, navigating outdoors is easier. Inside buildings, however, navigating would not be so easy due to natural characteristics and limitations of GPS, which has led to the creations of indoor navigation system. Even though the indoor navigation systems have been developed for long time, there are still some limitation in accuracy, reliability and indoor spatial information. Navigating inside without indoor spatial information would be a challenge for the users. Regarding the indoor spatial information, a research question has been drawn on finding an appropriate framework towards map data representation of an indoor public spaces and buildings in order to promote indoor navigation for people, robotics, and autonomous systems. This paper has purposed a list of factors and components used towards the design framework for map data representation of indoor public spaces and buildings. The framework, in this paper, has been presented as a form of a multiple-layered model, which each layer designed for a different propose, with object and information classifications.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134240908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Memory leak detection in android applications based on code patterns 基于代码模式的android应用程序内存泄漏检测
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854196
Gayathri Santhanakrishnan, Chris Cargile, Aspen Olmsted
{"title":"Memory leak detection in android applications based on code patterns","authors":"Gayathri Santhanakrishnan, Chris Cargile, Aspen Olmsted","doi":"10.1109/I-SOCIETY.2016.7854196","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854196","url":null,"abstract":"An application running on an android mobile platform may sometimes crash in the midst of its lifecycle without the user triggering an explicit close action. This is due to memory leaks in the system which are introduced due to insufficient memory handling mechanisms. Memory leaks are not easily identified by testing the application. There are a few tools to identify memory usage over time for an application running on an android device. Most of them track of the heap (Memory allocated for an application) or the references to objects in the activity lifecycle. We propose to identify memory leak vulnerabilities in the application during development and testing by identifying certain usages of code or code patterns in the application. This allows the application developers to correct the error easily because the part of the code which is responsible for the memory leak will be explicitly indicated.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134093992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A framework of e-health systems adoption and telemedicine readiness in developing countries 发展中国家采用电子卫生系统和远程医疗准备的框架
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854188
Ali Abdullrahim, R. De Coster
{"title":"A framework of e-health systems adoption and telemedicine readiness in developing countries","authors":"Ali Abdullrahim, R. De Coster","doi":"10.1109/I-SOCIETY.2016.7854188","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854188","url":null,"abstract":"Fundamental transformation of the healthcare sector through informatics is achievable, from technical prospective. However, organisational issues surrounding technology implementation in healthcare setting have not yet received adequate research attentions in developing countries. The aim of this study is to develop a conceptual framework model to determine Telemedicine Readiness (TR) at an organisational level in Libyan healthcare establishments. In addition, Telemedicine Adoption and Outcome Expectations were also examined as further model outcomes. A questionnaire based survey was designed and developed to include 7 items concerning various conceptual subscales. The paper reports the responses of 161 participants targeting mainly Libyan physicians and healthcare staff who are studying for further education in the UK and who have been healthcare providers in Libya. The results show a strong correlation of TR with Human Resources (HR) capability (r = 0.535, P < 0.001) and with IT Infrastructure (r = 0.44, P < 0.001). The overall Cronbach Alpha coefficient = 0.835. The factor analysis (validity) illustrated five factors with positive loading > 0.5. Further, user acceptance, IT infrastructure and HR capability have significant influences on TR (r2 = 0.472, P < 0.001). From both reliability test and factor analysis, the framework is considered a valid model to assess TM readiness.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124560866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Information flows in e-participation applications implications in government service-delivery in Brazil 电子参与应用中的信息流对巴西政府服务提供的影响
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854172
D. Nascimento
{"title":"Information flows in e-participation applications implications in government service-delivery in Brazil","authors":"D. Nascimento","doi":"10.1109/I-SOCIETY.2016.7854172","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854172","url":null,"abstract":"When citizens voice their opinions online they produce a large quantity of information, which represent citizen's knowledge about their cities. This information has been used by public and private organizations to understand and support citizens' needs with the help of Participatory Citizenship Technologies (PCTs). PCTs are projects and applications involving Information and Communication Technologies (ICTs) which help to gather, create and share information about urban issues (such as pot holes, dislocated garbage, report violent situations, etc.). PCTs have helped to raise awareness and solve problems in the city by mediating information and knowledge between citizens, the private and the public sector. However, our understanding about the nature of these platforms in developing countries is still limited. In this research I begin to explore Brazilian PCTs and their impact in government service delivery by analyzing the information flows between citizens and governments in existing PCTs in Brazil. The anticipated outcomes of this research are a description of the level of participation Brazilian PCTs foster, which PCTs provide improvements in public service delivery, an analysis of the information and knowledge flows in the PCTs, and which kinds of information and knowledge flows allow for improvements in public service delivery.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117166661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信