2016 International Conference on Information Society (i-Society)最新文献

筛选
英文 中文
Computer simulation for reengineering the linens delivery process with RFID in a hospital 基于射频识别技术的医院床单配送流程再造的计算机模拟
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854193
S. Shim, Aran Kumar, J. Jiao
{"title":"Computer simulation for reengineering the linens delivery process with RFID in a hospital","authors":"S. Shim, Aran Kumar, J. Jiao","doi":"10.1109/I-SOCIETY.2016.7854193","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854193","url":null,"abstract":"A hospital in Southeast Asia considers deploying a radio-frequency identification (RFID) system to improve the linens delivery and tracking process. This study uses computer simulation in modeling and comparing the process both with and without the RFID system and also assesses the impact of the RFID system on the process in terms of time taken and visibility of linens in the process. The simulation results show that the new process with the RFID system takes about 5.04 minutes longer for soiled linens and about 31.48 minutes longer for clean linens than the current process without the RFID system does. The increased times are mainly due to the activities added in the process to implement the RFID system. The results also demonstrate that the RFID system significantly improves the visibility of linens in the process. The results of this study could prove helpful to those who consider deploying an RFID system for the linens delivery and tracking process in hospitals or other similar processes.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115068694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure software development through non-functional requirements modeling 通过非功能性需求建模来确保软件开发的安全性
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854164
Aspen Olmsted
{"title":"Secure software development through non-functional requirements modeling","authors":"Aspen Olmsted","doi":"10.1109/I-SOCIETY.2016.7854164","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854164","url":null,"abstract":"In the development of a new software solution, users and developers spend the majority of their effort on modeling the functional requirements. The Non-Functional Requirements (NFR) are treated as a second class requirement, ignored until the end of the development cycle. They are often hidden, overshadowed and therefore, frequently neglected or forgotten. They are neglected because NFRs are often difficult to model, develop and test. NFRs become even more important in secure software design. Secure software design requires modeling of the confidentiality and integrity of data passed through the software system, along with the availability requirements of the software system. More research is needed on both the modeling of these requirements along with the mapping of the NFR models into executable software code. To develop robust software that is more resilient to cyber-security attacks requires NFR modeling to become an integral part of the software development process. In this paper, we focus on the modeling of NFRs and the transformations from UML models into the source code.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131759664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cloud payment processing without ritualistic sacrifices reducing PCI-DSS risk surface with thin clients 无需仪式化牺牲的云支付处理减少了使用瘦客户机的PCI-DSS风险
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854205
M. Piazza, Joshua Fernandes, John Anderson, Aspen Olmsted
{"title":"Cloud payment processing without ritualistic sacrifices reducing PCI-DSS risk surface with thin clients","authors":"M. Piazza, Joshua Fernandes, John Anderson, Aspen Olmsted","doi":"10.1109/I-SOCIETY.2016.7854205","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854205","url":null,"abstract":"The Payment Card Industry Data Security Standard (PCI-DSS, or simply PCI) governs the many security standards associated with payment card transactions. Point of sale systems in today's brick-and-mortar storefronts fall woefully short of these standards at every step of the work flow. They commonly use outdated desktop computers and store card data locally, oftentimes in plaintext. Backups of these systems, if kept at all, are often stored on unsecured, removable media. If we can move some of the payment infrastructure away from the merchant to a central web service, then we can reduce the responsibility of the merchant and provide a more secure environment for the consumer.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121986460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automating e-Surveys 自动化e-Surveys
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854187
Zachary Davis, Callum Brill, Husna Siddiqui, Aspen Olmsted
{"title":"Automating e-Surveys","authors":"Zachary Davis, Callum Brill, Husna Siddiqui, Aspen Olmsted","doi":"10.1109/I-SOCIETY.2016.7854187","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854187","url":null,"abstract":"In this paper we investigate the problem of manual survey completion for the purposes of market validation. This study resides in the application domain of business market validation as a motivating example. The amount of data which can be output for market validation can be drastically increased through the process of automation. Through the use of automatic survey completion, we seek to decrease the amount of time required for each survey and therefore increase the efficiency of market data collection. Each survey completed with automation increases the efficiency and results in more market data collection. We outline a chrome application which opens a survey website and answers designated questions. We next document the improvements provided by the automation. Then we overview the results and discuss the available improvements to survey automation process.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123284356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Friend or faux? engineering your social network to detect fraudulent profiles 朋友还是假朋友?设计你的社交网络来检测欺诈性的个人资料
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854206
Husna Siddiqui, Callum Brill, Zachary Davis, Aspen Olmsted
{"title":"Friend or faux? engineering your social network to detect fraudulent profiles","authors":"Husna Siddiqui, Callum Brill, Zachary Davis, Aspen Olmsted","doi":"10.1109/I-SOCIETY.2016.7854206","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854206","url":null,"abstract":"Social media has a tremendous impact on current culture and trends. It has revolutionized the way in which people communicate with one another. Malicious entities exploit the vulnerabilities brought upon by the availability of personal data content on these networks. Openly sharing personal information online can make a user vulnerable to threats such as identity theft, phishing attacks, and profile cloning. In this paper, we will report on our investigation of malicious threats on social networks. We will propose a simple yet effective methodology for detecting fraudulent profiles on Facebook, a social networking service.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130349991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Inclusive education practices for a culturally responsive teacher education program 文化响应型教师教育项目的全纳教育实践
2016 International Conference on Information Society (i-Society) Pub Date : 2016-10-01 DOI: 10.1109/I-SOCIETY.2016.7854202
P. Louderback
{"title":"Inclusive education practices for a culturally responsive teacher education program","authors":"P. Louderback","doi":"10.1109/I-SOCIETY.2016.7854202","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854202","url":null,"abstract":"The purpose of this article is to provide a reflective discussion, using a case study as a teaching and learning strategy to improve academic learner performance. Guided by the social constructivism paradigm and using critical race theory (CRT) as a theoretical framework that places race at the center of educational research and discourse, we provide conditions for the successful implementation of the case study as a teaching and learning strategy for culturally responsive, inclusive education that may improve academic learner performance for indigenous students. After receiving an Institute for Museum and Library Services (IMLS) Laura Bush 21st Century Librarian Program grant, one institution provided distributed, community-based instruction to rural areas and fostered a community of practice to support pre-service school library teachers. This article presents approaches and assessments based on the program that incorporated a culturally responsive pedagogy in its specialized curriculum and created information literacy resources to improve student success in racially diverse and economically disadvantaged northeast Oklahoma schools and communities. The article further reviews factors that influenced learning and teaching in this program. Significant contributions include the creation of a unique program that provides a framework for practicing professionals in K-12. Curriculum, resources, and information literacy tools are made available to help sustain educational efforts for those who serve in similar communities. The planning, design, development and distribution of digital format information literacy modules address education-based needs to enhance information literacy skills, to incorporate “faces of diversity” that help targeted viewers personally relate more positively to the learning experience, and to deliver current “standards based” training resources. Lesson plans and learning resources created during and after the program can continue to provide opportunities for cross-cultural dialogue between Indigenous and Non-Indigenous educators in shared study, mentoring, and faculty/teacher training.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"1 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113954681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards a framework to enable the migration process to educational clouds in Saudi higher education 建立一个框架,使沙特高等教育能够迁移到教育云
2016 International Conference on Information Society (i-Society) Pub Date : 2016-09-20 DOI: 10.1109/I-SOCIETY.2016.7854179
Abdulrahman Alharthi, M. Alassafi, R. Walters, G. Wills
{"title":"Towards a framework to enable the migration process to educational clouds in Saudi higher education","authors":"Abdulrahman Alharthi, M. Alassafi, R. Walters, G. Wills","doi":"10.1109/I-SOCIETY.2016.7854179","DOIUrl":"https://doi.org/10.1109/I-SOCIETY.2016.7854179","url":null,"abstract":"Nowadays, Universities have become more reliant on Information and Communication Technology (ICT) to provide educational services for their stakeholders. While most of the Universities in Europe and North America has harnessed the capabilities of cloud services to provide large scale flexibly electronic educational services. In Saudi Arabia, most of the Universities are start-ups with limited IT Staff and ICT infrastructure. Therefore, migrating their ICT services to cloud computing could deliver substantial benefits in the form of rich education content, increased efficiency, and agility that can be used to transform higher education in Saudi universities. However, to successfully migrate to the cloud in the Saudi universities context, it is essential to identify the enabler factors that contribute toward a successful migration to the cloud environment in the higher education settings. Therefore, this research paper proposes a framework to investigate technological and organizational success factors that enable the migration process of the Saudi Universities' ICT to the cloud environment.","PeriodicalId":317605,"journal":{"name":"2016 International Conference on Information Society (i-Society)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116149967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信