{"title":"Software Development Guidelines Based on Fuzzy Decision-Making for Health Care Applications","authors":"E. Ronchieri, V. Venturi, M. C. Vistoli","doi":"10.1109/HICSS.2010.343","DOIUrl":"https://doi.org/10.1109/HICSS.2010.343","url":null,"abstract":"Software development of applications, regarding also health care, must deal with the needs of developers with different background. Incorporating the voice of developers, most often shared geographically, into the various phases of the software life cycle is becoming always and always important. Therefore, decision-making process is a valid way for translating software development needs into relevant guidelines to drive developers during their activity in order to obtain a maximum portability, extensibility and maintainability of software itself. The process takes into account multiple preferences and different tools in order to guarantee a certain freedom to developers making software development easy to achieve. In this research, we define a fuzzy decision-making algorithm for software development guidelines. The algorithm contributes defining a set of guidelines, a set of goals, a cost function for guidelines, and a set of constraints. A fuzzy operator is used to aggregate goals and constraints. This algorithm was tested using realistic software development case studies applied to an health care application.","PeriodicalId":328811,"journal":{"name":"2010 43rd Hawaii International Conference on System Sciences","volume":"435 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115332665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two-Dimensional Traceability Link Rule Mining for Detection of Insider Attacks","authors":"Y. Hu, B. Panda","doi":"10.1109/HICSS.2010.414","DOIUrl":"https://doi.org/10.1109/HICSS.2010.414","url":null,"abstract":"Organizations face a growing threat of insider attacks. This paper presents a model for detecting insider malicious activities targeted at tampering the contents of files for various purposes. It employs two-dimensional traceability link rule mining to identify intrinsic file dependencies. Traceability links are traditionally used by software practitioners and researchers to uncover the relationships between programs and documents in a software system. In this research, we borrow the concept of traceability link from software engineering realm and use traceability links to model file access patterns. Activities that modify data without complying with various file traceability link rules will be identified as suspicious activities. Because file traceability links are less prone to change than individual user's file access patterns, the insider attack detection model built on traceability links is more effective than many existing systems based on usage patterns.","PeriodicalId":328811,"journal":{"name":"2010 43rd Hawaii International Conference on System Sciences","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115984616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Gorton, G. D. Black, K. Schuchardt, Chandrika Sivaramakrishnan, S. Wurstner, Peter Hui
{"title":"GS3: A Knowledge Management Architecture for Collaborative Geologic Sequestration Modeling","authors":"I. Gorton, G. D. Black, K. Schuchardt, Chandrika Sivaramakrishnan, S. Wurstner, Peter Hui","doi":"10.1109/HICSS.2010.217","DOIUrl":"https://doi.org/10.1109/HICSS.2010.217","url":null,"abstract":"Modern scientific enterprises are inherently knowledge-intensive. In general, scientific studies in domains such as geoscience, chemistry, physics and biology require the acquisition and manipulation of large amounts of experimental and field data in order to create inputs for large-scale computational simulations. The results of these simulations must then be analyzed, leading to refinements of inputs and models and further simulations. In this paper we describe our efforts in creating a knowledge management platform to support collaborative, wide-scale studies in the area of geologic sequestration modeling. The platform, known as GS3 (Geologic Sequestration Software Suite), exploits and integrates off-the-shelf software components including semantic wikis, content management systems and open source middleware to create the core architecture. We then extend the wiki environment to support the capture of provenance, the ability to incorporate various analysis tools, and the ability to launch simulations on supercomputers. The paper describes the key components of GS3 and demonstrates its use through illustrative examples. We conclude by assessing the suitability of our approach for geologic sequestration modeling and generalization to other scientific problem domains.","PeriodicalId":328811,"journal":{"name":"2010 43rd Hawaii International Conference on System Sciences","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116247007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RFID-Based Authentication Middleware for Mobile Devices","authors":"Ewa Syta, S. Kurkovsky, B. Casano","doi":"10.1109/HICSS.2010.320","DOIUrl":"https://doi.org/10.1109/HICSS.2010.320","url":null,"abstract":"Ever-growing popularity of mobile devices, such as smart phones and netbooks, coupled with anytime and anyplace availability of high-speed network access is changing the ways how we compute and communicate. Mobile devices play an increasingly important role in our lives and tend to become representations of our digital selves when we trust these devices with sensitive information. Consequently, the problem of securing mobile devices against unauthorized access has never been more important. We present an RFID-based Authentication Middleware (RFID-AM) that combines point of entry and continuous authentication with transparent on-demand encryption of user files. This paper details the architecture of RFID-AM, discusses its fully functional prototype, and presents experimental results demonstrating its performance in various conditions. This paper also surveys different methods and technologies that have been proposed and implemented on mobile devices.","PeriodicalId":328811,"journal":{"name":"2010 43rd Hawaii International Conference on System Sciences","volume":"337 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122330611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Mount, A. Lamadrid, Surin Maneevitjit, Bob Thomas, R. Zimmerman
{"title":"The Hidden System Costs of Wind Generation in a Deregulated Electricity Market","authors":"T. Mount, A. Lamadrid, Surin Maneevitjit, Bob Thomas, R. Zimmerman","doi":"10.1109/HICSS.2010.380","DOIUrl":"https://doi.org/10.1109/HICSS.2010.380","url":null,"abstract":"Earlier research has shown that adding wind capacity to a network can lower the total annual operating cost of meeting a given pattern of loads by displacing conventional generation. At the same time, the variability of wind generation and the need for higher levels of reserve generating capacity to maintain reliability standards impose additional costs on the system that should not be ignored. The important implication for regulators is that the capacity cost of each MW of peak system load is now much higher. Hence, the economic benefits to a network of using storage and controllable load to reduce the peak system load will be higher with high penetrations of wind generation. These potential benefits will be illustrated in a case study using a test network and the SuperOPF. An important feature of the SuperOPF is that the amount of conventional generating capacity needed to maintain Operating Reliability is determined endogenously, and as a result, it is possible to determine the net social benefits of relying more on an intermittent source of generation, such as wind capacity, that lowers operating costs but increases the cost of maintaining System Adequacy. The capabilities of the SuperOPF provide a consistent economic framework for evaluating Operating Reliability in real-time markets and System Adequacy for planning purposes. Basically, a financially viable investment requires that the reductions in the total annual costs of the existing system should be larger than the annualized cost of financing the addition of, for example, wind generation to a network. The scenarios considered make it possible to determine 1) the amount of conventional generating capacity needed to meet the peak system load and maintain System Adequacy, 2) the amount of missing money paid to generators to maintain Financial Adequacy, 3) changes in the congestion rents for transmission that are collected by the system operator, and finally, 4) the total annual system costs paid by customers directly in the Wholesale Market and, indirectly, as missing money. The results show that the benefits (i.e. the reduction in the total annual system costs) from making an investment in wind capacity and/of upgrading a tie line are very sensitive to 1) how much of the inherent variability of wind generation has to be accommodated on the network, and 2) how the missing money paid to conventional generators is determined (e.g. comparing a regulated market and a deregulated market).","PeriodicalId":328811,"journal":{"name":"2010 43rd Hawaii International Conference on System Sciences","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122369214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Panagiota Papadopoulou, M. Nikolaidou, D. Martakos
{"title":"What Is Trust in E-Government? A Proposed Typology","authors":"Panagiota Papadopoulou, M. Nikolaidou, D. Martakos","doi":"10.1109/HICSS.2010.491","DOIUrl":"https://doi.org/10.1109/HICSS.2010.491","url":null,"abstract":"Trust in e-government is of vital importance for the effective adoption and use of electronic public services. Understanding the concept of trust and the different types it involves in the e-government context is a key challenge for both research and practice. Aiming to address this need, this paper proposes a parsimonious yet comprehensive typology of trust in e-government. Trust in e-government is analyzed into seven different types conceptualized around the different targets they are related to. Each trust type is further delineated into its composing dimensions and the approach by which it can enabled. The paper continues to present an example of the practical applicability of the proposed typology by showing how the identified types of trust have been addressed in an online taxation portal.","PeriodicalId":328811,"journal":{"name":"2010 43rd Hawaii International Conference on System Sciences","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116833217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigating the Drivers of the Continuous Use of Social Virtual Worlds","authors":"Matti Mäntymäki, Jani Merikivi","doi":"10.1109/HICSS.2010.241","DOIUrl":"https://doi.org/10.1109/HICSS.2010.241","url":null,"abstract":"Social virtual worlds (SVWs) have become increasingly important environments for social interaction, especially for the younger generations. For SVWs to be economically sustainable attracting users and retaining existing users is a paramount issue. This requires understanding the underlying reasons why users continuously engage in social virtual worlds and therefore we empirically investigate the world's largest SVW for teens, Habbo. We apply Technology Acceptance Model as well as IS continuance models complemented with perceived critical mass to investigate the continuous use of Habbo. The research model is empirically tested with data from 2215 Finnish Habbo users by applying structural equation modeling. Perceived enjoyment was found to be the main determinant of the continuous use intention followed by perceived critical mass. Somewhat surprisingly, satisfaction had very little influence on the continuous use intention. Moreover, perceived usefulness and ease of use had only a marginal impact on satisfaction.","PeriodicalId":328811,"journal":{"name":"2010 43rd Hawaii International Conference on System Sciences","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128977225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IT Services Management IT Service Inventory","authors":"D. Graves","doi":"10.1109/HICSS.2010.245","DOIUrl":"https://doi.org/10.1109/HICSS.2010.245","url":null,"abstract":"Services Science is prevalent in academia, government, and industry across a range of disciplines. Services Science is evident in the field of Information Technology (IT) through the formalism of IT Service Management (ITSM), the Information Technology Information Library (ITIL), and ISO standard 20000. While there are standards, methods, research outcomes, and defined processes for IT Service Management, there is not a repository of the IT services that are the focus of ITSM. This paper uses definitions and descriptions from ITSM research as an instrument to identify data in the literature that represents IT service topics. The goal of the paper is to rationalize the data and propose an IT services inventory in the framework of ITSM. The IT service inventory is meant to better enable systematic IT services research and industry IT service planning, implementation, and execution.","PeriodicalId":328811,"journal":{"name":"2010 43rd Hawaii International Conference on System Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129264309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determinants of Consumers' E-Loyalty: A Cross-Channel Perspective","authors":"H. Doong, Jeffrey C. F. Tai, Huichich Wang","doi":"10.1109/HICSS.2010.142","DOIUrl":"https://doi.org/10.1109/HICSS.2010.142","url":null,"abstract":"Websites are acknowledged as essential to the marketing of brick-and-mortar companies in the maturing e-commerce marketplace. Knowledge of how to position these companies' Websites effectively is thus regarded as essential by scholars and practitioners. By investigating consumer cross-channel behavior, the current study was designed to reveal determinants of consumers' e-loyalty. Two hundred and eighty randomly selected consumers from a top international brick-and-mortar company's customer database participated in an online survey, findings from which indicated that a high level of consumers' brand loyalty in the retail channel not only directly enhances consumers' trust of the same brand's Website, but also directly increases consumers' online brand familiarity and perceived brand reputation, which reinforce consumers' trust in the same brand's Website. Consequently, consumers' e-loyalty toward the same brand's Website is also enhanced. The implications should enable managers to develop Website positioning strategies that leverage their existing brand power in the retail channel.","PeriodicalId":328811,"journal":{"name":"2010 43rd Hawaii International Conference on System Sciences","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126843168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Goal Oriented and Knowledge Based E-Government Project Management Platform","authors":"D. Sarantis, Y. Charalabidis, D. Askounis","doi":"10.1109/HICSS.2010.15","DOIUrl":"https://doi.org/10.1109/HICSS.2010.15","url":null,"abstract":"There is a growing need for better project management in e-Government endeavors to bring together people with diverse knowledge and skills so they can develop and implement project activities effectively and efficiently. This paper is a research report on eGTPM (e-Government Transformation Project Management) platform, a project management tool which assists implementers and decision-makers in e-Government project planning and control. eGTPM Platform improves most existing commercial tools by integrating goal orientation and dynamic enterprise modeling (DEM) principles into the knowledge building tool developed at the Decision Systems Laboratory in National Technical University of Athens. By employing goal orientation and DEM principles' concepts, eGTPM facilitates communication and collaboration among all involved parties in order to jointly identify project needs and requirements and to reduce the number of changes due to misunderstandings. eGTPM also includes a knowledge based project control advisor which contains heuristic knowledge to guide users to possible design alternatives. The paper describes eGTPM's components and possible directions for future work.","PeriodicalId":328811,"journal":{"name":"2010 43rd Hawaii International Conference on System Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129132537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}