2015 IEEE International Symposium on Technology and Society (ISTAS)最新文献

筛选
英文 中文
Subcutaneous body area networks: A SWOT analysis 皮下身体区域网络:SWOT分析
2015 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439414
P. Catherwood, D. Finlay, J. Mclaughlin
{"title":"Subcutaneous body area networks: A SWOT analysis","authors":"P. Catherwood, D. Finlay, J. Mclaughlin","doi":"10.1109/ISTAS.2015.7439414","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439414","url":null,"abstract":"This paper presents a SWOT analysis for the emerging and futuristic field of non-medical body-implantable devices. This area will begin to materialize as one of the next big themes in future personal computing and offers huge rewards to society if implemented correctly. The technology boasts many strengths which are applicable to a variety markets including entertainment, social networking, personal safety, security, consumerism, communications, healthcare, convenience and human body enhancement. Such subcutaneous sensor technology releases citizens from the multitude of portable computing devices, keys, wallets, passes, etc. However, the technology would be a target for hackers and would likely result in more violent robberies and forceful ID removal. Additionally, adverse health effects, device and battery safety and reliability, and co-existence with medically prescribed implants are issues developers must solve before the technology could excel. External emerging technologies such as Cloud computing, IoT, and NFC support development and potential success of implantable systems and combines to help address issues of personal safety, terrorism, people tracking and identification, e-payments, and long-term fitness profiling. Threats to the technology's uptake include societal fears on such aspects as adverse health effects, dehumanisation, breaches of human rights, conservatism, social privacy, and religious objections. With this technology potentially beginning to enter the mainstream in the next 5-10 years considerable effort is required to develop legislation, policies, procedures, device and network security, and convince the general public this technology is the next logical step in personal computing.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132476168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Mobile cloud computing for disaster emergency operation: A systematic review 面向灾害应急操作的移动云计算:系统综述
2015 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439422
T. Geumpana, F. Rabhi, John Lewis, P. Ray, Liming Zhu
{"title":"Mobile cloud computing for disaster emergency operation: A systematic review","authors":"T. Geumpana, F. Rabhi, John Lewis, P. Ray, Liming Zhu","doi":"10.1109/ISTAS.2015.7439422","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439422","url":null,"abstract":"The advancement of mobile cloud computing (MCC) has the potential to improve communication and information during disaster emergency operation. Many studies from different countries have addressed different approaches to implement mobile cloud technologies during disaster operation. However, there has been a lack of any consolidated evidence-based study to evaluate the MCC from the dual perspectives of disaster emergency situation and technology. In this paper, we provide an extensive study of mobile cloud computing research as a critical system or application based on the latest literature published from 2010 to 2015, and highlights the specific challenges in implementing mobile cloud computing in disaster emergency operation. A systematic literature review was conducted over 4 prominent journals of computer science engineering (IEEE, ACM, ProQuest, Inspec/Elsevier) and the findings were classified into four key challenges of MCC implementation during disaster emergency operation. We present a taxonomy based on the key challenges in this area, and discuss the different solutions taken to solve the challenges. We conclude the paper with a critical analysis of the challenges that have not been solved, and highlight directions for future work.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133175654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Supply system's technology configuration as a contributor to end-user vulnerability 供电系统的技术配置是最终用户脆弱性的一个贡献者
2015 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439445
L. Robertson, K. Michael, Albert Munoz Aneiros
{"title":"Supply system's technology configuration as a contributor to end-user vulnerability","authors":"L. Robertson, K. Michael, Albert Munoz Aneiros","doi":"10.1109/ISTAS.2015.7439445","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439445","url":null,"abstract":"Individuals requiring goods and services essential to their mode of living, are increasingly vulnerable to failures of the complex, interlinked, and inhomogeneous technological systems that supply those needs. Extant analysis techniques do not adequately quantify, from an end-user's perspective, the vulnerability that is contributed by such technological systems. This study explores the significance of inherent weaknesses of inhomogeneous technological systems and proposes an approach for measuring vulnerability as the individual end-user `exposure level' for each service. The measure of \"exposure\" that is developed, is mapped directly from the configuration of a technological system. This measure of exposure allows quantitative evaluation of existing configurations and proposed improvements to a technological system. The measure can therefore be used to determine which systems currently contribute most exposure to each individual, to identify the causes of that exposure, and to rank mitigation projects' effectiveness.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"268 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133848165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ICT supported extension services in conservation agriculture information access for small holder farmers in Laikipia County, Kenya 信息通信技术支持肯尼亚莱基皮亚县小农获取保护性农业信息的推广服务
2015 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439408
J. Achora, H. Sseguya
{"title":"ICT supported extension services in conservation agriculture information access for small holder farmers in Laikipia County, Kenya","authors":"J. Achora, H. Sseguya","doi":"10.1109/ISTAS.2015.7439408","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439408","url":null,"abstract":"This paper examines how Information Communication Technologies (ICTs) are used in the Conservation Agriculture (CA) knowledge pathways. It discusses the parallel knowledge pathways smallholder farmers' use to access conservation agriculture information. The objective of this study is to develop an effective dissemination model that exploits the use of ICTs in existing pathways in order to improve Conservation Agriculture knowledge flows. Design, Methodology and Approach: A total of one hundred and twenty-five respondents were interviewed, with a purposively selected sample of 110 CA farmers interviewed using semi-structured questionnaires. Using the snowball method, 15 key informant interviews were conducted with Policy makers and ICT service providers. 69% of the respondents were female and 51% male. The focus of the study was on the different ICTs used in the CA knowledge pathways, the dissemination pathways, institutional and socio-economic factors. Data was analyzed manually and using SSPS ver. 21. Preliminary findings indicate that a variety of knowledge pathways exist through which farmers can access CA knowledge. Four different kinds of ICT led models were identified, Government ICT led models, Government-NGO led models, Government-NGO-Private Sector ICT led model and NGO ICT led models. However the study notes a lack of harmonization and weak linkages between institutions in the utilization of the existing ICT models, utilization of the ICTs access and ownership at the household level and harmonization of the CA messages. Furthermore, even though there was 100% mobile phones ownership, 94% radio, 64% television, 10% Laptop and 9% Computer (desktop) access and ownership among the respondents, farmers and a large number of the extension staff lacked the skills to fully exploit the use of these tools to access CA knowledge. Implication: New emerging and existing communication technologies have a very high potential to improve agricultural knowledge flows if taken advantage of by the \"change agents\" in the diffusion process of new innovations. New online technologies known as Web 2.0 and `social media' are slowly emerging as platforms for collaboration, sharing of product and market information. Open chain models of village information centres also provide numerous economic opportunities, and do also network communities while providing public/private services. The opportunity of using real time communication tools has been greatly embraced especially by the youthful farmers and the advantage of these new emerging tools is their unique attributes, similar to the traditional oral cultures of communication seen in the African social systems where one can see, hold a discussion, get immediate feedback and use the written media to convey messages. The high percentage of ownership and accessibility of ICTs among the survey population also offers the potential to fully exploit ICTs in the improvement of the CA knowledge pathways and agricultural inf","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127751532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Modelling Cyber Security Governance Maturity 网络安全治理成熟度建模
2015 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439415
Rossouw de Bruin, S. V. Solms
{"title":"Modelling Cyber Security Governance Maturity","authors":"Rossouw de Bruin, S. V. Solms","doi":"10.1109/ISTAS.2015.7439415","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439415","url":null,"abstract":"The purpose of this paper is to introduce a model - the Cyber Security Governance Maturity model - that aims to determine the general Cyber Security maturity of n organization. The model is made up of a number of constituent maturity models which together aims at determining the overall Cyber Security Governance maturity. The end result of this model is a \"Cyber Security Governance Maturity dashboard\", which will provide a summary of the maturity assessments that each of the constituent maturity models have performed. In doing so, executive management of an organization can have both a summarized as well as a detailed indication of their Cyber Security Governance maturity.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127777911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Making the UCWW a reality 让UCWW成为现实
2015 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439429
Ivan Ganchev, Zhanlin Ji, M. O'Droma
{"title":"Making the UCWW a reality","authors":"Ivan Ganchev, Zhanlin Ji, M. O'Droma","doi":"10.1109/ISTAS.2015.7439429","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439429","url":null,"abstract":"This paper reports on the development of a novel cloud-based next generation networking (NGN) system prototype, built on the revolutionary concept for the realisation of the next phase of a NGN-based consumer-oriented wireless networking, founded on the key attributes of the Ubiquitous Consumer Wireless World (UCWW). Design aspects and potential societal impact are presented.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"382 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133432205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Iris recognition on consumer devices — Challenges and progress 消费类设备上的虹膜识别——挑战与进展
2015 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439440
Shejin Thavalengal, P. Corcoran
{"title":"Iris recognition on consumer devices — Challenges and progress","authors":"Shejin Thavalengal, P. Corcoran","doi":"10.1109/ISTAS.2015.7439440","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439440","url":null,"abstract":"This article outlines various technical, social and ethical challenges in implementing and widely adopting iris recognition technology on consumer devices such as smartphone or tablets. Acquisition of sufficient quality iris images using today's consumer devices is noted to be the main challenge in implementing this technology. Current progress in this field is reviewed. A smartphone form factor camera is presented to be used as a front-facing camera. This device is modified to capture near infra-red iris images along with general purpose visible wavelength images. Analyses shows that such a device with improved optics and sensor could be used for implementing iris recognition in next generation hand held devices. The social impact of wider adoption of this technology is discussed. Iris pattern obfuscation is presented to address various security and privacy concerns which may arise when iris recognition will be a part of our daily life.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133947723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
"About your smartphone usage" — Privacy in location-based mobile participation “关于你的智能手机使用情况”-基于位置的移动参与的隐私
2015 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439421
Maija Poikela, Robert Schmidt, I. Wechsung, S. Möller
{"title":"\"About your smartphone usage\" — Privacy in location-based mobile participation","authors":"Maija Poikela, Robert Schmidt, I. Wechsung, S. Möller","doi":"10.1109/ISTAS.2015.7439421","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439421","url":null,"abstract":"Location-based mobile tools provide effective means for mobile participation, allowing better targeting of users and faster opinion gathering for municipalities and organizations. For participation purposes it is essential to reach the users as widely as possible, and for this, smartphones with ever-increasing adoption rates offer an optimal tool. However, privacy concerns might prevent the use of location-based applications, which results in a bias in opinion-gathering. In this paper, we present results of a field study tackling the issue of how privacy concern affects the adoption and use of a location-based mobile participation application, and what motivates the use of such applications. We find that users have varying motivations for participating in location-based polls, and that these motivations depend on the type of the poll in question. We show that privacy concerned users are less likely to be motivated by a monetary benefit, but rather by the importance of the topic, and that the intrinsic motivators that drive the privacy concerned users differ from those that drive the unconcerned. Finally, we show that, based on our study, it seems that privacy concern might be an inhibiting factor in adoption of a location-based mobile participation application.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129744498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Insights into open innovation and ICT entrepreneurship in Africa 非洲的开放式创新和信息通信技术创业
2015 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439447
P. Cunningham
{"title":"Insights into open innovation and ICT entrepreneurship in Africa","authors":"P. Cunningham","doi":"10.1109/ISTAS.2015.7439447","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439447","url":null,"abstract":"Innovation and ICT entrepreneurship are slowly being recognised as important enablers of socio-economic growth and realising national strategic goals in African Member States. However, the level of practical skills capacity, indigenous entrepreneurial expertise and policy support to take full advantage of this at national level varies considerably. This research study focused on identifying factors impacting on the current level of open innovation and ICT entrepreneurship in Africa. It was informed by a semi-structured, moderated focus group which captured the perspectives of senior public and education and research stakeholders from eight African Member States. The results highlighted six main factors: (a) level of political will reflected by resource prioritisation; (b) alignment with national development plans and associated funding priorities; (c) level of understanding of strategic benefits by ministers and senior civil servants; (d) level of awareness and sensitization of the general public, (e) availability of national innovation and entrepreneurial expertise; and (f) willingness and capacity to cooperate with other stakeholders to achieve common goals. Future research will capture perspectives from the private, societal and international donor sectors, and create and validate potential models/methodologies to address the challenges and opportunities identified in this study.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"46 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126005596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Cloud computing and mobile devices based system for healthcare application 基于云计算和移动设备的医疗保健应用系统
2015 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439407
Hanen Jemal, Zied Kechaou, Mounir Ben Ayed, A. Alimi
{"title":"Cloud computing and mobile devices based system for healthcare application","authors":"Hanen Jemal, Zied Kechaou, Mounir Ben Ayed, A. Alimi","doi":"10.1109/ISTAS.2015.7439407","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439407","url":null,"abstract":"Nowadays the emergence of mobile devises and Cloud Computing can change the culture of healthcare from direct care services into Mobile Cloud computing (MCC) services. For that, the application targeted at mobile devices becoming copious with others systems in healthcare sector. Consequently, we assume that this technology have a potential effect in healthcare domain. MCC offers new kinds of services and facilities medical tasks. In this regard, we have tried to propose a new mobile medical web service system. The proposed system called Medical Mobile Cloud Multi Agent System (2MCMAS) is a hybrid system which integrates MCC and Multi Agent System in healthcare in order to make efficiency care.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124707477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信