2010 International Conference on Information Society最新文献

筛选
英文 中文
Ubiquitous personalized learning environment in post-industrial society 后工业社会中无处不在的个性化学习环境
2010 International Conference on Information Society Pub Date : 2010-06-28 DOI: 10.1109/I-SOCIETY16502.2010.6018717
A. Kojukhov, I. Levin
{"title":"Ubiquitous personalized learning environment in post-industrial society","authors":"A. Kojukhov, I. Levin","doi":"10.1109/I-SOCIETY16502.2010.6018717","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018717","url":null,"abstract":"The paper deals with the significant technological changes in engineering education in society when it moves into Post-Industrial age. We consider the following social trends and their influence on the engineering education: Virtualization, Personalization and Ubiquitous learning. The concept of Virtual Reality allows formulating the main features of the Post-Industrial engineering education and building the concept of ubiquitous personalized learning environment.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128465626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Integration of historic texts with technology 历史文本与技术的融合
2010 International Conference on Information Society Pub Date : 2010-06-28 DOI: 10.1109/I-SOCIETY16502.2010.6018715
B. Groff
{"title":"Integration of historic texts with technology","authors":"B. Groff","doi":"10.1109/I-SOCIETY16502.2010.6018715","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018715","url":null,"abstract":"How do historic texts, computers, and Organizational Leadership and Supervision (OLS) students interconnect? As it turns out, the combination is very intriguing and the resulting project is noteworthy. This paper discusses a course project that required leadership students to analyze historical documents based on their own knowledge and understanding of leadership policies and practices to determine if thoughts from long-ago could be incorporated into their modern leadership skill set. Each student was required to present his or her findings via a research paper, a research poster, and ultimately, by creating an engaging, stand-alone multimedia presentation.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127067213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Concurrent reduction of false positives and redundant alerts 同时减少误报和冗余警报
2010 International Conference on Information Society Pub Date : 2010-06-28 DOI: 10.1109/I-SOCIETY16502.2010.6018721
J. Nehinbe
{"title":"Concurrent reduction of false positives and redundant alerts","authors":"J. Nehinbe","doi":"10.1109/I-SOCIETY16502.2010.6018721","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018721","url":null,"abstract":"The concurrent reductions of true and false positives in Intrusion Detection Systems are exploitable avenues for attacks to succeed for a number of reasons. Firstly, intrusion detectors can concurrently generate numerous false positives with true positives. Secondly, intrusion aggregation models that are designed to reduce alerts workload reduce clusters of true and false positives at the same rate because the reduction of alert redundancies is not separated from that of false positives. Consequently, there are growing rate of computer attacks despite the inclusion of network detectors on the networks. Therefore, this paper presents a model to investigate these problems. The model consisted of two cooperative components of clustering rules that respectively eliminated redundancies and false positives. Evaluations with series of synthetic and realistic datasets have demonstrated how network analysts could significantly reduce false positive and redundancies in realistic networks and how to promptly thwart ongoing attacks.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127481082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Pedagogical immigration to 3D virtual worlds: A critical review of underlying themes and their concepts 教学移民到3D虚拟世界:对潜在主题及其概念的批判性回顾
2010 International Conference on Information Society Pub Date : 2010-06-28 DOI: 10.1109/I-SOCIETY16502.2010.6018737
N. Saleeb, Georgios A. Dafoulas
{"title":"Pedagogical immigration to 3D virtual worlds: A critical review of underlying themes and their concepts","authors":"N. Saleeb, Georgios A. Dafoulas","doi":"10.1109/I-SOCIETY16502.2010.6018737","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018737","url":null,"abstract":"A contentious issue has been in debate for the past decade, over the extent of dependency of current generations of students on information and communication technology (ICT) for education. Despite this controversy, there is a generalization amongst researchers that fundamental shifting of educational methods towards e-learning is deemed inevitable and beneficial to cater for emerging students' skills and preferences. One of these newly emergent e-learning platforms is 3D Virtual Learning Environments (VLEs) like Second Life. To the authors' knowledge, this paper is the first to derive and critically analyse, using grounded theory, advantageous and disadvantageous themes and their sub concepts of providing e-learning through 3DVLEs.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128952599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
E-education in Nigeria: Students' state of readiness for e learning at the University of Lagos 尼日利亚的电子教育:学生在拉各斯大学的电子学习准备状态
2010 International Conference on Information Society Pub Date : 2010-06-28 DOI: 10.1109/I-SOCIETY16502.2010.6018750
Alabi, Adefunke Olanike
{"title":"E-education in Nigeria: Students' state of readiness for e learning at the University of Lagos","authors":"Alabi, Adefunke Olanike","doi":"10.1109/I-SOCIETY16502.2010.6018750","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018750","url":null,"abstract":"This study investigated the Nigerian undergraduate students' readiness for e-learning. Two hypotheses were evolved to give direction to this study. Data were collected with the use of questionnaire and observation methods. Random sampling technique was used to draw five faculties out of nine in the University of Lagos, Nigeria. Lagos is chosen being the centre of excellence in Nigeria and the commercial capital of the nation. 1,450 undergraduate students were randomly drawn to constitute the sample size. Data obtained were statistically treated using descriptive statistics and population t-test. The study showed that students are ready for e-learning, and have the right learning attitude. The study also revealed that about half of the students have laptop as one of the personal technologies for e learning. Based on this finding, a case was made for active collaboration locally and internationally to develop and implement e-learning initiatives in Nigerian higher institutions for regular and distance learning students.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130752253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
MIZAN: A secure E-voting schema with vote changeability MIZAN:一个安全的电子投票模式,具有投票的可变性
2010 International Conference on Information Society Pub Date : 2010-06-28 DOI: 10.1109/I-SOCIETY16502.2010.6018774
M. Rezvani, S. Hamidi
{"title":"MIZAN: A secure E-voting schema with vote changeability","authors":"M. Rezvani, S. Hamidi","doi":"10.1109/I-SOCIETY16502.2010.6018774","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018774","url":null,"abstract":"This paper presents a new E-voting schema which allows the voters to participate in elections through Internet. It leverages Public Key Infrastructure (PKI) and the concept of voting ticket to meet two security requirements which are not thoroughly considered in previously proposed E-voting schema: Vote changeability (during voting period) and Indistinguishability of non-participants. The sketch of voting protocol and the evaluation of security requirements and a sample printout of implementation are provided. Furthermore, a web based Internet voting application is implemented based on MIZAN secure electronic voting schema.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123340887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Inclusive innovative services: Planning today to avoid future failure 包容性创新服务:规划今天,避免未来失败
2010 International Conference on Information Society Pub Date : 2010-06-28 DOI: 10.1109/I-SOCIETY16502.2010.6018742
M. Pluke, Martin Bocker, H. Huttenrauch, A. Rodríguez-Ascaso, Matthias Schneider, Erik Zetterstrom
{"title":"Inclusive innovative services: Planning today to avoid future failure","authors":"M. Pluke, Martin Bocker, H. Huttenrauch, A. Rodríguez-Ascaso, Matthias Schneider, Erik Zetterstrom","doi":"10.1109/I-SOCIETY16502.2010.6018742","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018742","url":null,"abstract":"Information and Communication Technologies (ICT) have the potential to enhance the lives of most users. However, new user interaction technologies are often introduced without taking into account the requirements of elderly and/or disabled users, resulting in products and services that are hardly usable by those users. ETSI, the European Telecommunications Standards Institute, has established a Specialist Task Force (STF) 377 which is developing a roadmap of forthcoming user-interaction technologies with a scope of ten years and which aims to identify relevant user requirements from an accessibility viewpoint as well as corresponding usability solutions. The results of investigations using this method allow stakeholders in different stages of the research and development lifecycle of e-Services to identify and avoid potential difficulties in the design of user interfaces which could cause elderly or disabled users to experience usability issues.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115267617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FERP mall role in FERP Web Services marketing FERP在FERP网络服务营销中的重要作用
2010 International Conference on Information Society Pub Date : 2010-06-28 DOI: 10.1109/I-SOCIETY16502.2010.6018812
E. Asfoura, N. Jamous, G. Kassem, R. Dumke
{"title":"FERP mall role in FERP Web Services marketing","authors":"E. Asfoura, N. Jamous, G. Kassem, R. Dumke","doi":"10.1109/I-SOCIETY16502.2010.6018812","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018812","url":null,"abstract":"The federated enterprise resource planning systems (FERP systems) based on Web Services (WS) is a new business idea, which should be implemented in an appropriate business model. This idea came to meet the growing needs of small — and medium-sized enterprises (SMEs) with regard to the expensive available software solutions. Due to the lack of pre-defined communication channels and areas of responsibility from enterprises and customers point of views, the determination and the direct contact of customers with multiple FERP service providers for adoption, customization and maintenance of such federated systems is very difficult and problematic. Therefore, an intermediary in this case, is meaningful and appropriate. This intermediary integrates the business functions required by users in an appropriate business process model as a workflow model. This approach presents the behavior of this integrator by the Service, process, and payment agreement among FERP WS providers and end-Customer enterprises for more security and better level of trust.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122741361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Computation-and communication-efficient three-party encrypted key exchange protocols 计算和通信效率高的三方加密密钥交换协议
2010 International Conference on Information Society Pub Date : 2010-06-28 DOI: 10.1109/I-SOCIETY16502.2010.6018720
Eunjun Yoon, K. Yoo
{"title":"Computation-and communication-efficient three-party encrypted key exchange protocols","authors":"Eunjun Yoon, K. Yoo","doi":"10.1109/I-SOCIETY16502.2010.6018720","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018720","url":null,"abstract":"This paper proposes computation-and communication-efficient three-party encrypted key exchange (CC3EKE) protocols to minimize the complexity of computational and communicational costs among all users and fit three-party communication environments. Compare with related 3EKE protocols, the proposed CC3EKE protocols have enhanced computational and communicational efficiency. As a result, the proposed protocols are extremely suitable for use in various applications over distributed three-party network environments such as the Internet and the mobile e-commerce.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134055277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Designing a distributed patch management security system 设计一个分布式补丁管理安全系统
2010 International Conference on Information Society Pub Date : 2010-06-28 DOI: 10.1109/I-SOCIETY16502.2010.6018816
Yonesy F. Nunez, Frances G. Gustavson, F. Grossman, C. Tappert
{"title":"Designing a distributed patch management security system","authors":"Yonesy F. Nunez, Frances G. Gustavson, F. Grossman, C. Tappert","doi":"10.1109/I-SOCIETY16502.2010.6018816","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018816","url":null,"abstract":"Over the last 10 years, the Internet has been the place of tremendous information security issues and vulnerabilities; in particular, the ability to patch systems very quickly has become a necessary requirement in order to provide a safe operating environment for all organizations. At the same time, the fast proliferation of systems and their respective vulnerabilities have become almost unmanageable for IT departments to withstand and secure according to the patch release schedules established by IT software vendors. This research reveals the fundamental limitations of the current patch management design systems, explores a possible solution, and investigates the practical development of a new approach for patch distribution. We will start by explaining the problem, followed by a review of the current state of affairs, determinant factors used to develop our methodology, and, finally, our proposed solution.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123461119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信