{"title":"Ubiquitous personalized learning environment in post-industrial society","authors":"A. Kojukhov, I. Levin","doi":"10.1109/I-SOCIETY16502.2010.6018717","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018717","url":null,"abstract":"The paper deals with the significant technological changes in engineering education in society when it moves into Post-Industrial age. We consider the following social trends and their influence on the engineering education: Virtualization, Personalization and Ubiquitous learning. The concept of Virtual Reality allows formulating the main features of the Post-Industrial engineering education and building the concept of ubiquitous personalized learning environment.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128465626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration of historic texts with technology","authors":"B. Groff","doi":"10.1109/I-SOCIETY16502.2010.6018715","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018715","url":null,"abstract":"How do historic texts, computers, and Organizational Leadership and Supervision (OLS) students interconnect? As it turns out, the combination is very intriguing and the resulting project is noteworthy. This paper discusses a course project that required leadership students to analyze historical documents based on their own knowledge and understanding of leadership policies and practices to determine if thoughts from long-ago could be incorporated into their modern leadership skill set. Each student was required to present his or her findings via a research paper, a research poster, and ultimately, by creating an engaging, stand-alone multimedia presentation.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127067213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Concurrent reduction of false positives and redundant alerts","authors":"J. Nehinbe","doi":"10.1109/I-SOCIETY16502.2010.6018721","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018721","url":null,"abstract":"The concurrent reductions of true and false positives in Intrusion Detection Systems are exploitable avenues for attacks to succeed for a number of reasons. Firstly, intrusion detectors can concurrently generate numerous false positives with true positives. Secondly, intrusion aggregation models that are designed to reduce alerts workload reduce clusters of true and false positives at the same rate because the reduction of alert redundancies is not separated from that of false positives. Consequently, there are growing rate of computer attacks despite the inclusion of network detectors on the networks. Therefore, this paper presents a model to investigate these problems. The model consisted of two cooperative components of clustering rules that respectively eliminated redundancies and false positives. Evaluations with series of synthetic and realistic datasets have demonstrated how network analysts could significantly reduce false positive and redundancies in realistic networks and how to promptly thwart ongoing attacks.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127481082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pedagogical immigration to 3D virtual worlds: A critical review of underlying themes and their concepts","authors":"N. Saleeb, Georgios A. Dafoulas","doi":"10.1109/I-SOCIETY16502.2010.6018737","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018737","url":null,"abstract":"A contentious issue has been in debate for the past decade, over the extent of dependency of current generations of students on information and communication technology (ICT) for education. Despite this controversy, there is a generalization amongst researchers that fundamental shifting of educational methods towards e-learning is deemed inevitable and beneficial to cater for emerging students' skills and preferences. One of these newly emergent e-learning platforms is 3D Virtual Learning Environments (VLEs) like Second Life. To the authors' knowledge, this paper is the first to derive and critically analyse, using grounded theory, advantageous and disadvantageous themes and their sub concepts of providing e-learning through 3DVLEs.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128952599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-education in Nigeria: Students' state of readiness for e learning at the University of Lagos","authors":"Alabi, Adefunke Olanike","doi":"10.1109/I-SOCIETY16502.2010.6018750","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018750","url":null,"abstract":"This study investigated the Nigerian undergraduate students' readiness for e-learning. Two hypotheses were evolved to give direction to this study. Data were collected with the use of questionnaire and observation methods. Random sampling technique was used to draw five faculties out of nine in the University of Lagos, Nigeria. Lagos is chosen being the centre of excellence in Nigeria and the commercial capital of the nation. 1,450 undergraduate students were randomly drawn to constitute the sample size. Data obtained were statistically treated using descriptive statistics and population t-test. The study showed that students are ready for e-learning, and have the right learning attitude. The study also revealed that about half of the students have laptop as one of the personal technologies for e learning. Based on this finding, a case was made for active collaboration locally and internationally to develop and implement e-learning initiatives in Nigerian higher institutions for regular and distance learning students.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130752253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MIZAN: A secure E-voting schema with vote changeability","authors":"M. Rezvani, S. Hamidi","doi":"10.1109/I-SOCIETY16502.2010.6018774","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018774","url":null,"abstract":"This paper presents a new E-voting schema which allows the voters to participate in elections through Internet. It leverages Public Key Infrastructure (PKI) and the concept of voting ticket to meet two security requirements which are not thoroughly considered in previously proposed E-voting schema: Vote changeability (during voting period) and Indistinguishability of non-participants. The sketch of voting protocol and the evaluation of security requirements and a sample printout of implementation are provided. Furthermore, a web based Internet voting application is implemented based on MIZAN secure electronic voting schema.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123340887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Pluke, Martin Bocker, H. Huttenrauch, A. Rodríguez-Ascaso, Matthias Schneider, Erik Zetterstrom
{"title":"Inclusive innovative services: Planning today to avoid future failure","authors":"M. Pluke, Martin Bocker, H. Huttenrauch, A. Rodríguez-Ascaso, Matthias Schneider, Erik Zetterstrom","doi":"10.1109/I-SOCIETY16502.2010.6018742","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018742","url":null,"abstract":"Information and Communication Technologies (ICT) have the potential to enhance the lives of most users. However, new user interaction technologies are often introduced without taking into account the requirements of elderly and/or disabled users, resulting in products and services that are hardly usable by those users. ETSI, the European Telecommunications Standards Institute, has established a Specialist Task Force (STF) 377 which is developing a roadmap of forthcoming user-interaction technologies with a scope of ten years and which aims to identify relevant user requirements from an accessibility viewpoint as well as corresponding usability solutions. The results of investigations using this method allow stakeholders in different stages of the research and development lifecycle of e-Services to identify and avoid potential difficulties in the design of user interfaces which could cause elderly or disabled users to experience usability issues.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115267617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FERP mall role in FERP Web Services marketing","authors":"E. Asfoura, N. Jamous, G. Kassem, R. Dumke","doi":"10.1109/I-SOCIETY16502.2010.6018812","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018812","url":null,"abstract":"The federated enterprise resource planning systems (FERP systems) based on Web Services (WS) is a new business idea, which should be implemented in an appropriate business model. This idea came to meet the growing needs of small — and medium-sized enterprises (SMEs) with regard to the expensive available software solutions. Due to the lack of pre-defined communication channels and areas of responsibility from enterprises and customers point of views, the determination and the direct contact of customers with multiple FERP service providers for adoption, customization and maintenance of such federated systems is very difficult and problematic. Therefore, an intermediary in this case, is meaningful and appropriate. This intermediary integrates the business functions required by users in an appropriate business process model as a workflow model. This approach presents the behavior of this integrator by the Service, process, and payment agreement among FERP WS providers and end-Customer enterprises for more security and better level of trust.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122741361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computation-and communication-efficient three-party encrypted key exchange protocols","authors":"Eunjun Yoon, K. Yoo","doi":"10.1109/I-SOCIETY16502.2010.6018720","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018720","url":null,"abstract":"This paper proposes computation-and communication-efficient three-party encrypted key exchange (CC3EKE) protocols to minimize the complexity of computational and communicational costs among all users and fit three-party communication environments. Compare with related 3EKE protocols, the proposed CC3EKE protocols have enhanced computational and communicational efficiency. As a result, the proposed protocols are extremely suitable for use in various applications over distributed three-party network environments such as the Internet and the mobile e-commerce.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134055277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yonesy F. Nunez, Frances G. Gustavson, F. Grossman, C. Tappert
{"title":"Designing a distributed patch management security system","authors":"Yonesy F. Nunez, Frances G. Gustavson, F. Grossman, C. Tappert","doi":"10.1109/I-SOCIETY16502.2010.6018816","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018816","url":null,"abstract":"Over the last 10 years, the Internet has been the place of tremendous information security issues and vulnerabilities; in particular, the ability to patch systems very quickly has become a necessary requirement in order to provide a safe operating environment for all organizations. At the same time, the fast proliferation of systems and their respective vulnerabilities have become almost unmanageable for IT departments to withstand and secure according to the patch release schedules established by IT software vendors. This research reveals the fundamental limitations of the current patch management design systems, explores a possible solution, and investigates the practical development of a new approach for patch distribution. We will start by explaining the problem, followed by a review of the current state of affairs, determinant factors used to develop our methodology, and, finally, our proposed solution.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123461119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}