{"title":"Accessible and secure? Design constraints on image and sound based passwords","authors":"Marcia Gibson, M. Conrad, C. Maple, K. Renaud","doi":"10.1109/I-SOCIETY16502.2010.6018741","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018741","url":null,"abstract":"When members of society cannot access the World Wide Web, or the information and services it contains in a meaningful or useful way, they can become digitally excluded. Many factors have been highlighted as having an effect on the likelihood of exclusion, including psychological, material and skills related barriers. In this paper, we consider the role played by authentication systems in the divide. In light of the widely researched tension between aspects of usability and security in authentication, we identify a number of conflicting accessibility and security goals as manifested in image and sound based schemes.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132896001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User authentication on smart phones using a data mining method","authors":"Yujin Tang, Nakazato Hidenori, Y. Urano","doi":"10.1109/I-SOCIETY16502.2010.6018818","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018818","url":null,"abstract":"The 21st century witnessed the wide spread of smart phones such as iPhone. The daily growing importance of smart phones' also implies the increasing amount of user sensitive data stored in a cell phone, which positions mobile user authentication in an even more important role. Existing mobile user authentication methods either require special hardware or are not user transparent. In this paper, we present a mobile user authentication scheme using a data mining method that identifies a user based on cell phones' application history and GPS information. These data can be collected on almost every smart phone without user awareness and are prone to reflect a user's habit and biometric feature. We organize these data in directional graphs and introduce a metric based on which to classify the data. Experiments and results on real data are explained to show our scheme's effectiveness.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"323 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133336215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Best practices for technical aspects of software testing in enterprises","authors":"Tim A. Majchrzak","doi":"10.1109/I-SOCIETY16502.2010.6018823","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018823","url":null,"abstract":"Software testing is essential for the creation of high quality software products. Since it is an expensive task and hard to manage, its organizational implementation has to be well founded. We worked with regional companies in order to learn about their distinct weaknesses and strengths in software development. Eventually, we deduced best practices for software testing. In this paper we sketch the research methodology used. We present four important best practices focusing on technical aspects of testing in organizations. For each of the four recommendations we give implementation advice based on a categorization framework.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126019345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collaborative web tools to enhance efficiency and effectiveness in learning and teaching","authors":"J. Rosbottom, Jean-Marc Lecarpentier","doi":"10.1109/I-SOCIETY16502.2010.6018777","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018777","url":null,"abstract":"We identify some principles, and some practices, for enhancing the efficiency and effectiveness of teachers using web-based, eLearning and eAdministration tools in a mostly campus-based learning environment. We consider the whole of a teacher's role, embracing the facilitation of learning, the administration of learning, and the assessment of students, with the aim of enhancing job satisfaction for the teacher, and depth of learning for the student. The key principles we seek in eLearning and eAdministration tools are simplicity, versatility and a decentralised, but collaborative, mode of operation which we illustrate through case studies of our own work and that of others. In this paper we review relevant learning and assessment models, explicate the key principles for supporting the teacher's role with web-based tools, and provide numerous illustrative examples.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125208761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An ecological mobile system implemented on Amazon forest: Challenges and approaches","authors":"Alvaro Fagner R. da Silva, P. L. Corrêa","doi":"10.1109/I-SOCIETY16502.2010.6018764","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018764","url":null,"abstract":"The ecological niche distribution modeling uses known data about the presence of species to predict the probability to the specie survive on a specific area. The data collection is made in field and this kind of system needs data reliable enough. This paper analyses the viability of a mobile system that enables the distribution modeling to run on a smart phone and shows the challenges to put this system in use on the middle of the Amazon forest.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129940720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Articulating stakeholders perspectives of culture-sensitive e-commerce design targeting female consumers in Saudi Arabia","authors":"K. Rambo, Kecheng Liu","doi":"10.1109/I-SOCIETY16502.2010.6018746","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018746","url":null,"abstract":"A stakeholder in a project is much more than a product's eventual “user”. In other words, a stakeholder is someone who gains or losses something (could be functionality, revenue, status, compliance with rules, and so on) as a result of that project. This paper will identify the key stakeholders involved in the process of design and adoption of B2C e-commerce applications and targeting female consumers in Saudi Arabia. It will also define each stakeholder's role, responsibility, and influence on female consumers adoption and design of e-commerce applications","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129558290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Taciana Rached, Danilo Freire de S. Santos, A. Perkusich, H. Almeida, Maurus Marques de Almeida Holanda
{"title":"BCI-aware pervasive multimedia for motor disabled people","authors":"Taciana Rached, Danilo Freire de S. Santos, A. Perkusich, H. Almeida, Maurus Marques de Almeida Holanda","doi":"10.1109/I-SOCIETY16502.2010.6018801","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018801","url":null,"abstract":"Assistive technologies have a major impact in the life of people with severe neuromuscular diseases in order to provide or extend functional abilities of people with special needs. Such technologies promote independent life, social inclusion and improve quality of life of disabled people. Brain-Computer Interface (BCI) is a recent technology that allows the direct communication between the brain and the environment. The development of systems that integrates BCI, smart devices and pervasive services enables motor disabled people to control devices anytime and anywhere. This paper presents an architecture for the development of BCI-aware pervasive systems to control multimedia devices. The user needs an electroencephalography (EEG) device and a smart device to interact with any multimedia device. This paper brings the implementation of a BCI-aware pervasive system that enables users to control the XBMC media center to play music or videos.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129300038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cognitive agent based intelligent warning system to monitor patients suffering from dementia using ambient assisted living","authors":"S. Nefti, U. Manzoor, Salman Manzoor","doi":"10.1109/I-SOCIETY16502.2010.6018802","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018802","url":null,"abstract":"Dementia causes a progressive degradation of mental abilities leading the patient to forget and have problems thinking and reasoning. As the disease is progressive it is possible for patients in the early or intermediate stages to manage within their own home; however as the disease becomes more serious and the patient more susceptible to forgetfulness or confusion the health and safety risk within the home increases. This paper outlines a system targeted at monitoring patients in an unobtrusive way to minimize risk exposure within the home and alert a patient when a risk is present or a local authority when a risk is ignored. We proposed the use of Multi-agent systems for ambient assisted living and at present there is no system that combines the information obtained from a range of sensors to provide an ambient assisted living system focused on risk analysis and reduction for dementia patients.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124295170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud computing security challenges and methods to remotely augment a cloud's security posture","authors":"Robert E. Johnson","doi":"10.1109/I-SOCIETY16502.2010.6018819","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018819","url":null,"abstract":"The utilization of cloud-based resources is expanding at an incredible rate. Unfortunately, methods to secure the cloud are not being developed and made commercially available for implementation at the same rate. It has been common, and almost universally accepted that cloud resources can be protected using existing security tools. This paper will explore weaknesses in cloud security, based on current commercial security tools. In addition, new methods and tools will be proposed to augment cloud security strategies.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124553083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent systems for predicting and analyzing data in Power Grid Companies","authors":"A. Bâra, Ion Lungu, M. Velicanu, S. Oprea","doi":"10.1109/I-SOCIETY16502.2010.6018710","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018710","url":null,"abstract":"Developing intelligent systems in public institutions such as the Power Grid Companies require efficient methods in order to support better decisions. The Power Grid Companies must fundament their investment decisions by estimating all the benefits and costs during the life cycle of a wind power plant. In order to estimate the financial feasibility, they need to know with certain accuracy the output of these power plants. But the main problem is that the wind power output is difficult to be forecasted by statistical methods due to the fact that the wind speed significantly fluctuates even during a day at the same location. Also, the reserves must be properly dimensioned in order to prevent system's crash. In this paper we present a solution for developing an intelligent system in the National Power Grid Company that can predict the wind power output and allocate the resources in order to improve the financial feasibility of investment.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128364426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}