5 resultados para cloud computing, accountability,SLA ,responsibility,security,privacy,trust

em Helda - Digital Repository of University of Helsinki


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The management and coordination of business-process collaboration experiences changes because of globalization, specialization, and innovation. Service-oriented computing (SOC) is a means towards businessprocess automation and recently, many industry standards emerged to become part of the service-oriented architecture (SOA) stack. In a globalized world, organizations face new challenges for setting up and carrying out collaborations in semi-automating ecosystems for business services. For being efficient and effective, many companies express their services electronically in what we term business-process as a service (BPaaS). Companies then source BPaaS on the fly from third parties if they are not able to create all service-value inhouse because of reasons such as lack of reasoures, lack of know-how, cost- and time-reduction needs. Thus, a need emerges for BPaaS-HUBs that not only store service offers and requests together with information about their issuing organizations and assigned owners, but that also allow an evaluation of trust and reputation in an anonymized electronic service marketplace. In this paper, we analyze the requirements, design architecture and system behavior of such a BPaaS-HUB to enable a fast setup and enactment of business-process collaboration. Moving into a cloud-computing setting, the results of this paper allow system designers to quickly evaluate which services they need for instantiationg the BPaaS-HUB architecture. Furthermore, the results also show what the protocol of a backbone service bus is that allows a communication between services that implement the BPaaS-HUB. Finally, the paper analyzes where an instantiation must assign additional computing resources vor the avoidance of performance bottlenecks.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Ubiquitous computing is about making computers and computerized artefacts a pervasive part of our everyday lifes, bringing more and more activities into the realm of information. The computationalization, informationalization of everyday activities increases not only our reach, efficiency and capabilities but also the amount and kinds of data gathered about us and our activities. In this thesis, I explore how information systems can be constructed so that they handle this personal data in a reasonable manner. The thesis provides two kinds of results: on one hand, tools and methods for both the construction as well as the evaluation of ubiquitous and mobile systems---on the other hand an evaluation of the privacy aspects of a ubiquitous social awareness system. The work emphasises real-world experiments as the most important way to study privacy. Additionally, the state of current information systems as regards data protection is studied. The tools and methods in this thesis consist of three distinct contributions. An algorithm for locationing in cellular networks is proposed that does not require the location information to be revealed beyond the user's terminal. A prototyping platform for the creation of context-aware ubiquitous applications called ContextPhone is described and released as open source. Finally, a set of methodological findings for the use of smartphones in social scientific field research is reported. A central contribution of this thesis are the pragmatic tools that allow other researchers to carry out experiments. The evaluation of the ubiquitous social awareness application ContextContacts covers both the usage of the system in general as well as an analysis of privacy implications. The usage of the system is analyzed in the light of how users make inferences of others based on real-time contextual cues mediated by the system, based on several long-term field studies. The analysis of privacy implications draws together the social psychological theory of self-presentation and research in privacy for ubiquitous computing, deriving a set of design guidelines for such systems. The main findings from these studies can be summarized as follows: The fact that ubiquitous computing systems gather more data about users can be used to not only study the use of such systems in an effort to create better systems but in general to study phenomena previously unstudied, such as the dynamic change of social networks. Systems that let people create new ways of presenting themselves to others can be fun for the users---but the self-presentation requires several thoughtful design decisions that allow the manipulation of the image mediated by the system. Finally, the growing amount of computational resources available to the users can be used to allow them to use the data themselves, rather than just being passive subjects of data gathering.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This ethnographic study investigates encounters between volunteers and older people at the Kerava Municipal Health Centre inpatient ward for chronic care. Volunteer activities have been under development, in cooperation with the Voluntary Work Center (Talkoorengas), since the start of the 1990s. When my research began in 2003, nine of the volunteers came to the ward on set days per week or visited the ward according to their own timetables. The volunteers ranged in age from 54 to 78 years. With one exception, all of them were on pension. Nearly all of them had been volunteers for more than ten years. My study is research on ageing, the focal point being older people, whether volunteers or those receiving assistance. The research questions are: How is volunteer work implemented in daily routines at the ward? How is interaction created in encounters between the older people and the volunteers? What meanings does volunteer work create for the older people and the volunteers? The core material of my research is observation material, which is supplemented by interviews, documentation and photographs. The materials have been analysed by using theme analysis and ethnomethodological discussion analysis. In the presentation of the research findings, I have structured the materials into three main chapters: space and time; hands and touch; and words and tones. The chapter on space and time examines time and space paths, privacy and publicness, and celebrations as part of daily life. The volunteers open and create social arenas for the older people through chatting and singing together, celebrations in the dayroom or poetry readings at the bedside. The supporting theme of the chapter on hands and touch is bodily closeness in care and the associated concrete physical presence. The chapter highlights the importance of everyday routines, such as meals and rituals, as elements that bring security. Stimuli in daily life, such as handicrafts in groups, pass time but also give older people the experience of meaningful activity and bring back positive memories of their own life. The chapter on words and tones focuses on the social interaction and identity. The volunteers’ identity is built up into the identity of a helper and caregiver. The older people’s identity is built up into a care recipient’s identity, which in different situations is shaped into, among others, the identity of one who listens, remembers, does not remember, defends, composes poetry or is dying. The cornerstones of voluntary social care are participation, activity, trust and presence. Successful volunteer work calls for mutual trust between the older people, volunteers and the health care personnel, and for clear agreements on questions of responsibility, the status of volunteers and their role alongside professional personnel. This study indicates that volunteer work is a meaningful resource in work with older people.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Inter-enterprise collaboration has become essential for the success of enterprises. As competition increasingly takes place between supply chains and networks of enterprises, there is a strategic business need to participate in multiple collaborations simultaneously. Collaborations based on an open market of autonomous actors set special requirements for computing facilities supporting the setup and management of these business networks of enterprises. Currently, the safeguards against privacy threats in collaborations crossing organizational borders are both insufficient and incompatible to the open market. A broader understanding is needed of the architecture of defense structures, and privacy threats must be detected not only on the level of a private person or enterprise, but on the community and ecosystem levels as well. Control measures must be automated wherever possible in order to keep the cost and effort of collaboration management reasonable. This article contributes to the understanding of the modern inter-enterprise collaboration environment and privacy threats in it, and presents the automated control measures required to ensure that actors in inter-enterprise collaborations behave correctly to preserve privacy.