351 resultados para internet computing
Resumo:
As a decentralised communication technology, the Internet has offered much autonomy and unprecedented communication freedom to the Chinese public. Yet the Chinese government has imposed different forms of censorship over cyberspace. However, the Hong Kong erotic photo scandal reshuffles the traditional understanding of censorship in China as it points to a different territory. The paper takes the Hong Kong erotic photo scandal in 2008 as a case study and aims to examine the social and generational conflicts hidden in China. When thousands of photos containing sexually explicit images of Hong Kong celebrities were released on the Internet, gossip, controversies and eroticism fuelled the public discussion and threatened traditional values in China. The Internet provides an alternative space for the young Chinese who have been excluded from mainstream social discourse to engage in public debates. This, however, creates concerns, fear and even anger among the older generations in China, because they can no longer control, monitor and educate their children in the way that their predecessors have done for centuries. The photo scandal illustrates the internal social conflicts and distrust between generations in China and the generational conflict has a far-reaching political ramification as it creates a new concept of censorship.
Resumo:
Focuses on the various aspects of advances in future information communication technology and its applications Presents the latest issues and progress in the area of future information communication technology Applicable to both researchers and professionals These proceedings are based on the 2013 International Conference on Future Information & Communication Engineering (ICFICE 2013), which will be held at Shenyang in China from June 24-26, 2013. The conference is open to all over the world, and participation from Asia-Pacific region is particularly encouraged. The focus of this conference is on all technical aspects of electronics, information, and communications ICFICE-13 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of FICE. In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in FICE. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject. "This work was supported by the NIPA (National IT Industry Promotion Agency) of Korea Grant funded by the Korean Government (Ministry of Science, ICT & Future Planning)."
Unpacking user relations in an emerging ubiquitous computing environment : introducing the bystander
Resumo:
The move towards technological ubiquity is allowing a more idiosyncratic and dynamic working environment to emerge that may result in the restructuring of information communication technologies, and changes in their use through different user groups' actions. Taking a ‘practice’ lens to human agency, we explore the evolving roles of, and relationships between these user groups and their appropriation of emergent technologies by drawing upon Lamb and Kling's social actor framework. To illustrate our argument, we draw upon a study of a UK Fire Brigade that has introduced a variety of technologies in an attempt to move towards embracing mobile and ubiquitous computing. Our analysis of the enactment of such technologies reveals that Bystanders, a group yet to be taken as the central unit of analysis in information systems research, or considered in practice, are emerging as important actors. The research implications of our work relate to the need to further consider Bystanders in deployments other than those that are mobile and ubiquitous. For practice, we suggest that Bystanders require consideration in the systems development life cycle, particularly in terms of design and education in processes of use.
Resumo:
In this study we develop a theorization of an Internet dating site as a cultural artifact. The site, Gaydar, is targeted at gay men. We argue that contemporary received representations of their sexuality figure heavily in the site’s focus by providing a cultural logic for the apparent ad hoc development trajectories of its varied commercial and non-‐commercial services. More specifically, we suggest that the growing sets of services related to the website are heavily enmeshed within current social practices and meanings. These practices and meanings are, in turn, shaped by the interactions and preferences of a variety of diverse groups involved in what is routinely seen within the mainstream literature as a singularly specific sexuality and cultural project. Thus, we attend to two areas – the influence of the various social engagements associated with Gaydar together with the further extension of its trajectory ‘beyond the web’. Through the case of Gaydar, we contribute a study that recognizes the need for attention to sexuality in information systems research and one which illustrates sexuality as a pivotal aspect of culture. We also draw from anthropology to theorize ICTs as cultural artifacts and provide insights into the contemporary phenomena of ICT enabled social networking.
Resumo:
The main theme of this thesis is to allow the users of cloud services to outsource their data without the need to trust the cloud provider. The method is based on combining existing proof-of-storage schemes with distance-bounding protocols. Specifically, cloud customers will be able to verify the confidentiality, integrity, availability, fairness (or mutual non-repudiation), data freshness, geographic assurance and replication of their stored data directly, without having to rely on the word of the cloud provider.
Resumo:
Information accountability is seen as a mode of usage control on the Web. Due to its many dimensions, information accountability has been expressed in various ways by computer scientists to address security and privacy in recent times. Information accountability is focused on how users participate in a system and the underlying policies that govern the participation. Healthcare is a domain in which the principles of information accountability can be utilised well. Modern health information systems are Internet based and the discipline is called eHealth. In this paper, we identify and discuss the goals of accountability systems and present the principles of information accountability. We characterise those principles in eHealth and discuss them contextually. We identify the current impediments to eHealth in terms of information privacy issues of eHealth consumers together with information usage requirements of healthcare providers and show how information accountability can be used in a healthcare context to address these needs. The challenges of implementing information accountability in eHealth are also discussed in terms of our efforts thus far.
Resumo:
The purpose of this paper is to provide an evolutionary perspective of cloud computing (CC) by integrating two previously disparate literatures: CC and information technology outsourcing (ITO). We review the literature and develop a framework that highlights the demand for the CC service, benefits, risks, as well as risk mitigation strategies that are likely to influence the success of the service. CC success in organisations and as a technology overall is a function of (i) the outsourcing decision and supplier selection, (ii) contractual and relational governance, and (iii) industry standards and legal framework. Whereas CC clients have little control over standards and/or the legal framework, they are able to influence other factors to maximize the benefits while limiting the risks. This paper provides guidelines for (potential) cloud computing users with respect to the outsourcing decision, vendor selection, service-level-agreements, and other issues that need to be addressed when opting for CC services. We contribute to the literature by providing an evolutionary and holistic view of CC that draws on the extensive literature and theory of ITO. We conclude the paper with a number of research paths that future researchers can follow to advance the knowledge in this field.
Resumo:
This paper examines the case of the Forgotten Australians as an opportunity to examine the role of the internet in the presentation of testimony. ‘Forgotten Australians’ are a group who suffered abuse and neglect after being removed from their parents – either in Australia or in the UK - and placed in Church and State run institutions in Australia between 1930 and 1970. The campaign by this profoundly marginalised group coincided with the decade in which the opportunities of Web 2.0 were seen to be diffusing throughout different social groups, and were considered a tool for social inclusion. We outline a conceptual framework that positions the role of the internet as an environment in which the difficult relationships between painful past experiences and contemporary injunctions to remember them, are negotiated. We then apply this framework to the analysis of case examples of posts and interaction on websites with web 2.0 functionality: YouTube and the National Museum of Australia. The analysis points to commonalities and differences in the agency of the internet in these two contexts, arguing that in both cases the websites provided support for the development of a testimony-like narrative and the claiming, sharing and acknowledgement of loss.
Resumo:
The thesis is a comparative study of ICTs and Internet use of Australian and Malaysian early childhood teachers in terms of their personal and professional comfort with ICTs, pedagogical beliefs, and their reported classroom practice. The study discovered teachers from both countries as relatively comfortable with digital technologies and the Internet, with most teachers held positive beliefs about ICT usage. The structural barriers in classrooms include lack of Internet access and the wide gap that exists between teachers’ positive beliefs and classroom practice. The study suggests the need for strategic and targeted professional development for teachers.
Resumo:
This special issue of the Journal of Urban Technology brings together five articles that are based on presentations given at the Street Computing Workshop held on 24 November 2009 in Melbourne in conjunction with the Australian Computer- Human Interaction conference (OZCHI 2009). Our own article introduces the Street Computing vision and explores the potential, challenges, and foundations of this research trajectory. In order to do so, we first look at the currently available sources of information and discuss their link to existing research efforts. Section 2 then introduces the notion of Street Computing and our research approach in more detail. Section 3 looks beyond the core concept itself and summarizes related work in this field of interest. We conclude by introducing the papers that have been contributed to this special issue.
Resumo:
This research explores the relationship between international entrepreneurship characteristics and the use of Internet capabilities for the international business processes of the firm. It has been suggested, that the accumulation of a firms Internet capability can assist international operations, especially when operating in fast changing dynamic Internet environments. However, international entrepreneurship characteristics which are seen as a precursor to leveraging Internet capabilities are still vague. Given this finding, eight case studies of small and medium sized travel and tourism firms were selected to investigate the influence of international entrepreneurship characteristics, and Internet capabilities for international business processes. Based on the eight in-depth case studies, the results signify that successful international entrepreneurial firms which encompass high levels of international innovativeness and proactiveness behaviour integrate Internet capabilities to a greater degree. Our findings also indicate that the prior international business experience, international risk-taking propensity and international networking characteristics are not necessarily precursors to successful integration of Internet capabilities for international business processes. On the contrary, international business experience and international networks actually lead to a reliance on traditional mechanisms of internationalisation and can dilute the development of Internet capabilities for international business processes.
Resumo:
This study uses the well-known social networking site, Facebook (FB), for a study of differences in perceptions on the use of technologies in the classroom around the world. This study is part of a larger project exploring telecollaboration and the use of online discussions between graduate students in an online masters program based in Australia and students in the graduate education program at a regional university in Greece. Postings reveal more similarities between the situations and perceptions of the participants from the different countries than differences. Most participants indicated that while they and their students had access in general to computers and the internet, they did not necessarily have this access in the classroom. Even when technologies were available in schools, participants identified a critical need for professional development to increase teachers’ use of ICT. These findings are relevant to educators and policy development in terms of implementation of ICT or social networking in the language classroom.
Resumo:
The topic of “the cloud” has attracted significant attention throughout the past few years (Cherry 2009; Sterling and Stark 2009) and, as a result, academics and trade journals have created several competing definitions of “cloud computing” (e.g., Motahari-Nezhad et al. 2009). Underpinning this article is the definition put forward by the US National Institute of Standards and Technology, which describes cloud computing as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction” (Garfinkel 2011, p. 3). Despite the lack of consensus about definitions, however, there is broad agreement on the growing demand for cloud computing. Some estimates suggest that spending on cloudrelated technologies and services in the next few years may climb as high as USD 42 billion/year (Buyya et al. 2009).
Resumo:
Although the tourism industry has been dramatically altered due to the Internet, there has been limited research published about international entrepreneurial values and Internet use in tourism firms. The findings of this study point to a relationship between the values of Internet-enabled international entrepreneurs in small-sized to medium-sized enterprises and the inclination of the firm to develop and initiate international activity. The findings of this study suggest that Internet-enabled tourism entrepreneurs share similar construct values. Two effective but underutilized qualitative methods were used in this study. The first method, repertory test, is an efficient technique for exploring constructs in decision making; the second method, laddering analysis, facilitates understanding of the perceived consequences and personal values guiding behaviour.
Resumo:
The Internet of Things facilitates the identification, digitization, and control of physical objects. However, it is the availability of cost effective sensors, mobile smart devices, scalable cloud infrastructure, and advanced analytics that have consumerized the Internet of Things. The accessibility of digital representations of things has transformative potential and provides entire new affordances for organizations and their ecosystems across most industries.