962 resultados para online services


Relevância:

60.00% 60.00%

Publicador:

Resumo:

This article considers the concept of media citizenship in relation to the digital strategies of the Special Broadcasting Service (SBS). At SBS, Australia’s multicultural public broadcaster, there is a critical appraisal of its strategies to harness user-created content (UCC) and social media to promote greater audience participation through its news and current affairs Web sites. The article looks at the opportunities and challenges that user-related content presents for public service media organizations as they consolidate multiplatform service delivery. Also analyzed are the implications of radio and television broadcasters’ moves to develop online services. It is proposed that case study methodologies enable an understanding of media citizenship to be developed that maintains a focus on the interaction between delivery technologies, organizational structures and cultures, and program content that is essential for understanding the changing focus of 21st-century public service media.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This article considers the concept of media citizenship in relation to the digital strategies of the Special Broadcasting Service (SBS). At SBS, Australia’s multicultural public broadcaster, there is a critical appraisal of its strategies to harness user-created content (UCC) and social media to promote greater audience participation through its news and current affairs Web sites. The article looks at the opportunities and challenges that user-created content presents for public service media organizations as they consolidate multiplatform service delivery. Also analyzed are the implications of radio and television broadcasters’ moves to develop online services. It is proposed that case study methodologies enable an understanding of media citizenship to be developed that maintains a focus on the interaction between delivery technologies, organizational structures and cultures, and program content that is essential for understanding the changing focus of 21st-century public service media.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Many governments world wide are attempting to increase accountability, transparency, and the quality of services by adopting information and communications technologies (ICTs) to modernize and change the way their administrations work. Meanwhile e-government is becoming a significant decision-making and service tool at local, regional and national government levels. The vast majority of users of these government online services see significant benefits from being able to access services online. The rapid pace of technological development has created increasingly more powerful ICTs that are capable of radically transforming public institutions and private organizations alike. These technologies have proven to be extraordinarily useful instruments in enabling governments to enhance the quality, speed of delivery and reliability of services to citizens and to business (VanderMeer & VanWinden, 2003). However, just because the technology is available does not mean it is accessible to all. The term digital divide has been used since the 1990s to describe patterns of unequal access to ICTs—primarily computers and the Internet—based on income, ethnicity, geography, age, and other factors. Over time it has evolved to more broadly define disparities in technology usage, resulting from a lack of access, skills, or interest in using technology. This article provides an overview of recent literature on e-government and the digital divide, and includes a discussion on the potential of e-government in addressing the digital divide.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Usability in HCI (Human-Computer Interaction) is normally understood as the simplicity and clarity with which the interaction with a computer program or a web site is designed. Identity management systems need to provide adequate usability and should have a simple and intuitive interface. The system should not only be designed to satisfy service provider requirements but it has to consider user requirements, otherwise it will lead to inconvenience and poor usability for users when managing their identities. With poor usability and a poor user interface with regard to security, it is highly likely that the system will have poor security. The rapid growth in the number of online services leads to an increasing number of different digital identities each user needs to manage. As a result, many people feel overloaded with credentials, which in turn negatively impacts their ability to manage them securely. Passwords are perhaps the most common type of credential used today. To avoid the tedious task of remembering difficult passwords, users often behave less securely by using low entropy and weak passwords. Weak passwords and bad password habits represent security threats to online services. Some solutions have been developed to eliminate the need for users to create and manage passwords. A typical solution is based on generating one-time passwords, i.e. passwords for single session or transaction usage. Unfortunately, most of these solutions do not satisfy scalability and/or usability requirements, or they are simply insecure. In this thesis, the security and usability aspects of contemporary methods for authentication based on one-time passwords (OTP) are examined and analyzed. In addition, more scalable solutions that provide a good user experience while at the same time preserving strong security are proposed.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In late 2007, Gold Coast City Council libraries embarked on an online library project, designed to ramp up libraries’ online services to customers. As part of this project, the Young People’s team identified a need to connect with youth aged 12 to 16 in the online environment, in order to create a direct channel of communication with this market segment and encourage them to engage with the library. Blogging was identified as an appropriate means of communicating with both current and potential library customers from this age group. The Young People’s team consequently prepared a concept plan for a youth blog for launch in Children’s Book Week 2008 and are working towards development of management and administrative models and documentation and implementation of the blog itself. While many libraries have been quick to take up Web 2.0-style services, there has been little formal publication about the successes (or failures) of this type of project. Likewise, few libraries have published about the planning, management, and administration of such services. The youth blog currently in development at Gold Coast City Council libraries will be supported by a robust planning phase and will be rigorously evaluated as part of the project. This paper will report on the project (its aims, objectives and outputs), the planning process, and the evaluation activities and outcomes.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Privacy is an important component of freedom and plays a key role in protecting fundamental human rights. It is becoming increasingly difficult to ignore the fact that without appropriate levels of privacy, a person’s rights are diminished. Users want to protect their privacy - particularly in “privacy invasive” areas such as social networks. However, Social Network users seldom know how to protect their own privacy through online mechanisms. What is required is an emerging concept that provides users legitimate control over their own personal information, whilst preserving and maintaining the advantages of engaging with online services such as Social Networks. This paper reviews “Privacy by Design (PbD)” and shows how it applies to diverse privacy areas. Such an approach will move towards mitigating many of the privacy issues in online information systems and can be a potential pathway for protecting users’ personal information. The research has also posed many questions in need of further investigation for different open source distributed Social Networks. Findings from this research will lead to a novel distributed architecture that provides more transparent and accountable privacy for the users of online information systems.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This paper reports the results of focus groups obtained as part of a full study that uses a mixed method approach to answer the following question: what are the cultural values that impact on e-service use in Saudi Arabia? In order to answer this question we reviewed culture theories, dimensions, and models that have been identified in the literature. Four focus groups interviewing experts and general users (customers) of online services in Saudi Arabia have been completed aiming at the end to identify the uncovered elements of Saudi culture in the literature, which hopefully will result in developing a framework of cultural values that affect e-service use in Saudi context. This paper will firstly, introduce the importance of culture and define the aspects of Saudi culture. It will then describe the method used, and finally discussing the findings of the focus groups. Findings revealed four factors that have not been covered in the literature and need to be investigated namely: nepotism, the lack of human interaction, services oriented culture, and the career path.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Most social network users hold more than one social network account and utilize them in different ways depending on the digital context. For example, friendly chat on Facebook, professional discussion on LinkedIn, and health information exchange on PatientsLikeMe. Thus many web users need to manage many disparate profiles across many distributed online sources. Maintaining these profiles is cumbersome, time consuming, inefficient, and leads to lost opportunity. In this paper we propose a framework for multiple profile management of online social networks and showcase a demonstrator utilising an open source platform. The result of the research enables a user to create and manage an integrated profile and share/synchronise their profiles with their social networks. A number of use cases were created to capture the functional requirements and describe the interactions between users and the online services. An innovative application of this project is in public health informatics. We utilize the prototype to examine how the framework can benefit patients and physicians. The framework can greatly enhance health information management for patients and more importantly offer a more comprehensive personal health overview of patients to physicians.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This book develops tools and techniques that will help urban residents gain access to urban computing. Metaphorically speaking, it is taking computing to the street by giving the general public – rather than just researchers and professionals – the power to leverage available city infrastructure and create solutions tailored to their individual needs. It brings together five chapters that are based on presentations given at the Street Computing Workshop held on 24 November 2009 in Melbourne in conjunction with the Australian Computer-Human Interaction Conference (OZCHI 2009). This book focuses on applying urban informatics, urban and community sensing and open application programming interfaces (APIs) to the public space through the delivery of online services, on demand and in real time. It then offers a case study of how the city of Singapore has harnessed the potential of an online infrastructure so that residents and visitors can access services electronically. This book was published as a special issue of the Journal of Urban Technology, 19(2), 2012.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Privacy is an important component of freedom and plays a key role in protecting fundamental human rights. It is becoming increasingly difficult to ignore the fact that without appropriate levels of privacy, a person’s rights are diminished. Users want to protect their privacy - particularly in “privacy invasive” areas such as social networks. However, Social Network users seldom know how protect their own privacy through online mechanisms. What is required is an emerging concept that provides users legitimate control over their own personal information, whilst preserving and maintaining the advantages of engaging with online services such as Social Networks. This paper reviews “Privacy by Design (PbD)” and shows how it applies to diverse privacy areas. Such an approach will move towards mitigating many of the privacy issues in online information systems and can be a potential pathway for protecting user’s personal information. The research has posed many questions in need of further investigation for different open source distributed Social Networks. Findings from this research will lead to a novel distributed architecture that provides more transparent and accountable privacy for the users of online information systems.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

An increasing range of services are now offered via online applications and e-commerce websites. However, problems with online services still occur at times, even for the best service providers due to the technical failures, informational failures, or lack of required website functionalities. Also, the widespread and increasing implementation of web services means that service failures are both more likely to occur, and more likely to have serious consequences. In this paper we first develop a digital service value chain framework based on existing service delivery models adapted for digital services. We then review current literature on service failure prevention, and provide a typology of technolo- gies and approaches that can be used to prevent failures of different types (functional, informational, system), that can occur at different stages in the web service delivery. This makes a contribution to theory by relating specific technologies and technological approaches to the point in the value chain framework where they will have the maximum impact. Our typology can also be used to guide the planning, justification and design of robust, reliable web services.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

It is 2015 and there are no indications that the relentless digital transformation of the music economy is about to slow down. Rather, the music economy continues to rapidly reinvent itself and industry powers, positions and practices that were redefined only a few years ago are being questioned once again. This paper examines the most recent changes of the music economy as it moves from a product-based towards an access-based logic. The paper starts out by recognising the essential role of technology in the evolution of the music economy. It then moves on to a discussion about the rise of so-called access-based music business models and points out some of the controversies and debates that are associated with these models and online services. With this as a background the paper explores how access-based music services and the algorithmically curated playlists developed by these services transform the relationship between artists, music and fans and challenges the music industrial power relationships and established industry practices once again.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In the context of an international economic shift from manufacturing to services and the constant expansion of industries towards online services (Sheth and Sharma, 2008), this study is concerned with the design of self-service technologies (SSTs) for online environments. An industry heavily adopting SSTs across a variety of different services is Health and Wellness, where figures show an ever growing number of health and wellness apps being developed, downloaded and abandoned (Kelley, 2014). Little is known about how to enhance people’s engagement with online wellness SSTs to support self-health management and self-efficacy. This literature review argues that service design of wellness SSTs in online contexts can be improved by developing an enhanced understanding from a people perspective and customer experience point of view. Customer value, quality of service, usability, and self-efficacy all play an important role in understanding how to design SSTs for wellness and keep users engaged. There is a need for further study on how people interact and engage with online services in the context of wellness in order to design engaging wellness services.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Employees and students in University of Helsinki use various services which require authentication. Some of these services require strong authentication. Traditionally this has been realized by meeting in person and presenting an official identification card. Some of these online services can be automatized by implementing existing techniques for strong authentication. Currently strong authentication is implemented by VETUMA-service. Mobile authentication is interesting alternative method. The purpose of this paper is to study the Mobile Signature Service technology and to find out the benefits and possibilities of its use for mobile authentication in University of Helsinki. Mobile authentication is suitable method for implementing strong authentication and for signing documents digitally. Mobile authentication can be used in many different ways in Helsinki university.