998 resultados para Could computing


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ubiquitous and mobile computing has increased the level of social connectedness. In an era where technology has permeated into spaces of work, play and socializing, social influence has become an important consideration. The operationalization of the social influence construct in the technology adoption and use literature often assumes singular technology use contexts and purposes. We question whether social influence, as operationalized in IS, is reflective of the utilitarian, hedonic and social environment that many individuals operate in. We propose a framework to consider social influence more inclusively, drawing on differences in referent power and levels of expertise. We outline our research approach within the demographic segment of young working professionals. Research in this area is necessary to improve theoretical explanations of adoptive behavior of these technologies. We hope to contribute by suggesting a richer, more encompassing operationalization of the social influence construct for future IS research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this research-in-progress paper we argue that technology in the ubiquitous computing era offers experiences to users that extend well beyond the functional, practical applications offered in the world of work. In this era a realm of engagement is opening up to the individual that transcends the utilitarian, to encompass hedonic and social existence. Our central argument, therefore, is that user satisfaction is a notion which must extend to encompass rich, holistic human experience involving complex and fleeting interactions, driven by highly personal circumstances. We argue that the expectations, requirements and value perceptions of individuals in this dynamic context may only be anticipated and understood if situational factors (such as location, time, context, history-of-use) and quality of life factors (such as life stage, mobility, health, income, background, education) are taken into account. We identify the fundamental differences in key characteristics of user satisfaction between the traditional and ubiquitous computing environments and provide details about our own research approach, in which we are exploring ubiquitous content provision from the perspective of content providers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile information technologies (IT) are transforming individual work practices and organizations. These devices are extending not only the boundaries of the ‘office’ in space and time, but also the social context within which use occurs. In this paper, we investigate how extra-organizational influences can impact user satisfaction with mobile systems. The findings from our longitudinal study highlight the interrelatedness of different use contexts and their importance in perceptions of user satisfaction. The data indicate that varying social contexts of individual use (individual as employee, as professional, as private user, and as member of society) result in different social influences that affect the individual’s perceptions of user satisfaction with the mobile technology. While existing theories explain user satisfaction with IT within the organizational context, our findings suggest that future studies of mobile IT in organizations should accommodate such extra-organizational contextual influences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The general idea of cloud computing is offering computational resources as scalable, on demand services accessible over the internet. However, this new realisation of on demand computing is hindered by the amount of user involvement. Currently, high level abstractions in cloud computing only exist in the form of services. In particular, there is no effective means to publish, discover and finally use required services in clouds. In response, we propose a user level abstraction on top of already available cloud abstraction layers, present its concept using the resources via web services (RVWS) framework and demonstrate its feasibility by simplifying the exposure and use of clusters, a commonly used resource in cloud computing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security and privacy have been the major concern when people build computer networks and systems. Any computer network or system must be trustworthy to avoid the risk of losing control and retain confidence that it will not fail [1] Jun Ho Huh, John Lyle, Cornelius Namiluko and Andrew Martin, Managing application whitelists in trusted distributed systems. Future Generation Computer Systems,  27 2 (2011), pp. 211–226. [1]. Trust is the key factor to enable dynamic interaction and cooperation of various users, systems and services [2]. Trusted Computing aims at making computer networks, systems, and services available, predictable, traceable, controllable, assessable, sustainable, dependable, and security/privacy protectable. This special section focuses on the issues related to trusted computing, such as trusted computing models and specifications, trusted reliable and dependable systems, trustworthy services and applications, and trust standards and protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Disadvantaged students could be further concentrated in younger and regional universities if Bradley review recommendations on entitlements are implemented without stringent controls, derailing a major objective of the review, according to National Centre for Student Equity in Higher Education director Trevor Gale.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secondary Schools have been involved in Gender Based Violence (GBV) Prevention Education for many years. What, when and how this is done has always been difficult to assess. Programs come and go as governments react to public concerns and teachers and schools are expected to implement initiatives that are often reactions to public outcries. Teachers decide what they will teach and how they will teach it.  Last year I returned to work on a new initiative after a near 20-year break. I was surprised by the lack of change that had taken place over this period. There was still a lack of focus in schools, teachers were still reluctant to teach about it and ‘best practice’ appeared to be little different to that developed and implemented twenty years earlier. 

The purpose of this paper is to discuss the experience of teachers and students involved in a pilot of the Respectful Relationships curriculum materials trialled in Victoria in 2010. Using data collected from teachers and students as part of research to update the materials this paper explores the usefulness of the materials for teaching about GBV in secondary schools.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Establishing trust for resource sharing and collaboration has become an important issue in distributed computing environment. In this paper, we investigate the problem of establishing trust in hybrid cloud computing environments. As the scope of federated cloud computing enlarges to ubiquitous and pervasive computing, there will be a need to assess and maintain the trustworthiness of the cloud computing entities. We present a fully distributed framework that enable trust-based cloud customer and cloud service provider interactions. The framework aids a service consumer in assigning an appropriate weight to the feedback of different raters regarding a prospective service provider. Based on the framework, we developed a mechanism for controlling falsified feedback ratings from iteratively exerting trust level contamination due to falsified feedback ratings. The experimental analysis shows that the proposed framework successfully dilutes the effects of falsified feedback ratings, thereby facilitating accurate and fair assessment of the service reputations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider a cloud data storage involving three entities, the cloud customer, the cloud business centre which provides services, and the cloud data storage centre. Data stored in the data storage centre comes from a variety of customers and some of these customers may compete with each other in the market place or may own data which comprises confidential information about their own clients. Cloud staff have access to data in the data storage centre which could be used to steal identities or to compromise cloud customers. In this paper, we provide an efficient method of data storage which prevents staff from accessing data which can be abused as described above. We also suggest a method of securing access to data which requires more than one staff member to access it at any given time. This ensures that, in case of a dispute, a staff member always has a witness to the fact that she accessed data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While cloud computing (CC) is a scalable model of shared infrastructure and on-demand computing, it lacks a transparent trust and security mechanism. A data owner (DO) loses control over the data outsourced to a machine in the cloud controlled and operated by a cloud service provider (CSP). This machine is at a location unknown to a data owner. This loss of control over data is further intensified with the lack of managing users' access to the data from practical cloud computing perspectives. In this paper, we introduce a new mechanism of ensuring trust and security in Software as a Service (SaaS) CC. Trust Ticket, with the supporting protocols, is our mechanism that helps a data owner in establishing a link between a CSP and a registered user. In our mechanism, a user first gets registered with a DO before receiving a Trust Ticket and a secret key from that DO. Each Trust Ticket is unique and encrypted. On completing the registration of each user, the DO apprises the CSP of the Trust Ticket. Trust Ticket and secret key are respectively for the registered user's getting accepted to the CSP and having a view of the data owner's data upon a successful verification by the CSP. We have done our experiment in Java network programming by creating an emulated cloud computing framework under the VMware ESXi 4.1 hyper visor based platform. Using the framework, we have evaluated our algorithmic protocol for Trust Ticket. We have also compared our work with prior work. Overall performance of our work is better. We argue that our proposed algorithmic protocol for Trust Ticket deployment establishes a data owner's trust. This trust is established through a data owner's control over data and a registered user, because a registered user is linked with a CSP by a data owner through Trust Ticket.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The emergence of cloud computing has caused a significant change in how IT infrastructures are provided to research and business organizations. Instead of paying for expensive hardware and incur excessive maintenance costs, it is now possible to rent the IT infrastructure of other organizations for a minimal fee. While the existence of cloud computing is new. The elements used to create clouds have been around for some time. Cloud computing systems have been made possible through the use of large-scale clusters, service-oriented architecture (SOA), Web services, and virtualization. While the idea of offering resources via Web services is commonplace in cloud computing, little attention has been paid to the clients themselves specifically, human operators. Despite that clouds host a variety of resources which in turn are accessible to a variety of clients, support for human users is minimal.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter inquires into four very different Australian middle-school classrooms where teachers are innovating their practices and developing new approaches to aspects of English curriculum. These classrooms from diverse settings (one middle-class urban, one elite private inner urban, one regional disadvantaged, one middle-class regional) have all taken imaginative leaps and reworked their curricula to put the students’ needs at the centre. At one school, Year 8 students design, make and play their own computer games, at another Year 6 students script, design, craft and shoot their own claymation film; at another, Year 9 students use videogames as texts in their literature studies; and at another, a group of Year 6 students work with a theatre company and their teachers to rework Shakespeare into a contemporary, accessible, enjoyable performance. The chapter considers how in each case these different approaches engage and extend the students in meaningful and relevant ways. The chapter includes a mix of teacher and student interview data, principal data and teacher writing. The chapter investigates how each of these projects worked to achieve its aims and discusses how the single national curriculum might be re-envisioned in local contexts.