970 resultados para Internet hosting services
Resumo:
In this study we develop a theorization of an Internet dating site as a cultural artifact. The site, Gaydar, is targeted at gay men. We argue that contemporary received representations of their sexuality figure heavily in the site’s focus by providing a cultural logic for the apparent ad hoc development trajectories of its varied commercial and non-‐commercial services. More specifically, we suggest that the growing sets of services related to the website are heavily enmeshed within current social practices and meanings. These practices and meanings are, in turn, shaped by the interactions and preferences of a variety of diverse groups involved in what is routinely seen within the mainstream literature as a singularly specific sexuality and cultural project. Thus, we attend to two areas – the influence of the various social engagements associated with Gaydar together with the further extension of its trajectory ‘beyond the web’. Through the case of Gaydar, we contribute a study that recognizes the need for attention to sexuality in information systems research and one which illustrates sexuality as a pivotal aspect of culture. We also draw from anthropology to theorize ICTs as cultural artifacts and provide insights into the contemporary phenomena of ICT enabled social networking.
Resumo:
The travel industry has come to rely heavily on information and communication technologies to facilitate relations with consumers. Compiling consumer data profiles has become easier and it is generally thought that this has led to an increase in consumers' privacy concerns, which may have an adverse impact on their willingness to purchase online. Three specific aspects of privacy that have received attention from researchers are unauthorized secondary use of data, invasion of privacy, and errors. A study was undertaken to examine the effects of these factors on prior purchase of travel services via the Internet and future purchase probability. No evidence was found to indicate that such privacy concerns affect online purchase behavior within the travel industry. Managerial implications are discussed.
Resumo:
Currently, the GNSS computing modes are of two classes: network-based data processing and user receiver-based processing. A GNSS reference receiver station essentially contributes raw measurement data in either the RINEX file format or as real-time data streams in the RTCM format. Very little computation is carried out by the reference station. The existing network-based processing modes, regardless of whether they are executed in real-time or post-processed modes, are centralised or sequential. This paper describes a distributed GNSS computing framework that incorporates three GNSS modes: reference station-based, user receiver-based and network-based data processing. Raw data streams from each GNSS reference receiver station are processed in a distributed manner, i.e., either at the station itself or at a hosting data server/processor, to generate station-based solutions, or reference receiver-specific parameters. These may include precise receiver clock, zenith tropospheric delay, differential code biases, ambiguity parameters, ionospheric delays, as well as line-of-sight information such as azimuth and elevation angles. Covariance information for estimated parameters may also be optionally provided. In such a mode the nearby precise point positioning (PPP) or real-time kinematic (RTK) users can directly use the corrections from all or some of the stations for real-time precise positioning via a data server. At the user receiver, PPP and RTK techniques are unified under the same observation models, and the distinction is how the user receiver software deals with corrections from the reference station solutions and the ambiguity estimation in the observation equations. Numerical tests demonstrate good convergence behaviour for differential code bias and ambiguity estimates derived individually with single reference stations. With station-based solutions from three reference stations within distances of 22–103 km the user receiver positioning results, with various schemes, show an accuracy improvement of the proposed station-augmented PPP and ambiguity-fixed PPP solutions with respect to the standard float PPP solutions without station augmentation and ambiguity resolutions. Overall, the proposed reference station-based GNSS computing mode can support PPP and RTK positioning services as a simpler alternative to the existing network-based RTK or regionally augmented PPP systems.
Resumo:
The project is a qualitative and ethnographic study investigating how the internet is used by migrants from cultural and linguistically diverse (CALD) groups. It examines how internet use assists the re- settlement process in Brisbane, Australia. The project aims to support strategies and initiatives in the successful re-settlement of migrants from CALD groups into urban localities. It has 2 main foci: • To find out how and what type of online information and services are used by migrants and what are the barriers to accessing the information. Information and resources about transport, housing, health, social services, education and other information is essential for successful re-settlement. • In what ways is the internet is used as a social medium, to communicate with friends and family in homeland countries and connect with people in local regions, in ways that might help to combat social isolation.
Resumo:
Recently, botnet, a network of compromised computers, has been recognized as the biggest threat to the Internet. The bots in a botnet communicate with the botnet owner via a communication channel called Command and Control (C & C) channel. There are three main C & C channels: Internet Relay Chat (IRC), Peer-to-Peer (P2P) and web-based protocols. By exploiting the flexibility of the Web 2.0 technology, the web-based botnet has reached a new level of sophistication. In August 2009, such botnet was found on Twitter, one of the most popular Web 2.0 services. In this paper, we will describe a new type of botnet that uses Web 2.0 service as a C & C channel and a temporary storage for their stolen information. We will then propose a novel approach to thwart this type of attack. Our method applies a unique identifier of the computer, an encryption algorithm with session keys and a CAPTCHA verification.
Resumo:
This article presents an overview of two aspects of the role the internet now plays in the court system - first, the extent to which judges, administrators and court officials at the different levels in the court hierarchy are using the internet to deliver enhanced access to the Australian justice system for the community as a whole, and second, how they have embraced that same technology as an aid for accessing information for better judgment delivery and administration.
Resumo:
BACKGROUND: E-health has become a burgeoning field in which health professionals and health consumers create and seek information. E-health refers to internet-based health care and information delivery and seeks to improve health service locally, regionally and worldwide. E-sexual health presents new opportunities to provide online sexual health services irrespective of gender, age, sexual orientation and location. DISCUSSION: The paper used the dimensions of the RE-AIM model (reach, efficacy, adoption, implementation and maintenance) as a guiding principle to discuss potentials of E-health in providing and accessing sexual health services. There are important issues in relation to utilising and providing online sexual health services. For healthcare providers, e-health can act as an opportunity to enhance their clients' sexual health care by facilitating communication with full privacy and confidentiality, reducing administrative costs and improving efficiency and flexibility as well as market sexual health services and products. Sexual health is one of the common health topics which both younger and older people explore on the internet and they increasingly prefer sexual health education to be interactive, non-discriminate and anonymous. This commentary presents and discusses the benefits of e-sexual health and provides recommendations towards addressing some of the emerging challenges. FUTURE DIRECTIONS: The provision of sexual health services can be enhanced through E-health technology. Doing this can empower consumers to engage with information technology to enhance their sexual health knowledge and quality of life and address some of the stigma associated with diversity in sexualities and sexual health experiences. In addition, e-sexual health may better support and enhance the relationship between consumers and their health care providers across different locations. However, a systematic and focused approach to research and the application of findings in policy and practice is required to ensure that E-health benefits all population groups and the information is current and clinically valid and effective, including preventative approaches for various client groups with diverse needs.
Resumo:
As each day passes, and as new and better devices and services are developed, more and more government and private services are being moved to an online format. This movement makes access to the internet an essential for 21st Century life. The internet has become so integrated in our lives that many of us cannot imagine how we could operate without it. This omnipresent ‘being’ affects all forms of ‘normal’ social and economic activity and does so in ways that we do not realize. Those with access are able to engage with government, business, and family and friends more easily, which can lead to an improved standard of living. For the disadvantaged, however – those with the desire but without the capacity – a lack of access can be socially isolating. "Between the idea And the reality Between the motion And the act Falls the Shadow – T. S. Elliott. “The Hollow Men” Engagement in the internet economy requires both physical access and the individual to have the necessary finances and skills to make and sustain their use. If governments and the international community want a fully functioning internet economy this requires that all individuals must be operating in it. That not all individuals do so means, very simply, that the internet economy is not fully functioning. The text contextualizes for policy makers and legislatures why it is essential to ensure that individuals have appropriate access to the internet and what can be done to achieve it. The interrelationship/overlap between why access is essential, how it can be achieved and the central role of the individual to the internet economy is explored and translated into the concept of connectedness. From this, solutions for ensuring connectedness for all individuals are developed. It is Dr Cradduck’s hope that in the not too distant future readers will puzzle over why texts such as this needed to be written.
Resumo:
Purpose Health service quality is an important determinant for health service satisfaction and behavioral intentions. The purpose of this paper is to investigate requirements of e‐health services and to develop a measurement model to analyze the construct of “perceived e‐health service quality.” Design/methodology/approach The paper adapts the C‐OAR‐SE procedure for scale development by Rossiter. The focal aspect is the “physician‐patient relationship” which forms the core dyad in the healthcare service provision. Several in‐depth interviews were conducted in Switzerland; first with six patients (as raters), followed by two experts of the healthcare system (as judges). Based on the results and an extensive literature research, the classification of object and attributes is developed for this model. Findings The construct e‐health service quality can be described as an abstract formative object and is operationalized with 13 items: accessibility, competence, information, usability/user friendliness, security, system integration, trust, individualization, empathy, ethical conduct, degree of performance, reliability, and ability to respond. Research limitations/implications Limitations include the number of interviews with patients and experts as well as critical issues associated with C‐OAR‐SE. More empirical research is needed to confirm the quality indicators of e‐health services. Practical implications Health care providers can utilize the results for the evaluation of their service quality. Practitioners can use the hierarchical structure to measure service quality at different levels. The model provides a diagnostic tool to identify poor and/or excellent performance with regard to the e‐service delivery. Originality/value The paper contributes to knowledge with regard to the measurement of e‐health quality and improves the understanding of how customers evaluate the quality of e‐health services.
Resumo:
In his 1987 book, The Media Lab: Inventing the Future at MIT, Stewart Brand provides an insight into the visions of the future of the media in the 1970s and 1980s. 1 He notes that Nicolas Negroponte made a compelling case for the foundation of a media laboratory at MIT with diagrams detailing the convergence of three sectors of the media—the broadcast and motion picture industry; the print and publishing industry; and the computer industry. Stewart Brand commented: ‘If Negroponte was right and communications technologies really are converging, you would look for signs that technological homogenisation was dissolving old boundaries out of existence, and you would expect an explosion of new media where those boundaries used to be’. Two decades later, technology developers, media analysts and lawyers have become excited about the latest phase of media convergence. In 2006, the faddish Time Magazine heralded the arrival of various Web 2.0 social networking services: You can learn more about how Americans live just by looking at the backgrounds of YouTube videos—those rumpled bedrooms and toy‐strewn basement rec rooms—than you could from 1,000 hours of network television. And we didn’t just watch, we also worked. Like crazy. We made Facebook profiles and Second Life avatars and reviewed books at Amazon and recorded podcasts. We blogged about our candidates losing and wrote songs about getting dumped. We camcordered bombing runs and built open‐source software. America loves its solitary geniuses—its Einsteins, its Edisons, its Jobses—but those lonely dreamers may have to learn to play with others. Car companies are running open design contests. Reuters is carrying blog postings alongside its regular news feed. Microsoft is working overtime to fend off user‐created Linux. We’re looking at an explosion of productivity and innovation, and it’s just getting started, as millions of minds that would otherwise have drowned in obscurity get backhauled into the global intellectual economy. The magazine announced that Time’s Person of the Year was ‘You’, the everyman and everywoman consumer ‘for seizing the reins of the global media, for founding and framing the new digital democracy, for working for nothing and beating the pros at their own game’. This review essay considers three recent books, which have explored the legal dimensions of new media. In contrast to the unbridled exuberance of Time Magazine, this series of legal works displays an anxious trepidation about the legal ramifications associated with the rise of social networking services. In his tour de force, The Future of Reputation: Gossip, Rumor, and Privacy on the Internet, Daniel Solove considers the implications of social networking services, such as Facebook and YouTube, for the legal protection of reputation under privacy law and defamation law. Andrew Kenyon’s edited collection, TV Futures: Digital Television Policy in Australia, explores the intersection between media law and copyright law in the regulation of digital television and Internet videos. In The Future of the Internet and How to Stop It, Jonathan Zittrain explores the impact of ‘generative’ technologies and ‘tethered applications’—considering everything from the Apple Mac and the iPhone to the One Laptop per Child programme.
Resumo:
Purpose This paper aims to use the Model of Goal-Directed Behavior (MGB) to examine the factors affecting consumers’ continued use of emerging technology-based self-services (TBSSs) with credence qualities. Professional services, which traditionally require specialized knowledge and high levels of interpersonal interaction to produce owing to their credence qualities, are increasingly delivered via self-service technologies. Health services delivered via mobile devices, for example, facilitate self-care without direct involvement from health professionals. Design/methodology/approach A mental health service delivered via the Internet and mobile phone, myCompass, was selected as the research context. Twenty interviews were conducted with users of myCompass and the data were thematically analyzed. Findings The findings of the study showcase the unique determinants of consumers’ continued use of TBSSs with credence qualities relative to the more routine services which have been the focus of extant research. The findings further provide support for the utility of the MGB in explaining service continuance, although the importance of distinguishing between extrinsic and intrinsic motivational components of behavioral desire and capturing the impact of social influence beyond subjective norms is also highlighted. Originality/value This study contributes to recent research examining differences in consumer responses across TBSSs and behavioral loyalty to these services. It also provides empirical evidence for broadening and deepening the MGB within this behavioral domain.
Resumo:
Unified communications as a service (UCaaS) can be regarded as a cost-effective model for on-demand delivery of unified communications services in the cloud. However, addressing security concerns has been seen as the biggest challenge to the adoption of IT services in the cloud. This study set up a cloud system via VMware suite to emulate hosting unified communications (UC), the integration of two or more real time communication systems, services in the cloud in a laboratory environment. An Internet Protocol Security (IPSec) gateway was also set up to support network-level security for UCaaS against possible security exposures. This study was aimed at analysis of an implementation of UCaaS over IPSec and evaluation of the latency of encrypted UC traffic while protecting that traffic. Our test results show no latency while IPSec is implemented with a G.711 audio codec. However, the performance of the G.722 audio codec with an IPSec implementation affects the overall performance of the UC server. These results give technical advice and guidance to those involved in security controls in UC security on premises as well as in the cloud.
Resumo:
Primary brain tumors are associated with significant physical, cognitive and psychosocial changes. Although treatment guidelines recommend offering multidisciplinary rehabilitation and support services to address patients’ residual deficits, the extent to which patients access such services is unclear. This study aimed to assess patients’ supportive care needs early after diagnosis, and quantify service awareness, referral and utilization. A population-based sample of 40 adults recently diagnosed with primary brain tumors was recruited through the Queensland Cancer Registry, representing 18.9% of the eligible population of 203 patients. Patients or carer proxies completed surveys of supportive care needs at baseline (approximately three months after diagnosis) and three months later. Descriptive statistics summarized needs and service utilization, and linear regression identified predictors of service use. Unmet supportive care needs were highest at baseline for all domains, and highest for the physical and psychological needs domains at each time point. At follow-up, participants reported awareness of, referral to, and use of 32 informational, support, health professional or practical services. All or almost all participants were aware of at least one informational (100%), health professional (100%), support (97%) or practical service (94%). Participants were most commonly aware of speech therapists (97%), physiotherapists (94%) and diagnostic information from the internet (88%). Clinician referrals were most commonly made to physiotherapists (53%), speech therapists (50%) and diagnostic information booklets (44%), and accordingly, participants most commonly used physiotherapists (56%), diagnostic information booklets (47%), diagnostic information from the internet (47%), and speech therapists (43%). Comparatively low referral to and use of psychosocial services may limit patients’ abilities to cope with their condition and the changes they experience.
Resumo:
We present a novel framework and algorithms for the analysis of Web service interfaces to improve the efficiency of application integration in wide-spanning business networks. Our approach addresses the notorious issue of large and overloaded operational signatures, which are becoming increasingly prevalent on the Internet and being opened up for third-party service aggregation. Extending upon existing techniques used to refactor service interfaces based on derived artefacts of applications, namely business entities, we propose heuristics for deriving relations between business entities, and in turn, deriving permissible orders in which operations are invoked. As a result, service operations are refactored on business entity CRUD which then leads to behavioural protocols generated, thus supportive of fine-grained and flexible service discovery, composition and interaction. A prototypical implementation and analysis of web services, including those of commercial logistic systems (Fedex), are used to validate the algorithms and open up further insights into service interface synthesis.
Resumo:
The growth of APIs and Web services on the Internet, especially through larger enterprise systems increasingly being leveraged for Cloud and software-as-a-service opportuni- ties, poses challenges to improving the efficiency of integration with these services. Interfaces of enterprise systems are typically larger, more complex and overloaded, with single operation having multiple data entities and parameter sets, supporting varying requests, and reflecting versioning across different system releases, compared to fine-grained operations of contemporary interfaces. We propose a technique to support the refactoring of service interfaces by deriving business entities and their relationships. In this paper, we focus on the behavioural aspects of service interfaces, aiming to discover the sequential dependencies of operations (otherwise known as protocol extraction) based on the entities and relationships derived. Specifically, we propose heuristics according to these relationships, and in turn, deriving permissible orders in which operations are invoked. As a result of this, service operations can be refactored on business entity CRUD lines, with explicit behavioural protocols as part of an interface definition. This supports flexible service discovery, composition and integration. A prototypical implementation and analysis of existing Web services, including those of commercial logistic systems (Fedex), are used to validate the algorithms proposed through the paper.