13,255 research outputs found
Developing front-end Web 2.0 technologies to access services, content and things in the future Internet
The future Internet is expected to be composed of a mesh of interoperable web services accessible from all over the web. This approach has not yet caught on since global user?service interaction is still an open issue. This paper states one vision with regard to next-generation front-end Web 2.0 technology that will enable integrated access to services, contents and things in the future Internet. In this paper, we illustrate how front-ends that wrap traditional services and resources can be tailored to the needs of end users, converting end users into prosumers (creators and consumers of service-based applications). To do this, we propose an architecture that end users without programming skills can use to create front-ends, consult catalogues of resources tailored to their needs, easily integrate and coordinate front-ends and create composite applications to orchestrate services in their back-end. The paper includes a case study illustrating that current user-centred web development tools are at a very early stage of evolution. We provide statistical data on how the proposed architecture improves these tools. This paper is based on research conducted by the Service Front End (SFE) Open Alliance initiative
A competence management system towards increased corporate success
Estágio realizado na Critical Manufacturing, S. ATese de mestrado integrado. Engenharia Informática e Computação. Faculdade de Engenharia. Universidade do Porto. 201
Identifying the relevance of personal values to e-government portals' success: insights from a Delphi study
Most governments around the world have put considerable financial resources into the development of e-government systems. They have been making significant efforts to provide information and services online. However, previous research shows that the rate of adoption and success of e-government systems vary significantly across countries. It is argued here that culture can be an important factor affecting e- government success. This paper aims to explore the relevance of personal values to the e-government success from an individual user’s perspective. The ten basic values identified by Schwartz were used. A Delphi study was carried out with a group of experts to identify the most relevant personal values to the e-government success from an individual’s point of view. The findings suggest that four of the ten values, namely Self-direction, Security, Stimulation, and Tradition, most likely affect the success. The findings provide a basis for developing a comprehensive e-government evaluation framework to be validated using a large scale survey in Saudi Arabia
Naturally Rehearsing Passwords
We introduce quantitative usability and security models to guide the design
of password management schemes --- systematic strategies to help users create
and remember multiple passwords. In the same way that security proofs in
cryptography are based on complexity-theoretic assumptions (e.g., hardness of
factoring and discrete logarithm), we quantify usability by introducing
usability assumptions. In particular, password management relies on assumptions
about human memory, e.g., that a user who follows a particular rehearsal
schedule will successfully maintain the corresponding memory. These assumptions
are informed by research in cognitive science and validated through empirical
studies. Given rehearsal requirements and a user's visitation schedule for each
account, we use the total number of extra rehearsals that the user would have
to do to remember all of his passwords as a measure of the usability of the
password scheme. Our usability model leads us to a key observation: password
reuse benefits users not only by reducing the number of passwords that the user
has to memorize, but more importantly by increasing the natural rehearsal rate
for each password. We also present a security model which accounts for the
complexity of password management with multiple accounts and associated
threats, including online, offline, and plaintext password leak attacks.
Observing that current password management schemes are either insecure or
unusable, we present Shared Cues--- a new scheme in which the underlying secret
is strategically shared across accounts to ensure that most rehearsal
requirements are satisfied naturally while simultaneously providing strong
security. The construction uses the Chinese Remainder Theorem to achieve these
competing goals
The enterprise sector and emergence of the Polish fiscal crisis, 1990-91
The author analyzes the causes of the collapse of profitability in 1991 of the Polish enterprise sector. He explores how it affected the government budget and assesses the forecasts of enterprise sector performance used to prepare the government's 1990 and 1991 budgets. About half of the drop in profitability he attributes to the decrease in the inflation rate and the consequent decrease in the inflation bias in profits that results from historical cost accounting. He attributes most of the rest of the collapse in profitability to higher labor costs and higher amortization allowances. When wages are endogenized in a simple model, nearly the entire collapse of profitability is explained by the changes in inflation bias and amortization allowances. The decrease in the inflation bias and the increase in amortization allowances caused profits, and thus profit taxes, to fall, freeing up cash that could be spent on wages, causing profits and profit taxes to fall even further. This loss in government revenues was offset by increased revenues from wage taxes, which were in turn offset by an increase in wage indexed government spending, notably on pensions. As a result of all these changes, the government deficit increased about 4 to 5 percent of GDP - about half of the fiscal swing between 1990 and 1991. Policy options recommended for increasing tax revenues include: increasing the turnover tax rate and introducing the value added tax that will replace it at rates that maintain the increased level of revenue; increasing the social security tax rate; and maintaining, but not raising, the historical cost based profit tax, an automatic stabilizer. An obvious alternative to the profit tax based on historical cost accounting is to redress 1991 mistake, the indexing of amortization deductions. The author recommends drastically reducing or even abolishing amortization deductions for state owned enterprises for fixed capital acquired before 1990 (before the start of the transition from socialism). It is odd that these firms are given a tax break on top of the free use of state owned capital. If anything, they should be paying for the use of the capital.Economic Theory&Research,Environmental Economics&Policies,Public Sector Economics&Finance,Banks&Banking Reform,Municipal Financial Management
Recommended from our members
Analysing the requirements for monitoring and switching: A problem-oriented approach
Context-aware applications monitor changes in their environment and switch their behaviour in order to continue satisfying requirements. Specifying monitoring and switching in such applications can be difficult due to their dependence on varying environmental properties. Two problems require analysis: the detection of changes in the operating environment to assess their impact on requirements satisfaction, and the adaptation of application behaviour to ensure requirements satisfaction.
This thesis borrows from the world of problem-oriented software system development and product-lines to analyse monitoring and switching problems on one hand and contextual changes on the other. It proposes a shift of focus from treating monitoring and switching as activities to be analysed as part of the design, to treating them as part of the problem whose requirements are analysed. We claim three novel contributions: (1) we provide concepts and mechanisms for analysing monitoring and switching problems in context; (2) we formulate and prove two theorems for monitoring and switching, which define the necessary and sufficient conditions for monitoring a contextual variable and for switching application behaviour to restore requirements satisfaction when they are violated; and (3) we provide a tool for automated derivation of the conditions for monitoring and switching.
Our approach is evaluated using two case studies of a proof of concept mobile phone productline and a logistics company that delivers and monitors products across the UK. We found the applications of the approach to be effective in analysing unforeseen requirements violations caused by changes in the systems operating environments. Furthermore, the monitoring and switching mechanisms derived from the analysis enabled the software to become, to some extent, context-aware
- …