3 research outputs found

    Protecting Personal Private Information in Collaborative Environments

    Get PDF
    The ability to collaborate has always been vitally important to businesses and enterprises. With the availability of current networking and computing power, the creation of Collaborative Working Environments (CWEs) has allowed for this process to occur anytime over any geographical distance. Sharing information between individuals through collaborative environments creates new challenges in privacy protection for organizations and the members of organizations. This thesis confronts the problems when attempting to protect the personal private information of collaborating individuals. In this thesis, a privacy-by-policy approach is taken to addressing the issue of protecting private information within collaborative environments. A privacy-by-policy approach to privacy protection provides collaborating individuals with notice and choice surrounding their private information, in order to provide an individual with a level of control over how their information is to be used. To this end, a collaborative privacy architecture for providing privacy within a collaborative environment is presented. This architecture uses ontologies to express the static concept and relation definitions required for privacy and collaboration. The collaborative privacy architecture also contains a Collaborative Privacy Manager (CPM) service which handles changes in dynamic collaborative environments. The goals of this thesis are to provide privacy mechanisms for the non-client centric situation of collaborative working environments. This thesis also strives to provide privacy through technically enforceable and customizable privacy policies. To this end, individual collaborators are provided with access, modification rights, and transparency through the use of ontologies built into the architecture. Finally, individual collaborators are provided these privacy protections in a way that is easy to use and understand and use. A collaborative scenario as a test case is described to present how this architecture would benefit individuals and organizations when they are engaged in collaborative work. In this case study a university and hospital are engaged in collaborative research which involves the use of private information belonging to collaborators and patients from the hospital. This case study also highlights how different organizations can be under different sets of legislative guidelines and how these guidelines can be incorporated into the privacy architecture. Through this collaboration scenario an implementation of the collaborative privacy architecture is provided, along with results from semantic and privacy rule executions, and measurements of how actions carried out by the architecture perform under various conditions

    Bridging the training needs of cybersecurity professionals in Mauritius through the use of smart learning environments.

    Get PDF
    Doctoral Degree. University of KwaZulu-Natal, Durban.Teaching and Learning confined to within the four walls of a classroom or even online Learning through Massive Online Courses (MOOCs) and other Learning Content Management Systems (LCMS) are no longer seen as the optimal approach for competency and skills development, especially for working professionals. Each of these busy learners have their own training needs and prior knowledge. Adopting the one-size-fits-all teaching approach is definitely not effective, motivating and encouraging. This is why this research presents the use of SMART Learning Environment that makes use of Intelligent Techniques to personalise the learning materials for each learner. It has been observed that on one hand the country is not able to provide the required number of IT professionals with the desired skills and on the other hand, the number of unemployed graduates in areas other than IT is increasing. This mismatch in skills is becoming a pressing issue and is having a direct impact on the ICT Sector, which is one of the pillars of the Mauritian Economy. An in-depth Literature Review was carried out to understand the training needs of these Cybersecurity professionals and also to understand the different Intelligent Techniques that can be used to provide personalisation of learning materials. Data was collected during three phases, namely an Expert Reference Group Discussion, a pre-test questionnaire and a survey questionnaire. The Expert Reference Group Discussion was carried out to further shed light on the research question set and to further understand the training needs and expectations of Cybersecurity professionals in Mauritius. A SMART Learning Environment making use of Artificial Neural Networks and Backpropagation Algorithm to personalise learning materials was eventually designed and implemented. Design Science Research Methodology (DSRM), Activity Theory, Bloom’s Taxonomy and the Technology Acceptance Model were used in this study. Due to the inherent limitations of the models mentioned, the researcher also proposed and evaluated an emergent conceptual model, called the SMART Learning model. The major findings of this research show that personalisation of learning materials through the use of a SMART Learning Environment can be used to effectively address the training needs of Cybersecurity professionals in Mauritius

    Factors Influencing Customer Satisfaction towards E-shopping in Malaysia

    Get PDF
    Online shopping or e-shopping has changed the world of business and quite a few people have decided to work with these features. What their primary concerns precisely and the responses from the globalisation are the competency of incorporation while doing their businesses. E-shopping has also increased substantially in Malaysia in recent years. The rapid increase in the e-commerce industry in Malaysia has created the demand to emphasize on how to increase customer satisfaction while operating in the e-retailing environment. It is very important that customers are satisfied with the website, or else, they would not return. Therefore, a crucial fact to look into is that companies must ensure that their customers are satisfied with their purchases that are really essential from the ecommerce’s point of view. With is in mind, this study aimed at investigating customer satisfaction towards e-shopping in Malaysia. A total of 400 questionnaires were distributed among students randomly selected from various public and private universities located within Klang valley area. Total 369 questionnaires were returned, out of which 341 questionnaires were found usable for further analysis. Finally, SEM was employed to test the hypotheses. This study found that customer satisfaction towards e-shopping in Malaysia is to a great extent influenced by ease of use, trust, design of the website, online security and e-service quality. Finally, recommendations and future study direction is provided. Keywords: E-shopping, Customer satisfaction, Trust, Online security, E-service quality, Malaysia
    corecore