915 research outputs found

    The factors that contribute to the continuous usage of broadband technologies among youth in rural areas: A case of northern region of Malaysia

    Get PDF
    Despite the benefits of broadband technology in education and healthcare services, its usage in the rural areas is still low and Malaysia is not excluded. This situation leads to raising the question of long-term usage of the technology. Presently, there are less empirical study on the continuous usage of broadband technology among the youths particularly school children in the rural areas of Malaysia. The objective of this study is to determine the contributing factors for continuous usage of broadband technology among youths in the rural areas. Therefore, a research model was proposed consisting of eight contributing factors for continuous usage of broadband technology. Moreover, the study used quantitative approach by distributing 450 questionnaires to respondents in the northern region of Malaysia. However, only 393 questionnaires were returned which represent 87.33% response rate. The data collected were analyzed using a Structural Equation Model to investigate the relationship between contributing factors. The results showed that performance expectancy, effort expectancy, social influence, compatibility, facilitating condition, service quality, user behavioural intention and user satisfaction are the significant contributing factors that must be in place to ensure the continuous usage of broadband among youth in the rural areas. Hence, this study contributes to the body of knowledge in Community Informatics by providing a framework for achieving long-term use of broadband technology among youths in the rural areas, through the integration of Information System Continuance Post Acceptance and Unified Theory of Acceptance and Use of Technology models. The factors identified may contribute as input to the government policy formulations and service providers to ensure continuous demand for broadband from the evidence extracted from this study. Continuous usage of broadband technology in the rural areas would have positive contributions on the academic performance, literacy among youths, bridging the digital divide in broadband usage, increase home business and national productivity

    Trustworthiness in Mobile Cyber Physical Systems

    Get PDF
    Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the ‘cyberworld’ of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS

    A Survey of Protocol-Level Challenges and Solutions for Distributed Energy Resource Cyber-Physical Security

    Get PDF
    The increasing proliferation of distributed energy resources (DERs) on the smart grid has made distributed solar and wind two key contributors to the expanding attack surface of the network; however, there is a lack of proper understanding and enforcement of DER communications security requirements. With vendors employing proprietary methods to mitigate hosts of attacks, the literature currently lacks a clear organization of the protocol-level vulnerabilities, attacks, and solutions mapped to each layer of the logical model such as the OSI stack. To bridge this gap and pave the way for future research by the authors in determining key DER security requirements, this paper conducts a comprehensive review of the key vulnerabilities, attacks, and potential solutions for solar and wind DERs at the protocol level. In doing so, this paper serves as a starting point for utilities, vendors, aggregators, and other industry stakeholders to develop a clear understanding of the DER security challenges and solutions, which are key precursors to comprehending security requirements

    A Comprehensive Bibliometric Analysis on Social Network Anonymization: Current Approaches and Future Directions

    Full text link
    In recent decades, social network anonymization has become a crucial research field due to its pivotal role in preserving users' privacy. However, the high diversity of approaches introduced in relevant studies poses a challenge to gaining a profound understanding of the field. In response to this, the current study presents an exhaustive and well-structured bibliometric analysis of the social network anonymization field. To begin our research, related studies from the period of 2007-2022 were collected from the Scopus Database then pre-processed. Following this, the VOSviewer was used to visualize the network of authors' keywords. Subsequently, extensive statistical and network analyses were performed to identify the most prominent keywords and trending topics. Additionally, the application of co-word analysis through SciMAT and the Alluvial diagram allowed us to explore the themes of social network anonymization and scrutinize their evolution over time. These analyses culminated in an innovative taxonomy of the existing approaches and anticipation of potential trends in this domain. To the best of our knowledge, this is the first bibliometric analysis in the social network anonymization field, which offers a deeper understanding of the current state and an insightful roadmap for future research in this domain.Comment: 73 pages, 28 figure

    Educational Technology and Related Education Conferences for January to June 2011 - November 11, 2010

    Get PDF
    If you attend the same conferences each year, you don’t need to scan this list. This list is your opportunity to “push the envelope” by trying something new. There are hundreds of professional development events that may give you a different perspective or help you learn a new skill. Rather than attend the same event you always do, scan this list and investigate conferences, symposiums, or workshops you have never attended. The list below covers selected events focused primarily on the use of technology in educational settings and on teaching, learning, and educational administration. Only listings until June 2011 are complete as dates, locations, or URLs are not available for a number of events held after June 2011. A Word 2003 format is used to enable people who do not have access to Word 2007 or higher version and those with limited or high-cost Internet access to find a conference that is congruent with their interests or obtain conference proceedings. (If you are seeking a more interactive listing, refer to online conference sites.) Consider using the “Find” tool under Microsoft Word’s “Edit” tab or similar tab in OpenOffice to locate the name of a particular conference, association, city, or country. If you enter the country “United Kingdom” in the “Find” tool, all conferences that occur in the United Kingdom will be highlighted. Then, “cut and paste” a list of suitable events for yourself and your colleagues. Please note that events, dates, titles, and locations may change; thus, CHECK the specific conference website. Note also that some events will be cancelled at a later date. All Internet addresses were verified at the time of publication. No liability is assumed for any errors that may have been introduced inadvertently during the assembly of this conference list. If possible, please do not remove the contact information when you re-distribute the list as that is how I receive updates and corrections. If you publish the list on the web, please note its source

    Biometric Data Art: Personalized Narratives and Multimodal Interaction

    Get PDF
    Biometric technology has brought enhancements to identification and access control. As more digital applications request people to input their biometric data as a more convenient and secure method of identification, the possibility of losing their personal data and identities may increase. The phenomenon of biometric data abuse causes one to question what their true identity may be and what methods can be used to define identity and hidden narratives. The questions of identification and the insecurity of biometric data have become my inspiration, providing artistic approaches to the manipulation of biometric data and having the potential to suggest new directions for solving the problems. To do so, in-depth investigation of the narratives beyond the visual features of the biometric data is necessary. This content can create a close link between an artwork and its audience by causing the latter to become deeply engaged with the artwork through their own stories.This dissertation examines narratives and artistic explorations discovered from one form of biometric data, fingerprints, drawing on insights from various fields such as genetics, hand analysis, and biology. It also presents contributions on new ways of creating interactive media artworks using fingerprint data based on visual feature analysis of the data and multimodal interaction to explore their sonic signatures. Therefore, the artwork enriches interactive media art by incorporating personalization into the artistic experience, and creates unique personalized experience for each audience member. This thesis documents developments and productions of a series of artworks, Digiti Sonus, by focusing on its conceptual approaches, design, techniques, challenges and future directions

    Interim research assessment 2003-2005 - Computer Science

    Get PDF
    This report primarily serves as a source of information for the 2007 Interim Research Assessment Committee for Computer Science at the three technical universities in the Netherlands. The report also provides information for others interested in our research activities
    • 

    corecore