915 research outputs found
The factors that contribute to the continuous usage of broadband technologies among youth in rural areas: A case of northern region of Malaysia
Despite the benefits of broadband technology in education and healthcare services, its usage in the rural areas is still low and Malaysia is not excluded. This situation leads to raising the question of long-term usage of the technology. Presently, there are less empirical study on the continuous usage of broadband technology among the youths particularly school children in the rural areas of Malaysia. The objective of this study is to determine the contributing factors for continuous usage of broadband technology among youths in the rural areas. Therefore, a research model was proposed consisting of eight contributing factors for continuous usage of broadband technology. Moreover, the study used quantitative approach by distributing 450 questionnaires to respondents in the northern region of Malaysia. However, only 393 questionnaires were returned which represent 87.33% response rate. The data
collected were analyzed using a Structural Equation Model to investigate the relationship between contributing factors. The results showed that performance expectancy, effort expectancy, social influence, compatibility, facilitating condition, service quality, user behavioural intention and user satisfaction are the significant contributing factors that must be in place to ensure the continuous usage of
broadband among youth in the rural areas. Hence, this study contributes to the body of knowledge in Community Informatics by providing a framework for achieving long-term use of broadband technology among youths in the rural areas, through the integration of Information System Continuance Post Acceptance and Unified Theory of Acceptance and Use of Technology models. The factors identified may contribute
as input to the government policy formulations and service providers to ensure continuous demand for broadband from the evidence extracted from this study. Continuous usage of broadband technology in the rural areas would have positive contributions on the academic performance, literacy among youths, bridging the
digital divide in broadband usage, increase home business and national productivity
Trustworthiness in Mobile Cyber Physical Systems
Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the âcyberworldâ of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS
A Survey of Protocol-Level Challenges and Solutions for Distributed Energy Resource Cyber-Physical Security
The increasing proliferation of distributed energy resources (DERs) on the smart grid has made distributed solar and wind two key contributors to the expanding attack surface of the network; however, there is a lack of proper understanding and enforcement of DER communications security requirements. With vendors employing proprietary methods to mitigate hosts of attacks, the literature currently lacks a clear organization of the protocol-level vulnerabilities, attacks, and solutions mapped to each layer of the logical model such as the OSI stack. To bridge this gap and pave the way for future research by the authors in determining key DER security requirements, this paper conducts a comprehensive review of the key vulnerabilities, attacks, and potential solutions for solar and wind DERs at the protocol level. In doing so, this paper serves as a starting point for utilities, vendors, aggregators, and other industry stakeholders to develop a clear understanding of the DER security challenges and solutions, which are key precursors to comprehending security requirements
A Comprehensive Bibliometric Analysis on Social Network Anonymization: Current Approaches and Future Directions
In recent decades, social network anonymization has become a crucial research
field due to its pivotal role in preserving users' privacy. However, the high
diversity of approaches introduced in relevant studies poses a challenge to
gaining a profound understanding of the field. In response to this, the current
study presents an exhaustive and well-structured bibliometric analysis of the
social network anonymization field. To begin our research, related studies from
the period of 2007-2022 were collected from the Scopus Database then
pre-processed. Following this, the VOSviewer was used to visualize the network
of authors' keywords. Subsequently, extensive statistical and network analyses
were performed to identify the most prominent keywords and trending topics.
Additionally, the application of co-word analysis through SciMAT and the
Alluvial diagram allowed us to explore the themes of social network
anonymization and scrutinize their evolution over time. These analyses
culminated in an innovative taxonomy of the existing approaches and
anticipation of potential trends in this domain. To the best of our knowledge,
this is the first bibliometric analysis in the social network anonymization
field, which offers a deeper understanding of the current state and an
insightful roadmap for future research in this domain.Comment: 73 pages, 28 figure
Educational Technology and Related Education Conferences for January to June 2011 - November 11, 2010
If you attend the same conferences each year, you donât need to scan this list. This list is your opportunity to âpush the envelopeâ by trying something new. There are hundreds of professional development events that may give you a different perspective or help you learn a new skill. Rather than attend the same event you always do, scan this list and investigate conferences, symposiums, or workshops you have never attended. The list below covers selected events focused primarily on the use of technology in educational settings and on teaching, learning, and educational administration. Only listings until June 2011 are complete as dates, locations, or URLs are not available for a number of events held after June 2011. A Word 2003 format is used to enable people who do not have access to Word 2007 or higher version and those with limited or high-cost Internet access to find a conference that is congruent with their interests or obtain conference proceedings. (If you are seeking a more interactive listing, refer to online conference sites.) Consider using the âFindâ tool under Microsoft Wordâs âEditâ tab or similar tab in OpenOffice to locate the name of a particular conference, association, city, or country. If you enter the country âUnited Kingdomâ in the âFindâ tool, all conferences that occur in the United Kingdom will be highlighted. Then, âcut and pasteâ a list of suitable events for yourself and your colleagues. Please note that events, dates, titles, and locations may change; thus, CHECK the specific conference website. Note also that some events will be cancelled at a later date. All Internet addresses were verified at the time of publication. No liability is assumed for any errors that may have been introduced inadvertently during the assembly of this conference list. If possible, please do not remove the contact information when you re-distribute the list as that is how I receive updates and corrections. If you publish the list on the web, please note its source
Biometric Data Art: Personalized Narratives and Multimodal Interaction
Biometric technology has brought enhancements to identification and access control. As more digital applications request people to input their biometric data as a more convenient and secure method of identification, the possibility of losing their personal data and identities may increase. The phenomenon of biometric data abuse causes one to question what their true identity may be and what methods can be used to define identity and hidden narratives. The questions of identification and the insecurity of biometric data have become my inspiration, providing artistic approaches to the manipulation of biometric data and having the potential to suggest new directions for solving the problems. To do so, in-depth investigation of the narratives beyond the visual features of the biometric data is necessary. This content can create a close link between an artwork and its audience by causing the latter to become deeply engaged with the artwork through their own stories.This dissertation examines narratives and artistic explorations discovered from one form of biometric data, fingerprints, drawing on insights from various fields such as genetics, hand analysis, and biology. It also presents contributions on new ways of creating interactive media artworks using fingerprint data based on visual feature analysis of the data and multimodal interaction to explore their sonic signatures. Therefore, the artwork enriches interactive media art by incorporating personalization into the artistic experience, and creates unique personalized experience for each audience member. This thesis documents developments and productions of a series of artworks, Digiti Sonus, by focusing on its conceptual approaches, design, techniques, challenges and future directions
Interim research assessment 2003-2005 - Computer Science
This report primarily serves as a source of information for the 2007 Interim Research Assessment Committee for Computer Science at the three technical universities in the Netherlands. The report also provides information for others interested in our research activities
- âŠ