13,815 research outputs found

    HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree

    Get PDF
    Small-world phenomena have been observed in existing peer-to-peer (P2P) networks which has proved useful in the design of P2P file-sharing systems. Most studies of constructing small world behaviours on P2P are based on the concept of clustering peer nodes into groups, communities, or clusters. However, managing additional multilayer topology increases maintenance overhead, especially in highly dynamic environments. In this paper, we present Social-like P2P systems (Social-P2Ps) for object discovery by self-managing P2P topology with human tactics in social networks. In Social-P2Ps, queries are routed intelligently even with limited cached knowledge and node connections. Unlike community-based P2P file-sharing systems, we do not intend to create and maintain peer groups or communities consciously. In contrast, each node connects to other peer nodes with the same interests spontaneously by the result of daily searches

    Smart objects as building blocks for the internet of things

    Get PDF
    The combination of the Internet and emerging technologies such as nearfield communications, real-time localization, and embedded sensors lets us transform everyday objects into smart objects that can understand and react to their environment. Such objects are building blocks for the Internet of Things and enable novel computing applications. As a step toward design and architectural principles for smart objects, the authors introduce a hierarchy of architectures with increasing levels of real-world awareness and interactivity. In particular, they describe activity-, policy-, and process-aware smart objects and demonstrate how the respective architectural abstractions support increasingly complex application

    Third Revolution Digital Technology in Disaster Early Warning

    Get PDF
    Networking societies with electronic based technologies can change social morphology, where key social structures and activities are organized around electronically processed information networks. The application of information and communications technologies (ICT) has been shown to have a positive impact across the emergency or disaster lifecycle. For example, utility of mobile, internet and social network technology, commercial and amateur radio networks, television and video networks and open access technologies for processing data and distributing information can be highlighted. Early warning is the key function during an emergency. Early warning system is an interrelated set of hazard warning, risk assessment, communication and preparedness activities that enable individuals, communities, businesses and others to take timely action to reduce their risks. Third revolution digital technology with semantic features such as standard protocols can facilitate standard data exchange therefore proactive decision making. As a result, people belong to any given hierarchy can access the information simultaneously and make decisions on their own challenging the traditional power relations. Within this context, this paper attempts to explore the use of third revolution digital technology for improving early warning

    Trends in Mobile Computing within the IS Discipline: A Ten-Year Retrospective

    Get PDF
    We analyze mobile computing trends in research and practice between the years 2000–2009 with an inductive categorization of 806 articles in nineteen leading academic, crossover, and practitioner outlets. We integrate this categorization with previous research in mobile commerce and e-business in order to provide the most comprehensive categorization to date. Using this categorization, we next investigate trends in the discussion and research on mobile computing. From these trends, we develop a comprehensive framework that addresses both where mobile computing research has been over the past ten years, but also areas of opportunity for future research. Results indicate research is required in the areas of: (a) IT value stream proposition (both within and outside the firm), (b) human-computer interaction (designing usable mobile computing systems), (c) legal/ethical issues surrounding mobile computing-enabled activities, and (d) organizational/societal impact and change precipitated by mobile computing technologies

    Government cloud computing and the policies of data sovereignty

    Get PDF
    Government cloud services are a new development at the intersection of electronic government and cloud computing which holds the promise of rendering government service delivery more effective and efficient. Cloud services are virtual, dynamic and potentially stateless which has triggered governments' concern about data sovereignty. This paper explores data sovereignty in relation to government cloud services and how national strategies and international policy evolve. It concludes that for countries data sovereignty presents a legal risk which can not be adequately addressed with technology or through contractual arrangements alone. Governments therefore adopt strategies to retain exclusive jurisdiction over government information. --cloud computing,electronic government,data sovereignty,data ownership,information assurance,international data transfers
    • …
    corecore