17,975 research outputs found

    Semantic linking through spaces for cyber-physical-socio intelligence:a methodology

    Get PDF
    Humans consciously and subconsciously establish various links, emerge semantic images and reason in mind, learn linking effect and rules, select linked individuals to interact, and form closed loops through links while co-experiencing in multiple spaces in lifetime. Machines are limited in these abilities although various graph-based models have been used to link resources in the cyber space. The following are fundamental limitations of machine intelligence: (1) machines know few links and rules in the physical space, physiological space, psychological space, socio space and mental space, so it is not realistic to expect machines to discover laws and solve problems in these spaces; and, (2) machines can only process pre-designed algorithms and data structures in the cyber space. They are limited in ability to go beyond the cyber space, to learn linking rules, to know the effect of linking, and to explain computing results according to physical, physiological, psychological and socio laws. Linking various spaces will create a complex space — the Cyber-Physical-Physiological-Psychological-Socio-Mental Environment CP3SME. Diverse spaces will emerge, evolve, compete and cooperate with each other to extend machine intelligence and human intelligence. From multi-disciplinary perspective, this paper reviews previous ideas on various links, introduces the concept of cyber-physical society, proposes the ideal of the CP3SME including its definition, characteristics, and multi-disciplinary revolution, and explores the methodology of linking through spaces for cyber-physical-socio intelligence. The methodology includes new models, principles, mechanisms, scientific issues, and philosophical explanation. The CP3SME aims at an ideal environment for humans to live and work. Exploration will go beyond previous ideals on intelligence and computing

    ICT adoption in developing countries : perspectives from small-scale agribusinesses

    Get PDF
    The purpose of this paper is to critically examine how social augmented parameters impact on the effective adoption of information and communication technology (ICT) by small-scale agribusinesses operating in Southeast Nigeria. The relevance of incorporating social imperatives in scholarship focused on technology adoption is due to its role in sustaining the process of adoption and diffusion. Data were gathered from a focus group made up of 27 agribusiness proprietors affiliated with a state cooperative based in the south-eastern Nigerian state of Ebonyi. This paper puts forward an argument that to ensure successful diffusion of innovation, a balance must be maintained between the amount of effort expended in the design of ICT and social factors such as language and traditional life. The paper finds that a willingness of indigenous ICT users is particularly influenced by the recognition and incorporation of visible social imperatives during the adoption process. The outcome of this study highlights important issues for ICT adoption. One particular area that must be taken into consideration is the adoption channel. Perceptions of ICT adoption will differ significantly among adopters. For this reason, the need for developing an appropriate adoption channel that ensures successful diffusion of the innovation should be recognised. This study contributes to ongoing research in ICT innovation adoption in small agribusinesses operating in indigenous societies. The theoretical implications of this paper are the development of a conceptual ICT adoption framework that emphasises social imperatives. The paper also demonstrates that agricultural enterprises should be treated as ‘normal’ firms in their own right

    Information and communication Technology and Poverty: An Asian Perspective

    Get PDF
    The emergence of Information and Communication Technologies (ICTs), in particular the Internet, has generated new enthusiasms about the development prospects for poor economies. Many now think that new technologies can provide a faster route to better livelihoods and improved quality of life than the one afforded by the standard process of industrialization. The opposing view holds that the focus on ICTs will detract attention from the more fundamental task of addressing the basic problems of economic developmentICT; poverty; growth

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management

    A Rule Set for the Future

    Get PDF
    This volume, Digital Young, Innovation, and the Unexpected, identifies core issues concerning how young people's use of digital media may lead to various innovations and unexpected outcomes. The essays collected here examine how youth can function as drivers for technological change while simultaneously recognizing that technologies are embedded in larger social systems, including the family, schools, commercial culture, and peer groups. A broad range of topics are taken up, including issues of access and equity; of media panics and cultural anxieties; of citizenship, consumerism, and labor; of policy, privacy, and IP; of new modes of media literacy and learning; and of shifting notions of the public/private divide. The introduction also details six maxims to guide future research and inquiry in the field of digital media and learning. These maxims are "Remember History," "Consider Context," "Make the Future (Hands-on)," "Broaden Participation," "Foster Literacies," and "Learn to Toggle." They form a kind of flexible rule set for investigations into the innovative uses and unexpected outcomes now emerging or soon anticipated from young people's engagements with digital media

    A comparative assessment of human factors in cybersecurity: Implications for cyber governance

    Get PDF
    This paper provides an extensive overview of cybersecurity awareness in the young, educated, and technology-savvy population of the United Arab Emirates (UAE), compared to the United States of America (USA) for advancing the scholarship and practice of global cyber governance. We conducted comparative empirical studies to identify differences in specific human factors that affect cybersecurity behaviour in the UAE and the USA. In addition, we employed several control variables to observe reliable results. We used Hofstede’s theoretical framework on culture to advance our investigation. The results show that the targeted population in the UAE exhibits contrasting interpretations of cybersecurity awareness of critical human factors as compared to their counterparts from the USA. We identify possible explanations for this relatively different behaviour in the UAE population. Our key contributions are to provide valuable information for cybersecurity policymakers in the UAE and Gulf Cooperation Council (GCC) region to further enhance cyber safety, governance, awareness, and trust among citizens

    Metaverse Security and Privacy: An Overview

    Full text link
    Metaverse is a living space and cyberspace that realizes the process of virtualizing and digitizing the real world. It integrates a plethora of existing technologies with the goal of being able to map the real world, even beyond the real world. Metaverse has a bright future and is expected to have many applications in various scenarios. The support of the Metaverse is based on numerous related technologies becoming mature. Hence, there is no doubt that the security risks of the development of the Metaverse may be more prominent and more complex. We present some Metaverse-related technologies and some potential security and privacy issues in the Metaverse. We present current solutions for Metaverse security and privacy derived from these technologies. In addition, we also raise some unresolved questions about the potential Metaverse. To summarize, this survey provides an in-depth review of the security and privacy issues raised by key technologies in Metaverse applications. We hope that this survey will provide insightful research directions and prospects for the Metaverse's development, particularly in terms of security and privacy protection in the Metaverse.Comment: IEEE BigData 2022. 10 pages, 2 figure
    • …
    corecore