56 research outputs found
ACUTA Journal of Telecommunications in Higher Education
In This Issue
Mobile Learning at ACU
On Your Wish List: The Latest Toys for Your System
Virtual Hands-on Learning: The Aesthetic Camera in Second Life
Unified Communications-Coming Soon to the University of the Pacific
Reality Check on Virtualization
Fixed Wireless at NYULMC
lnstitutional Excellence Award
Bill D. Morris Award
ACUTA Ruth A. Michalecki Leadership Award
Interviews
President\u27s Message
From the Executive Directo
Browser Web Storage Vulnerability Investigation: HTML5 localStorage Object
Along with the introduction of HTML5 a new data storage technique, Web Storage, has been added to browsers. This technique stores larger amounts of data for an extended period of time on a client system. This technology does not (as of this writing) have a fully implemented interface to support end user control. The authors interest is modeling the use of Web Storage to store illicit data. The authors built a web application that would take a file, encrypt it, split it into multiple parts and distribute it to as many clients as possible. At a later time, the system could then watch for return visits and retrieve data parts as clients interact with a host website. The recidivism rate of clients returning to the host website and the number of copies of each distributed part needed to achieve a reliable recovery rate of the entire file are under study
ACUTA Journal of Telecommunications in Higher Education
In This Issue
President\u27s Message
From the ACUTA CEO
RIP for TDM
IPTV: The Future of Gable TV
Not All SIP Trunking ls Problem Free
lnterview: Four Campuses Look at lPv6, SIB and More
lPv6: What You Don\u27t Know CAN Hurt You
Moving from the Old to the New
2013 Award Winners
lnstitutional Excellence Award Honorable Mention: Abilene Christian University Virtual La
ACUTA Journal of Telecommunications in Higher Education
In This Issue
Strategic Planning in the College and University Ecosystem
Outlook 2012: Chickens or Eggs?
lT Trends on Campus: 2012
Best Practices in Deploying a Successful University SAN
Beyond Convergence: How Advanced Networking Will Erase Campus Boundaries
Distributed Computing: The Path to the Power?
Cell Phones on the University Campus: Adversary or Ally?
lnstitutional Excellence Award Honorable Mention: Wake Forest University
Interview
President\u27s Message
From the Executive Director
Here\u27s My Advic
Progression Magazine, 2017 Summer
Magazine of the College of Science at Coastal Carolina University.https://digitalcommons.coastal.edu/progression/1008/thumbnail.jp
DESIGN AND EXPLORATION OF NEW MODELS FOR SECURITY AND PRIVACY-SENSITIVE COLLABORATION SYSTEMS
Collaboration has been an area of interest in many domains including education, research, healthcare supply chain, Internet of things, and music etc. It enhances problem solving through expertise sharing, ideas sharing, learning and resource sharing, and improved decision making.
To address the limitations in the existing literature, this dissertation presents a design science artifact and a conceptual model for collaborative environment. The first artifact is a blockchain based collaborative information exchange system that utilizes blockchain technology and semi-automated ontology mappings to enable secure and interoperable health information exchange among different health care institutions. The conceptual model proposed in this dissertation explores the factors that influences professionals continued use of video- conferencing applications. The conceptual model investigates the role the perceived risks and benefits play in influencing professionals’ attitude towards VC apps and consequently its active and automatic use
Semantic discovery and reuse of business process patterns
Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse
- …