1,362 research outputs found

    Cloud Services Brokerage for Mobile Ubiquitous Computing

    Get PDF
    Recently, companies are adopting Mobile Cloud Computing (MCC) to efficiently deliver enterprise services to users (or consumers) on their personalized devices. MCC is the facilitation of mobile devices (e.g., smartphones, tablets, notebooks, and smart watches) to access virtualized services such as software applications, servers, storage, and network services over the Internet. With the advancement and diversity of the mobile landscape, there has been a growing trend in consumer attitude where a single user owns multiple mobile devices. This paradigm of supporting a single user or consumer to access multiple services from n-devices is referred to as the Ubiquitous Cloud Computing (UCC) or the Personal Cloud Computing. In the UCC era, consumers expect to have application and data consistency across their multiple devices and in real time. However, this expectation can be hindered by the intermittent loss of connectivity in wireless networks, user mobility, and peak load demands. Hence, this dissertation presents an architectural framework called, Cloud Services Brokerage for Mobile Ubiquitous Cloud Computing (CSB-UCC), which ensures soft real-time and reliable services consumption on multiple devices of users. The CSB-UCC acts as an application middleware broker that connects the n-devices of users to the multi-cloud services. The designed system determines the multi-cloud services based on the user's subscriptions and the n-devices are determined through device registration on the broker. The preliminary evaluations of the designed system shows that the following are achieved: 1) high scalability through the adoption of a distributed architecture of the brokerage service, 2) providing soft real-time application synchronization for consistent user experience through an enhanced mobile-to-cloud proximity-based access technique, 3) reliable error recovery from system failure through transactional services re-assignment to active nodes, and 4) transparent audit trail through access-level and context-centric provenance

    A framework for understanding and predicting the take up and use of social networking tools in a collaborative envionment

    Get PDF
    Online collaborative environments, such as social networking environments, enable users to work together to create, modify, and share media collaboratively. However, as users can be autonomous in their actions the ability to create and form a shared understanding of the people, purpose, and process of the collaborative effort can be complex. This complexity is compounded by the natural implicit social and collaborative structure of these environments, a structure that can be modified by users dynamically and asynchronously. Some have tried to make this implicitness explicit through data mining, and allocation of user roles. However such methods can fail to adapt to the changing nature of an environment's structure relating to habits of users and their social connectedness. As a result, existing methods generally provide only a snapshot of the environment at a point in time. In addition, existing methods focus on whole user bases and the underlying social context of the environment. This makes them unsuitable for situations where the context of collaboration can change rapidly, for example the tools and widgets available for collaborative action and the users available for collaborative interactions. There is a pre-existing model for understanding the dynamic structure of these environments called the “Group Socialisation Model". This model has been used to understand how social group roles form and change over time as they go through a life cycle. This model also contains a concept of characteristic behaviours or descriptors of behaviour that an individual can use to make judgement about another individual and to create an understanding of a role or social norm that may or may not be explicit. Although studies have used components of this model to provide a means of role identification or role composition within online collaborative environments, they have not managed to provide a higher level method or framework that can replicate the entire life cycle continuously over time within these environments. Using the constructive research methodology this thesis presents a research construct in the form of a framework for replicating the social group role life cycle within online collaborative environments. The framework uses an artificial neural network with a unique capability of taking snapshots of its network structure. In conjunction with fuzzy logic inference, collaborative role signatures composed of characteristic behaviours can then be determined. In this work, three characteristic behaviours were identified from the literature for characterisation of stereotypical online behaviour to be used within a role signature: these were publisher, annotator, and lurker. The use of the framework was demonstrated on three case studies. Two of the case studies were custom built mobile applications specifically for this study, and one was the Walk 2.0 website from a National Health and Medical Research Council project. All three case studies allowed for collaborative actions where users could interact with each other to create an dynamic and diverse environment. For the use of these case studies, ethics was approved by the Western Sydney University Human Research Ethic Committee and consistent strategies for recruitment were carried out. The framework was thereby demonstrated to be capable of successfully determining role signatures composed of the above characteristic behaviours, for a range of contexts and individual users. Also, comparison of participant usage of case studies was carried out and it was established that the role signatures determined by the framework matched usage. In addition, the top contributors within the case studies were analysed to demonstrate the framework's capability of handling the dynamic and continual changing structure of an online collaborative environment. The major contribution of this thesis is a framework construct developed to propose and demonstrate a new framework approach to successfully automate and carry out the social group role model life cycle within online collaborative environments. This is a significant component of foundational work towards providing designers of online collaborative environments with the capacity of understanding the various implicit roles and their characteristic behaviours for individual users. Such a capability could enable more specific individual personalisation or resource allocation, which could in turn improve the suitability of environments developed for collaboration online

    Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies

    Full text link
    The scalable, low overhead attributes of Peer-to-Peer (P2P) Internet protocols and networks lend themselves well to being exploited by criminals to execute a large range of cybercrimes. The types of crimes aided by P2P technology include copyright infringement, sharing of illicit images of children, fraud, hacking/cracking, denial of service attacks and virus/malware propagation through the use of a variety of worms, botnets, malware, viruses and P2P file sharing. This project is focused on study of active P2P nodes along with the analysis of the undocumented communication methods employed in many of these large unstructured networks. This is achieved through the design and implementation of an efficient P2P monitoring and crawling toolset. The requirement for investigating P2P based systems is not limited to the more obvious cybercrimes listed above, as many legitimate P2P based applications may also be pertinent to a digital forensic investigation, e.g, voice over IP, instant messaging, etc. Investigating these networks has become increasingly difficult due to the broad range of network topologies and the ever increasing and evolving range of P2P based applications. In this work we introduce the Universal P2P Network Investigation Framework (UP2PNIF), a framework which enables significantly faster and less labour intensive investigation of newly discovered P2P networks through the exploitation of the commonalities in P2P network functionality. In combination with a reference database of known network characteristics, it is envisioned that any known P2P network can be instantly investigated using the framework, which can intelligently determine the best investigation methodology and greatly expedite the evidence gathering process. A proof of concept tool was developed for conducting investigations on the BitTorrent network.Comment: This is a thesis submitted in fulfilment of a PhD in Digital Forensics and Cybercrime Investigation in the School of Computer Science, University College Dublin in October 201

    Educating Sub-Saharan Africa:Assessing Mobile Application Use in a Higher Learning Engineering Programme

    Get PDF
    In the institution where I teach, insufficient laboratory equipment for engineering education pushed students to learn via mobile phones or devices. Using mobile technologies to learn and practice is not the issue, but the more important question lies in finding out where and how they use mobile tools for learning. Through the lens of Kearney et al.’s (2012) pedagogical model, using authenticity, personalisation, and collaboration as constructs, this case study adopts a mixed-method approach to investigate the mobile learning activities of students and find out their experiences of what works and what does not work. Four questions are borne out of the over-arching research question, ‘How do students studying at a University in Nigeria perceive mobile learning in electrical and electronic engineering education?’ The first three questions are answered from qualitative, interview data analysed using thematic analysis. The fourth question investigates their collaborations on two mobile social networks using social network and message analysis. The study found how students’ mobile learning relates to the real-world practice of engineering and explained ways of adapting and overcoming the mobile tools’ limitations, and the nature of the collaborations that the students adopted, naturally, when they learn in mobile social networks. It found that mobile engineering learning can be possibly located in an offline mobile zone. It also demonstrates that investigating the effectiveness of mobile learning in the mobile social environment is possible by examining users’ interactions. The study shows how mobile learning personalisation that leads to impactful engineering learning can be achieved. The study shows how to manage most interface and technical challenges associated with mobile engineering learning and provides a new guide for educators on where and how mobile learning can be harnessed. And it revealed how engineering education can be successfully implemented through mobile tools

    New mobile visualities and the social communication of photography : Instagram as a case study

    Get PDF
    This research intends to show how visuality, through the mobility of Instagram (a social media platform designed for photo sharing), is modifying individuals’ perception of the world and their mediated lives. It examines how Instagram transforms individuals’ perception of interpersonal relationships, marketing, privacy and surveillance, identity and memory, and communication. It attempts a critical re-reading of the combined interrelations between the concept of mobility (smart mobile devices) and the thematic areas mentioned above. Conducting an empirical examination, it delineates the changing dynamics that digitality determines within the contemporary experience of visual communication. In order to understand visual practices it is important to consider how relationships develop among individuals, visual technologies, practices and images, society and culture (Pink, 2007: 35). A qualitative research method informed by netnography, computer-mediated interviews and visual analysis (Rose, 2007) is employed in this study. Findings show that the ubiquitous use of smart mobile devices guides us towards the development of new forms and conceptions of mobile mediated visualities.The critical analysis of the (embedded) multiple-case study presents the innovative transformations that the mediation and mobility of Instagram bring into everyday relations between human-technologies. Findings show that now that daily life is experienced as a succession of photo opportunities that allow the creation of social networks but do not replace physical relationships. Images figure as a fair means of communication although they cannot fulfil verbal ones. However, the connections that images establish become a valuable part of new social media marketing strategies. With the widespread use of the platform, companies start to monitor users and influence their online behaviour without causing concern in relation to privacy and surveillance issues. The protection of personal information instead is related to the visibility that the contents of images acquire within the virality of the Internet. Within this, the voyeuristic spirit that animates the platform affects individuals’ interest in disclosing self-identity through visual metaphors. The disclosure of visual narrations of the self, at the same time, models the sharing of new networked archives of personal and collective memories.The ephemerality of digital culture is embraced by smart mobile technologies considering the importance that individuals give to the act of producing multimedia contents more than the content itself. Smart mobile devices represent the element of mediation in social instances and they strongly represent the foundation of a new mobile visualities aesthetic. Societies produce peculiar forms of expression and communication that are shaped by the co-presence of individual demands and the current typology of means of communication. Every alteration in the structure of societies has influence on individuals and on means of expression. This thesis shows that in contemporary life visualities have crucial functions in different environments such as business, leisure, and surveillance. Lastly, the triangulation of mediation-mobility-visuality produces a snapshot aesthetic, which radically transforms traditional functions of photography

    Computer-Mediated Communication

    Get PDF
    This book is an anthology of present research trends in Computer-mediated Communications (CMC) from the point of view of different application scenarios. Four different scenarios are considered: telecommunication networks, smart health, education, and human-computer interaction. The possibilities of interaction introduced by CMC provide a powerful environment for collaborative human-to-human, computer-mediated interaction across the globe

    An overview on user profiling in online social networks

    Get PDF
    Advances in Online Social Networks is creating huge data day in and out providing lot of opportunities to its users to express their interest and opinion. Due to the popularity and exposure of social networks, many intruders are using this platform for illegal purposes. Identifying such users is challenging and requires digging huge knowledge out of the data being flown in the social media. This work gives an insight to profile users in online social networks. User Profiles are established based on the behavioral patterns, correlations and activities of the user analyzed from the aggregated data using techniques like clustering, behavioral analysis, content analysis and face detection. Depending on application and purpose, the mechanism used in profiling users varies. Further study on other mechanisms used in profiling users is under the scope of future endeavors

    Cyber Security

    Get PDF
    This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security

    Three Essays on Individuals’ Vulnerability to Security Attacks in Online Social Networks: Factors and Behaviors

    Get PDF
    With increasing reliance on the Internet, the use of online social networks (OSNs) for communication has grown rapidly. OSN platforms are used to share information and communicate with friends and family. However, these platforms can pose serious security threats to users. In spite of the extent of such security threats and resulting damages, little is known about factors associated with individuals’ vulnerability to online security attacks. We address this gap in the following three essays. Essay 1 draws on a synthesis of the epidemic theory in infectious disease epidemiology with the social capital theory to conceptualize factors that contribute to an individual’s role in security threat propagation in OSN. To test the model, we collected data and created a network of hacked individuals over three months from Twitter. The final hacked network consists of over 8000 individual users. Using this data set, we derived individual’s factors measuring threat propagation efficacy and threat vulnerability. The dependent variables were defined based on the concept of epidemic theory in disease propagation. The independent variables are measured based on the social capital theory. We use the regression method for data analysis. The results of this study uncover factors that have significant impact on threat propagation efficacy and threat vulnerability. We discuss the novel theoretical and managerial contributions of this work. Essay 2 explores the role of individuals’ interests in their threat vulnerability in OSNs. In OSNs, individuals follow social pages and post contents that can easily reveal their topics of interest. Prior studies show high exposure of individuals to topics of interest can decrease individuals’ ability to evaluate the risks associated with their interests. This gives attackers a chance to target people based on what they are interested in. However, interest-based vulnerability is not just a risk factor for individuals themselves. Research has reported that similar interests lead to friendship and individuals share similar interests with their friends. This similarity can increase trust among friends and makes individuals more vulnerable to security threat coming from their friends’ behaviors. Despite the potential importance of interest in the propagation of online security attacks online, the literature on this topic is scarce. To address this gap, we capture individuals’ interests in OSN and identify the association between individuals’ interests and their vulnerability to online security threats. The theoretical foundation of this work is a synthesis of dual-system theory and the theory of homophily. Communities of interest in OSN were detected using a known algorithm. We test our model using the data set and social network of hacked individuals from Essay 1. We used this network to collect additional data about individuals’ interests in OSN. The results determine communities of interests which were associated with individuals’ online threat vulnerability. Moreover, our findings reveal that similarities of interest among individuals and their friends play a role in individuals’ threat vulnerability in OSN. We discuss the novel theoretical and empirical contributions of this work. Essay 3 examines the role addiction to OSNs plays in individuals’ security perceptions and behaviors. Despite the prevalence of problematic use of OSNs and the possibility of addiction to these platforms, little is known about the functionalities of brain systems of users who suffer from OSN addiction and their online security perception and behaviors. In addressing these gaps, we have developed the Online addiction & security behaviors (OASB) theory by synthesizing dual-system theory and extended protection motivation theory (PMT). We collected data through an online survey. The results indicate that OSN addiction is rooted in the individual’s brain systems. For the OSN addicted, there is a strong cognitive-emotional preoccupation with using OSN. Our findings also reveal the positive and significant impact of OSN addiction on perceived susceptibility to and severity of online security threats. Moreover, our results show the negative association between OSN addiction and perceived self-efficacy. We discuss the theoretical and practical implications of this work
    • 

    corecore