535 research outputs found

    Formal Verification of Safety Properties for Ownership Authentication Transfer Protocol

    Full text link
    In ubiquitous computing devices, users tend to store some valuable information in their device. Even though the device can be borrowed by the other user temporarily, it is not safe for any user to borrow or lend the device as it may cause private data of the user to be public. To safeguard the user data and also to preserve user privacy we propose and model the technique of ownership authentication transfer. The user who is willing to sell the device has to transfer the ownership of the device under sale. Once the device is sold and the ownership has been transferred, the old owner will not be able to use that device at any cost. Either of the users will not be able to use the device if the process of ownership has not been carried out properly. This also takes care of the scenario when the device has been stolen or lost, avoiding the impersonation attack. The aim of this paper is to model basic process of proposed ownership authentication transfer protocol and check its safety properties by representing it using CSP and model checking approach. For model checking we have used a symbolic model checker tool called NuSMV. The safety properties of ownership transfer protocol has been modeled in terms of CTL specification and it is observed that the system satisfies all the protocol constraint and is safe to be deployed.Comment: 16 pages, 7 figures,Submitted to ADCOM 201

    Collaborative trails in e-learning environments

    Get PDF
    This deliverable focuses on collaboration within groups of learners, and hence collaborative trails. We begin by reviewing the theoretical background to collaborative learning and looking at the kinds of support that computers can give to groups of learners working collaboratively, and then look more deeply at some of the issues in designing environments to support collaborative learning trails and at tools and techniques, including collaborative filtering, that can be used for analysing collaborative trails. We then review the state-of-the-art in supporting collaborative learning in three different areas – experimental academic systems, systems using mobile technology (which are also generally academic), and commercially available systems. The final part of the deliverable presents three scenarios that show where technology that supports groups working collaboratively and producing collaborative trails may be heading in the near future

    Brave New Wireless World: Mapping the Rise of Ubiquitous Connectivity from Myth to Market

    Get PDF
    This dissertation offers a critical and historical analysis of the myth of ubiquitous connectivity—a myth widely associated with the technological capabilities offered by “always on” Internet-enabled mobile devices like smartphones and tablets. This myth proclaims that work and social life are optimized, made more flexible, manageable, and productive, through the use of these devices and their related services. The prevalence of this myth—whether articulated as commercial strategy, organizational goal, or mode of social mediation—offers repeated claims that the experience and organization of daily life has passed a technological threshold. Its proponents champion the virtues of the invisible “last mile” tethering individuals (through their devices) primarily to commercial networks. The purpose of this dissertation is to uncover the interaction between the proliferation of media artifacts and the political economic forces and relations occluded by this myth. To do this, herein the development of the BlackBerry, as a specific brand of devices and services, is shown to be intimately interrelated with the myth of ubiquitous connectivity. It demonstrates that the BlackBerry is a technical artifact whose history sheds light on key characteristics of our media environment and the political economic dynamics shaping the development of other technologies, workforce composition and management, and more general consumption proclivities. By pointing to the analytic significance of the BlackBerry, this work does not intend to simply praise its creators for their technical and commercial achievements. Instead, it aims to show how these achievements express a synthesis that represents the motivations of economic actors and prevailing modes of thought most particularly as they are drawn together in and through the myth of ubiquitous connectivity. The narrative arc of this dissertation is anchored by moments of harmonization among political economic interests as these shape (and are shaped by) prevailing modes of producing and relating through ubiquitous connectivity

    Presence in the Past: An Examination of the Use of Technology in History Museums to Adapt to the Modern Museumgoer

    Get PDF
    Museums have been changing rapidly in the past few decades, shifting from focusing on the collections to the interactive experience gained by the visitor through their museum experience. Technology has been used as one tool to facilitate this change, but it is varied and continuously changing. Because of the relatively new use of technology by history museums and its constantly changing nature, research such as this study is needed on technological applications in historical interpretation. This analysis is based on interviews with a variety of museum professionals, an extensive literature review, and examples from museums. This research shows that technology has been used by museums before the museum experience to attract and prepare visitors, during the museum experience in exhibits and as guides, and after the museum experience as a means to maintain contact. This use of technology has brought numerous benefits in helping allow for an interactive, visitor-focused museum offering a personalized experience, however there are potential drawbacks. These include the visitor ignoring the artifacts and not interacting socially in the museum. However, of most concern to museum professionals and historians is that their authority and expertise in historical interpretation may be diminished

    America Online Inc.: The Portal Era

    Get PDF
    Information Systems Working Papers Serie

    Electronic business and electronic commerce (supporting lecture notes for students of dirеction "Management" of all forms of education)

    Get PDF
    E-Business systems naturally have greater security risks than traditional business systems, therefore it is important for e-business systems to be fully protected against these risks. Customers, suppliers, employees, and numerous other people use any particular e-business system daily and expect their confidential information to stay secure. Hackers are one of the great threats to the security of e-businesses. Some common security concerns for e-Businesses include keeping business and customer information private and confidential, authenticity of data, and data integrity. Some of the methods of protecting e-business security and keeping information secure include physical security measures as well as data storage, data transmission, anti-virus software, firewalls, and encryption to list a few.Розглянуто та рекомендовано до друку на засіданні кафедри інноваційного менеджменту та підприємництва, протокол No1 від 27 серпня 2015 року. Схвалено та рекомендовано до друку на засіданні методичної комісії факультету управління та бізнесу у виробництві Тернопільського національного технічного університету імені Івана Пулюя, протокол No6 від 26 лютого 2016 року.The purpose of thе document is to present the different underlying "technologies" (in reality, organizational modes based on information and communication technologies) and their associated acronyms. The term "e-Business" therefore refers to the integration, within the company, of tools based on information and communication technologies (generally referred to as business software) to improve their functioning in order to create value for the enterprise, its clients, and its partners.Topic 1. Basic concepts of electronic business and electronic commerce 1.1. Basic concepts and principles of e-business. 1.2. Origins and growth of e-commerce. Topic 2. Ecommerce as a part of electronic business 2.1. E-business infrastructure, e-environment and e-business strategy 2.2. Ways of e-business conducting. Online trading. Topic 3. Basis of global computer network internet functioning. 3.1. Basic principles of internet. 3.2. The most common services of Іnternet. 3.3. The concept and structure of Internet marketing. Topic 4. E-commerce systems in corporate sector 4.1. The basic processes of implementation of electronic commerce in the B2B sector. Virtual enterprise, internet incubator, mobile commerce. 4.2. The role of supply-chain management (SCM) and customer relationship management (CRM) in e-commerce. Topic 5. Information management for effective e-commerce building through intranet and extranet 5.1. Basic principles of Intranet functioning. 5.2. Extranet and its security issues. Topic 6. Electronic payment systems 6.1. Electronic payment systems. 6.2. Primary classification of payment systems

    Impact of Instant Connectivity on Business Productivity: A Study Using the Community Embodiment Model (CEM)

    Get PDF
    The last decade has seen a significant growth in mobile technologies. Predominantly this technology has been relegated to the realm of personal use, but as this work will suggest, cost related effects of such technologies also need to be considered. For most organizations maximizing operational efficiency is the main reason why new technologies are acquired. However, apart from basic costs, such as total cost of ownership of mobile technologies, other costs (business process reengineering, and employee morale) need to be measured in order to ascertain if an organization can withstand a change to a next-generation system. This study attempts to evaluate ideas put forth by the Community Embodiment Model (CEM) as possible quantifiable variables which may assist an organization in coming to a conclusion about introducing a new product and process. The quantified variables are used in the development of a formula which alongside a simulation program and an Excel sheet gives a detailed picture of benefits gained, costs incurred, and the future picture of the initial investment. Through sensitive analysis the findings of the study will indicate the importance of factors such as employee morale on the success of a particular mobile device (Personal Digital Assistant) implementation at an organization level

    (Re)-conceptualizing design approaches for mobile language learning

    Get PDF
    An exploratory study conducted at George Brown College in Toronto, Canada between 2007 and 2009 investigated language learning with mobile devices as an approach to augmenting ESP learning by taking learning outside the classroom into the real-world context. In common with findings at other community colleges, this study identified inadequate language proficiency, particularly in speaking and listening skills, as a major barrier for ESL college learners seeking employment, or employers hiring and retaining immigrants as employees (CIITE, 2004; Palalas, 2009). As a result of these findings, language support was designed to provide English language instruction going beyond the standard 52-hour course: a hybrid English for Accounting course encompassing in-class, online and mobile-assisted ESP instruction. This paper reports on the pilot study of the mobile component of this re-designed course, which represents the first stage of an on-going Design-Based Research (DBR) study. Discussion is also offered of a new learning theory which we have called Ecological Constructivism (Hoven, 2008; Jakobsdottir, McKeown & Hoven, 2010), devised to incorporate the multiple dimensions of Ecological Linguistics and Constructivism in the situated and context-embedded learning engendered by these new uses of mobile devices
    corecore