592,780 research outputs found

    A Review of the Literature and Implications for People with Disabilities (E-Human Resources Literature Review)

    Get PDF
    To accomplish this overview, an extensive review of the literature on information technology applications to the employment process was conducted. Three human resources related uses of the Internet are explored in this review of current literature: E-recruiting, E-benefits/HR, E-training. Each of these areas can have a significant impact on employees with disabilities, especially given the growth of business’ use of the Web. If E-recruiting is not accessible, it could prevent people from applying for or even finding open positions. E-training, if not accessible, could create a new barrier to the advancement of individuals who are unable to access online training to improve or update their skills. E-benefits, while likely to make enrollment and other activities easier for many employees, may become an obstacle for individuals with certain disabilities if not designed to be accessible. In addition, we examined the literature for any current discussion of access issues for applicants and employees with disabilities by business. In the remainder of this introduction, we also cover the World Wide Web and accessibility issues for people with disabilities, legislation relevant to Internet accessibility, and studies of Web accessibility

    The challenges of participatory research with 'tech-savvy' youth

    Get PDF
    This paper focuses on participatory research and how it can be understood and employed when researching children and youth. The aim of this paper is to provide a theoretically and empirically grounded discussion of participatory research methodologies with respect to investigating the dynamic and evolving phenomenon of young people growing up in networked societies. Initially, we review the nature of participatory research and how other researchers have endeavoured to involve young people (children and youth) in their research projects. Our review of these approaches aims to elucidate what we see as recurring and emerging issues with respect to the methodological design of involving young people as co-researchers. In the light of these issues and in keeping with our aim, we offer a case study of our own research project that seeks to understand the ways in which high school students use new media and network ICT systems (Internet, mobile phone applications, social networking sites) to construct identities, form social relations, and engage in creative practices as part of their everyday lives. The article concludes by offering an assessment of our tripartite model of participatory research that may benefit other researchers who share a similar interest in youth and new media

    IoT Security Evolution: Challenges and Countermeasures Review

    Get PDF
    Internet of Things (IoT) architecture, technologies, applications and security have been recently addressed by a number of researchers. Basically, IoT adds internet connectivity to a system of intelligent devices, machines, objects and/or people. Devices are allowed to automatically collect and transmit data over the Internet, which exposes them to serious attacks and threats. This paper provides an intensive review of IoT evolution with primary focusing on security issues together with the proposed countermeasures. Thus, it outlines the IoT security challenges as a future roadmap of research for new researchers in this domain

    Issues and challenges: cloud computing e-Government in developing countries

    Get PDF
    Cloud computing has become essential for IT resources that can be delivered as a service over the Internet. Many e-government services that are used worldwide provide communities with relatively complex applications and services. Governments are still facing many challenges in their implementation of e-government services in general, including Saudi Arabia, such as poor IT infrastructure, lack of finance, and insufficient data security. This research paper investigates the challenges of e-government cloud service models in developing countries. This paper finds that governments in developing countries are influenced by how the top management deals with the attention to the adoption of cloud computing. Further, organisational readiness levels of technologies, such as IT infrastructure, internet availability and social trust of the adoption of new technology as cloud computing, still present limitations for e-government cloud services adoption. Based on the findings of the critical review, this paper identifies the issues and challenges affecting the adoption of cloud computing in e- government such as IT infrastructure, internet availability, and trust adopted new technologies thereby highlighting benefits of cloud computing-based e-government services. Furthermore, we propose recommendations for developing IT systems focused on trust when adopting cloud computing in e-government services (CCEGov)

    Volume 13, Nos. 3 and 4

    No full text
    PapersCalling the tune in social care information, Bryan Glastonbury.Using on-line technology to teach controversial issues, Lesley Cooper.Empowerment, disability and new technologies: bridging the gap in training, Liz Dimond and Boh Davis.Experiencing practice complexities via computer: multimedia innovation in social work education, Stuart Evans, Melissa Petrakis and Phillip Swain.Integrating geographcial information systems in social work education programs, Debra Gohagan.Book reviewsManaging technological change - strategies for colleges and university leaders, review by Sue Orton.Human service technology: understanding, designing, and 57implementing computer and internet applications in the social services, review by David Colombi

    Deep Learning for Network Traffic Monitoring and Analysis (NTMA): A Survey

    Get PDF
    Modern communication systems and networks, e.g., Internet of Things (IoT) and cellular networks, generate a massive and heterogeneous amount of traffic data. In such networks, the traditional network management techniques for monitoring and data analytics face some challenges and issues, e.g., accuracy, and effective processing of big data in a real-time fashion. Moreover, the pattern of network traffic, especially in cellular networks, shows very complex behavior because of various factors, such as device mobility and network heterogeneity. Deep learning has been efficiently employed to facilitate analytics and knowledge discovery in big data systems to recognize hidden and complex patterns. Motivated by these successes, researchers in the field of networking apply deep learning models for Network Traffic Monitoring and Analysis (NTMA) applications, e.g., traffic classification and prediction. This paper provides a comprehensive review on applications of deep learning in NTMA. We first provide fundamental background relevant to our review. Then, we give an insight into the confluence of deep learning and NTMA, and review deep learning techniques proposed for NTMA applications. Finally, we discuss key challenges, open issues, and future research directions for using deep learning in NTMA applications.publishedVersio
    • 

    corecore