22,257 research outputs found

    Application of Web 2.0 technologies in e-government: A United Kingdom case study

    Get PDF
    Electronic government (e-Government) has endured significant transformation over the last decade and currently, it is making further leaps by incorporating modern technologies such as second generation web (Web 2.0) technologies. However, since the development and use of this kind of technology is still at its early stages in the public sector, research about the use of Web 2.0 in this domain is still highly tentative and lacks theoretical underpinning. This paper reports the preliminary findings of an in-depth case study in the United Kingdom (UK) public sector, which explore the application of Web 2.0 technologies in the local government authority (LGA). The findings elicited from the case study offer an insight into information systems (IS) evaluation criterions and impact factors of Web 2.0 from both a practical setting and an internal organisational perspective. This paper concludes that a combined analysis of the evaluation and impact factors rather than a singular approach would better assist the decision making process that leads to effective application of Web 2.0 technologies. It also highlights the significant impact and perceived effect of adoption of such technologies

    Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments

    Get PDF
    Decentralized systems are a subset of distributed systems where multiple authorities control different components and no authority is fully trusted by all. This implies that any component in a decentralized system is potentially adversarial. We revise fifteen years of research on decentralization and privacy, and provide an overview of key systems, as well as key insights for designers of future systems. We show that decentralized designs can enhance privacy, integrity, and availability but also require careful trade-offs in terms of system complexity, properties provided, and degree of decentralization. These trade-offs need to be understood and navigated by designers. We argue that a combination of insights from cryptography, distributed systems, and mechanism design, aligned with the development of adequate incentives, are necessary to build scalable and successful privacy-preserving decentralized systems

    Poor Philanthropist II: New approaches to sustainable development

    Get PDF
    The second title in the Poor Philanthropist Series, this monograph represents the culmination of a six-year journey; a journey characterised in the first three years by in-depth qualitative research which resulted in an understanding of philanthropic traditions among people who are poor in southern Africa and gave rise to new and innovative concepts which formed the focus of the research monograph The Poor Philanthropist: How and Why the Poor Help Each Other, published by the Southern Africa-United States Centre for Leadership and Public Values in 2005

    Peer-to-Peer File Sharing WebApp: Enhancing Data Security and Privacy through Peer-to-Peer File Transfer in a Web Application

    Get PDF
    Peer-to-peer (P2P) networking has emerged as a promising technology that enables distributed systems to operate in a decentralized manner. P2P networks are based on a model where each node in the network can act as both a client and a server, thereby enabling data and resource sharing without relying on centralized servers. The P2P model has gained considerable attention in recent years due to its potential to provide a scalable, fault-tolerant, and resilient architecture for various applications such as file sharing, content distribution, and social networks.In recent years, researchers have also proposed hybrid architectures that combine the benefits of both structured and unstructured P2P networks. For example, the Distributed Hash Table (DHT) is a popular hybrid architecture that provides efficient lookup and search algorithms while maintaining the flexibility and adaptability of the unstructured network.To demonstrate the feasibility of P2P systems, several prototypes have been developed, such as the BitTorrent file-sharing protocol and the Skype voice-over-IP (VoIP) service. These prototypes have demonstrated the potential of P2P systems for large-scale applications and have paved the way for the development of new P2P-based systems

    A schema-based P2P network to enable publish-subscribe for multimedia content in open hypermedia systems

    No full text
    Open Hypermedia Systems (OHS) aim to provide efficient dissemination, adaptation and integration of hyperlinked multimedia resources. Content available in Peer-to-Peer (P2P) networks could add significant value to OHS provided that challenges for efficient discovery and prompt delivery of rich and up-to-date content are successfully addressed. This paper proposes an architecture that enables the operation of OHS over a P2P overlay network of OHS servers based on semantic annotation of (a) peer OHS servers and of (b) multimedia resources that can be obtained through the link services of the OHS. The architecture provides efficient resource discovery. Semantic query-based subscriptions over this P2P network can enable access to up-to-date content, while caching at certain peers enables prompt delivery of multimedia content. Advanced query resolution techniques are employed to match different parts of subscription queries (subqueries). These subscriptions can be shared among different interested peers, thus increasing the efficiency of multimedia content dissemination
    • …
    corecore