4,693 research outputs found

    Online help-seeking in communities of practice

    Get PDF
    Interactive online help systems are considered to be a fruitful supplement to traditional IT helpdesks, which are often overloaded. They often comprise user-generated FAQ collections playing the role of technology-based conceptual artifacts. Two main questions arise: how the conceptual artifacts should be used, and which factors influence their acceptance in a community of practice (CoP). Firstly, this paper offers a theoretical frame and a usage scenario for technology-based conceptual artifacts against the theoretical background of the academic help-seeking and CoP approach. Each of the two approaches is extensively covered by psychological and educational research literature, however their combination is not yet sufficiently investigated. Secondly, the paper proposes a research model explaining the acceptance of conceptual artifacts. The model includes users’ expectations towards the artifact, perceived social influence and users’ roles in the CoP as predictors of artifact use intention and actual usage. A correlational study conducted in an academic software users’ CoP and involving structural equations modeling validates the model, suggesting thus a research line that is worth further pursuing. For educational practice, the study suggests three ways of supporting knowledge sharing in CoPs, i.e. use of technology-based conceptual artifacts, roles and division of labor, and purposeful communication in CoPs

    A New Role for Human Resource Managers: Social Engineering Defense

    Get PDF
    [Excerpt] The general risk of social engineering attacks to organizations has increased with the rise of digital computing and communications, while for an attacker the risk has decreased. In order to counter the increased risk, organizations should recognize that human resources (HR) professionals have just as much responsibility and capability in preventing this risk as information technology (IT) professionals. Part I of this paper begins by defining social engineering in context and with a brief history pre-digital age attacks. It concludes by showing the intersection of HR and IT through examples of operational attack vectors. In part II, the discussion moves to a series of measures that can be taken to help prevent social engineering attacks

    Investigating grid computing technologies for use with commercial simulation packages

    Get PDF
    As simulation experimentation in industry become more computationally demanding, grid computing can be seen as a promising technology that has the potential to bind together the computational resources needed to quickly execute such simulations. To investigate how this might be possible, this paper reviews the grid technologies that can be used together with commercial-off-the-shelf simulation packages (CSPs) used in industry. The paper identifies two specific forms of grid computing (Public Resource Computing and Enterprise-wide Desktop Grid Computing) and the middleware associated with them (BOINC and Condor) as being suitable for grid-enabling existing CSPs. It further proposes three different CSP-grid integration approaches and identifies one of them to be the most appropriate. It is hoped that this research will encourage simulation practitioners to consider grid computing as a technologically viable means of executing CSP-based experiments faster

    Efficient Implementation on Low-Cost SoC-FPGAs of TLSv1.2 Protocol with ECC_AES Support for Secure IoT Coordinators

    Get PDF
    Security management for IoT applications is a critical research field, especially when taking into account the performance variation over the very different IoT devices. In this paper, we present high-performance client/server coordinators on low-cost SoC-FPGA devices for secure IoT data collection. Security is ensured by using the Transport Layer Security (TLS) protocol based on the TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipher suite. The hardware architecture of the proposed coordinators is based on SW/HW co-design, implementing within the hardware accelerator core Elliptic Curve Scalar Multiplication (ECSM), which is the core operation of Elliptic Curve Cryptosystems (ECC). Meanwhile, the control of the overall TLS scheme is performed in software by an ARM Cortex-A9 microprocessor. In fact, the implementation of the ECC accelerator core around an ARM microprocessor allows not only the improvement of ECSM execution but also the performance enhancement of the overall cryptosystem. The integration of the ARM processor enables to exploit the possibility of embedded Linux features for high system flexibility. As a result, the proposed ECC accelerator requires limited area, with only 3395 LUTs on the Zynq device used to perform high-speed, 233-bit ECSMs in 413 ”s, with a 50 MHz clock. Moreover, the generation of a 384-bit TLS handshake secret key between client and server coordinators requires 67.5 ms on a low cost Zynq 7Z007S device

    Identifying and using eHealth phobias to implement communication protocols and change cultural and social behaviours in eHealth

    Get PDF
    Standardisation of validated communication protocols that aid in the adoption of policies, methods and tools in a secure eHealth setting require a significant cultural shift among clinician
    • 

    corecore