146 research outputs found

    Mobile Presence Information Sharing : Communicating by sharing presence information

    Get PDF
    The objective of this thesis is to explore the new open standard framework SIMPLE (Session Initiation Protocol for Instant Messaging and Presence Leveraging Extensions) and its ability to provide presence mediated communication between mobile users. To discuss central concepts like communication, mobility, presence, context, awareness and interaction overload I have done a literature study and I present important theories and models to explain these concepts. For giving an overview over new communication options with both voice over IP and GSM available on mobile phones I have made several use cases and scenarios describing these new possibilities To test the abilities of the SIMPLE framework I have made a working prototype setup which allows for sharing of presence information between users. And I also discuss issues with communication that SIMPLE can help resolve

    Privacy as a Public Good

    Get PDF
    Privacy is commonly studied as a private good: my personal data is mine to protect and control, and yours is yours. This conception of privacy misses an important component of the policy problem. An individual who is careless with data exposes not only extensive information about herself, but about others as well. The negative externalities imposed on nonconsenting outsiders by such carelessness can be productively studied in terms of welfare economics. If all relevant individuals maximize private benefit, and expect all other relevant individuals to do the same, neoclassical economic theory predicts that society will achieve a suboptimal level of privacy. This prediction holds even if all individuals cherish privacy with the same intensity. As the theoretical literature would have it, the struggle for privacy is destined to become a tragedy. But according to the experimental public-goods literature, there is hope. Like in real life, people in experiments cooperate in groups at rates well above those predicted by neoclassical theory. Groups can be aided in their struggle to produce public goods by institutions, such as communication, framing, or sanction. With these institutions, communities can manage public goods without heavy-handed government intervention. Legal scholarship has not fully engaged this problem in these terms. In this Article, we explain why privacy has aspects of a public good, and we draw lessons from both the theoretical and the empirical literature on public goods to inform the policy discourse on privacy

    A model for representing the motivational and cultural factors that influence mobile phone usage variety

    Get PDF
    Mobile phone usage involves the mobile phone, the telecommunications system, mobile phone users, and the adoption and use of the system. Mobile communications is a complex and rapidly changing industry consisting of the hardware, software, network and business aspects. Mobile phone users are influenced by demographic, social, cultural and contextual factors that complicate the understanding of mobile phone usage. Advances in technology and market competition drive the addition of new services and features. In contrast, human cognition and attention are more constrained and many users find it difficult to cope with the cognitive demands of mobile phone technology. The aim of this study is to develop a model for representing the influence of motivational needs and cultural factors on mobile phone usage variety. The link between motivational needs and mobile phone usage variety, the cultural factors that influence mobile phone usage variety, as well as usage spaces as an approach to representing usage variety, are researched. The research encompasses a literature study, structured interviews, a pilot study and a survey. The pilot study and survey yielded data about mobile phone usage of university students under the age of 30 in South Africa. The results from the statistical analysis were triangulated with the findings of the literature study and the observations made about mobile phone usage during this two-year period. A final survey was conducted to verify the model. The contribution of this study is a mobile phone technology usage model (MOPTUM) for representing the motivational and cultural factors that influence mobile phone usage variety in such a way that users can use the model to express their mobile phone usage needs in non-technical terms while marketers and designers can use the model to convert the expressed user needs into the features required. MOPTUM draws on concepts and models from sociology, computer-supported cooperative work, human-computer interaction and technology adoption models from the field of marketing. MOPTUM verifies some existing findings on mobile phone usage and then integrates and extends these existing models to provide a new model for understanding the motivational and cultural factors that influence mobile phone usage variety.ComputingPh. D. (Computer Science

    Decision Support Systems

    Get PDF
    Decision support systems (DSS) have evolved over the past four decades from theoretical concepts into real world computerized applications. DSS architecture contains three key components: knowledge base, computerized model, and user interface. DSS simulate cognitive decision-making functions of humans based on artificial intelligence methodologies (including expert systems, data mining, machine learning, connectionism, logistical reasoning, etc.) in order to perform decision support functions. The applications of DSS cover many domains, ranging from aviation monitoring, transportation safety, clinical diagnosis, weather forecast, business management to internet search strategy. By combining knowledge bases with inference rules, DSS are able to provide suggestions to end users to improve decisions and outcomes. This book is written as a textbook so that it can be used in formal courses examining decision support systems. It may be used by both undergraduate and graduate students from diverse computer-related fields. It will also be of value to established professionals as a text for self-study or for reference

    SID 04, Social Intelligence Design:Proceedings Third Workshop on Social Intelligence Design

    Get PDF

    Tantalisingly Close

    Get PDF
    While studies of mobile wireless communication devices usually focus on their social implications, De Vries proposes to venture into a more historical and comparative direction to shed light on our preoccupation with them in the first place. He constructs an archaeological view of the development of communication technologies over the past 200 years, providing a comprehensive account of how persistent hopes and beliefs have come to give mobile wireless media such a prominent position today. Our expectations and uses of them are surprisingly similar to those of older media; consequently, they reconfirm the idea that living in an ‘anyone, anything, anytime, anywhere’ world is both a blessing and a curse, and that the desire for sublime communication is a tragic yet highly powerful regulative principle in our media evolution

    Moving Circles: mobile media and playful identities

    Get PDF
    The mobile phone has become part of our everyday lives with astonishing speed. Over four billion people now have access to mobile phones, and this number keeps increasing. Mobile media technologies shape how we communicate with each other, and relate to the world. This raises questions about their influence on identity. Medium-specific properties and user-practices challenge the idea that we understand ourselves through stories. It is proposed that the notion of play sheds new light on how technologies shape identities. The mobile phone mediates identities on four play levels: we play on the mobile, with the mobile, through the mobile, and at the same time we are played by the mobile. Mobile media bring new freedom of movement. Yet at the same time they constrict us. In this dialectic we become moving circles

    The influence of total domestic outsourcing on the role of the IT function: a case study of the BBC

    Get PDF
    The prominent themes of the research are total domestic outsourcing and the role of the IT function. The latter has been an issue for researchers and practitioners since the early days of information systems. The role of IT has changed considerably over the years, from basic administrative data processing to the central focus of enabling strategic processes. The literature reveals the considerable changes that have taken place over the last 30 years in the role of the IT function. The IT department over the years has moved from a traditional manufacturing role, where the department would be involved in software development and maintenance, computer operations, and technical services, to a more services orientated role. In addition, IT outsourcing has grown over the past thirty years to become a major industry. It usually involves some transfer of assets and staff to the vendor. The concept of IT outsourcing has changed over the years from a tactical option for the IT function to, in some cases, a significant part of a long-term strategy to structure and manage organisations. As such, it has often had a considerable influence on the role of the IT function. Although much has been written about IT sourcing strategy, there is a gap in the literature regarding in-depth case studies of the impact of IT outsourcing on the IT function, seen within various levels of the organisation, from senior management down to operations, and everyday users. Similarly, there are few studies that consider IT outsourcing in the context of other competitive and industrial forces that are affecting the management and operation of large organisations. This research comprises a detailed case study of the implementation of large-scale domestic IT outsourcing within the British Broadcasting Corporation (BBC). It utilises Activity Theory as a lens to examine the implementation from the perspective of various stakeholder groups at different levels within the organisation in order to address the research question: “What is the influence of total domestic IT outsourcing on the role of the IT function?” The central contributions of the thesis are within the methodological and theoretical areas. The in-depth case study of a large organisation with a rich culture draws out interesting data, and the use of Activity Theory analyses the data in a novel way. The total domestic outsourcing affects not only the role of the IT function, but the entire organisation. It leads to huge transfers of staff and assets, restructures, redundancies and changes to everyday processe

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    Towards Modular and Flexible Access Control on Smart Mobile Devices

    Get PDF
    Smart mobile devices, such as smartphones and tablets, have become an integral part of our daily personal and professional lives. These devices are connected to a wide variety of Internet services and host a vast amount of applications, which access, store and process security- and privacy-sensitive data. A rich set of sensors, ranging from microphones and cameras to location and acceleration sensors, allows these applications and their back end services to reason about user behavior. Further, enterprise administrators integrate smart mobile devices into their IT infrastructures to enable comfortable work on the go. Unsurprisingly, this abundance of available high-quality information has made smart mobile devices an interesting target for attackers, and the number of malicious and privacy-intrusive applications has steadily been rising. Detection and mitigation of such malicious behavior are in focus of mobile security research today. In particular, the Android operating system has received special attention by both academia and industry due to its popularity and open-source character. Related work has scrutinized its security architecture, analyzed attack vectors and vulnerabilities and proposed a wide variety of security extensions. While these extensions have diverse goals, many of them constitute modifications of the Android operating system and extend its default permission-based access control model. However, they are not generic and only address specific security and privacy concerns. The goal of this dissertation is to provide generic and extensible system-centric access control architectures, which can serve as a solid foundation for the instantiation of use-case specific security extensions. In doing so, we enable security researchers, enterprise administrators and end users to design, deploy and distribute security extensions without further modification of the underlying operating system. To achieve this goal, we first analyze the mobile device ecosystem and discuss how Android's security architecture aims to address its inherent threats. We proceed to survey related work on Android security, focusing on system-centric security extensions, and derive a set of generic requirements for extensible access control architectures targeting smart mobile devices. We then present two extensible access control architectures, which address these requirements by providing policy-based and programmable interfaces for the instantiation of use-case specific security solutions. By implementing a set of practical use-cases, ranging from context-aware access control, dynamic application behavior analysis to isolation of security domains we demonstrate the advantages of system-centric access control architectures over application-layer approaches. Finally, we conclude this dissertation by discussing an alternative approach, which is based on application-layer deputies and can be deployed whenever practical limitations prohibit the deployment of system-centric solutions
    corecore