694 research outputs found

    From Social Data Mining to Forecasting Socio-Economic Crisis

    Full text link
    Socio-economic data mining has a great potential in terms of gaining a better understanding of problems that our economy and society are facing, such as financial instability, shortages of resources, or conflicts. Without large-scale data mining, progress in these areas seems hard or impossible. Therefore, a suitable, distributed data mining infrastructure and research centers should be built in Europe. It also appears appropriate to build a network of Crisis Observatories. They can be imagined as laboratories devoted to the gathering and processing of enormous volumes of data on both natural systems such as the Earth and its ecosystem, as well as on human techno-socio-economic systems, so as to gain early warnings of impending events. Reality mining provides the chance to adapt more quickly and more accurately to changing situations. Further opportunities arise by individually customized services, which however should be provided in a privacy-respecting way. This requires the development of novel ICT (such as a self- organizing Web), but most likely new legal regulations and suitable institutions as well. As long as such regulations are lacking on a world-wide scale, it is in the public interest that scientists explore what can be done with the huge data available. Big data do have the potential to change or even threaten democratic societies. The same applies to sudden and large-scale failures of ICT systems. Therefore, dealing with data must be done with a large degree of responsibility and care. Self-interests of individuals, companies or institutions have limits, where the public interest is affected, and public interest is not a sufficient justification to violate human rights of individuals. Privacy is a high good, as confidentiality is, and damaging it would have serious side effects for society.Comment: 65 pages, 1 figure, Visioneer White Paper, see http://www.visioneer.ethz.c

    ACUTA Journal of Telecommunications in Higher Education

    Get PDF
    In This Issue President\u27s Message From the ACUTA CEO Transforming an lT organization to a Service organization: lt\u27s About the People Beating the odds: lmplementation of a University Portal Journey to the Cloud Near Field Technology Opens Doors Legal Considerations in DAS Deployment Managing BYOD and Mobile Devices in a University Environment One-Size-Fits-All Websites Don\u27t Always Fit lnstitutional Excellence Award: Sewanee: The University of the Sout

    A Risk management framework for the BYOD environment

    Get PDF
    Computer networks in organisations today have different layers of connections, which are either domain connections or external connections. The hybrid network contains the standard domain connections, cloud base connections, “bring your own device” (BYOD) connections, together with the devices and network connections of the Internet of Things (IoT). All these technologies will need to be incorporated in the Oman Vision 2040 strategy, which will involve changing several cities to smart cities. To implement this strategy artificial intelligence, cloud computing, BYOD and IoT will be adopted. This research will focus on the adoption of BYOD in the Oman context. It will have advantages for organisations, such as increasing productivity and reducing costs. However, these benefits come with security risks and privacy concerns, the users being the main contributors of these risks. The aim of this research is to develop a risk management and security framework for the BYOD environment to minimise these risks. The proposed framework is designed to detect and predict the risks by the use of MDM event logs and function logs. The chosen methodology is a combination of both qualitative and quantitative approaches, known as a mixed-methods approach. The approach adopted in this research will identify the latest threats and risks experienced in BYOD environments. This research also investigates the level of user-awareness of BYOD security methods. The proposed framework will enhance the current techniques for risk management by improving risk detection and prediction of threats, as well as, enabling BYOD risk management systems to generate notifications and recommendations of possible preventive/mitigation actions to deal with them

    Emerging technologies for learning report (volume 3)

    Get PDF

    Evaluation of the Accessibility of Touchscreens for Individuals who are Blind or have Low Vision: Where to go from here

    Get PDF
    Touchscreen devices are well integrated into daily life and can be found in both personal and public spaces, but the inclusion of accessible features and interfaces continues to lag behind technology’s exponential advancement. This thesis aims to explore the experiences of individuals who are blind or have low vision (BLV) while interacting with non-tactile touchscreens, such as smartphones, tablets, smartwatches, coffee machines, smart home devices, kiosks, ATM machines, and more. The goal of this research is to create a set of recommended guidelines that can be used in designing and developing either personal devices or shared public technologies with accessible touchscreens. This study consists of three phases, the first being an exploration of existing research related to accessibility of non-tactile touchscreens, followed by semi-structured interviews of 20 BLV individuals to address accessibility gaps in previous work, and finally a survey in order to get a better understanding of the experiences, thoughts, and barriers for BLV individuals while interacting with touchscreen devices. Some of the common themes found include: loss of independence, lack or uncertainty of accessibility features, and the need and desire for improvements. Common approaches for interaction were: the use of high markings, asking for sighted assistance, and avoiding touchscreen devices. These findings were used to create a set of recommended guidelines which include a universal feature setup, the setup of accessibility settings, universal headphone jack position, tactile feedback, ask for help button, situational lighting, and the consideration of time

    The implementation of information and communication technology (ICT) intergrated teaching and learning in textiles and clothing programmes at one University of Science and Techology in Zimbabwe

    Get PDF
    Textiles and Clothing programmes in universities worldwide experience numerous challenges in effectively implementing ICT integrated teaching and learning. The aim of this study was to explore how ICT integrated teaching and learning was implemented in Textiles and Clothing programmes at one university of Science and Technology in Zimbabwe, with a view to developing a suitable model to enhance effective implementation. The study was informed by the Activity theory and triangulated by the Technological pedagogical content knowledge framework (TPACK) and the Functionality framework. The study made use of the interpretive research paradigm, the qualitative approach and intrinsic case study design, to generate the necessary data. The participants of the study were purposively and quota sampled from the Textiles and Clothing department of the selected university of Science and Technology, and consisted of seven lecturers, three administrators, two ICT technicians and thirty-two students. Four methods were used to generate data namely in-depth interviews, focus group interviews, participant observation, and document analysis. After coding, data were analysed for content using thematic analysis. The study established that there were no specific ICT hardware and software packages acquired by the universityfor the Textiles and Clothing programmes. Instead, general design related softwares such as CorelDraw, Photoshop, Adobe Illustrator and Mac Paints were used to support the implementation of ICT integrated teaching and learning. The findings of the study further revealed that lecturers lacked thorough technological pedagogical knowledge to apply a variety of ICT in the teaching and learning of students. The study established that there was lack of an effective mechanism for providing monitoring and evaluation as the peer review and evaluation mechanism that was used in the Textiles and Clothing programmes did not identify the specific indicators for the implementation of ICT integrated teaching and learning. Among the conclusions emanating from the findings were that the Textiles and Clothing programmes suffered serious shortage of suitable ICT hardware and subject-specific ICT software applications to facilitate the teaching of practical components thereby compromising the effective implementation of ICT integrated teaching and learning to foster effective skill acquisition in relation to ICT among students. It was also concluded that lecturers were finding difficulties in implementing ICT integrated teaching and learning as they lacked thorough technological-pedagogical-content knowledge and skills that would enable them to select appropriate technological resources and technological pedagogical strategies to teach students appropriate content. The study recommended that the Textiles and Clothing department, through the support of the university, should acquire subject related educational hardware and software like Gerber or Lectra to teach the practical courses of the programmes. The university should organise professional development programmes focussing on TPACK to assist lecturers to develop competences in ICT necessary for implementing ICT integrated teaching and learning. A model was proposed to enhance the effective implementation of ICT integrated teaching and learning into the Textiles and Clothing programmes at the University

    Smartphone malware based on synchronisation vulnerabilities

    Full text link
    Smartphones are mobile phones that offer processing power and features like personal computers (PC) with the aim of improving user productivity as they allow users to access and manipulate data over networks and Internet, through various mobile applications. However, with such anywhere and anytime functionality, new security threats and risks of sensitive and personal data are envisaged to evolve. With the emergence of open mobile platforms that enable mobile users to install applications on their own, it opens up new avenues for propagating malware among various mobile users very quickly. In particular, they become crossover targets of PC malware through the synchronization function between smartphones and computers. Literature lacks detailed analysis of smartphones malware and synchronization vulnerabilities. This paper addresses these gaps in literature, by first identifying the similarities and differences between smartphone malware and PC malware, and then by investigating how hackers exploit synchronization vulnerabilities to launch their attacks

    ACUTA Journal of Telecommunications in Higher Education

    Get PDF
    In This Issue 5G\u27s Promise: 1,000 x Capacity, 1,000 x Challenges Higher-Speed WLANs About to Emerge State of the Residential Network 2013 LTE: The Next Wave of Wireless Evolution The 10 Most Costly Pitfalls of DAS Deployment and How to Avoid Them DAS on Campus: Solutions for Wireless Service Decision Criteria for Selecting a Wireless lntrusion Prevention System lnstitutional Excellence Award President\u27s Message From the CE
    corecore