11,084 research outputs found

    Virtual pedagogical model: development scenarios

    Get PDF
    info:eu-repo/semantics/publishedVersio

    ICCPR Article 27 as a Basis for Multilingual Library Services: Implications of Treaty Implementation in the US Context

    Get PDF
    In response to a rapidly diversifying population, American libraries have invested considerable effort in improving collections and services in non-English languages. For the past decade, the American Library Association’s Guidelines for the Development and Promotion of Multilingual Collections and Services and its Guidelines for Library Services to Spanish-Speaking Library Users have represented the aspirations of the professional community to achieve best practices in this area. At the same time, a growing interest in critically aligning librarianship with human rights work has generated rich reflection on the application of the principles of the Universal Declaration of Human Rights (UDHR). Largely overlooked in this process, however, has been the International Covenant on Civil and Political Rights (ICCPR) which, in contrast to the UDHR, is legally binding on states parties and has been ratified by the United States. This article examines the implications of ICCPR Article 27’s guarantees of cultural and language rights for minorities on the provision of non-English library collections and services, arguing that the treaty provides a legal foundation for library advocacy to support the work envisioned in the ALA’s guideline documents

    Mobility, physical space and learning

    Get PDF
    Our biological inheritance is to sense the world through many channels including the non verbal. Learning theory, in both organizational and pedagogic contexts, has come to recognise as much, yet the dominant physical expressions given to learning space in both contexts remain rooted in linear arrangements. The advent of contemporary human processing tools and artefacts have the potential to liberate the learner yet space designs, driven by dictates of notional efficiency and a view of work and learning as separate, stationary processes, constrain through a reduction in the natural reliance on sensorial, embodied human capacities. With an example of case material, we suggest an asynchronous co-evolutionary process, a syncretisation of learning theories and space design. Granting physical expression to modern views of the learning process as mobile and corporeal can, accelerate learning. Key words Workspace, workplace, learning, complexity, organizational ecology, mobilit

    Security and trust in cloud computing and IoT through applying obfuscation, diversification, and trusted computing technologies

    Get PDF
    Cloud computing and Internet of Things (IoT) are very widely spread and commonly used technologies nowadays. The advanced services offered by cloud computing have made it a highly demanded technology. Enterprises and businesses are more and more relying on the cloud to deliver services to their customers. The prevalent use of cloud means that more data is stored outside the organization’s premises, which raises concerns about the security and privacy of the stored and processed data. This highlights the significance of effective security practices to secure the cloud infrastructure. The number of IoT devices is growing rapidly and the technology is being employed in a wide range of sectors including smart healthcare, industry automation, and smart environments. These devices collect and exchange a great deal of information, some of which may contain critical and personal data of the users of the device. Hence, it is highly significant to protect the collected and shared data over the network; notwithstanding, the studies signify that attacks on these devices are increasing, while a high percentage of IoT devices lack proper security measures to protect the devices, the data, and the privacy of the users. In this dissertation, we study the security of cloud computing and IoT and propose software-based security approaches supported by the hardware-based technologies to provide robust measures for enhancing the security of these environments. To achieve this goal, we use obfuscation and diversification as the potential software security techniques. Code obfuscation protects the software from malicious reverse engineering and diversification mitigates the risk of large-scale exploits. We study trusted computing and Trusted Execution Environments (TEE) as the hardware-based security solutions. Trusted Platform Module (TPM) provides security and trust through a hardware root of trust, and assures the integrity of a platform. We also study Intel SGX which is a TEE solution that guarantees the integrity and confidentiality of the code and data loaded onto its protected container, enclave. More precisely, through obfuscation and diversification of the operating systems and APIs of the IoT devices, we secure them at the application level, and by obfuscation and diversification of the communication protocols, we protect the communication of data between them at the network level. For securing the cloud computing, we employ obfuscation and diversification techniques for securing the cloud computing software at the client-side. For an enhanced level of security, we employ hardware-based security solutions, TPM and SGX. These solutions, in addition to security, ensure layered trust in various layers from hardware to the application. As the result of this PhD research, this dissertation addresses a number of security risks targeting IoT and cloud computing through the delivered publications and presents a brief outlook on the future research directions.Pilvilaskenta ja esineiden internet ovat nykyään hyvin tavallisia ja laajasti sovellettuja tekniikkoja. Pilvilaskennan pitkälle kehittyneet palvelut ovat tehneet siitä hyvin kysytyn teknologian. Yritykset enenevässä määrin nojaavat pilviteknologiaan toteuttaessaan palveluita asiakkailleen. Vallitsevassa pilviteknologian soveltamistilanteessa yritykset ulkoistavat tietojensa käsittelyä yrityksen ulkopuolelle, minkä voidaan nähdä nostavan esiin huolia taltioitavan ja käsiteltävän tiedon turvallisuudesta ja yksityisyydestä. Tämä korostaa tehokkaiden turvallisuusratkaisujen merkitystä osana pilvi-infrastruktuurin turvaamista. Esineiden internet -laitteiden lukumäärä on nopeasti kasvanut. Teknologiana sitä sovelletaan laajasti monilla sektoreilla, kuten älykkäässä terveydenhuollossa, teollisuusautomaatiossa ja älytiloissa. Sellaiset laitteet keräävät ja välittävät suuria määriä informaatiota, joka voi sisältää laitteiden käyttäjien kannalta kriittistä ja yksityistä tietoa. Tästä syystä johtuen on erittäin merkityksellistä suojata verkon yli kerättävää ja jaettavaa tietoa. Monet tutkimukset osoittavat esineiden internet -laitteisiin kohdistuvien tietoturvahyökkäysten määrän olevan nousussa, ja samaan aikaan suuri osuus näistä laitteista ei omaa kunnollisia teknisiä ominaisuuksia itse laitteiden tai niiden käyttäjien yksityisen tiedon suojaamiseksi. Tässä väitöskirjassa tutkitaan pilvilaskennan sekä esineiden internetin tietoturvaa ja esitetään ohjelmistopohjaisia tietoturvalähestymistapoja turvautumalla osittain laitteistopohjaisiin teknologioihin. Esitetyt lähestymistavat tarjoavat vankkoja keinoja tietoturvallisuuden kohentamiseksi näissä konteksteissa. Tämän saavuttamiseksi työssä sovelletaan obfuskaatiota ja diversifiointia potentiaalisiana ohjelmistopohjaisina tietoturvatekniikkoina. Suoritettavan koodin obfuskointi suojaa pahantahtoiselta ohjelmiston takaisinmallinnukselta ja diversifiointi torjuu tietoturva-aukkojen laaja-alaisen hyödyntämisen riskiä. Väitöskirjatyössä tutkitaan luotettua laskentaa ja luotettavan laskennan suoritusalustoja laitteistopohjaisina tietoturvaratkaisuina. TPM (Trusted Platform Module) tarjoaa turvallisuutta ja luottamuksellisuutta rakentuen laitteistopohjaiseen luottamukseen. Pyrkimyksenä on taata suoritusalustan eheys. Työssä tutkitaan myös Intel SGX:ää yhtenä luotettavan suorituksen suoritusalustana, joka takaa suoritettavan koodin ja datan eheyden sekä luottamuksellisuuden pohjautuen suojatun säiliön, saarekkeen, tekniseen toteutukseen. Tarkemmin ilmaistuna työssä turvataan käyttöjärjestelmä- ja sovellusrajapintatasojen obfuskaation ja diversifioinnin kautta esineiden internet -laitteiden ohjelmistokerrosta. Soveltamalla samoja tekniikoita protokollakerrokseen, työssä suojataan laitteiden välistä tiedonvaihtoa verkkotasolla. Pilvilaskennan turvaamiseksi työssä sovelletaan obfuskaatio ja diversifiointitekniikoita asiakaspuolen ohjelmistoratkaisuihin. Vankemman tietoturvallisuuden saavuttamiseksi työssä hyödynnetään laitteistopohjaisia TPM- ja SGX-ratkaisuja. Tietoturvallisuuden lisäksi nämä ratkaisut tarjoavat monikerroksisen luottamuksen rakentuen laitteistotasolta ohjelmistokerrokseen asti. Tämän väitöskirjatutkimustyön tuloksena, osajulkaisuiden kautta, vastataan moniin esineiden internet -laitteisiin ja pilvilaskentaan kohdistuviin tietoturvauhkiin. Työssä esitetään myös näkemyksiä jatkotutkimusaiheista

    Marketing in Online Businesses:The Case of Migrant Entrepreneurial Businesses in the UK

    Get PDF
    The study presents an empirical investigation of the marketing activities undertaken by online businesses owned by migrant entrepreneurs and is framed by the theoretical lens of entrepreneurial marketing. Key informant interviews are undertaken with 22 entrepreneurs operating online businesses in the UK and augmented by other sources of data. The study finds that the resources available to the entrepreneurs are shaped by their migrant heritage and that they draw on these resources to market their online businesses. The study also finds that, consistent with notions from entrepreneurial marketing, the online nature of their businesses allow the entrepreneurs to meet their own needs and preferences, which are also shaped by their migrant heritage. The study is important since it provides empirical evidence and a theoretically grounded understanding of how online businesses offer migrant entrepreneurs the opportunity to break out of the low growth, low margin, vacancy chain openings and enter high growth, high margin, post-industrial sectors

    A reflective characterisation of occasional user

    Get PDF
    This work revisits established user classifications and aims to characterise a historically unspecified user category, the Occasional User (OU). Three user categories, novice, intermediate and expert, have dominated the work of user interface (UI) designers, researchers and educators for decades. These categories were created to conceptualise user's needs, strategies and goals around the 80s. Since then, UI paradigm shifts, such as direct manipulation and touch, along with other advances in technology, gave new access to people with little computer knowledge. This fact produced a diversification of the existing user categories not observed in the literature review of traditional classification of users. The findings of this work include a new characterisation of the occasional user, distinguished by user's uncertainty of repetitive use of an interface and little knowledge about its functioning. In addition, the specification of the OU, together with principles and recommendations will help UI community to informatively design for users without requiring a prospective use and previous knowledge of the UI. The OU is an essential type of user to apply user-centred design approach to understand the interaction with technology as universal, accessible and transparent for the user, independently of accumulated experience and technological era that users live in

    Actual Strategies for Businesses Penetrating Foreign Markets in the Modern Economy: Globalisation Aspect

    Get PDF
    Purpose:  This article examines the theoretical aspects of businesses entering foreign markets within the context of globalisation. It highlights the challenges and opportunities presented by globalisation, focusing on the arrangement of companies and the strategic approaches adopted when entering global markets. The purpose of this study is to explore the impact of globalisation on businesses and identify strategies for successfully entering foreign markets.   Theoretical framework: The investigation is conducted within the framework of existing theories and research on globalisation, market entry strategies, and cultural and behavioural aspects influencing businesses' global expansion.   Design/methodology/approach: A qualitative approach is used, examining prior studies and research in the field, to analyse the factors influencing businesses' global expansion and the methods for entering foreign markets.   Findings: The results suggest that globalisation positively affects companies by expanding market opportunities. By examining the diversification of goods, works, and services offered by companies, the study identifies the prerequisites for successful foreign economic activity and the motives driving businesses' choice of market development strategies.   Research, Practical & Social implications: The findings contribute to a better understanding of the practical steps businesses can take to enhance their competitiveness in world markets. They highlight the importance of adapting to cultural and behavioural differences and selecting optimal strategies for market entry.   Originality/value: This study adds value to the existing literature on globalisation and market entry strategies by providing an updated perspective on the challenges and opportunities businesses face when entering foreign markets in the modern economy
    corecore