72,361 research outputs found

    How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL

    Get PDF
    Social relationships are a natural basis on which humans make trust decisions. Online Social Networks (OSNs) are increasingly often used to let users base trust decisions on the existence and the strength of social relationships. While most OSNs allow users to discover the length of the social path to other users, they do so in a centralized way, thus requiring them to rely on the service provider and reveal their interest in each other. This paper presents Social PaL, a system supporting the privacy-preserving discovery of arbitrary-length social paths between any two social network users. We overcome the bootstrapping problem encountered in all related prior work, demonstrating that Social PaL allows its users to find all paths of length two and to discover a significant fraction of longer paths, even when only a small fraction of OSN users is in the Social PaL system - e.g., discovering 70% of all paths with only 40% of the users. We implement Social PaL using a scalable server-side architecture and a modular Android client library, allowing developers to seamlessly integrate it into their apps.Comment: A preliminary version of this paper appears in ACM WiSec 2015. This is the full versio

    Exploring anti-corruption capabilities of e-procurement in construction project delivery in Nigeria

    Get PDF
    The use of electronic (e-­) procurement to support the execution of supply chain management activities in the different industrial sectors is permeating all regions of the world. However, in countries in sub-Saharan Africa where there is a significant level of corruption and unethical practices in the procurement process, there is a need for a better understanding of how e-Procurement can help to check the incidence of corrupt and unethical practices in construction project delivery. This study relied on a cross-sectional survey of 759 respondents, including architects, builders, engineers, estate/facilities managers, contractors, construction/project managers, quantity surveyors, supply chain managers and others to identify and analyse the anti-corruption capabilities of e-Procurement in construction project delivery in Nigeria. The results of the descriptive statistics, relative importance index and principal components analysis identified 18 anti-corruption capabilities in e-Procurement in construction project delivery with the three most important ones being the capability of e-Procurement to ensure good inventory management/record keeping; accountability by providing audit services trail and minimise direct human contacts during bidding. The key underlying dimensions of these capabilities include the advantage of e-Procurement over the traditional paper-based method; transparent bidding process and increase in competition in construction project delivery process. The findings of this study have implications, especially, on the use of e-Procurement to curb corruption in construction procurement activities

    Constructing Identity and Heritage at the Crossroads: Albanian Families’ Cross-Border Connections and Homemaking Projects in Athens

    Get PDF
    Drawing from the author’s ethnographic/participatory work with Albanian families in Athens, this paper tells the story of two families constructing identity and heritage in Greece and Albania. The processes involved in the families’ literal and metaphorical connections with the ‘old country’, manifested in cross-border links, everyday routines and material cultures, are integral to their homebuilding projects in their new locale. Given families’ multiple-place-allegiance and disenfranchised status in a Greek context, theories on transnationalism and history and heritage from below are utilised in order to consider identity and heritage formation in the course of everyday routines. It is argued that the experience of building lives in more than two worlds results in the emergence of plurilocal identities, challenging spatially bounded notions of heritage

    Towards distributed architecture for collaborative cloud services in community networks

    Get PDF
    Internet and communication technologies have lowered the costs for communities to collaborate, leading to new services like user-generated content and social computing, and through collaboration, collectively built infrastructures like community networks have also emerged. Community networks get formed when individuals and local organisations from a geographic area team up to create and run a community-owned IP network to satisfy the community’s demand for ICT, such as facilitating Internet access and providing services of local interest. The consolidation of today’s cloud technologies offers now the possibility of collectively built community clouds, building upon user-generated content and user-provided networks towards an ecosystem of cloud services. To address the limitation and enhance utility of community networks, we propose a collaborative distributed architecture for building a community cloud system that employs resources contributed by the members of the community network for provisioning infrastructure and software services. Such architecture needs to be tailored to the specific social, economic and technical characteristics of the community networks for community clouds to be successful and sustainable. By real deployments of clouds in community networks and evaluation of application performance, we show that community clouds are feasible. Our result may encourage collaborative innovative cloud-based services made possible with the resources of a community.Peer ReviewedPostprint (author’s final draft
    • 

    corecore