169,199 research outputs found

    Relation Based Access Control in Campus Social Network System

    Get PDF
    AbstractAs one of the most popular network applications, online social network system has gained huge adoption in the past few years. Campus social network system is a special type of social network system which focuses on providing information communication, knowledge sharing, and online collaboration services to campus users in colleges and universities. In this paper, we discuss the design of relation based access control in campus social network system which is decided by the collective efforts system designers, system administrators, and especially users of the system. Generally speaking, relation based access control in campus social network system is defined in terms of users can establish relationships; and they can also assign relation based permissions on information and resources when they release them. It consists of user-centered access control and group-centered access control which deal with access control of information and resources released in users’ personal space and groups’ shared space respectively. Once a campus social network system is put online, access control in it is actually decided by the collective intelligence of its users. Specifically, it's built upon collective intelligence that is reflected through users’ identity, their social relationships and permissions that they set on their profile and created content. In a word, relation based access control in campus social network system adopts a collective intelligence model

    Inside Dropbox: Understanding Personal Cloud Storage Services

    Get PDF
    Personal cloud storage services are gaining popularity. With a rush of providers to enter the market and an increasing of- fer of cheap storage space, it is to be expected that cloud storage will soon generate a high amount of Internet traffic. Very little is known about the architecture and the perfor- mance of such systems, and the workload they have to face. This understanding is essential for designing efficient cloud storage systems and predicting their impact on the network. This paper presents a characterization of Dropbox, the leading solution in personal cloud storage in our datasets. By means of passive measurements, we analyze data from four vantage points in Europe, collected during 42 consecu- tive days. Our contributions are threefold: Firstly, we are the first to study Dropbox, which we show to be the most widely-used cloud storage system, already accounting for a volume equivalent to around one third of the YouTube traffic at campus networks on some days. Secondly, we characterize the workload typical users in different environments gener- ate to the system, highlighting how this reflects on network traffic. Lastly, our results show possible performance bot- tlenecks caused by both the current system architecture and the storage protocol. This is exacerbated for users connected far from control and storage data-center

    Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints

    Get PDF
    Developments of seamless mobile services are faced with two broad challenges, systems security and user privacy - access to wireless systems is highly insecure due to the lack of physical boundaries and, secondly, location based services (LBS) could be used to extract highly sensitive user information. In this paper, we describe our work on developing systems which exploit location information to enhance security and services under privacy constraints. We describe two complimentary methods which we have developed to track node location information within production University Campus Networks comprising of large numbers of users. The location data is used to enhance security and services. Specifically, we describe a method for creating geographic firewalls which allows us to restrict and enhance services to individual users within a specific containment area regardless of physical association. We also report our work on LBS development to provide visualization of spatio-temporal node distribution under privacy considerations

    Being With Friends and the Potential for Binge Drinking During the First College Semester

    Get PDF
    In this prospective study, we assess the relationship between being with high school friends during the college transition and binge drinking. Across analyses (n = 489), the presence of high school friends during the college transition was associated with reduced binge drinking at the end of the first college semester among individuals at risk for this behavior because they drank in high school, associated alcohol use with the student role, or engaged in binge drinking at the beginning of the fall term. This is consistent with research linking social integration to behavioral regulation and suggests the presence of high school friends during the college transition serves as a source of social control at a juncture characterized by a reduction in normative constraint. Implications for practitioners seeking to assess new students\u27 risks for binge drinking and to more effectively meet the needs of vulnerable groups are discussed in relation to the study results

    Socio-spatial analysis of four university campuses: the implications of spatial configuration on creation and transmission of knowledge

    Get PDF
    An exploratory study of space use, interaction and students? and academics? subjectiveperceptions of interaction and vitality in the four campus sites of the PontificiaUniversidad Católica de Chile (PUC), in Santiago de Chile is presented. The fourcampuses, which differ substantially in their architecture, size and the programmaticnature of the disciplines they house, were modelled as spatial configurations usingspace syntax methods. Observations of patterns of space use and movement werecarried out and a questionnaire survey of staff and students was used to elicit perceptualand reported communication network strengths for both academic staff andstudents. One might expect that, given the twin roles of a university institution in thegeneration of new knowledge and induction of alumni into a ?professional? socialsolidarity, the roles of global and local integration would tend to compete. Globalsegregation in combination with local integration can construct the conditions forstudents to appropriate the open space and generate a powerful local identity at thelevel of the academic unit. However, global integration appears to play an importantrole in making those local solidarities accessible to one another and therefore in thegeneration of new knowledge and solidarities. The data at hand, though exploratoryin nature, suggest that the dynamic is more complex: local identity of the disciplineappears to be a necessary component in the construction of interdisciplinary ?weak?networks at the scale of the institution as a whole

    Implementation of an experimental platform for the social internet of things

    Get PDF
    The convergence of the Internet of Things (IoT) technologies with the social networking concepts has led to a new paradigm called the Social Internet of Things (SIoT), where the objects mimic the human behavior and create their own relationships based on the rules set by their owner. This is aimed at simplifying the complexity in handling the communications between billions of objects to the benefits of the humans. Whereas several IoT platforms are already available, the SIoT paradigm has represented only a field for pure research and simulations, until now. The aim of this paper is to present our implementation of a SIoT platform. We begin by analyzing the major IoT implementations, pointing out their common characteristics that could be re-used for our goal. We then discuss the major extensions we had to introduce on the existing platforms to introduce the functionalities of the SIoT. We also present the major functionalities of the proposed system: how to register a new social object to the platform, how the system manages the creation of new relationships, and how the devices create groups of members with similar characteristics. We conclude with the description of possible simple application scenarios

    Career Development Program for Refugee and Migrant Youth

    Get PDF
    The Career Guidance for Refugee and Migrant Young People project is an initiative of the South Metropolitan Migrant Resource Centre funded by the Department of Education and Training. It aims to develop, pilot and evaluate a career development and planning program that specifically meets the learning levels and needs of refugee youth with low levels of education, cultural life skills and English language ability

    The e-revolution and post-compulsory education: using e-business models to deliver quality education

    Get PDF
    The best practices of e-business are revolutionising not just technology itself but the whole process through which services are provided; and from which important lessons can be learnt by post-compulsory educational institutions. This book aims to move debates about ICT and higher education beyond a simple focus on e-learning by considering the provision of post-compulsory education as a whole. It considers what we mean by e-business, why e-business approaches are relevant to universities and colleges and the key issues this raises for post-secondary education

    Student Privacy in Learning Analytics: An Information Ethics Perspective

    Get PDF
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for assessment and information about how students live and work are blurring. Our goal in this paper is to provide a systematic discussion of the ways in which privacy and learning analytics conflict and to provide a framework for understanding those conflicts. We argue that there are five crucial issues about student privacy that we must address in order to ensure that whatever the laudable goals and gains of learning analytics, they are commensurate with respecting students’ privacy and associated rights, including (but not limited to) autonomy interests. First, we argue that we must distinguish among different entities with respect to whom students have, or lack, privacy. Second, we argue that we need clear criteria for what information may justifiably be collected in the name of learning analytics. Third, we need to address whether purported consequences of learning analytics (e.g., better learning outcomes) are justified and what the distributions of those consequences are. Fourth, we argue that regardless of how robust the benefits of learning analytics turn out to be, students have important autonomy interests in how information about them is collected. Finally, we argue that it is an open question whether the goods that justify higher education are advanced by learning analytics, or whether collection of information actually runs counter to those goods
    corecore