48,768 research outputs found

    A Factory-based Approach to Support E-commerce Agent Fabrication

    Get PDF
    With the development of Internet computing and software agent technologies, agent-based e-commerce is emerging. How to create agents for e-commerce applications has become an important issue along the way to success. We propose a factory-based approach to support agent fabrication in e-commerce and elaborate a design based on the SAFER (Secure Agent Fabrication, Evolution & Roaming) framework. The details of agent fabrication, modular agent structure, agent life cycle, as well as advantages of agent fabrication are presented. Product-brokering agent is employed as a practical agent type to demonstrate our design and Java-based implementation

    Mixed mode education: implications for library user services

    Get PDF
    The Faculty of Information Technology at QUT does not formally carry out distance education for any of its courses. However, it has pursued a number of initiatives that have made it possible for students to carry out an increasing proportion of their coursework off-site. These initiatives include computer-managed learning, World Wide Web and CDROM delivery of administrative and educational materials, and most recently the development of an integrated learning environment (ILE) for electronic delivery. These developments have been complemented and supported by the QUT Library by means of different avenues of access to CDROMs, a regional electronic document delivery service (REDD), and an electronic reserve (E-Reserve) service. Issues associated with the operation and evaluation of such facilities are described, and future library role in educational delivery are discussed

    Security policy refinement using data integration: a position paper.

    No full text
    In spite of the wide adoption of policy-based approaches for security management, and many existing treatments of policy verification and analysis, relatively little attention has been paid to policy refinement: the problem of deriving lower-level, runnable policies from higher-level policies, policy goals, and specifications. In this paper we present our initial ideas on this task, using and adapting concepts from data integration. We take a view of policies as governing the performance of an action on a target by a subject, possibly with certain conditions. Transformation rules are applied to these components of a policy in a structured way, in order to translate the policy into more refined terms; the transformation rules we use are similar to those of global-as-view database schema mappings, or to extensions thereof. We illustrate our ideas with an example. Copyright 2009 ACM

    A Comparison of Information Technology Mediated Customer Services Between the U.S. and China

    Get PDF
    Information technology mediated customer service is a reality of the 21st century. More and more companies have moved their customer services from in store and in person to online through computer or mobile devices. Using 442 responses collected from one USA university (234 responses) and two Chinese universities (208 responses), the study investigates customer preferences over two service delivery models (either in store or online) on five types of purchasing (retail, eating-out, banking, travel and entertainment) and their perception difference in customer service quality between those two delivery models in the U.S. and China. The results show that the majority of the U.S. and Chinese students prefer in-store and in person for eating out and prefer computer/mobile devices for ordering tickets for travel and entertainment. In addition, more than half of the U.S. students prefer in person services for retail and banking, and this number reduces to 40% for Chinese students. In most customer service quality measurements, the results also show that Chinese students give higher ratings for ordering through a computer/mobile device than ordering in store, indicating ordering through computer/mobile devices has become more acceptable in China and has been perceived as having better customer services quality than in-store ordering

    Educating the leaders of tomorrow : the library without walls

    Get PDF
    A description of library services offered to students in distance programs within Canada and Ecuador

    Creating agent platforms to host agent-mediated services that share resources

    Get PDF
    After a period where the Internet was exclusively filled with content, the present efforts are moving towards services, which handle the raw information to create value from it. Therefore labors to create a wide collection of agent-based services are being perfomed in several projects, such as Agentcities does. In this work we present an architecture for agent platforms named a-Buildings. The aim of the proposed architecture is to ease the creation, installation, search and management of agent-mediated services and the share of resources among services. To do so the a-Buildings architecture creates a new level of abstraction on top of the standard FIPA agent platform specification. Basically, an a-Building is a service-oriented platform which offers a set of low level services to the agents it hosts. We define low level services as those required services that are neccesary to create more complex high level composed services.Postprint (published version

    SMEs, electronically-mediated working and data security: cause for concern?

    Get PDF
    Security of data is critical to the operations of firms. Without the ability to store, process and transmit data securely, operations may be compromised, with the potential for serious consequences to trading integrity. Thus the role that electronically-mediated working plays in business today and its dependency on data security is of critical interest, especially in light of the fact that much of this communication is based on the use of open networks (i.e. the Internet). This paper discusses findings from a 'WestFocus' survey on electronically-mediated working and telework amongst a sample of SMEs located in West London and adjacent counties in South-Eastern England in order to highlight the problems that such practice raises in terms of data security. Data collection involved a telephone survey undertaken in early 2006 of 378 firms classified into four industrial sectors ('Media', 'Logistics', 'Internet Services' and 'Food Processing'). After establishing how ICTs and the Internet are being exploited as business applications for small firms, data security practice is explored on the basis of sector and size with a focus on telework. The paper goes on to highlight areas of concern in terms of data security policy and training practice. Findings show some sector and size influences.WestFocus* under the Higher Education Innovation Fund (HEIF 2

    Agent fabrication and its implementation for agent-based electronic commerce

    Get PDF
    In the last decade, agent-based e-commerce has emerged as a potential role for the next generation of e-commerce. How to create agents for e-commerce applications has become a serious consideration in this field. This paper proposes a new scheme named agent fabrication and elaborates its implementation in multi-agent systems based on the SAFER (Secure Agent Fabrication, Evolution & Roaming) architecture. First, a conceptual structure is proposed for software agents carrying out e-commerce activities. Furthermore, agent module suitcase is defined to facilitate agent fabrication. With these definitions and facilities in the SAFER architecture, the formalities of agent fabrication are elaborated. In order to enhance the security of agent-based e-commerce, an infrastructure of agent authorization and authentication is integrated in agent fabrication. Our implementation and prototype applications show that the proposed agent fabrication scheme brings forth a potential solution for creating agents in agent-based e-commerce applications

    Optimising information literacy delivery to large classes: the contact or the online approach?

    Get PDF
    DCU Business School runs undergraduate programmes of varying sizes, from 40 to 200 students. Some modules cross disciplines and attract even higher numbers. One such module is HR118: Skills for success which in the last year has exceeded 200. Even this number is restrained by the optional nature of the module. Were it to be an obligatory module, the total would exceed 300. The Library has been providing embedded information literacy sessions to HR118 since its inception, providing face-to-face training on essential resources and research techniques, together with assessment. Generally the experience has been successful. There have been some problems, mainly organisational and logistical, but the Library and module co-ordinator have resolved these as they arise. However, the recent class size increase, and the possibility that the module may sometime become obligatory, forced the Library to devise an alternative strategy for 2008-09 – a hybrid approach which has enabled the Library to combine new technological options with traditional face-to-face engagement. There are many elements to the new programme, all designed to inform students on content, test the process and obtain feedback. This paper will assess the progress of Library input into the module. It will consider the key nature of relationships with academics, how organisation of the Library content element has been managed over time, and evaluate student response based on diverse evidence derived from online assessment, class feedback and survey. It will examine how developments to date feed into communication with faculty and into future improvements in information literacy development. Finally, the paper will address how Library input has advanced the delivery of information literacy to business undergraduates as a whole, and consider whether libraries should actually invest more in online delivery of information literacy or keep the focus on face-to-face delivery to groups
    corecore