49,140 research outputs found
Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications
Social Virtual Reality based Learning Environments (VRLEs) such as vSocial
render instructional content in a three-dimensional immersive computer
experience for training youth with learning impediments. There are limited
prior works that explored attack vulnerability in VR technology, and hence
there is a need for systematic frameworks to quantify risks corresponding to
security, privacy, and safety (SPS) threats. The SPS threats can adversely
impact the educational user experience and hinder delivery of VRLE content. In
this paper, we propose a novel risk assessment framework that utilizes attack
trees to calculate a risk score for varied VRLE threats with rate and duration
of threats as inputs. We compare the impact of a well-constructed attack tree
with an adhoc attack tree to study the trade-offs between overheads in managing
attack trees, and the cost of risk mitigation when vulnerabilities are
identified. We use a vSocial VRLE testbed in a case study to showcase the
effectiveness of our framework and demonstrate how a suitable attack tree
formalism can result in a more safer, privacy-preserving and secure VRLE
system.Comment: Tp appear in the CCNC 2019 Conferenc
Critical practice of grant application and administration: an intervention
Introduction: Researchers experience increasing pressures to connect with bodies that finance their projects. In this climate, critical scholars face many obstacles as they seek to navigate the treacherous waters of securing external funds. To debate these challenges, the ACME Editorial Collective organized a panel for the 2009 Annual Meeting of the Association of American Geographers in Las Vegas. This intervention represents a follow-up discussion and collective writing process among some of the panelists and members of the audience who attended the panel.
Below, we examine the neoliberalization of the current funding systems, discuss the implications for research practice, and make suggestions for critical engagement and transformation. Our suggestions, however, will not be easy to implement, as we can infer from the experience of the radical scholars of the post-1968 generation whose ascension into the upper echelons of North American and European university systems was also associated with the neoliberalization of the funding systems. This intervention represents a modest contribution in the tradition of critical research practice of creating the possibilities for progressive change
Coopetition of software firms in Open source software ecosystems
Software firms participate in an ecosystem as a part of their innovation
strategy to extend value creation beyond the firms boundary. Participation in
an open and independent environment also implies the competition among firms
with similar business models and targeted markets. Hence, firms need to
consider potential opportunities and challenges upfront. This study explores
how software firms interact with others in OSS ecosystems from a coopetition
perspective. We performed a quantitative and qualitative analysis of three OSS
projects. Finding shows that software firms emphasize the co-creation of common
value and partly react to the potential competitiveness on OSS ecosystems. Six
themes about coopetition were identified, including spanning gatekeepers,
securing communication, open-core sourcing and filtering shared code. Our work
contributes to software engineering research with a rich description of
coopetition in OSS ecosystems. Moreover, we also come up with several
implications for software firms in pursing a harmony participation in OSS
ecosystems.Comment: This is the author's version of the work. Copyright owner's version
can be accessed at
https://link.springer.com/chapter/10.1007/978-3-319-69191-6_10, Coopetition
of software firms in Open source software ecosystems, 8th ICSOB 2017, Essen,
Germany (2017
- …