86,891 research outputs found
Management system requirements for wireless systems beyond 3G
This paper presents a comprehensive description of various management system requirements for systems beyond 3G, which have been identified as a result of the Software Based Systems activities within the Mobile VCE Core 2 program. Specific requirements for systems beyond 3G are discussed and potential technologies to address them proposed. The analysis has been carried out from network, service and security viewpoints
Secure Identification in Social Wireless Networks
The applications based on social networking have brought revolution towards social life and are continuously gaining popularity among the Internet users. Due to the advanced computational resources offered by the innovative hardware and nominal subscriber charges of network operators, most of the online social networks are transforming into the mobile domain by offering exciting applications and games exclusively designed for users on the go. Moreover, the mobile devices are considered more personal as compared to their desktop rivals, so there is a tendency among the mobile users to store sensitive data like contacts, passwords, bank account details, updated calendar entries with key dates and personal notes on their devices.
The Project Social Wireless Network Secure Identification (SWIN) is carried out at Swedish Institute of Computer Science (SICS) to explore the practicality of providing the secure mobile social networking portal with advanced security features to tackle potential security threats by extending the existing methods with more innovative security technologies. In addition to the extensive background study and the determination of marketable use-cases with their corresponding security requirements, this thesis proposes a secure identification design to satisfy the security dimensions for both online and offline peers. We have implemented an initial prototype using PHP Socket and OpenSSL library to simulate the secure identification procedure based on the proposed design. The design is in compliance with 3GPP‟s Generic Authentication Architecture (GAA) and our implementation has demonstrated the flexibility of the solution to be applied independently for the applications requiring secure identification. Finally, the thesis provides strong foundation for the advanced implementation on mobile platform in future
Mobile Computing in Digital Ecosystems: Design Issues and Challenges
In this paper we argue that the set of wireless, mobile devices (e.g.,
portable telephones, tablet PCs, GPS navigators, media players) commonly used
by human users enables the construction of what we term a digital ecosystem,
i.e., an ecosystem constructed out of so-called digital organisms (see below),
that can foster the development of novel distributed services. In this context,
a human user equipped with his/her own mobile devices, can be though of as a
digital organism (DO), a subsystem characterized by a set of peculiar features
and resources it can offer to the rest of the ecosystem for use from its peer
DOs. The internal organization of the DO must address issues of management of
its own resources, including power consumption. Inside the DO and among DOs,
peer-to-peer interaction mechanisms can be conveniently deployed to favor
resource sharing and data dissemination. Throughout this paper, we show that
most of the solutions and technologies needed to construct a digital ecosystem
are already available. What is still missing is a framework (i.e., mechanisms,
protocols, services) that can support effectively the integration and
cooperation of these technologies. In addition, in the following we show that
that framework can be implemented as a middleware subsystem that enables novel
and ubiquitous forms of computation and communication. Finally, in order to
illustrate the effectiveness of our approach, we introduce some experimental
results we have obtained from preliminary implementations of (parts of) that
subsystem.Comment: Proceedings of the 7th International wireless Communications and
Mobile Computing conference (IWCMC-2011), Emergency Management: Communication
and Computing Platforms Worksho
An Analysis of Using Expert Systems and Intelligent Agents for the Virtual Library Project at the Naval Surface Warfare Center-Carderock Division
The Virtual Library Project1 at the Naval Surface Warfare Center/Carderock Division (NSWC/CD) is being developed to facilitate the incorporation and use of library documents via the Internet. These documents typically relate to the design and manufacture of ships for the U.S. Navy Fleet. As such, the libraries will store documents that contain not only text but also images, graphs and design configurations. Because of the dynamic nature of digital documents, particularly those related to design, rapid and effective cataloging of these documents becomes challenging. We conducted a research study to analyze the use of expert systems and intelligent agents to support the function of cataloging digital documents. This chapter provides an overview of past research in the use of expert systems and intelligent agents for cataloging digital documents and discusses our recommendations based on NSWC/CD’s requirements
Ethics and social networking sites: A disclosive analysis of Facebook
Paper has been accepted for publication in Information, Technology and People.Purpose: This paper provides insights into the moral values embodied by a popular social networking site (SNS), Facebook. We adopt the position that technology as well as humans has a moral character in order to disclose ethical concerns that are not transparent to users of the site.
Design/methodology/approach: This study is based upon qualitative field work, involving participant observation, conducted over a two year period.
Findings: Much research on the ethics of information systems has focused on the way that people deploy particular technologies, and the consequences arising, with a view to making policy recommendations and ethical interventions. By focusing on technology as a moral actor with reach across and beyond the Internet, we reveal the complex and diffuse nature of ethical responsibility in our case and the consequent implications for governance of SNS.
Research limitations/implications: We situate our research in a body of work known as disclosive ethics and argue for an ongoing process of evaluating SNS to reveal their moral importance. Along with other authors in the genre, our work is largely descriptive, but we engage with prior research by Brey and Introna to highlight the scope for theory development.
Practical implications: Governance measures that require the developers of social networking sites to revise their designs fail to address the diffuse nature of ethical responsibility in this case. Such technologies need to be opened up to scrutiny on a regular basis to increase public awareness of the issues and thereby disclose concerns to a wider audience. We suggest that there is value in studying the development and use of these technologies in their infancy, or if established, in the experiences of novice users. Furthermore, flash points in technological trajectories can prove useful sites of investigation.
Originality/value: Existing research on social networking sites either fails to address ethical concerns head on or adopts a tool view of the technologies so that the focus is on the ethical behaviour of users. We focus upon the agency, and hence the moral character, of technology to show both the possibilities for, and limitations of, ethical interventions in such cases
- …