96,164 research outputs found

    Exploring ‘events’ as an information systems research methodology

    Get PDF
    This paper builds upon existing research and commentary from a variety of disciplinary sources including Information Systems, Organisational and Management Studies, and the Social Sciences that focus upon the meaning, significance and impact of ‘events’ in both an organisational and a social sense. The aim of this paper is to define how the examination of the event is an appropriate, viable and useful Information Systems methodology. Our argument is that focusing on the ‘event’ enables the researcher to more clearly observe and capture the complexity, multiplicity and mundaneity of everyday lived experience. The use and notion of ‘event’ has the potential to reduce the methodological dilemmas associated with the micromanagement of the research process – an inherent danger of traditional and ‘virtual' ethnographic approaches. Similarly, this paper addresses the over-emphasis upon managerialist, structured and time-fixated praxis that is currently symptomatic of Information Systems research. All of these concerns are pivotal points of critique found within eventoriented literature. An examination of event-related theory within interpretative disciplines directs the focus of this paper towards the more specific realm of the ‘event scene’. The notion of the ‘event scene’ originated in the action based (and anti-academy) imperatives of the Situationists and emerged in an academic sense as critical situational analysis. Event scenes are a focus for contemporary critical theory where they are utilised as a means of representing theoried inquiry in order to loosen the restrictions that historical and temporally bound analysis imposes upon most interpretative approaches. The use of event scenes as the framework for critiquing established conceptual assumptions is exemplified by their use in CTheory. In this journal's version and articulation of the event scene poetry, commentary, multi-vocal narrative and other techniques are legitimated as academic forms. These various forms of multi-dimensional expression are drawn upon to enrich the understandings of the ‘event’, to extricate its meaning and to provide a sense of the moment from which the point of analysis stems. The objective of this paper is to advocate how Information Systems research can (or should) utilize an event scene oriented methodology

    Zapotec Language Activism And Talking Dictionaries

    Get PDF
    Online dictionaries have become a key tool for some indigenous communities to promote and preserve their languages, often in collaboration with linguists. They can provide a pathway for crossing the digital divide and for establishing a first-ever presence on the internet. Many questions around digital lexicography have been explored, although primarily in relation to large and well-resourced languages. Lexical projects on small and under-resourced languages can provide an opportunity to examine these questions from a different perspective and to raise new questions (Mosel, 2011). In this paper, linguists, technical experts, and Zapotec language activists, who have worked together in Mexico and the United States to create a multimedia platform to showcase and preserve lexical, cultural, and environmental knowledge, share their experience and insight in creating trilingual online Talking Dictionaries in several Zapotec languages. These dictionaries sit opposite from big data mining and illustrate the value of dictionary projects based on small corpora, including having the flexibility to make design decisions to maximize community impact and elevate the status of marginalized languages

    To Share or Not to Share in Client-Side Encrypted Clouds

    Full text link
    With the advent of cloud computing, a number of cloud providers have arisen to provide Storage-as-a-Service (SaaS) offerings to both regular consumers and business organizations. SaaS (different than Software-as-a-Service in this context) refers to an architectural model in which a cloud provider provides digital storage on their own infrastructure. Three models exist amongst SaaS providers for protecting the confidentiality data stored in the cloud: 1) no encryption (data is stored in plain text), 2) server-side encryption (data is encrypted once uploaded), and 3) client-side encryption (data is encrypted prior to upload). This paper seeks to identify weaknesses in the third model, as it claims to offer 100% user data confidentiality throughout all data transactions (e.g., upload, download, sharing) through a combination of Network Traffic Analysis, Source Code Decompilation, and Source Code Disassembly. The weaknesses we uncovered primarily center around the fact that the cloud providers we evaluated were each operating in a Certificate Authority capacity to facilitate data sharing. In this capacity, they assume the role of both certificate issuer and certificate authorizer as denoted in a Public-Key Infrastructure (PKI) scheme - which gives them the ability to view user data contradicting their claims of 100% data confidentiality. We have collated our analysis and findings in this paper and explore some potential solutions to address these weaknesses in these sharing methods. The solutions proposed are a combination of best practices associated with the use of PKI and other cryptographic primitives generally accepted for protecting the confidentiality of shared information

    From ”Sapienza” to “Sapienza, State Archives in Rome”. A looping effect bringing back to the original source communication and culture by innovative and low cost 3D surveying, imaging systems and GIS applications

    Get PDF
    Applicazione di tecnologie mensorie integrate Low Cost,web GIS,applicazione di tecniche di Computational photography per la comunicazione e condivisione dei dati, sistemi di Cloud computing.Archiviazione Grandi DatiHigh Quality survey models, realized by multiple Low Cost methods and technologies, as a container to sharing Cultural and Archival Heritage, this is the aim guiding our research, here described in its primary applications. The SAPIENZA building, a XVI century masterpiece that represented the first unified headquarters of University in Rome, plays since year 1936, when the University moved to its newly edified campus, the role of the main venue for the State Archives. By the collaboration of a group of students of the Architecture Faculty, some integrated survey methods were applied on the monument with success. The beginning was the topographic survey, creating a reference on ground and along the monument for the upcoming applications, a GNNS RTK survey followed georeferencing points on the internal courtyard. Dense stereo matching photogrammetry is nowadays an accepted method for generating 3D survey models, accurate and scalable; it often substitutes 3D laser scanning for its low cost, so that it became our choice. Some 360°shots were planned for creating panoramic views of the double portico from the courtyard, plus additional single shots of some lateral spans and of pillars facing the court, as a single operation with a double finality: to create linked panotours with hotspots to web-linked databases, and 3D textured and georeferenced surface models, allowing to study the harmonic proportions of the classical architectural order. The use of free web Gis platforms, to load the work in Google Earth and the realization of low cost 3D prototypes of some representative parts, has been even performed

    Enabling security checking of automotive ECUs with formal CSP models

    Get PDF

    Becoming Lean pocket guide

    Get PDF
    This pocket guide aims to give an overview of what Lean is on a conceptual level, explain how Lean fits into the Higher Education setting, detail how Lean is being applied in the University, and give ideas about how Lean can be implemented in other areas of the University.Publisher PD

    Facilitating pupil thinking about information literacy

    Get PDF
    Whilst information literacy is frequently taught through the imposition on learners of an established framework, this paper suggests a different approach by taking a lead from James Herring’s ideas. Specifically, it provides guidance to school-based information professionals who would like to encourage their pupils to devise their own flexible, information literacy models which are unique to them. Drawing on existing material in information science and wider thought, it proposes areas for coverage and considers how information professionals may support the dynamic process of model construction. It is recommended that those who are intent on facilitating the creation of personal information literacy models help pupils to identify the roles they take on in their lives, to reflect on the information needs that result, to ascertain the information they require in particular situations, to explore their information-seeking activities, to consider means by which information can be captured and to give thought as to how the information they have accessed may be used. This framework is, however, by no means rigid and readers are, of course, free to make their own adjustments
    corecore