832,027 research outputs found

    A qualitative study of stakeholders' perspectives on the social network service environment

    Get PDF
    Over two billion people are using the Internet at present, assisted by the mediating activities of software agents which deal with the diversity and complexity of information. There are, however, ethical issues due to the monitoring-and-surveillance, data mining and autonomous nature of software agents. Considering the context, this study aims to comprehend stakeholders' perspectives on the social network service environment in order to identify the main considerations for the design of software agents in social network services in the near future. Twenty-one stakeholders, belonging to three key stakeholder groups, were recruited using a purposive sampling strategy for unstandardised semi-structured e-mail interviews. The interview data were analysed using a qualitative content analysis method. It was possible to identify three main considerations for the design of software agents in social network services, which were classified into the following categories: comprehensive understanding of users' perception of privacy, user type recognition algorithms for software agent development and existing software agents enhancement

    Open Source vs. Proprietary Software: Competition and Compatibility

    Get PDF
    e use a Hotelling linear city model to study competition between open source and proprietary software, where only the producer of the proprietary software aims at maximizing the profit. The producer of the proprietary software must decide on compatibility. Different compatibility strategies will lead to different network externality, and thus result in different profit for the producer of the proprietary software. We found that the proprietary producer¡¯s choice of compatibility strategy depends on the market coverage conditions. When the market is fully covered, one-way compatibility is the best strategy for the proprietary software. When the market is partly covered, two-way compatibility is the best strategy. Such results are not affected by software quality. Furthermore, when the provider of the open source software pursues the maximum market share rather than reacts passively, two-way compatibility would be the best choice for both the open source and the proprietary software. Moreover, the proprietary software producer does not favor its proprietary rival changing to open source software. Such a change may lower the social welfare.Open Source Software, Proprietary Software, Compatibility, Competition

    Open Source vs. Proprietary Software: Competition and Compatibility

    Get PDF
    We use a Hotelling linear city model to study competition between open source and proprietary software, where only the producer of the proprietary software aims at maximizing the profit. The producer of the proprietary software must decide on compatibility. Different compatibility strategies will lead to different network externality, and thus result in different profit for the producer of the proprietary software. We found that the proprietary producer¡¯s choice of compatibility strategy depends on the market coverage conditions. When the market is fully covered, one-way compatibility is the best strategy for the proprietary software. When the market is partly covered, two-way compatibility is the best strategy. Such results are not affected by software quality. Furthermore, when the provider of the open source software pursues the maximum market share rather than reacts passively, two-way compatibility would be the best choice for both the open source and the proprietary software. Moreover, the proprietary software producer does not favor its proprietary rival changing to open source software. Such a change may lower the social welfare.Open Source Software, Proprietary Software, Compatibility, Competition

    De-commodifying software? Open source software between business strategy and social movement

    Full text link
    "Focusing on open source software the origin, development and organisation of a process of de-commodification is examined in an industry that usually relies on strong provisions to protect intellectual property. Open source denotes a cooperative and voluntary mode of software development cross-cutting organisational boundaries and transcending relations of market exchange. Starting with the Open Systems Movement in the late 1970s, which was driven by business strategic and industrial policy interests and complemented by a spirit of mutual support in professional communities, a social movement type of collective action has emerged which develops knowledge as a public good. Competent communities share the norms of the hacker culture and cooperate in informal relations challenging the boundaries between private and public goods. But the open source idea has also been transformed into a business strategy by companies who provide basic software products for free and make money with complementary products and services." (author's abstract

    Domino: exploring mobile collaborative software adaptation

    Get PDF
    Social Proximity Applications (SPAs) are a promising new area for ubicomp software that exploits the everyday changes in the proximity of mobile users. While a number of applications facilitate simple file sharing between co–present users, this paper explores opportunities for recommending and sharing software between users. We describe an architecture that allows the recommendation of new system components from systems with similar histories of use. Software components and usage histories are exchanged between mobile users who are in proximity with each other. We apply this architecture in a mobile strategy game in which players adapt and upgrade their game using components from other players, progressing through the game through sharing tools and history. More broadly, we discuss the general application of this technique as well as the security and privacy challenges to such an approach

    A socio-cognitive and computational model for decision making and user modelling in social phishing

    Get PDF
    Systems software quality, and system security in particular, is often compromised by phishing attacks. The latter were relatively easy to detect through phishing content filters, in the past. However, it has been increasingly difficult to stop more recent and sophisticated social phishing attacks. To protect the citizens from new types of phishing attacks, software quality engineers need to provide equally sophisticating preventive technology that models people’s reactions. The authors considered the behaviour of people on the Internet from a socio-cognitive perspective and deduced who could be more prone to be spoofed by social phishing techniques. The authors herein propose a computational and interdisciplinary metamodelling methodology, which can assist in capturing and understanding people’s interactive behaviour when they are online. Online behaviour can reveal Internet users’ knowledge, information, and beliefs in a given social context; these could also constitute significant factors for trust in social phishing circumstances which, in turn, can provide valuable insights and decision making meta-knowledge for recognition of potential victims of phishers. The proposed modelling approach is illustrated and explained using real-life phishing cases. This meta-model can i) help social computing and phishing researchers to understand users’ trust decisions from a socio-cognitive perspective, and ii) open ways to integrate artificial intelligence design techniques within software quality management practices in order to protect citizens from being spoofed by social phishing attacks. Thus, this software design quality approach will increase system security as a proactive maintenance strategy

    Generating Value Through Open Source: Software Service Market Regulation and Licensing Policy

    Get PDF
    In the software industry, commercial open-source software vendors have recognized that providing services to help businesses derive greater value in the implementation of open source–based systems can be a profitable business model. Moreover, society may greatly benefit when software originators choose an open-source development strategy as their products become widely available, readily customizable, and open to community contributions. In this study, we present an economic model to study how software licensing attributes affect a software originator’s decisions, aiming to provide policy makers with insights into how welfare-improving, open-source outcomes can be incentivized. We show that when a competing contributor is apt at reaping the benefits of software development investment, a less restrictive open source license (e.g., Berkeley Software Distribution, or BSD style) can improve welfare. On the other hand, when the originator is better at leveraging investment and service costs are high, a more restrictive license (e.g., General Public License, or GPL style) can be best for social welfare even when a contributor can cost-efficiently develop the software. The online appendix is available at https://doi.org/10.1287/isre.2017.0726

    The Moderating Effect of Social Influence on Ethical Decision Making in Software Piracy

    Get PDF
    Software piracy has been a serious problem for decades and continues to cost software industry some billions of dollars each year. In this study we examine the Normative and Informational Social Influences that affect an individual’s decision to buy or use pirated software. Based upon previous research about ethical decision making in software adoption, and consumer susceptibility to social influence, we develop a research model designed to test the moderating effects of social influence on the ethical decision making process. An online survey is conducted to collect data. Our research extends the knowledge about software piracy and provides valuable and important insights for researchers, practitioners and policy/strategy makers in government

    BlogForever: D2.5 Weblog Spam Filtering Report and Associated Methodology

    Get PDF
    This report is written as a first attempt to define the BlogForever spam detection strategy. It comprises a survey of weblog spam technology and approaches to their detection. While the report was written to help identify possible approaches to spam detection as a component within the BlogForver software, the discussion has been extended to include observations related to the historical, social and practical value of spam, and proposals of other ways of dealing with spam within the repository without necessarily removing them. It contains a general overview of spam types, ready-made anti-spam APIs available for weblogs, possible methods that have been suggested for preventing the introduction of spam into a blog, and research related to spam focusing on those that appear in the weblog context, concluding in a proposal for a spam detection workflow that might form the basis for the spam detection component of the BlogForever software
    corecore