46,878 research outputs found

    The intention to use mobile digital library technology: A focus group study in the United Arab Emirates

    Get PDF
    IGI Global (“IGI”) granted Brunel University London the permission to archive this article in BURA (http://bura.brunel.ac.uk).This paper presents a qualitative study on student adoption of mobile library technology in a developing world context. The findings support the applicability of a number of existing constructs from the technology acceptance literature, such as perceived ease of use, social influence and trust. However, they also suggest the need to modify some adoption factors previously found in the literature to fit the specific context of mobile library adoption. Perceived value was found to be a more relevant overarching adoption factor than perceived usefulness for this context. Facilitating conditions were identified as important but these differed somewhat from those covered in earlier literature. The research also uncovered the importance of trialability for this type of application. The findings provide a basis for improving theory in the area of mobile library adoption and suggest a number of practical design recommendations to help designers of mobile library technology to create applications that meet user needs

    Web engineering security: essential elements

    Get PDF
    Security is an elusive target in today’s high-speed and extremely complex, Web enabled, information rich business environment. This paper presents the idea that there are essential, basic organizational elements that need to be identified, defined and addressed before examining security aspects of a Web Engineering Development process. These elements are derived from empirical evidence based on a Web survey and supporting literature. This paper makes two contributions. The first contribution is the identification of the Web Engineering specific elements that need to be acknowledged and resolved prior to the assessment of a Web Engineering process from a security perspective. The second contribution is that these elements can be used to help guide Security Improvement Initiatives in Web Engineering

    SPEIR: Scottish Portals for Education, Information and Research. Final Project Report: Elements and Future Development Requirements of a Common Information Environment for Scotland

    Get PDF
    The SPEIR (Scottish Portals for Education, Information and Research) project was funded by the Scottish Library and Information Council (SLIC). It ran from February 2003 to September 2004, slightly longer than the 18 months originally scheduled and was managed by the Centre for Digital Library Research (CDLR). With SLIC's agreement, community stakeholders were represented in the project by the Confederation of Scottish Mini-Cooperatives (CoSMiC), an organisation whose members include SLIC, the National Library of Scotland (NLS), the Scottish Further Education Unit (SFEU), the Scottish Confederation of University and Research Libraries (SCURL), regional cooperatives such as the Ayrshire Libraries Forum (ALF)1, and representatives from the Museums and Archives communities in Scotland. Aims; A Common Information Environment For Scotland The aims of the project were to: o Conduct basic research into the distributed information infrastructure requirements of the Scottish Cultural Portal pilot and the public library CAIRNS integration proposal; o Develop associated pilot facilities by enhancing existing facilities or developing new ones; o Ensure that both infrastructure proposals and pilot facilities were sufficiently generic to be utilised in support of other portals developed by the Scottish information community; o Ensure the interoperability of infrastructural elements beyond Scotland through adherence to established or developing national and international standards. Since the Scottish information landscape is taken by CoSMiC members to encompass relevant activities in Archives, Libraries, Museums, and related domains, the project was, in essence, concerned with identifying, researching, and developing the elements of an internationally interoperable common information environment for Scotland, and of determining the best path for future progress

    Security and computer forensics in web engineering education

    Get PDF
    The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually. Security is frequently taught as a stand-alone course, assuming that security can be 'bolted on' to a web application at some point. Security issues must be integrated into Web Engineering processes right from the beginning to create secure solutions and therefore security should be an integral part of a Web Engineering curriculum. One aspect of Computer forensics investigates failures in security. Hence, students should be aware of the issues in forensics and how to respond when security failures occur; collecting evidence is particularly difficult for Web-based applications

    Modeling an ontology on accessible evacuation routes for emergencies

    Get PDF
    Providing alert communication in emergency situations is vital to reduce the number of victims. However, this is a challenging goal for researchers and professionals due to the diverse pool of prospective users, e.g. people with disabilities as well as other vulnerable groups. Moreover, in the event of an emergency situation, many people could become vulnerable because of exceptional circumstances such as stress, an unknown environment or even visual impairment (e.g. fire causing smoke). Within this scope, a crucial activity is to notify affected people about safe places and available evacuation routes. In order to address this need, we propose to extend an ontology, called SEMA4A (Simple EMergency Alert 4 [for] All), developed in a previous work for managing knowledge about accessibility guidelines, emergency situations and communication technologies. In this paper, we introduce a semi-automatic technique for knowledge acquisition and modeling on accessible evacuation routes. We introduce a use case to show applications of the ontology and conclude with an evaluation involving several experts in evacuation procedures. © 2014 Elsevier Ltd. All rights reserved

    Beta-Testing the “Particular Machine”: The Machine-or-Transformation Test in Peril and Its Impact on Cloud Computing

    Get PDF
    This Issue Brief examines recent cases addressing the patent eligibility of computer-implemented method claims and their implications for the development of cloud computing technologies. Despite the Supreme Court’s refusal to endorse the machine-or-transformation test as the exclusive patent eligibility inquiry, lower courts have continued to invalidate method claims using a stringent “particular machine” requirement alongside the requisite abstract ideas analysis. This Issue Brief argues that 1) post-Bilski v. Kappos cases have failed to elucidate what constitutes a particular machine for computer-implemented methods; 2) in light of substantial variance among Federal Circuit judges’ Section 101 jurisprudence, the application of the particular machine requirement has become subject to a high degree of panel-dependency, such that its relevance for analyzing software method claims has come under question; 3) notwithstanding the unease expressed by practitioners and scholars for the future of cloud computing patents, the courts’ hardening stance toward computer-implemented method claims will do little to deter patenting in the cloud computing context. Instead, clouds delivering platform and software services will remain capable of satisfying the particular machine requirement and supporting patent eligibility, especially given the possible dilution of the particular machine requirement itself
    corecore