136,378 research outputs found
Recommended from our members
The influence of national culture on the attitude towards mobile recommender systems
This is the post-print version of the final paper published in Technological Forecasting and Social Change. The published article is available from the link below. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. Copyright @ 2013 Elsevier B.V.This study aimed to identify factors that influence user attitudes towards mobile recommender systems and to examine how these factors interact with cultural values to affect attitudes towards this technology. Based on the theory of reasoned action, belief factors for mobile recommender systems are identified in three dimensions: functional, contextual, and social. Hypotheses explaining different impacts of cultural values on the factors affecting attitudes were also proposed. The research model was tested based on data collected in China, South Korea, and the United Kingdom. Findings indicate that functional and social factors have significant impacts on user attitudes towards mobile recommender systems. The relationships between belief factors and attitudes are moderated by two cultural values: collectivism and uncertainty avoidance. The theoretical and practical implications of applying theory of reasoned action and innovation diffusion theory to explain the adoption of new technologies in societies with different cultures are also discussed.National Research Foundation
of Korea Grant funded by the Korean governmen
Skating With Donovan: Thoughts on Librarianship as a Profession
James M. Donovan’s article: Skating on Thin Intermediation: Can Libraries Survive?, 27 Legal Reference Services Q. 95 (no. 2-3, 2008) argues that librarians place more emphasis than they might on providing service to library users at a time when information seekers are relying less on intermediaries, and that over-emphasizing service to the detriment of other values diminishes the status of librarianship as a profession. The article presents two contrasting models of librarianship. This article discusses Donovan’s models and comments on the continuing importance of the service model to librarianship
Data centric trust evaluation and prediction framework for IOT
© 2017 ITU. Application of trust principals in internet of things (IoT) has allowed to provide more trustworthy services among the corresponding stakeholders. The most common method of assessing trust in IoT applications is to estimate trust level of the end entities (entity-centric) relative to the trustor. In these systems, trust level of the data is assumed to be the same as the trust level of the data source. However, most of the IoT based systems are data centric and operate in dynamic environments, which need immediate actions without waiting for a trust report from end entities. We address this challenge by extending our previous proposals on trust establishment for entities based on their reputation, experience and knowledge, to trust estimation of data items [1-3]. First, we present a hybrid trust framework for evaluating both data trust and entity trust, which will be enhanced as a standardization for future data driven society. The modules including data trust metric extraction, data trust aggregation, evaluation and prediction are elaborated inside the proposed framework. Finally, a possible design model is described to implement the proposed ideas
CRUC: Cold-start Recommendations Using Collaborative Filtering in Internet of Things
The Internet of Things (IoT) aims at interconnecting everyday objects
(including both things and users) and then using this connection information to
provide customized user services. However, IoT does not work in its initial
stages without adequate acquisition of user preferences. This is caused by
cold-start problem that is a situation where only few users are interconnected.
To this end, we propose CRUC scheme - Cold-start Recommendations Using
Collaborative Filtering in IoT, involving formulation, filtering and prediction
steps. Extensive experiments over real cases and simulation have been performed
to evaluate the performance of CRUC scheme. Experimental results show that CRUC
efficiently solves the cold-start problem in IoT.Comment: Elsevier ESEP 2011: 9-10 December 2011, Singapore, Elsevier Energy
Procedia, http://www.elsevier.com/locate/procedia/, 201
Skating With Donovan: Thoughts on Librarianship as a Profession
James M. Donovan’s article: Skating on Thin Intermediation: Can Libraries Survive?, 27 Legal Reference Services Q. 95 (no. 2-3, 2008) argues that librarians place more emphasis than they might on providing service to library users at a time when information seekers are relying less on intermediaries, and that over-emphasizing service to the detriment of other values diminishes the status of librarianship as a profession. The article presents two contrasting models of librarianship. This article discusses Donovan’s models and comments on the continuing importance of the service model to librarianship
Better Together
Calls for a nationwide campaign to overcome civic apathy and outlines the framework for sustained, broad-based social change to restore America's civic virtue
Securing the Participation of Safety-Critical SCADA Systems in the Industrial Internet of Things
In the past, industrial control systems were ‘air gapped’ and
isolated from more conventional networks. They used
specialist protocols, such as Modbus, that are very different
from TCP/IP. Individual devices used proprietary operating
systems rather than the more familiar Linux or Windows.
However, things are changing. There is a move for greater
connectivity – for instance so that higher-level enterprise
management systems can exchange information that helps
optimise production processes. At the same time, industrial
systems have been influenced by concepts from the Internet
of Things; where the information derived from sensors and
actuators in domestic and industrial components can be
addressed through network interfaces. This paper identifies a
range of cyber security and safety concerns that arise from
these developments. The closing sections introduce potential
solutions and identify areas for future research
- …