58,075 research outputs found

    Towards a Model for Research Portal Acceptance and Usage

    Get PDF
    Research portals have been suggested as both a knowledge management tool and a collaboration technology for research communities. This paper proposes a research model designed to understand the acceptance und usage of such portals. The model is based on UTAUT which we augment to include research portal-specific technology, individual and situational characteristics. Our model incorporates theories originating from the fields of knowledge management and collaboration technology. This paper thus answers the call for developing more technology-specific acceptance theories. It contributes to both research and practice, because it represents a first step towards developing research portals that are more widely used than they currently are

    Patients’ Resistance towards Health Information Technology A Perspective of the Dual Factor Model of IT Usage

    Get PDF
    This paper presents a research model of patients’ resistance towards Health Information Technology (HIT). In particularly it examines patients’ reactions towards a new Patient Portal System (PPS). This work provides an integration of the technology acceptance and resistance to change literatures. The Resistance to Change construct from the User Resistance Model (URM), and the Unified Theory of Acceptance and Use of Technology (UTAUT) are bridged using the dual-factor model of technology usage. This model explains the asymmetric effects of use inhibitors such as Resistance to Change on use enablers such as Performance Expectancy and Effort Expectancy. The integrative model is empirically supported using survey data collected from patients of a large public international hospital. Total of 265 valid responses were used for the data analysis. This study highlights the importance of integrating resistance to change with the technology use research especially in healthcare settings that is considered to be under researched. Moreover, it is considered to be one of the first studies in IS that brings in patients’ perspectives of new HIT

    Airline Ticket E-Reservation: Adoption Among Malaysians

    Get PDF
    Sistem tempahan tiket penerbangan telah banyak direvolusikan oleh syarikat-syarikat penerbangan melalui penggunaan Internet dan pengenalan alat-alat mudah alih moden. The air ticket reservation system has been much revolutionized by the airline companies through the usage of the Internet and introduction of modern mobile devices

    Alter ego, state of the art on user profiling: an overview of the most relevant organisational and behavioural aspects regarding User Profiling.

    Get PDF
    This report gives an overview of the most relevant organisational and\ud behavioural aspects regarding user profiling. It discusses not only the\ud most important aims of user profiling from both an organisation’s as\ud well as a user’s perspective, it will also discuss organisational motives\ud and barriers for user profiling and the most important conditions for\ud the success of user profiling. Finally recommendations are made and\ud suggestions for further research are given

    Supporting security-oriented, collaborative nanoCMOS electronics research

    Get PDF
    Grid technologies support collaborative e-Research typified by multiple institutions and resources seamlessly shared to tackle common research problems. The rules for collaboration and resource sharing are commonly achieved through establishment and management of virtual organizations (VOs) where policies on access and usage of resources by collaborators are defined and enforced by sites involved in the collaboration. The expression and enforcement of these rules is made through access control systems where roles/privileges are defined and associated with individuals as digitally signed attribute certificates which collaborating sites then use to authorize access to resources. Key to this approach is that the roles are assigned to the right individuals in the VO; the attribute certificates are only presented to the appropriate resources in the VO; it is transparent to the end user researchers, and finally that it is manageable for resource providers and administrators in the collaboration. In this paper, we present a security model and implementation improving the overall usability and security of resources used in Grid-based e-Research collaborations through exploitation of the Internet2 Shibboleth technology. This is explored in the context of a major new security focused project at the National e-Science Centre (NeSC) at the University of Glasgow in the nanoCMOS electronics domain

    Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users

    Get PDF
    Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension. As a definable cohort, the elderly generally lack awareness of current security threats, and remain under-educated in terms of applying appropriate controls and safeguards to their computers and networking devices. This paper identifies that web-based computer security information sources do not adequately provide helpful information to senior citizen end-users in terms of both design and content

    User-oriented security supporting inter-disciplinary life science research across the grid

    Get PDF
    Understanding potential genetic factors in disease or development of personalised e-Health solutions require scientists to access a multitude of data and compute resources across the Internet from functional genomics resources through to epidemiological studies. The Grid paradigm provides a compelling model whereby seamless access to these resources can be achieved. However, the acceptance of Grid technologies in this domain by researchers and resource owners must satisfy particular constraints from this community - two of the most critical of these constraints being advanced security and usability. In this paper we show how the Internet2 Shibboleth technology combined with advanced authorisation infrastructures can help address these constraints. We demonstrate the viability of this approach through a selection of case studies across the complete life science spectrum

    Shibboleth-based access to and usage of grid resources

    Get PDF
    Security underpins grids and e-research. Without a robust, reliable and simple grid security infrastructure combined with commonly accepted security practices, large portions of the research community and wider industry will not engage. The predominant way in which security is currently addressed in the grid community is through public key infrastructures (PKI) based upon X.509 certificates to support authentication. Whilst PKIs address user identity issues, authentication does not provide fine grained control over what users are allowed to do on remote resources (authorization). In this paper we outline how we have successfully combined Shibboleth and advanced authorization technologies to provide simplified (from the user perspective) but fine grained security for access to and usage of grid resources. We demonstrate this approach through different security focused e-science projects being conducted at the National e-Science Centre (NeSC) at the University of Glasgow. We believe that this model is widely applicable and encourage the further uptake of e-science by non-IT specialists in the research communitie
    • 

    corecore