3,020 research outputs found

    Constructing Social Systems through Computer-Mediated Communication

    Get PDF
    The question whether computer-mediated communication can support the formation of genuine social systems is addressed in this paper. Our hypothesis, that technology creates new forms of social systems beyond real-life milieus, includes the idea that the technology itself may influence how social binding emerges within on-line environments. In real-life communities, a precondition for social coherence is the existence of social conventions. By observing interaction in virtual environments, we found the use of a range of social conventions. These results were analyzed to determine how the use and emergence of conventions might be influenced by the technology. One factor contributing to the coherence of on-line social systems, but not the only one, appears to be the degree of social presence mediated by the technology. We suggest that social systems can emerge by computer-mediated communication and are shaped by the media of the specific environment

    Mobile radio alternative systems study. Volume 1: Traffic model

    Get PDF
    The markets for mobile radio services in non-urban areas of the United States are examined for the years 1985-2000. Three market categories are identified. New Services are defined as those for which there are different expressed ideas but which are not now met by any application of available technology. The complete fulfillment of the needs requires nationwide radio access to vehicles without knowledge of vehicle location, wideband data transmission from remote sites, one- and two way exchange of short data and control messages between vehicles and dispatch or control centers, and automatic vehicle location (surveillance). The commercial and public services market of interest to the study is drawn from existing users of mobile radio in non-urban areas who are dissatisfied with the geographical range or coverage of their systems. The mobile radio telephone market comprises potential users who require access to the public switched telephone network in areas that are not likely to be served by the traditional growth patterns of terrestrial mobile telephone services. Conservative, likely, and optimistic estimates of the markets are presented in terms of numbers of vehicles that will be served and the radio traffic they will generate

    Privatising Network Industries

    Get PDF
    privatization, regulation, competition, telecoms, electricity, gas, water, rail

    High available and fault tolerant mobile communications infrastructure

    Get PDF

    Information Security in Business Intelligence based on Cloud: A Survey of Key Issues and the Premises of a Proposal

    Get PDF
    International audienceMore sophisticated inter-organizational interactions have generated changes in the way in which organizations make business. Advanced forms of collaborations, such as Business Process as a Service (BPaaS), allow different partners to leverage business intelligence within organizations. However, although it presents powerfull economical and technical benefits, it also arrises some pitfalls about data security, especially when it is mediated by the cloud. In this article, current aspects which have been tackled in the literature related to data risks and accountability are presented. In addition, some open issues are also presented from the analysis of the existing methodologies and techniques proposed in the literature. A final point is made by proposing an approach, which aims at preventive, detective and corrective accountability and data risk management, based on usage control policies and model driven engineering

    Early aspects: aspect-oriented requirements engineering and architecture design

    Get PDF
    This paper reports on the third Early Aspects: Aspect-Oriented Requirements Engineering and Architecture Design Workshop, which has been held in Lancaster, UK, on March 21, 2004. The workshop included a presentation session and working sessions in which the particular topics on early aspects were discussed. The primary goal of the workshop was to focus on challenges to defining methodical software development processes for aspects from early on in the software life cycle and explore the potential of proposed methods and techniques to scale up to industrial applications

    A technical approach to privacy based on mobile agents protected by tamper-resistant hardware

    Get PDF
    We address the problem of protecting the privacy of individuals in the information society. Our goal is to devise technical means that allow users to actively participate in the management and use of information related to them. The advent of the information society creates serious challenges for the privacy of individuals. Due to the drastically improving communication infrastructure, ever larger amounts of ever more precise information become available. The problem with the free availability of this information is not only the risk that the information can be abused by powerful institutions, but also that this can lead to an unconfined mutual surveillance of individuals, which can have adverse effects on society as a whole. We argue that individuals should be empowered to define for themselves the level of privacy they are comfortable with. This can be achieved by notifying them whenever information on them is created, accessed, or modified and by giving them some control over the use of this information. The notification informs individuals who is using what information on them and allows to detect possible problems with this use. The control allows individuals to resolve most (or at least some) of these problems. Obviously this requires that the individuals can trust the users of information to properly implement these notifications and to offer an effective control. We analyze the concept of trust more closely and distinguish between the optimistic and the pessimistic approach to trust, which can both provide the foundation for the protection of privacy. The former is based on the classical concepts of control and sanctions, while the latter tries to prevent malicious behaviour. We choose to pursue the pessimistic approach and investigate in technical means that can be used for this purpose. A promising technology is the mobile agent paradigm, which is a new approach to structure distributed applications. Its main idea is to move both the code and the state of an object to another principal for remote execution. This indicates that the mobile agent paradigm also embraces the object-oriented programming paradigm, which allows us to encapsulate a data item and to specify an access control policy on it. Since the mobile agent is physically moved to a remote location that is under the control of a different principal, it needs to be protected from this principal who is responsible for its execution. This problem constitutes the major diffculty for using the mobile agent paradigm for privacy protection and is explored in great detail. Based on the discussion in the relevant literature, we decide on an approach that relies on a trusted and tamper-resistant hardware device, which is developed on a conceptual level. The approach is further explored in the context of the mobile agent paradigm, where it allows us to realize more elaborate protection goals that may be desirable for the owner of the mobile agent. These are developed in the form of conducts, which regroup the goal, the requirements, as well as a specification of the necessary collaboration to achieve this goal. Finally, we return to the original problem and describe how the presented technology can be used to improve the protection of privacy. This results in a rather complex framework, in which information on individuals cannot be used freely, but where this use is constrained by the level of privacy desired by the subject of the information. The major problem of this framework is the increased complexity that individuals have to deal with. This problem is addressed with an additional level of indirection that attempts to confine the complexity and to delegate it to trusted experts. We believe that this approach, despite its complexity, is a viable means to address the urgent problems of privacy protection, which do not lend themselves to simple solutions

    The Future of the Internet III

    Get PDF
    Presents survey results on technology experts' predictions on the Internet's social, political, and economic impact as of 2020, including its effects on integrity and tolerance, intellectual property law, and the division between personal and work lives
    • …
    corecore