683 research outputs found

    The curriculum design of computing & information systems with concentration in database systems

    Get PDF
    © 2012 IADIS. In today\u27s competitive market, graduates need specialized skills and knowledge about their chosen field. Jobs in Information Systems (IS) are becoming diversified and that generic IS curriculum is no longer meet all the needs for all IS jobs. This paper presents a study on the design of curriculum of Information Systems degree with concentration on Database Systems. The proposed curriculum follows the principles guiding the Information Systems (IS) curriculum design recommended by the Association of Information Systems (AIS) and is aligned with Accreditation Board for Engineering and Technology (ABET) nine program outcome criteria

    Robust H

    Get PDF

    The Impact of Cloud Computing on ITIL Service Strategy Processes

    Get PDF
    Cloud computing has become an increasingly popular means of delivering precious IT enabled business services. Customers and end users access the IT services catalog through self-service portals, using and paying for only those services they need, when and where they need them. When an organization adopts cloud computing it quickly becomes apparent that the traditional approach to IT service management frameworks such as Information Technology Infrastructure Library (ITIL) needs to be reviewed. This paper is focusing on the ITIL Service Strategy process and the impact of cloud computing on its sub processes implementation. Four case studies from organizations who either partially implemented or are planning to implement cloud computing have been consulted to propose enrichment to ITIL when cloud computing is adopted

    A crowdsource model for quality assurance in cloud computing

    Get PDF
    Copyright © 2016 Inderscience Enterprises Ltd. Cloud computing has transformed the way businesses manage their IT resources. By uploading IT solution to the cloud, businesses are assured that computational power and storage capacity are available on demand. This makes cloud computing the next phase in the internet\u27s evolution. Businesses that use Cloud Service Providers (CSPs) tend to have Service-Level Agreements (SLAs), which act as a contract and define the level of expected service from the CSP, including availability, performance and security. Third Party Auditors (TPAs) have been suggested by recent research as a means to monitor CSPs. While the use of TPAs may seem sufficient, this paper shows a method where a CSP may deceive the SLA to reduce their cost and become more competitive. The CSP may achieve that while avoiding detection by TPAs. This paper describes two methods that enable CSPs to deceive cloud users. The simulation described in this paper shows that CSPs may save considerable amounts of money. The paper also presents a crowdsourced TPA model that lays the foundation for a solution to the problem. Our model can help TPAs to monitor CSPs and consequently detect any divergence from stated SLAs

    Effective third party auditing in cloud computing

    Get PDF
    Cloud computing is the next phase in the Internet\u27s evolution, providing the means through which computing power, computing infrastructure, applications, business processes can be delivered to businesses and individual as a service wherever and whenever they need. Businesses who use cloud service providers (CSP) tend to have service level agreements (SLA) that act as contract and define the level of expected service from the CSP, including availability, performance and security. Recent research suggests the use of third party auditors (TPA) as a mean to monitor CSPs. This paper shows how CSP may deceit the SLA to reduce their cost and become more competitive, while avoiding detection by TPAs. The paper presents a crowdsourced TPA model to monitor the CSPs and consequently detect any deception. © 2014 IEEE

    Accessibility Evaluation of Dubai e-Government Websites: Findings and Implications

    Get PDF
    Most governments today are promoting the transition of their countries towards an information society where e-Government websites are becoming the primary gateways to citizens and businesses for government information and eservice delivery. E-Government can be broadly defined as the unification of information and communication technologies, and administrative practices to provide government e-services to citizens, businesses and other e-Governments (Deakins and Dillon, 2002). The benefits of online government e-services include better efficiency, user convenience and more citizen political involvement (Freeman and Loo, 2009). To enable all citizens to benefit from the full potential of eGovernment services, it is important to secure universal accessibility. This accessibility enables persons with disabilities to take full advantage of the information and services offered by eGovernments; the same way a person with no disability would

    Towards the development of activities-oriented platforms serving communities of practice

    Get PDF
    Providing communities of practice (CoPs) with IT tools is increasingly becoming a challenge for researchers. The first step towards this goal is extracting CoPs needs and proposing accordingly relevant tools. We present in this research the user-centred and application-centred platforms as options to embed such relevant tools for CoPs. We raised their main limitations as they are used either for socialising or simply centralising tools which is significantly different from platforms serving CoPs. Consequently, we present the need to have dedicated platforms for CoPs based on the widget technology and we enumerate some key features such as Single sign-on and awareness. Then, we present a higher level of integration for providing activity-oriented platforms which is the interoperability of embedded widgets and its implications such as resources reuse and functionalities reuse. Finally, we propose a structure for such platforms. Copyright © 2013 Inderscience Enterprises Ltd

    Homomorphism in bipolar q—fuzzy soft γ—Semiring

    Get PDF
    In this paper, we discuss bipolar Q−fuzzy soft Γ−Semiring concept and bipolar Q−fuzzy soft Γ−Semiring homomorphism. Indeed, properties and theorems related to these notions are stated and proved.Publisher's Versio

    E-Government Web Accessibility: WCAG 1.0 versus WCAG 2.0 Compliance

    Get PDF
    Most e-governments have traditionally used version 1.0 of the Web Content Accessibility Guidelines (WCAG) as a basis to ensure that their websites are accessible by people with disabilities. This was reflected in their design guidelines, accessibility evaluations, policy-making and legislations. Recently, WCAG 2.0 emerged as an ISO/IEC International accessibility standard that has been recommended for adoption by the W3C WAI. This paper seeks to examine if there is a need for e-governments to reassess their web accessibility conformance, in light of the latest WCAG 2.0 standard. A case study related to the 21 Dubai e-government websites is presented whereby accessibility is evaluated based on the WCAG 1.0 and WCAG 2.0 guidelines and using automated accessibility testing tools. We found that WCAG 2.0 conformance testing identified some notable accessibility issues that were not revealed by WCAG 1.0 conformance testing. Hence we recommend that egovernments should develop and update their web content and accessibility policies to conform to the latest WCAG 2.0 guidelines and success criteria. Additional implications for practice and academic research are also provided
    • …
    corecore