1,058 research outputs found

    Proactive Privacy Practices In The Trend Of Ubiquitous Services: An Integrative Social Contracts Perspective

    Get PDF
    Privacy is a strategic issue that deserves great attention from enterprises because the convergence of customer information and advanced technologies that they engage in diverse business processes in response to competitive pressure, particularly when businesses promote their traditional e-services to ubiquitous services (u-services). The underlying vision of u-services is to overcome spatial and temporal boundaries in traditional services, such as m-services and e-services. U-services will be the next wave and can be recognized as a logical extension of traditional e-services because u-services are initiated by e-services based on current potential customer pool and further propagated by m-services. In the context of u-services, customers are always connected seamlessly in context-awareness networks so that a higher degree of customized and personalized services can be timely provided. While people are served with more convenience and efficiency, they may also well be aware of privacy threats behind that. Hence, privacy concerns have been recognized as a critical impediment for boosting u-services. Drawing upon integrative social contracts theory, this study undertakes to explore a proactive privacy practices framework that embraces technical and non-technical elements such as human, legal, and economic relevant perspectives. The results of this study are expected to shed light on privacy practices

    The First Protocol Of Reaching Consensus Under Unreliable Mobile Edge Computing Paradigm

    Get PDF
    Mobile Edge Computing (MEC) is an emerging technology that enables computing directly at the edge of the cloud computing network. Therefore, it is important that MEC is applied with reliable transmission. The problem of reaching consensus in the distributed system is one of the most important issues in designing a reliable transmission network. However, all previous protocols for the consensus problem are not suitable for an MEC paradigm. It is the first time an optimal protocol of reaching consensus is pro- posed for MEC paradigm. The protocol makes all fault-free nodes communicate with each other and collect the exchanged messages to decide a common value. Based on the common value, the protocol ensures all fault-free nodes reach consensus without the influence of unreliable transmission. Finally, we proved theoretically that the proposed protocol can tolerate the maximum number of faulty components and using only two rounds of message exchanges

    Why Do Players Stick to a Specific Online Game? The Users and Gratifications Perspective

    Get PDF
    Driven by the dominant Internet usage and the prospective profits from the game industry, especially from the thriving and robust free-to-play model of online games, there is a need to realize players’ behaviors. Playing online games is experienceoriented but rare studies further explore what reactions of initial (trial) experiences in game playing are and how they will further influence players’ behaviors. Uses and gratification theory can be seen in cases such as online games selection. Players select an online game not only to fit particular interests but also to attempt to show empowerment or other socially conscience motives. This study, therefore, seeks to explore the important antecedents (i.e. gratifications, presence, service mechanisms, and continuance motivation) of stickiness intention on the online game and examine the associated relationships among them. The implications of findings to both researchers and practitioners are also discussed

    The Effect of Affordance on Ubiquitous Commerce Consumption

    Get PDF
    The rapid development of ubiquitous technologies and mobile devices has made ubiquitous commerce (U-commerce) the next business wave. U-commerce enabled merchants with new opportunities to provide personalized services and novel shopping experiences to customers. Applying affordance theory, this study builds a research model that explains the consumer cognitive assimilation process in U-commerce and explores hedonic and impulsive consumption. This study played the U-commerce video for participants before they answered the questionnaires. The empirical results show that context-aware facilitation and social facilitation contribute equally in explaining cognitive assimilation. Meanwhile, cognitive assimilation significantly influences both hedonic consumption and impulsive consumption. This study sheds light on the two important facilitations derived from the U-commerce environment and also reveals the determinants for two types of interesting purchase behaviors in the U-commerce context

    Goal-Programming-Driven Genetic Algorithm Model for Wireless Access Point Deployment Optimization

    Get PDF
    Appropriate wireless access point deployment (APD) is essential for ensuring seamless user communication. Optimal APD enables good telecommunication quality, balanced capacity loading, and optimal deployment costs. APD is a typical NP-complex problem because improving wireless networking infrastructure has multiple objectives (MOs). This paper proposes a method that integrates a goal-programming-driven model (PM) and a genetic algorithm (GA) to resolve the MO-APD problem. The PM identifies the target deployment subject of four constraints: budget, coverage, capacity, and interference. The PM also calculates dynamic capacity requirements to replicate real wireless communication. Three experiments validate the feasibility of the PM. The results demonstrate the utility and stability of the proposed method. Decision makers can easily refer to the PM-identified target deployment before allocating APs

    Nonsurjective zero product preservers between matrices over an arbitrary field

    Full text link
    In this paper, we give concrete descriptions of additive or linear disjointness preservers between matrix algebras over an arbitrary field F\mathbb{F} of different sizes. In particular, we show that a linear map Φ:Mn(F)→Mr(F)\Phi: M_n(\mathbb{F}) \rightarrow M_r(\mathbb{F}) preserving zero products carries the form Φ(A)=S(R⊗A00Φ0(A))S−1, \Phi(A)= S\begin{pmatrix} R\otimes A & 0 \cr 0 & \Phi_0(A)\end{pmatrix} S^{-1}, for some invertible matrices RR in Mk(F)M_k(\mathbb{F}), SS in Mr(F)M_r(\mathbb{F}) and a zero product preserving linear map Φ0:Mn(F)→Mr−nk(F)\Phi_0: M_n(\mathbb{F}) \rightarrow M_{r-nk}(\mathbb{F}) with range consisting of nilpotent matrices. Here, either RR or Φ0\Phi_0 can be vacuous. The structure of Φ0\Phi_0 could be quite arbitrary. We classify Φ0\Phi_0 with some additional assumption. When Φ(In)\Phi(I_n) has a zero nilpotent part, especially when Φ(In)\Phi(I_n) is diagonalizable, we have Φ0(X)Φ0(Y)=0\Phi_0(X)\Phi_0(Y) = 0 for all X,YX, Y in Mn(F)M_n(\mathbb{F}), and we give more information about Φ0\Phi_0 in this case. Similar results for double zero product preservers and orthogonality preservers are obtained.Comment: 29 page

    Essential Points of a Support Network Approach for School Counselors Working with Children Diagnosed with Asperger’s

    Get PDF
    Asperger Syndrome (AS) presents unique challenges to both families and schools. Children diagnosed with Asperger’s possess unparalleled characteristics in cognitive functioning and behavioral pattern. These children need extra attention and assistance in schools. School counselors require a strategy to successfully engage and support these children and to deal with multiple phases of difficulties. A support network approach is proposed in this article to assist school counselors coordinating resources in schools, families, and the community. This approach is discussed with essential points that will help school counselors reach out to families and the community and create a friendly and supportive environment for children diagnosed with Asperger’s
    • …
    corecore