14 research outputs found

    Pool-Based Heterogeneous Mobile Agents for Network Management

    Get PDF

    Communication Privacy Management and Self-Disclosure on Social Media - A Case of Facebook

    Get PDF
    Social Media Websites are used by individuals to find new friends, (re)connect with old friends, family and relatives, maintain relationships, share information, join groups, create and manage events, pass time, and much more. While many users consistently engage in disclosing their personal information on social media, several others hold themselves back due to privacy concerns. This study employs communication privacy management theory as a theoretical framework to examine the effects of individual motives, communication privacy management practices (boundary ownership, and boundary permeability) and privacy concerns on the amount and depth of self-disclosure on Facebook. Results of Partial Least Square Analysis using a sample of 240 respondents provide evidence that individuals’ communication privacy management practices influences the amount and depth of their self-disclosure. Implications for practice and future research areas are also discussed. _x000D_ _x000D

    Technology Adoption Life Cycle and Sustainability in ERP Industry - A Data Envelopment Analysis Approach

    Get PDF
    The Technology Adoption Life Cycle (TALC) has been used in studying the sustainability of hyper-growth, high-tech markets. Recent work in this area has identified the presence of “chasm” in this lifecycle. Since most technology products ultimately derive their value from software, this study explores the effect of chasm on the sustainability issues in software industry. This paper presents an empirical study of selected ERP companies during the period 1989–2004. We investigate whether these companies experience the stages of TALC and the chasm effect as seen in other high-tech markets. Using financial data, we focus on R&D / Marketing expenses and sales revenue of companies and apply DEA to measure efficiency and investigate the sources and level of inefficiencies in these companies. The results demonstrate that efficient companies are not just investing more in R&D and Marketing, but are in fact managing the inputs better than the inefficient companies

    An Evaluation of Multiple Perceptions of Digital Rights Management

    Get PDF
    Digital Rights Management (DRM) solutions have generated much interest because of their influence on the expectations and responsibilities of customers and related organizations. It was created to restrict piracy and enhance digital media sales, however, it is found to be unable to fulfill its objectives. We find the protections by DRM lack an understanding of the end user and the evolving nature of copyright and fair use. The potential motives for pirating appear to increase as DRM becomes more intrusive causing a conflict in the objectives of DRM. Thus, adjustments must be made to the current DRM model in order for it to become beneficial for both the producer and the consumer. Our research identifies the needs, desires, and responsibilities of the various DRM stakeholders so that a successful use of DRM technologies can be modeled: a challenge faced by the media industry

    Antecedents of eKnowledge Usage by Medical Web Portal Visitors

    Get PDF
    Internet has spawned many portals disseminating health related literature. The growing trend of consumers to seek information about health related issues poses both opportunities and challenges. On the positive side, the internet provides the user with easy access to medical information and on the negative side; the internet may be providing the user with unreliable information and cause great harm. Our study explores the antecedents for the use of such information and proposes a model using theoretical underpinnings. It also looks at how users discern the validity of health related information they get on the web

    IT Governance Frameworks and COBIT - A Literature Review

    Get PDF

    Bolstering Teaching through Online Tools

    Get PDF
    This paper offers a compilation of technologies that provides either free or low-cost solutions to the challenges of teaching online courses. It presents various teaching methods the outlined tools and technologies can support, with emphasis on fit between these tools and the tasks they are meant to serve. In addition, it highlights various ethical, security and privacy considerations related to appropriate use of such tools. This integrated overview of various online teaching technologies can be easily leveraged to offer online as well as hybrid courses that are lively and more enriching to both the instructor and the students. Traditional in-person courses can also fruitfully use the tools and techniques mentioned in this paper to integrate recent innovations in online teaching technologies into the classroom

    An Agent based Proactive System Management in the Cloud

    Get PDF
    Cloud computing is the newest approach that has quickly evolved in last few years. It provides consumers with services suchas software, storage, network or hardware from a location-independent cloud. These services are on-demand with a “pay onlyfor service used” model that reduces overall capital costs. Although cloud computing has many benefits, a lack of confidencein the technology is restricting many organizations to move their data and software to the cloud. The concerns includesecurity risks and lack of clear system level monitoring from the cloud providers that leads to a need of control and visibilityof effective fault tolerance in the cloud. In this paper, we focus on agent based proactive management system whereconfigurable agents are spawned in the cloud on-demand to monitor system and application resources, collect data to identifypossible failures, construct a pattern knowledge base and take decisions for failure mitigation

    Peer-to-Peer: Obtaining the I-L-Legal Napster Functionality

    Get PDF
    corecore