37 research outputs found

    Towards Security Requirements in Online Summative Assessments

    No full text
    Confidentiality, integrity and availability (C-I-A) are the security requirements fundamental to any computer system. Similarly, the hardware, software and data are important critical assets. These two components of a computer security framework are entwined; such that a compromise in the C-I-A requirements may lead to a compromise of the critical assets. The C-I-A requirements and the critical assets of a computer system are well researched areas; however they may be insufficient to define the needs of a summative e-assessment system. In this paper, we do not discard the existing components; rather we propose security requirements and related components that are specific to summative e-assessment systems

    Towards Security Goals in Summative E-Assessment Security

    No full text
    The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats. The C-I-A security goals are well researched areas; however they may be insufficient to address all the needs of the summative e-assessment. In this paper, we do not discard the fundamental C-I-A security goals; rather we define security goals which are specific to summative e-assessment security

    Developing Resource Usage Service in WLCG

    No full text
    According to the Memorandum of Understanding (MoU) of the World-wide LHC Computing Grid (WLCG) project, participating sites are required to provide resource usage or accounting data to the Grid Operational Centre (GOC) to enrich the understanding of how shared resources are used, and to provide information for improving the effectiveness of resource allocation. As a multi-grid environment, the accounting process of WLCG is currently enabled by four accounting systems, each of which was developed independently by constituent grid projects. These accounting systems were designed and implemented based on project-specific local understanding of requirements, and therefore lack interoperability. In order to automate the accounting process in WLCG, three transportation methods are being introduced for streaming accounting data metered by heterogeneous accounting systems into GOC at Rutherford Appleton Laboratory (RAL) in the UK, where accounting data are aggregated and accumulated throughout the year. These transportation methods, however, were introduced on a per accounting-system basis, i.e. targeting at a particular accounting system, making them hard to reuse and customize to new requirements. This paper presents the design of WLCG-RUS system, a standards-compatible solution providing a consistent process for streaming resource usage data across various accounting systems, while ensuring interoperability, portability, and customization

    Digitising the Turing Archive: A Pilot Study

    No full text
    This report presents a summary of the pilot project to produce an on-line version of a selected portion of the archive of Alan Turing held at King’s College, Cambridge. The design and creation of a database making use of information held in the archive catalogue is discussed. The production of a Web based interface to access the on-line materials is described. The practical issues involved in digitising documents are covered and the lessons learnt from this process are included. Finally, the report also presents an effort model, and sample timings from which cost estimates can be obtained

    Evaluation of AIMS-Academic Information Management System.

    No full text
    The evaluation process reported here used academic secretarial staff from the Electronics and Computer Science (ECS) department to evaluate the Academic Information Management System (AIMS). The evaluation focused on the subjective opinion of the users and measured the time taken to perform the major functions of the system. This report presents the methodology and describes the rationale behind the approach used. The results and conclusions of the evaluation are reported

    Preface

    No full text

    A qualitative case study of LifeGuide: users' experiences of software for developing Internet-based behaviour change interventions

    No full text
    Previously, behavioural scientists seeking to create Internet-based behaviour change interventions have had to rely on computer scientists to actually develop and modify web interventions. The LifeGuide software was designed to enable behavioural researchers to develop and adapt Internet-based behavioural interventions themselves. This article reports a qualitative case study of users’ experiences and perceptions of the LifeGuide software. The aim was to explore users’ experiences and their perceptions of the benefits and limitations of this approach to intervention development. Twenty LifeGuide users took part in semi-structured interviews and one provided feedback via email. Thematic analysis identified three overarching themes: ‘Recognising LifeGuide’s potential’, ‘I’m not a programmer’ and ‘Knowledge sharing – the future of LifeGuide’. Users valued LifeGuide’s potential to allow them to flexibly develop and modify interventions at little cost. However, users noted that their lack of programming experience meant that they needed to learn new skills for using the software, and they varied in the extent to which they felt able to develop interventions without any input from programmers. Respondents saw the potential of using the LifeGuide Community Website to share technical support and examples of intervention components to support their use of LifeGuid

    Web 2.0 - The past and the future

    No full text
    Although it has been around for 11 years, it is still not clear where Web 2.0 will lead. This paper presents a general discussion of past and recent trends that may positively influence the direction of Web 2.0, including cloud computing and other emerging business models. In order to move forward, Web 3.0 is proposed for the next generation of work that integrates Cloud Computing, Big Data, Internet of Things and security. We also present criteria and future direction for Web 3.0 to allow all services and people can stay connected with each other
    corecore