• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 37
  • Tagged with
  • 37
  • 37
  • 37
  • 37
  • 37
  • 7
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Analyzing the Privacy Policy: Responses and Challenges. : A survey research about the experiences from common users and service providers?

Shaikh, Murtaza Hussain January 2011 (has links)
The main purpose of this thesis is to investigate how different age categories of users and the service provider’s point of view about understandability, technicality, importance and awareness of privacy policy. The emerging ambiguity in information security has raised many privacy and trust issues that are context dependent. Therefore there are several uncertainties and risks seen today concerning theprivacy policy & subscriber trust. It is a responsibility of services providers before amending their policy to notify their subscribers. Because if they do not take this initiative then it creates trust deficit for their subscribers and this affects their business and goodwill.In this work we have adopted the online survey questionnaire technique to perform a research based on the user’s ideas and thoughts about the privacy policy and security issues. We have used the same technique with different questions based on the organization’s own perspectives on the privacy policy. This would highlight to what extent an organization thinks the policy fulfills the user’s confidence. We have decided to target Norwegian service providers and people as participants for this survey, to better understand the theme of research. It took about four months to collect the responses from the organizations and from the participants. This report discusses the importance of privacy policy for a common user / subscriber. Generally observed in this work is that, before accepting privacy policy, it is hard to read these policies and understood by end-user, and taking this prospect ahead, many privacy policies and regulations have a difficult context to understand.This survey methodology was selected to ensure the originality of the user`s state of mind, and it was also vital for the service providers to show their responses and opinion on privacy policy. We have noticed that a majority of the users are not interested in reading the contents of the privacy, and they simply provide their sensitive information without ensuring the authenticity and regulations inside theprivacy policy. Furthermore, we observed that users think privacy policy just saves them from viruses and threats, and there is a chance of phishing if it is not mentioned on the service provider website. Most of the service providers have recently introduced the privacy protection seals for secure data transmission on their website in order to build a strong subscriber`s trust.Finally, it is important to continue researching to get better tools and more mechanisms for a good security policy, and to establish guidelines for better understanding as we learn more.Keywords: Privacy; Personal information; Service providers; Subscriber`s; Policy; Issues; Survey design; Legislation; Settings; Practices.
22

IMPROVING COLLABORATION IN MARITIME OPERATIONS USING BUSINESS PROCESS MODELING NOTATION

Kosuri, Kishore January 2011 (has links)
In one of the highly globalized fields such as Marine Industry, shipping operations are hugely dependent on the quick and readily accessible information about the people, machinery and services available both at port and terminal levels. The e-collaboration tools often result in improving the potential to take advantage of the information across various dimensions such as nations, organizations and professions. In the maritime transportation sector, collaboration is very much evident as intersection between various elements associated with it such as business processes (or service management), software tools (or technologies) and users. As a result, collaboration is crucial either to make good plans that are aligned with the different stakeholders or can be used as a tool for deviation management if such a thing occurs. Usually, the maritime shipping operations are carried out both on ship and also by various bodies affiliated with port and terminal services. However, establishing collaboration between operations and tools is often challenging as they are two very different disciplines. Therefore, the knowledge gathered via intersection of software engineering and processes involved holds the means for establishing the collaboration between the service providers and potential users. Normally the information is coming from sensors as well as traditional message based sources. These information sources can be used for identifying and capturing business processes which are part of maritime enterprise to achieve collaboration among various involved parties. In this thesis, a method is proposed to overcome the problem of process management by establishing a collaboration medium between the service providers and participants in a maritime enterprise. This work is based on literature study, industry test cases and validation of test case models using process centric approach. The process centric approach, which regards notion of developing enterprise based on process models and facilitating collaboration among participants of business process models, is the main result this work. The steps are to define goals, identify business processes and define collaboration in these. To support this we need the other contributions of the thesis; i.e. uncovering the collaboration space through intersection of entities, collaboration platform, collaboration-oriented architecture and collaboration matrix generation. BPMN (Business Process Modeling Notation) provided a means to model the industrial test case using the process-centric approach and study collaboration among tasks in business process. The analysis of test case BPMN model validates concepts of Marine Information Center (MIS) project at SINTEF and provides set of requirements for improving collaboration further
23

Pervasive Games for Vehicle Drivers

Ellafy, Amr January 2011 (has links)
Pervasive games are a new gender of games that is gaining popularity in recent years.The potential of pervasive games is their ability of mixing real-life physical objects in the gameplay, creating a thrilling experience for players.This thesis work researches the possibility of engaging vehicle drivers in pervasive games with road safety as the primary concern.First a research of main causes of traffic accidents is conducted though available statistics.The statistics shows that the human-factor contributes to the top five causes of traffic accidents.The statistics also concluded that the driver psychophysiological state is vital for road safety.Factors conditioning human's psycho physiological state are analyzed from computer games perspective.Affective Gaming, a gender of gaming highly dependent on player psychophysiological state, is further studied in terms of its applicability for in-vehicle use.The study includes researching various methods of capturing human psychophysiological state.Furthermore, different types of pervasive games are discussed including state of the art games available for vehicles.A research is conducted to cover available driver support systems and show how they work and contribute to road safety.Heads-up Display are also discussed as a method of displaying information to the driver with minimal distraction from driving.Relevant concepts and technologies in relation to pervasive games, driver support systems and road safety were defined and utilized as a basis for the conceptual framework which was developed in this thesis work. The framework shows how pervasive games can be used to contribute to road safety using various driver support systems. The idea is illustrated in a set of example game scenarios.A simulation software is used to demonstrate a part of the conceptual framework as a proof of concept.An important outcome of this thesis includes a conceptual framework for pervasive game implementation. The guidelines and relevant technologies are indispensable not only for pervasive games, but also for other multimedia (infotainment) application development and integration in the vehicle environment in terms of road safety and driving quality.
24

Search Result Reranking Using Clustering

Yeboah, Stephen January 2011 (has links)
Information Retrieval is a research area that has gained attention over thepast two decades. Few of these researches have taken place in the biomed-ical domain where satisfying users’ information needs are relatively difficultto be met. The goal of this project is to find out if it is possible to usestatistical methods in Biomedical Information Retrieval (IR) and improveretrieval performance, i.e. finding ways of fulfilling user information needs,in the biomedical domain using clustering with knowledge from the BioTracerproject.K-Mean and Expectation Maximization (EM) approaches to clustering havebeen implemented in this project with more emphasis on the EM. Both ap-proaches are used to re-ranking users searched results in an attempt to findways of fulfilling their information needs. Comparison between the Expec-tation Maximization and the K-mean are drawn in terms of their retrievalperformance i.e. precision and recall, the performance of EM compared to ex-isting approaches to search results re-ranking using clustering and problemsfaced while implementing the EM.
25

Designing and Implementing Support for Web Browser-Based UIs by Using Ajax Technology

Erdemli, Asim Cihan, Hazar, Onur January 2011 (has links)
Due to the advancements in graphical user interface design and modelingtechnology, model-based user interfaces are becoming more dynamic andmodeling frameworks allow developers to focus more on abstract modelingwhich means they can spend more time on user interface requirements ratherthan focusing model interpretation of executable user interfaces and howtheir codes are generated. Additionally, it can be noticed that the userinterfaces of desktop based applications are fairly faster, more responsive,and more ubiquitous as they are compared with the user interfaces of theirweb based counterparts, even though web based applications are evolvinggradually in the last decades. With the introduction of Ajax technology, userinterfaces of web based applications has become as dynamic as the ones in thedesktop based counterpars. By using this advantage of Ajax technology, themain objective is to implement support for modeling web browser-based userinterfaces to the existing work of Wazaabi project which is currently lack ofhandling them in an adequate way. To sum up, this master thesis describes acontribution to a new framework which is called Wazaabi by implementinga web browser modeling support to its already dened architecture that doesnot support modeling for web browser-based user interfaces as today.Keywords: User Interfaces, Modeling, Eclipse Modeling Framework, DeclarativeLive User Interface Models, Ajax Technology, Ajax Frameworks.
26

Mobile Augmented Reality for Supporting Reflection

Boron, Alessandro January 2011 (has links)
Reflecting on past experiences is crucial for learning from them and reconsider actions that have been taken in order to make better future choices. Different tools have been developed to support reflection both as an individual and collaborative activity. Aim of these tools is to provide individuals with information related to experience in order to make them reflect about it. However reflecting in a setting which is not the one where the object of reflection happened affects the reflective process due to the lack of the context in which the experience took place.This work aims at investigating how the usage of the Augmented Reality can be exploited in order to support reflection. In particular the main goal of the work is to study how Augmented Reality can trigger reflection on work practices that rely on deployment and management of resources in space.The outcome of this work is the analysis of a system that allows users to collect contextual information that has a strong spatial dimension and the design and implementation of an Augmented Reality application for tablet-device in order to visualize the information collected. A high level architecture of both the overall system and the prototype implemented is provided as well as storyboards for the solution proposal. The prototype implemented has been object of an experts evaluation in order to assess the potential usefulness of the application in real settings connected with the Italian Civil Defense. A workshop paper based on the work done in this thesis has been also written in concert with my supervisor Professor Monica Divitini and my co-advisor Simone Mora.
27

Software engineering of Arduino based art systems

Ortolan, Riccardo January 2011 (has links)
The approaching of user satisfaction in Digital Media is raising new questions andchallenges in the interactivity relationship between creator and audience. In this workinteractivity is defined as a technology attribute that endows a media environmentwith the capability of reciprocal communication amidst user and technology throughthe technology. What are the key focus extents for managing technology based artproject? What I propose is a new layer of interaction, in which the user is viewed aspart of the interactive installation, being prompted by its pro-active behavior, redefininghim as a creative source. In this dimension, in addition to the language of the artist,what changes is also the perspective of use of the Work of Art: The user is now a livingpart of every creation, contributing to change each time the characteristics. Thanks totechnology, it becomes possible to completely revolutionize the way we conceive anddesign any type of cultural experience and to create spaces for an absolutely innovativeuse. This thesis will engineer the artistic Arduino based installation ArTime inorder to make it into a stable system that can function in museums and exhibitions,experimenting the new layer of interaction with scientific approaches.
28

Analysis Of ICT Policies And Regulations In The Mobile Sector In Kenya : Interpretive Study Of Mobile banking Service

Wasike, Sylvia Nasambu January 2011 (has links)
Alot of research has been done on the rise of m-banking service in Kenya and most notably by Olga in her PHD theses and others and they all have research on how thriving the service is majorly attributed to the adoption and acceptance of the service through ease of use e.t.c.It can be noted that any service like such require ICT in place.Through use of ICT innovation in the mobile industry has grown especially with use of mobile phone to offer financial services in Kenya. Even though Kenya as a country is still lagging behind in other areas with growth and expansion of ICT when it comes to the mobile industry this is different and it is seen as a major leap to offering banking services without necessarily going to the bank. Understanding how the m-banking service is thriving and growing is far from just mere adoption and ease of use, with my thesis i try to analyze the challenges and opportunities that exist for the mobile industry in Kenya. I tackle m-banking service in particular and as can be noted no service can be allowed to operate without rules and regulations and as such what makes this service thrive if not the ICT policies in place and what strategies and practices employed by the mobile operators have worked for them.The research presented here is an interpretative study of the 4 mobile operators in Kenya.To maintain the subscribers the operators have to be innovative enough to create value added services in line with the regulations in place.
29

Comparison of i*-based and Use Case-based Security Modelling Initiatives for Software Requirements Engineering : An empirical comparison of Secure Tropos and Misuse Cases

Pan, Yushan January 2012 (has links)
In the course TDT4501 - Specialization Project - “ReqSec project”, the preparatory course to this thesis, through purely analytical evaluation of the eight modeling approaches, the advantages and disadvantages were illustrated based on the categories - i*-based modeling approach and Use Case-based modeling approach.However, only a purely analytical evaluation of the modeling approaches does not alwaysreflect their practical usefulness. Hence, the [motivation] of the thesis was selecting two modeling approaches, those are Secure Tropos and Misuse Cases, using an empirical investigation for such evaluations to guide the researchers and practitioners a better overview and understanding of the benefits of the two modeling approaches in a real life usage. The objective was to see if the advantages claimed analytically in the previous project also come true in practice. [Questions] Through a controlled experiment, two core problems shall be investigated: a) How about the participants’ performance when they applied the two modeling approaches to finish tasks in the experiment and b) Their preference for the two modeling approaches after the experiment. The [principle] was using two modeling approaches to perform the experiment, through the participants’ performance on the identified number of threats and mitigations for the experiment cases, and their perception of the two modeling approaches by means of asking them to estimate the usage of modeling diagrams, textual description of cases, and memory in the experiment. And combining with the evaluation of post-questionnaire analysis, the conclusions were summarized based on the empirical study of statistical results and the previous analytical study results, to investigate whether the empirical evaluation could match well with analytical evaluation or not.[Contribution] The experiment project was the first time to compare the Secure Troposand Misuse Cases comprehensibly. The results illustrated that both modeling techniqueshad no significant difference of identifying threats but they had significant difference of identifying mitigations in this controlled experiment with 50 students who apply to both modeling approaches with relevant cases. And through analyzing the same case with the same modeling approach or different modeling approach of the experiment, it was found that Net Shopping case was identified more mitigations and threats by the participants when considering the aspect of technique criteria of threats and mitigations. The participants were complementary regarding goal-based modeling approach in some security issues and performed non-techniques threats and mitigations in this controlled experiment. Hence, Secure Tropos was investigated perceiving more favorable. In the last, comparing with the six dimensions from previous analytical comparison, the investigation shows that most of the two modeling approaches’ advantages were confirmed, and the results also coincided to the previous analytical evaluation.Keywords: Secure Tropos, Misuse Case, Empirical Study, Security Modeling
30

IT Implementation in Public Sector Organizations in Developing Countries : An Action Research-Based Approach in an Higher Education Institution

Setiawan, I Made Agus January 2012 (has links)
Effective IT is vital in organization in the low resource settings of developingcountries. This also applies to public sector organizations. However, little researchhas been reported regarding IT implementation in higher education institution.Meanwhile, it is widely believed that information technology could boostdevelopment, strengthen and increase the competitiveness of the university amongothers.The focus of this report is to explain as well as improve the IT implementationprocess in public sector organizations, particularly in higher educationinstitution in developing countries. The motivation for studying the ITimplementation process is to be able to understand the underlying aspectsof the successful of IT implementation process in developing countries whichthen give the possibility to make any improvement on the organization.An action research approach in combination with case study method has beenperformed in one of Indonesia's public universities. Empirical data collectionwas done to support the research investigation including two-times of field work inwhich one of them was getting involved into the organization activity, two roundpre and follow-up semi-structural interviews, direct observation, discussion,meeting, document analysis and previous involvement in the institution. AnOnline Questionnaire was also performed to obtain the perception of researchparticipants regarding the proposed tools.A one initial cycle of action research was done and the study found severalfactors that possibly hamper the implementation process in the university andsuccessfully formulated several strategies that can be used to cope with thosefactors, e.g. limited human resources, lack of management commitment, lack ofclear job description among staffs, lack of appropriate planning and strategyfor systems development and implementation, ineffective communication &coordination, lack of funds, lack of rewards, and government policies.Intervention is then performed by introducing software project managementinto the organization as one of the formulated strategies. Even though theoutcome of the interventions not clearly visible at this time, it gives amotivation for the continuity of the interventions.In conclusion, it can be said that among other public sector organizations indeveloping countries, they share common barriers and challenges in general, andto deal with those challenges require substantial time and appropriate approach.

Page generated in 0.1567 seconds