Spelling suggestions: "subject:"opensource 5oftware (OSS)"" "subject:"opensource 1software (OSS)""
1 |
Inter-disciplinary study on open source software development in developing countries : a case study of Chinese LinuxZhou, Yinhua January 2012 (has links)
This research provides a detailed account of Open Source Software (OSS) development in the context of developing countries (DCs) by exploring the specific case of Chinese indigenous Linux design and development. It builds an interdisciplinary, socio-technical, analytical framework from the perspective of science and technology studies (STS), in particular the social shaping of technology (SST), infrastructural studies and international technology transfer. It also covers the fields of economic analysis, policy studies and development studies. The research investigates the adaptation process of a unique OSS with infrastructural features – Linux in the context of China by conducting case studies on both embedded Linux and platform Linux products developed by two Chinese Linux providers. Drawing upon the concepts developed in the SST perspective and infrastructural studies, this research addresses both the dynamism and continuity of OSS. In order to avoid the shortcomings of existing social scientific study on OSS, we applied social and biography of artefacts (BoA) approaches to examine the evolution of Chinese Linux by mapping out the key actors, investigating the linkages between them, and probing deeply into the intricate interplays among these actors over time. A detailed longitudinal and contextual analysis has been undertaken through a qualitative historical case study of the evolution of both Chinese embedded Linux and platform Linux from 1998-2008. The empirical data reveals that the local adaptation and further innovation of Chinese Linux is a ‘generification’ process, i.e. a process of design and developing generic Linux solutions for diverse local users. Theoretically, the understanding of the socio-technical interfaces of the software (seeking, identifying, categorising local users/intermediaries, as well as collaborating with key players associated with the particular software) are central elements for software technology transfer and local technological capabilities building. The findings also throw the light on the crucial importance of government role in providing incentives and institutional measures for Linux adaptation in China. In particular, it highlights the challenges concerning the socio-technical specificities of infrastructural software, like Linux OS (operating system) and the particular relevance to DCs as technology adapters. Finally, this study throws light on the policy and practice for China’s future Linux development, and the implications for other DCs.
|
2 |
Design implications of an online collaborative workspace developed using open source softwareBothma, Paul 03 July 2008 (has links)
This thesis reports on a pilot project which was developed to meet the needs of specific research groups for a collaborative workspace. The main components of the project include a digital library, online discussion forum, adaptive hypermedia engine and a statement database. Such a system was deemed necessary because of today's global network of researchers who are divided by both location and time. The need therefore exists for a system which allows researchers to work on a project without the need to be in the same physical location. Such a system is called an online collaborative workspace. An online collaborative workspace allows researchers to work together on projects by providing various means of sharing information and resources. The main research question addressed in this study is: What are the user requirements and design specifications of an online collaborative workspace developed in open source software? In order to answer this main question, the following sub-questions need to be addressed: What are the main design principles and functionalities of such a collaborative workspace? How can they be integrated in developing a modular open source framework? To what extent can such a framework be customised for implementation in new or existing collaborative projects? What are the usability requirements of such an online collaborative workspace and how should one go about to test the usability of such a framework? Before being able to accurately determine the user requirements of an online collaborative workspace, we first need to determine which features exist in current systems. The main question driving the literature survey therefore is: What are the main components of current online collaborative workspaces as reported in the literature? Chapter 2 of this report is devoted to identifying and researching the various components that define an online collaborative workspace. Each of these components are investigated in detail by means of informal interviews as well as a literature survey. The components that were identified include a digital library, online discussion forum and collaborative workspace. In addition to identifying the various components, this chapter also addresses the motivation for the use of open source software and the importance of usability. With the information obtained in chapter 2, chapter 3 sets out to develop a framework which addresses each of the components that were identified. The various features and properties of each component were identified and decisions were made with regard to the best method of implementation. In addition to the components that were developed, this chapter also focuses on various design implications such as modularity and the use of open source software. Chapter 4 describes the various projects where the framework was implemented. For each of the projects the user requirements, customisations and usability issues are addressed. This chapter highlights the framework's ability to be customised to suit the diverse needs of research projects. The final chapter provides a set of conclusions summarising how the main objectives of the study were addressed. Moreover, the limitations of the study are addressed and an outline is provided as to how these limitations are to be addressed in future work. / Dissertation (MIS (Multimedia))--University of Pretoria, 2008. / Information Science / unrestricted
|
3 |
Usability of a GNU/Linux Distribution from Novice User’s PerspectiveAlam, Zahidul January 2009 (has links)
The term Open Source Software (OSS) has been around for a long time in the world of computer science. Open source software development is a process by which we can manufacture economical and qualitative software and its source could be re-use in the improvement of the software. The success of OSS relies on several factors, e.g. usability, functionality, market focus etc. But in the end how popular the software will be measured by the number of users downloading the software and how much the software is usable to the users. Open Source Software achieve the status for stability, security and functionality. Most of this software has been utilized by expert level users of IT. But from the general users or the non-computer user’s point of view the usability issues of Open source software has been faced the most criticism [25, 26, 27, 28, 29, and 30]. This factor i.e. the usability issues of general user is also responsible for the limited distribution of the open source software [24]. The development process should apply the “user-centered” methodology [25, 26, 27, 28, 29, and 30]. In this thesis paper the issues of usability in OSS development and how the usability of open source software can be improved will be discussed. Beside this I investigate the usability quality of free Open Source Linux-based operating system Ubuntu and try to find out the usability standards of this OSS.
|
4 |
Design of the Open Source Software Based Business Relationships Model for Public Sector Institutions: Case study of Kivos municipalitiesCirba, Marius, Lvova, Lina January 2010 (has links)
Business modelling (BM) is being used in commercial organizations of different sizes and industries all over the world as a tool to design, structure and analyse business processes and activities. Hence, advantages of BM can be exploited by public sector institutions (PSIs) as well. Adoption of open source software (OSS) is another phenomenon that started to spread from individual and corporate users to public environment. In Europe, it was successfully done in German municipalities and Swedish police. Moreover, guidelines on OSS public procurement were developed by the group of researchers led by R. A. Ghosh on the base of EU directives on software management. The aim of the current study is to combine two mentioned above tools (BM and OSS adoption) in one practical approach that could be used by municipalities. The main reason for doing this is obvious lack of findings in both theoretical and practical aspects though the subject is being broadly discussed and promoted. The overall purpose of the current research is to design an OSS based business model for Kivos municipalities that can be later generalized to other public organizations, probably even in other countries. The specific feature of this business modelling is that it is created upon value and relationships instead of issues related to money which is more common for BM. The current study is an exploratory and inductive qualitative research where case study was chosen as a research strategy. Data collection was conducted using the following techniques: literature review – for secondary data collection, and communication (interview and survey) – for primary data collection. Theoretical framework includes literature (sources providing both general and specific information related to the subject of interest. All gathered information was interpreted and analysed through the instrumentality of enterprise modelling or simply summarised and discussed verbally. On the base of interpreted results of theoretical and empirical studies desired OSS based business relationships model was designed and described for Kivos municipalities. It is based on value which in particular case implies sharing information, knowledge and experience as well as mutual assistance and reliable interaction between participants of relationships existing in OSS environment.
|
5 |
Evaluating Efficiency Quality Attribute in Open Source Web browsersTigulla, Anil Reddy, Kalidasu, Satya Srinivas January 2015 (has links)
Context: Now a day’s end users are using different types of computer applications like web browsers, data processing tools like MS office, notepad etc., to do their day-to-day works. In the real world scenario, the usage of Open Source Software (OSS) products by both industrial people and end users are gradually increasing. The success of any OSS products depends on its quality standards. ‘Efficiency’ is one of the key quality factor, which portray the standards of product and it is observed that this factor is given little importance during its development. Therefore our research context lies within evaluating the efficiency quality attribute in OSS web browsers. Objectives: As discussed earlier the context of this research lies in evaluating the efficiency of OSS web browsers, the initial objective was to identify the available efficiency measures from the current literature and observe which type of measures are suitable for web browsers. Then our next objective is to compute values for the identified efficiency measures by considering a set of predefined web browsers from all the categories. Later we proposed Efficiency Baseline Criteria (EBC) and based on this criterion and experiment results obtained, the efficiency of OSS web browsers had been evaluated. Therefore the main objective of conducting this research is to formulate EBC guidelines, which can be later used by OSS developers to test their web browsers and ensure that all the quality standards are strictly adhered during the development of OSS products. Methods: Initially Literature Review (LR) was conducted in order to identify all the related efficiency quality attributes and also observe the sub-attribute functionalities, that are useful while measuring efficiency values of web browsers. Methods and procedures which are discussed in this LR are used as input for identifying efficiency measures that are related to web browsers. Later an experiment was performed in order to calculate efficiency values for CSS & proprietary set of web browsers (i.e. Case A) and OSS web browsers (i.e. Case B) by using different tools and procedures. Authors themselves had calculated efficiency values for both Case A and Case B web browsers. Based on the results of Case A web browsers, EBC was proposed and finally an statistical analysis (i.e. Mann Whitney U-test) is performed in order to evaluate the hypothesis which was formulated in experiment section. Results: From the LR study, it is observed that efficiency quality attribute is classified into two main categories (i.e. Time Behavior and Resource Utilization). Further under the category of Time behavior a total of 3 attributes were identified (i.e. Response time, Throughput and Turnaround time). From the results of LR, we had also observed the measuring process of each attribute for different web browsers. Later an experiment was performed on two different sets of web browsers (i.e. Case A and Case B web browsers). Based on the LR results, only 3 efficiency attributes (i.e. response time, memory utilization and throughput) were identified which are more suitable to the case of web browsers. These 3 efficiency attributes are further classified into 10 sub-categories. Efficiency values are calculated to both Case A and B for these 10 identified scenarios. Later from Case A results EBC values are generated. Finally hypothesis testing was done by initially performing K-S test and results suggest choosing non-parametric test (i.e. Mann Whitney U-test). Later Mann Whitney U-test was performed for all the scenarios and the normalized Z scores are more than 1.96, further suggested rejecting null hypothesis for all the 10 scenarios. Also EBC values are compared with Case B results and these also suggest us that efficiency standard of OSS web browsers are not equivalent to Case A web browsers. Conclusions: Based on quantitative results, we conclude that efficiency standards of OSS web browsers are not equivalent, when compared to Case A web browsers and the efficiency standards are not adhered during development process. Hence OSS developers should focus on implementing efficiency standards during the development stages itself in order to increase the quality of the end products. The major contribution from the two researchers to this area of research is “Efficiency Baseline Criteria”. The proposed EBC values are useful for OSS developers to test the efficiency standards of their web browser and also help them to analyze their shortcomings. As a result appropriate preventive measures can be planned in advance. / +91 - 9491754620
|
6 |
An Institutional perspective on change management : a case study of an open source enterprise content management system (ECM) in the South African Public SectorWeilbach, Elizabeth Helena (Lizette) January 2014 (has links)
ICT development and deployment and supporting policies take place within a fiercely contested globalised political economy. For organisations there is a pervasiveness of change processes, often externally imposed, which are rising with these globalising effects. This not only implies that the context in which organisations are situated is continuously changing, but also that the nature of the organisation itself is subject to change (Van Tonder, 2004). However, the external influences imposed on an organisation are often heterogeneous and make the management of adapting to the external environment extremely complex.
This thesis explores such an externally imposed change on an organisation around the implementation of a contentious national policy. This entails not only dealing with the more usual dimensions of change in an organisation, but also the implications of the national debate and contentions around the national policy playing out in the local setting of the organisation. In this thesis the change explored is within a government department from a proprietary Enterprise Content Management (ECM) system to an open source ECM system. An interpretative approach was followed, using a longitudinal case study.
Two main aspects of this change process are explored. The first is the impact of the national open source policy on government departments - an externally imposed change of mission, vision and values. The second is how internally the government department changed its internal work processes and information systems to comply with that policy. These two aspects are intertwined. Alignment of the organisation mission, values and objectives, with the proposed technological innovation and change management models emerges as a necessary condition for managing change. However, what emerged as a more challenging issue was whether internal organisational changes can be aligned with contentious national policy imperatives. Three theoretical lenses are used to explore this contentious issue: the HEM model of Du Plooy’s (1998); the improvisational change management model of Orlikowski and Hofman (1997); and institutional theory as it applies to Information Systems.
The improvisational change model of Orlikowski and Hofman (1997) in combination with Du Plooy’s (1998) HEM model, was used to understand the change process unfolding in the implementation of an OS ECM system in a Government department in SA. The result of this application is some practical recommendations for government officials on future OS implementations, as well as a theoretical add-on to extend the change management model applied. The researcher found that models can increase our understanding and reveal how one can ‘cultivate’ the human environment within which technology is to be implemented. However, the process of developing an understanding of how national policy was developed and the rationale for it was also found to be important, as is developing an understanding of the rationale of this particular department for choosing to implement the OS ECM system. By adding to, or expanding on Orlikowski and Hoffman’s (1997) model to include a fourth element, indicating the external forces in the environment, such as government regulations; government policy; and the debate on global and national FOSS versus PS, highlights the need for this external alignment as well as prevents the focus on internal alignment only.
Institutional theory was consequently applied in an attempt to unpack the organisational and change management dimensions of the change model, aiming at understanding the institutional forces which legitimates or contradicts the technical/rational ideas and actions of the change. The findings were threefold. Firstly, the role played by IS as an institutional process in and of itself and the way in which this could have affected the implementation of the new OS ECM system was discussed, pointing to the possibility that the new system was not necessarily being implemented to streamline the work practices, but rather due to its institutional status of being a ‘rational myth’; something which had to be done as ‘it’s just the right thing to do.”
Secondly, OSS and PS were argued to be different ‘types’ of institutions. Using the institutional pillars it was argued that OSS and PS were driven by different institutional forces, with PS leaning towards the regulative pillar and OSS being more in line with the normative pillar. These two institutions were found to mainly differ with regard to their basis of compliance and the logic behind them. The insights offered by this argument revealed that when changing from OSS to PS, it would be very valuable to recognise that OSS and PS are two different ‘types’ of institutions, and to not only understand that the new system could therefore change the organisational processes when it is implemented, but to also acknowledge the change which will take place within the IS/IT institution itself – moving from the regulative to the normative. The change should thus be understood both within the two different IS innovations themselves, and in how these two innovations interact.
Lastly, the research in this thesis went beyond the technical/rational actions of the stakeholders, and included an in depth analysis of the institutional forces at play in the broader social context of the Government department. It explained the institutions which were at play on the international, national and organisational levels, pointing out which of these forces worked in favour of or against the technical/rational actions, and in the process contributed to the unexpected outcome of the new OS ECM implementation process. / Thesis (PhD-- University of Pretoria, 2014 / Informatics / unrestricted
|
7 |
Boosting Public Participation in Urban Planning Through the Use of Web GIS Technology : A Case Study of Stockholm County / Att Öka Medborgardeltagande i Stadsplanering genom användning av WebGIS Teknologi : En Fallstudie i Stockholm länNarooie, Mahnaz January 2014 (has links)
Providing citizens with the robust and suitable tools to effectively participate in the planning process is a necessity nowadays. Also, changes in the capabilities and popularity of new technologies have dramatically raised the number of technology-based tools that are potentially available for enhancing public participation in the planning process. This study explores both the theoretical aspect of collaborative planning and the effects that Web-based Public Participatory GIS (WPPGIS) applications and Information and Communication Technologies (ICT) has on the planning process. Findings indicate that the WPPGIS applications have the potential for increasing participation. It is also found that besides the contextual elements like the attitudes of planners and decision makers, the technological features such as proper user interface, price of software, technical and literacy skills are seen as crucial hindrances to bridging the planning process and technology-based solutions. This research also attempts to combine IAP2 Public Participation Spectrum and technological functionalities into a single framework to understand the implementation of WPPGIS applications in Stockholm, the capital of Sweden. Finally, based on the given criteria and assessment of the reviewed applications, this study concludes with the design and implementation of a prototype WPPGIS application using Open-Source Technologies (OST).
|
8 |
Security Guidelines for the Usage of Open Source SoftwareDomar Bolmstam, Sebastian, Hanifi, Siavash January 2020 (has links)
Open-source software is in average used in more than 65% of the applications within the domains of enterprise software, retail and e-commerce, cybersecurity and internet of things (Synopsys, 2019). With the frequent use of open-source software, security issues arise which need to be handled. These include among other issues; non-patched vulnerabilities and malicious code (Schryen, 2011). Security guidelines for open-source software usage have been defined by numerous security organizations as an effort to increase effective security handling of open source software within organizations. These guidelines often cover directives on many layers of an organization and are often lacking information necessary for them to be understandable, reliable, and useful to the person using them.The purpose of this study is to contribute to increased software security related to open-source software usage, by exploring and providing information on the topic, and by defining a set of improved security guidelines that cover both what measures to take to minimize security risks, and how to implement it, based on the published state-of-the-art security guidelines for using open-source software.The subject was investigated through a research process focused on answering whether the current state-of-the-art security guidelines could be improved, using a qualitative research type based on a document analysis data collection method. The research was exploratory in its design and the main focus was to explore the subject by trying to answer the posed research question.By investigating the state of contemporary security guidelines found in literature, and evaluating them against a set of desirable attributes for high quality guidelines, it became evident that the contemporary guidelines couldbe improved. An effort was therefore made to build on the found guidelines and improve them by trying to resolve the issues found through the evaluation.The effort of trying to improve existing guidelines resulted in a new set of guidelines including added information and reformulations, however, the changes made could not be said to be conclusive or objective improvements. Instead they present suggestions for how and in what aspects the contemporary guidelines could be improved. / Mjukvara med öppen källkod (open-source software) används i genomsnitti mer än 65% av applikationerna för mjukvara till företag, detaljoch e-imageimageimageimagehandel, cybersäkerhet och sakernas internet (Synopsys, 2019). Den frekventa användningen av öppen källkod ger upphov till säkerhetsrisker som behöver motverkas. Dessa risker inkluderar bland annat; skadlig kod och säkerhetsbrister som inte åtgärdas (Schryen, 2011). Säkerhetsriktlinjer har blivit definierade av ett flertal organisationer med målet att effektivisera säkerhetshanteringen av öppen källkod och på så sätt minska risken för attacker. Dessa riktlinjer täcker ofta många olika delar av en organisations hierarki och saknar ofta information som är nödvändig för att göra dem begripliga, pålitliga och användbara för de personer som använder dem. Syftet med denna studieär att bidra till enökad säkerhet vid användan-det av öppen källkod genom att dels öka kunskapen om ämnet, och genom att definiera en samling förbättrade säkerhetsriktlinjer som både beskriver vad som ska göras för att minska säkerhetsrisker och hur det ska göras. De förbättrade riktlinjerna ska baseras på befintliga säkerhetsriktlinjer för användning av öppen källkod. Ämnet studerades genom en forskningsprocess med fokus på att besvara frågan om huruvida befintliga säkerhetsriktlinjer kan förbättras, där information samlades in genom en kvalitativ forskningstyp baserad på dokumentanalys. Forskningsdesignen var av utforskande karaktär, där huvudfokuset låg i att utforska ämnet genom att försöka besvara forskningsfrågan.Genom att undersöka kvalitén av befintliga säkerhetsriktlinjer som hittats i litteraturen och utvärdera dessa med stöd av en stor samling önskvärda egenskaper hos riktlinjer av hög kvalitet, blev det uppenbart att befintliga riktlinjer kan förbättras. Däför genomfördes ett försök att vidareutveckla befintliga riktlinjer för att förbättra dem genom att lösa de problem som hittats genom utvärderingen. Försöket att förbättra existerande riktlinjer resulterade i en ny uppsättning riktlinjer med tillagd information och omformuleringar. Dessa förändringar kan dock inte sägas representera konklusiva eller objectiva förbättringar. Istället representerar de förbättrade riktlinjerna ett förslag på hur riktlinjer skulle kunna förbättras.
|
9 |
ICT and SMEs’ competitiveness in South Africa : how SMEs could use ICT to become competitive in South AfricaModimogale, Lloyd 27 August 2008 (has links)
This mini-dissertation reviews present literature to define ICT and SMEs and determine the current situation in South Africa with regard to the use of ICT by SMEs, including possible benefits to SMEs as well as stumbling blocks to adopting ICT. The research consists of collecting data from ten SMEs in Gauteng in South Africa using questionnaires and interviews, to determine how SMEs can use ICT to become more competitive. The mini-dissertation will have a number of chapters: the first chapter will give an overview of the subject. The second chapter will explain the research motivation and methodology while the third chapter will be the literature review, which will explore the topic of ICT and SMEs in depth, with a focus on South Africa. Chapter four will deal with data collection and analysis; the main source of data will be interviews based on structured questions. The fifth chapter will be the discussion and recommendations based on the results of the analysis and the literature review. Chapter Six will be the conclusion. / Dissertation (MIT)--University of Pretoria, 2008. / Informatics / unrestricted
|
Page generated in 0.0361 seconds