Pub Date : 2011-06-27DOI: 10.1109/I-SOCIETY18435.2011.5978543
N. Arachchilage, Melissa Cole
This research aims to design an educational mobile game for home computer users to protect against phishing attacks. Phishing is an online identity theft which aims to steal sensitive information such as username, password and online banking details from victims. To prevent this, phishing education needs to be considered. Mobile games could facilitate to embed learning in a natural environment. The paper introduces a mobile game design based on a story which is simplifying and exaggerating real life. We use a theoretical model derived from Technology Threat Avoidance Theory (TTAT) to address the game design issues and game design principles were used as a set of guidelines for structuring and presenting information. The overall mobile game design was aimed to enhance avoidance motivation and behaviour of home computer users to protect against phishing threats. The prototype game design is presented on Google App Inventor Emulator. We believe by training home computer users to protect against phishing attacks, would be an aid to enable the cyberspace as a secure environment.
{"title":"Design a mobile game for home computer users to prevent from “phishing attacks”","authors":"N. Arachchilage, Melissa Cole","doi":"10.1109/I-SOCIETY18435.2011.5978543","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978543","url":null,"abstract":"This research aims to design an educational mobile game for home computer users to protect against phishing attacks. Phishing is an online identity theft which aims to steal sensitive information such as username, password and online banking details from victims. To prevent this, phishing education needs to be considered. Mobile games could facilitate to embed learning in a natural environment. The paper introduces a mobile game design based on a story which is simplifying and exaggerating real life. We use a theoretical model derived from Technology Threat Avoidance Theory (TTAT) to address the game design issues and game design principles were used as a set of guidelines for structuring and presenting information. The overall mobile game design was aimed to enhance avoidance motivation and behaviour of home computer users to protect against phishing threats. The prototype game design is presented on Google App Inventor Emulator. We believe by training home computer users to protect against phishing attacks, would be an aid to enable the cyberspace as a secure environment.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126216879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-27DOI: 10.1109/I-SOCIETY18435.2011.5978439
S. Bansal, A. Bansal
With the increasing popularity of Web services and Service-Oriented Architecture, we need sophisticated infrastructure to discover and compose Web services. Dynamic Web service Composition will gain wider acceptance only when users know that the solutions obtained are comprised of trustworthy services. In this paper, we extend our Web service Composition framework to include selection and ranking of services based on their reputation score. We present a technique to calculate a reputation score per service using centrality measure of Social Networks.
{"title":"Effective Web service selection for composition using centrality measures","authors":"S. Bansal, A. Bansal","doi":"10.1109/I-SOCIETY18435.2011.5978439","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978439","url":null,"abstract":"With the increasing popularity of Web services and Service-Oriented Architecture, we need sophisticated infrastructure to discover and compose Web services. Dynamic Web service Composition will gain wider acceptance only when users know that the solutions obtained are comprised of trustworthy services. In this paper, we extend our Web service Composition framework to include selection and ranking of services based on their reputation score. We present a technique to calculate a reputation score per service using centrality measure of Social Networks.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122061249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-27DOI: 10.1109/I-SOCIETY18435.2011.5978465
Nawfal F. Fadhel, G. Wills, David Argles
In the context of on-line assessment in E-learning a problem arises is that someone taking an exam may wish to cheat by handing over personal credentials to someone to take their place in an exam. This differs from authenticating for on-line banking where it is in the user interest to ensure safe and correct authentication. Our proposed solution is to digitally sign the student work by embedding voice samples in the exam paper at regular intervals. In this investigation we have demonstrated that transparent steganography can provide an effective mechanism for achieving such a good goal.
{"title":"Transparent authentication in E-learning","authors":"Nawfal F. Fadhel, G. Wills, David Argles","doi":"10.1109/I-SOCIETY18435.2011.5978465","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978465","url":null,"abstract":"In the context of on-line assessment in E-learning a problem arises is that someone taking an exam may wish to cheat by handing over personal credentials to someone to take their place in an exam. This differs from authenticating for on-line banking where it is in the user interest to ensure safe and correct authentication. Our proposed solution is to digitally sign the student work by embedding voice samples in the exam paper at regular intervals. In this investigation we have demonstrated that transparent steganography can provide an effective mechanism for achieving such a good goal.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117285583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-27DOI: 10.1109/I-SOCIETY18435.2011.5978437
D. Ucha, Fabiana Andrade Pereira
Ensuring information access has become a critical issue in modern society. Information is considered nowadays one of the most valuable and strategic asset. Information access improvements aim to reduce the barrier between information creators and information seekers. Aligned to this definition, five improvements (Search Engine Optimization, Information Architecture, Usability, Accessibility and Social Media) were selected as a main guideline for VLs' information access upgrade, which are under development in FAPESP's VL.
{"title":"Reengineering of a virtual library in science technology and innovation: Improvements on information access","authors":"D. Ucha, Fabiana Andrade Pereira","doi":"10.1109/I-SOCIETY18435.2011.5978437","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978437","url":null,"abstract":"Ensuring information access has become a critical issue in modern society. Information is considered nowadays one of the most valuable and strategic asset. Information access improvements aim to reduce the barrier between information creators and information seekers. Aligned to this definition, five improvements (Search Engine Optimization, Information Architecture, Usability, Accessibility and Social Media) were selected as a main guideline for VLs' information access upgrade, which are under development in FAPESP's VL.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121535605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-27DOI: 10.1109/I-SOCIETY18435.2011.5978485
André Ricardo, C. Serrão
The Internet has made possible the access to thousands of freely available music tracks under the Creative Commons or Public Domain licenses. This number keeps growing on a yearly basis. In practical terms, it is extremely difficult to browse this huge music collection, because it is widely dispersed throughout multiple websites. The work presented on this paper addresses the problem of indexing this large collection of free music. This is a very relevant problem because currently there are no integrated database or index holding information about this music material. Indexing this content will allow, for instance, the development of music recommendation systems that will also work with noncommercial content. In this paper the authors present a system proposal that has been developed to tackle the available free music indexing problem and how this system can be integrated with other systems (such as music recommendation systems) to allow the end users to enjoy free and open music content.
{"title":"Using open-source tools for web crawling and indexing of open content","authors":"André Ricardo, C. Serrão","doi":"10.1109/I-SOCIETY18435.2011.5978485","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978485","url":null,"abstract":"The Internet has made possible the access to thousands of freely available music tracks under the Creative Commons or Public Domain licenses. This number keeps growing on a yearly basis. In practical terms, it is extremely difficult to browse this huge music collection, because it is widely dispersed throughout multiple websites. The work presented on this paper addresses the problem of indexing this large collection of free music. This is a very relevant problem because currently there are no integrated database or index holding information about this music material. Indexing this content will allow, for instance, the development of music recommendation systems that will also work with noncommercial content. In this paper the authors present a system proposal that has been developed to tackle the available free music indexing problem and how this system can be integrated with other systems (such as music recommendation systems) to allow the end users to enjoy free and open music content.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"1240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116321103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-27DOI: 10.1109/I-SOCIETY18435.2011.5978500
I. Brigui-Chtioui, I. Saad
In this paper we propose a non compensatory aggregation model based on two reference points: the aspiration point and the reservation point in order to automate the resolution of conflicts between decision makers for identifying knowledge that need to be capitalized. We follow a multi-agent system based on a mediator agent. This new approach allows to elicit preferences of decision makers which can be different while exploiting their multiple points of view to identify organizational knowledge to be acquired, preserved and transferred.
{"title":"A conflict-solving perspective on collaborative knowledge classification - Application of a non compensatory multicriteria model","authors":"I. Brigui-Chtioui, I. Saad","doi":"10.1109/I-SOCIETY18435.2011.5978500","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978500","url":null,"abstract":"In this paper we propose a non compensatory aggregation model based on two reference points: the aspiration point and the reservation point in order to automate the resolution of conflicts between decision makers for identifying knowledge that need to be capitalized. We follow a multi-agent system based on a mediator agent. This new approach allows to elicit preferences of decision makers which can be different while exploiting their multiple points of view to identify organizational knowledge to be acquired, preserved and transferred.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133598736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-27DOI: 10.1109/I-SOCIETY18435.2011.5978554
Syamantak Mukhopadhyay, David Argles
Today internet users use a single identity to access multiple services. With single sign-on (SSO), users don't have to remember separate username/password for each service provider, which helps the user to browse through the web seamlessly. SSO is however susceptible to phishing attacks. This paper describes a new anti phishing SSO model based on mobile QR code. Apart from preventing phishing attacks this new model is also safe against man in the middle & reply attacks.
{"title":"An Anti-Phishing mechanism for single sign-on based on QR-code","authors":"Syamantak Mukhopadhyay, David Argles","doi":"10.1109/I-SOCIETY18435.2011.5978554","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978554","url":null,"abstract":"Today internet users use a single identity to access multiple services. With single sign-on (SSO), users don't have to remember separate username/password for each service provider, which helps the user to browse through the web seamlessly. SSO is however susceptible to phishing attacks. This paper describes a new anti phishing SSO model based on mobile QR code. Apart from preventing phishing attacks this new model is also safe against man in the middle & reply attacks.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132484096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-27DOI: 10.1109/I-SOCIETY18435.2011.5978475
P. Matthew
With an aging population and the increase in serious diseases smart homes and telehealth is becoming more and more prevalent. As these computer systems become increasingly widespread and complex, they become progressively harder to update, troubleshoot and configure without a large expert team of maintainers. One solution is to use autonomous systems to do the work much more quickly and efficiently. As autonomous systems become more sophisticated and understood, security concerns and authentication are coming to the fore as important areas in which more research is needed. With the constant search for the illusive ideal security identifier biometric systems have become more widespread and have entered the public eye. This paper will look at the connection between smart homes, biometrics devices and autonomous systems. into biometrics.
{"title":"Biometric implementation in autonomous systems with an emphasis on smart home applicability","authors":"P. Matthew","doi":"10.1109/I-SOCIETY18435.2011.5978475","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978475","url":null,"abstract":"With an aging population and the increase in serious diseases smart homes and telehealth is becoming more and more prevalent. As these computer systems become increasingly widespread and complex, they become progressively harder to update, troubleshoot and configure without a large expert team of maintainers. One solution is to use autonomous systems to do the work much more quickly and efficiently. As autonomous systems become more sophisticated and understood, security concerns and authentication are coming to the fore as important areas in which more research is needed. With the constant search for the illusive ideal security identifier biometric systems have become more widespread and have entered the public eye. This paper will look at the connection between smart homes, biometrics devices and autonomous systems. into biometrics.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132499918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-27DOI: 10.1109/I-SOCIETY18435.2011.5978443
F. Hadi, Fahad T. Bin Muhaya
In the modern digital age the world became a global village. Finger tips availability of all government services is the goal of every government. That's why the governments of today's world are transforming their manual government services to electronic government services frequently. In the meantime the entire digitization of the system is prone to various security issues. Clear steps must be taken to ensure the privacy, authentication, integrity, and availability etc. This paper outlines some essential measures related to the e-government security. It also adds the security index into the e-government assessment method of the Department of Economic and Social Affairs (ESA) of United Nations (UN). The security index is based upon the international standard ISO 27001. Authors believe that the paper is useful for the policy makers, implementers and users of the e-government.
{"title":"Essentials for the e-government security","authors":"F. Hadi, Fahad T. Bin Muhaya","doi":"10.1109/I-SOCIETY18435.2011.5978443","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978443","url":null,"abstract":"In the modern digital age the world became a global village. Finger tips availability of all government services is the goal of every government. That's why the governments of today's world are transforming their manual government services to electronic government services frequently. In the meantime the entire digitization of the system is prone to various security issues. Clear steps must be taken to ensure the privacy, authentication, integrity, and availability etc. This paper outlines some essential measures related to the e-government security. It also adds the security index into the e-government assessment method of the Department of Economic and Social Affairs (ESA) of United Nations (UN). The security index is based upon the international standard ISO 27001. Authors believe that the paper is useful for the policy makers, implementers and users of the e-government.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130917052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
SCM is a simple, modular and flexible system for web monitoring and customer interaction management. In our view, its main advantages are the following: It is completely web based. It combines all technologies, data, software agents and human agents involved in the monitoring and customer interaction process. It can be used for messages written in any natural language. Although the prototype of SCM is designed for classifying and processing messages about mobile-phone related problems in social networks, SCM can easily be adapted to other text types such as discussion board posts, blogs or emails. Unlike comparable systems, SCM uses linguistic technologies to classify messages and recognize paraphrases of product names. For two reasons, product name paraphrasing plays a major role in SCM: First, product names typically have many, sometimes hundreds or thousands of intralingual paraphrases. Secondly, product names have interlingual paraphrases: The same products are often called or spelt differently in different countries and/or languages. By mapping product name variants to an international canonical form, SCM allows for answering questions like Which statements are made about this mobile phone in which languages/in which social networks/in which countries/…? The SCM product name paraphrasing engine is designed in such a way that standard variants are assigned automatically, regular variants are assigned semiautomatically and idiosyncratic variants can be added manually. With this and similar features we try to realize our philosophy of simplicity, modularity and flexibility: Whatever can be done automatically is done automatically. But manual intervention is always possible and easy and it does not conflict in any way with the automatic functions of SCM.
{"title":"SCM — A simple, modular and flexible customer interaction management system","authors":"Jorg Schuster, Yeong Su Lee, Despina Kobothanassi, Matthias Bargel, Michaela Geierhos","doi":"10.1109/I-SOCIETY18435.2011.5978528","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978528","url":null,"abstract":"SCM is a simple, modular and flexible system for web monitoring and customer interaction management. In our view, its main advantages are the following: It is completely web based. It combines all technologies, data, software agents and human agents involved in the monitoring and customer interaction process. It can be used for messages written in any natural language. Although the prototype of SCM is designed for classifying and processing messages about mobile-phone related problems in social networks, SCM can easily be adapted to other text types such as discussion board posts, blogs or emails. Unlike comparable systems, SCM uses linguistic technologies to classify messages and recognize paraphrases of product names. For two reasons, product name paraphrasing plays a major role in SCM: First, product names typically have many, sometimes hundreds or thousands of intralingual paraphrases. Secondly, product names have interlingual paraphrases: The same products are often called or spelt differently in different countries and/or languages. By mapping product name variants to an international canonical form, SCM allows for answering questions like Which statements are made about this mobile phone in which languages/in which social networks/in which countries/…? The SCM product name paraphrasing engine is designed in such a way that standard variants are assigned automatically, regular variants are assigned semiautomatically and idiosyncratic variants can be added manually. With this and similar features we try to realize our philosophy of simplicity, modularity and flexibility: Whatever can be done automatically is done automatically. But manual intervention is always possible and easy and it does not conflict in any way with the automatic functions of SCM.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131121536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}