首页 > 最新文献

International Conference on Information Society (i-Society 2011)最新文献

英文 中文
Design and development of TPACK template: Planning effective blended courses TPACK模板的设计与开发:规划有效的混合课程
Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978459
Mohammed M. Alsofyani, Baharuddin Aris
The need for a quality planning of online learning is crucial. When planning for face to face environment and online environment, it is required to clarify when learning will take place online and which pedagogy and technology will be used. Thus, in this paper, we introduce TPACK lesson plan template. This template is designed to facilitate and accelerate the process of planning blended online courses in social science's field. It includes a list of learning activities, types of activities and mode of activities. Choosing the most suitable activity is left up to the instructors' point of view after examining the nature of behavioral objectives and the learning context. Using such a template may contribute to understanding the relation between pedagogy, technology and content as well as reducing the planning time to teach online.
在线学习的质量规划是至关重要的。在规划面对面环境和在线环境时,需要明确何时在线学习以及将使用哪种教学方法和技术。因此,在本文中,我们引入了TPACK教案模板。本模板旨在促进和加速社会科学领域混合在线课程的规划过程。它包括学习活动列表、活动类型和活动模式。在考察了行为目标的性质和学习环境之后,选择最合适的活动取决于教师的观点。使用这样的模板有助于理解教学法、技术和内容之间的关系,并减少在线教学的规划时间。
{"title":"Design and development of TPACK template: Planning effective blended courses","authors":"Mohammed M. Alsofyani, Baharuddin Aris","doi":"10.1109/I-SOCIETY18435.2011.5978459","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978459","url":null,"abstract":"The need for a quality planning of online learning is crucial. When planning for face to face environment and online environment, it is required to clarify when learning will take place online and which pedagogy and technology will be used. Thus, in this paper, we introduce TPACK lesson plan template. This template is designed to facilitate and accelerate the process of planning blended online courses in social science's field. It includes a list of learning activities, types of activities and mode of activities. Choosing the most suitable activity is left up to the instructors' point of view after examining the nature of behavioral objectives and the learning context. Using such a template may contribute to understanding the relation between pedagogy, technology and content as well as reducing the planning time to teach online.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"59 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123762297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hidden assumption of face recognition evaluation under different quality conditions 不同质量条件下人脸识别评价的隐藏假设
Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978491
H. Al-Assam, Ali J. Abboud, S. Jassim
Automatic face recognition remains a challenging task due to factors such as variations in recording condition, pose, and age. Many schemes have emerged to enhance the performance of face recognition to deal with poor quality facial images. It has been shown that reporting average accuracy, to cover a wide range of image quality, does not reflect the system's for any specific quality levels. This raises the need to evaluate biometric system's performance at each quality level separately. Challenging face databases have been recorded with varied face image qualities. Unfortunately, the performance of face recognition schemes under different quality conditions, reported in the literature, are evaluated under hidden assumption which cannot be achieved in real-life applications. In fact, this problem could be a source of attack that interferes with the verification through manipulating the recording condition. In order to remedy this problem, two requirements are to be imposed: 1) the matching criteria should be based an Adaptive Quality-Based Threshold (AQBT) and 2) at the verification stage the quality level of an input face image should be determined and classified into one of a non-overlapping predefined quality levels. We illustrate our idea by experiments conducted on the extended Yale B face benchmark dataset. Our experimental results indicate that if AQBT is not adopted, false rejection rates becomes very high (always reject) when using low quality face images.
由于记录条件、姿势和年龄等因素的变化,自动人脸识别仍然是一项具有挑战性的任务。为了处理质量较差的人脸图像,已经出现了许多提高人脸识别性能的方案。它已经表明,报告平均精度,以涵盖广泛的图像质量,并不能反映系统的任何特定的质量水平。这就需要在每个质量水平上分别评估生物识别系统的性能。具有挑战性的人脸数据库记录了不同的人脸图像质量。遗憾的是,文献中报道的人脸识别方案在不同质量条件下的性能都是在隐藏假设下进行评估的,这在实际应用中是无法实现的。事实上,这个问题可能是通过操纵记录条件来干扰验证的攻击源。为了解决这一问题,需要提出两个要求:1)匹配标准应基于自适应质量阈值(AQBT); 2)在验证阶段,应确定输入人脸图像的质量水平,并将其分类为一个不重叠的预定义质量水平。我们通过在扩展的Yale B人脸基准数据集上进行的实验来说明我们的想法。我们的实验结果表明,如果不采用AQBT,在使用低质量的人脸图像时,错误拒绝率会非常高(总是被拒绝)。
{"title":"Hidden assumption of face recognition evaluation under different quality conditions","authors":"H. Al-Assam, Ali J. Abboud, S. Jassim","doi":"10.1109/I-SOCIETY18435.2011.5978491","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978491","url":null,"abstract":"Automatic face recognition remains a challenging task due to factors such as variations in recording condition, pose, and age. Many schemes have emerged to enhance the performance of face recognition to deal with poor quality facial images. It has been shown that reporting average accuracy, to cover a wide range of image quality, does not reflect the system's for any specific quality levels. This raises the need to evaluate biometric system's performance at each quality level separately. Challenging face databases have been recorded with varied face image qualities. Unfortunately, the performance of face recognition schemes under different quality conditions, reported in the literature, are evaluated under hidden assumption which cannot be achieved in real-life applications. In fact, this problem could be a source of attack that interferes with the verification through manipulating the recording condition. In order to remedy this problem, two requirements are to be imposed: 1) the matching criteria should be based an Adaptive Quality-Based Threshold (AQBT) and 2) at the verification stage the quality level of an input face image should be determined and classified into one of a non-overlapping predefined quality levels. We illustrate our idea by experiments conducted on the extended Yale B face benchmark dataset. Our experimental results indicate that if AQBT is not adopted, false rejection rates becomes very high (always reject) when using low quality face images.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114022084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards e-learning security: A machine learning approach 迈向电子学习安全:一种机器学习方法
Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978544
T. Ayodele, C. Shoniregun, G. Akmayeva
E-learning allows us to learn anywhere, any place and any time as long as there is access to a configured computer system. E-learning can be network-based, intranet-based, internet-based, cd/dvd-based. It can include audio, video, text, animation and virtual environments. However, the increase of e-learning tools by allowing the creation learning environments does create loop holes for security bridges such as: inadequate authentication for online assessments, identity theft, and impersonation. We propose a new framework that can reduce the security risks, and provide an intelligent e-learning preventive mechanism (IEPM) to identify users' pattern of behaviour in order to determine the level of risks and recommend preventive measures.
电子学习允许我们在任何地方、任何地点、任何时间学习,只要有一个配置好的计算机系统。电子学习可以是基于网络的,基于内部网的,基于因特网的,基于cd/dvd的。它可以包括音频、视频、文本、动画和虚拟环境。然而,允许创建学习环境的电子学习工具的增加确实为安全桥梁带来了漏洞,例如:在线评估的身份验证不足、身份盗窃和冒充。我们提出了一个可以降低安全风险的新框架,并提供了一个智能电子学习预防机制(IEPM)来识别用户的行为模式,从而确定风险水平并建议预防措施。
{"title":"Towards e-learning security: A machine learning approach","authors":"T. Ayodele, C. Shoniregun, G. Akmayeva","doi":"10.1109/I-SOCIETY18435.2011.5978544","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978544","url":null,"abstract":"E-learning allows us to learn anywhere, any place and any time as long as there is access to a configured computer system. E-learning can be network-based, intranet-based, internet-based, cd/dvd-based. It can include audio, video, text, animation and virtual environments. However, the increase of e-learning tools by allowing the creation learning environments does create loop holes for security bridges such as: inadequate authentication for online assessments, identity theft, and impersonation. We propose a new framework that can reduce the security risks, and provide an intelligent e-learning preventive mechanism (IEPM) to identify users' pattern of behaviour in order to determine the level of risks and recommend preventive measures.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133233992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Mobile portals: An extension to corporate knowledge portals 移动门户:企业知识门户的扩展
Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978476
Hanadi Al-Zegaier, Abderrahim Barakat
Corporate knowledge portals are used by organizations for sharing, storing and retrieving knowledge by all its customers, employees, vendors and partners. Corporate knowledge portals allow organizations to become more competitive and innovative. A knowledge portal are constructed through the use of web and internet technology and are accessed to add, retrieve or update knowledge and is done through a web browser using a computer system. This paper discusses the use of mobile portals as a new form of accessing corporate knowledge through the use of the mobile devices.
企业使用企业知识门户来共享、存储和检索所有客户、员工、供应商和合作伙伴的知识。企业知识门户允许组织变得更具竞争力和创新性。知识门户是通过使用网络和互联网技术来构建的,可以通过使用计算机系统的网络浏览器来添加、检索或更新知识。本文讨论了利用移动门户作为一种利用移动设备访问企业知识的新形式。
{"title":"Mobile portals: An extension to corporate knowledge portals","authors":"Hanadi Al-Zegaier, Abderrahim Barakat","doi":"10.1109/I-SOCIETY18435.2011.5978476","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978476","url":null,"abstract":"Corporate knowledge portals are used by organizations for sharing, storing and retrieving knowledge by all its customers, employees, vendors and partners. Corporate knowledge portals allow organizations to become more competitive and innovative. A knowledge portal are constructed through the use of web and internet technology and are accessed to add, retrieve or update knowledge and is done through a web browser using a computer system. This paper discusses the use of mobile portals as a new form of accessing corporate knowledge through the use of the mobile devices.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122480919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sliding doors: Random mobile encounters 滑动门:随机移动遭遇战
Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978499
John P. T. Moore, Sujan Shrestha
Imagine when you sit on the same train everyday commuting to work. You see the same people. What do you know about these people? Do they move in similar social circles to you? In this paper we describe how technology can be used in evasive ways to obtain information about some people who you come into contact with. We describe how to implement the technology as well as highlight issues of personal privacy.
想象一下,当你每天上下班都坐在同一列火车上。你看到的是同样的人。你对这些人了解多少?他们和你有相似的社交圈吗?在本文中,我们描述了如何利用技术以规避的方式获取你所接触的一些人的信息。我们描述了如何实现这项技术,并强调了个人隐私问题。
{"title":"Sliding doors: Random mobile encounters","authors":"John P. T. Moore, Sujan Shrestha","doi":"10.1109/I-SOCIETY18435.2011.5978499","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978499","url":null,"abstract":"Imagine when you sit on the same train everyday commuting to work. You see the same people. What do you know about these people? Do they move in similar social circles to you? In this paper we describe how technology can be used in evasive ways to obtain information about some people who you come into contact with. We describe how to implement the technology as well as highlight issues of personal privacy.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124868564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business Process Management and the challenge of dynamic services 业务流程管理和动态服务的挑战
Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978530
T. Kirkham, Sandra Winfield, M. Raza, Thorsten Haberecht
Advances in mobile and embedded computing are presenting computing environment that embrace personalisation, mobility and real-time computing. As a result Service Oriented Architectures (SOA) has to adopt new methods of service security, service management and service execution. For the business process these adaptations yield challenges in terms of process modeling, delivery and execution. In order to make Business Process Management (BPM) work in practice in these new environments, what changes are needed in order to support increasingly dynamic and decentralised services in BPM?
移动和嵌入式计算的进步正在呈现包含个性化、移动性和实时计算的计算环境。因此,面向服务的体系结构(SOA)必须采用新的服务安全、服务管理和服务执行方法。对于业务流程而言,这些调整在流程建模、交付和执行方面带来了挑战。为了使业务流程管理(BPM)在这些新环境中实际工作,需要进行哪些更改以支持BPM中日益动态和分散的服务?
{"title":"Business Process Management and the challenge of dynamic services","authors":"T. Kirkham, Sandra Winfield, M. Raza, Thorsten Haberecht","doi":"10.1109/I-SOCIETY18435.2011.5978530","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978530","url":null,"abstract":"Advances in mobile and embedded computing are presenting computing environment that embrace personalisation, mobility and real-time computing. As a result Service Oriented Architectures (SOA) has to adopt new methods of service security, service management and service execution. For the business process these adaptations yield challenges in terms of process modeling, delivery and execution. In order to make Business Process Management (BPM) work in practice in these new environments, what changes are needed in order to support increasingly dynamic and decentralised services in BPM?","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122754268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploiting the Search Computing paradigm in e-government 电子政务中搜索计算范式的开发
Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978535
A. Campi
People shop online, compare online, book hotels and flights online. This happens because the data needed to complete these tasks are easily accessible and a lot of Web sites allows users to query the Web to obtain enough information to be confident. The aim of this work is to propose a framework tailored to extend the internet revolution to public administration. This work is the first step towards an infrastructure allowing people to know in a very easy way the information they need. This paper exploits the Search Computing paradigm. It is a new way for composing data. While state-of-art search systems answer generic or domain-specific queries, Search Computing enables answering questions via a constellation of cooperating data sources, called search services, which are correlated by means of join operations. Search Computing aims at responding to queries over multiple semantic fields of interest; thus, Search Computing fills the gap between generalized search systems, which are unable to find information spanning multiple topics, and domain-specific search systems, which cannot go beyond their domain limits.
人们在网上购物、比较、预订酒店和机票。这是因为完成这些任务所需的数据很容易访问,而且许多Web站点允许用户查询Web以获得足够的信息。这项工作的目的是提出一个量身定制的框架,将互联网革命扩展到公共行政。这项工作是基础设施的第一步,使人们能够以一种非常简单的方式了解他们需要的信息。本文利用了搜索计算范式。这是一种新的数据组合方式。当最先进的搜索系统回答一般或特定于领域的查询时,搜索计算可以通过一组称为搜索服务的协作数据源来回答问题,这些数据源通过连接操作相关联。搜索计算旨在响应多个感兴趣的语义域的查询;因此,搜索计算填补了广义搜索系统和特定领域搜索系统之间的空白。广义搜索系统无法找到跨越多个主题的信息,而特定领域搜索系统无法超越其领域限制。
{"title":"Exploiting the Search Computing paradigm in e-government","authors":"A. Campi","doi":"10.1109/I-SOCIETY18435.2011.5978535","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978535","url":null,"abstract":"People shop online, compare online, book hotels and flights online. This happens because the data needed to complete these tasks are easily accessible and a lot of Web sites allows users to query the Web to obtain enough information to be confident. The aim of this work is to propose a framework tailored to extend the internet revolution to public administration. This work is the first step towards an infrastructure allowing people to know in a very easy way the information they need. This paper exploits the Search Computing paradigm. It is a new way for composing data. While state-of-art search systems answer generic or domain-specific queries, Search Computing enables answering questions via a constellation of cooperating data sources, called search services, which are correlated by means of join operations. Search Computing aims at responding to queries over multiple semantic fields of interest; thus, Search Computing fills the gap between generalized search systems, which are unable to find information spanning multiple topics, and domain-specific search systems, which cannot go beyond their domain limits.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123629619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forensic extraction of user information in continuous block of evidence 在连续取证块中提取用户信息
Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978501
F. Olajide, N. Savage
Extraction of user information in the physical memory of Windows application is vital in today's digital investigation. Digital forensic community feels the urge for the development of tools and techniques in volatile memory analysis. However, there have been few investigations into the amount of relevant information that can be recovered from the application memory. In this research, we present the quantitative and qualitative results of experiments carried out on Windows applications. In conducting this research; we have identified the most commonly used applications on Windows systems, designed a methodology to capture data and processed that data. This research report the amount of evidence that was stored over time and recovered in continuous block of evidence in the physical memory.
在当今的数字调查中,从Windows应用程序的物理内存中提取用户信息是至关重要的。数字取证界迫切需要开发易失性存储器分析的工具和技术。然而,很少有人调查可以从应用程序内存中恢复的相关信息的数量。在本研究中,我们给出了在Windows应用程序上进行的定量和定性实验的结果。在进行这项研究时;我们已经确定了Windows系统上最常用的应用程序,设计了一种方法来捕获数据并处理这些数据。本研究报告了随时间存储的证据量,并在物理内存中以连续的证据块恢复。
{"title":"Forensic extraction of user information in continuous block of evidence","authors":"F. Olajide, N. Savage","doi":"10.1109/I-SOCIETY18435.2011.5978501","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978501","url":null,"abstract":"Extraction of user information in the physical memory of Windows application is vital in today's digital investigation. Digital forensic community feels the urge for the development of tools and techniques in volatile memory analysis. However, there have been few investigations into the amount of relevant information that can be recovered from the application memory. In this research, we present the quantitative and qualitative results of experiments carried out on Windows applications. In conducting this research; we have identified the most commonly used applications on Windows systems, designed a methodology to capture data and processed that data. This research report the amount of evidence that was stored over time and recovered in continuous block of evidence in the physical memory.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121079679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A survey report on mobile eye-based Human-Computer Interaction 基于移动眼的人机交互调查报告
Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978526
S. Srinivas, J. Blustein
Eye-based Human Computer Interaction techniques have thus far been limited to closed environments. However advancement in technology and the advent of mobile computing promises to bring eye-based interaction techniques to wearable and handled mobile devices. This paper investigates recent methods to track eye movements in the mobile environment. Methods were evaluated by comparing the techniques they rely on, type of work, use of theoretical proofs and simulations.
迄今为止,基于眼睛的人机交互技术仅限于封闭环境。然而,技术的进步和移动计算的出现有望将基于眼睛的交互技术带入可穿戴和可处理的移动设备。本文研究了在移动环境中跟踪眼球运动的最新方法。通过比较它们所依赖的技术、工作类型、理论证明和模拟的使用来评估方法。
{"title":"A survey report on mobile eye-based Human-Computer Interaction","authors":"S. Srinivas, J. Blustein","doi":"10.1109/I-SOCIETY18435.2011.5978526","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978526","url":null,"abstract":"Eye-based Human Computer Interaction techniques have thus far been limited to closed environments. However advancement in technology and the advent of mobile computing promises to bring eye-based interaction techniques to wearable and handled mobile devices. This paper investigates recent methods to track eye movements in the mobile environment. Methods were evaluated by comparing the techniques they rely on, type of work, use of theoretical proofs and simulations.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121687497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Web application security: Improving critical web-based applications quality through in-depth security analysis Web应用程序安全性:通过深入的安全性分析提高关键的基于Web的应用程序质量
Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978496
Nuno Teodoro, C. Serrão
The Internet, and in particular the World Wide Web, have become one of the most common communication mediums in the World. Millions of users connect everyday to different web-based applications to search for information, exchange messages, interact with each other, conduct business, pay taxes, perform financial operations and many more. Some of these critical web-based services are targeted by several malicious users intending to exploit possible weaknesses and vulnerabilities, which could cause not only the disruption of the service, but also compromise the users and organizations information. Most of the times, these malicious users succeed in exploiting different types of vulnerabilities and the consequences can be disastrous. Most of these vulnerabilities are directly related with the web-based applications lack of quality as a result from a poorly implemented software development life cycle (SDLC). This paper will discuss the direct implication of the lack of security and the importance of quality on the SDLC, and the major factors that influence them. On the other hand the authors propose a set of security automated tools and methodologies that can be used throughout the SDLC as a mean to improve critical web-based applications security and quality.
因特网,特别是万维网,已经成为世界上最常见的通信媒介之一。数以百万计的用户每天连接到不同的基于网络的应用程序来搜索信息、交换信息、相互互动、开展业务、纳税、执行财务操作等等。其中一些关键的基于web的服务是一些恶意用户的目标,他们打算利用可能存在的弱点和漏洞,这不仅会导致服务中断,还会损害用户和组织的信息。大多数时候,这些恶意用户成功地利用了不同类型的漏洞,其后果可能是灾难性的。这些漏洞大多与基于web的应用程序缺乏质量直接相关,这是由于软件开发生命周期(SDLC)的实现不佳造成的。本文将讨论缺乏安全性和质量对SDLC的重要性的直接含义,以及影响它们的主要因素。另一方面,作者提出了一套安全自动化工具和方法,可以在整个SDLC中使用,作为提高关键的基于web的应用程序安全性和质量的手段。
{"title":"Web application security: Improving critical web-based applications quality through in-depth security analysis","authors":"Nuno Teodoro, C. Serrão","doi":"10.1109/I-SOCIETY18435.2011.5978496","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978496","url":null,"abstract":"The Internet, and in particular the World Wide Web, have become one of the most common communication mediums in the World. Millions of users connect everyday to different web-based applications to search for information, exchange messages, interact with each other, conduct business, pay taxes, perform financial operations and many more. Some of these critical web-based services are targeted by several malicious users intending to exploit possible weaknesses and vulnerabilities, which could cause not only the disruption of the service, but also compromise the users and organizations information. Most of the times, these malicious users succeed in exploiting different types of vulnerabilities and the consequences can be disastrous. Most of these vulnerabilities are directly related with the web-based applications lack of quality as a result from a poorly implemented software development life cycle (SDLC). This paper will discuss the direct implication of the lack of security and the importance of quality on the SDLC, and the major factors that influence them. On the other hand the authors propose a set of security automated tools and methodologies that can be used throughout the SDLC as a mean to improve critical web-based applications security and quality.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131971272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
期刊
International Conference on Information Society (i-Society 2011)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1