Pub Date : 2011-06-27DOI: 10.1109/I-SOCIETY18435.2011.5978459
Mohammed M. Alsofyani, Baharuddin Aris
The need for a quality planning of online learning is crucial. When planning for face to face environment and online environment, it is required to clarify when learning will take place online and which pedagogy and technology will be used. Thus, in this paper, we introduce TPACK lesson plan template. This template is designed to facilitate and accelerate the process of planning blended online courses in social science's field. It includes a list of learning activities, types of activities and mode of activities. Choosing the most suitable activity is left up to the instructors' point of view after examining the nature of behavioral objectives and the learning context. Using such a template may contribute to understanding the relation between pedagogy, technology and content as well as reducing the planning time to teach online.
{"title":"Design and development of TPACK template: Planning effective blended courses","authors":"Mohammed M. Alsofyani, Baharuddin Aris","doi":"10.1109/I-SOCIETY18435.2011.5978459","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978459","url":null,"abstract":"The need for a quality planning of online learning is crucial. When planning for face to face environment and online environment, it is required to clarify when learning will take place online and which pedagogy and technology will be used. Thus, in this paper, we introduce TPACK lesson plan template. This template is designed to facilitate and accelerate the process of planning blended online courses in social science's field. It includes a list of learning activities, types of activities and mode of activities. Choosing the most suitable activity is left up to the instructors' point of view after examining the nature of behavioral objectives and the learning context. Using such a template may contribute to understanding the relation between pedagogy, technology and content as well as reducing the planning time to teach online.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"59 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123762297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-27DOI: 10.1109/I-SOCIETY18435.2011.5978491
H. Al-Assam, Ali J. Abboud, S. Jassim
Automatic face recognition remains a challenging task due to factors such as variations in recording condition, pose, and age. Many schemes have emerged to enhance the performance of face recognition to deal with poor quality facial images. It has been shown that reporting average accuracy, to cover a wide range of image quality, does not reflect the system's for any specific quality levels. This raises the need to evaluate biometric system's performance at each quality level separately. Challenging face databases have been recorded with varied face image qualities. Unfortunately, the performance of face recognition schemes under different quality conditions, reported in the literature, are evaluated under hidden assumption which cannot be achieved in real-life applications. In fact, this problem could be a source of attack that interferes with the verification through manipulating the recording condition. In order to remedy this problem, two requirements are to be imposed: 1) the matching criteria should be based an Adaptive Quality-Based Threshold (AQBT) and 2) at the verification stage the quality level of an input face image should be determined and classified into one of a non-overlapping predefined quality levels. We illustrate our idea by experiments conducted on the extended Yale B face benchmark dataset. Our experimental results indicate that if AQBT is not adopted, false rejection rates becomes very high (always reject) when using low quality face images.
{"title":"Hidden assumption of face recognition evaluation under different quality conditions","authors":"H. Al-Assam, Ali J. Abboud, S. Jassim","doi":"10.1109/I-SOCIETY18435.2011.5978491","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978491","url":null,"abstract":"Automatic face recognition remains a challenging task due to factors such as variations in recording condition, pose, and age. Many schemes have emerged to enhance the performance of face recognition to deal with poor quality facial images. It has been shown that reporting average accuracy, to cover a wide range of image quality, does not reflect the system's for any specific quality levels. This raises the need to evaluate biometric system's performance at each quality level separately. Challenging face databases have been recorded with varied face image qualities. Unfortunately, the performance of face recognition schemes under different quality conditions, reported in the literature, are evaluated under hidden assumption which cannot be achieved in real-life applications. In fact, this problem could be a source of attack that interferes with the verification through manipulating the recording condition. In order to remedy this problem, two requirements are to be imposed: 1) the matching criteria should be based an Adaptive Quality-Based Threshold (AQBT) and 2) at the verification stage the quality level of an input face image should be determined and classified into one of a non-overlapping predefined quality levels. We illustrate our idea by experiments conducted on the extended Yale B face benchmark dataset. Our experimental results indicate that if AQBT is not adopted, false rejection rates becomes very high (always reject) when using low quality face images.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114022084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-27DOI: 10.1109/I-SOCIETY18435.2011.5978544
T. Ayodele, C. Shoniregun, G. Akmayeva
E-learning allows us to learn anywhere, any place and any time as long as there is access to a configured computer system. E-learning can be network-based, intranet-based, internet-based, cd/dvd-based. It can include audio, video, text, animation and virtual environments. However, the increase of e-learning tools by allowing the creation learning environments does create loop holes for security bridges such as: inadequate authentication for online assessments, identity theft, and impersonation. We propose a new framework that can reduce the security risks, and provide an intelligent e-learning preventive mechanism (IEPM) to identify users' pattern of behaviour in order to determine the level of risks and recommend preventive measures.
{"title":"Towards e-learning security: A machine learning approach","authors":"T. Ayodele, C. Shoniregun, G. Akmayeva","doi":"10.1109/I-SOCIETY18435.2011.5978544","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978544","url":null,"abstract":"E-learning allows us to learn anywhere, any place and any time as long as there is access to a configured computer system. E-learning can be network-based, intranet-based, internet-based, cd/dvd-based. It can include audio, video, text, animation and virtual environments. However, the increase of e-learning tools by allowing the creation learning environments does create loop holes for security bridges such as: inadequate authentication for online assessments, identity theft, and impersonation. We propose a new framework that can reduce the security risks, and provide an intelligent e-learning preventive mechanism (IEPM) to identify users' pattern of behaviour in order to determine the level of risks and recommend preventive measures.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133233992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-27DOI: 10.1109/I-SOCIETY18435.2011.5978476
Hanadi Al-Zegaier, Abderrahim Barakat
Corporate knowledge portals are used by organizations for sharing, storing and retrieving knowledge by all its customers, employees, vendors and partners. Corporate knowledge portals allow organizations to become more competitive and innovative. A knowledge portal are constructed through the use of web and internet technology and are accessed to add, retrieve or update knowledge and is done through a web browser using a computer system. This paper discusses the use of mobile portals as a new form of accessing corporate knowledge through the use of the mobile devices.
{"title":"Mobile portals: An extension to corporate knowledge portals","authors":"Hanadi Al-Zegaier, Abderrahim Barakat","doi":"10.1109/I-SOCIETY18435.2011.5978476","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978476","url":null,"abstract":"Corporate knowledge portals are used by organizations for sharing, storing and retrieving knowledge by all its customers, employees, vendors and partners. Corporate knowledge portals allow organizations to become more competitive and innovative. A knowledge portal are constructed through the use of web and internet technology and are accessed to add, retrieve or update knowledge and is done through a web browser using a computer system. This paper discusses the use of mobile portals as a new form of accessing corporate knowledge through the use of the mobile devices.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122480919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-27DOI: 10.1109/I-SOCIETY18435.2011.5978499
John P. T. Moore, Sujan Shrestha
Imagine when you sit on the same train everyday commuting to work. You see the same people. What do you know about these people? Do they move in similar social circles to you? In this paper we describe how technology can be used in evasive ways to obtain information about some people who you come into contact with. We describe how to implement the technology as well as highlight issues of personal privacy.
{"title":"Sliding doors: Random mobile encounters","authors":"John P. T. Moore, Sujan Shrestha","doi":"10.1109/I-SOCIETY18435.2011.5978499","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978499","url":null,"abstract":"Imagine when you sit on the same train everyday commuting to work. You see the same people. What do you know about these people? Do they move in similar social circles to you? In this paper we describe how technology can be used in evasive ways to obtain information about some people who you come into contact with. We describe how to implement the technology as well as highlight issues of personal privacy.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124868564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-27DOI: 10.1109/I-SOCIETY18435.2011.5978530
T. Kirkham, Sandra Winfield, M. Raza, Thorsten Haberecht
Advances in mobile and embedded computing are presenting computing environment that embrace personalisation, mobility and real-time computing. As a result Service Oriented Architectures (SOA) has to adopt new methods of service security, service management and service execution. For the business process these adaptations yield challenges in terms of process modeling, delivery and execution. In order to make Business Process Management (BPM) work in practice in these new environments, what changes are needed in order to support increasingly dynamic and decentralised services in BPM?
{"title":"Business Process Management and the challenge of dynamic services","authors":"T. Kirkham, Sandra Winfield, M. Raza, Thorsten Haberecht","doi":"10.1109/I-SOCIETY18435.2011.5978530","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978530","url":null,"abstract":"Advances in mobile and embedded computing are presenting computing environment that embrace personalisation, mobility and real-time computing. As a result Service Oriented Architectures (SOA) has to adopt new methods of service security, service management and service execution. For the business process these adaptations yield challenges in terms of process modeling, delivery and execution. In order to make Business Process Management (BPM) work in practice in these new environments, what changes are needed in order to support increasingly dynamic and decentralised services in BPM?","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122754268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-27DOI: 10.1109/I-SOCIETY18435.2011.5978535
A. Campi
People shop online, compare online, book hotels and flights online. This happens because the data needed to complete these tasks are easily accessible and a lot of Web sites allows users to query the Web to obtain enough information to be confident. The aim of this work is to propose a framework tailored to extend the internet revolution to public administration. This work is the first step towards an infrastructure allowing people to know in a very easy way the information they need. This paper exploits the Search Computing paradigm. It is a new way for composing data. While state-of-art search systems answer generic or domain-specific queries, Search Computing enables answering questions via a constellation of cooperating data sources, called search services, which are correlated by means of join operations. Search Computing aims at responding to queries over multiple semantic fields of interest; thus, Search Computing fills the gap between generalized search systems, which are unable to find information spanning multiple topics, and domain-specific search systems, which cannot go beyond their domain limits.
{"title":"Exploiting the Search Computing paradigm in e-government","authors":"A. Campi","doi":"10.1109/I-SOCIETY18435.2011.5978535","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978535","url":null,"abstract":"People shop online, compare online, book hotels and flights online. This happens because the data needed to complete these tasks are easily accessible and a lot of Web sites allows users to query the Web to obtain enough information to be confident. The aim of this work is to propose a framework tailored to extend the internet revolution to public administration. This work is the first step towards an infrastructure allowing people to know in a very easy way the information they need. This paper exploits the Search Computing paradigm. It is a new way for composing data. While state-of-art search systems answer generic or domain-specific queries, Search Computing enables answering questions via a constellation of cooperating data sources, called search services, which are correlated by means of join operations. Search Computing aims at responding to queries over multiple semantic fields of interest; thus, Search Computing fills the gap between generalized search systems, which are unable to find information spanning multiple topics, and domain-specific search systems, which cannot go beyond their domain limits.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123629619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-27DOI: 10.1109/I-SOCIETY18435.2011.5978501
F. Olajide, N. Savage
Extraction of user information in the physical memory of Windows application is vital in today's digital investigation. Digital forensic community feels the urge for the development of tools and techniques in volatile memory analysis. However, there have been few investigations into the amount of relevant information that can be recovered from the application memory. In this research, we present the quantitative and qualitative results of experiments carried out on Windows applications. In conducting this research; we have identified the most commonly used applications on Windows systems, designed a methodology to capture data and processed that data. This research report the amount of evidence that was stored over time and recovered in continuous block of evidence in the physical memory.
{"title":"Forensic extraction of user information in continuous block of evidence","authors":"F. Olajide, N. Savage","doi":"10.1109/I-SOCIETY18435.2011.5978501","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978501","url":null,"abstract":"Extraction of user information in the physical memory of Windows application is vital in today's digital investigation. Digital forensic community feels the urge for the development of tools and techniques in volatile memory analysis. However, there have been few investigations into the amount of relevant information that can be recovered from the application memory. In this research, we present the quantitative and qualitative results of experiments carried out on Windows applications. In conducting this research; we have identified the most commonly used applications on Windows systems, designed a methodology to capture data and processed that data. This research report the amount of evidence that was stored over time and recovered in continuous block of evidence in the physical memory.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121079679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-27DOI: 10.1109/I-SOCIETY18435.2011.5978526
S. Srinivas, J. Blustein
Eye-based Human Computer Interaction techniques have thus far been limited to closed environments. However advancement in technology and the advent of mobile computing promises to bring eye-based interaction techniques to wearable and handled mobile devices. This paper investigates recent methods to track eye movements in the mobile environment. Methods were evaluated by comparing the techniques they rely on, type of work, use of theoretical proofs and simulations.
{"title":"A survey report on mobile eye-based Human-Computer Interaction","authors":"S. Srinivas, J. Blustein","doi":"10.1109/I-SOCIETY18435.2011.5978526","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978526","url":null,"abstract":"Eye-based Human Computer Interaction techniques have thus far been limited to closed environments. However advancement in technology and the advent of mobile computing promises to bring eye-based interaction techniques to wearable and handled mobile devices. This paper investigates recent methods to track eye movements in the mobile environment. Methods were evaluated by comparing the techniques they rely on, type of work, use of theoretical proofs and simulations.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121687497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-27DOI: 10.1109/I-SOCIETY18435.2011.5978496
Nuno Teodoro, C. Serrão
The Internet, and in particular the World Wide Web, have become one of the most common communication mediums in the World. Millions of users connect everyday to different web-based applications to search for information, exchange messages, interact with each other, conduct business, pay taxes, perform financial operations and many more. Some of these critical web-based services are targeted by several malicious users intending to exploit possible weaknesses and vulnerabilities, which could cause not only the disruption of the service, but also compromise the users and organizations information. Most of the times, these malicious users succeed in exploiting different types of vulnerabilities and the consequences can be disastrous. Most of these vulnerabilities are directly related with the web-based applications lack of quality as a result from a poorly implemented software development life cycle (SDLC). This paper will discuss the direct implication of the lack of security and the importance of quality on the SDLC, and the major factors that influence them. On the other hand the authors propose a set of security automated tools and methodologies that can be used throughout the SDLC as a mean to improve critical web-based applications security and quality.
{"title":"Web application security: Improving critical web-based applications quality through in-depth security analysis","authors":"Nuno Teodoro, C. Serrão","doi":"10.1109/I-SOCIETY18435.2011.5978496","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978496","url":null,"abstract":"The Internet, and in particular the World Wide Web, have become one of the most common communication mediums in the World. Millions of users connect everyday to different web-based applications to search for information, exchange messages, interact with each other, conduct business, pay taxes, perform financial operations and many more. Some of these critical web-based services are targeted by several malicious users intending to exploit possible weaknesses and vulnerabilities, which could cause not only the disruption of the service, but also compromise the users and organizations information. Most of the times, these malicious users succeed in exploiting different types of vulnerabilities and the consequences can be disastrous. Most of these vulnerabilities are directly related with the web-based applications lack of quality as a result from a poorly implemented software development life cycle (SDLC). This paper will discuss the direct implication of the lack of security and the importance of quality on the SDLC, and the major factors that influence them. On the other hand the authors propose a set of security automated tools and methodologies that can be used throughout the SDLC as a mean to improve critical web-based applications security and quality.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131971272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}