The purpose of this paper is to verify the factors that influence acceptance it in the context of cloud computing systems adoption. This study presents the theoretical factors, which influence the acceptance of new information systems. The first part contains a literature review on Cloud Computing. We describe the Technology Acceptance Model, applied with research hypothesis for an empirical study. The paper presents an empirical study conducted in a user dimension. Many users, professional and personal answered to a questionnaire from various fields. In this study, we concluded that perceived usefulness has a positive impact in the intention of using cloud computer systems, among other conclusions.
{"title":"Adoption of cloud computing systems","authors":"Pedro Pinheiro, M. Aparicio, C. Costa","doi":"10.1145/2618168.2618188","DOIUrl":"https://doi.org/10.1145/2618168.2618188","url":null,"abstract":"The purpose of this paper is to verify the factors that influence acceptance it in the context of cloud computing systems adoption. This study presents the theoretical factors, which influence the acceptance of new information systems. The first part contains a literature review on Cloud Computing. We describe the Technology Acceptance Model, applied with research hypothesis for an empirical study. The paper presents an empirical study conducted in a user dimension. Many users, professional and personal answered to a questionnaire from various fields. In this study, we concluded that perceived usefulness has a positive impact in the intention of using cloud computer systems, among other conclusions.","PeriodicalId":192346,"journal":{"name":"International Conference on Information Systems and Design of Communication","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128978111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Massive open online courses (MOOCs) are black swans. A black swan is an unexpected event that emerges from reality and alters the reality itself. MOOCs have affected supply and demand in higher education. MOOCs distribute knowledge, classes on many areas of expertise for free. Millions of users, from all over the world are enrolling MOOCs courses. Universities are sharing resources and knowledge in the Internet no matter who or why. This paradigm shift has an impact on people's life. So, how can universities survive if they are giving knowledge for free? This paper presents a literature review on MOOCs. We also modulate this reality to minimize the jeopardy and maximize the good opportunities that MOOCs bring.
{"title":"MOOC's business models: turning black swans into gray swans","authors":"M. Aparicio, F. Bação, T. Oliveira","doi":"10.1145/2618168.2618175","DOIUrl":"https://doi.org/10.1145/2618168.2618175","url":null,"abstract":"Massive open online courses (MOOCs) are black swans. A black swan is an unexpected event that emerges from reality and alters the reality itself. MOOCs have affected supply and demand in higher education. MOOCs distribute knowledge, classes on many areas of expertise for free. Millions of users, from all over the world are enrolling MOOCs courses. Universities are sharing resources and knowledge in the Internet no matter who or why. This paradigm shift has an impact on people's life. So, how can universities survive if they are giving knowledge for free? This paper presents a literature review on MOOCs. We also modulate this reality to minimize the jeopardy and maximize the good opportunities that MOOCs bring.","PeriodicalId":192346,"journal":{"name":"International Conference on Information Systems and Design of Communication","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127904673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Presentations by local technical writers have shown a surprising diversity of writing and content governance scenarios on mature software companies. Mature companies have unique business problems that require unique technical and human solutions. On Altitude Software, writers struggle to control the complexity created by the organic growth of a mature software suite. As a response, feature-based documentation was rewritten in 2003 as task-based documentation, and is being rewritten again since 2010 into custom topic patterns. Over time, Altitude Software learned to hire and train highly technical writers. Technical writers in Altitude Software became professional learners that must learn specific writing techniques, become experts in the product, and approach the background expertise of specific user audiences.
{"title":"20 years of technical writing at altitude software","authors":"J. Baptista","doi":"10.1145/2618168.2618197","DOIUrl":"https://doi.org/10.1145/2618168.2618197","url":null,"abstract":"Presentations by local technical writers have shown a surprising diversity of writing and content governance scenarios on mature software companies. Mature companies have unique business problems that require unique technical and human solutions.\u0000 On Altitude Software, writers struggle to control the complexity created by the organic growth of a mature software suite. As a response, feature-based documentation was rewritten in 2003 as task-based documentation, and is being rewritten again since 2010 into custom topic patterns.\u0000 Over time, Altitude Software learned to hire and train highly technical writers. Technical writers in Altitude Software became professional learners that must learn specific writing techniques, become experts in the product, and approach the background expertise of specific user audiences.","PeriodicalId":192346,"journal":{"name":"International Conference on Information Systems and Design of Communication","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132041732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adapting technological environments to users is a concern since Mark Weiser launched the concept of ubiquitous computing and, in order to do that, is necessary to understand users' characteristics. In this context, the purpose of this paper is to present a study about students' mobility habits within a university campus, having the intention of getting insights towards the best place to set an interactive public display and of predicting the main characteristics of the audience that will be present on that spot in forthcoming periods. Thus, the envisioned results of this work will allow the adaptation of the contents exhibited on the device to the audience. To perform the study, a set of logs of accesses to the university's Wi-Fi was used, data mining techniques were implemented and forecasting models were built, using the line of work suggested by the CRISP-DM methodology. As result, students profile were built based on past wireless accesses and on their scholar schedules, and three time series models were used (Holt-Winters, Seasonal Naive and Simple Exponential Smoothing) to predict the presence of students on the envisioned spot in future periods.
{"title":"Understanding students' mobility habits towards the implementation of an adaptive ubiquitous platform","authors":"J. Casal, Maria Guillermina Cledou","doi":"10.1145/2618168.2618179","DOIUrl":"https://doi.org/10.1145/2618168.2618179","url":null,"abstract":"Adapting technological environments to users is a concern since Mark Weiser launched the concept of ubiquitous computing and, in order to do that, is necessary to understand users' characteristics. In this context, the purpose of this paper is to present a study about students' mobility habits within a university campus, having the intention of getting insights towards the best place to set an interactive public display and of predicting the main characteristics of the audience that will be present on that spot in forthcoming periods. Thus, the envisioned results of this work will allow the adaptation of the contents exhibited on the device to the audience. To perform the study, a set of logs of accesses to the university's Wi-Fi was used, data mining techniques were implemented and forecasting models were built, using the line of work suggested by the CRISP-DM methodology. As result, students profile were built based on past wireless accesses and on their scholar schedules, and three time series models were used (Holt-Winters, Seasonal Naive and Simple Exponential Smoothing) to predict the presence of students on the envisioned spot in future periods.","PeriodicalId":192346,"journal":{"name":"International Conference on Information Systems and Design of Communication","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130696050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hugo Barrigas, Daniel Barrigas, M. Barata, P. Furtado, Jorge Bernardino
Scalability is essential for web applications with massive numbers of users. The high growth rates observed in web based systems having hundreds of thousands of users accessing it continuously led to major response time problems for users who are trying to receive information at the same time. As more and more users access a web site, one needs to know how the performance varies. The main challenge Facebook engineer's face, despite receiving billions of users on a daily basis, is keeping the website online and functional. The current architecture of Facebook is very large and consists of many technologies and thousands of servers. In this paper Facebook's architecture and how it handles scalability issues is going to be described, helping to have a better understanding of how Facebook actually works.
{"title":"Overview of Facebook scalable architecture","authors":"Hugo Barrigas, Daniel Barrigas, M. Barata, P. Furtado, Jorge Bernardino","doi":"10.1145/2618168.2618198","DOIUrl":"https://doi.org/10.1145/2618168.2618198","url":null,"abstract":"Scalability is essential for web applications with massive numbers of users. The high growth rates observed in web based systems having hundreds of thousands of users accessing it continuously led to major response time problems for users who are trying to receive information at the same time. As more and more users access a web site, one needs to know how the performance varies. The main challenge Facebook engineer's face, despite receiving billions of users on a daily basis, is keeping the website online and functional. The current architecture of Facebook is very large and consists of many technologies and thousands of servers. In this paper Facebook's architecture and how it handles scalability issues is going to be described, helping to have a better understanding of how Facebook actually works.","PeriodicalId":192346,"journal":{"name":"International Conference on Information Systems and Design of Communication","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131234932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Training and user documentation aim at people being able to use IT when returning from training. Such transfer is in general difficult to achieve. Based on a model of IT use learning, two types of diagrams in documentation were compared in a field study; instructions showing the sequence of how to carry out an operation by means of screen shots and structural models showing data structures without user interface elements. Instructions were in general favoured. Even if the instructions only to a small extent were presented with projector during training, the trainees stated that they learnt a lot from these presentations. The learning outcome might have been the existence of an operation and where in the software to locate it. While primarily intended as help for understanding data structures, the trainees also used structural models as guides for carrying out operations. Instructions in particular, but also structural models were utilised by the trainees after the training sessions, hence helping transfer. Trainers should include both types of models in courses.
{"title":"Suitability of diagrams for IT user learning","authors":"J. Kaasbøll","doi":"10.1145/2618168.2618177","DOIUrl":"https://doi.org/10.1145/2618168.2618177","url":null,"abstract":"Training and user documentation aim at people being able to use IT when returning from training. Such transfer is in general difficult to achieve. Based on a model of IT use learning, two types of diagrams in documentation were compared in a field study; instructions showing the sequence of how to carry out an operation by means of screen shots and structural models showing data structures without user interface elements. Instructions were in general favoured. Even if the instructions only to a small extent were presented with projector during training, the trainees stated that they learnt a lot from these presentations. The learning outcome might have been the existence of an operation and where in the software to locate it. While primarily intended as help for understanding data structures, the trainees also used structural models as guides for carrying out operations. Instructions in particular, but also structural models were utilised by the trainees after the training sessions, hence helping transfer. Trainers should include both types of models in courses.","PeriodicalId":192346,"journal":{"name":"International Conference on Information Systems and Design of Communication","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124862050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The development of the new software game gave emphasis and importance to the role played by the user discussion group during the development phase; they were sometimes called upon to participate in testing and they contributed to changes that improved the overall software's. Some more concrete methods include discussion groups to stimulate the emergence of new ideas and evaluate the gamification concepts. According to this approach, the web designers of two gamification software projects in e-banking using Mutual Funds and Warrants were encouraged to build the first playable version of the gamified business software. After a live introduction to a group of users, it was requested their opinion in an open questionnaire with six questions, permitting them to identify without restrictions the needs, modifications and opinions. The method has identified a wide range of games characteristics and web design changes, as was expected by both business and customers. In conclusion, the use of the discussion group and open questionnaires were effective methods for the project team, to check preview the perceptions and customer acceptance in adopting the software gamified. In this study, we identified the users' perceptions, resumed in a diagram "the most relevant factors in an e-business game". Our practical contribution is for the web designers and project managers who with this methodology, may check if their software will have good adoption.
{"title":"Gamification: the using of user discussion groups in the software development in e-banking","authors":"L. Rodrigues, C. Costa, Abílio Oliveira","doi":"10.1145/2618168.2618173","DOIUrl":"https://doi.org/10.1145/2618168.2618173","url":null,"abstract":"The development of the new software game gave emphasis and importance to the role played by the user discussion group during the development phase; they were sometimes called upon to participate in testing and they contributed to changes that improved the overall software's. Some more concrete methods include discussion groups to stimulate the emergence of new ideas and evaluate the gamification concepts. According to this approach, the web designers of two gamification software projects in e-banking using Mutual Funds and Warrants were encouraged to build the first playable version of the gamified business software. After a live introduction to a group of users, it was requested their opinion in an open questionnaire with six questions, permitting them to identify without restrictions the needs, modifications and opinions. The method has identified a wide range of games characteristics and web design changes, as was expected by both business and customers. In conclusion, the use of the discussion group and open questionnaires were effective methods for the project team, to check preview the perceptions and customer acceptance in adopting the software gamified. In this study, we identified the users' perceptions, resumed in a diagram \"the most relevant factors in an e-business game\". Our practical contribution is for the web designers and project managers who with this methodology, may check if their software will have good adoption.","PeriodicalId":192346,"journal":{"name":"International Conference on Information Systems and Design of Communication","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129547615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An accountable set of dynamic changes are happening on day to day basis in the software industry. So the change is the inevitable and heart of the software industry. Although many software processes and models, tools, standards exist and practices are set, still the industry is facing huge challenge in the design, build and reuse of software components, thereby facing an issue in delivering an effective software product of high quality within a short time meeting customer expectations. Eventually, there is a critical need to throw a light in the direction of understanding related software components and methods to identify similar components so that the components of similar nature may be clustered as a single group. In this paper we propose a novel similarity measure by modifying the Gaussian function. The similarity measure designed is used to cluster the text documents and may be extended to cluster software components and program codes. The similarity measure is efficient as it covers the two sides of the term-axes.
{"title":"A modified Gaussian similarity measure for clustering software components and documents","authors":"V. Radhakrishna, C. Srinivas, C. V. Rao","doi":"10.1145/2618168.2618184","DOIUrl":"https://doi.org/10.1145/2618168.2618184","url":null,"abstract":"An accountable set of dynamic changes are happening on day to day basis in the software industry. So the change is the inevitable and heart of the software industry. Although many software processes and models, tools, standards exist and practices are set, still the industry is facing huge challenge in the design, build and reuse of software components, thereby facing an issue in delivering an effective software product of high quality within a short time meeting customer expectations. Eventually, there is a critical need to throw a light in the direction of understanding related software components and methods to identify similar components so that the components of similar nature may be clustered as a single group. In this paper we propose a novel similarity measure by modifying the Gaussian function. The similarity measure designed is used to cluster the text documents and may be extended to cluster software components and program codes. The similarity measure is efficient as it covers the two sides of the term-axes.","PeriodicalId":192346,"journal":{"name":"International Conference on Information Systems and Design of Communication","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122299907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently, geocast routing has been intensively investigated for reliable and efficient dissemination of information. This can be attributed to the fact that in Vehicular Adhoc Networks (VANETs), group of vehicles moving on road always shares geographical region and most of the Intelligent Transport Systems (ITS) applications require sending information to all vehicles belonging to a given geographical region. Various techniques have been used for geocasting such as peripheral node based Next Hop Vehicle (NHV) selection, voronoi diagram based NHV selection, cache agent based NHV selection etc. These techniques have shown limited performance due dynamic characteristics of VANETs. In this paper, we have proposed Geocasting through Particle Swarm Optimization (GeoPSO) protocol. GeoPSO selects NHV by using Particle Swarm Optimization (PSO) technique. The empirical results show that GeoPSO outperforms tradition techniques in terms of packet deliver and network load.
{"title":"Geocasting in vehicular adhoc networks using particle swarm optimization","authors":"Omprakash Kaiwartya, Sushil Kumar","doi":"10.1145/2618168.2618178","DOIUrl":"https://doi.org/10.1145/2618168.2618178","url":null,"abstract":"Recently, geocast routing has been intensively investigated for reliable and efficient dissemination of information. This can be attributed to the fact that in Vehicular Adhoc Networks (VANETs), group of vehicles moving on road always shares geographical region and most of the Intelligent Transport Systems (ITS) applications require sending information to all vehicles belonging to a given geographical region. Various techniques have been used for geocasting such as peripheral node based Next Hop Vehicle (NHV) selection, voronoi diagram based NHV selection, cache agent based NHV selection etc. These techniques have shown limited performance due dynamic characteristics of VANETs. In this paper, we have proposed Geocasting through Particle Swarm Optimization (GeoPSO) protocol. GeoPSO selects NHV by using Particle Swarm Optimization (PSO) technique. The empirical results show that GeoPSO outperforms tradition techniques in terms of packet deliver and network load.","PeriodicalId":192346,"journal":{"name":"International Conference on Information Systems and Design of Communication","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122637505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gaspar Brogueira, Fernando Batista, Joao Paulo Carvalho, Helena Moniz
This paper describes an existing database of geolocated tweets that were produced in Portuguese regions. The existing database was collected during eight consecutive days and contains about 307K tweets, produced by about 11K different users. A detailed analysis on the content of the messages suggests a predominance of teenagers and young adult authors that use Twitter as a way to communicate their feelings, ideas and comments to their colleagues. An overview of the dataset suggests that tweets have a very personal content, often describing family bonds and school activities and concerns. This is a suitable source of information for a number of tasks, including sociolinguistic studies, sentiment analysis, among others.
{"title":"Portuguese geolocated tweets: an overview","authors":"Gaspar Brogueira, Fernando Batista, Joao Paulo Carvalho, Helena Moniz","doi":"10.1145/2618168.2618200","DOIUrl":"https://doi.org/10.1145/2618168.2618200","url":null,"abstract":"This paper describes an existing database of geolocated tweets that were produced in Portuguese regions. The existing database was collected during eight consecutive days and contains about 307K tweets, produced by about 11K different users. A detailed analysis on the content of the messages suggests a predominance of teenagers and young adult authors that use Twitter as a way to communicate their feelings, ideas and comments to their colleagues. An overview of the dataset suggests that tweets have a very personal content, often describing family bonds and school activities and concerns. This is a suitable source of information for a number of tasks, including sociolinguistic studies, sentiment analysis, among others.","PeriodicalId":192346,"journal":{"name":"International Conference on Information Systems and Design of Communication","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122132901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}