Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439414
P. Catherwood, D. Finlay, J. Mclaughlin
This paper presents a SWOT analysis for the emerging and futuristic field of non-medical body-implantable devices. This area will begin to materialize as one of the next big themes in future personal computing and offers huge rewards to society if implemented correctly. The technology boasts many strengths which are applicable to a variety markets including entertainment, social networking, personal safety, security, consumerism, communications, healthcare, convenience and human body enhancement. Such subcutaneous sensor technology releases citizens from the multitude of portable computing devices, keys, wallets, passes, etc. However, the technology would be a target for hackers and would likely result in more violent robberies and forceful ID removal. Additionally, adverse health effects, device and battery safety and reliability, and co-existence with medically prescribed implants are issues developers must solve before the technology could excel. External emerging technologies such as Cloud computing, IoT, and NFC support development and potential success of implantable systems and combines to help address issues of personal safety, terrorism, people tracking and identification, e-payments, and long-term fitness profiling. Threats to the technology's uptake include societal fears on such aspects as adverse health effects, dehumanisation, breaches of human rights, conservatism, social privacy, and religious objections. With this technology potentially beginning to enter the mainstream in the next 5-10 years considerable effort is required to develop legislation, policies, procedures, device and network security, and convince the general public this technology is the next logical step in personal computing.
{"title":"Subcutaneous body area networks: A SWOT analysis","authors":"P. Catherwood, D. Finlay, J. Mclaughlin","doi":"10.1109/ISTAS.2015.7439414","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439414","url":null,"abstract":"This paper presents a SWOT analysis for the emerging and futuristic field of non-medical body-implantable devices. This area will begin to materialize as one of the next big themes in future personal computing and offers huge rewards to society if implemented correctly. The technology boasts many strengths which are applicable to a variety markets including entertainment, social networking, personal safety, security, consumerism, communications, healthcare, convenience and human body enhancement. Such subcutaneous sensor technology releases citizens from the multitude of portable computing devices, keys, wallets, passes, etc. However, the technology would be a target for hackers and would likely result in more violent robberies and forceful ID removal. Additionally, adverse health effects, device and battery safety and reliability, and co-existence with medically prescribed implants are issues developers must solve before the technology could excel. External emerging technologies such as Cloud computing, IoT, and NFC support development and potential success of implantable systems and combines to help address issues of personal safety, terrorism, people tracking and identification, e-payments, and long-term fitness profiling. Threats to the technology's uptake include societal fears on such aspects as adverse health effects, dehumanisation, breaches of human rights, conservatism, social privacy, and religious objections. With this technology potentially beginning to enter the mainstream in the next 5-10 years considerable effort is required to develop legislation, policies, procedures, device and network security, and convince the general public this technology is the next logical step in personal computing.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132476168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439422
T. Geumpana, F. Rabhi, John Lewis, P. Ray, Liming Zhu
The advancement of mobile cloud computing (MCC) has the potential to improve communication and information during disaster emergency operation. Many studies from different countries have addressed different approaches to implement mobile cloud technologies during disaster operation. However, there has been a lack of any consolidated evidence-based study to evaluate the MCC from the dual perspectives of disaster emergency situation and technology. In this paper, we provide an extensive study of mobile cloud computing research as a critical system or application based on the latest literature published from 2010 to 2015, and highlights the specific challenges in implementing mobile cloud computing in disaster emergency operation. A systematic literature review was conducted over 4 prominent journals of computer science engineering (IEEE, ACM, ProQuest, Inspec/Elsevier) and the findings were classified into four key challenges of MCC implementation during disaster emergency operation. We present a taxonomy based on the key challenges in this area, and discuss the different solutions taken to solve the challenges. We conclude the paper with a critical analysis of the challenges that have not been solved, and highlight directions for future work.
{"title":"Mobile cloud computing for disaster emergency operation: A systematic review","authors":"T. Geumpana, F. Rabhi, John Lewis, P. Ray, Liming Zhu","doi":"10.1109/ISTAS.2015.7439422","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439422","url":null,"abstract":"The advancement of mobile cloud computing (MCC) has the potential to improve communication and information during disaster emergency operation. Many studies from different countries have addressed different approaches to implement mobile cloud technologies during disaster operation. However, there has been a lack of any consolidated evidence-based study to evaluate the MCC from the dual perspectives of disaster emergency situation and technology. In this paper, we provide an extensive study of mobile cloud computing research as a critical system or application based on the latest literature published from 2010 to 2015, and highlights the specific challenges in implementing mobile cloud computing in disaster emergency operation. A systematic literature review was conducted over 4 prominent journals of computer science engineering (IEEE, ACM, ProQuest, Inspec/Elsevier) and the findings were classified into four key challenges of MCC implementation during disaster emergency operation. We present a taxonomy based on the key challenges in this area, and discuss the different solutions taken to solve the challenges. We conclude the paper with a critical analysis of the challenges that have not been solved, and highlight directions for future work.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133175654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439445
L. Robertson, K. Michael, Albert Munoz Aneiros
Individuals requiring goods and services essential to their mode of living, are increasingly vulnerable to failures of the complex, interlinked, and inhomogeneous technological systems that supply those needs. Extant analysis techniques do not adequately quantify, from an end-user's perspective, the vulnerability that is contributed by such technological systems. This study explores the significance of inherent weaknesses of inhomogeneous technological systems and proposes an approach for measuring vulnerability as the individual end-user `exposure level' for each service. The measure of "exposure" that is developed, is mapped directly from the configuration of a technological system. This measure of exposure allows quantitative evaluation of existing configurations and proposed improvements to a technological system. The measure can therefore be used to determine which systems currently contribute most exposure to each individual, to identify the causes of that exposure, and to rank mitigation projects' effectiveness.
{"title":"Supply system's technology configuration as a contributor to end-user vulnerability","authors":"L. Robertson, K. Michael, Albert Munoz Aneiros","doi":"10.1109/ISTAS.2015.7439445","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439445","url":null,"abstract":"Individuals requiring goods and services essential to their mode of living, are increasingly vulnerable to failures of the complex, interlinked, and inhomogeneous technological systems that supply those needs. Extant analysis techniques do not adequately quantify, from an end-user's perspective, the vulnerability that is contributed by such technological systems. This study explores the significance of inherent weaknesses of inhomogeneous technological systems and proposes an approach for measuring vulnerability as the individual end-user `exposure level' for each service. The measure of \"exposure\" that is developed, is mapped directly from the configuration of a technological system. This measure of exposure allows quantitative evaluation of existing configurations and proposed improvements to a technological system. The measure can therefore be used to determine which systems currently contribute most exposure to each individual, to identify the causes of that exposure, and to rank mitigation projects' effectiveness.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"268 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133848165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439408
J. Achora, H. Sseguya
This paper examines how Information Communication Technologies (ICTs) are used in the Conservation Agriculture (CA) knowledge pathways. It discusses the parallel knowledge pathways smallholder farmers' use to access conservation agriculture information. The objective of this study is to develop an effective dissemination model that exploits the use of ICTs in existing pathways in order to improve Conservation Agriculture knowledge flows. Design, Methodology and Approach: A total of one hundred and twenty-five respondents were interviewed, with a purposively selected sample of 110 CA farmers interviewed using semi-structured questionnaires. Using the snowball method, 15 key informant interviews were conducted with Policy makers and ICT service providers. 69% of the respondents were female and 51% male. The focus of the study was on the different ICTs used in the CA knowledge pathways, the dissemination pathways, institutional and socio-economic factors. Data was analyzed manually and using SSPS ver. 21. Preliminary findings indicate that a variety of knowledge pathways exist through which farmers can access CA knowledge. Four different kinds of ICT led models were identified, Government ICT led models, Government-NGO led models, Government-NGO-Private Sector ICT led model and NGO ICT led models. However the study notes a lack of harmonization and weak linkages between institutions in the utilization of the existing ICT models, utilization of the ICTs access and ownership at the household level and harmonization of the CA messages. Furthermore, even though there was 100% mobile phones ownership, 94% radio, 64% television, 10% Laptop and 9% Computer (desktop) access and ownership among the respondents, farmers and a large number of the extension staff lacked the skills to fully exploit the use of these tools to access CA knowledge. Implication: New emerging and existing communication technologies have a very high potential to improve agricultural knowledge flows if taken advantage of by the "change agents" in the diffusion process of new innovations. New online technologies known as Web 2.0 and `social media' are slowly emerging as platforms for collaboration, sharing of product and market information. Open chain models of village information centres also provide numerous economic opportunities, and do also network communities while providing public/private services. The opportunity of using real time communication tools has been greatly embraced especially by the youthful farmers and the advantage of these new emerging tools is their unique attributes, similar to the traditional oral cultures of communication seen in the African social systems where one can see, hold a discussion, get immediate feedback and use the written media to convey messages. The high percentage of ownership and accessibility of ICTs among the survey population also offers the potential to fully exploit ICTs in the improvement of the CA knowledge pathways and agricultural inf
{"title":"ICT supported extension services in conservation agriculture information access for small holder farmers in Laikipia County, Kenya","authors":"J. Achora, H. Sseguya","doi":"10.1109/ISTAS.2015.7439408","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439408","url":null,"abstract":"This paper examines how Information Communication Technologies (ICTs) are used in the Conservation Agriculture (CA) knowledge pathways. It discusses the parallel knowledge pathways smallholder farmers' use to access conservation agriculture information. The objective of this study is to develop an effective dissemination model that exploits the use of ICTs in existing pathways in order to improve Conservation Agriculture knowledge flows. Design, Methodology and Approach: A total of one hundred and twenty-five respondents were interviewed, with a purposively selected sample of 110 CA farmers interviewed using semi-structured questionnaires. Using the snowball method, 15 key informant interviews were conducted with Policy makers and ICT service providers. 69% of the respondents were female and 51% male. The focus of the study was on the different ICTs used in the CA knowledge pathways, the dissemination pathways, institutional and socio-economic factors. Data was analyzed manually and using SSPS ver. 21. Preliminary findings indicate that a variety of knowledge pathways exist through which farmers can access CA knowledge. Four different kinds of ICT led models were identified, Government ICT led models, Government-NGO led models, Government-NGO-Private Sector ICT led model and NGO ICT led models. However the study notes a lack of harmonization and weak linkages between institutions in the utilization of the existing ICT models, utilization of the ICTs access and ownership at the household level and harmonization of the CA messages. Furthermore, even though there was 100% mobile phones ownership, 94% radio, 64% television, 10% Laptop and 9% Computer (desktop) access and ownership among the respondents, farmers and a large number of the extension staff lacked the skills to fully exploit the use of these tools to access CA knowledge. Implication: New emerging and existing communication technologies have a very high potential to improve agricultural knowledge flows if taken advantage of by the \"change agents\" in the diffusion process of new innovations. New online technologies known as Web 2.0 and `social media' are slowly emerging as platforms for collaboration, sharing of product and market information. Open chain models of village information centres also provide numerous economic opportunities, and do also network communities while providing public/private services. The opportunity of using real time communication tools has been greatly embraced especially by the youthful farmers and the advantage of these new emerging tools is their unique attributes, similar to the traditional oral cultures of communication seen in the African social systems where one can see, hold a discussion, get immediate feedback and use the written media to convey messages. The high percentage of ownership and accessibility of ICTs among the survey population also offers the potential to fully exploit ICTs in the improvement of the CA knowledge pathways and agricultural inf","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127751532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439415
Rossouw de Bruin, S. V. Solms
The purpose of this paper is to introduce a model - the Cyber Security Governance Maturity model - that aims to determine the general Cyber Security maturity of n organization. The model is made up of a number of constituent maturity models which together aims at determining the overall Cyber Security Governance maturity. The end result of this model is a "Cyber Security Governance Maturity dashboard", which will provide a summary of the maturity assessments that each of the constituent maturity models have performed. In doing so, executive management of an organization can have both a summarized as well as a detailed indication of their Cyber Security Governance maturity.
{"title":"Modelling Cyber Security Governance Maturity","authors":"Rossouw de Bruin, S. V. Solms","doi":"10.1109/ISTAS.2015.7439415","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439415","url":null,"abstract":"The purpose of this paper is to introduce a model - the Cyber Security Governance Maturity model - that aims to determine the general Cyber Security maturity of n organization. The model is made up of a number of constituent maturity models which together aims at determining the overall Cyber Security Governance maturity. The end result of this model is a \"Cyber Security Governance Maturity dashboard\", which will provide a summary of the maturity assessments that each of the constituent maturity models have performed. In doing so, executive management of an organization can have both a summarized as well as a detailed indication of their Cyber Security Governance maturity.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127777911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439429
Ivan Ganchev, Zhanlin Ji, M. O'Droma
This paper reports on the development of a novel cloud-based next generation networking (NGN) system prototype, built on the revolutionary concept for the realisation of the next phase of a NGN-based consumer-oriented wireless networking, founded on the key attributes of the Ubiquitous Consumer Wireless World (UCWW). Design aspects and potential societal impact are presented.
{"title":"Making the UCWW a reality","authors":"Ivan Ganchev, Zhanlin Ji, M. O'Droma","doi":"10.1109/ISTAS.2015.7439429","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439429","url":null,"abstract":"This paper reports on the development of a novel cloud-based next generation networking (NGN) system prototype, built on the revolutionary concept for the realisation of the next phase of a NGN-based consumer-oriented wireless networking, founded on the key attributes of the Ubiquitous Consumer Wireless World (UCWW). Design aspects and potential societal impact are presented.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"382 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133432205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439440
Shejin Thavalengal, P. Corcoran
This article outlines various technical, social and ethical challenges in implementing and widely adopting iris recognition technology on consumer devices such as smartphone or tablets. Acquisition of sufficient quality iris images using today's consumer devices is noted to be the main challenge in implementing this technology. Current progress in this field is reviewed. A smartphone form factor camera is presented to be used as a front-facing camera. This device is modified to capture near infra-red iris images along with general purpose visible wavelength images. Analyses shows that such a device with improved optics and sensor could be used for implementing iris recognition in next generation hand held devices. The social impact of wider adoption of this technology is discussed. Iris pattern obfuscation is presented to address various security and privacy concerns which may arise when iris recognition will be a part of our daily life.
{"title":"Iris recognition on consumer devices — Challenges and progress","authors":"Shejin Thavalengal, P. Corcoran","doi":"10.1109/ISTAS.2015.7439440","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439440","url":null,"abstract":"This article outlines various technical, social and ethical challenges in implementing and widely adopting iris recognition technology on consumer devices such as smartphone or tablets. Acquisition of sufficient quality iris images using today's consumer devices is noted to be the main challenge in implementing this technology. Current progress in this field is reviewed. A smartphone form factor camera is presented to be used as a front-facing camera. This device is modified to capture near infra-red iris images along with general purpose visible wavelength images. Analyses shows that such a device with improved optics and sensor could be used for implementing iris recognition in next generation hand held devices. The social impact of wider adoption of this technology is discussed. Iris pattern obfuscation is presented to address various security and privacy concerns which may arise when iris recognition will be a part of our daily life.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133947723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439421
Maija Poikela, Robert Schmidt, I. Wechsung, S. Möller
Location-based mobile tools provide effective means for mobile participation, allowing better targeting of users and faster opinion gathering for municipalities and organizations. For participation purposes it is essential to reach the users as widely as possible, and for this, smartphones with ever-increasing adoption rates offer an optimal tool. However, privacy concerns might prevent the use of location-based applications, which results in a bias in opinion-gathering. In this paper, we present results of a field study tackling the issue of how privacy concern affects the adoption and use of a location-based mobile participation application, and what motivates the use of such applications. We find that users have varying motivations for participating in location-based polls, and that these motivations depend on the type of the poll in question. We show that privacy concerned users are less likely to be motivated by a monetary benefit, but rather by the importance of the topic, and that the intrinsic motivators that drive the privacy concerned users differ from those that drive the unconcerned. Finally, we show that, based on our study, it seems that privacy concern might be an inhibiting factor in adoption of a location-based mobile participation application.
{"title":"\"About your smartphone usage\" — Privacy in location-based mobile participation","authors":"Maija Poikela, Robert Schmidt, I. Wechsung, S. Möller","doi":"10.1109/ISTAS.2015.7439421","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439421","url":null,"abstract":"Location-based mobile tools provide effective means for mobile participation, allowing better targeting of users and faster opinion gathering for municipalities and organizations. For participation purposes it is essential to reach the users as widely as possible, and for this, smartphones with ever-increasing adoption rates offer an optimal tool. However, privacy concerns might prevent the use of location-based applications, which results in a bias in opinion-gathering. In this paper, we present results of a field study tackling the issue of how privacy concern affects the adoption and use of a location-based mobile participation application, and what motivates the use of such applications. We find that users have varying motivations for participating in location-based polls, and that these motivations depend on the type of the poll in question. We show that privacy concerned users are less likely to be motivated by a monetary benefit, but rather by the importance of the topic, and that the intrinsic motivators that drive the privacy concerned users differ from those that drive the unconcerned. Finally, we show that, based on our study, it seems that privacy concern might be an inhibiting factor in adoption of a location-based mobile participation application.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129744498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439447
P. Cunningham
Innovation and ICT entrepreneurship are slowly being recognised as important enablers of socio-economic growth and realising national strategic goals in African Member States. However, the level of practical skills capacity, indigenous entrepreneurial expertise and policy support to take full advantage of this at national level varies considerably. This research study focused on identifying factors impacting on the current level of open innovation and ICT entrepreneurship in Africa. It was informed by a semi-structured, moderated focus group which captured the perspectives of senior public and education and research stakeholders from eight African Member States. The results highlighted six main factors: (a) level of political will reflected by resource prioritisation; (b) alignment with national development plans and associated funding priorities; (c) level of understanding of strategic benefits by ministers and senior civil servants; (d) level of awareness and sensitization of the general public, (e) availability of national innovation and entrepreneurial expertise; and (f) willingness and capacity to cooperate with other stakeholders to achieve common goals. Future research will capture perspectives from the private, societal and international donor sectors, and create and validate potential models/methodologies to address the challenges and opportunities identified in this study.
{"title":"Insights into open innovation and ICT entrepreneurship in Africa","authors":"P. Cunningham","doi":"10.1109/ISTAS.2015.7439447","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439447","url":null,"abstract":"Innovation and ICT entrepreneurship are slowly being recognised as important enablers of socio-economic growth and realising national strategic goals in African Member States. However, the level of practical skills capacity, indigenous entrepreneurial expertise and policy support to take full advantage of this at national level varies considerably. This research study focused on identifying factors impacting on the current level of open innovation and ICT entrepreneurship in Africa. It was informed by a semi-structured, moderated focus group which captured the perspectives of senior public and education and research stakeholders from eight African Member States. The results highlighted six main factors: (a) level of political will reflected by resource prioritisation; (b) alignment with national development plans and associated funding priorities; (c) level of understanding of strategic benefits by ministers and senior civil servants; (d) level of awareness and sensitization of the general public, (e) availability of national innovation and entrepreneurial expertise; and (f) willingness and capacity to cooperate with other stakeholders to achieve common goals. Future research will capture perspectives from the private, societal and international donor sectors, and create and validate potential models/methodologies to address the challenges and opportunities identified in this study.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"46 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126005596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439407
Hanen Jemal, Zied Kechaou, Mounir Ben Ayed, A. Alimi
Nowadays the emergence of mobile devises and Cloud Computing can change the culture of healthcare from direct care services into Mobile Cloud computing (MCC) services. For that, the application targeted at mobile devices becoming copious with others systems in healthcare sector. Consequently, we assume that this technology have a potential effect in healthcare domain. MCC offers new kinds of services and facilities medical tasks. In this regard, we have tried to propose a new mobile medical web service system. The proposed system called Medical Mobile Cloud Multi Agent System (2MCMAS) is a hybrid system which integrates MCC and Multi Agent System in healthcare in order to make efficiency care.
如今,移动设备和云计算的出现可以将医疗保健文化从直接护理服务转变为移动云计算(MCC)服务。因此,针对移动设备的应用程序与医疗保健领域的其他系统一起变得丰富。因此,我们假设该技术在医疗保健领域具有潜在的影响。世纪挑战集团提供新型的医疗服务和设施。对此,我们尝试提出了一种新的移动医疗web服务系统。本文提出的医疗移动云多代理系统(Medical Mobile Cloud Multi Agent system, 2MCMAS)是将医疗移动云多代理系统与医疗移动云多代理系统相结合,实现高效医疗的混合系统。
{"title":"Cloud computing and mobile devices based system for healthcare application","authors":"Hanen Jemal, Zied Kechaou, Mounir Ben Ayed, A. Alimi","doi":"10.1109/ISTAS.2015.7439407","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439407","url":null,"abstract":"Nowadays the emergence of mobile devises and Cloud Computing can change the culture of healthcare from direct care services into Mobile Cloud computing (MCC) services. For that, the application targeted at mobile devices becoming copious with others systems in healthcare sector. Consequently, we assume that this technology have a potential effect in healthcare domain. MCC offers new kinds of services and facilities medical tasks. In this regard, we have tried to propose a new mobile medical web service system. The proposed system called Medical Mobile Cloud Multi Agent System (2MCMAS) is a hybrid system which integrates MCC and Multi Agent System in healthcare in order to make efficiency care.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124707477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}