Search results for "Computer Networks"

showing 10 items of 860 documents

Diffusion of theories and theoretical models in the Ibero‐American research on information behavior

2021

Ibero-American research on information behavior (IB) lacks the visibility typical of other parts of the world, and little is known about it in countries outside the area. The objective of this paper has therefore been to analyze the way in which Ibero-American research incorporates various theoretical references to empirical research on IB. The results point to the existence of different focuses of research in the past 10 years, in the sense of a reduced empirical approach and a moderate to minimal use of theories in the design of such research. Furthermore, the most cited theories and models of IB at an international level are those most widely applied in this geographical area, and the us…

Information behaviorInvestigacióInformation Systems and ManagementComputer Networks and CommunicationsTheoretical modelsInformacióSociologyStatistical physicsLibrary and Information SciencesDiffusion (business)Information SystemsJournal of the Association for Information Science and Technology
researchProduct

The serendipitous impact of COVID-19 pandemic: A rare opportunity for research and practice

2020

Highlights • The Covid-19 pandemic is a rare opportunity to examine some fundamental aspects of IM and IS research and practice. • There are at least three areas where the pandemic has impacted practice: information management, work practices and design of technologies. • The IS discipline has appropriate methods and theories to study the design of technologies and social interactions. • Concepts such as “social distancing” that has emerged in the pandemic need to be studied through philosophical premises. • The IM practices that emerge after the pandemic is over, will be shaped by how well we seize the opportunity to learn from the pandemic.

Information managementCoronavirus disease 2019 (COVID-19)Computer Networks and Communications02 engineering and technologyLibrary and Information SciencesArticleDesign research020204 information systemsPolitical scienceResearch community0502 economics and businessPandemic0202 electrical engineering electronic engineering information engineeringInformation systemDialecticsAffordanceCorporeityDialecticbusiness.industry05 social sciencesSocial interaction practicesPublic relationsWork (electrical)050211 marketingbusinessAffordancesInformation SystemsInternational Journal of Information Management
researchProduct

Implementing IT Service Management: A systematic literature review

2013

Author's version of an article in the journal: International Journal of Information Management. Also available from the publisher at: http://dx.doi.org/10.1016/j.ijinfomgt.2013.01.004 This article provides a systematic review of existing research related to the implementation of IT Service Management (ITSM) and the Information Technology Infrastructure Library (ITIL). The review's main goals are to support research; to facilitate other researchers' search for relevant studies; and to propose areas for future studies within this area. In addition, we provide IT managers with useful information on ITSM and ITIL, based on research-based knowledge of their implementation. The review results sug…

Information managementKnowledge managementITILliterature reviewComputer Networks and Communicationsbusiness.industryComputer scienceIT service managementLibrary and Information SciencesPeer reviewInformation Technology Infrastructure LibraryIT Service ManagementSystematic reviewInformation Technology Infrastructure LibraryITSMVDP::Social science: 200::Library and information science: 320::Information and communication systems: 321businessInformation SystemsInternational Journal of Information Management
researchProduct

Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions

2016

In the last few decades, there have been significant efforts in integrating information and communication technologies (ICT) into healthcare practices. This new paradigm commonly identified as electronic healthcare (e-health) allows provisioning of healthcare services at an affordable price to its consumers. However, there have been questions raised about the security of the sensitive information such as health records as well as the privacy of involving parties raising doubts on the minds of the general public. Thus, it is important to understand the potential security challenges in e-health systems and successfully resolve them by taking adequate measures to ensure fair utilization of suc…

Information privacy020205 medical informaticsPrivacy by DesignComputer Networks and Communicationsbusiness.industryPrivacy softwareComputer scienceInternet privacyAccess controlProvisioning02 engineering and technologyLibrary and Information SciencesComputer securitycomputer.software_genreInformation sensitivityInformation and Communications Technology0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputerPersonally identifiable informationInformation SystemsInternational Journal of Information Management
researchProduct

Distributed Coverage of Ego Networks in F2F Online Social Networks

2016

Although most online social networks rely on a centralized infrastructure, several proposals of Distributed Online Social Networks (DOSNs) have been recently presented. Since in DOSNs user profiles are stored on the peers of the users belonging to the network, one of the main challenges comes from guaranteeing the profile availability when the owner of the data is not online. In this paper, we propose a DOSN based on a friend-to-friend P2P overlay where the user's data is stored only on friend peers. Our approach is based on the ego-network concept, which models the social network from the local point of view of a single user. We propose a distributed algorithm which is based on the notion …

Information privacyComputer scienceCryptography02 engineering and technologyWorld Wide WebSet (abstract data type)Artificial IntelligenceDistributed online social networksDominating setServer0202 electrical engineering electronic engineering information engineering1707P2PSettore INF/01 - InformaticaSocial networkDistributed databasebusiness.industryFriend-to-friend networkComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsData AvailabilityDistributed Online Social NetworkDistributed Online Social Networks; P2P; Data Availability; friend-to-friend networksComputer Networks and CommunicationPrivacyDistributed algorithm020201 artificial intelligence & image processingfriend-to-friend networksbusinessComputer network2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld)
researchProduct

Discovery privacy threats via device de-anonymization in LoRaWAN

2021

LoRaWAN (Long Range WAN) is one of the well-known emerging technologies for the Internet of Things (IoT). Many IoT applications involve simple devices that transmit their data toward network gateways or access points that, in their turn, redirect data to application servers. While several security issues have been addressed in the LoRaWAN specification v1.1, there are still some aspects that may undermine privacy and security of the interconnected IoT devices. In this paper, we tackle a privacy aspect related to LoRaWAN device identity. The proposed approach, by monitoring the network traffic in LoRaWAN, is able to derive, in a probabilistic way, the unique identifier of the IoT device from…

Information privacyIoTDe-anonymizationde-anonymizationsComputer scienceEmerging technologiesComputer Networks and CommunicationsInternet of ThingsDevice identificationcomputer.software_genreComputer securityprivacyLoRaSecurity and privacyUnique identifierDe-anonymizationLoRaWAN; Security; privacy; de-anonymizationsLorawanApplication serverNetwork packetProbabilistic logicIdentification (information)internet of things; lora; lorawan; security; privacy; network optimizationSecuritycomputerNetwork optimizationComputer Communications
researchProduct

An Efficient and Secure Multidimensional Data Aggregation for Fog-Computing-Based Smart Grid

2021

International audience; The secure multidimensional data aggregation (MDA) has been widely investigated in smart grid for smart cities. However, previous proposals use heavy computation operations either to encrypt or to decrypt the multidimensional data. Moreover, previous fault-tolerant mechanisms lead to an important computation cost, and also a high communication cost when considering a separate identification phase. In this article, we propose an efficient and secure MDA scheme, named ESMA. Unlike existing schemes, the multidimensional data in ESMA are structured and encrypted into a single Paillier ciphertext and thereafter, the data are efficiently decrypted. For privacy preserving, …

Information privacysmart citiesComputer Networks and CommunicationsComputer scienceDistributed computingCryptography02 engineering and technologyEncryptionPaillier cryptosystem[SPI]Engineering Sciences [physics]Ciphertext0202 electrical engineering electronic engineering information engineeringAuthenticationbusiness.industry020208 electrical & electronic engineering020206 networking & telecommunicationssecurity and privacyComputer Science ApplicationsData aggregationsmart grid (SG)Smart gridHardware and ArchitectureSignal ProcessingScalabilityfog computingbusinessInformation Systems
researchProduct

Aggregation of the web performance of internal university units as a method of quantitative analysis of a university system: The case of Spain

2013

The aggregation of web performance (page count and visibility) of internal university units could constitute a more precise indicator than the overall web performance of the universities and, therefore, be of use in the design of university web rankings. In order to test this hypothesis, a longitudinal analysis of the internal units of the Spanish university system was conducted over the course of 2010. For the 13800 URLs identified, page count and visibility was calculated using the Yahoo API. The internal values obtained were aggregated by university and compared with the values obtained from the analysis of the university general URLs. The results indicate that, although the correlations…

Information retrievalComputer Networks and CommunicationsComputer scienceVisibility (geometry)Test (assessment)Human-Computer InteractionPage countQuantitative analysis (finance)Artificial IntelligenceWeb performanceLow correlationSoftwareUniversity systemInformation SystemsJournal of the American Society for Information Science and Technology
researchProduct

A text based indexing system for mammographic image retrieval and classification

2014

Abstract In modern medical systems huge amount of text, words, images and videos are produced and stored in ad hoc databases. Medical community needs to extract precise information from that large amount of data. Currently ICT approaches do not provide a methodology for content-based medical images retrieval and classification. On the other hand, from the Internet of Things (IoT) perspective, the ICT medical data can be produced by several devices. Produced data complies with all Big Data features and constraints. The IoT guidelines put at the center of the system a new smart software to manage and transform Big Data in a new understanding form. This paper describes a text based indexing sy…

Information retrievalComputer Networks and CommunicationsComputer sciencebusiness.industrySearch engine indexingBig datacomputer.software_genreDICOMSearch engineMedical images indexing and classificationHardware and ArchitectureInformation retrievalMedical documents indexing and classificationData miningMedical diagnosisbusinessClassifier (UML)computerSoftwareFuture Generation Computer Systems
researchProduct

Combining OWL ontologies usingE-Connections

2006

The standardization of the Web Ontology Language (OWL) leaves (at least) two crucial issues for Web-based ontologies unsatisfactorily resolved, namely how to represent and reason with multiple distinct, but linked ontologies, and how to enable effective knowledge reuse and sharing on the Semantic Web. In this paper, we present a solution for these fundamental problems based on E-Connections. We aim to use E-Connections to provide modelers with suitable means for developing Web ontologies in a modular way and to provide an alternative to the owl:imports construct. With such motivation, we present in this paper a syntactic and semantic extension of the Web Ontology language that covers E-Conn…

Information retrievalDatabaseComputer Networks and Communicationsbusiness.industrySemantic Web Rule Languagecomputer.internet_protocolComputer scienceWeb Ontology LanguageOntology (information science)computer.software_genreSocial Semantic WebOWL-SHuman-Computer InteractionUpper ontologySemantic Web StackbusinesscomputerSemantic WebSoftwarecomputer.programming_languageJournal of Web Semantics
researchProduct