Search results for "Computer Networks"
showing 10 items of 860 documents
Diffusion of theories and theoretical models in the Ibero‐American research on information behavior
2021
Ibero-American research on information behavior (IB) lacks the visibility typical of other parts of the world, and little is known about it in countries outside the area. The objective of this paper has therefore been to analyze the way in which Ibero-American research incorporates various theoretical references to empirical research on IB. The results point to the existence of different focuses of research in the past 10 years, in the sense of a reduced empirical approach and a moderate to minimal use of theories in the design of such research. Furthermore, the most cited theories and models of IB at an international level are those most widely applied in this geographical area, and the us…
The serendipitous impact of COVID-19 pandemic: A rare opportunity for research and practice
2020
Highlights • The Covid-19 pandemic is a rare opportunity to examine some fundamental aspects of IM and IS research and practice. • There are at least three areas where the pandemic has impacted practice: information management, work practices and design of technologies. • The IS discipline has appropriate methods and theories to study the design of technologies and social interactions. • Concepts such as “social distancing” that has emerged in the pandemic need to be studied through philosophical premises. • The IM practices that emerge after the pandemic is over, will be shaped by how well we seize the opportunity to learn from the pandemic.
Implementing IT Service Management: A systematic literature review
2013
Author's version of an article in the journal: International Journal of Information Management. Also available from the publisher at: http://dx.doi.org/10.1016/j.ijinfomgt.2013.01.004 This article provides a systematic review of existing research related to the implementation of IT Service Management (ITSM) and the Information Technology Infrastructure Library (ITIL). The review's main goals are to support research; to facilitate other researchers' search for relevant studies; and to propose areas for future studies within this area. In addition, we provide IT managers with useful information on ITSM and ITIL, based on research-based knowledge of their implementation. The review results sug…
Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions
2016
In the last few decades, there have been significant efforts in integrating information and communication technologies (ICT) into healthcare practices. This new paradigm commonly identified as electronic healthcare (e-health) allows provisioning of healthcare services at an affordable price to its consumers. However, there have been questions raised about the security of the sensitive information such as health records as well as the privacy of involving parties raising doubts on the minds of the general public. Thus, it is important to understand the potential security challenges in e-health systems and successfully resolve them by taking adequate measures to ensure fair utilization of suc…
Distributed Coverage of Ego Networks in F2F Online Social Networks
2016
Although most online social networks rely on a centralized infrastructure, several proposals of Distributed Online Social Networks (DOSNs) have been recently presented. Since in DOSNs user profiles are stored on the peers of the users belonging to the network, one of the main challenges comes from guaranteeing the profile availability when the owner of the data is not online. In this paper, we propose a DOSN based on a friend-to-friend P2P overlay where the user's data is stored only on friend peers. Our approach is based on the ego-network concept, which models the social network from the local point of view of a single user. We propose a distributed algorithm which is based on the notion …
Discovery privacy threats via device de-anonymization in LoRaWAN
2021
LoRaWAN (Long Range WAN) is one of the well-known emerging technologies for the Internet of Things (IoT). Many IoT applications involve simple devices that transmit their data toward network gateways or access points that, in their turn, redirect data to application servers. While several security issues have been addressed in the LoRaWAN specification v1.1, there are still some aspects that may undermine privacy and security of the interconnected IoT devices. In this paper, we tackle a privacy aspect related to LoRaWAN device identity. The proposed approach, by monitoring the network traffic in LoRaWAN, is able to derive, in a probabilistic way, the unique identifier of the IoT device from…
An Efficient and Secure Multidimensional Data Aggregation for Fog-Computing-Based Smart Grid
2021
International audience; The secure multidimensional data aggregation (MDA) has been widely investigated in smart grid for smart cities. However, previous proposals use heavy computation operations either to encrypt or to decrypt the multidimensional data. Moreover, previous fault-tolerant mechanisms lead to an important computation cost, and also a high communication cost when considering a separate identification phase. In this article, we propose an efficient and secure MDA scheme, named ESMA. Unlike existing schemes, the multidimensional data in ESMA are structured and encrypted into a single Paillier ciphertext and thereafter, the data are efficiently decrypted. For privacy preserving, …
Aggregation of the web performance of internal university units as a method of quantitative analysis of a university system: The case of Spain
2013
The aggregation of web performance (page count and visibility) of internal university units could constitute a more precise indicator than the overall web performance of the universities and, therefore, be of use in the design of university web rankings. In order to test this hypothesis, a longitudinal analysis of the internal units of the Spanish university system was conducted over the course of 2010. For the 13800 URLs identified, page count and visibility was calculated using the Yahoo API. The internal values obtained were aggregated by university and compared with the values obtained from the analysis of the university general URLs. The results indicate that, although the correlations…
A text based indexing system for mammographic image retrieval and classification
2014
Abstract In modern medical systems huge amount of text, words, images and videos are produced and stored in ad hoc databases. Medical community needs to extract precise information from that large amount of data. Currently ICT approaches do not provide a methodology for content-based medical images retrieval and classification. On the other hand, from the Internet of Things (IoT) perspective, the ICT medical data can be produced by several devices. Produced data complies with all Big Data features and constraints. The IoT guidelines put at the center of the system a new smart software to manage and transform Big Data in a new understanding form. This paper describes a text based indexing sy…
Combining OWL ontologies usingE-Connections
2006
The standardization of the Web Ontology Language (OWL) leaves (at least) two crucial issues for Web-based ontologies unsatisfactorily resolved, namely how to represent and reason with multiple distinct, but linked ontologies, and how to enable effective knowledge reuse and sharing on the Semantic Web. In this paper, we present a solution for these fundamental problems based on E-Connections. We aim to use E-Connections to provide modelers with suitable means for developing Web ontologies in a modular way and to provide an alternative to the owl:imports construct. With such motivation, we present in this paper a syntactic and semantic extension of the Web Ontology language that covers E-Conn…