2010 International Conference on Information Society

28-30 June 2010

Filter Results

Displaying Results 1 - 25 of 137
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | |PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): 2
    Request permission for commercial reuse | |PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):3 - 10
    Request permission for commercial reuse | |PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • Session 1: E-society

    Publication Year: 2010, Page(s): 11
    Request permission for commercial reuse | |PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • Determinants of Enterprise 2.0 adoption: A value-based adoption model approach

    Publication Year: 2010, Page(s):12 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (272 KB) | HTML iconHTML

    Enterprise 2.0 technology has become popular in business, facilitated by Web 2.0 applications. Many researches on Enterprise 2.0 and related practitioners have recognized the importance of benefits and costs for individuals using Web 2.0. However, the effects of such benefits on enterprise adoption intentions are not discussed. To investigate this issue, this paper proposed a model to examine and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The AHP approach for prioritizing dimensions of the e-society

    Publication Year: 2010, Page(s):19 - 24
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (129 KB) | HTML iconHTML

    E-society readiness includes all segments of a national system such as environmental, inputting, processing and outputting dimensions. Value creation is another concept which includes all the outcomes and impacts of ICT. So policy makers have to identify stakeholders and ICT sectors with their priorities and values in e-societies. One of the unique advantages of the proposed dimensions is the focu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information security framework

    Publication Year: 2010, Page(s):25 - 30
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (148 KB) | HTML iconHTML

    This paper focuses on the holistic framework proposed includes the following clusters of ideas: purpose and role of information security, societal trends, human elements, changing technologies, information security management, and complexity and interactions. These multiple views of information security provide a more complete framework in which to embed much of the global research in information ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulated architecture and programming model for Social Proxy in Second Life

    Publication Year: 2010, Page(s):31 - 35
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (322 KB) | HTML iconHTML

    This paper presents an approach for developing a Social Proxy applied to the Collaborative Virtual Environment (CVE). Also are described the architecture, programming model and evaluation strategies. Our Social Proxy is called SP HUD, a component that provides a view in third person allowing a clearer view of the group activities. With it, we can visualize all the avatars presents in the shared sp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session 2: Intelligent data management

    Publication Year: 2010, Page(s): 36
    Request permission for commercial reuse | |PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • CAES: A model of an RBR-CBR course advisory expert system

    Publication Year: 2010, Page(s):37 - 42
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (248 KB) | HTML iconHTML

    Academic student advising is a gargantuan task that places heavy demand on the time, emotions and mental resources of the academic advisor. It is also a mission critical and very delicate task that must be handled with impeccable expertise and precision else the future of the intended student beneficiary may be jeopardized due to poor advising. One integral aspect of student academic advising is c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Utilizing visualisation for improving Web search effectiveness

    Publication Year: 2010, Page(s):43 - 49
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (101 KB) | HTML iconHTML

    The nature of The Web implies heterogeneity, large content, and varied structures. Locating results that suit the needs of every individual is complicated and difficult, and not always feasible. Most conventional search engines return a small fraction of results per display in textual format. To find their intended documents, users have to scroll over multiple pages while reading plenty of text. V... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information management for flood prevention service work

    Publication Year: 2010, Page(s):50 - 55
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (229 KB) | HTML iconHTML

    It is of great significance for flood prevention service work due to relating to people's life and property safety in our country. With the concerted cooperation and effort between government sector and Chinese Academy of Surveying and Mapping, great information techniques have been adopted widely and a new type of network platform based on GIS and RS has been developed successfully. Based on this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A grain quality classification system

    Publication Year: 2010, Page(s):56 - 61
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (162 KB) | HTML iconHTML

    Exploring the possibility of using technology for grain quality classification is necessary for the consumer market to protect consumers who are susceptible to any form of contamination that may occur in the market. Although some research has been reported on the classification of paddy seeds, no published work is found on the classification of milled rice which is the principal food in many count... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session 3: E-learning

    Publication Year: 2010, Page(s): 62
    Request permission for commercial reuse | |PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • Quality discussion in web-based learning communities: Evidence from teacher professional learning communities

    Publication Year: 2010, Page(s):63 - 68
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (93 KB) | HTML iconHTML

    The importance of developing and nurturing in-depth dialogue and thinking is recognized in literature as one of the key factors in establishing and maintaining successful web-based learning communities. After reviewing the literature on this issue, this research paper describes two tools developed to analyze the quality of discussion in three social science teacher on-line communities of practice.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Student engagement and course value as quality issues in ICT-based higher education

    Publication Year: 2010, Page(s):69 - 72
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (84 KB) | HTML iconHTML

    The evolution and revolution of Information and communication technology (ICT) has greatly impacted the world of work and higher education. For the latter, distance education offerings are highly reliant on ICT through the e-learning mode. Due to the economic slowdown and the government's incentive, working adults are returning to school. However, with a different learning environment, adjustments... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimenting on interface design

    Publication Year: 2010, Page(s):73 - 78
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (108 KB) | HTML iconHTML

    This paper focuses on the choice of methods used to explore the interface design with the aim of increasing the number of interactions and enhancing social presence in an online environment. The research about interface design comprised four field-based experiments. The experiments focused on the design of different social facilities, but shared many similarities in terms of data collection and an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-learning reflecting individual learning styles

    Publication Year: 2010, Page(s):79 - 84
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (129 KB) | HTML iconHTML

    The efforts towards increasing the number of educated people should be prioritized in every society. Due to this influence university education has changed substantially but numerous problems still exist. Plenty of teachers implement into the instructional process self-study methods supported by information and communication technologies (ICT). Having undergone the initial period which was affecte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session 4: E-health

    Publication Year: 2010, Page(s): 85
    Request permission for commercial reuse | |PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • BCI-aware pervasive multimedia for motor disabled people

    Publication Year: 2010, Page(s):86 - 91
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (265 KB) | HTML iconHTML

    Assistive technologies have a major impact in the life of people with severe neuromuscular diseases in order to provide or extend functional abilities of people with special needs. Such technologies promote independent life, social inclusion and improve quality of life of disabled people. Brain-Computer Interface (BCI) is a recent technology that allows the direct communication between the brain a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cognitive agent based intelligent warning system to monitor patients suffering from dementia using ambient assisted living

    Publication Year: 2010, Page(s):92 - 97
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (95 KB) | HTML iconHTML

    Dementia causes a progressive degradation of mental abilities leading the patient to forget and have problems thinking and reasoning. As the disease is progressive it is possible for patients in the early or intermediate stages to manage within their own home; however as the disease becomes more serious and the patient more susceptible to forgetfulness or confusion the health and safety risk withi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What happens after calling the ambulance: Information, communication, and acceptance issues in a telemedical workflow

    Publication Year: 2010, Page(s):98 - 103
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (159 KB) | HTML iconHTML

    In this paper we describe the information, communication, and acceptance issues in a tele-medical workflow, taking a pre-hospital emergency medical service (EMS) as an example. EMS workflows are extremely time-critical, impose a high responsibility, and crucially depend on a close, well-trained cooperation between EMS personnel. Though increasingly information and communication technologies (ICT) ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session 5: E-governance

    Publication Year: 2010, Page(s): 104
    Request permission for commercial reuse | |PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • Curbing the misuse of discretionary power in public service: Case of building plan approvals using simple checklists

    Publication Year: 2010, Page(s):105 - 109
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (82 KB) | HTML iconHTML

    Much of the misused discretionary power vested with public office bearers emanate from complicated business rules that govern the provision of public services. Without simplifying the administrative rules there is a limit to which reform of public services can be attained. E-Government, as many have noted boils down to mere replication of existing services. In this paper we discuss how public serv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Map symbols extraction for emergency release based semantic representation

    Publication Year: 2010, Page(s):110 - 115
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (231 KB) | HTML iconHTML

    The emergency information released in map is necessary for emergency management and disaster reduction. We present a new method for emergency map symbols extraction from symbol collection based semantic representation in this paper. A novel map symbol semantic matrix is introduced to measure the degree of the semantic representation between the symbol meaning and the emergency event conception. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.