In Web 2.0 era,the content on a web page is increasingly generated by end users,rather than limited number of administrators.Hence,large number of User Generated Content(UGC) has driven the explosion of content in the...In Web 2.0 era,the content on a web page is increasingly generated by end users,rather than limited number of administrators.Hence,large number of User Generated Content(UGC) has driven the explosion of content in the web.Thanks to UGC,the pattern of web usage has evolved from download dominated way to a hybrid one with both information download and upload.Large number of UGC has unveiled great capacity of information that is unavailable for researchers before,such as individual preferences,social connections,and etc.In this paper,we propose a novel model which studies the UGC in micro-blogging web sites,the largest and fastest information diffusion media online,and evaluate the social influence for an arbitrary individual.Experimental results show that our model outperforms state-of-the-art techniques in social influence evaluation in both the running time and accuracy.展开更多
The goal of this paper is to present the ethical issues that are relevant at the concept development stage and inspiring its development during the CONFIDENCE (Ubiquitous Care System to Support Independent Living) p...The goal of this paper is to present the ethical issues that are relevant at the concept development stage and inspiring its development during the CONFIDENCE (Ubiquitous Care System to Support Independent Living) project. We propose that the technology must support principles such as human rights, privacy, safety, and dignity. The voluntary contribution of people as participants in research must undergo the scrutiny of research plans by ethical review boards. Informed consent processes and procedures must be observed in this realm. Ethical issues arising in heterogeneous fields involving technology, end-users, service providers, and formal and informal caregivers pose important challenges. Attempting to maximize the ethical compliance of the results of this ICT (information and communication technology) project, we explore and suggest preventive measures for possible scenarios of misuse of this or related technology. Concluding, the observation of ethical principles throughout the development process can empower users to make informed decisions on the acceptance of ICT systems and services when these reach the market.展开更多
Organizations implement an information security program for the protection of their information assets. The success of such a program depends primarily on the effective implementation and execution of associated infor...Organizations implement an information security program for the protection of their information assets. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls. These policies and controls depend directly upon the resultant behavior and actions of end-users. Hence, end-users play a critical role in the effective implementation and running of an information security program in any organization. However, end-users are often unable to navigate and comprehend the various policies, controls and associated issues. Support to end-users is therefore a vital element, but is often neglected by present information security management systems. In the service industry, support to customers is established as an important determinant of customer perceived service quality. This paper applies the same philosophy to provide support to end-users, who are the customers of the Information Security Service.展开更多
基金ACKNOWLEDGEMENT This work was partially supported by the National Natural Science Foundation of China under Grants No. 61202179, No. 61173089 SRF for ROCS, SEM and the Fundamental Research Funds for the Central Universities.
文摘In Web 2.0 era,the content on a web page is increasingly generated by end users,rather than limited number of administrators.Hence,large number of User Generated Content(UGC) has driven the explosion of content in the web.Thanks to UGC,the pattern of web usage has evolved from download dominated way to a hybrid one with both information download and upload.Large number of UGC has unveiled great capacity of information that is unavailable for researchers before,such as individual preferences,social connections,and etc.In this paper,we propose a novel model which studies the UGC in micro-blogging web sites,the largest and fastest information diffusion media online,and evaluate the social influence for an arbitrary individual.Experimental results show that our model outperforms state-of-the-art techniques in social influence evaluation in both the running time and accuracy.
文摘The goal of this paper is to present the ethical issues that are relevant at the concept development stage and inspiring its development during the CONFIDENCE (Ubiquitous Care System to Support Independent Living) project. We propose that the technology must support principles such as human rights, privacy, safety, and dignity. The voluntary contribution of people as participants in research must undergo the scrutiny of research plans by ethical review boards. Informed consent processes and procedures must be observed in this realm. Ethical issues arising in heterogeneous fields involving technology, end-users, service providers, and formal and informal caregivers pose important challenges. Attempting to maximize the ethical compliance of the results of this ICT (information and communication technology) project, we explore and suggest preventive measures for possible scenarios of misuse of this or related technology. Concluding, the observation of ethical principles throughout the development process can empower users to make informed decisions on the acceptance of ICT systems and services when these reach the market.
文摘Organizations implement an information security program for the protection of their information assets. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls. These policies and controls depend directly upon the resultant behavior and actions of end-users. Hence, end-users play a critical role in the effective implementation and running of an information security program in any organization. However, end-users are often unable to navigate and comprehend the various policies, controls and associated issues. Support to end-users is therefore a vital element, but is often neglected by present information security management systems. In the service industry, support to customers is established as an important determinant of customer perceived service quality. This paper applies the same philosophy to provide support to end-users, who are the customers of the Information Security Service.