Search
Search Results
-
A modal approach to conscious social agents
An agent’s awareness has previously been modelled as a modal operator in such a way that awareness can be iterated, and consciousness formalised as...
-
Exploring Rationality of Self Awareness in Social Networking for Logical Modeling of Unintentional Insiders
Unawareness of privacy risks together with approval seeking motivations make humans enter too much detail into the likes of Facebook, Twitter, and... -
eGovernance for Citizen Awareness and Corruption Mitigation
‘Corruption’ can be defined as the exploitation of delegated authority for illegitimate profits. We consider the kind of corruption happening on... -
Perception, Awareness, Presentation: Using Meditation Techniques to Teach Data Visualisation Literacy – A Case Study
Inspired by the ideas of Gestalt and the practice of meditation, this paper describes an approach to bring together the corresponding techniques to... -
Awareness on Energy Efficient Products as Prediction on Intention to Subscribe to and Purchase Energy Efficient Services and Products
Issues related to high energy consumption is contemporary and concerning socio-politic situation in this country. Thus, the study aims at gauging... -
A Wolf, Hyena, and Fox Game to Raise Cybersecurity Awareness Among Pre-school Children
Currently, children have a greater exposure to cyberspace and cyber threats than any previous generation. Digital technologies are evolving... -
A survey on context awareness in big data analytics for business applications
The concept of context awareness has been in existence since the 1990s. Though initially applied exclusively in computer science, over time it has...
-
Impact of the Cyber Hygiene Intelligence and Performance (CHIP) Interface on Cyber Situation Awareness and Cyber Hygiene
A common theme across cybersecurity solutions is a lack of transparency for end-users. Our prototype, Cyber Hygiene Intelligence & Performance... -
Virtual Machines
In the previous chapters, we gained a basic understanding of the essentials of the AWS cloud and awareness of the various tools and IDE extensions... -
Creation and Future Development Process of a Serious Game: Raising Awareness of (Visual) Impairments
Despite the UN Convention on the Rights of Persons with Disabilities and binding laws, digital accessibility is not yet a norm at universities.... -
System Environment and Context-Awareness
Referring to the previous chapter, whenever a group of entities (actor-roles) collectively realize a goal, we consider them to belong to a system.... -
Emerging Paradigm of Smart Healthcare in the Management of COVID-19 Pandemic and Future Health Crisis
Remote patient oriented healthcare is an effort to ensure “Health for all”. Smart health options such as e-Health, m-Health, Telemedicine is a... -
Towards Priority-Flexible Task Map** for Heterogeneous Multi-core NUMA Systems
With the rapid development of heterogeneous multi-core processors, a new High Performance Computing (HPC) system architecture combining the... -
What is Your Information Worth? A Systematic Analysis of the Endowment Effect of Different Data Types
Various smartphone and web applications use personal information to estimate the user’s behaviour among others for targeted advertising and... -
Virtual Reality Compensatory Aid for Improved Weapon Splash-Zone Awareness
Military personnel often have very little time to make battlefield decisions. These decisions can include the identification of weapon splash-zones... -
Combing TRIZ and LCA for a Better Awareness of the Sustainability of a Technical Solution
A reflection about the evaluation of the environmental impacts arising from a technical solution obtained by applying some of the most common TRIZ... -
Awareness Logic: A Kripke-Based Rendition of the Heifetz-Meier-Schipper Model
Heifetz, Meier & Schipper (HMS) present a lattice model of awareness. The HMS model is syntax-free, which precludes the simple option to rely on... -
Literacy Toy for Enhancement Phonological Awareness: A Longitudinal Study
In this report it is presented the results of a longitudinal pre-experimental study, it was realized a technological intervention to stimulate the... -
A multi-layered security model to counter social engineering attacks: a learning-based approach
Social engineering is a malicious technique that leverages deception and manipulation to exploit the cognitive biases and heuristics of human...
-
Towards more sustainable higher education institutions: Implementing the sustainable development goals and embedding sustainability into the information and computer technology curricula
Lately, there has been a rising trend towards integrating sustainability issues and implementing sustainable development (SD) goals into higher...