首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Abstract

Technological changes are occurring rapidly. As one result, students entering college are bringing very disparate computer skills and attitudes. Some students are reluctant to embrace new technologies; others demand electronic resources for all assignments. By considering the computer access and Internet resources available to elementary school students today, we can only imagine what our users of tomorrow will expect from libraries. Although college students may arrive at our libraries with increased computer skills, their knowledge of electronic information may be lacking. Definitions of information literacy and an overview of information literacy skills are outlined. The Digital Information Literacy program at The University of Texas at Austin, as well as the technological environment and facilities at the institution, serve as a case study for integrating information literacy skills into traditional services and partnerships.  相似文献   

2.
ABSTRACT

Security and privacy are fundamental concerns in cloud computing both in terms of legal complications and user trust. Cloud computing is a new computing paradigm, aiming to provide reliable, customized, and guaranteed computing dynamic environment for end users. However, the existing security and privacy issues in the cloud still present a strong barrier for users to adopt cloud computing solutions. This paper investigates the security and privacy challenges in cloud computing in order to explore methods that improve the users’ trust in the adaptation of the cloud. Policing as a Service can be offered by the cloud providers with the intention of empowering users to monitor and guard their assets in the cloud. This service is beneficial both to the cloud providers and the users. However, at first, the cloud providers may only be able to offer basic auditing services due to undeveloped tools and applications. Similar to other services delivered in the cloud, users can purchase this service to gain some control over their data. The subservices of the proposed service can be Privacy as a Service and Forensics as a Service. These services give users a sense of transparency and control over their data in the cloud while better security and privacy safeguards are sought.  相似文献   

3.
ABSTRACT

Virtual reference is a vital service component of many libraries. Whether serving college students or the general public, a real-time reference service demands highly trained staff and quality resources. What can administrators do to make sure their users make the most of this cutting-edge service? The University at Buffalo (UB) was one of the first universities to establish a virtual reference service. Known as Instant Librarian, the chat room thrives as a major public service without placing a drain on staff or budget. This article discusses the marketing strategies UB applies to chat reference, including advertising, use of icons, and user surveys for assessment.  相似文献   

4.
Internet Primer     
Abstract

The Internet has blossomed as an exciting information-finding tool that appeals to the general public as well as to students and scholars. Consequently, a rudimentary Internet education is in demand on a daily basis by users on campus and in the community. This paper outlines the design, objectives, and evaluation of an introductory Internet workshop offered to a range of users in an electronic classroom. The session was under development for three months during a testing period when subject content, student tasks, and participant learning were examined. The resulting class focuses student attention on an Internet research strategy that facilitates finding information resources.  相似文献   

5.
ABSTRACT

Most colleges are continuing to see growth in their online education programs. Academic libraries are attempting to strike a balance between traditional library offerings and new online resources and services. Determining how to allocate funds is complicated by the fact that many students in online classes today live near enough campus to come to the library. Should libraries at institutions where most online students live near campus devote scarce resources to providing services such as online reference? One community college library is attempting to answer that question by testing online reference with Elluminate vClass in a limited way.  相似文献   

6.
SUMMARY

The School of Information Resources and Library Science at the University of Arizona (UA) has a mix of local and distance students in its program. The librarian at the UA Library who works with this program developed a Web site that centralizes information about several library services and resources that benefit distance learners: online orientation and research guides, chat reference, document delivery, and more. Bringing together this information with a focus on distance learners provides a platform for delivering the library to all users, whatever their distance from the library.  相似文献   

7.
SUMMARY

As libraries expand their services into the world of federated searching, librarians need to work with users to discover what their expectations are and how the library can customize the software to meet users' expectations. This article describes the user testing performed at Texas A&M University during 2005 as the libraries implemented a new federated search service called Search Now (ExLibris' MetaLib). Over fifty volunteers–including undergraduates, graduate students, faculty, and library faculty and staff–helped to test the new system and offered suggestions for improvements. Problems were noted and, where possible, modifications were made to improve results. These modifications were then tested again. Major issues noted during the usability testing included: user expectations of search performance; information included in and the layout of the search results; availability of advanced search options; and lack of ability to limit by format, scholarly nature of journal, date and full-text availability. Suggestions for further development are also presented.  相似文献   

8.
ContextCloud computing is a thriving paradigm that supports an efficient way to provide IT services by introducing on-demand services and flexible computing resources. However, significant adoption of cloud services is being hindered by security issues that are inherent to this new paradigm. In previous work, we have proposed ISGcloud, a security governance framework to tackle cloud security matters in a comprehensive manner whilst being aligned with an enterprise’s strategy.ObjectiveAlthough a significant body of literature has started to build up related to security aspects of cloud computing, the literature fails to report on evidence and real applications of security governance frameworks designed for cloud computing environments. This paper introduces a detailed application of ISGCloud into a real life case study of a Spanish public organisation, which utilises a cloud storage service in a critical security deployment.MethodThe empirical evaluation has followed a formal process, which includes the definition of research questions previously to the framework’s application. We describe ISGcloud process and attempt to answer these questions gathering results through direct observation and from interviews with related personnel.ResultsThe novelty of the paper is twofold: on the one hand, it presents one of the first applications, in the literature, of a cloud security governance framework to a real-life case study along with an empirical evaluation of the framework that proves its validity; on the other hand, it demonstrates the usefulness of the framework and its impact to the organisation.ConclusionAs discussed on the paper, the application of ISGCloud has resulted in the organisation in question achieving its security governance objectives, minimising the security risks of its storage service and increasing security awareness among its users.  相似文献   

9.
SUMMARY

Distance learning students may not think of the “campus” library as the first place to fulfill their information needs and may not even be aware of the services available to them. One way to reach these students is to adopt and adapt marketing techniques from the business world. This article examines the findings of a survey conducted at Emporia State University concerning the awareness of distance learning services. It will also examine marketing techniques and illustrate how they can be applied to increase awareness of reference support services for distance learners.  相似文献   

10.
Service-oriented computing (SOC) suggests that the Internet will be an open repository of many modular capabilities realized as web services. Organizations may be able to leverage this SOC paradigm if their employees are able to ubiquitously incorporate such capabilities and their resulting information into their daily practices. It is impractical to assume that human users will be able to manually search vast distributed repositories at real-time. This paper presents an architecture, Software Agent-Based Groupware using E-services (SAGE), that incorporates the use of intelligent agents to integrate human users with web services. SAGE provides background search and discovery approaches, thus enabling human users to exploit service-based capabilities that were previously too time-consuming to locate and integrate. We present a multi-agent system where each agent learns the rule-based preferences of a human user with regards to their current operational “context” and manages the incorporation of relevant web services. Recommended by: Djamal Benslimane and Zakaria Maamar  相似文献   

11.
张以文  项涛  郭星  贾兆红  何强 《软件学报》2018,29(11):3388-3399
服务质量预测在服务计算领域中是一个热点研究问题.在历史QoS数据稀疏的情况下,设计一个满足用户个性化需求的服务质量预测方法成为一项挑战.为解决这一挑战问题,本文提出一种基于SOM神经网络的服务质量预测方法SOMQP.首先,基于历史QoS数据,应用SOM神经网络算法分别对用户和服务进行聚类,得到用户关系矩阵和服务关系矩阵;进而,综合考虑用户信誉和服务关联性,采用一种新的Top-k选择机制获得相似用户和相似服务;最后,采用基于用户的和基于项目的混合策略对缺失QoS值进行预测.在真实的数据集WS-Dream上进行大量实验,结果表明,与经典的CF算法和K-means算法相比,本文方法较大程度上提高了QoS预测精度.  相似文献   

12.
ABSTRACT

Rapid development in mobile devices and cloud computing technologies has increased the number of mobile services from different vendors on the cloud platform. However, users of these services are facing different security and access control challenges due to the nonexistence of security solutions capable of providing secure access to these services, which are from different vendors, using a single key. An effective security solution for heterogeneous Mobile Cloud Computing (MCC) services should be able to guarantee confidentiality and integrity through single key-based authentication scheme. Meanwhile, a few of the existing authentication schemes for MCC services require different keys to access different services from different vendors on a cloud platform, thus increases complexity and overhead incurred through generation and storage of different keys for different services.

In this paper, an efficient mutual authentication scheme for accessing heterogeneous MCC services is proposed. The proposed scheme combines the user’s voice signature with cryptography operations to evolve efficient mutual authentication scheme devoid of key escrow problem and allows authorized users to use single key to access the heterogeneous MCC services at a reduced cost.  相似文献   

13.
SUMMARY

Doctor of Pharmacy students at the University of Wisconsin-Madison spend their final year of study working side-by-side with pharmacists throughout Wisconsin. Clerkship rotations often take place outside of Madison, away from familiar and dependable library resources and services. To make the transition from campus to community as smooth as possible, librarians have developed a focused orientation and a detailed field guide to provide students with the tools for a productive and successful year working and studying at a distance.

This article will outline the library's orientation program, describe the elements included in the distance services field guide, and highlight the pre- and post-clerkship assessment tools to be used in measuring satisfaction with the program in the future.  相似文献   

14.
Abstract

For many users, the first real encounter with a computer occurs when taking an introductory course to computers at a college. To the extent that these training courses impact user understanding and motivation, they are important determinants of the user attitudes towards computers and merit serious assessment. Using 327 business undergraduates at two universities in the US, this paper reports on the reactions of students to computers and computer-related tasks before and after an introductory course to computers. Responses to a 20-item scale were analysed to examine the pattern of attitude change experienced by students in their training course. Factor analysis revealed five constructs for describing patterns of computer user attitude: negative reaction to computers; positive reaction to computers; reaction to computers for children education; reaction to computer-mediated services; and reaction to computer games. Four factors show significant change in mean scores after the training courses. The attitudes changed for males more than females, indicating improvement in attitudes. The respondents‘ attitude to computer-mediated services remained unchanged. While the directions of changes indicate an overall improvement in respondents’ reactions, many attitudes did not change significantly after having taken the training courses. This may be due to the content or the format of these courses.  相似文献   

15.
SUMMARY

The University of Wyoming has a long tradition of providing library services to distance education students. As technology changed and enhanced the delivery mode of distance education courses, the library altered the ways in which it offered services to distance learners. The institution was an early adopter of Web courses, so offering library support in this new environment was a natural expansion of our services. This expansion supports the goals of the ACRL Guidelines for Distance Learning Library Services and the goals of the University. This article will describe the integration of library reference services into online courses.  相似文献   

16.
ContextA collaborative system is a special kind of software whose users can perform collaboration, communication and collaboration tasks. These systems usually have a high number of non-functional requirements, resulting from the users’ need of being aware of other users with whom to collaborate, that is, the workspace awareness.ObjectiveThis paper aims at evaluating two Requirements Engineering languages i* and CSRML (an extension of i*) in order to determine which is the most suitable one to specify requirements of collaborative systems, taking into account their special characteristics regarding collaboration and awareness.MethodWe performed a family of experiments comprising an original experiment and two replicas. They were performed by 30, 45 and 9 Computer Science students, respectively, from Spain and Argentina. These subjects filled in two understandability questionnaires once they analyzed the requirements models of two systems: an e-learning collaborative system and a conference review system with some collaborative aspects support. Both models were specified by using the evaluated languages.ResultsThe statistical analysis of the family of experiments showed that the understandability was higher for the models specified with CSRML than for those specified with i*, especially for collaborative aspects. This result was also confirmed by the meta-analysis conducted.ConclusionsCSRML surpasses i* when modeling collaborative systems requirements models due to the specific expressiveness introduced to represent collaboration between users and awareness and the new resorts to manage actors and roles.  相似文献   

17.
ObjectiveThe overall objective of the research work presented in this paper is to investigate models, methods and architectures to replace fixed, pre-packaged applications with flexible composition environments that make interactive environments “emerge” at run-time, based on composition actions performed by non-technical users. The approach aims at the lightweight construction of integrated, situational workspaces pervasively accessible and sharable through a variety of devices.MethodsBased on a meta-design approach, we designed and implemented a platform that allows end users, not necessarily experts of technologies, to extract contents from heterogeneous sources and compose Personal Information Spaces (PISs) that satisfy their information needs. Specific emphasis is posed on the adoption of a composition paradigm that abstracts from technical details and can thus be used by non-technical users.ResultsThe platform for service composition that supports the activity of the different involved stakeholders is described in details. Thanks to the separation of concerns on which the composition paradigm is based, the overall approach and its enabling platform are also amenable to customization with respect to the requirements of specific domains.ConclusionWe present an approach where a composition platform enables the extraction of content from heterogeneous services and its integration into situational applications where content presentation is flexibly managed through different visual templates. We also discuss the advantages offered by this approach to the stakeholders of a specific community of users in the Cultural Heritage domain.PracticeThe developed prototypes were evaluated in laboratories and field studies: the former aimed at investigating the ease of use and the users satisfaction of the functionality and the user interface of the environment for domain customization, the latter aimed instead at observing real users (e.g., guides of an archeological park) in action, to assess the validity of the proposed composition paradigm as an EUD practice.ImplicationsThe user studies described in this paper provided hints for refining the prototypes, and laid the basis for future work related to the identification of design principles that can make service-based composition technologies in general more useful and usable for end users.  相似文献   

18.
ABSTRACT

Ubiquitous environments have considerable potential to provide services supporting daily activities (using public transportation to and from workplace, using ATM machines, selecting and purchasing goods in ticketing or vending machines, etc.) in order to assist people with disabilities. Nevertheless, the ubiquitous service providers generally supply generic user interfaces which are not usually accessible for all potential end users. In this article, a case study to verify the adequacy of the user interfaces automatically generated by the Egoki system for two supporting ubiquitous services adapted to young adults with moderate intellectual disabilities was presented. The task completion times and the level of assistance required by participants when using the interfaces were analyzed. Participants were able to access services through a tablet and successfully complete the tasks, regardless of their level of expertise and familiarity with the service. Moreover, results indicate that their performance and confidence improved with practice, as they required fewer direct verbal and pointer cues to accomplish tasks. By applying observational methods during the experimental sessions, several potential improvements for the automated interface generation process were also detected.  相似文献   

19.

Several challenges need to be met by a new generation of learning services. On one hand, they need to fit into a ubiquitous and serendipitous learning vision, to adapt to different types of users with different backgrounds and needs. On the other hand, they need to integrate modern pedagogical approaches of learning. These services will probably rely on the cooperation of different distributed, autonomous, goal-oriented entities, and they can be Grid- or Web-Oriented. In this paper, we show how core technologies can contribute to the development of a next generation of learning services. In particular, we focus our attention on personalized services delivery for learning by employing an ontological perspective and user modeling techniques. This paper presents some preliminary results obtained within Elegi FP6 project.  相似文献   

20.
ABSTRACT

With the rapid development of artificial intelligence, information system, and mobile technologies, some companies (e.g. airlines) consider fully replacing service employees with self-service technologies (SSTs) to cut down costs and to increase efficiency. However, replacing full services with SSTs sometimes fail to deliver the benefits companies have hoped for: users may feel that they are being forced to use SSTs and show resistance to the new technologies. To investigate why users show resistance, we draw inferences from psychological reactance theory and argue that users may perceive the forced adoption as a threat, which leads to resistance of SSTs. A conceptual model was developed and an empirical study was conducted. The results show that, under a forced situation, users are likely to perceive the forced adoption as a threat to their freedom, causing them to have negative emotions and perceptions towards the SSTs, and, in turn, their adoption intention decreases and switch intention increases. The findings provide insights on why users show resistance to SSTs and highlight the impacts of the motivational state of psychological reactance.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号