Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Management Information Systems

Multi-Authority Abs Supporting Dendritic Access Structure, Ruo Mo, Jian-Feng Ma, Ximeng Liu, Qi Li Jul 2017

Multi-Authority Abs Supporting Dendritic Access Structure, Ruo Mo, Jian-Feng Ma, Ximeng Liu, Qi Li

Research Collection School Of Computing and Information Systems

Attribute-based signature (ABS), which could realize fine-grained access control, was considered to be an importantmethod for anonymous authentication in cloud computing. However, normal ABS only provided simple accesscontrol through threshold structure and thus could not cope with the large-scale attribute sets of users in the cloud. Moreover,the attribute sets were supervised by only one attribute authority, which increased the cost of computation and storage.The whole system was in danger of collapsing once the attribute authority was breached. Aiming at tackling theproblems above, a novel scheme, was proposed called multi-authority ABS supporting dendritic access structure whichsupported any AND, OR and threshold …


Mining Capstone Project Wikis For Knowledge Discovery, Swapna Gottipati, Venky Shankararaman, Melvrivk Goh Jul 2017

Mining Capstone Project Wikis For Knowledge Discovery, Swapna Gottipati, Venky Shankararaman, Melvrivk Goh

Research Collection School Of Computing and Information Systems

Wikis are widely used collaborative environments as sources of information and knowledge. The facilitate students to engage in collaboration and share information among members and enable collaborative learning. In particular, Wikis play an important role in capstone projects. Wikis aid in various project related tasks and aid to organize information and share. Mining project Wikis is critical to understand the students learning and latest trends in industry. Mining Wikis is useful to educationists and academicians for decision-making about how to modify the educational environment to improve student's learning. The main challenge is that the content or data in project Wikis …


The Dark Side Of Banning Hacking Technique Discussion, Qiu-Hong Wang, Ting Zhang Le Jun 2017

The Dark Side Of Banning Hacking Technique Discussion, Qiu-Hong Wang, Ting Zhang Le

Research Collection School Of Computing and Information Systems

Prior studies have evidenced the effectiveness of more severe and broader enforcement in deterringcybercrimes. This study addresses the other side of the story. Our data analysis shows that theenforcement against the production / distribution / possession of computer misuse tools tends toincrease the contribution on detection and protection related posts in online hacker forums. Butthis enforcement may discourage those contributors who had originally actively contributed to theprotection discussions. Thus government regulations have to be cautiously justify the incentives ofmultiple parties in the cybersecurity context.


Charitable Fundraising: Gaining Donors' Trust On Online Platforms, Deserinas Sulaeman Jun 2017

Charitable Fundraising: Gaining Donors' Trust On Online Platforms, Deserinas Sulaeman

Research Collection School Of Computing and Information Systems

Trust is crucial in the relationships between charitable fundraisers and potential donors. This study examines factors that can help fundraisers gain potential donors’ trust, which is crucial to the success of the campaigns. Examining charitable fundraising campaigns on an online platform, this study finds that trust issues can be mitigated by providing a campaign description that is more sophisticated, more informative, and with fewer errors. Additionally, setting a higher campaign funding goal tends to lead to a more successful campaign. These characteristics likely reflect a competent, committed, and passionate fundraiser. On the other hand, mere exposure to a wide set …


Joint Optimization Of Resource Provisioning In Cloud Computing, Jonathan David Chase, Dusit Niyato May 2017

Joint Optimization Of Resource Provisioning In Cloud Computing, Jonathan David Chase, Dusit Niyato

Research Collection School Of Computing and Information Systems

Cloud computing exploits virtualization to provision resources efficiently. Increasingly, Virtual Machines (VMs) have high bandwidth requirements; however, previous research does not fully address the challenge of both VM and bandwidth provisioning. To efficiently provision resources, a joint approach that combines VMs and bandwidth allocation is required. Furthermore, in practice, demand is uncertain. Service providers allow the reservation of resources. However, due to the dangers of over-and under-provisioning, we employ stochastic programming to account for this risk. To improve the efficiency of the stochastic optimization, we reduce the problem space with a scenario tree reduction algorithm, that significantly increases tractability, whilst …


Understanding The Information-Based Transformation Of Strategy And Society, Eric K. Clemons, Rajiv M. Dewan, Robert J. Kauffman, Thomas A. Weber Apr 2017

Understanding The Information-Based Transformation Of Strategy And Society, Eric K. Clemons, Rajiv M. Dewan, Robert J. Kauffman, Thomas A. Weber

Research Collection School Of Computing and Information Systems

The world economy is undergoing dramatic changes, largely driven by the new availability of fine-grained information. Innovative ways of using data—large and small—have also prompted a rethinking of the boundaries for the combination and use of knowledge. The strategic design of information flows in the economy has the upside of higher economic rents and competitive advantage, as well as the downsides of wealth inequality and abuse of power. This has brought a wide range of regulatory challenges. To understand the nature of these sweeping changes, it is important to examine the new ways information is used, and how information flows …