Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 38 of 38

Full-Text Articles in Computer Engineering

Table Of Contents Jan 2008

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Towards A Business Model For Cellular Network And Telecommunication Operators: A Theoretical Framework, Mutaz M. Al-Debei, Ramzi El-Haddadeh, David Avison Jan 2008

Towards A Business Model For Cellular Network And Telecommunication Operators: A Theoretical Framework, Mutaz M. Al-Debei, Ramzi El-Haddadeh, David Avison

Dr. Mutaz M. Al-Debei

Cellular networks and telecommunications bring major change to the way businesses are conducted. Mobility has become one of the main priorities for users and this has impacted on cellular networks and telecommunication operators (CNTOs). However, entrants into the cellular industry have been confounded primarily by inexistent or weak Business Models (BMs). Designing a BM for a CNTO is complex and requires multiple actors to balance different and often conflicting design requirements. Nevertheless, most research about CNTOs has been technically oriented and has mainly addressed the technological and engineering issues related to their infrastructure. Less attention has been given to the …


Defining The Business Model In The New World Of Digital Business, Mutaz M. Al-Debei, Ramzi El-Haddadeh, David Avison Jan 2008

Defining The Business Model In The New World Of Digital Business, Mutaz M. Al-Debei, Ramzi El-Haddadeh, David Avison

Dr. Mutaz M. Al-Debei

Recent rapid advances in ICTs, specifically in Internet and mobile technologies, have highlighted the rising importance of the Business Model (BM) in Information Systems (IS). Despite agreement on its importance to an organization’s success, the concept is still fuzzy and vague, and there is no consensus regarding its definition. Furthermore, understanding the BM domain by identifying its meaning, fundamental pillars, and its relevance to other business concepts is by no means complete. In this paper we aim to provide further clarification by first presenting a classification of definitions found in the IS literature; second, proposing guidelines on which to develop …


Technology-Aided Participative Methods In Environmental Assessment: An International Perspective, Ainhoa Gonzalez, Alan Gilmer, Ronan Foley, John Sweeney, John Fry Jan 2008

Technology-Aided Participative Methods In Environmental Assessment: An International Perspective, Ainhoa Gonzalez, Alan Gilmer, Ronan Foley, John Sweeney, John Fry

Articles

Provisions for citizen involvement in the assessment of potential environmental effects of certain plans, programmes and projects are present in current legislation. An international survey revealed that public participation is common practice in European and some other countries worldwide. However, a number of issues are observed to affect public involvement in EIA/SEA processes and expert opinion differs when evaluating the effectiveness of existing participative methods. Results suggest that technology-aided methods can improve traditional participation processes. In particular, GIS has the potential to increase community knowledge and enhance involvement by communicating information more effectively. Variable accessibility to technology and data quality …


Who Is Reading The Data On Your Old Computer?, Vivienne Mee Jan 2008

Who Is Reading The Data On Your Old Computer?, Vivienne Mee

Journal of Digital Forensics, Security and Law

Researchers at Rits Information Security performed a study in how the Irish population disposes of their old computers. How would you dispose of your old computer, or how would the company you work for dispose of their old computers?

The majority of Irish homeowners, would bring their old computers to local civic amenity centres, give it away to a relative or sell it on to another party.

Some organisations would give their old equipment to a staff member, as a gift gesture, others may simply discard in the local civic amenity site.

What is wrong with the methods currently being …


Analysis Of Information Remaining On Hand Held Devices Offered For Sale On The Second Hand, Andy Jones, Craig Valli, Iain Sutherland Jan 2008

Analysis Of Information Remaining On Hand Held Devices Offered For Sale On The Second Hand, Andy Jones, Craig Valli, Iain Sutherland

Journal of Digital Forensics, Security and Law

The ownership and use of mobile phones, Personal Digital Assistants and other hand held devices is now ubiquitous both for home and business use. The majority of these devices have a high initial cost, a relatively short period before they become obsolescent and a relatively low second hand value. As a result of this, when the devices are replaced, there are indications that they tend to be discarded. As technology has continued to develop, it has led to an increasing diversity in the number and type of devices that are available, and the processing power and the storage capacity of …


Book Review: The Dotcrime Manifesto: How To Stop Internet Crime, Gary C. Kessler Jan 2008

Book Review: The Dotcrime Manifesto: How To Stop Internet Crime, Gary C. Kessler

Journal of Digital Forensics, Security and Law

No abstract provided.


Book Review: Mac Os X, Ipod, And Iphone Forensic Analysis Dvd Toolkit, Gary C. Kessler Jan 2008

Book Review: Mac Os X, Ipod, And Iphone Forensic Analysis Dvd Toolkit, Gary C. Kessler

Journal of Digital Forensics, Security and Law

Apple's hold on the personal computer marketplace started dwindling on August 12, 1981, the day that the IBM PC was introduced. As an Apple ][+ bigot myself, I refused to touch a PC for some years. But I was also a command line bigot, so when the first Macintosh was introduced in 1983 and hermetically sealed the operating system from users, I did not go out and buy one. In fact, like many of my era, I did eventually end up on the PC side which, ironically, let me do many of the things that my trusty Apple ][+ had …