Academic literature on the topic 'Social service – Computer network resources'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Social service – Computer network resources.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Social service – Computer network resources"

1

Xu, Zonggang. "Social Governance Structure Construction and Resource Allocation Methods under the Management Mode of the Internet of Things." Wireless Communications and Mobile Computing 2021 (July 20, 2021): 1–12. http://dx.doi.org/10.1155/2021/7963311.

Full text
Abstract:
Aiming at the problems in the social governance structure level under the management mode of the Internet of Things, this paper designs a network agent based on the idea of service grid construction that has the functions of service resource configuration discovery, load balancing, and protocol conversion. Using it as a service governance infrastructure reduces the coupling between business services and service governance, and the network agent will intercept the service call traffic within the platform to achieve cross-protocol and cross-frame service communication. Through the proposed global query decomposition strategy and algorithm, a global query mapping is realized, which solves the problem of global query decomposition based on the global data model. We designed the unified management mechanism of two commonly used IoT databases based on XML. This process involves the realization of heterogeneous Internet of Things database resource configuration, data mode conversion, and global query mapping. Among them, in the process of data schema conversion, the conflict of the data in the schema mapping is resolved, the XML Schema is generated, the schema mapping metadata is established, and the XML document of the data is generated. We build a framework for optimal allocation of cloud computing resources based on load forecasting and propose an adaptive elastic control system for resource allocation based on resource status monitoring and demand forecasting. In view of the low resource utilization problem caused by the resource management mode of single virtual machine serving single user adopted by Internet of Things service providers, this paper constructs a new public cloud architecture with a five-layer structure. On the basis of this architecture, an adaptive configuration mode of virtualized resources based on a single virtual machine serving multiple users is proposed. This mode can automatically search for optimal virtualization resources for application resource requests made by different users and run different applications on the same virtual machine without affecting the quality of service, so that IoT providers can guarantee services. At the same time, it improves the utilization efficiency of IoT resources and reduces energy consumption.
APA, Harvard, Vancouver, ISO, and other styles
2

Du, Zhao, Xiaolong Fu, Can Zhao, Ting Liu, and Qifeng Liu. "University campus social network system for knowledge sharing." Computer Science and Information Systems 9, no. 4 (2012): 1721–37. http://dx.doi.org/10.2298/csis120215055d.

Full text
Abstract:
Public online social network services have achieved dazzling success in recent years. As a result, vertical social network services for universities are expected warmly by campus users. As the majority of activities in university campus are knowledge and social interaction intensive, one of the core functions of campus social network system is to facilitate knowledge sharing on campus. In the cyberspace of universities, knowledge is stored in various kinds of digital resources such as documents, photos, videos etc. In this paper, we discuss the design and implementation of our campus social network system, concentrating on knowledge sharing mechanism in the system. The knowledge sharing mechanism has five features including the utilization of users? personal social network to facilitate the dissemination of digital resources, the use of a six-tuple model based tagging to realize the unified labeling for digital resources, the fine-grained access control based on friend lists for safer knowledge sharing, the adoption of a multiscale evaluation method for digital resources and personalized recommendation for digital resource with social graph based collaborative filtering as its core idea. With all these considerations, we expect to improve the efficiency and effectiveness of knowledge while enlarging the dissemination scope of digital resources carrying it in cyberspace of universities.
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Xu. "Optimizing MPBSM Resource Allocation Based on Revenue Management: A China Mobile Sichuan Case." Mobile Information Systems 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/892705.

Full text
Abstract:
The key to determining the network service level of telecom operators is resource allocation for mobile phone base station maintenance (MPBSM). Given intense market competition and higher consumer requirements for network service levels, an increasing proportion of resources have been allocated to MPBSM. Maintenance costs account for the rising fraction of direct costs, and the management of MPBSM resource allocation presents special challenges to telecom operators. China Mobile is the largest telecom operator in the world. Its subsidiary, China Mobile Sichuan, is the first in China to use revenue management in improving MPBSM resource allocation. On the basis of comprehensive revenue (including both economic revenue and social revenue), the subsidiary established a classification model of its base stations. The model scientifically classifies more than 25,000 base stations according to comprehensive revenue. China Mobile Sichuan also conducted differentiation allocation of MPBSM resources on the basis of the classification results. Furthermore, it optimized the assessment system of the telecom base stations to establish an assurance system for the use of MPBSM resources. After half-year implementation, the cell availability of both VIP base stations and total base stations significantly improved. The optimization also reduced economic losses to RMB 10.134 million, and enhanced customer satisfaction with network service by 3.2%.
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Zhong, and Chuan Zhou. "5G Embedded Sensor Network System for Sports Information Service Hotspot Recommendation." Wireless Communications and Mobile Computing 2022 (March 4, 2022): 1–12. http://dx.doi.org/10.1155/2022/8134290.

Full text
Abstract:
How to rationally allocate and integrate existing resources has become the top priority of the development of sports public information services in the transition period, but it is also a weak link in the construction of current social information resources. This article is aimed at studying how to develop sports information service hotspots based on 5G embedded sensor network systems. Methods such as the network structure based on 5G embedded sensors, the Kriging algorithm based on global optimization, and sensor distance measurement are proposed and also conducted experiments on the application of 5G embedded sensor network system in sports information service hotspot recommendation. The results show that people are satisfied with the sports information service of the wireless sensor network, with a maximum score of 9.8, which is suitable for the information provision of sports information services. The development of the times has met the needs of most people.
APA, Harvard, Vancouver, ISO, and other styles
5

Wu, Jia, Fangfang Gou, Wangping Xiong, and Xian Zhou. "A Reputation Value-Based Task-Sharing Strategy in Opportunistic Complex Social Networks." Complexity 2021 (November 26, 2021): 1–16. http://dx.doi.org/10.1155/2021/8554351.

Full text
Abstract:
As the Internet of Things (IoT) smart mobile devices explode in complex opportunistic social networks, the amount of data in complex networks is increasing. Large amounts of data cause high latency, high energy consumption, and low-reliability issues when dealing with computationally intensive and latency-sensitive emerging mobile applications. Therefore, we propose a task-sharing strategy that comprehensively considers delay, energy consumption, and terminal reputation value (DERV) for this context. The model consists of a task-sharing decision model that integrates latency and energy consumption, and a reputation value-based model for the allocation of the computational resource game. The two submodels apply an improved particle swarm algorithm and a Lagrange multiplier, respectively. Mobile nodes in the complex social network are given the opportunity to make decisions so that they can choose to share computationally intensive, latency-sensitive computing tasks to base stations with greater computing power in the same network. At the same time, to prevent malicious competition from end nodes, the base station decides the allocation of computing resources based on a database of reputation values provided by a trusted authority. The simulation results show that the proposed strategy can meet the service requirements of low delay, low power consumption, and high reliability for emerging intelligent applications. It effectively realizes the overall optimized allocation of computation sharing resources and promotes the stable transmission of massive data in complex networks.
APA, Harvard, Vancouver, ISO, and other styles
6

YUAN, SOE-TYSR, and JOAN TSAO. "AN INCENTIVE MECHANISM FOR AD-HOC WIRELESS CONTENT SERVICE: CONTEXTUALIZED MICRO PRICING." International Journal of Information Technology & Decision Making 09, no. 01 (January 2010): 81–113. http://dx.doi.org/10.1142/s021962201000366x.

Full text
Abstract:
Sophisticated mobile wireless, net-connected devices are allowing people who do not know each other to cluster temporarily around information of mutual interest. Rheingold characterized the sociology of this brave new world of social medium as a world of "ad-hocracy". This paper aims to explore a force that can drive context-sensitive companionable relationships or activities in the "ad-hocracy" world of wireless ad-hoc networks and presents a contextualized micro-pricing mechanism for content services operating in the environment of wireless ad-hoc networks. This is a novel effective pricing mechanism that involves both value-based pricing and contextualized consideration of perishability (in terms of time, location, and urgency). This mechanism is the first attempt in adding the contextual element into pricing and is believed to encourage further exploration of pricing methods in the "ad-hocracy" world. The notion of contextualized micro-pricing is believed not only to improve mobile peers' willingness to furnish differentiated services but also to enhance the distribution of the service resources on the social medium of the wireless ad-hoc network environments.
APA, Harvard, Vancouver, ISO, and other styles
7

Sun, Jian, Guanhua Huang, Arun Kumar Sangaiah, Guangyang Zhu, and Xiaojiang Du. "Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective." Security and Communication Networks 2019 (March 14, 2019): 1–15. http://dx.doi.org/10.1155/2019/4074272.

Full text
Abstract:
Network function virtualization (NFV) is a new way to provide services to users in a network. Different from dedicated hardware that realizes the network functions for an IoT application, the network function of an NFV network is executed on general servers, and in order to achieve complete network functions, service function chaining (SFC) chains virtual network functions to work together to support an IoT application. In this paper, we focus on a main challenge in this domain, i.e., resource efficient provisioning for social IoT application oriented SFC requests. We propose an online SFC deployment algorithm based on the layered strategies of physical networks and an evaluation of physical network nodes, which can efficiently reduce bandwidth resource consumption (OSFCD-LSEM) and support the security and privacy of social IoT applications. The results of our simulation show that our proposed algorithm improves the bandwidth carrying rate, time efficiency, and acceptance rate by 50%, 60%, and 15%, respectively.
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Li, Yue Li, and Ruotong Li. "Double Auction-Based Two-Level Resource Allocation Mechanism for Computation Offloading in Mobile Blockchain Application." Mobile Information Systems 2021 (January 18, 2021): 1–15. http://dx.doi.org/10.1155/2021/8821583.

Full text
Abstract:
It is increasingly popular that platforms integrate various services into mobile applications due to the high usage and convenience of mobile devices, many of which demand high computational capacities and energy, such as cryptocurrency services based on blockchain. However, it is hard for mobile devices to run these services due to the limited storage and computational capacity. In this paper, the problem of computation offloading that requires sufficient computing resources with high utilization in large-scale users and multiprovider MEC system was investigated. A mechanism based on the combinatorial double auction, G-TRAP, is proposed in this paper to solve the above problem. In the mechanism, resources are provided both in the cloud and at the edge of the network. Mobile users compete for these resources to offload computing tasks by the rule that the edge-level resources will be allocated at first while cloud-level resources could be the supplement for the edge level. Given that the proof-of-work (PoW), the core issue of blockchain application, is resource-expensive to implement in mobile devices, we provide resource allocation service to users of blockchain application as experimental subjects. Simulation results show that the proposed mechanism for serving large-scale users in a short execution time outperforms two existing algorithms in terms of social utility and resource utilization. Consequently, our proposed system can effectively solve the intensive computation offloading problem of mobile blockchain applications.
APA, Harvard, Vancouver, ISO, and other styles
9

Niese, Bethany, and Sharath Sasidharan. "Getting Social." International Journal of Knowledge Management 18, no. 1 (January 1, 2022): 1–23. http://dx.doi.org/10.4018/ijkm.313956.

Full text
Abstract:
Knowledge acquired by end users through their social networks facilitates optimal use of a newly implemented enterprise system. Existing research has conceptualized end users as being the only actors within such networks. Knowledge ties between actors have been treated as unidimensional. The actor-network theory emphasizes the role of all actors in influencing networking outcomes; hence, this study proposes an expanded multimodal social network that includes four institutionally mandated knowledge actors: the technology champions, the help desk, the service desk, and the shared inbox. Knowledge ties are treated as bidimensional through incorporating both technical and business process knowledge. Data collected from an enterprise resource planning system implementation validated this approach; end users sourced knowledge from other end users and the institutionally mandated network actors based on contextual requirements. End user performance outcomes were significantly associated with knowledge source and knowledge dimension.
APA, Harvard, Vancouver, ISO, and other styles
10

Hussain, Nazmul, Hai H. Wang, Christopher D. Buckingham, and Xiaoyuan Zhang. "Software Agent-Centric Semantic Social Network for Cyber-Physical Interaction and Collaboration." International Journal of Software Engineering and Knowledge Engineering 30, no. 06 (June 2020): 859–93. http://dx.doi.org/10.1142/s0218194020400100.

Full text
Abstract:
Considerable research has recently focused on integrating cyber-physical systems in a social context. However, several challenges remain concerning appropriate methodologies, frameworks and techniques for supporting socio-cyber-physical collaboration. Existing systems do not recognize how cyber-physical resources can be socially connected so that they interact in collaborative decision-making like humans. Furthermore, the lack of semantic representations for heterogeneous cyber-social-collaborative networks limits integration, interoperability and knowledge discovery from their underlying data sources. Semantic Web ontology models can help to overcome this limitation by semantically describing and interconnecting cyber-physical objects and human participants in a social space. This research addresses the establishment of both cyber-physical and human relationships and their interactions within a social-collaborative network. We discuss how nonhuman resources can be represented as socially connected nodes and utilized by software agents. A software agent-centric Semantic Social-Collaborative Network (SSCN) is then presented that provides functionality to represent and manage cyber-physical resources in a social network. It is supported by an extended ontology model for semantically describing human and nonhuman resources and their social interactions. A software agent has been implemented to perform some actions on behalf of the nonhuman resources to achieve cyber-physical collaboration. It is demonstrated within a real-world decision support system, GRiST (www.egrist.org), used by mental-health services in the UK.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Social service – Computer network resources"

1

Yang, Weilai. "Pricing Network Resources for Differentiated Service Networks." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5227.

Full text
Abstract:
We developed a price-based resource allocation scheme for Differentiated Service (DiffServ) data networks. The DiffServ framework was proposed to provide multiple QoS classes over IP networks. Since the provider supports multiple service classes, we need a differentiated pricing scheme, as supposed to the flat-rate scheme employed by the Internet service providers of today. Charging efficiently is a big issue. The utility of a client correlates to the amount of bandwidth allocated. One difficulty we face is that determining the appropriate amount of bandwidth to provision and allocate is problematic due to different time scales, multiple QoS classes and the unpredictable nature of users. To approach this problem, we designed a pricing strategy for Admission Control and bandwidth assignment. Despite the variety of existing pricing strategies, the common theme is that the appropriate pricing policy rewards users for behaving in ways to improve the overall utilization and performance of the network. Among existing schemes, we chose auction because it is scalable, and efficiently and fairly shares resources. Our pricing model takes the system's availability and each customer's requirements as inputs and outputs the set of clients who are admitted into the network and their allocated resource. Each client proposes a desired bandwidth and a price that they are willing to pay for it. The service provider collects this information and produces parameters for each class of service they provide. This information is used to decide which customers to admit. We proposed an optimal solution to the problem of maximizing the provider's revenue for the special case where there is only one bottleneck link in the network. Then for the generalized network, we resort to a simple but effective heuristic method. We validate both the optimal solution and the heuristic algorithm with simulations driven by a real traffic scenario. Finally, we allow customers to bid on the duration for which the service is needed. Then we study the performance of those heuristic algorithms in this new setting and propose possible improvements.
APA, Harvard, Vancouver, ISO, and other styles
2

Vuza, Xolisa. "Social and technical issues of IP-based multi-modal semi-synchronous communication: rural telehealth communication in South Africa." Thesis, University of the Western Cape, 2005. http://etd.uwc.ac.za/index.php?module=etd&amp.

Full text
Abstract:
Most rural areas of developing countries are faced with problems like shortage of doctors in hospitals, illiteracy and poor power supply. Because of these issues, Information and Communication Technology (ICT) is often sees as a useful solution for these areas. Unfortunately, the social environment is often ignored. This leads to inappropriate systems being developed for these areas. The aims of this thesis were firstly, to learn how a communication system can be built for a rural telehealth environment in a developing country, secondly to learn how users can be supported to use such a system.
APA, Harvard, Vancouver, ISO, and other styles
3

Elsmore, Chris. "Neighbourhood Watch : social resource monitoring." Thesis, Swansea University, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.678659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Shu-leung Sammy. "The evolving internet services industry in HK : strategic management on changes and service innovation /." Hong Kong : University of Hong Kong, 1997. http://sunzi.lib.hku.hk/hkuto/record.jsp?B18831308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

MAARADJI, Abderrahmane. "End-user service composition from a social networks analysis perspective." Phd thesis, Institut National des Télécommunications, 2011. http://tel.archives-ouvertes.fr/tel-00762647.

Full text
Abstract:
Service composition has risen from the need to make information systems more flexible and open. The Service Oriented Architecture has become the reference architecture model for applications carried by the impetus of Internet (Web). In fact, information systems are able to expose interfaces through the Web which has increased the number of available Web services. On the other hand, with the emergence of the Web 2.0, service composition has evolved toward web users with limited technical skills. Those end-users, named Y generation, are participating, creating, sharing and commenting content through the Web. This evolution in service composition is translated by the reference paradigm of Mashup and Mashup editors such as Yahoo Pipes! This paradigm has established the service composition within end users community enabling them to meet their own needs, for instance by creating applications that do not exist. Additionally, Web 2.0 has brought also its social dimension, allowing users to interact, either directly through the online social networks or indirectly by sharing, modifying content, or adding metadata. In this context, this thesis aims to support the evolving concept of service composition through meaningful contributions. The main contribution of this thesis is indeed the introduction of the social dimension within the process of building a composite service through end users' dedicated environments. In fact, this concept of social dimension considers the activity of compositing services (creating a Mashup) as a social activity. This activity reveals social links between users based on their similarity in selecting and combining services. These links could be an interesting dissemination means of expertise, accumulated by users when compositing services. In other terms, based on frequent composition patterns, and similarity between users, when a user is editing a Mashup, dynamic recommendations are proposed. These recommendations aim to complete the initial part of Mashup already introduced by the user. This concept has been explored through (i) a step-by-step Mashup completion by recommending a single service at each step, and (ii) a full Mashup completion approaches by recommending the whole sequence of services that could complete the Mashup. Beyond pushing a vision for integrating the social dimension in the service composition process, this thesis has addressed a particular constraint for this recommendation system which conditions the interactive systems requirements in terms of response time. In this regard, we have developed robust algorithms adapted to the specificities of our problem. Whereas a composite service is considered as a sequence of basic service, finding similarities between users comes first to find frequent patterns (subsequences) and then represent them in an advantageous data structure for the recommendation algorithm. The proposed algorithm FESMA, provide exactly those requirements based on the FSTREE structure with interesting results compared to the prior art. Finally, to implement the proposed algorithms and methods, we have developed a Mashup creation framework, called Social Composer (SoCo). This framework, dedicated to end users, firstly implements abstraction and usability requirements through a workflow-based graphic environment. As well, it implements all the mechanisms needed to deploy composed service starting from an abstract description entered by the user. More importantly, SoCo has been augmented by including the dynamic recommendation functionality, demonstrating by the way the feasibility of this concept.
APA, Harvard, Vancouver, ISO, and other styles
6

Kang, Youn Ah. "Informing design of visual analytics systems for intelligence analysis: understanding users, user tasks, and tool usage." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44847.

Full text
Abstract:
Visual analytics, defined as "the science of analytical reasoning facilitated by interactive visual interfaces," emerged several years ago as a new research field. While it has seen rapid growth for its first five years of existence, the main focus of visual analytics research has been on developing new techniques and systems rather than identifying how people conduct analysis and how visual analytics tools can help the process and the product of sensemaking. The intelligence analysis community in particular has not been fully examined in visual analytics research even though intelligence analysts are one of the major target users for which visual analytics systems are built. The lack of understanding about how analysts work and how they can benefit from visual analytics systems has created a gap between tools being developed and real world practices. This dissertation is motivated by the observation that existing models of sensemaking/intelligence analysis do not adequately characterize the analysis process and that many visual analytics tools do not truly meet user needs and are not being used effectively by intelligence analysts. I argue that visual analytics research needs to adopt successful HCI practices to better support user tasks and add utility to current work practices. As the first step, my research aims (1) to understand work processes and practices of intelligence analysts and (2) to evaluate a visual analytics system in order to identify where and how visual analytics tools can assist. By characterizing the analysis process and identifying leverage points for future visual analytics tools through empirical studies, I suggest a set of design guidelines and implications that can be used for both designing and evaluating future visual analytics systems.
APA, Harvard, Vancouver, ISO, and other styles
7

Sukontapatipak, Songkwun. "International students' reliance on home-country related internet use." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2899.

Full text
Abstract:
The present study draws on uses and gratifications and media system dependency perspectives for examining factors related to Internet usage behaviors of international students and their motives to use their home-country Internet resources.
APA, Harvard, Vancouver, ISO, and other styles
8

Banoobhai-Anwar, Ilhaam. "The role of e-commerce in five-star hotels in the Cape Town Metropole." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2489.

Full text
Abstract:
Thesis (MTech (Tourism and Hospitality Management))--Cape Peninsula University of Technology, 2016.
Electronic commerce, popularly referred to as e-commerce, is the latest catchphrase surrounding the Internet and its many functions. In the past, the Internet was solely used for information seeking, but the 21st century has brought a new global economy to the fore – one that is conducted online. Tourism is seen as a driver of economic growth, contributing both to the Gross Domestic Product (GDP) of South Africa (SA) and creating jobs in the hospitality sector. E-commerce does not only provide a platform for business to be conducted online but also an opportunity for consumers to interact directly with industry. Many studies have been done previously about the perceived benefits of e-commerce in the retail sector, yet none in Cape Town and at five-star hotels in particular. It is well known that holidaymakers conduct an online search prior to booking accommodation; some of those potential guests in turn choose to finalise their bookings online. The purpose of the study was to investigate the role of e-commerce in five-star hotels in the Cape Town Metropole. The main objective of this study was to define what e-commerce is for five-star hotels in the Cape Town Metropole and determine if the hotels are using e-commerce as a booking method. Online questionnaires were used to gather primary data and a literature review was presented as secondary data. The findings of this study showed that all the hotels surveyed use online bookings and half of the respondents believe Online Travel Agents (OTAs) generate more revenue than traditional methods of room reservation. When asked to rank methods of room’s reservations, there was a slight difference between telephone bookings and e-commerce as number one. This could mean that while electronic methods are popular, they have not completely replaced traditional methods. The researcher recommends that five-star hotel managers train the rooms’ division staff to respond to negative reviews on social media, as this was one of the findings. The hotels should also learn how to effectively use their social media presence to increase room sales.
APA, Harvard, Vancouver, ISO, and other styles
9

Khunyeli, Ramotsamai Itumeleng. "'Technic' practices of the computer game Lanner: identity development through the LAN-gameplay experience." Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1013405.

Full text
Abstract:
This thesis is a reception analysis using qualitative interviews to investigate the formation of cultural groups around computer-game LANs present in Rhodes University. It also looks at how issues of social inequalities evident on the university's campus impact on the participation of students in these LANs. The findings of this study are that the participants have established a community around the practice of computer LAN-gameplay based on values developed through the combination of the material and gameworlds. It serves as a home-on-campus for them; where they can fully explore their passion for games thus reaffirming their identity as gamers on a campus where being a gamer is viewed negatively. In this light, computer-game playing is not just a practice these participants perform, but a culture they live out every day. This is a culture predominantly lived out by men. One of the reasons for this is because most women have been raised to believe to have negative predispositions about digital gaming e.g. that it is childish, addictive and anti-social, but also that computer are meant to be used by men - women use them only when it is absolutely necessary, for example, that it is childish, for academic-related purposes. As a result, not many of them will use computers for any otherreason for fear of being socially criticised. In addition, the gaming culture being dominated by whites is due to the fact that admittance in to this community is still unaffordable for the majority of black students on the Rhodes University campus as a result of their social backgrounds.
APA, Harvard, Vancouver, ISO, and other styles
10

Uawithya, Pariphan. "Corporate social responsibility : a content analysis of corporate websites in Hong Kong, Japan, Malaysia, and Taiwan." Virtual Press, 2005. http://liblink.bsu.edu/uhtbin/catkey/1313954.

Full text
Abstract:
Corporate social responsibility (CSR) reporting in annual reports has been investigated by researchers over the past three decades. Because the Internet has significantly eased dissemination of information to global audiences, companies have begun to report CSR-related materials on their corporate websites.The present study is a content analysis examining what CSR principles, processes, and issues are mentioned on corporate websites of top companies in Hong Kong, Japan, Malaysia, and Taiwan. Two coders analyzed seventy-one websites: Hong Kong (19), Japan (19), Taiwan (19), and Malaysia (14). Content on the websites were coded based on definitions and categorizations which were patterned after Maignan and Ralston's 2002 study on CSR reporting.
Department of Journalism
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Social service – Computer network resources"

1

Coe, Jo Ann R. Computers and information technology in social work: Education, training, and practice. New York: Haworth Press, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cesar, Madrigal, and Millán Antonio, eds. Allyn and Bacon quick guide to the Internet for social workers. Boston: Allyn and Bacon, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Social work on the net: 2002 edition. Boston: Allyn and Bacon, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1959-, Martin Jennifer, and Hawkins Linette, eds. Information communication technologies for human services education and delivery: Concepts and cases. Hershey, PA: Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yaffe, Joanne. Social work on the net: 2001 edition. Boston: Allyn and Bacon, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

How to find information: Social sciences. London: British Library, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Grant, Gary B. The social worker's Internet handbook. Harrisburg, Pa: White Hat Communications, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yaffe, Joanne. Allyn and Bacon quick guide to the Internet for social work. Boston: Allyn and Bacon, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Doug, Gotthoffer, ed. Allyn and Bacon quick guide to the Internet for social work. 2nd ed. Boston: Allyn and Bacon, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Neil, Jacobs, and Huxley Lesly, eds. Online information services in the social sciences. Oxford: Chandos Pub., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Social service – Computer network resources"

1

Yu, Bangchao, Wei Zheng, Xiangming Wen, Zhaoming Lu, Luhan Wang, and Lu Ma. "Dynamic Resource Orchestration of Service Function Chaining in Network Function Virtualizations." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 132–45. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72823-0_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sillanpää, Niina, Sami Älli, and Timo Övermark. "Easy-to-Use Social Network Service." In Lecture Notes in Computer Science, 544–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14097-6_87.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dolgushin, Mikhail, Dayana Ismakova, Yuliya Bidulya, Igor Krupkin, Galina Barskaya, and Anastasiya Lesiv. "Toxic Comment Classification Service in Social Network." In Speech and Computer, 157–65. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87802-3_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jeong, HwaYoung, and BongHwa Hong. "CSP Based Relation Structure for Social Network Service." In Computer Applications for Software Engineering, Disaster Recovery, and Business Continuity, 163–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35267-6_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Treiber, Martin, Hong-Linh Truong, and Schahram Dustdar. "SOAF – Design and Implementation of a Service-Enriched Social Network." In Lecture Notes in Computer Science, 379–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02818-2_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shi, Zhan, Zanhong Wu, Yutu Liang, and Xuchuan Huang. "Carrier Network Link Loss Rate Reasoning Algorithm Based on Network Resources and Service Characteristics." In Proceedings of the 11th International Conference on Computer Engineering and Networks, 1402–11. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-6554-7_155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kuchař, Štěpán, Jan Martinovič, Pavla Dráždilová, and Kateřina Slaninová. "Synthetic Social Network Based on Competency-Based Description of Human Resources." In Computer Information Systems and Industrial Management, 313–24. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40925-7_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hullár, Béla, Sándor Laki, József Stéger, István Csabai, and Gábor Vattay. "SONoMA: A Service Oriented Network Measurement Architecture." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 27–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29273-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Joosten, Rieks, Frank den Hartog, and Franklin Selgert. "Architecture of a Personal Network Service Layer." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 131–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03569-2_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mau, Dung Ong, Jialun Wang, Long Wang, Long Hu, Yujun Ma, and Yin Zhang. "SIMON: Seamless servIce MigratiON in Mobile Network." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 261–70. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13326-3_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Social service – Computer network resources"

1

Şaykol, Ediz. "On the Economical Impacts of Cloud Computing in Information Technology Industry." In International Conference on Eurasian Economies. Eurasian Economists Association, 2014. http://dx.doi.org/10.36880/c05.00851.

Full text
Abstract:
Cloud computing, as defined by United States National Institute of Standards and Technology (NIST), “... is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” Goal of the study is to highlight the positive economical impacts of cloud computing for companies, which can be assessed by focusing on their business goals to make more profit. Under the cloud computing model, firms can rent as many virtual machines as they need at any given time, and either design or use off-the-shelf solutions to integrate company-wide data and then easily distribute access to users within and outside of the company. Hence, cloud computing converts fixed capital costs to variable costs, prevents under or over provisioning, and allows minute by minute flexibility. Hence, the companies concentrate on their own business goals on top on a stable and effective information technology backbone. Most literature on cloud computing reside in computer science resources. However, there is little work focusing on the social and economic significance of cloud computing in the economics literature. Hence, this paper first discusses the basics of the cloud computing along with its implications on information technology (IT) field, with paying special attention to economical aspects. Then, empirical results and elaborations are to be given to yield a conclusion.
APA, Harvard, Vancouver, ISO, and other styles
2

Onescu, Dragos ionut. "EU AND CYBER SECURITY." In eLSE 2016. Carol I National Defence University Publishing House, 2016. http://dx.doi.org/10.12753/2066-026x-16-063.

Full text
Abstract:
EU and cyber security Securing network and information systems in the EU is essential to ensure prosperity and to keep the online economy running. The European Union works on a number of fronts to ensure cybersecurity in Europe, from providing the delivery of better internet for kids to implementing the international cooperation on cybersecurity and cybercrime. As societies, governments and businesses become increasingly reliant on the Internet for the normal functioning of every-day activities and the supply of essential services, protecting cyberspace from malicious activities has become a critical action point for policymakers globally. While digital and networked technologies promise much, the implications of successful attacks can be huge. The continued rapid development of information and communication technologies, globalization, the drastic increase in data volumes and the growing number of different types of equipment connected to data networks have an impact on daily life, the economy and the functioning of the state. On the one hand, this level of ICT development will contribute to the improved availability and usability of services, enhance transparency and citizen participation in governance, and cut public as well as private sector costs. On the other hand, the increasing importance of technology is accompanied by an increase in the state's growing dependence on already entrenched e-solutions, and cements the expectation of technology operating eamlessly. Social processes are also becoming increasingly dependent on a growing number of information technology resources, and in the future attention must be drawn to the fact that society at large, and each individual in particular, will be able to maintain control over the corresponding processes. Otherwise, there is potential for information technologies to reduce the role of humans in the decision-making process, and processes may become self-regulatory (technological singularity). The number of state actors in cyberspace that are involved in cyber espionage targeted at computers connected to the Internet as well as closed networks continues to grow, with their aim being to collect information on both national security as well as economic interests. The amount and activeness of states capable of cyber-attacks are increasing. In addition to the activation of state actors, the ability of politically motivated individuals and groups with limited means to organize their activities using social networks and carry out denial of service and other types of attacks is growing as well. Meaningful and effective cooperation between the public and private sector in the development of cyber security organization as well as in preventing and resolving cyber incidents is becoming increasingly unavoidable. National defense and internal security are dependent on the private sector's infrastructure and resources, while at the same time the state can assist vital service providers and guarantors of national critical information infrastructure as a coordinator and balancer of various interests.
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Zhi-zhong, and Matthew Liu. "Computer Mediated Communication, Social Network and Service Industry." In 2006 International Conference on Service Systems and Service Management. IEEE, 2006. http://dx.doi.org/10.1109/icsssm.2006.320704.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Chen-Yi, Wei-Ya Lai, Wang-Tian Fu, Yun-Sheng Chen, Yuan-Zhen Wang, and Kuan-Cheng Jian. "Want You: A Novel Social Network Service." In 2016 International Computer Symposium (ICS). IEEE, 2016. http://dx.doi.org/10.1109/ics.2016.0074.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stanica, Olivian. "E-LEARNING FOR THE DEVELOPMENT NEW SKILLS IN SECURITY OF INFORMATION FIELD : E-CYBER SECURITY COMPETENCE." In eLSE 2014. Editura Universitatii Nationale de Aparare "Carol I", 2014. http://dx.doi.org/10.12753/2066-026x-14-129.

Full text
Abstract:
The emergence of threats of attacks in cyberspace requires from all governmental or non-governmental security measures and protection of critical infrastructures are vulnerable to these means. Therefore to find solutions, including training and education of computer users in the XXI century is imminent. E-Learning is required to be developed and generalized to all computer users a new security culture and a new e-cyber security competence. Why is needed to develop a new e-cyber security competence because, in 2014 we are talking about e-crime, e-terrorism or e-war in cyberspace. E-cyber security culture must include training / awareness / education organizational competence users (be they experts, business people or simply beneficiaries ICT) data protection, proper use of procedures for the use of cyberspace. In other words it is about the formation of ethical and moral skills that enable citizens, according to their aspirations and belonging to a modern and civilized society. The problem to be addressed in other areas such as economic security, social, food, environmental, industrial, military, etc. Today, the cyberspace identified four major threats: spam - unsolicited e-mail messages that users upload mailboxes worldwide, bugs - undiscovered software errors that lead to data corruption and security vulnerabilities, attacks type "denial of services" - users are deprived of resources and services (personal HDD or the entire network bandwidth) and malicious software - viruses, worms, trojans and spyware programmes. Therefore e-Learning could be a good option in order to develop new cyber security skills of the users in a variety of ways and new e-Learning technologies could be integrated into the mainstream of education and training programmes.
APA, Harvard, Vancouver, ISO, and other styles
6

Nguyen, The-Tuyen, Xuan-Luong Vu, and Phuong Le-Hong. "Building Vietnamese Linguistic Resources for Social Network Text Analysis." In 2018 5th NAFOSTED Conference on Information and Computer Science (NICS). IEEE, 2018. http://dx.doi.org/10.1109/nics.2018.8606863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cadere, Christian, Dominique Barth, and Sandrine Vial. "Virtualization and allocation of network service resources using graph embedding." In 2008 23rd International Symposium on Computer and Information Sciences (ISCIS). IEEE, 2008. http://dx.doi.org/10.1109/iscis.2008.4717942.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Min Hang Liu and Shu Mei Li. "Research on evaluation of sports network information resources value." In 2011 International Conference on Computer Science and Service System (CSSS). IEEE, 2011. http://dx.doi.org/10.1109/csss.2011.5974950.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Derawi, Mohammad. "E-Education with Facebook - A Social Network Service." In Fifth International Conference on Computer Science, Engineering and Applications. Academy & Industry Research Collaboration Center (AIRCC), 2015. http://dx.doi.org/10.5121/csit.2015.50210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hu, Dongfang, Yuanhao Ji, and Yan Zhao. "Research on Software Resources Encapsulation Technology Based on Cloud Manufacturing Service." In 2016 International Conference on Sensor Network and Computer Engineering. Paris, France: Atlantis Press, 2016. http://dx.doi.org/10.2991/icsnce-16.2016.88.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Social service – Computer network resources"

1

Varina, Hanna B., Viacheslav V. Osadchyi, Kateryna P. Osadcha, Svetlana V. Shevchenko, and Svitlana H. Lytvynova. Peculiarities of cloud computing use in the process of the first-year students' adaptive potential development. [б. в.], June 2021. http://dx.doi.org/10.31812/123456789/4453.

Full text
Abstract:
Technologies based on cloud computing is one of the demanded and actively developing areas of the modern information world. Cloud computing refers to an innovative technology that allows you to combine IT resources of various hardware platforms into a single whole and provide the user with access to them via a local network or the global Internet. Cloud services from various providers offer users access to their resources via the Internet via free or shareware cloud applications, the hardware and software requirements of which do not imply that the user has high-performance and resource-consuming computers. Cloud technologies represent a new way of organizing the educational process and offers an alternative to traditional methods of organizing the educational process, creates an opportunity for personal learning, collective teaching, interactive classes, and the organization of psychological support. The scientific article is devoted to the problem of integrating cloud technologies not only in the process of training highly qualified specialists, but also in the formation of professionally important personality traits. The article describes the experience of introducing cloud technologies into the process of forming the adaptive potential of students in conditions of social constraints caused by the COVID-19 pandemic.
APA, Harvard, Vancouver, ISO, and other styles
2

McKenna, Patrick, and Mark Evans. Emergency Relief and complex service delivery: Towards better outcomes. Queensland University of Technology, June 2021. http://dx.doi.org/10.5204/rep.eprints.211133.

Full text
Abstract:
Emergency Relief (ER) is a Department of Social Services (DSS) funded program, delivered by 197 community organisations (ER Providers) across Australia, to assist people facing a financial crisis with financial/material aid and referrals to other support programs. ER has been playing this important role in Australian communities since 1979. Without ER, more people living in Australia who experience a financial crisis might face further harm such as crippling debt or homelessness. The Emergency Relief National Coordination Group (NCG) was established in April 2020 at the start of the COVID-19 pandemic to advise the Minister for Families and Social Services on the implementation of ER. To inform its advice to the Minister, the NCG partnered with the Institute for Governance at the University of Canberra to conduct research to understand the issues and challenges faced by ER Providers and Service Users in local contexts across Australia. The research involved a desktop review of the existing literature on ER service provision, a large survey which all Commonwealth ER Providers were invited to participate in (and 122 responses were received), interviews with a purposive sample of 18 ER Providers, and the development of a program logic and theory of change for the Commonwealth ER program to assess progress. The surveys and interviews focussed on ER Provider perceptions of the strengths, weaknesses, future challenges, and areas of improvement for current ER provision. The trend of increasing case complexity, the effectiveness of ER service delivery models in achieving outcomes for Service Users, and the significance of volunteering in the sector were investigated. Separately, an evaluation of the performance of the NCG was conducted and a summary of the evaluation is provided as an appendix to this report. Several themes emerged from the review of the existing literature such as service delivery shortcomings in dealing with case complexity, the effectiveness of case management, and repeat requests for service. Interviews with ER workers and Service Users found that an uplift in workforce capability was required to deal with increasing case complexity, leading to recommendations for more training and service standards. Several service evaluations found that ER delivered with case management led to high Service User satisfaction, played an integral role in transforming the lives of people with complex needs, and lowered repeat requests for service. A large longitudinal quantitative study revealed that more time spent with participants substantially decreased the number of repeat requests for service; and, given that repeat requests for service can be an indicator of entrenched poverty, not accessing further services is likely to suggest improvement. The interviews identified the main strengths of ER to be the rapid response and flexible use of funds to stabilise crisis situations and connect people to other supports through strong local networks. Service Users trusted the system because of these strengths, and ER was often an access point to holistic support. There were three main weaknesses identified. First, funding contracts were too short and did not cover the full costs of the program—in particular, case management for complex cases. Second, many Service Users were dependent on ER which was inconsistent with the definition and intent of the program. Third, there was inconsistency in the level of service received by Service Users in different geographic locations. These weaknesses can be improved upon with a joined-up approach featuring co-design and collaborative governance, leading to the successful commissioning of social services. The survey confirmed that volunteers were significant for ER, making up 92% of all workers and 51% of all hours worked in respondent ER programs. Of the 122 respondents, volunteers amounted to 554 full-time equivalents, a contribution valued at $39.4 million. In total there were 8,316 volunteers working in the 122 respondent ER programs. The sector can support and upskill these volunteers (and employees in addition) by developing scalable training solutions such as online training modules, updating ER service standards, and engaging in collaborative learning arrangements where large and small ER Providers share resources. More engagement with peak bodies such as Volunteering Australia might also assist the sector to improve the focus on volunteer engagement. Integrated services achieve better outcomes for complex ER cases—97% of survey respondents either agreed or strongly agreed this was the case. The research identified the dimensions of service integration most relevant to ER Providers to be case management, referrals, the breadth of services offered internally, co-location with interrelated service providers, an established network of support, workforce capability, and Service User engagement. Providers can individually focus on increasing the level of service integration for their ER program to improve their ability to deal with complex cases, which are clearly on the rise. At the system level, a more joined-up approach can also improve service integration across Australia. The key dimensions of this finding are discussed next in more detail. Case management is key for achieving Service User outcomes for complex cases—89% of survey respondents either agreed or strongly agreed this was the case. Interviewees most frequently said they would provide more case management if they could change their service model. Case management allows for more time spent with the Service User, follow up with referral partners, and a higher level of expertise in service delivery to support complex cases. Of course, it is a costly model and not currently funded for all Service Users through ER. Where case management is not available as part of ER, it might be available through a related service that is part of a network of support. Where possible, ER Providers should facilitate access to case management for Service Users who would benefit. At a system level, ER models with a greater component of case management could be implemented as test cases. Referral systems are also key for achieving Service User outcomes, which is reflected in the ER Program Logic presented on page 31. The survey and interview data show that referrals within an integrated service (internal) or in a service hub (co-located) are most effective. Where this is not possible, warm referrals within a trusted network of support are more effective than cold referrals leading to higher take-up and beneficial Service User outcomes. However, cold referrals are most common, pointing to a weakness in ER referral systems. This is because ER Providers do not operate or co-locate with interrelated services in many cases, nor do they have the case management capacity to provide warm referrals in many other cases. For mental illness support, which interviewees identified as one of the most difficult issues to deal with, ER Providers offer an integrated service only 23% of the time, warm referrals 34% of the time, and cold referrals 43% of the time. A focus on referral systems at the individual ER Provider level, and system level through a joined-up approach, might lead to better outcomes for Service Users. The program logic and theory of change for ER have been documented with input from the research findings and included in Section 4.3 on page 31. These show that ER helps people facing a financial crisis to meet their immediate needs, avoid further harm, and access a path to recovery. The research demonstrates that ER is fundamental to supporting vulnerable people in Australia and should therefore continue to be funded by government.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography