Gotowa bibliografia na temat „Secured ubiquitous services”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Secured ubiquitous services”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Secured ubiquitous services"

1

Ogbodo, Emmanuel Utochukwu, Adnan M. Abu-Mahfouz i Anish M. Kurien. "A Survey on 5G and LPWAN-IoT for Improved Smart Cities and Remote Area Applications: From the Aspect of Architecture and Security". Sensors 22, nr 16 (22.08.2022): 6313. http://dx.doi.org/10.3390/s22166313.

Pełny tekst źródła
Streszczenie:
Addressing the recent trend of the massive demand for resources and ubiquitous use for all citizens has led to the conceptualization of technologies such as the Internet of Things (IoT) and smart cities. Ubiquitous IoT connectivity can be achieved to serve both urban and underserved remote areas such as rural communities by deploying 5G mobile networks with Low Power Wide Area Network (LPWAN). The current architectures will not offer flexible connectivity to many IoT applications due to high service demand, data exchange, emerging technologies, and security challenges. Hence, this paper explores various architectures that consider a hybrid 5G-LPWAN-IoT and Smart Cities. This includes security challenges as well as endogenous security and solutions in 5G and LPWAN-IoT. The slicing of virtual networks using software-defined network (SDN)/network function virtualization (NFV) based on the different quality of service (QoS) to satisfy different services and quality of experience (QoE) is presented. Also, a strategy that considers the implementation of 5G jointly with Weightless-N (TVWS) technologies to reduce the cell edge interference is considered. Discussions on the need for ubiquity connectivity leveraging 5G and LPWAN-IoT are presented. In addition, future research directions are presented, including a unified 5G network and LPWAN-IoT architecture that will holistically support integration with emerging technologies and endogenous security for improved/secured smart cities and remote areas IoT applications. Finally, the use of LPWAN jointly with low earth orbit (LEO) satellites for ubiquitous IoT connectivity is advocated in this paper.
Style APA, Harvard, Vancouver, ISO itp.
2

Bouchemal, Nardjes, Ramdane Maamri i Mohammed Chihoub. "Securing Ambient Agents Groups by Using Verification, Judgment and Surveillance". International Journal of Ambient Computing and Intelligence 5, nr 3 (lipiec 2013): 44–60. http://dx.doi.org/10.4018/ijaci.2013070104.

Pełny tekst źródła
Streszczenie:
Ubiquitous computing and ambient intelligence (or AmI) models raise the need for secured systems, due to increased heterogeneity, intelligence and dynamism. Information in such environments is managed by systems formed mostly of devices with limited capabilities. Indeed, AmI characteristics, difficult to handle by traditional computing concepts, are making the agent paradigm to gain impetus and increasing the interest of researchers and industry in this concept. However, the inherent complexity of information security is bigger in agent-based AmI systems built by gathering distributed information and services that are not under the control of a single entity, and introduce new security and privacy concerns. In fact, securing these systems requires protecting any element from every other. This paper proposes a mechanism for enhancing security and privacy while using agents in AmI environments, based on three main building blocks: verification, judgment and surveillance. Furthermore, the key idea is based on cooperation and collective decision.
Style APA, Harvard, Vancouver, ISO itp.
3

Hsu, Ching-Hsien, Jong Hyuk Park, Laurence T. Yang i Mario Freire. "Secure communications and data management in ubiquitous services". International Journal of Communication Systems 22, nr 9 (wrzesień 2009): 1065–68. http://dx.doi.org/10.1002/dac.1057.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Kim, Sung-Ki, Jin-Chul Jung, Kyung-No Park i Byoung-Joon Min. "Secure Jini Service Architecture Providing Ubiquitous Services Having Persistent States". KIPS Transactions:PartC 15C, nr 3 (30.06.2008): 157–66. http://dx.doi.org/10.3745/kipstc.2008.15-c.3.157.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Hsu, Robert C., Jong Hyuk Park, Laurence T. Yang i Mario Freire. "Call for Papers: ‘Secure Communications and Data Management in Ubiquitous Services’". International Journal of Communication Systems 21, nr 5 (2008): 569–70. http://dx.doi.org/10.1002/dac.940.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Zhou, Yousheng, i Longan Wang. "A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity". Security and Communication Networks 2020 (28.06.2020): 1–19. http://dx.doi.org/10.1155/2020/2637916.

Pełny tekst źródła
Streszczenie:
In the ubiquitous networks, mobile nodes can obtain roaming service that enables them to get access to the services extended by their home networks in the field of foreign network. To provide secure and anonymous communication for legal mobile users in roaming services, there should be a mutual authentication between mobile user and foreign agent with the help of home agent. There are many roaming authentication schemes which have been proposed; however, with the progress of quantum computation, quantum attack poses security threats to many traditional public key cryptography-based authentication schemes; thus, antiquantum attack roaming authentication schemes need to be investigated. On account of the limitation of computational resources for mobile nodes, a lightweight anonymous and antiquantum authentication schemes need to be developed to enable mobile nodes to roam across multiple service domains securely and seamlessly. In consideration of the advantages of lattice in antiquantum, an NTRU-based authentication scheme with provable security and conditional privacy preservation is proposed to remedy these security weaknesses. Compared with the existing scheme, the proposed scheme not only improves efficiency but also can resist the quantum attack.
Style APA, Harvard, Vancouver, ISO itp.
7

Abumarshoud, Hanaa, Cheng Chen, Mohamed Sufyan Islim i Harald Haas. "Optical wireless communications for cyber-secure ubiquitous wireless networks". Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 476, nr 2242 (październik 2020): 20200162. http://dx.doi.org/10.1098/rspa.2020.0162.

Pełny tekst źródła
Streszczenie:
Wireless connectivity is no longer limited to facilitating communications between individuals, but is also required to support diverse and heterogeneous applications, services and infrastructures. Internet of things (IoT) systems will dominate future technologies, allowing any and all devices to create, share and process data. If artificial intelligence resembles the brain of IoT, then high-speed connectivity forms the nervous system that connects the devices. For IoT to safely operate autonomously, it requires highly secure and reliable wireless links. In this article, we shed light on the potential of optical wireless communications to provide high-speed secure and reliable ubiquitous access as an enabler for fifth generation and beyond wireless networks.
Style APA, Harvard, Vancouver, ISO itp.
8

Bahl, P., W. Russell, Yi-Min Wang, A. Balachandran, G. M. Voelker i A. Miu. "PAWNs: Satisfying the need for ubiquitos secure connectivity and location services". IEEE Wireless Communications 9, nr 1 (luty 2002): 40–48. http://dx.doi.org/10.1109/mwc.2002.986457.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Mahmood, Zahid, Huansheng Ning, Ata Ullah i Xuanxia Yao. "Secure Authentication and Prescription Safety Protocol for Telecare Health Services Using Ubiquitous IoT". Applied Sciences 7, nr 10 (16.10.2017): 1069. http://dx.doi.org/10.3390/app7101069.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Jagadamba, G., i B. Sathish Babu. "Context and Trust Based Adaptive Security for Accessing Services in Ubiquitous Computing Environment". International Journal of Systems and Service-Oriented Engineering 6, nr 4 (październik 2016): 1–21. http://dx.doi.org/10.4018/ijssoe.2016100101.

Pełny tekst źródła
Streszczenie:
The smart spaces built on the ubiquitous network make the services available for every entity in a seamless way using the most suitable resource provider. However, all services are not equally sensitive; hence do not require the same levels of security. In this paper, the authors propose an adaptive security scheme which handles service requests originating from heterogeneous contexts and belonging to different trust levels. The adaptive security scheme includes user classification, situational analysis and dynamic generation of appropriate security policies. The proposed security scheme can be made use to secure application built on the Ubiquitous Computing Environment (UCE) such as health care, smart office, smart ubiquitous home, etc.
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Secured ubiquitous services"

1

Green, Les, i Linas Maknavicius. "Secure Billing for Ubiquitous Service Delivery". W Performability Has its Price, 90–101. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11780502_9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Enokibori, Yu, i Nobuhiko Nishio. "Realizing a Secure Federation of Multi-institutional Service Systems". W Ubiquitous Computing Systems, 146–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11526858_12.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Anzai, Jun, i Tsutomu Matsumoto. "How to Construct Secure Cryptographic Location-Based Services". W Embedded and Ubiquitous Computing – EUC 2005 Workshops, 894–904. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11596042_92.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Kim, Jangseong, Joonsang Baek, Kwangjo Kim i Jianying Zhou. "A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments". W Public Key Infrastructures, Services and Applications, 45–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22633-5_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Xu, Hanqiu, Qingping Wang, Jing Zhou i Ou Ruan. "An Efficient Provably Secure Password-Based Authenticated Key Agreement". W Innovative Mobile and Internet Services in Ubiquitous Computing, 423–34. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61542-4_40.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Yoon, Miyeon, i Jonghyun Baek. "A Study on Framework for Developing Secure IoT Service". W Advances in Computer Science and Ubiquitous Computing, 289–94. Singapore: Springer Singapore, 2015. http://dx.doi.org/10.1007/978-981-10-0281-6_42.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Park, Jong Hyuk, Ji-Sook Park, Sang-Jin Lee i Byoung-Soo Koh. "A DRBAC Model Based on Context for Smart and Secure Services in Intelligent Ubiquitous Home". W Ubiquitous Intelligence and Computing, 893–901. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11833529_91.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Deng, Xinyang, Tianhan Gao, Nan Guo i Kang Xie. "A Secure Data Sharing Scheme Based on CP-ABE in VANETs". W Innovative Mobile and Internet Services in Ubiquitous Computing, 65–74. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-08819-3_7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Ju, Seunghwan, Jaekyoung Lee, Joonyoung Park i Junshin Lee. "Secure Concept of SCADA Communication for Offshore Wind Energy". W Advances in Parallel and Distributed Computing and Ubiquitous Services, 91–97. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0068-3_11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Yang, Jun, Ruiqing Liu i Baojiang Cui. "Enhanced Secure ZigBee Light Link Protocol Based on Network Key Update Mechanism". W Innovative Mobile and Internet Services in Ubiquitous Computing, 343–53. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93554-6_32.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Secured ubiquitous services"

1

Acker, Robin, i Michael Massoth. "Secure Ubiquitous House and Facility Control Solution". W 2010 Fifth International Conference on Internet and Web Applications and Services. IEEE, 2010. http://dx.doi.org/10.1109/iciw.2010.45.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Peng, Kun, i Feng Bao. "A Design of Secure Ubiquitous Network Service". W Applications (ICUT). IEEE, 2009. http://dx.doi.org/10.1109/icut.2009.5405751.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Tamazirt, Lotfi, Farid Alilat i Nazim Agoulmine. "NFC-based ubiquitous monitoring system for e-industry". W 2017 Third International Conference On Mobile And Secure Services (MobiSecServ). IEEE, 2017. http://dx.doi.org/10.1109/mobisecserv.2017.7886568.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Jia, Hong. "Ubiquitous, Secure, and Efficient Mobile Sensing Systems". W MobiSys '23: 21st Annual International Conference on Mobile Systems, Applications and Services. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3581791.3597511.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Trabelsi, Slim, Jean-christphe Pazzaglia i Yves Roudier. "Secure Web Service Discovery: Overcoming Challenges of Ubiquitous Computing". W 2006 European Conference on Web Services (ECOWS'06). IEEE, 2006. http://dx.doi.org/10.1109/ecows.2006.33.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Kang, Kyungran, Jungtae Lee, Kyoungwon Beak, Sungeun Park i Jaehwan Kim. "A Mobile Community Service Platform Promoting Ubiquitous Collaboration". W 2011 IEEE 9th International Conference on Dependable, Autonomic and Secure Computing (DASC). IEEE, 2011. http://dx.doi.org/10.1109/dasc.2011.156.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Suciu, George, Muneeb Anwar i Roxana Mihalcioiu. "VIRTUALIZED VIDEO AND CLOUD COMPUTING FOR EFFICIENT ELEARNING". W eLSE 2017. Carol I National Defence University Publishing House, 2017. http://dx.doi.org/10.12753/2066-026x-17-114.

Pełny tekst źródła
Streszczenie:
Multimedia content has become more and more popular in current eLearning platforms. However, there are still many use cases which require virtualized resources from cloud platforms: gamification, video analytics, and surveillance during exams, video conferencing for coaching, and video streaming (live and video-on-demand) services. This paper has the purpose to present how video services can exploit the virtualization techniques to provide ubiquitous video learning experience. Virtualization consists of multiple operating systems on a single physical system. Virtualization shares the underlying hardware resources, providing multiple execution environments for software partitioning and time-sharing. Furthermore, virtualization is the basis for cloud computing, which is adaptable and secure sharing of resources as a service, leading to ease of use for different types of computing platforms. This gives to the teachers the authority to deploy their curricula to new channels and to promote it with efficient video communication solutions. It is expected, from this point of view, that virtualization will contribute in a beneficial way to these use cases. The main concept we present in this paper is how to virtualize the video services and utilizing them combined with other eLearning techniques, whereas the virtualization technique permits virtualization for full server machines along with the whole operating system. The main objective is to demonstrate they can be monitored and easily be maintained, as well being extremely secure and provide uninterrupted services. Furthermore, virtualized video using Cloud would establish and provide quality eLearning relationships regardless of distance and devices or operating systems, being accessible through a web browser.
Style APA, Harvard, Vancouver, ISO itp.
8

Leung, Adrian, i Chris J. Mitchell. "A Device Management Framework for Secure Ubiquitous Service Delivery". W 2008 Fourth International Conference on Information Assurance and Security (IAS). IEEE, 2008. http://dx.doi.org/10.1109/ias.2008.28.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Park, HeeMan, YoungLok Lee, HyungHyo Lee, BongNam Noh, Theodore E. Simos i George Psihoyios. "Secure Event Service using SPKI∕SDSI Certificate in Ubiquitous". W INTERNATIONAL ELECTRONIC CONFERENCE ON COMPUTER SCIENCE. AIP, 2008. http://dx.doi.org/10.1063/1.3037064.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Ge, Meng, Kwok-Yan Lam, Jianbin Li i Siu-Leung Chung. "Ubiquitous and Secure Certificate Service for Mobile Ad Hoc Network". W 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC). IEEE, 2008. http://dx.doi.org/10.1109/euc.2008.91.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Secured ubiquitous services"

1

African Open Science Platform Part 1: Landscape Study. Academy of Science of South Africa (ASSAf), 2019. http://dx.doi.org/10.17159/assaf.2019/0047.

Pełny tekst źródła
Streszczenie:
This report maps the African landscape of Open Science – with a focus on Open Data as a sub-set of Open Science. Data to inform the landscape study were collected through a variety of methods, including surveys, desk research, engagement with a community of practice, networking with stakeholders, participation in conferences, case study presentations, and workshops hosted. Although the majority of African countries (35 of 54) demonstrates commitment to science through its investment in research and development (R&D), academies of science, ministries of science and technology, policies, recognition of research, and participation in the Science Granting Councils Initiative (SGCI), the following countries demonstrate the highest commitment and political willingness to invest in science: Botswana, Ethiopia, Kenya, Senegal, South Africa, Tanzania, and Uganda. In addition to existing policies in Science, Technology and Innovation (STI), the following countries have made progress towards Open Data policies: Botswana, Kenya, Madagascar, Mauritius, South Africa and Uganda. Only two African countries (Kenya and South Africa) at this stage contribute 0.8% of its GDP (Gross Domestic Product) to R&D (Research and Development), which is the closest to the AU’s (African Union’s) suggested 1%. Countries such as Lesotho and Madagascar ranked as 0%, while the R&D expenditure for 24 African countries is unknown. In addition to this, science globally has become fully dependent on stable ICT (Information and Communication Technologies) infrastructure, which includes connectivity/bandwidth, high performance computing facilities and data services. This is especially applicable since countries globally are finding themselves in the midst of the 4th Industrial Revolution (4IR), which is not only “about” data, but which “is” data. According to an article1 by Alan Marcus (2015) (Senior Director, Head of Information Technology and Telecommunications Industries, World Economic Forum), “At its core, data represents a post-industrial opportunity. Its uses have unprecedented complexity, velocity and global reach. As digital communications become ubiquitous, data will rule in a world where nearly everyone and everything is connected in real time. That will require a highly reliable, secure and available infrastructure at its core, and innovation at the edge.” Every industry is affected as part of this revolution – also science. An important component of the digital transformation is “trust” – people must be able to trust that governments and all other industries (including the science sector), adequately handle and protect their data. This requires accountability on a global level, and digital industries must embrace the change and go for a higher standard of protection. “This will reassure consumers and citizens, benefitting the whole digital economy”, says Marcus. A stable and secure information and communication technologies (ICT) infrastructure – currently provided by the National Research and Education Networks (NRENs) – is key to advance collaboration in science. The AfricaConnect2 project (AfricaConnect (2012–2014) and AfricaConnect2 (2016–2018)) through establishing connectivity between National Research and Education Networks (NRENs), is planning to roll out AfricaConnect3 by the end of 2019. The concern however is that selected African governments (with the exception of a few countries such as South Africa, Mozambique, Ethiopia and others) have low awareness of the impact the Internet has today on all societal levels, how much ICT (and the 4th Industrial Revolution) have affected research, and the added value an NREN can bring to higher education and research in addressing the respective needs, which is far more complex than simply providing connectivity. Apart from more commitment and investment in R&D, African governments – to become and remain part of the 4th Industrial Revolution – have no option other than to acknowledge and commit to the role NRENs play in advancing science towards addressing the SDG (Sustainable Development Goals). For successful collaboration and direction, it is fundamental that policies within one country are aligned with one another. Alignment on continental level is crucial for the future Pan-African African Open Science Platform to be successful. Both the HIPSSA ((Harmonization of ICT Policies in Sub-Saharan Africa)3 project and WATRA (the West Africa Telecommunications Regulators Assembly)4, have made progress towards the regulation of the telecom sector, and in particular of bottlenecks which curb the development of competition among ISPs. A study under HIPSSA identified potential bottlenecks in access at an affordable price to the international capacity of submarine cables and suggested means and tools used by regulators to remedy them. Work on the recommended measures and making them operational continues in collaboration with WATRA. In addition to sufficient bandwidth and connectivity, high-performance computing facilities and services in support of data sharing are also required. The South African National Integrated Cyberinfrastructure System5 (NICIS) has made great progress in planning and setting up a cyberinfrastructure ecosystem in support of collaborative science and data sharing. The regional Southern African Development Community6 (SADC) Cyber-infrastructure Framework provides a valuable roadmap towards high-speed Internet, developing human capacity and skills in ICT technologies, high- performance computing and more. The following countries have been identified as having high-performance computing facilities, some as a result of the Square Kilometre Array7 (SKA) partnership: Botswana, Ghana, Kenya, Madagascar, Mozambique, Mauritius, Namibia, South Africa, Tunisia, and Zambia. More and more NRENs – especially the Level 6 NRENs 8 (Algeria, Egypt, Kenya, South Africa, and recently Zambia) – are exploring offering additional services; also in support of data sharing and transfer. The following NRENs already allow for running data-intensive applications and sharing of high-end computing assets, bio-modelling and computation on high-performance/ supercomputers: KENET (Kenya), TENET (South Africa), RENU (Uganda), ZAMREN (Zambia), EUN (Egypt) and ARN (Algeria). Fifteen higher education training institutions from eight African countries (Botswana, Benin, Kenya, Nigeria, Rwanda, South Africa, Sudan, and Tanzania) have been identified as offering formal courses on data science. In addition to formal degrees, a number of international short courses have been developed and free international online courses are also available as an option to build capacity and integrate as part of curricula. The small number of higher education or research intensive institutions offering data science is however insufficient, and there is a desperate need for more training in data science. The CODATA-RDA Schools of Research Data Science aim at addressing the continental need for foundational data skills across all disciplines, along with training conducted by The Carpentries 9 programme (specifically Data Carpentry 10 ). Thus far, CODATA-RDA schools in collaboration with AOSP, integrating content from Data Carpentry, were presented in Rwanda (in 2018), and during17-29 June 2019, in Ethiopia. Awareness regarding Open Science (including Open Data) is evident through the 12 Open Science-related Open Access/Open Data/Open Science declarations and agreements endorsed or signed by African governments; 200 Open Access journals from Africa registered on the Directory of Open Access Journals (DOAJ); 174 Open Access institutional research repositories registered on openDOAR (Directory of Open Access Repositories); 33 Open Access/Open Science policies registered on ROARMAP (Registry of Open Access Repository Mandates and Policies); 24 data repositories registered with the Registry of Data Repositories (re3data.org) (although the pilot project identified 66 research data repositories); and one data repository assigned the CoreTrustSeal. Although this is a start, far more needs to be done to align African data curation and research practices with global standards. Funding to conduct research remains a challenge. African researchers mostly fund their own research, and there are little incentives for them to make their research and accompanying data sets openly accessible. Funding and peer recognition, along with an enabling research environment conducive for research, are regarded as major incentives. The landscape report concludes with a number of concerns towards sharing research data openly, as well as challenges in terms of Open Data policy, ICT infrastructure supportive of data sharing, capacity building, lack of skills, and the need for incentives. Although great progress has been made in terms of Open Science and Open Data practices, more awareness needs to be created and further advocacy efforts are required for buy-in from African governments. A federated African Open Science Platform (AOSP) will not only encourage more collaboration among researchers in addressing the SDGs, but it will also benefit the many stakeholders identified as part of the pilot phase. The time is now, for governments in Africa, to acknowledge the important role of science in general, but specifically Open Science and Open Data, through developing and aligning the relevant policies, investing in an ICT infrastructure conducive for data sharing through committing funding to making NRENs financially sustainable, incentivising open research practices by scientists, and creating opportunities for more scientists and stakeholders across all disciplines to be trained in data management.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii