Jul-Sep 2014
Sr. No
Title
2|Page
3|Page
Who interacts on the Web?: The intersection of users' personality and social media use
Abstract
In the increasingly user-generated Web, users personality traits may be crucial factors leading them to engage in this participatory media.
The literature suggests factors such as extraversion, emotional stability and openness to experience are related to uses of social applications
on the Internet. Using a national sample of US adults, this study investigated the relationship between these three dimensions of the Big-Five
model and social media use (defined as use of social networking sites and instant messages). It also examined whether gender and age played
a role in that dynamic. Results revealed that while extraversion and openness to experiences were positively related to social media use,
emotional stability was a negative predictor, controlling for socio-demographics and life satisfaction. These findings differed by gender and
age. While extraverted men and women were both likely to be more frequent users of social media tools, only the men with greater degrees
of emotional instability were more regular users. The relationship between extraversion and social media use was particularly important
among the young adult cohort. Conversely, being open to new experiences emerged as an important personality predictor of social media use
for the more mature segment of the sample.
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
Abstract:
With the significant advances in Information and Communications Technology (ICT) over the last half century, there is an increasingly
perceived vision that computing will one day be the 5th utility (after water, electricity, gas, and telephony). This computing utility, like all other
four existing utilities, will provide the basic level of computing service that is considered essential to meet the everyday needs of the general
community. To deliver this vision, a number of computing paradigms have been proposed, of which the latest one is known as Cloud
computing. Hence, in this paper, we define Cloud computing and provide the architecture for creating Clouds with market-oriented resource
allocation by leveraging technologies such as Virtual Machines (VMs). We also provide insights on market-based resource management
strategies that encompass both customer-driven service management and computational risk management to sustain Service Level
Agreement (SLA)-oriented resource allocation. In addition, we reveal our early thoughts on interconnecting Clouds for dynamically creating
global Cloud exchanges and markets. Then, we present some representative Cloud platforms, especially those developed in industries, along
with our current work towards realizing market-oriented resource allocation of Clouds as realized in Aneka enterprise Cloud technology.
Furthermore, we highlight the difference between High Performance Computing (HPC) workload and Internet-based services workload. We
also describe a meta-negotiation infrastructure to establish global Cloud exchanges and markets, and illustrate a case study of harnessing
Storage Clouds for high performance content delivery. Finally, we conclude with the need for convergence of competing IT paradigms to
deliver our 21st century vision.
4|Page
5|Page
information showing that such behavior leads to both increased study time to achieve learning parity and an increase in mistakes while
processing information than those who are sequentially or serially processing that same information. This article presents the preliminary
results of a descriptive and exploratory survey study involving Facebook use, often carried out simultaneously with other study activities, and
its relation to academic performance as measured by self-reported Grade Point Average (GPA) and hours spent studying per week. Results
show that Facebook users reported having lower GPAs and spend fewer hours per week studying than nonusers.
10
11
The relationship between cell phone use, academic performance, anxiety, and Satisfaction with Life in college students
Abstract
While functional differences between todays cell phones and traditional computers are becoming less clear, one difference remains plain
cell phones are almost always on-hand and allow users to connect with an array of services and networks at almost any time and any place.
The Pew Centers Internet and American Life Project suggests that college students are the most rapid adopters of cell phone technology
and research is emerging which suggests high frequency cell phone use may be influencing their health and behavior. Thus, we investigated
the relationships between total cell phone use (N = 496) and texting (N = 490) on Satisfaction with Life (SWL) in a large sample of college
students. It was hypothesized that the relationship would be mediated by Academic Performance (GPA) and anxiety. Two separate path
models indicated that the cell phone use and texting models had good overall fit. Cell phone use/texting was negatively related to GPA and
positively related to anxiety; in turn, GPA was positively related to SWL while anxiety was negatively related to SWL. These findings add to the
debate about student cell phone use, and how increased use may negatively impact academic performance, mental health, and subjective
well-being or happiness.
6|Page
12
Data mining techniques and applications - A decade review from 2000 to 2011
Abstract
In order to determine how data mining techniques (DMT) and their applications have developed, during the past decade, this paper reviews
data mining techniques and their applications and development, through a survey of literature and the classification of articles, from 2000 to
2011. Keyword indices and article abstracts were used to identify 216 articles concerning DMT applications, from 159 academic journals
(retrieved from five online databases), this paper surveys and classifies DMT, with respect to the following three areas: knowledge types,
analysis types, and architecture types, together with their applications in different research and practical domains. A discussion deals with the
direction of any future developments in DMT methodologies and applications: (1) DMT is finding increasing applications in expertise
orientation and the development of applications for DMT is a problem-oriented domain. (2) It is suggested that different social science
methodologies, such as psychology, cognitive science and human behavior might implement DMT, as an alternative to the methodologies
already on offer. (3) The ability to continually change and acquire new understanding is a driving force for the application of DMT and this will
allow many new future applications.
13
Multi-criteria decision making approaches for supplier evaluation and selection: A literature review
Abstract:
Supplier evaluation and selection problem has been studied extensively. Various decision making approaches have been proposed to tackle
the problem. In contemporary supply chain management, the performance of potential suppliers is evaluated against multiple criteria rather
than considering a single factor-cost. This paper reviews the literature of the multi-criteria decision making approaches for supplier evaluation
and selection. Related articles appearing in the international journals from 2000 to 2008 are gathered and analyzed so that the following three
questions can be answered: (i) Which approaches were prevalently applied? (ii) Which evaluating criteria were paid more attention to? (iii) Is
there any inadequacy of the approaches? Based on the inadequacy, if any, some improvements and possible future work are recommended.
This research not only provides evidence that the multi-criteria decision making approaches are better than the traditional cost-based
approach, but also aids the researchers and decision makers in applying the approaches effectively.
7|Page
14
15
16
8|Page
The rise of''big data''on cloud computing: Review and open research issues
Abstract
Cloud computing is a powerful technology to perform massive-scale and complex computing. It eliminates the need to maintain expensive
computing hardware, dedicated space, and software. Massive growth in the scale of data or big data generated through cloud computing has
been observed. Addressing big data is a challenging and time-demanding task that requires a large computational infrastructure to ensure
successful data processing and analysis. The rise of big data in cloud computing is reviewed in this study. The definition, characteristics, and
classification of big data along with some discussions on cloud computing are introduced. The relationship between big data and cloud
computing, big data storage systems, and Hadoop technology are also discussed. Furthermore, research challenges are investigated, with
focus on scalability, availability, data integrity, data transformation, data quality, data heterogeneity, privacy, legal and regulatory issues, and
governance. Lastly, open research issues that require substantial research efforts are summarized.
17
A tale of two sites: Twitter vs. Facebook and the personality predictors of social media usage
Abstract
Social networking sites (SNS) are quickly becoming one of the most popular tools for social interaction and information exchange. Previous
research has shown a relationship between users personality and SNS use. Using a general population sample (N = 300), this study furthers
such investigations by examining the personality correlates (Neuroticism, Extraversion, Openness-to-Experience, Agreeableness,
Conscientiousness, Sociability and Need-for-Cognition) of social and informational use of the two largest SNS: Facebook and Twitter. Age and
Gender were also examined. Results showed that personality was related to online socialising and information seeking/exchange, though not
as influential as some previous research has suggested. In addition, a preference for Facebook or Twitter was associated with differences in
personality. The results reveal differential relationships between personality and Facebook and Twitter usage.
18
Identifying back doors, attack points, and surveillance mechanisms in iOS devices
Abstract
The iOS operating system has long been a subject of interest among the forensics and law enforcement communities. With a large base of
interest among consumers, it has become the target of many hackers and criminals alike, with many celebrity thefts (For example, the recent
article How did Scarlett Johansson's phone get hacked?) of data raising awareness to personal privacy. Recent revelations (Privacy
scandal: NSA can spy on smart phone data, 2013 and How the NSA spies on smartphones including the BlackBerry) exposed the use (or abuse)
of operating system features in the surveillance of targeted individuals by the National Security Agency (NSA), of whom some subjects appear
to be American citizens. This paper identifies the most probable techniques that were used, based on the descriptions provided by the media,
and today's possible techniques that could be exploited in the future, based on what may be back doors, bypass switches, general weaknesses,
or surveillance mechanisms intended for enterprise use in current release versions of iOS. More importantly, I will identify several services and
mechanisms that can be abused by a government agency or malicious party to extract intelligence on a subject, including services that may in
fact be back doors introduced by the manufacturer. A number of techniques will also be examined in order to harden the operating system
against attempted espionage, including counter-forensics techniques.
19
Reverse logistics and closed-loop supply chain: A comprehensive review to explore the future
Abstract
Based on environmental, legal, social, and economic factors, reverse logistics and closed-loop supply chain issues have attracted attention
among both academia and practitioners. This attention is evident by the vast number of publications in scientific journals which have been
9|Page
published in recent years. Hence, a comprehensive literature review of recent and state-of-the-art papers is vital to draw a framework of the
past, and to shed light on future directions. The aim of this paper is to review recently published papers in reverse logistic and closed-loop
supply chain in scientific journals. A total of 382 papers published between January 2007 and March 2013 are selected and reviewed. The
papers are then analyzed and categorized to construct a useful foundation of past research. Finally, gaps in the literature are identified to
clarify and to suggest future research opportunities.
20
21
22
10 | P a g e
SNS, followed by number of peers, and usefulness. The number of peers and perceived complementarity have stronger influence than the
number of members on perceived benefits (usefulness and enjoyment). This work also ran clustering analysis by gender, which found notable
difference in both number of peers and number of members between men and women. The number of peers is an important factor affecting
the continued intention to use for women but not for men; the number of members has no significant effect on enjoyment for men. The
findings suggest that gender difference also produces different influences. The implication of research and discussions provides reference for
SNS operators in marketing and operation.
23
Who uses Facebook? An investigation into the relationship between the Big Five, shyness, narcissism, loneliness, and Facebook usage
24
Abstract:
The unprecedented popularity of the social networking site Facebook raises a number of important questions regarding the impact it has on
sociality. However, as Facebook is a very recent social phenomenon, there is a distinct lack of psychological theory relating to its use. While
research has begun to identify the types of people who use Facebook, this line of investigation has been limited to student populations. The
current study aimed to investigate how personality influences usage or non-usage of Facebook. The sample consisted of 1324 self-selected
Australian Internet users (1158 Facebook users and 166 Facebook nonusers), between the ages of 18 and 44. Participants were required to
complete an online questionnaire package comprising the Big Five Inventory (BFI), the Narcissistic Personality Inventory 29-item version
(NPI-29), the Revised Cheek and Buss Shyness Scale (RCBS), and the Social and Emotional Loneliness Scale for Adults Short version (SELSA-S).
Facebook users also completed a Facebook usage questionnaire. The results showed that Facebook users tend to be more extraverted and
narcissistic, but less conscientious and socially lonely, than nonusers. Furthermore, frequency of Facebook use and preferences for specific
features were also shown to vary as a result of certain characteristics, such as neuroticism, loneliness, shyness and narcissism. It is hoped that
research in this area continues, and leads to the development of theory regarding the implications and gratifications of Facebook use.
Wireless sensor network survey
Abstract:
A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been
enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with
wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the
application, and it must consider factors such as the environment, the applications design objectives, cost, hardware, and system
constraints. The goal of our survey is to present a comprehensive review of the recent literature since the publication of [I.F. Akyildiz, W. Su, Y.
Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 2002]. Following a top-down approach, we
give an overview of several new applications and then review the literature on various aspects of WSNs. We classify the problems into three
different categories: (1) internal platform and underlying operating system, (2) communication protocol stack, and (3) network services,
provisioning, and deployment. We review the major development in these three categories and outline new challenges.
11 | P a g e
25
12 | P a g e