access Satellite Internet access By www.buildwebsite4u.com Published On :: Fri, 04 Feb 2005 15:00:00 GMT If you can get a clear view of the southern sky, you can use satellite Internet access to surf the Web, download files, or get streaming media. While it's not as cheap or simple to install as cable modems or DSL, in areas not served by them, it's the best (and only) choice. Full Article
access Faucet.com - 10% off $149 Bathroom Accessory purchase By www.allonlinecoupons.com Published On :: 10% off $149 Bathroom Accessory purchase Full Article
access Car ID - 20% off Car and Truck Accessories By www.allonlinecoupons.com Published On :: 20% off Car and Truck Accessories Full Article
access South Africa: Women in SA Could Have Access to a Three-Monthly HIV Prevention Ring By 2026 By allafrica.com Published On :: Mon, 04 Nov 2024 11:50:14 GMT [spotlight] A flexible silicone ring that slowly releases antiretrovirals is one of just two long-acting HIV prevention products registered for use in South Africa. Results from a new study might pave the way for a longer-acting version of the vaginal ring that provides three months of protection at a time, as opposed to one month with the current ring. Elri Voigt reports on these findings and looks at how the one-month ring has influenced HIV prevention choices in South Africa. Full Article HIV-Aids and STDs Health and Medicine South Africa Southern Africa Women and Gender
access Nigeria: Access, Hacey Partners On Improving Maternal Healthcare By allafrica.com Published On :: Fri, 08 Nov 2024 13:59:03 GMT [This Day] A social and developmental organisation, HACEY, has partnered with Access Corporation to improve maternal health outcomes for mothers at Meiran Primary Healthcare Center, Lagos. Full Article Health and Medicine Nigeria West Africa Women and Gender
access Lost and Found: 2 Million LaSalle Bank Customers – An ACCESS Fraud Alert By www.guardmycreditfile.org Published On :: Fri, 23 Dec 2005 19:37:50 GMT December 21, 2005 – Last week a computer tape containing the names, addresses, account information, payment histories and Social Security Number of 2 million people disappeared while in transit. The tape, which contained data on all of LaSalle Bank’s mortgage customers, had been shipped via DHL to Experian by the bank in November. It then reappeared two days ago. Full Article
access That Call from Your Credit Card Company May Actually be a Crook! – An ACCESS Fraud Alert By www.guardmycreditfile.org Published On :: Sat, 07 Jan 2006 02:43:52 GMT January 6, 2006 – A new credit card scam has appeared in New York and appears to be moving west. Victims of the scam receive a call that they think is from their credit card company. Unfortunately, a lot of people are falling for this new telephone pitch, and having their credit ruined in the process. Full Article
access Tax Time Fraudsters Working Overtime – An ACCESS Fraud Alert By financialprivacy.blogspot.com Published On :: Mon, 13 Feb 2006 19:21:59 GMT February 13, 2006 – With tax time fast approaching, the scam artists are out in droves. They are using a variety of ploys to fool consumers and engage in identity theft. Although most of these tricks have been used in the past, consumers continue to fall for them. Full Article
access Two New Internet Scams to Look Out For – An ACCESS Fraud Alert By www.guardmycreditfile.org Published On :: Fri, 06 Jan 2006 02:12:08 GMT January 5, 2006 – Two new scams have hit the internet, with one common goal; making you part with your personal financial information. From all accounts, it looks like the scam artists are having a pretty good week. But with a little knowledge, you stand a fighting chance of keeping both your credit and your identity in tact. Full Article
access Computer Worm Set to Attack Tomorrow – An ACCESS Fraud Alert By financialprivacy.blogspot.com Published On :: Thu, 02 Feb 2006 17:04:18 GMT February 2, 2006 – A computer worm that is believed to have infected about 300,000 computers is set to attack tomorrow. The worm will begin destroying a variety of files on the computers that it resides on, including Adobe PDF files, Microsoft Word documents, and other files created in Microsoft Office. Full Article
access February 14, 2006 – ACCESS has been concerned for months that the State Department’s plan to include RFID chips in passports has not been well thought out. The original plan would have placed an RFID chip in every passport which would have contained unenc By financialprivacy.blogspot.com Published On :: Tue, 14 Feb 2006 22:27:06 GMT February 14, 2006 – ACCESS has been concerned for months that the State Department’s plan to include RFID chips in passports has not been well thought out. The original plan would have placed an RFID chip in every passport which would have contained unencrypted data about the passport holder. After a storm of protest, the State Department revised the standard to include some encryption. Now, a Dutch television news program has along and broken that encryption in less than two hours. The ramifications of this to passport holders are anything but positive. Full Article
access Call of Duty: Black Ops 6 to launch globally without early campaign access By tribune.com.pk Published On :: Tue, 10 Sep 24 10:55:11 +0500 Game will have a unified global launch across all modes; Campaign, Multiplayer, and Zombies, on October 25, 2024. Full Article Games
access CtrlS offers direct access to Oracle Cloud, AI services for Indian businesses By www.telecompaper.com Published On :: Wed, 13 Nov 2024 10:23:00 +0100 (Telecompaper) CtrlS Datacenters has announced it will provide its customers with direct high-speed connectivity to Oracle's cloud and AI services through Oracle Cloud Infrastructure (OCI) FastConnect... Full Article
access Ericsson urges African governments to support school internet access By www.telecompaper.com Published On :: Wed, 13 Nov 2024 11:06:00 +0100 (Telecompaper) Ericsson has urged governments to play a key role in developing strategies that support internet access and online education... Full Article
access LTIMindtree to implement Cisco Secure Access for hybrid working, zero-trust and SD-WAN use cases By www.telecompaper.com Published On :: Wed, 13 Nov 2024 11:10:00 +0100 (Telecompaper) Cisco is publicising a deal with consulting firm LTIMindtree to deploy secure edge technology for its hybrid workforce and global consulting client base... Full Article
access Reflex joins Open Access Data Centres to offer AI-ready services By www.telecompaper.com Published On :: Wed, 13 Nov 2024 14:47:00 +0100 (Telecompaper) South Africa's managed services provider, Reflex, has joined forces with Open Access Data Centres (OADC) to drive the Artificial Intelligence... Full Article
access Digital Identity and Access Control By www.windley.com Published On :: Wed, 11 Sep 2024 08:31:53 -0400 Summary: Until we value freedom and independence in the digital world, we will yield up control of our digital lives to others who will act in their own interests, not ours. In response to a post on X about China's social credit system, Paul Conlon said: Digital ID is ultimately about access control where those who impose the system are the ones determining what you are required to be and do. Provision of resources and liberties become conditional upon the whims of the affluent. Doesn't sound safe or convenient to me. From XReferenced 2024-08-28T08:10:31-0400 How Paul said this struck me because I've been thinking a lot about access control lately. I believe that we build identity systems to manage relationships, but, as Paul points out, in many cases the ultimately utility of identity systems is access control. This isn't, by itself, a bad thing. I'm glad that Google controls access to my GMail account so that only I can use it. But it doesn't stop there. If I use my Google account to log into other things, then Google ultimately controls my access to everything I've used it for. This is federation's original sin1. Paul's comment points out the primary problem with how we build identity systems today: when access control is centralized, it inherently shifts power towards those who manage the system. This dynamic can lead to a situation where individuals must conform to the expectations or demands of those in control, just to maintain their access to essential services or resources. While we often accept this trade-off for convenience—like using Google to manage multiple logins—the broader implications are troubling. The more we rely on federated identity systems, with their tendency to centralization, the more we risk ceding control over our digital lives, reducing our autonomy, and increasing our dependence on entities whose goals may not align with our own. This is why the principles of self-sovereign identity (SSI) are so compelling. SSI proposes a model where individuals maintain control over their own identity, reducing the risks associated with centralized access control and enhancing personal freedom in the digital realm. Critics of SSI will claim that giving people control over their identity means we have to accept their self assertions. Nothing could be further from the truth. When someone wants me to prove I'm over 18, I use a driver's license. The state is asserting my age, not me. But I'm in control of who I show that to and where. Sovereignty is about borders and imposes a system of relationships. Now, China could use decentralized identity technology to build their social credit system. One credential, controlled by the state, that is used to access everything. Technology alone can't solve this problem. As a society, we have to want a digital world, modeled on the physical one, where individuals are the locus of control and use information and assertions from a variety of credentials to build and interact in authentic peer-to-peer relationships. Until we value freedom and independence in the digital world, we will yield up control of our digital lives to others who will act in their own interests, not ours. Notes For similar reasons, I think federated social media systems are a bad idea too, but that's another blog post. Photo Credit: Papers Please from DALL-E (public domain). Prompt: Draw a rectangular picture of police checking identity papers of people on the street Tags: identity access+control ssi Full Article
access Green Open Access - Free for Authors But at a Cost for Readers By www.downes.ca Published On :: Wed, 13 Nov 2024 08:37:00 -0400 Lisa Janicke Hinchliffe, The Scholarly Kitchen, Nov 13, 2024 We expect The Scholarly Kitchen to represent the publishers' point of view, since that is its intent, but in this case it ventures into the realm of pure propaganda. No open access charges subscription fees to readers. In 'Gold' open access, publishers charge authors 'article publication fees', while in 'Green' open access no such fees are charged. So how is there a "cost" to readers? According to this article, it's in the time and effort it takes to find the 'version of record' of an article as compared to what is found in typical 'green' venues such as preprint repositories. This argument, of course, assumes readers want to find the 'version of record', and the author is ready with a 'fear, uncertainty, doubt (FUD)' argument. The author also argues that green versions are hard to find, compared to gold versions, ignoring such services as Unpaywall that index open access articles. Web: [Direct Link] [This Post] Full Article
access Check Accessibility from Your Toolbar By Published On :: 2004-01-16T15:55:21-07:00 Steve Faulkner recently released a tool for Internet Explorer called the Accessibility Toolbar. It provides one-click access to accessibility validators and has features that go beyond simple accessibility checks. Full Article
access Fed Trends in Restricting Information Access By Published On :: 2004-09-19T10:46:16-07:00 Congress enacts open government legislation in three main areas: (1) laws that provide public access to federal records; (2) laws that allow the government to restrict public access to federal information; and (3) laws that provide for congressional access to federal records. A new 90-page Congressional Report by Rep. Henry A. Waxman provides a comprehensive, though arguably partisan, examination finding the Bush Administration has acted to restrict the amount of government information that is available. Full Article
access This Kindle accessory seriously improved my reading experience (and it's on sale) By www.zdnet.com Published On :: Wed, 13 Nov 2024 02:42:49 GMT Strapsicle's silicone straps secure my Kindle Paperwhite and give me the perfect grip for comfortable reading. Full Article
access 'Lack of accessibility makes you feel left out' By www.bbc.com Published On :: Tue, 12 Nov 2024 15:42:55 GMT James Bedding says small steps can be a "nightmare" for wheelchair users in Jersey. Full Article
access Shops 'devastated' by council work blocking access By www.bbc.com Published On :: Tue, 12 Nov 2024 06:29:49 GMT The owners of a coffee shop in Stockton say they have seen footfall drop significantly. Full Article
access Kingsway residents seek more access roads to reduce congestion By www.bbc.co.uk Published On :: Fri, 01 Nov 2024 12:25:00 GMT Reporter Duncan Cook has been finding out more. Full Article
access 'I want others to access the therapy that helped me' By www.bbc.com Published On :: Wed, 13 Nov 2024 06:21:42 GMT Patients and staff say they fear for the future of mental health access in Derbyshire. Full Article
access Doubts over £10m HGV access work at historic park By www.bbc.com Published On :: Sun, 10 Nov 2024 12:36:34 GMT Workington Town Council raises concerns about the impact on nearby Hall Park. Full Article
access Daughter's mission to give people CPR skills and access to defibrillators By www.bbc.co.uk Published On :: Thu, 17 Oct 2024 05:00:00 GMT Kenilworth woman's campaign to give people the best chance of surviving a cardiac arrest. Full Article
access Charity helps disabled people access beauty spots By www.bbc.com Published On :: Wed, 13 Nov 2024 06:35:20 GMT A Norwich disability group thanks a charity for making a city beauty spot more accessible. Full Article
access Internet of Things - protocols and access keys By pzf.fremantle.org Published On :: Sat, 22 Mar 2014 08:50:00 +0000 I've just read this article from Mark O'Neill on the 10 concerns for the Internet of Things. Mark brings up some very interesting aspects and concerns. I'd like to comment on two of those: protocols and access keys. His primary concern is protocol proliferation. I agree this is an issue. Mark explicitly mentions CoAP, MQTT, AMQP and XMPP. Interestingly he doesn't mention HTTP, which I have found to be heavily used by devices, especially the new generation of Raspberry Pi based systems. Many Arduino's also use HTTP. I will admit to a strong bias. I think that MQTT is the best of these protocols for IoT devices, with CoAP a distant second. Let's get XMPP out of the way. I love XMPP. I think its a fantastic protocol. Do I want to create XML packets on my Arduino? Er... nope. Even on 32-bit controllers, there is still the network traffic to consider: suppose I'm using a GPRS connection and I have thousands of devices deployed: minimizing network traffic is important for cost and efficiency, and XMPP was not designed for that. AMQP is not an appropriate protocol for IoT devices and was not designed for that. It is designed for "the efficient exchange of information within and between enterprises". It was certainly not designed for lightweight, non-persistent, non-transactional systems. To that end, my own system (WSO2) will be providing efficient bridging for AMQP and MQTT to enable lightweight systems to get their data into wider enterprise contexts. I also demonstrated HTTP to MQTT bridging with the WSO2 ESB at the MQTT Interop held last week at EclipseCon. How about CoAP vs MQTT. Firstly, CoAP is more appropriate to compare to MQTT-SN. It is UDP only, and designed to emulate a RESTful model over UDP. My biggest concern with CoAP is this: most people don't actually understand REST - they understand HTTP. If I had a dollar for every time I've come across supposedly RESTful interfaces that are really HTTP interfaces, I'd be a rich man! Interestingly, despite MQTT having been around for 10 years, the Google Trend shows that it has only recently hit the public notice: However, as you can see, it has quickly overtaken CoAP. In terms of traffic, it is a clear winner: every Facebook mobile app uses MQTT to communicate with the Facebook servers. The other area I'd like to comment on is access keys. I agree this is a big issue, and that is the reason I've been working on using OAuth2 access keys with MQTT and IoT devices. I recently gave talks about this at FOSDEM, QCon London, and EclipseCon. The EclipseCon talk also covered a set of wider security concerns and the slides are available here. OAuth2 and OpenID Connect are important standards that have got incredible traction in a short period of time. They have evolved out of 10+ years of trying to solve the distributed, federated identity and access control problems of the Internet. In my presentation I strongly argued that passwords are bad for users, but worse for devices. Tokens are the correct model, and the OAuth2 token is the best available token to use at this point. There was considerable interest in the MQTT interop session on standardizing the use of OAuth2 tokens with the protocol. My personal prediction is that we will see MQTT and HTTP become the most-used IoT protocols, and I strongly urge (and hope) that OAuth2 tokens will become the de-facto model across both of these. Full Article
access Access controllable multi-blockchain platform for enterprise R&D data management By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 In the era of big data, enterprises have accumulated a large amount of research and development data. Effective management of their precipitated data and safe sharing of data can improve the collaboration efficiency of research and development personnel, which has become the top priority of enterprise development. This paper proposes to use blockchain technology to assist the collaboration efficiency of enterprise R&D personnel. Firstly, the multi-chain blockchain platform is used to realise the data sharing of internal data of enterprise R&D data department, project internal data and enterprise data centre, and then the process of construction of multi-chain structure and data sharing is analysed. Finally, searchable encryption was introduced to achieve data retrieval and secure sharing, improving the collaboration efficiency of enterprise research and development personnel and maximising the value of data assets. Through the experimental verification, the multi-chain structure improves the collaboration efficiency of researchers and data security sharing. Full Article
access A Realistic Data Warehouse Project: An Integration of Microsoft Access® and Microsoft Excel® Advanced Features and Skills By Published On :: Full Article
access The right to access information under the GDPR By www.inderscience.com Published On :: 2020-02-07T23:20:50-05:00 The present paper offers a critique of the General Data Protection Regulation in the realm of access to information. Even though the GDPR supports the constitutionally obvious position that the right to data protection does not outweigh other equally important rights, the enhanced protection of the right to the protection of personal data leads to the potential neglect of other constitutional rights, such as that of access to information. Data protection and access to information authorities should be established both on an EU, as well as at national level as a single authority. Scientific research must be facilitated through access to a multitude of information. The present article explores the question of data ownership and aims to propose a new system that will enhance access to information. A key tool of our research will be the comparative overview of existing legislative systems and a review of the different approaches in the case-law of independent authorities. Full Article
access Information Access for Development: A Case Study at a Rural Community Centre in South Africa By Published On :: Full Article
access Analysing Socio-Demographic Differences in Access and Use of ICTs in Nigeria Using the Capability Approach By Published On :: Full Article
access Exploring the Addition of Mobile Access to a Healthcare Services Website By Published On :: Full Article
access Multi-Agent System for Knowledge-Based Access to Distributed Databases By Published On :: Full Article
access Relational Algebra Programming With Microsoft Access Databases By Published On :: Full Article
access Research Foci, Methodologies, and Theories Used in Addressing E-Government Accessibility for Persons with Disabilities in Developing Countries By Published On :: 2017-09-06 Aim/Purpose: The purpose of this paper is to examine the key research foci, methodologies, and theoretical perspectives adopted by researchers when studying E-government accessibility for persons with disabilities (PWDs), particularly in developing countries. The study aims to develop a conceptual framework for designing accessible E-government for PWDs in developing countries. Background: Studies on E-government accessibility for persons with disabilities in developing countries have been minimal. The few studies conducted until now have failed to integrate PWDs, a population already marginalized, into the digital society. Accessibility has been identified by researchers as a major hindrance to PWDs participating in E-government. It is imperative therefore to examine the manner in which researchers investigate and acquire knowledge about this phenomenon. Methodology : The study synthesizes literature from top IS journals following a systematic literature review approach. The data synthesis focuses on identifying key concepts relating to E-government accessibility for PWDs. Contribution: The study contributes to the field of E-government, with a focus on how E-government services can be made accessible to PWDs. The study calls on researchers to reflect on their epistemological and ontological paradigms when examining accessibility of E-government services in developing countries. Findings: The findings show that most researchers focus on the evaluation of E-government websites and predominantly adopt quantitative methods. The study also reveals that the use of technological determinism as a theoretical lens is high among researchers. Recommendations for Practitioners : The study recommends that E-government web developers and policy makers involve PWDs from design to evaluation in the development of E-government applications. Recommendation for Researchers: The study advocates the need to conduct studies on E-government accessibility by employing more qualitative and mixed approaches to gain in-depth and better understanding of the phenomenon. Impact on Society : This study creates greater awareness and points out inadequacies that society needs to address to make E-government more inclusive of and participatory for PWDs. Future Research: Further empirical work is required in order to refine the relevance and applicability of various constructs in EADM so as to arrive at a framework for addressing E-government accessibility for PWDs in developing countries. Full Article
access Improving Webpage Access Predictions Based on Sequence Prediction and PageRank Algorithm By Published On :: 2019-01-20 Aim/Purpose: In this article, we provide a better solution to Webpage access prediction. In particularly, our core proposed approach is to increase accuracy and efficiency by reducing the sequence space with integration of PageRank into CPT+. Background: The problem of predicting the next page on a web site has become significant because of the non-stop growth of Internet in terms of the volume of contents and the mass of users. The webpage prediction is complex because we should consider multiple kinds of information such as the webpage name, the contents of the webpage, the user profile, the time between webpage visits, differences among users, and the time spent on a page or on each part of the page. Therefore, webpage access prediction draws substantial effort of the web mining research community in order to obtain valuable information and improve user experience as well. Methodology: CPT+ is a complex prediction algorithm that dramatically offers more accurate predictions than other state-of-the-art models. The integration of the importance of every particular page on a website (i.e., the PageRank) regarding to its associations with other pages into CPT+ model can improve the performance of the existing model. Contribution: In this paper, we propose an approach to reduce prediction space while improving accuracy through combining CPT+ and PageRank algorithms. Experimental results on several real datasets indicate the space reduced by up to between 15% and 30%. As a result, the run-time is quicker. Furthermore, the prediction accuracy is improved. It is convenient that researchers go on using CPT+ to predict Webpage access. Findings: Our experimental results indicate that PageRank algorithm is a good solution to improve CPT+ prediction. An amount of though approximately 15 % to 30% of redundant data is removed from datasets while improving the accuracy. Recommendations for Practitioners: The result of the article could be used in developing relevant applications such as Webpage and product recommendation systems. Recommendation for Researchers: The paper provides a prediction model that integrates CPT+ and PageRank algorithms to tackle the problem of complexity and accuracy. The model has been experimented against several real datasets in order to show its performance. Impact on Society: Given an improving model to predict Webpage access using in several fields such as e-learning, product recommendation, link prediction, and user behavior prediction, the society can enjoy a better experience and more efficient environment while surfing the Web. Future Research: We intend to further improve the accuracy of webpage access prediction by using the combination of CPT+ and other algorithms. Full Article
access Learning-Based Models for Building User Profiles for Personalized Information Access By Published On :: 2024-04-30 Aim/Purpose: This study aims to evaluate the success of deep learning in building user profiles for personalized information access. Background: To better express document content and information during the matching phase of the information retrieval (IR) process, deep learning architectures could potentially offer a feasible and optimal alternative to user profile building for personalized information access. Methodology: This study uses deep learning-based models to deduce the domain of the document deemed implicitly relevant by a user that corresponds to their center of interest, and then used predicted domain by the best given architecture with user’s characteristics to predict other centers of interest. Contribution: This study contributes to the literature by considering the difference in vocabulary used to express document content and information needs. Users are integrated into all research phases in order to provide them with relevant information adapted to their context and their preferences meeting their precise needs. To better express document content and information during this phase, deep learning models are employed to learn complex representations of documents and queries. These models can capture hierarchical, sequential, or attention-based patterns in textual data. Findings: The results show that deep learning models were highly effective for building user profiles for personalized information access since they leveraged the power of neural networks in analyzing and understanding complex patterns in user behavior, preferences, and user interactions. Recommendations for Practitioners: Building effective user profiles for personalized information access is an ongoing process that requires a combination of technology, user engagement, and a commitment to privacy and security. Recommendation for Researchers: Researchers involved in building user profiles for personalized information access play a crucial role in advancing the field and developing more innovative deep-based networks solutions by exploring novel data sources, such as biometric data, sentiment analysis, or physiological signals, to enhance user profiles. They can investigate the integration of multimodal data for a more comprehensive understanding of user preferences. Impact on Society: The proposed models can provide companies with an alternative and sophisticated recommendation system to foster progress in building user profiles by analyzing complex user behavior, preferences, and interactions, leading to more effective and dynamic content suggestions. Future Research: The development of user profile evolution models and their integration into a personalized information search system may be confronted with other problems such as the interpretability and transparency of the learning-based models. Developing interpretable machine learning techniques and visualization tools to explain how user profiles are constructed and used for personalized information access seems necessary to us as a future extension of our work. Full Article
access Using Social Media Applications for Accessing Health-related Information: Evidence from Jordan By Published On :: 2024-03-07 Aim/Purpose: This study examined the use of Social Media Applications (SMAs) for accessing health-related information within a heterogeneous population in Jordan. The objective of this study was therefore threefold: (i) to investigate the usage of SMAs, including WhatsApp, Twitter, YouTube, Snapchat, Instagram, and Facebook, for accessing health-related information; (ii) to examine potential variations in the use of SMAs based on demographic and behavioral characteristics; and (iii) to identify the factors that can predict the use of SMAs. Background: There has been limited focus on investigating the behavior of laypeople in Jordan when it comes to seeking health information from SMAs. Methodology: A cross-sectional study was conducted among the general population in Jordan using an online questionnaire administered to 207 users. A purposive sampling technique was employed, wherein all the participants actively sought online health information. Descriptive statistics, t-tests, and regression analyses were utilized to analyze the collected data. Contribution: This study adds to the existing body of research on health information seeking from SMAs in developing countries, with a specific focus on Jordan. Moreover, laypeople, often disregarded by researchers and health information providers, are the most vulnerable individuals who warrant greater attention. Findings: The findings indicated that individuals often utilized YouTube as a platform to acquire health-related information, whereas their usage of Facebook for this purpose was less frequent. Participants rarely utilized Instagram and WhatsApp to obtain health information, while Twitter and Snapchat were very seldom used for this purpose. The variable of sex demonstrated a notable positive correlation with the utilization of YouTube and Twitter for the purpose of finding health-related information. Conversely, the variable of nationality exhibited a substantial positive correlation with the utilization of Facebook, Instagram, and Twitter. Consulting medical professionals regarding information obtained from the Internet was a strong indicator of using Instagram to search for health-related information. Recommendations for Practitioners: Based on the empirical results, this study provides feasible recommendations for the government, healthcare providers, and developers of SMAs. Recommendation for Researchers: Researchers should conduct separate investigations for each application specifically pertaining to the acquisition of health-related information. Additionally, it is advisable to investigate additional variables that may serve as predictors for the utilization of SMAs. Impact on Society: The objective of this study is to enhance the inclination of the general public in Jordan to utilize SMAs for health-related information while also maximizing the societal benefits of these applications. Future Research: Additional research is required to examine social media’s usability (regarding ease of use) and utility (comparing advantages to risks) in facilitating effective positive change and impact in healthcare. Full Article
access Keeping an Eye on the Screen: Application Accessibility for Learning Objects for Blind and Limited Vision Students By Published On :: Full Article
access A Promising Practicum Pilot – Exploring Associate Teachers’ Access and Interactions with a Web-based Learning Tool By Published On :: Full Article
access A Data Mining Approach to Improve Re-Accessibility and Delivery of Learning Knowledge Objects By Published On :: Full Article
access An Exploratory Study of Online Equity: Differential Levels of Technological Access and Technological Efficacy Among Underserved and Underrepresented Student Populations in Higher Education By Published On :: 2020-11-14 Aim/Purpose: This study aims to explore levels of Technological Access (ownership, access to, and usage of computer devices as well as access to Internet services) and levels of Technological Efficacy (technology related skills) as they pertain to underserved (UNS) and underrepresented (UNR) students. Background: There exists a positive correlation between technology related access, technology related competence, and academic outcomes. An increasing emphasis on expanding online education at the author’s institution, consistent with nationwide trends, means that it is unlikely that just an increase in online offerings alone will result in an improvement in the educational attainment of students, especially if such students lack access to technology and the technology related skills needed to take advantage of online learning. Most studies on levels of Technological Access and Technological Efficacy have dealt with either K-12 or minority populations with limited research on UNS and UNR populations who form the majority of students at the author’s institution. Methodology: This study used a cross-sectional survey research design to investigate the research questions. A web survey was sent to all students at the university except first semester new and first semester transfer students from various disciplines (n = 535). Descriptive and inferential statistics were used to analyze the survey data. Contribution: This research provides insight on a population (UNS and UNR) that is expanding in higher education. However, there is limited information related to levels of Technological Access and Technological Efficacy for this group. This paper is timely and relevant as adequate access to technology and technological competence is critical for success in the expanding field of online learning, and the research findings can be used to guide and inform subsequent actions vital to bridging any educational equity gap that might exist. Findings: A critical subset of the sample who were first generation, low income, and non-White (FGLINW) had significantly lower levels of Technological Access. In addition, nearly half of the survey sample used smartphones to access online courses. Technological Efficacy scores were significantly lower for students who dropped out of or never enrolled in an online course. Transfer students had significantly higher Technological Efficacy scores while independent students (determined by tax status for federal financial aid purposes) reflected higher Technological Efficacy, but at a marginally lower level of significance. Recommendations for Practitioners: Higher education administrators and educators should take into consideration the gaps in technology related access and skills to devise institutional interventions as well as formulate pedagogical approaches that account for such gaps in educational equity. This will help ensure pathways to sustained student success given the rapidly growing landscape of online education. Recommendation for Researchers: Similar studies need to be conducted in other institutions serving UNS and UNR students in order to bolster findings and increase awareness. Impact on Society: The digital divide with respect to Technological Access and Technological Efficacy that impacts UNS and UNR student populations must be addressed to better prepare such groups for both academic and subsequent professional success. Addressing such gaps will not only help disadvantaged students maximize their educational opportunities but will also prepare them to navigate the challenges of an increasingly technology driven society. Future Research: Given that it is more challenging to write papers and complete projects using a smartphone, is there a homework gap for UNS and UNR students that may impact their academic success? What is the impact of differing levels of Technological Efficacy on specific academic outcomes of UNS and UNR students? Full Article
access Condition of Web Accessibility in Practice and Suggestions for Its Improvement By Published On :: Full Article
access paper: Context Sensitive Access Control in Smart Home Environments By ebiquity.umbc.edu Published On :: Sat, 30 May 2020 21:35:12 +0000 The PALS system captures physical context from sensed data, reasons about the context and associated context-driven policies to make access-control decisions and detect intrusions into smart home systems based on both network and behavioral data The post paper: Context Sensitive Access Control in Smart Home Environments appeared first on UMBC ebiquity. Full Article cybersecurity IoT Ontologies Paper Policy Security Semantic Web