scholarly journals What is Open Data and How to Benefit from It

2014 ◽  
Vol 52 (1(103)) ◽  
pp. 43-51
Author(s):  
Sebastian Grabowski

Purpose/Thesis: The aim of this paper is to introduce the concept that Open Data and Open APIs provided by Communication Service Providers integrated in one end-user-oriented application may considerably improve the process of communication between people and institutions. Approach/Methods: Open Data is one of the key elements of the broad Internet ecosystem; other elements, such as open interfaces, open source, API, etc., are the assets that make the Internet environment robust, scalable, and extendable. The paper, based on the case study analysis, presents selected applications integrating the communication enablers in the form of Open APIs and Open Data sources. Results and conclusion: The combination of Open Data and functions provided by telecommu­nications operators in the form of Open APIs significantly improves and facilitates the processes of communication between people and institutions. Originality/Value: The author proposes to integrate Open Data with real time communication func­tions provided by Communication Service Providers in the form of Open APIs. Open Data and Open APIs are effective tools to create user-made environments that are convergent and coherent from the application source code point of view.

Author(s):  
Manuel Mogollon

In an Internet commercial transaction, the secure Web server and the buyer’s computer authenticate each other and encipher the data transmitted using transport layer security (TLS) or secure socket layer (SSL) protocols. When a purchase is made online using a credit card, does the customer’s bank need to know what was purchased? Not really. Does the seller need to know the customer’s credit card number? Actually, the answer is no. The responses to these questions were the main premises of the secure electronic transaction (SET). In the late 1990’s, SET was approved as the credit card standard, but it failed to be accepted because of its cost and the problems regarding distribution of end-user certificates. However, SET is explained in this chapter as an ideal protocol, from the point of view of certificates, digital signatures, and cryptography for securing credit card transactions over the Internet.


Author(s):  
Emanuela Sorbo ◽  
Gianluca Spironelli

The paper is an initial form of dissemination of the research activities carried out by the IUAV University of Venice working group which, on behalf of the Municipal administration of Brendola, seeks to delineate the application of a methodology for the study and analysis of the architectural and landscape heritage of significant cultural interest that is in a state of abandonment. The case study application is the church of San Michele Arcangelo in Brendola (Vicenza), known as the “Incompiuta” (“Unfinished”). The case study proposed is an interesting exemplar of ecclesiastical architecture, designed by engineer-architect Fausto Franco, in which its characteristics of being unfinished and in a state of ruin contribute to redefining the image of a work that fits in a historical context of architectural and technical experimentation, where the reference to historical architecture is mediated by contemporary forms and by the use of modern building materials, among which, the use of reinforced bricks is noteworthy. The research activity, which is taking place in the context of the COVID-19 health emergency, aims at putting a series of strategies and operational practices based on the digitisation of data to the test, so as to allow increased interoperability and sharing through the building of an online open data repository addressed to the actors involved in the conservation process and to the community. In the processes of conservation and valorisation, in-depth knowledge and documentation of the materials and construction techniques involves multidisciplinary areas; effectively organising them in a system that regulates their collection, cataloguing, processing and archiving according to shared procedures, therefore becomes a fundamental prerequisite for the development of operational planning of the valorisation strategies. All the instruments that make it possible to collect data and reach a true knowledge of the object therefore become indispensable. From this point of view, the push towards the digitisation of the data that emerged during the pandemic phase plays a fundamental role in the range of application possibilities, from the survey to the mechanisms for the conservation and management of the cultural heritage.


e-Finanse ◽  
2019 ◽  
Vol 15 (4) ◽  
pp. 12-24
Author(s):  
Anna Motylska-Kuźma

AbstractThe main objective of this paper is to analyze one of the alternative sources of financing - equity crowdfunding - from the point of view of managerial processes. Based on the case study analysis and the comparative analysis the problems and challenges of raising funds using equity crowdfunding are discussed, comparing the findings with the issuing of shares. The analysis show that although many of the activities undertaken in raising funds through issuing shares and equity crowdfunding are similar, the managerial processes in the case of equity crowdfunding require from the company first of all building and caring about relationships with investors, rather than showing and proving effectiveness. In exchange for the low legal requirements, the equity crowdfunding investors expect good communication even if the promises are not fulfilled.


2018 ◽  
Vol 13 (12) ◽  
pp. 244 ◽  
Author(s):  
Filippo Vitolla ◽  
Nicola Raimo

Integrated reporting is the new corporate reporting tool that includes financial and non-financial information in a single document. Although some studies describe the potential benefits of integrated reporting, this practice is still not widespread. One of the reasons for the limited diffusion is linked to the absence of empirical evidence that demonstrates the actual concreteness of these benefits for organizations that decide to adopt integrated reporting. This study analyses the process of adopting integrated reporting and the benefits associated with it through a case study. In particular, the case of Generali Group is analysed in the aim of highlighting the adoption path and the effects deriving from the implementation of integrated reporting in a context like the Italian one, still not very attentive to these issues. The findings show how the implementation of integrated reporting has been the result of a clear desire of top management and that the adoption of this practice has had a decidedly positive impact both from an internal and external point of view.


Author(s):  
Stephen J Neville

The purpose of this article is to explore how unboxing videos on YouTube contribute to the domestication of privacy-invasive technology. Further, the objective is to show how consumer influencers on YouTube adapt to the flexible persona of the online warm expert (OWE) which expands the concept of the ‘warm expert’ from the domestication literature ( Bakardjieva, 2005 , Internet Society: The Internet in Everyday Life. London: Sage Publications). I argue that the OWE and unboxing discourse advance corporate interests of surveillance capitalism in home environments by promoting the circulation of emergent consumer technologies and eschewing meaningful discussion of privacy and surveillance issues. A case study of the Amazon Echo smart speaker and Alexa, its voice-activated personal assistant, is presented. The research consists of a qualitative thematic analysis of unboxing videos ( N = 73) and viewer comments on YouTube. Unboxing discourse reflects normative consumer culture values that are detached from critical discussions of surveillance or the informational privacy framework of end-user agreements. As a practical implication, the study helps look beyond the household and traditional social relationships in the domestic sphere to understand how technological domestication is being shaped in a paradigm of consumer culture that is fused with the infrastructural and cultural logics of the Internet and social media.


2019 ◽  
Vol 11 (2) ◽  
pp. 332 ◽  
Author(s):  
Dorota Bednarska-Olejniczak ◽  
Jarosław Olejniczak ◽  
Libuše Svobodová

The purpose of this article is to identify the directions and scope of inclusion of the residents’ participation into the concept of city’s sustainable development and the smart city concept, taking into account national and international conditions, on the basis of Wroclaw’s practices in 1998–2018. Many researchers have emphasized the necessity of including residents’ participation in both the smart city concept and the sustainable city development concept, but they do not focus on a coherent linking of these activities during evolution toward a sustainable smart city (SSC). The in-depth case study analysis considered, i.e., three subsequent Wroclaw development strategies (1998–2018) and implementation of the smart city concept in Wroclaw (2015–2018) with particular emphasis on the issue of public participation and sustainable development of the city. The results of study show that in the case of the developments in the activities of smart city and sustainable city development carried out by Wroclaw, it is possible to identify two different approaches to residents’ participation in city activities. In Wroclaw, ‘residents’ participation’ in the framework of the sustainable city development activities currently covers all theoretical levels of participation, while within the smart city activities it focuses mainly on the participatory budget and the limited use of ICT. The conducted research indicates that for the implementation of the SSC concept it would be important to integrate these approaches in order to ensure the full range of residents’ participation in accordance with theoretical postulates. The conducted analysis therefore covers mostly unexplored area of research, which is important from the point of view of a city’s evolution toward becoming a sustainable smart city. The conclusions from the research are also an empirical contribution to the analysis of the changes of cities towards SSC and indicate the need for further, extended research on the undertaken problem.


2013 ◽  
Vol 427-429 ◽  
pp. 2254-2258
Author(s):  
Ying Xiao ◽  
Gang Hong Zhang ◽  
Han Zhang ◽  
Wan Lin Gao ◽  
Xuan Luo ◽  
...  

Information resource break (especially information technology) the bottlenecks of the understanding demand for farmers. Experiential understanding of the content is the starting point for farmers receiving. Low cost experiential information service platform is using network path and terminal users to support multiple types of information resources for different farmers. Through enhance the effects of scientific and technological information services, and to break the limit farmers to master the key technology bottlenecks in information and knowledge, Thus to achieve the purposes of the farmers scientific production and modern life. As the development of the Internet, Instant Messaging will perform a wider use and is growing up day after day .Especially instant messaging system about enterprise has become a hot spot at home and abroad. Along with the development of the Internet, the use of instant messaging is becoming more and more widely, and the service providers also provide more and more rich communication service functions. This paper researches on the various kinds of Instant Messaging System, analyzes the functionality of Instant Messaging System, and proposes system architecture.


Daedalus ◽  
2011 ◽  
Vol 140 (4) ◽  
pp. 93-107 ◽  
Author(s):  
L. Jean Camp

The Internet is not the only critical infrastructure that relies on the participation of unorganized and technically inexpert end users. Transportation, health, waste management, and disaster preparedness are other areas where cooperation between unorganized citizens who lack experience with the domain has increased resiliency, reduced social costs, and helped meet shared goals. Theories of community-based production and management of the commons explain this type of cooperation, both offline and online. This essay examines these two complementary approaches to organizing the cybercitizen for cybersecurity. Cybersecurity discourse has reasonably focused on centralized parties and network operators. From domain name registrars to network service providers, solutions are sought through incentives, regulation, and even law enforcement. However great the ability of these centralized entities to implement change, the end user plays a crucial role. The Internet must remain open to enable innovation and diffusion of innovation; thus, the end user will continue to be important. What is the role of the citizen in cybersecurity? What socio-technical characteristics might enable a system that encourages and empowers users to create a secure infrastructure?


Author(s):  
Emerson Ribeiro de Mello ◽  
Michelle Silva Wangham ◽  
Samuel Bristot Loli ◽  
Carlos Eduardo da Silva ◽  
Gabriela Cavalcanti da Silva ◽  
...  

AbstractThe federated identity model provides a solution for user authentication across multiple administrative domains. The academic federations, such as the Brazilian federation, are examples of this model in practice. The majority of institutions that participate in academic federations employ password-based authentication for their users, with an attacker only needing to find out one password in order to personify the user in all federated service providers. Multi-factor authentication emerges as a solution to increase the robustness of the authentication process. This article aims to introduce a comprehensive and open source solution to offer multi-factor authentication for Shibboleth Identity Providers. Based on the Multi-factor Authentication Profile standard, our solution provides three extra second factors (One-Time Password, FIDO2 and Phone Prompt). The solution has been deployed in the Brazilian academic federation, where it was evaluated using functional and integration testing, as well as security and case study analysis.


2020 ◽  
Vol 22 (2) ◽  
pp. 194-204
Author(s):  
Tat’yana A. Podshibyakina

Actualization of the past is a natural manifestation of need for reflection of historical memory for society; it also pushes elites to search for new forms of “mental control” over public consciousness. The research is devoted to the problem of keeping historical memory in the context of censorship on the Internet. The goal is to identify the symbolic effects of historical memory that arises as a result of narrative representations of history and cognitive mnemonic practices of network media and online Internet communities in the context of censorship. Result of this research was conceptualization of the notion for “cognitive mnemonic Internet practices”, their typology in accordance with the types of cognitive censorship of network media and a description of their symbolic effects. Concept of the Internet as a mnemonic system is theoretically grounded, a typology of censorship strategies is given as a factor affecting the displacement of some forms of historical memory from the public sphere of society and their expression in various network mnemonic practices. The case study analysis of modern Chinese network media allowed for conceptualization of the notion of “cognitive mnemonic Internet practices” and grounding the conclusions.


Sign in / Sign up

Export Citation Format

Share Document