• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/39

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

39 Cards in this Set

  • Front
  • Back

Web 1.0

The “Traditional” Web




Publishers and consumers:


-Content published by organisations


-Content passively consumed users




“Read-only” Web




Information “pulled” by consumers

Problems with Web 1.0

1. Publisher-generated content: Restricts type of content available


2. Inflexible: Data presented the way publisher demands


3. Limited interaction: “Round-trip” model


4. Pull technology: User must know where content is, proactively seek the information, and anticipate when it’s likely tobe updated

Web 2.0

Rethinking of goals of the Web:


Not a redesign or fundamental technology change




Focus away from publish & consume:


Move toward enable & create

Key Concepts of Web 2.0

User-generated content(e.g. Wikipedia, TripAdvisor, Amazon)




Rich user experience (content responsive to user interaction)




Relevant information pushed to consumers (e.g. RSS feeds, Twitter feeds)

Characteristics of Social Media

User-generated content




Community formation




Conversational

Social Media and Business

Marketing:


Advertisements, promotions (e.g. Dell uses Twitter)




Customer relationship management:


Engaging with customers by sharing news, receiving feedback on products (e.g. Dell uses blogs)




Recruitment (e.g. LinkedIn)

Issues with Social Media

1.Privacy


2.Security


3. Copyright


4. Permanence


5. Quality


6. Ethics


7. Legal

Cloud Computing Motivations

Replace internal infrastructure with dynamic “outsourced” platform:


-Served via the Internet


-Data and processing served “in the cloud”


Reduced hardware requirements:


-Organisation concentrates on “client” hardware


Encourages on-demand scaling of IS requirements

Software as a Service (SaaS) Model

Application-oriented




Subscribe to established software service



e.g. Gmail, Office365, Xero, Vend, Timely

Platform as a Service (PaaS) Model

Provides framework for building applications




Build to specific development model




e.g. Force.com, Google App Engine, Microsoft Azure

Infrastructure as a Service (IaaS) Model

Provides “virtual machine” in the cloud




Highly flexible and configurable




Development model unchanged




e.g. Amazon Elastic Compute Cloud (EC2), Google Compute Engine,Catalyst

Benefits of Cloud Computing

Lowered infrastructure requirements:


Less “big iron” hardware needed




Dynamic scaling and on-demand pricing




Location independence




“Reduced” costs




Robustness:


Off-site backups, quick disaster recovery, ...




Economies of scale:


Potentially lower support costs

Drawbacks to Cloud Computing

1. Reliability: What if telecommunications goes down?


2. Trust: What is the third party doing to my data?


3. Legal issues: What if the data is hosted in another jurisdiction?


4. Buying into hype: Won’t always deliver as promised


5. Service agreements not met

The "Five Pillars" of Information Assurance

1. Availability


2. Integrity


3. Authentication


4. Confidentiality


5. Non-Repudiation

Availability with Information Assurance

Continuity of Service




Availability




System Performance

Integrity with Information Assurance

Accuracy:


-Sound


-Unimpaired


-Perfect Condition




Timeliness




Network Design

Authentication with Information Assurance

Verification of:


1. User, device or other entity Identity


2. Integrity of data stored or transmitted


3. Right to see or use data

Types of Authentication

1. What you know - Passwords


2. What you have - Tokens (Keycards etc)


3. What you are - Biometric (Facial Recognition)

Confidentiality with Information Assurance

Holding sensitive data in confidence




Allowing ONLY authorised use or access




Providing protection of confidential data in transit and/or at rest (stored)

Non - Repudiation with Information Assurance

Proof of integrity and origin of data




Both in an unforgettable relationship




That can be verified by a third partyat any time




Cannot be subsequently refuted

Risks to the "Five Pillars"

Natural (Floods, Earthquakes, Lightning etc)




Accidental (Internal/External)




Deliberate (Hacking, Virus, Espionage etc)

Email Security

Practically anyone can see an email it seems

Browser Threats

1. Cookies


2. Java


3. Javascript


4. ActiveX


5. VBS (Visual Basic Scripting)


6. Flash

Botnet

A botnet is a collection, sometimes more than a million machines, of PCs that have been compromised (owned) – and can then be controlled by the bot master (not you).




The process of owning a machine often takes place through the execution of a Javascript on the targeted machine.

Cryptography with Data in Transit

It secures:


1. Secure electronic commerce


2. User and data authentication


3. Email security


4. Secure software update (technical)


5. Wireless network traffic

Cryptography with Data at Rest (Stored Data)

It secures:




1. Privacy of stored data (notebooks, etc)


2. Secure audit logs (technical)

Bluetooth and Phone Security

Attackers can access your phone from very far away through bluetooth

EMF (Electro Magnetic Frequencies)

Can damage your body, is a carcinogenic (Apparently)

Ubiquitious Computing

"Computing Everywhere"




For example, phone, smart watch, tablet, laptop etc. Owned all by one user.

Three basics forms for Ubiquitious Computing

Tabs: wearable centimetre sized devices (smart watch)




Pads: hand-held decimetre-sized devices (phones)




Boards: metre sized interactive display devices (airport terminals)

Principles for ubiqitious computing

The purpose of a computer is to help you do something else


The best computer is a quiet, invisible servant




The more you can do by intuition the smarter you are; the computer should extend your unconscious


Technology should create calm (calm technology)

Automatic capture and access in Ubiqitious Computing

Can remove burden of doing something humans are not good at (i.e., recording).




Humans can focus attention on activities they are good at (i.e., indicating relationships, summarising, and interpreting).

Context Awareness in Ubiqitious Computing

Application development that allows for collection of context and dynamic program behaviour dictated by knowledge of the current context (e.g., environment and the users state).

Natural User Interfaces in Ubiqitious Computing

Physical interaction between humans and computation will be less like current desktop keyboard/mouse/display paradigm, more like the way humans interact with physical world.




New interfaces have better usability, learn ability, ease of use.

User Experience or Usability before usage?

User Experience




Trust, Design, Packaging, Utility, Fancy, Brand, etc.

User Experience or Usability while using?

Usability




Accessibility, Readability, Efficiency, Errors, Operability

User Experience or Usability after usage?

User Experience




Joy, Disappointment, Frustration, Emotion, Happiness etc.

Types of people needed for Human Computer Interface Development

Computer and Information Scientist


Psychologists


Designers


Tech Writers


Human Factor and Ergonomics Experts


Domain Experts

Human Computer Interface Development Process

1. Acceptance


2. Analysis


3. Definition


4. Ideation


5. Idea Selection


6. Implementation


7. Evaluation