The use of Linux based Operating Systems (OS) in the classroom is increasing, but there is little research to address usability differences between Windows and Linux based OSs. Moreover, studies related to the ability for students to navigate effectively between Ubuntu 14.04 Long Term Support (LTS) and Windows 8 OSs are scant. This research aims to bridge the gap between modern Linux and Windows Oss, as the former represents a viable alternative to eliminate licensing costs for educational institutions. Preliminary findings, based on the analysis of the System Usability Scale results from a sample of 14 students, demonstrated that Ubuntu users did not require technical support to use the system, while the majority found little inconsistency in the system and regarded it as well integrated.
The Case for Ubuntu: Linux Operating System Performance and Usability for Use...Maurice Dawson
Maurice Dawson (University of Missouri – St. Louis)
Brittany DeWalt (Alabama A&M University)
Simon Cleveland (Nova Southern University)
Dawson, M., DeWals, B., Cleveland, S., The Case For Ubuntu: Linux Operating System Performance and Usability for Use in Higher Education in a Virtualized Environment. ABSTRACT The use of Linux based Operating Systems (OS) in the classroom is increasing but there is little research to address usability differences between Windows and Linux based OSs. Moreover, studies related to the ability for students to navigate effectively between Ubuntu 14.04 Long Term Support (LTS) and Windows 8 OSs are scant. This research aims to bridge the gap between modern Linux and Windows OSs as the former represents a viable alternative to eliminate licensing costs for educational institutions. Preliminary findings demonstrated that Ubuntu users did not require technical support to use the
system, while the majority found little inconsistency in the system and regarded it as well integrated.
Common protocol to support disparate communication types within industrial Et...Maurice Dawson
Owing to the increasing demand for reliable products built globally, and through the evolution of machine design, the need for improved and a common communications protocol in different geographical regions has intensified. In this paper, the goal is to reveal that the current protocols used to support disparate communication types in manufacturing have caused complexity in configurations and an increase in monetary overhead for industrial system designers and the end users. Through the simulation of an industrial network, the packet timing, and packet loss between peer-to-peer systems, similar protocol systems will be compared with two dissimilar protocols systems to establish the thesis. The internal validation research method used in this study will reveal the need for an all-inclusive protocol to eliminate the timing and packet loss issues, the systems’ configuration complexities, and the need to reduce the monetary overhead currently associated with the machine communications.
An Examination of the Prior Use of E-Learning Within an Extended Technology A...Maurice Dawson
The purpose of this empirical study was to test specific factors of behavioral intention to use m-learning in a community college setting using a modified technology acceptance model and antecedent factors suggested by the researcher’s review of the literature. In addition, the study’s purpose was to expand understanding of behavioral intention to use m-learning and to contribute to the growing body of research. This research model was based on relevant technology acceptance literature. The study examines the significance of “prior use of e-learning” and correlation with the behavioral intention to use m-learning. Existing models have looked at prior use of e-learning in other domains, but not specifically m-learning. Other models and studies have primarily looked at the prior use of e-learning variable as a moderating variable and not one that is directly related to attitude and behavioral intention. The study found that there is a relationship between prior use of e-learning and behavioral intention to use m-learning. This research direction was proposed by Lu and Viehland.
Understanding User’s Acceptance of Personal Cloud Computing: Using the Techno...Maurice Dawson
Personal Cloud Computing (PCC) is a rapidly growing technology, addressing the market demand of individual users for access to available and reliable resources. But like other new technologies, concerns and issues have surfaced with the adoption of PCC. Users deciding whether to adopt PCC may be concerned about the ease of use, usefulness, or security risks in the cloud. Negative attitudes toward using a technology have been found to negatively impact the success of that technology. The purpose of this study was to understand users’ acceptance of PCC. The population sample consisted of individual users within the United States between 18 and 80 years of age. The theoretical framework utilized in this study was based on the technology acceptance model (TAM). A web survey was conducted to assess the measurement and understanding of patterns demonstrated by participants. Our results shows that in spite of the potential benefits of PCC, security and privacy risks are deterring many users from moving towards PCC.
EXTENSION OF TECHNOLOGY ACCEPTANCE MODEL (TAM): A STUDY ON INDIAN INTERNET BA...IAEME Publication
Internet banking plays significant role in the development of banking business in our country. An application of electronic service brings predominant changes in the way of doing banking transactions. In simpler terms, internet banking refers to banking through bank’s website with the help of internet connection. Internet banking provides lot of benefits to the customers as well as the banks. Internet banking provides different kinds of services to the customers in the form checking balances, account statement, pay utility bills etc
User satisfaction and technology acceptancePico Ya
The document summarizes key concepts related to user satisfaction and technology acceptance. It discusses the Technology Acceptance Model (TAM), which identifies perceived usefulness and perceived ease-of-use as factors influencing whether users will accept and use new technologies. It also defines technology diffusion as the spread of technology throughout an organization, and technology infusion as the extent to which technology is embedded within departments.
The document discusses the Technology Acceptance Model (TAM) and its viability for determining acceptance of e-learning technologies in higher education institutions. TAM identifies perceived usefulness and perceived ease of use as key factors influencing attitudes toward and use of new technologies. The document reviews literature on TAM and its constructs. It also presents two case studies that applied TAM to evaluate student acceptance of online technologies for communication and public relations courses. Both case studies found TAM to be an effective model for predicting technology use.
This document discusses conceptual literature related to network monitoring and diagnosis systems. It provides definitions and descriptions of key concepts from various sources, including network monitoring, bandwidth, uptime, downtime, uploading/downloading, user sessions, CPU utilization, fault detection, peer-to-peer networking, network interface cards, routers, network flows, and the strategic importance of network monitoring. Diagrams and tables are included to illustrate several of these concepts.
The Case for Ubuntu: Linux Operating System Performance and Usability for Use...Maurice Dawson
Maurice Dawson (University of Missouri – St. Louis)
Brittany DeWalt (Alabama A&M University)
Simon Cleveland (Nova Southern University)
Dawson, M., DeWals, B., Cleveland, S., The Case For Ubuntu: Linux Operating System Performance and Usability for Use in Higher Education in a Virtualized Environment. ABSTRACT The use of Linux based Operating Systems (OS) in the classroom is increasing but there is little research to address usability differences between Windows and Linux based OSs. Moreover, studies related to the ability for students to navigate effectively between Ubuntu 14.04 Long Term Support (LTS) and Windows 8 OSs are scant. This research aims to bridge the gap between modern Linux and Windows OSs as the former represents a viable alternative to eliminate licensing costs for educational institutions. Preliminary findings demonstrated that Ubuntu users did not require technical support to use the
system, while the majority found little inconsistency in the system and regarded it as well integrated.
Common protocol to support disparate communication types within industrial Et...Maurice Dawson
Owing to the increasing demand for reliable products built globally, and through the evolution of machine design, the need for improved and a common communications protocol in different geographical regions has intensified. In this paper, the goal is to reveal that the current protocols used to support disparate communication types in manufacturing have caused complexity in configurations and an increase in monetary overhead for industrial system designers and the end users. Through the simulation of an industrial network, the packet timing, and packet loss between peer-to-peer systems, similar protocol systems will be compared with two dissimilar protocols systems to establish the thesis. The internal validation research method used in this study will reveal the need for an all-inclusive protocol to eliminate the timing and packet loss issues, the systems’ configuration complexities, and the need to reduce the monetary overhead currently associated with the machine communications.
An Examination of the Prior Use of E-Learning Within an Extended Technology A...Maurice Dawson
The purpose of this empirical study was to test specific factors of behavioral intention to use m-learning in a community college setting using a modified technology acceptance model and antecedent factors suggested by the researcher’s review of the literature. In addition, the study’s purpose was to expand understanding of behavioral intention to use m-learning and to contribute to the growing body of research. This research model was based on relevant technology acceptance literature. The study examines the significance of “prior use of e-learning” and correlation with the behavioral intention to use m-learning. Existing models have looked at prior use of e-learning in other domains, but not specifically m-learning. Other models and studies have primarily looked at the prior use of e-learning variable as a moderating variable and not one that is directly related to attitude and behavioral intention. The study found that there is a relationship between prior use of e-learning and behavioral intention to use m-learning. This research direction was proposed by Lu and Viehland.
Understanding User’s Acceptance of Personal Cloud Computing: Using the Techno...Maurice Dawson
Personal Cloud Computing (PCC) is a rapidly growing technology, addressing the market demand of individual users for access to available and reliable resources. But like other new technologies, concerns and issues have surfaced with the adoption of PCC. Users deciding whether to adopt PCC may be concerned about the ease of use, usefulness, or security risks in the cloud. Negative attitudes toward using a technology have been found to negatively impact the success of that technology. The purpose of this study was to understand users’ acceptance of PCC. The population sample consisted of individual users within the United States between 18 and 80 years of age. The theoretical framework utilized in this study was based on the technology acceptance model (TAM). A web survey was conducted to assess the measurement and understanding of patterns demonstrated by participants. Our results shows that in spite of the potential benefits of PCC, security and privacy risks are deterring many users from moving towards PCC.
EXTENSION OF TECHNOLOGY ACCEPTANCE MODEL (TAM): A STUDY ON INDIAN INTERNET BA...IAEME Publication
Internet banking plays significant role in the development of banking business in our country. An application of electronic service brings predominant changes in the way of doing banking transactions. In simpler terms, internet banking refers to banking through bank’s website with the help of internet connection. Internet banking provides lot of benefits to the customers as well as the banks. Internet banking provides different kinds of services to the customers in the form checking balances, account statement, pay utility bills etc
User satisfaction and technology acceptancePico Ya
The document summarizes key concepts related to user satisfaction and technology acceptance. It discusses the Technology Acceptance Model (TAM), which identifies perceived usefulness and perceived ease-of-use as factors influencing whether users will accept and use new technologies. It also defines technology diffusion as the spread of technology throughout an organization, and technology infusion as the extent to which technology is embedded within departments.
The document discusses the Technology Acceptance Model (TAM) and its viability for determining acceptance of e-learning technologies in higher education institutions. TAM identifies perceived usefulness and perceived ease of use as key factors influencing attitudes toward and use of new technologies. The document reviews literature on TAM and its constructs. It also presents two case studies that applied TAM to evaluate student acceptance of online technologies for communication and public relations courses. Both case studies found TAM to be an effective model for predicting technology use.
This document discusses conceptual literature related to network monitoring and diagnosis systems. It provides definitions and descriptions of key concepts from various sources, including network monitoring, bandwidth, uptime, downtime, uploading/downloading, user sessions, CPU utilization, fault detection, peer-to-peer networking, network interface cards, routers, network flows, and the strategic importance of network monitoring. Diagrams and tables are included to illustrate several of these concepts.
TAMEx framework as an alternative for e-exam implementation in wireless networkTELKOMNIKA JOURNAL
One of significant change in learning process is exam implementation applying a computer-based test (e-exam) rather than paper-based test. Many institutions currently use wireless network with bring your own device (BYOD) policy for their e-exam implementation, due to limitation of space and user terminals. Moreover it is hard to maintain the availability of reliable signal quality in wireless network for all users during e-exam process. Therefore, this research proposes a development of time adaptive for mobile exam (TAMEx) framework to provide all users with good quality of service of e-exam in wireless network environment when dealing with signal quality variations. The received signal strength indication (RSSI) is the main indicator of the signal quality. The framework supports e-exam implementation in wirelesslocal area network and the use of BYOD mechanism. The research shows that the framework successfully has provided time compensation for the users who experienced temporary connection loss due to bad signal quality. The result exhibits that tiny processing time has been needed for signal loss detection, user’s request of compensation time, and server’s execution. In conclusion, the TAMEx could guarantee good services for all users who doing e-exam in wireless network environment.
Effects of Developers’ Training on User-Developer Interactions in Information...Jennifer McCauley
The importance of user-developer interactions during the development of an information system has been a long-running theme in information systems research. This research seeks to highlight a gap in the current literature: the contribution of the developer’s formal educational background to the relationship between developers and users. Using an interpretivist epistemology, the researchers employed qualitative interviews to examine how far developers’ perception of the importance of interacting with the user was influenced by their formal education, or the lack thereof. Interviewing both formally and informally trained developers, eleven categories of interest were identified as pertinent to determining the developers’ beliefs about the importance of user interaction. Three of these categories were explored as promising for future research: academic background, work experience, and developer’s access to user knowledge. This research has implications for education of information systems developers as well as for industry interested in hiring software developers.
A Multimedia Data Mining Framework for Monitoring E-Examination Environmentijma
Academic dishonesty has been a growing concern in e-learning environment due to the fact that eexamination takes place under supervised and unsupervised learning environment despite its huge advantages. The e-examination environment has faced various security breaches such as academic dishonesty (impersonation), identity theft, unauthorised access and illegal assistance as a result of inefficient measures employed. Hence, an efficient framework which will aid the monitoring of the eexamination is needed. This paper reviews the process of mining multimedia data and propose a framework for monitoring the e-examination environment in order to extract images and audio features. The framework has four major phases: data pre-processing, mining, association and post processing. The
pre-processing phases carries out the extraction and transformation of multimedia data features, the mining phase does the classification and clustering of these features, the association does pattern matching while the post processing carries out the knowledge interpretation and reporting. The approach presented in this study will allow for efficient and accurate monitoring of e-examination environment which will help provide adequate security and reduce unethical behaviour in e-examination environment.
An educational bluetooth quizzing application in androidijwmn
Bluetooth is one of the most prevalent technologies available on mobile phones. One of the key questions
how to harness this technology in an educational manner in universities and schools. This paper is about a
Bluetooth quizzing system which will be used to administer quizzes to students of a university. The
Bluetooth quizzing application consists of a server and client mobile Android application. It will utilize a
queuing system to allow many clients to connect simultaneously to the server. When clients connect, they
can register or choose the option to complete a quiz that the lecturer selected. Results are automatically
sent when quiz is done from the client application. Data analysis can then be done to review the progress of
students.
User-driven Technology Evaluation of eParticipation SystemsSotiris Koussouris
The document discusses the evaluation of an eParticipation system called WEB.DEP, which was implemented in three Balkan countries. The evaluation assessed how user characteristics affected their perceptions and intentions regarding the system. A technology acceptance model was used to evaluate how factors like education level, job relevance, and prior experience influenced users' perceived usefulness, ease of use, and intention to use the system. The evaluation found that education level had a positive impact, while prior experience surprisingly had a negative impact. The results will be used to refine the system and technology acceptance model.
A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...IJSEA
Nowadays, with the rapid growth of cloud computing, many industries are going to move their computing
activities to clouds. Researchers of virtual learning are also looking for the ways to use clouds through
mobile platforms. This paper offers a model to accompany the benefits of “Mobile Intelligent Learning”
technology and “Cloud Computing”. The architecture of purposed system is based on multi-layer
architecture of Mobile Cloud Computing. Despite the existing challenges, the system has increased the life
of mobile device battery. It will raise working memory capacity and processing capacity of the educational
system in addition to the greater advantage of the educational system. The proposed system allows the
users to enjoy an intelligent learning every-time and every-where, reduces training costs and hardware
dependency, and increases consistency, efficiency, and data reliability.
The delone and mclean model of information systems successHamideh Iraj
The delone and mclean model of information systems success
The main Resource:
Integrated Series in Information Systems, Volume 28, Information Systems Theory Explaining and Predicting Our Digital Society, Vol. 1, Springer; 2012 edition
The UTAUT model aims to explain user intentions to use information systems and subsequent usage behavior. It was developed by reviewing and consolidating eight previous models of technology acceptance. The UTAUT model proposes four key constructs that influence usage intention and behavior: performance expectancy, effort expectancy, social influence, and facilitating conditions. Gender, age, experience, and voluntariness of use are hypothesized to moderate the impact of the four constructs. Several studies have applied the UTAUT model to domains such as mobile service adoption, social media adoption, and computer use frequency. Some researchers have also extended the UTAUT model by adding additional constructs. However, others have critiqued the UTAUT model for having many independent variables and
A rule based higher institution of learning admission decision support systemAlexander Decker
1) The document discusses the development of a rule-based decision support system for admission decisions in higher education institutions.
2) It reviews literature on decision support systems and decision modeling approaches. Knowledge is gathered from education administrators to develop rules for the system.
3) The system aims to help school managers make better admission decisions by building a better information system using a rule-based approach.
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESijaia
The goal of this research project is to design and implement a mobile application and machine learning techniques to solve problems related to the security of mobile devices. We introduce in this paper a behavior-based approach that can be applied in a mobile environment to capture and learn the behavior of
mobile users. The proposed system was tested using Android OS and the initial experimental results show that the proposed technique is promising, and it can be used effectively to solve the problem of anomaly detection in mobile devices.
This document presents a proposal for developing a mobile voting application for students at Taita Taveta University College in Kenya. The current manual voting system is time-consuming and inefficient. The proposed mobile application aims to allow students to conveniently vote from anywhere using their mobile phones. It seeks to address challenges with the current system like low voter turnout and ensure a transparent voting process. The document reviews similar mobile voting systems and discusses the design and development of a prototype application for the university that is secure, reliable and sends reminders to students to vote.
User participation in ERP Implementation: A Case-based StudyEditor IJCATR
Information Systems (IS), such as Enterprise Resource Planning (ERP) systems, are being developed and used in
organizations to achieve their business goals and to enhance organizational effectiveness. The effect of user participation on
successful systems development and implementation of ERP systems continues to be an area of interest to researchers. Common
understanding has been that extensive user participation is not only important, but absolutely essential to system success. Even with
this understanding of user participation as one of the critical factor in successful IS development and implementation, empirical studies
have been unable to conclusively link user participation to systems success. This paper uses a private university as a case study to
examine the role played by user participation in the implementation of an ERP system. In order to achieve its objective, this study
adopted a mixed method where both qualitative and quantitative approaches were used in the collection of data. The results of the
study reveal that user participation has a positive impact on the likelihood of ERP system success, user participation by choice is the
best, user participation leads to better understanding of system requirements, the more participation the more the satisfied the users are,
and participation builds support for the system during implementation. From our results we conclude that user participation in ERP
system implementation is critical for successful implementation.
Information security approach in open distributed multi agent virtual learnin...ijcsit
This paper presented the main information, security problems and threats in open multi-agent distributed
e-learning information systems and Proposed various approaches to solve information security attacks in
virtual learning environment using service oriented architecture which based on multi-agent information
systems architecture, the solution on the multi-agent learning information system implementation based on
the implementation of two types of systems the first system with the centralized mobile agent information
security management and the second system with decentralized mobile agents security management, and
proposed the migration behavior simulation for their active software components (software agents) .
This document summarizes a study on how delays and inactivity gaps during an information system implementation affect end user perception. The study examined employees within the accounts team of a company called DFS that was implementing a new accounting system called Ashton over 5 years. The findings showed that short delays during implementation negatively impacted end user perception, while longer delays had a minor effect. However, delays did not influence satisfaction levels during actual system usage. The document reviews literature on how delays are perceived and can impact user acceptance based on models like the Technology Acceptance Model and Expectation Confirmation Model.
An efficient control of virus propagationUltraUploader
This document discusses the development of an Efficient Control of Virus Propagation (ECOVP) system using case-based reasoning and object-oriented methodology. It conducted a questionnaire survey that found many computer users in Malaysia lack awareness of computer viruses and there is a need for an effective system to guide users in handling virus incidents. The ECOVP system was developed to educate users and help control virus propagation by providing customized solutions based on the symptoms users describe. It was tested for accuracy and usability and found to successfully help users clean infected machines and prevent future infections.
Pact Analysis Report for a Student Attendance SystemUpekha Vandebona
This document contains a PACT (People, Activities, Context, Technology) analysis for a proposed student attendance system at a university. It identifies the key stakeholders as students, lecturers, administration staff, and oversight boards. The main activities are capturing student attendance at lectures, confirming attendance by lecturers, backing up the data, and later monitoring attendance patterns. The system must consider the physical, social, and organizational contexts of capturing attendance efficiently and accurately indoors without disturbing others. Fingerprint authentication is identified as an ideal technological solution due to its accuracy, ease of use, and ability to prevent impersonation, though it has a higher cost compared to other options like signature verification.
Running Head WINDOWS AND LINUX 1WINDOWS AND LINUX12.docxjeffsrosalyn
Running Head: WINDOWS AND LINUX 1
WINDOWS AND LINUX 12
Project 2: Operating Systems Vulnerabilities
Aisha Tate
UMUC
August 8, 2019
Hi Aisha
I know you submitted this report before the detailed self analysis you did last week. Please go through this checklist. First, work through the lab results, perform the necessary research and complete the SAR report. The PowerPoint presentation is the last item to be completed. Review this checklist and let me know if you have any questions before you start your work.
Thanks for your continued efforts.
Dr K
Student Name: Aisha Tate
Date:6-Sep-2019
This form provides the same classroom instructions in a checklist form to help students and professors quickly evaluate a submission
Project 2: Requires the Following THREE Pieces
Areas to Improve
1. Security Assessment Report (including relevant findings from Lab)
Revise
2. Non-Technical Presentation Slides (Narration Not Needed)
Revise
3. Lab Experience Report with Screenshots
Revise
1. Security Assessment Report
Defining the OS
Brief explanation of operating systems (OS) fundamentals and information systems architectures.
Meets expectations
1. Explain the user's role in an OS.
????
2. Explain the differences between kernel applications of the OS and the applications installed by an organization or user.
Does not meet expectation
3. Describe the embedded OS.
More details needed
4. Describe how operating systems fit in the overall information systems architecture, of which cloud computing is an emerging, distributed computing network architecture.
More details needed
Include a brief definition of operating systems and information systems in your SAR.
Other outstanding information
Need to find better references/ more details – use tables or graphs
OS Vulnerabilities
1. Explain Windows vulnerabilities and Linux vulnerabilities.
???
2. Explain the Mac OS vulnerabilities, and vulnerabilities of mobile devices.
Research needed
3. Explain the motives and methods for intrusion of MS and Linux operating systems.
????
4. Explain the types of security management technologies such as intrusion detection and intrusion prevention systems.
5. Describe how and why different corporate and government systems are targets.
Does not meet requirements
6. Describe different types of intrusions such as SQL PL/SQL, XML, and other injections
Preparing for the Vulnerability Scan
1. Include a description of the methodology you proposed to assess the vulnerabilities of the operating systems.
Please review project instructionss
2. Provide an explanation and reasoning of how the methodology you propose, will determine the existence of those vulnerabilities in the organization’s OS.
3. Include a description of the applicable tools to be used, limitations, and analysis.
4. Provide an explanation and reasoning of how the applicable tools you propose will determine the existence of those vulnerabilities in the organization’s OS.
The document discusses the Raspbian operating system. Raspbian is based on Debian and was specifically designed and optimized to run on Raspberry Pi single-board computers. It inherits most traits from its parent Debian operating system, including using the Linux or FreeBSD kernel. Raspbian aims to provide a full-featured and easy to use operating system for Raspberry Pi users.
This seminar discusses operating systems for secondary education information communication technology. It defines an operating system as software that manages computer hardware and allows other programs to run. The document outlines the history, features, types, functions and examples of operating systems. It discusses how operating systems handle processes, memory, devices, files, errors and security. The conclusion states that an operating system acts as an interface between hardware, software and users.
The document discusses different types of operating systems. It explains that an operating system manages hardware and software resources on a device and provides a consistent interface for applications. Not all devices need complex operating systems; simple devices like microwaves run single hardcoded programs. However, most computers use general purpose operating systems that can be adapted for different hardware over time. The document outlines several categories of operating systems including those for desktops, real-time applications, single-user vs. multi-user, and networking.
TAMEx framework as an alternative for e-exam implementation in wireless networkTELKOMNIKA JOURNAL
One of significant change in learning process is exam implementation applying a computer-based test (e-exam) rather than paper-based test. Many institutions currently use wireless network with bring your own device (BYOD) policy for their e-exam implementation, due to limitation of space and user terminals. Moreover it is hard to maintain the availability of reliable signal quality in wireless network for all users during e-exam process. Therefore, this research proposes a development of time adaptive for mobile exam (TAMEx) framework to provide all users with good quality of service of e-exam in wireless network environment when dealing with signal quality variations. The received signal strength indication (RSSI) is the main indicator of the signal quality. The framework supports e-exam implementation in wirelesslocal area network and the use of BYOD mechanism. The research shows that the framework successfully has provided time compensation for the users who experienced temporary connection loss due to bad signal quality. The result exhibits that tiny processing time has been needed for signal loss detection, user’s request of compensation time, and server’s execution. In conclusion, the TAMEx could guarantee good services for all users who doing e-exam in wireless network environment.
Effects of Developers’ Training on User-Developer Interactions in Information...Jennifer McCauley
The importance of user-developer interactions during the development of an information system has been a long-running theme in information systems research. This research seeks to highlight a gap in the current literature: the contribution of the developer’s formal educational background to the relationship between developers and users. Using an interpretivist epistemology, the researchers employed qualitative interviews to examine how far developers’ perception of the importance of interacting with the user was influenced by their formal education, or the lack thereof. Interviewing both formally and informally trained developers, eleven categories of interest were identified as pertinent to determining the developers’ beliefs about the importance of user interaction. Three of these categories were explored as promising for future research: academic background, work experience, and developer’s access to user knowledge. This research has implications for education of information systems developers as well as for industry interested in hiring software developers.
A Multimedia Data Mining Framework for Monitoring E-Examination Environmentijma
Academic dishonesty has been a growing concern in e-learning environment due to the fact that eexamination takes place under supervised and unsupervised learning environment despite its huge advantages. The e-examination environment has faced various security breaches such as academic dishonesty (impersonation), identity theft, unauthorised access and illegal assistance as a result of inefficient measures employed. Hence, an efficient framework which will aid the monitoring of the eexamination is needed. This paper reviews the process of mining multimedia data and propose a framework for monitoring the e-examination environment in order to extract images and audio features. The framework has four major phases: data pre-processing, mining, association and post processing. The
pre-processing phases carries out the extraction and transformation of multimedia data features, the mining phase does the classification and clustering of these features, the association does pattern matching while the post processing carries out the knowledge interpretation and reporting. The approach presented in this study will allow for efficient and accurate monitoring of e-examination environment which will help provide adequate security and reduce unethical behaviour in e-examination environment.
An educational bluetooth quizzing application in androidijwmn
Bluetooth is one of the most prevalent technologies available on mobile phones. One of the key questions
how to harness this technology in an educational manner in universities and schools. This paper is about a
Bluetooth quizzing system which will be used to administer quizzes to students of a university. The
Bluetooth quizzing application consists of a server and client mobile Android application. It will utilize a
queuing system to allow many clients to connect simultaneously to the server. When clients connect, they
can register or choose the option to complete a quiz that the lecturer selected. Results are automatically
sent when quiz is done from the client application. Data analysis can then be done to review the progress of
students.
User-driven Technology Evaluation of eParticipation SystemsSotiris Koussouris
The document discusses the evaluation of an eParticipation system called WEB.DEP, which was implemented in three Balkan countries. The evaluation assessed how user characteristics affected their perceptions and intentions regarding the system. A technology acceptance model was used to evaluate how factors like education level, job relevance, and prior experience influenced users' perceived usefulness, ease of use, and intention to use the system. The evaluation found that education level had a positive impact, while prior experience surprisingly had a negative impact. The results will be used to refine the system and technology acceptance model.
A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...IJSEA
Nowadays, with the rapid growth of cloud computing, many industries are going to move their computing
activities to clouds. Researchers of virtual learning are also looking for the ways to use clouds through
mobile platforms. This paper offers a model to accompany the benefits of “Mobile Intelligent Learning”
technology and “Cloud Computing”. The architecture of purposed system is based on multi-layer
architecture of Mobile Cloud Computing. Despite the existing challenges, the system has increased the life
of mobile device battery. It will raise working memory capacity and processing capacity of the educational
system in addition to the greater advantage of the educational system. The proposed system allows the
users to enjoy an intelligent learning every-time and every-where, reduces training costs and hardware
dependency, and increases consistency, efficiency, and data reliability.
The delone and mclean model of information systems successHamideh Iraj
The delone and mclean model of information systems success
The main Resource:
Integrated Series in Information Systems, Volume 28, Information Systems Theory Explaining and Predicting Our Digital Society, Vol. 1, Springer; 2012 edition
The UTAUT model aims to explain user intentions to use information systems and subsequent usage behavior. It was developed by reviewing and consolidating eight previous models of technology acceptance. The UTAUT model proposes four key constructs that influence usage intention and behavior: performance expectancy, effort expectancy, social influence, and facilitating conditions. Gender, age, experience, and voluntariness of use are hypothesized to moderate the impact of the four constructs. Several studies have applied the UTAUT model to domains such as mobile service adoption, social media adoption, and computer use frequency. Some researchers have also extended the UTAUT model by adding additional constructs. However, others have critiqued the UTAUT model for having many independent variables and
A rule based higher institution of learning admission decision support systemAlexander Decker
1) The document discusses the development of a rule-based decision support system for admission decisions in higher education institutions.
2) It reviews literature on decision support systems and decision modeling approaches. Knowledge is gathered from education administrators to develop rules for the system.
3) The system aims to help school managers make better admission decisions by building a better information system using a rule-based approach.
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESijaia
The goal of this research project is to design and implement a mobile application and machine learning techniques to solve problems related to the security of mobile devices. We introduce in this paper a behavior-based approach that can be applied in a mobile environment to capture and learn the behavior of
mobile users. The proposed system was tested using Android OS and the initial experimental results show that the proposed technique is promising, and it can be used effectively to solve the problem of anomaly detection in mobile devices.
This document presents a proposal for developing a mobile voting application for students at Taita Taveta University College in Kenya. The current manual voting system is time-consuming and inefficient. The proposed mobile application aims to allow students to conveniently vote from anywhere using their mobile phones. It seeks to address challenges with the current system like low voter turnout and ensure a transparent voting process. The document reviews similar mobile voting systems and discusses the design and development of a prototype application for the university that is secure, reliable and sends reminders to students to vote.
User participation in ERP Implementation: A Case-based StudyEditor IJCATR
Information Systems (IS), such as Enterprise Resource Planning (ERP) systems, are being developed and used in
organizations to achieve their business goals and to enhance organizational effectiveness. The effect of user participation on
successful systems development and implementation of ERP systems continues to be an area of interest to researchers. Common
understanding has been that extensive user participation is not only important, but absolutely essential to system success. Even with
this understanding of user participation as one of the critical factor in successful IS development and implementation, empirical studies
have been unable to conclusively link user participation to systems success. This paper uses a private university as a case study to
examine the role played by user participation in the implementation of an ERP system. In order to achieve its objective, this study
adopted a mixed method where both qualitative and quantitative approaches were used in the collection of data. The results of the
study reveal that user participation has a positive impact on the likelihood of ERP system success, user participation by choice is the
best, user participation leads to better understanding of system requirements, the more participation the more the satisfied the users are,
and participation builds support for the system during implementation. From our results we conclude that user participation in ERP
system implementation is critical for successful implementation.
Information security approach in open distributed multi agent virtual learnin...ijcsit
This paper presented the main information, security problems and threats in open multi-agent distributed
e-learning information systems and Proposed various approaches to solve information security attacks in
virtual learning environment using service oriented architecture which based on multi-agent information
systems architecture, the solution on the multi-agent learning information system implementation based on
the implementation of two types of systems the first system with the centralized mobile agent information
security management and the second system with decentralized mobile agents security management, and
proposed the migration behavior simulation for their active software components (software agents) .
This document summarizes a study on how delays and inactivity gaps during an information system implementation affect end user perception. The study examined employees within the accounts team of a company called DFS that was implementing a new accounting system called Ashton over 5 years. The findings showed that short delays during implementation negatively impacted end user perception, while longer delays had a minor effect. However, delays did not influence satisfaction levels during actual system usage. The document reviews literature on how delays are perceived and can impact user acceptance based on models like the Technology Acceptance Model and Expectation Confirmation Model.
An efficient control of virus propagationUltraUploader
This document discusses the development of an Efficient Control of Virus Propagation (ECOVP) system using case-based reasoning and object-oriented methodology. It conducted a questionnaire survey that found many computer users in Malaysia lack awareness of computer viruses and there is a need for an effective system to guide users in handling virus incidents. The ECOVP system was developed to educate users and help control virus propagation by providing customized solutions based on the symptoms users describe. It was tested for accuracy and usability and found to successfully help users clean infected machines and prevent future infections.
Pact Analysis Report for a Student Attendance SystemUpekha Vandebona
This document contains a PACT (People, Activities, Context, Technology) analysis for a proposed student attendance system at a university. It identifies the key stakeholders as students, lecturers, administration staff, and oversight boards. The main activities are capturing student attendance at lectures, confirming attendance by lecturers, backing up the data, and later monitoring attendance patterns. The system must consider the physical, social, and organizational contexts of capturing attendance efficiently and accurately indoors without disturbing others. Fingerprint authentication is identified as an ideal technological solution due to its accuracy, ease of use, and ability to prevent impersonation, though it has a higher cost compared to other options like signature verification.
Running Head WINDOWS AND LINUX 1WINDOWS AND LINUX12.docxjeffsrosalyn
Running Head: WINDOWS AND LINUX 1
WINDOWS AND LINUX 12
Project 2: Operating Systems Vulnerabilities
Aisha Tate
UMUC
August 8, 2019
Hi Aisha
I know you submitted this report before the detailed self analysis you did last week. Please go through this checklist. First, work through the lab results, perform the necessary research and complete the SAR report. The PowerPoint presentation is the last item to be completed. Review this checklist and let me know if you have any questions before you start your work.
Thanks for your continued efforts.
Dr K
Student Name: Aisha Tate
Date:6-Sep-2019
This form provides the same classroom instructions in a checklist form to help students and professors quickly evaluate a submission
Project 2: Requires the Following THREE Pieces
Areas to Improve
1. Security Assessment Report (including relevant findings from Lab)
Revise
2. Non-Technical Presentation Slides (Narration Not Needed)
Revise
3. Lab Experience Report with Screenshots
Revise
1. Security Assessment Report
Defining the OS
Brief explanation of operating systems (OS) fundamentals and information systems architectures.
Meets expectations
1. Explain the user's role in an OS.
????
2. Explain the differences between kernel applications of the OS and the applications installed by an organization or user.
Does not meet expectation
3. Describe the embedded OS.
More details needed
4. Describe how operating systems fit in the overall information systems architecture, of which cloud computing is an emerging, distributed computing network architecture.
More details needed
Include a brief definition of operating systems and information systems in your SAR.
Other outstanding information
Need to find better references/ more details – use tables or graphs
OS Vulnerabilities
1. Explain Windows vulnerabilities and Linux vulnerabilities.
???
2. Explain the Mac OS vulnerabilities, and vulnerabilities of mobile devices.
Research needed
3. Explain the motives and methods for intrusion of MS and Linux operating systems.
????
4. Explain the types of security management technologies such as intrusion detection and intrusion prevention systems.
5. Describe how and why different corporate and government systems are targets.
Does not meet requirements
6. Describe different types of intrusions such as SQL PL/SQL, XML, and other injections
Preparing for the Vulnerability Scan
1. Include a description of the methodology you proposed to assess the vulnerabilities of the operating systems.
Please review project instructionss
2. Provide an explanation and reasoning of how the methodology you propose, will determine the existence of those vulnerabilities in the organization’s OS.
3. Include a description of the applicable tools to be used, limitations, and analysis.
4. Provide an explanation and reasoning of how the applicable tools you propose will determine the existence of those vulnerabilities in the organization’s OS.
The document discusses the Raspbian operating system. Raspbian is based on Debian and was specifically designed and optimized to run on Raspberry Pi single-board computers. It inherits most traits from its parent Debian operating system, including using the Linux or FreeBSD kernel. Raspbian aims to provide a full-featured and easy to use operating system for Raspberry Pi users.
This seminar discusses operating systems for secondary education information communication technology. It defines an operating system as software that manages computer hardware and allows other programs to run. The document outlines the history, features, types, functions and examples of operating systems. It discusses how operating systems handle processes, memory, devices, files, errors and security. The conclusion states that an operating system acts as an interface between hardware, software and users.
The document discusses different types of operating systems. It explains that an operating system manages hardware and software resources on a device and provides a consistent interface for applications. Not all devices need complex operating systems; simple devices like microwaves run single hardcoded programs. However, most computers use general purpose operating systems that can be adapted for different hardware over time. The document outlines several categories of operating systems including those for desktops, real-time applications, single-user vs. multi-user, and networking.
This document provides a comparative analysis of the operating systems Linux, Windows, and Macintosh. It summarizes their key features such as booting process, user interface, system resource management, file management, device administration, and security. For each feature, it provides details about how it is implemented in each operating system and compares them in tabular form. Some of the main points discussed include the graphical versus command line interfaces, different commands and applications used to monitor resources and manage files, and the built-in security measures of each system.
IT109 Microsoft Windows 7 Operating Systems Unit 01blusmurfydot1
IT109 is an introductory course on desktop operating systems that has replaced IT103 and switched its focus from Windows XP to Windows 7. It is a required course for associates degrees in information technology. The course covers operating system concepts over the first two weeks and introduces topics like hardware, software, memory and storage management, interrupts, and the structure of common operating systems. It examines open source operating systems like Linux and explores components of modern computer systems like multi-core processors and computer clusters.
Comparisons And Contrasts Of Windows Ce, Windows Xp, And...Cecilia Lucero
The document provides an overview of desktop operating systems, their history and key types. It discusses how an operating system manages a computer's hardware, resources and provides common services. Major operating system types mentioned include real-time operating systems, embedded operating systems, and general-purpose operating systems like Windows, MacOS and Linux. The document outlines how operating systems control system resources, provide interfaces for applications, and have evolved significantly over the years.
The document discusses key concepts in software engineering including:
- Software serves both as a product that delivers computing potential and as a vehicle for delivering functionality.
- Software is defined as a set of programs, documents, data, and other items or objects that form a configuration.
- There are different categories of software applications such as system software, application software, engineering/scientific software, and embedded software.
- Software must often be adapted, enhanced, extended, or re-architected over time to address new requirements or environments in what is called software evolution.
This document outlines the objectives and content of a lecture on operating systems and utility programs. The lecture will identify different types of system software, explain the purpose of utilities included with most operating systems, summarize features of standalone operating systems, identify devices that use embedded operating systems, and explain standalone utility programs. It will also describe the functions of an operating system, including booting, user interfaces, multitasking, memory management, performance monitoring, job scheduling, drivers, and network connectivity. Finally, the lecture will cover utility programs, types of operating systems, and standalone utility programs like file compression utilities and media players.
The document is a response from a student explaining their understanding of operating systems after taking a semester-long course. The student discusses key topics covered, including the role of an operating system in managing resources like the CPU, memory, and I/O devices. Specific operating systems are mentioned like Android, iOS, Windows, and Linux. Concepts learned are processes, threads, process states, and the process control block. Mechanisms for interprocess communication and virtual memory are also summarized.
The document is a response from a student explaining their understanding of operating systems after taking a semester-long course. The student discusses key topics covered, including the role of an operating system in managing resources like the CPU, memory, and I/O devices. Specific operating systems are mentioned like Android, iOS, Windows, and Linux. Concepts learned are processes, threads, process states, and the process control block. Mechanisms for interprocess communication and virtual memory are also summarized.
Distributed systems consist of components located across a network that communicate and coordinate their actions by passing messages. Key challenges of distributed systems include independent component failures, insecure communication, and lack of a global clock. Distributed systems aim to provide distribution transparency to present a single system view to users. They can satisfy requirements like resource sharing, openness, scalability, fault tolerance, and heterogeneity. However, developing distributed systems risks false assumptions about reliability, security, and performance of the network.
Operating System- Services,types.Batch files and DOS historySURBHI SAROHA
The document discusses operating systems and provides definitions and examples of different types of operating systems, including batch, time-sharing, distributed, network, and real-time operating systems. It also covers file systems, DOS commands, batch files, and the history of DOS. The key points covered include definitions of an operating system and its main functions, examples of popular operating systems like Linux and Windows, and characteristics of different types of operating systems.
This document discusses issues in distributed systems. It begins with an introduction to distributed systems and their importance. It then reviews literature on challenges in distributed systems like heterogeneity, transparency, fault tolerance, and scalability. The main body identifies specific issues in distributed systems: communication primitives, naming and protection, fault tolerance, resource management, and services. It discusses approaches to address issues like redundancy techniques and atomic transactions for fault tolerance.
A Survey On Operating System Challenges And Security Issues Associate To ItMichele Thomas
This document discusses operating system challenges and security issues. It begins with an introduction to operating systems and their role in managing computer hardware resources. It then describes four main types of operating systems: batch, time-sharing, distributed, and real-time. The document outlines the operating system's role in memory management and discusses some key security challenges like unauthorized access, Trojan horses, and program threats. It concludes by stating that optimizing operating system performance is important as hardware becomes more complex, and more research is needed to address challenges in developing secure and reliable operating systems.
This lecture discusses operating systems. It defines an operating system as an interface between users and hardware that is responsible for executing processes, allocating resources, managing the CPU and files. It explains that an operating system provides an environment for users to run programs conveniently and efficiently. Major operating systems discussed include DOS, Windows, and Unix. Key functions of operating systems are also outlined such as memory management, process execution, file management, and interfacing with hardware.
This document provides instructions for installing the Windows 7 operating system on a computer. It begins with background information on operating systems and what they do. It then discusses specifics about Windows 7, including its system requirements and the different installation options. The main part of the document outlines the step-by-step process for doing a clean installation of Windows 7 from a bootable USB drive, with 15 separate steps. It concludes by providing additional learning resources on installing Windows 7 and questions to check understanding.
The document discusses management information systems and operating systems. Management information systems are used to design procedures and processes to provide accurate and timely reports to aid management decision making. Operating systems are the most important program that runs on a computer and manages computer resources and hardware. They allow users to interact with applications through graphical user interfaces and perform tasks like running applications and allocating memory and processing resources. Common operating systems include Windows, MacOS, Linux, Android, and iOS.
This document provides an introduction and overview of operating systems. It defines an operating system as a program that acts as an intermediary between the user and computer hardware to effectively utilize system resources and make problem solving easier. A computer system consists of hardware, operating system, application programs, and users. The operating system coordinates access to resources, executes programs, handles input/output, manages files and directories, and provides protection and security for multi-user systems. It discusses the evolution of operating systems and provides examples of early systems like batch processing and timesharing systems.
Similar to The case for ubuntu linux operating system performance and usabil (20)
Understanding the Challenge of Cybersecurity in Critical Infrastructure SectorsMaurice Dawson
The cybersecurity of critical infrastructures is an essential topic within national and international security as 16 critical infrastructure sectors touch various aspects of American society. Because the failure to provide adequate cybersecurity controls within the critical infrastructure sectors renders the country open to an attack that could have a debilitating effect on security, national public health, safety, and economic security, this matter is so vital that there is the Presidential Policy Directive (PPD) 21 Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning and resilient critical infrastructure. An organization identified as the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security (DHS) has the mission to be the risk advisor for the United States (US). Other organizations, such as the National Security Agency (NSA), have approved a specific Knowledge Unit (KU) to address cybersecurity for critical infrastructures associated with doctoral-level granting programs. To address this challenge, it is necessary to identify threats better and defend against them while mitigating risks to an acceptable level. Only then can a nation build a more secure and resilient infrastructure for the future while defending against present-day bad actors as cyberwarfare, cyber espionage, and cybersecurity attacks are the modern-day threats that need to be addressed in planning, designing, implementation, and maintenance. Therefore, the researchers developed a case study reviewing threats against different sectors defined in the PPD.
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Maurice Dawson
Since the last elections in the United States, France, and other nations, fake news has become a tool to manipulate voters. This creation of fake news creates a problem that ripples through an entire society creating division. However, the media has not scrutinized enough on data misuse. Daily it appears that there are breaches causing millions of users to have their personal information taken, exposed, and sold on the Dark Web in exchange of encrypted currencies. Recently, news has surfaced of major social media sites allowing emails to be read without user consent.
Security Solutions for Hyperconnectivity in the Internet of ThingsMaurice Dawson
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. This talk will discuss technical, human, societal, and policy issues concerning hyperconnectivity and IoT. Additionally, this talk will offer insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks.
Framework for the Development of Virtual Labs for Industrial Internet of Thin...Maurice Dawson
The purpose of this paper is to provide a framework that allows for the development of a virtual lab that incorporates emerging technologies such as the Industrial Internet of Things and embedded systems while incorporating open source components. The global shortage of talent is a significant concern as organizations continue to embrace and roll out new technologies such as 5G, and Artificial Intelligence. Several countries such as those in developing countries face issues regarding technology use in the classroom. Thus, to provide a learning environment where cybersecurity and information systems concepts can be taught in an exploratory environment.
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Maurice Dawson
In this paper, the researcher briefly discusses the attacks that have occurred recently within Saudi Arabia to entities such as Saudi Aramco to the Ministry of Health. These attacks are aggressions against government institutions that can render a sector vulnerable. Observing the ongoing attacks on critical infrastructure in Ukraine one can see a replication of similar attacks that could occur and spread over the Middle East. As this nation is a politically turbulent region, there is no small number of external threats. To combat these evolving threat, a shift towards cyber readiness must occur. This includes new laws, security hardened technologies, and education for people living in the kingdom.
The document discusses gaining control of a situation through intelligence gathering and search techniques in order to find vulnerabilities that can be exploited to perform unparalleled events. It explores controlling the landscape through applying intelligence operations, information warfare, data science, and cybersecurity to search for and sample applications that allow one to exploit and destroy through techniques like searching for PHP errors that enable SQL injection. The session aims to explore this landscape and applications of control, search, exploit, and destroy.
The document summarizes the activities of the Midwest Association for Information Systems (MWAIS) in 2017, provides information about the 2018 annual conference, and makes a call for future conference organizers. Key points:
- MWAIS was recognized for the third year in a row as an outstanding AIS chapter in 2016. The 2017 annual conference in Springfield, Illinois was well attended with over 100 participants.
- The 2018 conference will be held in St. Louis, Missouri in May and focus on the theme of cybersecurity.
- Future conferences will be hosted by the University of Wisconsin-Oshkosh in 2019 and Drake University in 2020. Hosting a conference is an opportunity to showcase a university and
The document provides insights from a student who traveled to Guinea, Conakry to conduct a 2-week training assignment for the agriculture sector. The student trained Agriculture Trainers and Specialized Technicians in computer skills like Microsoft Office and using the Internet as a research tool. The experience helped the student contribute to the global society and learn about Guinean culture. The student advised that such assignments provide professional and personal growth opportunities. The document also discusses establishing an enterprise security architecture and key elements to consider like information, strategies, security mechanisms, and security services. The architecture should be flexible, adaptable, and promote self-regulation to address evolving security threats.
Information Technology Use in West African Agriculture – challenges and oppor...Maurice Dawson
Many countries in the Economic Community of West African States (ECOWAS) are using Information Communications Technology (ICT) to enhance agriculture development and production. To do this efficiently the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program managed for West Africa by Winrock International has been tasked with providing volunteer assignments to ministries of agriculture. The University of Missouri - Saint Louis (UMSL) has entered a partnership with Winrock International to offer upper-level undergraduate and graduate students the opportunity to provide technical assistance to international government entities. In this panel; we discuss findings and opportunities for improvement in Guinea and Senegal as they relate to ICT discovered through the onsite support provided.
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...Maurice Dawson
This article critically analyzes a project executed for the The John Ogonowski and Doug Bereuter Farmer-to-Farmer Program which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in agriculture such as the Ministry of Agriculture. In Guinea, the focus is on computer literacy as more sectors of agriculture rely on computing technology. These skills needs range from basic computing tasks such as creating databases to more advanced items such as programming Global Positional Systems. This study looks at findings, based on the analysis of the System Usability Scale results from a sample of 16 participants. The findings demonstrated that the training proved to be effective for the participants and continued training is necessary. As a result of training 62.5% of the participants ranked above average, as opposed to 43.6% prior to training.
Schedule for the 13th Annual Conference of the Midwest AIS Maurice Dawson
This document provides the schedule for the 2018 Midwest Association for Information Systems (MWAIS) Conference taking place May 17-18 at the University of Missouri-St. Louis. The schedule lists the times, locations, and topics for events including keynote speakers, panels, presentations in concurrent sessions, workshops, and social events. Some of the topics covered are cybersecurity, artificial intelligence, healthcare IT, e-commerce, and pedagogical issues related to information systems education. Transportation between the conference hotel and campus is provided via shuttle.
Midwest Association for Information Systems - MWAIS2018Maurice Dawson
The 13th Annual Conference of the Midwest AIS will be held in St. Louis, Missouri, and is sponsored by the College of Business Administration at the University of Missouri – St. Louis (UMSL). MWAIS 2018 will provide an intimate environment to facilitate the sharing of ideas, and close interaction among participants. About 100 participants are expected from throughout the Midwest US, the neighboring states and Canadian provinces, and beyond.
The 13th Annual Conference of the Midwest AIS will be held in St. Louis, Missouri, and is sponsored by the College of Business Administration at the University of Missouri – St. Louis (UMSL). MWAIS 2018 will provide an intimate environment to facilitate the sharing of ideas, and close interaction among participants. About 100 participants are expected from throughout the Midwest US, the neighboring states and Canadian provinces, and beyond.
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...Maurice Dawson
Midwest Association for Information Systems
13th Annual Conference
May 24 – 25, 2018
College of Business Administration
University of Missouri – Saint Louis
Saint Louis, Missouri
We invite submissions of completed manuscripts, research-in-progress papers, panel proposals, and workshop proposals addressing behavioral, organizational, and technical aspects of information systems. Two to three parallel sessions are planned. A computer lab will be available if needed. Submitted papers and proposals will undergo a double blind review process by at least two reviewers. To facilitate the blind review, include the title of the paper, names, affiliations, mailing addresses, e-mail addresses, and phone numbers of all authors on a cover page submitted as a separate document from the body of the manuscript. If one or more of the co-authors are students, please clearly indicate so. Include only the title of the paper at the beginning of the manuscript. In the case of multiple-authorship, designate the corresponding author with a footnote on the cover page. Please do not include any author or affiliation identification on any page (except the separate cover page), in headings/footers, or in the properties of the submitted file. Previously published work or work under review elsewhere is not eligible for submission. All submissions should be posted electronically in either MS Word or PDF.
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Maurice Dawson
Recently some countries have fell victim to attacks from nation-states, cyber criminals, and bad actors resulting in loss of critical data or damage to critical infrastructure. Thus there is an urgent need to design, implement, and deliver innovative solutions that meet the challenges through advancements in intellection collection, analysis. This submission will explore multiple aspects of the solutions side of cyber security and present cutting-edge research from researchers and practitioner around the world concerning multiple sources of intelligence. This submission will provide insights into technological advancement for all cyber intelligence. Additionally, technological advancements for subjects such as open source intelligence, human intelligence, geospatial intelligence, social media intelligence, and data science will be explored. Researchers, practitioners, and professionals will benefit from this publication’s broad perspective.
Hacking, Privacy and Security in a Hyperconnected SocietyMaurice Dawson
Data and technological advances are abounding at lightening speed. It is hard to stay on top of everything that is happening in these digitally disruptive times. But there has never been more important for companies and individuals to do so. Hacking, privacy, and security are on the minds of every corporation and private citizen. In this keynote, you will hear the latest trends in combating contrast threats to one’s security, how much more data can we possibly handle. The unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products allowing Internet connectivity.
University of Missouri - Saint Louis Cyber SecurityMaurice Dawson
This presentation discusses UMSL's cyber security program which is currently the only and first NSA & DHS CAE in cyber security education in the St. Louis Metropolitan Region.
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
This is the most essential programme of the year around the dangers of cybercrime and how to manage safety within the most indispensable digital sphere & technology system. The reason is that, “Looking beyond Internet of Things (IoT) to Internet of Everything there is a potential market that is approximately $14.4 trillion and over 99% of physical devices are still unconnected.” ~Mo Dawson. Your participation give you golden access to a transcending Cyberspace picture, enhanced solution oriented capabilities as an ICT expert or practitioner, Telecommunications Corporates & Companies
Personnel, Aviation ICT Officials, Other Transportation controls network hubs, Business dealer in Cyberspace services provider or supplier, Academicians and researchers, Government Departments & Public service ICT systems Officials & staff, Students, general ICT security involvement and on top of that your enhanced multidimensional scope & prosperity out of this untapped gold mine is guaranteed.
Security Solutions for Hyperconnectivity and the Internet of ThingsMaurice Dawson
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
How Barcodes Can Be Leveraged Within Odoo 17Celine George
In this presentation, we will explore how barcodes can be leveraged within Odoo 17 to streamline our manufacturing processes. We will cover the configuration steps, how to utilize barcodes in different manufacturing scenarios, and the overall benefits of implementing this technology.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
This presentation was provided by Racquel Jemison, Ph.D., Christina MacLaughlin, Ph.D., and Paulomi Majumder. Ph.D., all of the American Chemical Society, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
Juneteenth Freedom Day 2024 David Douglas School District
The case for ubuntu linux operating system performance and usabil
1. Association for Information Systems
AIS Electronic Library (AISeL)
SAIS 2016 Proceedings Southern (SAIS)
2016
The Case for UBUNTU Linux Operating System
Performance and Usability for Use in Higher
Education in a Virtualized Environment
Maurice Dawson
University of Missouri-St. Louis, dawsonmau@umsl.edu
Brittany DeWalt
Alabama A&M University, bdewalt@bulldogs.aamu.edu
Simon Cleveland
Nova Southeastern University, sc1674@nova.edu
Follow this and additional works at: http://aisel.aisnet.org/sais2016
This material is brought to you by the Southern (SAIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in SAIS 2016 Proceedings
by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact elibrary@aisnet.org.
Recommended Citation
Dawson, Maurice; DeWalt, Brittany; and Cleveland, Simon, "The Case for UBUNTU Linux Operating System Performance and
Usability for Use in Higher Education in a Virtualized Environment" (2016). SAIS 2016 Proceedings. Paper 23.
http://aisel.aisnet.org/sais2016/23
2. Dawson Et Al. The Case For UBUNTU
Proceedings of the Southern Association for Information Systems Conference, St. Augustine, FL, USA March 18th–19th, 2016 1
THE CASE FOR UBUNTU: LINUX OPERATING SYSTEM
PERFORMANCE AND USABILITY FOR USE IN HIGHER EDUCATION IN
A VIRTUALIZED ENVIRONMENT
Maurice Dawson University of
Missouri-St. Louis
dawsonmau@umsl.edu
Brittany DeWalt Alabama
A&M University
bdewalt@bulldogs.aamu.edu
Simon Cleveland
Nova Southeastern University
sc1674@nova.edu
ABSTRACT
The use of Linux based Operating Systems (OS) in the classroom is increasing, but there is little research to address usability
differences between Windows and Linux based OSs. Moreover, studies related to the ability for students to navigate effectively
between Ubuntu 14.04 Long Term Support (LTS) and Windows 8 OSs are scant. This research aims to bridge the gap between
modern Linux and Windows Oss, as the former represents a viable alternative to eliminate licensing costs for educational
institutions. Preliminary findings, based on the analysis of the System Usability Scale results from a sample of 14 students,
demonstrated that Ubuntu users did not require technical support to use the system, while the majority found little inconsistency
in the system and regarded it as well integrated.
Keywords
Usability; Linux; Computers; Information Systems; Performance; Human Computer Interaction; UX; Ubuntu; SUS
INTRODUCTION
Presently, adoption of Linux in the personal computers market is limited when compared to the Microsoft Windows OS. For
example, a recent study found that Linux held only 1% of the market share, while Microsoft Windows retained 87% (Net
Market Share, 2011). When it comes down to ownership of OS, a client has two options: to buy proprietary OS, such as those
offered by Microsoft, or to use open source OS free of charge (Boitor and Bratucu, 2011). Microsoft Windows is a proprietary
software, which means it is closed, available at a cost, and its copyright is owned by the developers (Haider and Koronios,
2008). As a result, the source code is not available to the end user and changes cannot be made. In contrast, open source systems
(OSS) allow end users access to the source code and customizing privileges for their personal use.
Considering the access to the source code as a major advantage (O’Hara and Kay, 2003), it is puzzling that Linux market share
is still limited. This confusion is further compounded since a number of studies demonstrate that adoption of open source
software yields reduction in costs and ease of customization (Li et al., 2011; Ven et al., 2008). Moreover, Linux has been found
to be superior in customizability, security and even reliability (Ebert, 2008).
Prior research has examined the motivations of users to adopt OSS (Gallego et Al., 2008), adoption of OSS by organizations
(Macredie and Mijinyawam 2011) and resistance of users (Kim et al., 2014). Areas that still remain unexplored include
integration of system functionalityand need for technical support. As a result, a key research question that demands an answer
is: how is Linux OS perceived by users in terms of usability, integration of functionality and need for technical support in
educational institutions when compared to Windows OS?
To address this question, we leverage the System Usability Survey (SUS) to examine these factors among users of Ubuntu
14.04 LTS and Windows 8.1 OS. The limited preliminary findings suggest that further research into the proposed factors is
necessary to help determine lack of adoption of Linux into educational institutions.
3. Dawson Et Al. The Case For UBUNTU
Proceedings of the Southern Association for Information Systems Conference, St. Augustine, FL, USA March 18th–19th, 2016 2
The rest of this study is structured as follows. First, identification of key components of the OS are outlined. Next, a brief
review of the instrument used for the study and preliminary results are provided. The study concludes with recommendations
for future research.
OPERATING SYSTEM
An Operating System (OS) is defined as a program that acts as an intermediarybetween a user of a computer and the computer
hardware (Silberschatz and Galvin, 1994). It is a software component that is responsible for the coordination of activities and
sharing of computer resources. An OS is a collection of system programs, tools and utilities that manage computer hardware
and offer general services for client application software (Bassil, 2012). The operating system is the first program to do several
tasks while focusing on the current task at hand. The first task is prompting the OS to boot the computer. Within minutes, the
computer will manage tests to make sure everything is working properly, check for new hardware updates and then start the
operating system. Once the OS is working, its main focus is to handle the specifics and writing capabilities. The operating
system will coordinate with each computer's central processing unit (CPU), memory and storage to make sure that every
program functions properly. An OS runs user application programs and provides a suitable interface to communicate with the
computers' hardware (Bassil, 2012).
The main purpose of an OS is to provide management of computer resources and control data flow. These resources include
but are not limited to memory, processors, input and output devices and abiding storage devices. The concept provided for the
operating system is usually in sets providing access. Technologist uses their concepts when writing codes that are needed to
obtain the operating system.
Technical Support
Technical support is defined as the need for help provided by knowledgeable individuals to users of computer hardware and
software products (Wilson, 1991). In this study, technical support is regarded as coaching and consultation for the installation
of OS on a virtual environment. Moreover, lack of need for technical support can be regarded as a positive factor toward cost
reduction and ease of use.
Virtualization is referred to as the use of virtualization software that allows physical hardware of a single PC to run numerous
operating systems simultaneously on virtual machines (VM). A VM is a fully protected and isolated copy of the underlying
physical machine's hardware (Sugerman et al., 2001). In essence, each user is given the impression of having a decent physical
computer. This study argued that lack of need for technical support during the installation of the system. Figure 1 provides a
screenshot of Ubuntu 14.04 LTS running on a VM on the Windows 8.1 desktop.
4. Dawson Et Al. The Case For UBUNTU
Proceedings of the Southern Association for Information Systems Conference, St. Augustine, FL, USA March 18th–19th, 2016 3
Figure 1: Screenshot of Ubuntu 14.04 VMware VM Running on Windows 8.1 Desktop.
Performance
The significance of the term “performance” is the speed in which a computer operates during a benchmark test. The test utilizes
several working styles that imitate the work the computer should be doing. A majority of the software specifications has two
types of system requirements: minimum or recommended. In addition, the demand for higher processor power and resources
are included in the newer system requirements. Ubuntu 14.10 LTS and Windows 8.1 need certain hardware components and
these prerequisites are known as system requirements.
The system requirements vary among Ubuntu products. The minimum system requirements for Ubuntu 14.04 LTS supports
Integrated Electronics (Intel) and an Advanced Micro Devices (AMD) processors based on computers that run Microsoft
Windows and Apple Macintosh systems (“Ubuntu 14.04 (Trusty Tahr) Daily Build”). Table 1 lists hardware specifications that
the computer should meet as a minimum requirement. Depending on the computer needs, there are other Ubuntu distributions
such as Lubuntu and Xubuntu for less processor power.
Processor 1 gigahertz (GHz) x 86 processor (Pentium 4 or better)
RAM 1 gigabyte (GB)
Hard Disk Space 5 gigabyte (GB) (15 GB is recommended)
Video Support Capable 1024×768 resolution
Table 1. Ubuntu 14.04 LTS Minimum System Requirements
In contrast, Windows 8.1 is a personal operating system that is geared toward Intel-based PC architectures. The minimum
system requirements for Windows 8.1 are higher than Windows 7. The CPU supports the Physical Address Extension (PAE),
NX processor bit (NX) and Streaming SIMD Extensions 2 (SSE2) (System Requirements, 2014). Windows Store application
requires a screen resolution of 1024×768 or higher to run. Table 2 lists the recommended hardware specifications.
5. Dawson Et Al. The Case For UBUNTU
Proceedings of the Southern Association for Information Systems Conference, St. Augustine, FL, USA March 18th–19th, 2016 4
Processor 1 gigahertz (GHz) or faster
RAM 1 gigabyte (GB) (32-bit) or 2 GB (64-bit)
Hard Disk Space 16 GB (32-bit) or 20 GB (64-bit)
Graphic Card Microsoft DirectX 9 graphics device with WDDM driver
Usability
Table 2. Windows 8.1 Minimum System Requirements
Usability is considered the effectiveness, efficiency and satisfaction specified when users achieve specific goals in a particular
environment (Bevan, 2009). Research has proposed a number of methods to measure usability. These include product-oriented
(e.g. ergonomic attributes) and user-oriented (user mental effort and attitude, user performance and user interaction) (Bevan,
2009). In this study, the usability of Ubuntu 14.04 LTS was approached from the perspective of the user-oriented approach.
Integration
In this study, integration of the OS was examined from the perspective of the Human User Interface (HUI) and Graphical User
Interface (GUI). User interface simply means a person controls a software application or hardware device at their own disposal.
The human interface guidelines (HIG) are software documents that are developed with application recommendations. Their
role is to improve the user experience by devising interface applications that are more creative, learnable and consistent.
The GUI for both OSs is unique in their own way. Windows 8.1 gives users a similar graphical user interface like Ubuntu 14.04
LTS. For years, Windows has tried to change, cut-down and get rid of their versions of its operating systems and standard
Windows desktop interface. They have completely changed their interfaces with pop-up windows, scroll bars, buttons and tiny
Start buttons just to make them different from the next competitor in their market. Previous Windows graphical user interfaces
had four or more applications on one single screen at one time, but not anymore. Windows 8 eliminates all of that and introduces
touch-based text labels and controls. The interface for all of these applications are sparse. For example, email, calendar and
address book are now present on the screen. There is no need to go to the menu button and scroll up or down for it. Windows
8.1 has presented a new way to any application easier than previous Windows operating systems. Figure 1 displays the
differences in both graphical user interfaces for each operating systems.
Figure 2: Displays Graphical User Interfaces for both operating systems
6. Dawson Et Al. The Case For UBUNTU
Proceedings of the Southern Association for Information Systems Conference, St. Augustine, FL, USA March 18th–19th, 2016 5
RESEARCH METHODOLOGY
Target Population and Data Size
The target population for this study consisted of 14 undergraduate and graduate students from two intermediate information
systems course at a Midwestern university. Each participant was familiar with the use of either OS. Participant ages ranged
from 18-30 years old.
System Usability Scale (SUS)
To determine usability, integration and need for technical support, this study used the System Usability Scale (SUS). SUS was
originally created in 1986 by John Brooke (System Usability Scale, 2014). The scale has been used to evaluate a wide range of
products and services, including software, mobile devices, hardware, websites and applications. The reliability of SUS has been
demonstrated with smaller sample sizes (Bangor et al., 2009).
In this study, the participants were asked the following 10 questions adopted from the SUS, with responses ranging from
Strongly Agree to Strongly Disagree on a 5-point Likert scale:
1. I think that I would like to use this system frequently.
2. I found the system unnecessarilycomplex.
3. I thought the system was easy to use.
4. I think that I would need the support of a technical person to be able to use this system.
5. I found the various functions in this system were well integrated.
6. I thought there was too much inconsistencyin this system.
7. I would imagine that most people would learn to use this system very quickly.
8. I found the system very cumbersome to use.
9. I felt very confident using the system.
10. I needed to learn a lot of things before I could get going with this system.
To interpret the results, participant's scores for each question were converted to a new number, added together, and then
multiplied by 2.5 to convert the original scores of 0-40 to 0-100 (Sauro and Lewis, 2011). The scores were considered in terms
of percentile ranking. A SUS score above a 68 was considered above average, while anything below 68 was regarded as below
average. Scores were normalized to produce a percentile ranking.
PRELIMINARY FINDINGS
While Ubuntu 14.04 LTS is not difficult to learn, it is different from traditional operating systems. Ubuntu’s interface has been
developed with features that make it easily adoptable by Window's users (Noyes, 2011). While both interfaces appear different,
certain GUI features remain similar. This study found that the majority of users (44%) considered Ubuntu not complex. In
terms of difficulty to use, the results showed that while nearly a quarter (22%) found the system not easy to use, over half
(56%) where undecided. It can be argued that Ubuntu’s interface lacks complexity.
7. Dawson Et Al. The Case For UBUNTU
Proceedings of the Southern Association for Information Systems Conference, St. Augustine, FL, USA March 18th–19th, 2016 6
The most important findings of this study were that 78% of the participants strongly disagreed with the statement that they
would need the support of a technical person to be able to use the system. Moreover, no respondents disagreed in their
perception that the various functions of the system were well integrated. Over half of the respondents (55%) reported that they
felt very confident with using the system and didn’t need to learn a lot of things to get going with the system. Finally, the
majority of the respondents (77%) disagreed with the statement that there was too much inconsistencyin the Ubuntu system.
A limitation of this study is the sample, as it is possible that the results are skewed due to the potential presence of power users.
In a future study, the researchers will replicate the study using random larger sample and include structured interviews to
improve reliability of the results.
CONCLUSION
This research attempted to answer the following research question: how is Linux OS perceived by users in terms of usability,
integration of functionalityand need for technical support in educational institutions when compared to Windows OS? For this
purpose, several factors from the OS were examined (mainly performance, usability, integration and technical support) and the
SUS instrument was used to observe users’ perceptions of the Linux OS Ubuntu. While the preliminary findings demonstrate
that Ubuntu users do not require technical support and perceive the system as well integrated and not inconsistent, the study is
limited. Future studies should attempt to examine the factors through the prism of different instruments and with a greater
number of subjects.
REFERENCES
1. Bangor, A., Kortum, P., and Miller, J. (2009). Determining what individual SUS scores mean: Adding an adjective rating
scale. Journal of usability studies, 4(3), 114-123.
2. Bassil, Y. (2012). Windows and Linux operating systems from a security perspective. Journal of Global Research in
Computer Science, 3, 17-24.
3. Bevan, N. (2009). Usability. Encyclopedia of database systems. Springer US. 3247-3251.
4. Boitor, A., and Bratucu, G. (2011). Competition analysis on the operating system market using principal component
analysis. Bulletin of the Transilvania University of Brasov, 4(53), 15-22.
5. Ebert, C. (2008). Open source software industry. IEEE Software, 25(3), 52–53. doi:10.1109/MS.2008.67.
6. Gallego, M., Luna, P., and Bueno, S. (2008). User acceptance model of open source software. Computers in Human
Behavior, 24(5), 2199–2216. doi:10.1016/j.chb.2007.10.006.
7. Haider, A., and Koronios, A. (2008). Issues of open source software uptake in Australian government agencies (Doctoral
dissertation, International Business Information Management Association).
8. Noyes, K. (2011, May 3). Is Linux really harder to use?. PC World, Retrieved April 25, 2014, from
http://www.pcworld.com
9. Kim, H. W., Chan, H. C., and Lee, S. H. (2014). User resistance to software migration: The case on Linux. Journal of
Database Management (JDM), 25(1), 59-79.
10. Li, Y., Yan, C., Xu, H., and Teo, H. (2011). Open source software adoption: Motivations of adopters and a motivations
of non-adopters. The Data Base for Advances in Information Systems, 42(2), 76–94. doi:10.1145/1989098.1989103.
11. Macredie, R. A., and Mijinyawa, K. (2011). A theory grounded framework of open source software adoption in SMEs.
European Journal of Information Systems, 20(2), 237–250. doi:10.1057/ejis.2010.60.
12. Net Market Share. (2011). Market share statistics for internet technologies. Retrieved from http://
marketshare.hitslink.com/operating-system-marketshare.aspx?qprid=8
8. Dawson Et Al. The Case For UBUNTU
Proceedings of the Southern Association for Information Systems Conference, St. Augustine, FL, USA March 18th–19th, 2016 7
13. O'Hara, K. J., and Kay, J. S. (2003). Open source software and computer science education. Journal of Computing Sciences
in Colleges, 18(3), 1-7.
14. Sauro, J., and Lewis, J. R. (2011, May). When designing usability questionnaires, does it hurt to be positive?. In
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 2215-2224). ACM.
15. Silberschatz, A., Galvin, P. B., and Gagne, G. (2013). Operating system concepts (Vol. 8). Wiley.
16. Sugerman, J., Venkitachalam, G., and Lim, B. H. (2001, June). Virtualizing I/O devices on VMware workstation's hosted
virtual machine monitor. In USENIX Annual Technical Conference, General Track (pp. 1-14).
17. System requirements - Microsoft Windows. (n.d.). windows.microsoft.com. Retrieved April 24, 2014, from
http://windows.microsoft.com/en-us/windows-8/system-requirements
18. System Usability Scale (SUS). (n.d.). Home. Retrieved April 25, 2014, from http://www.usability.gov/how-to-and-
tools/methods/system-usability-scale.html
19. Ven, K., Verelst, J., and Mannaert, H. (2008). Should you adopt open source software? IEEE Software, 25(3), 54–59.
doi:10.1109/MS.2008.73
20. Wilson, R. (1991). Help!: The art of computer technical support, Peachpit Press, Berkeley, CA.