Computing and Information Systems - Theses

Permanent URI for this collection

Search Results

Now showing 1 - 10 of 19
  • Item
    Thumbnail Image
    Towards achieving participation equilibrium in information and communication technology for development (ICT4D) projects: a human action perspective
    Maail, Arthur Glenn ( 2014)
    Realising the benefits offered by information and communication technologies (ICTs), governments and donor agencies spend millions of dollars annually to establish ICT projects aiming to improve livelihood of rural and disadvantaged community all around the world. Such projects are known as Information and Communication Technology for Development (ICT4D) projects. However, many of these projects failed to achieve their objectives, which may deter future efforts and donor agencies to support such important development initiatives. Researchers and practitioners have argued about the importance of participation from the target users (i.e. community) in the development of ICT4D projects as a way to improve the success of these initiatives. Nonetheless, the success of ICT4D projects does not always correlate to the higher degree of user participation. Instead, this thesis points to the importance of achieving user participation equilibrium and understanding the two competing groups that affect the balance of the equilibrium. Those two competing groups are, on one side, the conditional factors, which determine the actual degree of user participation and, on the other side, the approach adopted in project development, which implies the desired degree of participation. Prior studies have shown that when user participation equilibrium is achieved, that is when the desired degree matches with the actual degree of user participation, user participation would have a positive correlation with success of the project. This thesis proposes a new framework, which categorises the conditional factors affecting user participation in ICT4D projects based on the typology of human actions offered by the Habermas’ theory of communicative action (TCA). The framework is then validated using two research methods: a multiple case study method involving nine organisations called “telecentre” and an asynchronous online focus group (AOFG) method with fourteen ICT4D practitioners. By incorporating a typology of human action, this research has extended the existing knowledge in managing user participation in ICT4D projects. First, the thesis shows the applicability of human action perspective in understanding the conditional factors affecting user participation in the development of ICT4D projects. Second, the thesis also highlights the role of intermediated interaction with technology towards achieving participation equilibrium. Third, the thesis shows the importance of managing social interactions between users and other project stakeholders as the key to achieve participation equilibrium. Finally, the proposed framework lays out the common properties of the sets of conditional factors for each approach used in the development of ICT4D projects. Understanding offered by the proposed framework helps practitioners to focus on a specific set of conditional factors and devise appropriate strategies in managing user participation for a given project based on the approach employed. The framework can also be used as a guide to suggest the most appropriate approach in the development of ICT4D projects given specific resources and conditions.
  • Item
    Thumbnail Image
    Generalized language identification
    LUI, MARCO ; ( 2014)
    Language identification is the task of determining the natural language that a document or part thereof is written in. The central theme of this thesis is generalized language identification, and deals with eliminating the assumptions that limit the applicability of language identification techniques to specific settings that may not be representative of real-world use cases for automatic language identification techniques. Research to date has treated language identification as a supervised machine learning problem, and in this thesis I argue that such a characterization is inadequate, showing how standard document representations do not take into account the variation in a language between different sources of text, and developing a representation that is robust to such variation. I also develop a method that allows for language identification of multilingual documents, i.e. documents that contain text in more than one language. Finally, I investigate the robustness of existing off-the-shelf language identification methods on a novel and challenging domain.
  • Item
    Thumbnail Image
    Audience experience in domestic videogaming
    DOWNS, JOHN ( 2014)
    Videogames are frequently played socially, but not all participants actively play. Audience members observe gameplay, often participating and experiencing the game indirectly. While the existence of non-playing audience members has been previously acknowledged, there have been few attempts to understand what activities audience members engage in while watching videogames, or how their experience is affected by different aspects of the game and social situation. This thesis presents the first substantial body of empirical work on audience behaviour and experience in social videogaming sessions. Existing work was reviewed in a number of areas of literp.ature including the sociality of gameplay, the increasing role of physicality and physical actions in gameplay, and the role of audiences in HCI. Three studies were then conducted based on the research question: How do the sociality and physicality of videogaming sessions influence audience experience? An initial exploratory observational study (N = 6 families) examined the types of activities that audiences engage in while watching highly physical videogames in their homes. This study indicated that audience members can adopt a variety of ephemeral roles that provide them with opportunities to interact with one another, the players, and the game technology. Additionally, participants reported that the physicality of the gameplay heavily influenced their experience. The second study, a naturalistic experimental study (N = 134) consisted of a mixed-model analysis of the factors of game physicality and turn anticipation. Study 2 found that anticipation of a turn affects experience of both audience and player, and similarly found that highly physical games result in more positive audience experiences, although the relationship between physicality and experience is not straightforward. A third study, also an experiment (N = 24), examined the influence of game physicality and visual attention on audience experience within a mediated setting, and a cross-study comparison identified that there appears to be a strong interplay between social context and the experience of physicality. Overall, this thesis contributes an understanding of how sociality, physicality, and the interplay between the two can influence audience behaviour and experience. These findings can be used to inform the design of novel game and interactive experiences that incorporate physicality, turn anticipation, and opportunities for different types of participation in order to influence and enhance audience experience.
  • Item
    Thumbnail Image
    Real-time feedback for surgical simulation using data mining
    Zhou, Yun ( 2014)
    Surgical trainees devote years to master the surgical skills required to safely perform surgery. Traditionally, they refine their psychomotor skills by practising on plastic bones or cadavers under the supervision of expert surgeons. Experts guide trainees through surgical procedures while providing feedback on the quality of their procedure. However, there are limitations to this approach, which include a shortage of cadaver bones, limited availability of expert supervision, and the subjective manner of surgical skill assessment. To address these limitations, the introduction of new techniques such as 3D illusion, haptic feedback and augmented reality have significantly improved the realism of surgical simulators. Such simulators have the potential to provide a cost-effective platform, which allows trainees to practice many surgical cases of varying difficulty, and provides the flexibility of practising repeatedly at their own convenience. However, most simulators lack the automated performance assessment and feedback, which limits the applicability of simulators as self-guided training systems. In thesis, we aim to deliver automated performance assessment and feedback in a virtual simulation environment. The automated performance assessment provides information on the quality of surgical result, which is a critical component for a self-guided training platform. A large number of recent studies have focused on scoring the outcome of surgical tasks. However, this score typically based on the result of a surgical task (such as the shape of a surgical end-product) and ignores the rich information provided by real-time performance attributes, such as motion records. Furthermore, since this assessment is delivered at the end of each task, it does not allow any opportunity to identify and address mistakes as they occur. We propose an event-based framework that provides online assessment with different temporal granularities. The evaluations show that the proposed framework provides accurate performance assessment using both motion records and end-product information. Although automated performance assessment provides expertise score to illustrate the surgical perform, a single score has limited utility in improving surgical technique, which can be equally important. Trainees need constructive human understandable feedback to refine their psychomotor skills. To this end, we propose a Random Forest based approach to generate meaningful automated real-time performance feedback. Our evaluation demonstrates it can significantly improve the surgical techniques. However, this random forest based method makes specific assumptions that all drilling movements made by experts are of "expert quality'' and all operations made by trainees are suboptimal. This hampers the model training process and leads to lower accuracy rates. Therefore we propose a pattern-based approach to capture the differences in technique between experts and trainees and deliver real-time feedback to improve performance, while avoiding the assumption of "polarising'' the quality of drill strokes based on expertise. Our evaluation results show that the proposed approach identifies the stage of the surgical procedure correctly and provides constructive feedback to assist surgical trainees in improving their technique. Another challenge for automated performance assessment is hard to extend existing evaluation models to new specimens. In order to train reliable assessment models for new specimens, the classical machine learning approaches require a new set of human expert examples collected from each new specimen. To eliminate this need, we propose a transfer learning framework to adapt a classifier built on a single specimen to multiple specimens. Once a classifier is trained, we translate the new specimens' features to the original feature space, which allows us to carry out performance evaluation on different specimens using the same classifier. In summary, the major contributions of this thesis involve the development of self-guided training platform for delivering automatic assessment and feedback using data mining techniques.
  • Item
    Thumbnail Image
    Early detection system for Distributed Denial of Service attacks
    VELAUTHAPILLAI, THANESWARAN ( 2014)
    In today's environment, the online services of any organization can become a target of Distributed Denial of Service (DDoS) attacks and the attacks continue to become more complex and sophisticated. Large scale attacks against enterprises and governments around the world have revealed the inability of existing solutions to effectively address DDoS attacks. The main tasks of DDoS defence systems are to detect the DDoS attacks accurately at an early stage and to respond pro-actively to stop the oncoming attack. Detection of the attack is most reliable when undertaken closer to the victim because attack traffic concentrates at the victim, however early attack detection, i.e. detecting that the attack is underway before the attack traffic reaches the victim, is clearly required to be undertaken closer to the attack sources. Assuming that an attack has been detected then protection can be achieved with the help of backbone routers, e.g. by blocking attack traffic from identified attacking sources. However detecting an attack closer to the sources, or in other words far from the victim, is less reliable because attack traffic is more sparse at these points. A naive solution is to measure traffic throughout the network and report all of the measurements to a centralized system. The central system would raise an attack alert if the total detected traffic to a given victim is greater than some threshold. This traditional client-server model represents a central point of failure and a performance bottleneck. Therefore we propose a distributed and cooperative defence system that we call Gossip Detector can provide early attack detection, in the intermediate network between the attack sources and the victim. Gossip Detector uses a gossip-based information exchange protocol to share network traffic information in a cooperative overlay network; with regard to a given victim for which the overlay is setup to defend. The defence system is distributed and deployed at intermediate network routers. Through the exchange of traffic measurements, each node in the cooperative system can reach a decision as to whether an attack is underway or not; and thereby the entire system can reach a consensus as to whether an attack is underway or not. In this way a response can be instigated to try and reduce the impact of the attack on the victim. Detecting an attack at an early time is challenging because network delays become a dominant factor. The research approach adopted in this dissertation includes mathematical analyses of the proposed defence system and the evaluation of the system in a simulated network under different flooding-based attacks using the ns-2 simulator. The simulation results show that Gossip Detector can detect attacks within 0.5 seconds with a probability of attack detection as high as 0.99 and probability of false alarm below 0.01 on a topology of average router delay 12 ms. This compares favourably against other widely known methods including change-point detection, TTL analysis and wavelet analysis. In both analytical results and simulations based results, we demonstrate the effectiveness of the defence system in terms of early attack detection and we show the tradeoffs with consumed bandwidth.
  • Item
    Thumbnail Image
    A model for digital forensic readiness in organisations
    ELYAS, MOHAMED ( 2014)
    Organisations are increasingly reliant upon information systems for almost every facet of their operations. As a result, there are legal, contractual, regulatory, security and operational reasons why this reliance often translates into a need to conduct digital forensic investigations. However, conducting digital forensic investigations and collecting digital evidence is a specialised and challenging task exacerbated by the increased complexity of corporate environments, diversity of computing platforms, and large-scale digitisation of businesses. There is agreement in both professional and academic literature that in order for organisations to meet this challenge, they must develop ‘digital forensic readiness’ – the proactive capability to collect, analyse and preserve digital information. Unfortunately, although digital forensic readiness is becoming a legal and regulatory requirement in many jurisdictions, studies show that most organisations have not developed a significant capability in this domain. A key issue facing organisations intending to develop a forensic readiness capability is the lack of comprehensive and coherent guidance in both the academic and professional literature on how forensic readiness can be achieved. A review of the literature conducted as part of this study found that the academic and professional discourse in forensic readiness is fragmented and dispersed in that it does not build cumulatively on prior knowledge and is not informed by empirical evidence. Further, there is a lack of maturity in the discourse that is rooted in the reliance on informal definitions of key terms and concepts. For example, there is little discussion and understanding of the key organisational factors that contribute to forensic readiness, the relationships between these factors and their precise definitions. Importantly, there is no collective agreement on the primary motivating factors for organisations to becoming forensically ready. Therefore, this research project proposes the following research questions: Research Question 1. What objectives can organisations achieve by being forensically ready? Research Question 2. How can forensic readiness be achieved by organisations? Which in turn suggests the following sub-questions: Sub-Question 2. What factors contribute to making an organisation forensically ready? Sub-Question 3. How do these factors interact to achieve forensic readiness in organisations? A systematic review approach and coding techniques have been utilised to synthesise key elements of the vast and largely fragmented body of knowledge in forensic readiness towards a more holistic and coherent understanding. This led to the development of a comprehensive model that explains how forensic readiness can be achieved and what organisations can achieve by being forensically ready. The proposed model has been extensively validated through multiple focus groups and a multi-round Delphi survey, which involved experienced computer forensic experts from twenty countries and diverse computer forensic backgrounds. The study found there to be four primary objectives for developing a forensic readiness capability: 1) to manage digital evidence; 2) to conduct internal digital forensic investigations; 3) to comply with regulations; and 4) to achieve other non-forensic related objectives (e.g. improve security management). The study also identified the factors that contribute to forensic readiness. These are: 1) a strategy that draws the map for a forensically ready system; 2) human expertise to perform forensic tasks; 3) awareness of forensics in organisational staff; 4) software and hardware to manage digital evidence; 5) system architecture that is tailored for forensics; 6) policies and procedures that outline forensic best practice; and 7) training to educate staff on their forensic responsibilities. Further, the study found three additional organisational factors external to the forensic program: 1) adequate support from senior management; 2) an organisational culture that is supportive of forensics; and 3) good governance. This study makes significant theoretical contributions by introducing a more comprehensive model for forensic readiness that is characterised by the following: 1) providing formal definitions to key concepts in forensic readiness; 2) describing the key factors that contribute to forensic readiness; 3) describing the relationships and interactions between the factors; 4) defining a set of dimensions and properties by which forensic readiness is characterised; and 5) describing the key objectives organisations can achieve by being forensically ready. The study also makes significant contributions to practice. A key attribute of the digital forensic readiness model is its depth (in terms of the various dimensions and properties of each factor), which enables its use as an instrument to assess and guide organisational forensic readiness. Furthermore, this research increases the marketability of forensic readiness by introducing a well-defined list of objectives organisations can achieve by developing a forensic capability.
  • Item
    Thumbnail Image
    Service value in business-to-business cloud computing
    PADILLA, ROLAND ( 2014)
    This thesis is concerned with determining and measuring the components of service value in the business-to-business cloud computing context. Although service value measurement and its perceptions have been identified as key issues for researchers and practitioners, theoretical and empirical studies have experienced great challenges in measuring perceptions of service value in numerous business contexts. The thesis first determines the components of service value and then measures the service value perceptions of users in a business-to-business context of cloud computing. In this thesis, I: • undertook qualitative in-depth interviews (N=21) of managers who are responsible for deciding on the adoption and maintenance of cloud computing services. Two key findings of the interviews are that the four components of an established service value model in a business-to-consumer setting are appropriate in a business-to-business context of cloud computing and found evidence that an additional component, which we call cloud service governance, applies and does not fit the existing four components; • conducted a survey (N=328) of cloud computing practitioners to demonstrate that the findings from the qualitative in-depth interviews are generalisable to a number of industry sectors and across geographical locations; • assessed the measurement models, comprising both reflective and formative, and structural model by using partial least squares structural equation modeling, and provided evidence of specifying Service Value as a formative second-order hierarchical latent variable by using a sequential latent variable score method; • demonstrated that Service Equity is not a statistically significant component of service value in the first-order model, Service Quality is consistently significant for both first-order model and second-order, formative model, and the additional construct called Cloud Service Governance is significant; and, • for the first time, fully tested a reliable service value instrument for use by the customers of cloud computing, and aiming to engage cloud service providers in order to enhance customer satisfaction and increase repurchase intentions.
  • Item
    Thumbnail Image
    Knowledge discovery and extraction of domain-specific web data
    WANG, LI ( 2014)
    Web user forums (or simply “forums”) are a valuable means for users to resolve specific information needs, both interactively for the participants and statically for users who search and browse over historical thread data. However, the complex structure of forum threads can make it difficult for users to extract relevant information. Addressing this problem, we propose to parse thread discourse structure of forum threads for the purpose of enhancing information access and solution sharing over web user forums. The discourse structure of a forum thread is modelled as a rooted directed acyclic graph (DAG), and each post in the thread is represented as a node in this DAG. The reply-to relations between posts are then denoted as directed edges (LINKs) between nodes in the DAG, and the type of a reply-to relation is defined as a dialogue act (DA). To parse the discourse structure of threads, both LINKs and DAs need to be identified. The first method we propose uses conditional random fields to either classify the LINK and DA separately and compose them afterwards, or classify the combined LINK and DA directly. Another technique we adopt is to treat this discourse structure parsing as a dependency parsing problem, because the joint classification of LINK and DA is a natural fit for dependency parsing. Our parsing methods not only perform significantly better than a strong heuristic baseline, but also can robustly handle growing threads, and achieve similar results over partial threads compared to complete threads. Additionally, we also explore unsupervised approaches for LINK classification by using lexical chaining. Then, we explore ways of using thread discourse structure information to improve information access and solution sharing over web user forums. Specifically, we first demonstrate that the proposed discourse structure can help thread solvedness identification (i.e. automatically identify whether the question asked in a forum thread is resolved or not). The basic idea is using features derived from thread discourse structure to help solvedness classification. For example, the last reply-to LINK and its DA type can be indicative of whether the asked question is resolved or not. Experimental results show that simple features derived from thread discourse structure can greatly boost the accuracy of solvedness classification, which has been shown to be very difficult in previous research. We also investigate the utility of discourse structure in forum thread IR. The proposed method first parses the discourse structure of targeted threads, then uses information from the parsed discourse structure to augment existing IR systems. For instance, if a post is linked to a question post with a DA type of an answer, more weight should be given to this post during retrieval. Experimental results demonstrate that exploiting the characteristics of discourse structure of forum threads can benefit IR, when compared to previously-published state-of-the-art IR methods.
  • Item
    Thumbnail Image
    Mining gap-constrained sequential patterns in certain and uncertain databases
    LI, YUXUAN ( 2014)
    Sequential pattern mining is a branch of data mining task that aims at modeling sequence data and develops algorithms that are able to automatically discover and extract interesting and potentially useful knowledge from large databases. Most of the previously proposed methods for discovering subsequence and substring patterns focused on mining techniques for certain sequences and there are only a few results for uncertain sequences. Various factors contribute to data uncertainty, including incompleteness of data sources, the addition of artificial noise in privacy-sensitive applications, and most importantly, uncertainty arising from imprecision in measurements and observations. Uncertain sequences provide powerful representations for modelling sequence behavioural characteristics in emerging domains, such as bioinformatics, sensor stream management and trajectory analysis. Modeling uncertain sequences and discovering subsequence or substring patterns are complex tasks. The problem space of mining a subsequence or substring pattern grows exponentially with the size of the sequence data. This makes a naive method that exhaustively enumerate every instance in the problem space infeasible. In this thesis, we study the problem of sequential pattern mining for both certain and uncertain data. In certain data, we introduce a novel spatial sequential pattern called the platoon pattern to capture the co-occurrence of moving objects for most of the time. We present an efficient algorithm called PlatoonMiner to mine the complete set of platoon patterns from large databases. In the context of data uncertainty, we model uncertain sequences based on possible world semantics. The occurrence of an element is specified by some probability interpretations. We introduce a novel dynamic programming framework to efficiently match and mine subsequence and substring patterns from uncertain sequence data. To provide more flexibility, we also allow users to specify a (maximum) gap constraint to restrict or relax the consecutiveness requirement of a subsequence pattern. Our extensive empirical studies show the efficiency and effectiveness of our methods for synthetic and real-world datasets. With the great flexibility and adaptability, our proposed methods can serve as powerful tools for many other data mining tasks.
  • Item
    Thumbnail Image
    On the economics of infrastructure as a service cloud providers: pricing, markets, and profit maximization
    NADJARAN TOOSI, ADEL ( 2014)
    Cloud computing has introduced a major shift in the IT delivery model by offering computing resources for hosting applications as a utility. This helps businesses and organizations to access advanced IT facilities offered by cloud providers without the expensive up-front investments necessary to establish their own infrastructure. In this context, significant research efforts have already been made that aim to minimize costs for cloud customers; less attention however, has been given to challenges and opportunities that cloud providers face when striving for profit maximization. This thesis presents a set of novel market and economics-inspired policies, mechanisms, algorithms, and software designed to address the profit maximization problem of Infrastructure-as-a-Service (IaaS) cloud providers. Our solutions are proposed for two main types of providers: 1) those who rely solely on their own resources to serve customers and 2) those who participate in a cloud federation and benefit from resource sharing. We explore different tools and methods such as resource provisioning mechanisms, financial option markets, revenue management systems, and mechanism design methods to achieve the goal of profit maximization. Our evaluation of the proposed solutions demonstrates that IaaS cloud providers can increase their Return on Investment (ROI) while honoring Quality of Service (QoS) requirements associated with customer applications. In summary, the key contributions of this thesis towards profit maximization for IaaS cloud providers are: 1) resource provisioning policies that assist a provider in a cloud federation in deciding whether to reject, outsource or terminate spot instances to handle incoming requests; 2) a financial option-based market mechanism designed for futures trading of resources in a federated cloud environment; 3) admission control algorithms embedded within a revenue management framework that supports a joint offering of usage-based, reservation-based and demand-oriented pricing models; 4) a multi-unit, online recurrent auction mechanism for selling spare capacity of a data center that is envy-free, truthful with high probability, and generates near optimal profit for the provider; and finally 5) an implementation of the proposed auction mechanism by identifying the Spot instance pricing as a Service (SipaaS) framework and its realization in OpenStack.