Abstract In face of proprietary software, products distributed by the Open Source Software (OSS) ... more Abstract In face of proprietary software, products distributed by the Open Source Software (OSS) community are constantly gaining credibility. Companies and institutions are starting to adopt them on large scales and several governmental initiatives have encouraged their use in the private sector. The objective of this paper is to present the first results of a study being undertaken of which the final goal is to improve our knowledge of the mechanisms and the determining factors when the end user adopts (or does no qt wish to adopt) OSS ...
In this paper, we propose an approach based on visualization to support the teacher to observe th... more In this paper, we propose an approach based on visualization to support the teacher to observe the students' activities. After comparing the teaching in classical rooms and in e-learning systems, we present some visualization techniques used in various domains. The paper then focuses on visualization techniques in order to help the teacher to better interpret what happens during the learning session
International Journal of Information Technology and Management, 2009
ABSTRACT Open Source Software (OSS) often makes its intimate workings public. By doing this, OSS ... more ABSTRACT Open Source Software (OSS) often makes its intimate workings public. By doing this, OSS seems to demand users to run a major risk in security. However, public organisations related to the French National Defence promote and adopt such OSS software packages. This apparent incongruity deserves a thorough study of the relations between OSS and security. After having specified and positioned the notion of Information System Security (ISS), this paper states the arguments given by both Closed Source Software (CSS) editors and free software holders. The second reading of these arguments through three examples leads us to propose a strategy of security based on the heterogeneity of the computers owned by a company.
Abstract In face of proprietary software, products distributed by the Open Source Software (OSS) ... more Abstract In face of proprietary software, products distributed by the Open Source Software (OSS) community are constantly gaining credibility. Companies and institutions are starting to adopt them on large scales and several governmental initiatives have encouraged their use in the private sector. The objective of this paper is to present the first results of a study being undertaken of which the final goal is to improve our knowledge of the mechanisms and the determining factors when the end user adopts (or does no qt wish to adopt) OSS ...
In this paper, we propose an approach based on visualization to support the teacher to observe th... more In this paper, we propose an approach based on visualization to support the teacher to observe the students' activities. After comparing the teaching in classical rooms and in e-learning systems, we present some visualization techniques used in various domains. The paper then focuses on visualization techniques in order to help the teacher to better interpret what happens during the learning session
International Journal of Information Technology and Management, 2009
ABSTRACT Open Source Software (OSS) often makes its intimate workings public. By doing this, OSS ... more ABSTRACT Open Source Software (OSS) often makes its intimate workings public. By doing this, OSS seems to demand users to run a major risk in security. However, public organisations related to the French National Defence promote and adopt such OSS software packages. This apparent incongruity deserves a thorough study of the relations between OSS and security. After having specified and positioned the notion of Information System Security (ISS), this paper states the arguments given by both Closed Source Software (CSS) editors and free software holders. The second reading of these arguments through three examples leads us to propose a strategy of security based on the heterogeneity of the computers owned by a company.
Uploads
Papers by Joseph HEILI