Massey Documents by Type
Permanent URI for this communityhttps://mro.massey.ac.nz/handle/10179/294
Browse
18 results
Search Results
Item Ipurangi : Māori, the internet and implications for tikanga Māori : a thesis presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy at Massey University, Turitea, Manawatū, New Zealand(Massey University, 2024) Warren, Krystal Te Rina FainAs the world incorporates technology and the internet, new developments provide challenges and opportunities for Māori engaging in these spaces. By developing and applying īWhakaaro (Kaupapa Māori Internet Theories) and īRanghau (Kaupapa Māori cyber ethnography) this research explores the overall question: what are the implications of Māori engaging online for tikanga Māori? And explores, how are tikanga Māori (Māori values, customs and protocols) maintained or transgressed through the use of the internet by Māori? Ipurangi, this research thesis, is framed around the cosmo-genealogical narrative of Tāwhaki who ascends through the heavens to obtain new knowledge. Just like the journey of Tāwhaki, Māori engaging online are presented with opportunities for great potential as well as obstacles that pose a threat to tikanga Māori. A new theoretical approach, īWhakaaro and a new methodological approach īRangahau, was used to analyse literature and identify themes that emerged from interviews with expert Māori who lead the use of the internet and apply tikanga Māori. eColonialism and Kaupapa Māori theory are applied to analyse how colonisation takes place online, and to develop a new theoretical position - īTāmi. This research makes three major contributions to research: first, a new lexicon for Māori engaging in the online space; second, new theoretical and methodological approaches for Kaupapa Māori research; and third, ipuRangi - a framework to guide Māori engagement with the internet.Item Frustration and ennui among Amazon MTurk workers(Springer Nature on behalf of the Psychonomic Society, Inc, 2023-09) Fowler C; Jiao J; Pitts MAcademics are increasingly turning to crowdsourcing platforms to recruit research participants. Their endeavors have benefited from a proliferation of studies attesting to the quality of crowdsourced data or offering guidance on managing specific challenges associated with doing crowdsourced research. Thus far, however, relatively little is known about what it is like to be a participant in crowdsourced research. Our analysis of almost 1400 free-text responses provides insight into the frustrations encountered by workers on one widely used crowdsourcing site: Amazon's MTurk. Some of these frustrations stem from inherent limitations of the MTurk platform and cannot easily be addressed by researchers. Many others, however, concern factors that are directly controllable by researchers and that may also be relevant for researchers using other crowdsourcing platforms such as Prolific or CrowdFlower. Based on participants' accounts of their experiences as crowdsource workers, we offer recommendations researchers might consider as they seek to design online studies that demonstrate consideration for respondents and respect for their time, effort, and dignity.Item A resource co-evolutionary model for the internationalization of internet intermediary firms : evidence from New Zealand based internet payment intermediary firms : a thesis presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy in International Business Management at Massey University, Albany, Auckland, New Zealand(Massey University, 2020) Wu, MianPurpose - The purpose of this thesis is to explore the internationalization process of Internet Intermediary Firms (IIFs) and explain the unfolding of this process using a resource co-evolutionary lens of organizational knowledge and network resources. The leading research question of this study is thus “through a resource co-evolutionary lens, how and why is the internationalization of IIFs driven by the joint development of knowledge and network resources?” Methodology/approach/design – To answer the leading research question, this thesis applies a process-based research approach to seven qualitative case studies of the internationalization of New Zealand based Internet Payment Intermediaries (IPIs). Findings - This thesis identifies six internationalization episode patterns of IIFs, which are inception, siloing, bundling, multiplying, international replicating, and international withdrawal. The overall internationalization process of IIFs are non-linear but structurally predictable. Changes across these patterns take place at five human and non-human layers of IIF-centric digital platform-based ecosystem architecture – users, platforms, IIFs, usage scenarios, and sellers. Moreover, this thesis finds that IIFs’ product logic, user logic, buyer users, seller users, and cloud-based platform providers are their critical organizational knowledge and network resources, respectively. These knowledge and network resources co-evolve during internationalization, enabling the unfolding of the internationalization of IIFs. The “motor” of change derives from the IIFs’ choice of network externalities, internalization and externalization business approach. Through a resource co-evolutionary lens, this thesis finally provides a three-tier operational process model to describe and explain the internationalization process of IIFs. Practical implications - The message to IIF practitioners is that international development needs to be understood from a processual and structural view. The associated architectural resource properties of IIF-centric platform-based ecosystem and their joint actions are the keys to understanding their intricate global evolution processes. This study also signals international sellers a shift from adapting to the fluid and unruly digital ecosystems to governing the ecosystem through collaborating with IIFs. Originality/value - This is the first study of IIF internationalization. This thesis identifies the non-linear but structurally predictable internationalization process patterns of IIFs which is new to the literature. Moreover, this thesis also reveals the new types of organizational knowledge and network resources, explicitly enabling the internationalization of IIFs. This study constructively extends the traditional resource-based view towards a resource co-evolutionary view to explain the research phenomenon. The operational process model proposed in this study for the first sheds light on how to govern the business ecosystem, which is of both practical and theoretical importance.Item Effective relaying mechanisms in future device to device communication : a thesis presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy in School of Food and Advanced Technology at Massey University, Palmerston North, New Zealand(Massey University, 2020) Zaidi, Syeda KanwalFuture wireless networks embrace a large number of assorted network-enabled devices such as mobile phones, sensor nodes, drones, smart gears, etc., with different applications and purpose, but they all share one common characteristic which is the dependence on strong network connectivity. Growing demand of internet-connected devices and data applications is burdensome for the currently deployed cellular wireless networks. For this reason, future networks are likely to embrace cutting-edge technological advancements in network infrastructure such as, small cells, device-to-device communication, non-orthogonal multiple access scheme (NOMA), multiple-input-multiple out, etc., to increase spectral efficiency, improve network coverage, and reduce network latency. Individual devices acquire network connectivity by accessing radio resources in orthogonal manner which limits spectrum utilisation resulting in data congestion and latency in dense cellular networks. NOMA is a prominent scheme in which multiple users are paired together and access radio resources by slicing the power domain. While several research works study power control mechanisms by base station to communicate with NOMA users, it is equally important to maintain distinction between the users in uplink communication. Furthermore, these users in a NOMA pair are able to perform cooperative relaying where one device assists another device in a NOMA pair to increase signal diversity. However, the benefits of using a NOMA pair in improving network coverage is still overlooked. With a varierty of cellular connected devices, use of NOMA is studied on devices with similar channel characteristics and the need of adopting NOMA for aerial devices has not been investigated. Therefore, this research establishes a novel mechanism to offer distinction in uplink communication for NOMA pair, a relaying scheme to extend the coverage of a base station by utilising NOMA pair and a ranking scheme for ground and aerial devices to access radio resources by NOMA.Item Effective security analysis for combinations of MTD techniques on cloud computing : a thesis submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy (Ph.D.) in Computer Science, Massey University(Massey University, 2019) Alavizadeh, HoomanMoving Target Defense (MTD) is an emerging security mechanism that can introduce a dynamic defensive layer for a given system by changing the attack surface. MTD techniques are useful to address security issues in cloud computing. MTD techniques are classified into three main categories: Shuffle, Diversity, and Redundancy. Shuffle MTD techniques can rearrange the system's components (e.g., IP mutation). They confuse the attackers by hardening the reconnaissance process and wasting the information collected by the attackers. Diversity MTD techniques change the variants of a system's component (e.g., operating systems), which makes an attack more difficult and costly because the attackers encounter a new set of vulnerabilities. Redundancy MTD techniques increase the system components' replicas. They can be used to increase system dependability (e.g., reliability or availability) by providing redundant ways of providing the same services when some system components are compromised. Since deploying each MTD technique may affect the others and also have different effects on the system (e.g., one can enhance the security and another can provide service's availability), it is important to combine MTD techniques in such a way that they can support each other directly or indirectly. This research first conducts an extensive survey of MTD literature to realize and summarize the key limitations of the current MTD studies. We reveal that (i) there is a lack of investigation on the combination of MTD techniques, (ii) relatively less effort has been made to evaluate the effectiveness of MTD techniques using security analysis, and (iii) there is a shortcoming in the validation of MTD techniques on more realistic cloud testbeds. We focus on the theoretical aspects of combining MTD techniques and provide formalization to combine MTD techniques in order to address those limitations. First, we achieve this by combining Shuffle and Redundancy to find a trade-off between System Risk and Reliability. Then, we provide a formal mathematical definition to combine Shuffle and Diversity to increase security while narrowing the scope for potential attacks. We evaluate the effectiveness of the proposed combined techniques using Graphical Security Models (GSMs) and incorporating various security metrics. We extend the combination of MTD techniques by including Redundancy besides Shuffle and Diversity. We perform an in-depth analysis on combining those MTD techniques to find out a trade-off between security alongside the reliability of the cloud. We show that if those MTD techniques are combined properly, it not only improves the cloud's security posture but also it increases the reliability of the cloud. Moreover, we study the economic metrics to show how MTD techniques can be deployed in a cost effective way. We also propose an Optimal Diversity Assignment Problem (O-DAP) to find the optimal solution for deploying Diversity over cloud. Finally, we design and develop an automated cloud security framework to evaluate the cloud security posture and adapt MTD techniques on the real cloud platform. We demonstrate the feasibility, adaptability, and usability of implementing MTD techniques on UniteCloud which is a real private cloud platform.Item The Southern Cross cable : a tour : art, the internet and national identity in Aotearoa-New Zealand : an exegesis submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Fine Arts, Massey University, Wellington, New Zealand(Massey University, 2018) Holloway-Smith, BronwynThis exegesis is the written analytical component of a studio-based Doctor of Philosophy that, as a whole, investigates the influence of international hegemony and power structures on popular notions of Aotearoa-New Zealand’s national identity. Selected histories and locations of New Zealand’s primary international internet connection, the Southern Cross Cable, have been taken and applied within a body of conceptually driven artworks that function as an effective metonymic vehicle to reveal unseen processes, conveyed over a specific infrastructural system, that are influential upon New Zealand’s national identity. The creative works in this thesis comprise the suite of artworks The Southern Cross Cable: A Tour, a multi-platform art project comprising two moving image works, a sculptural work, a published tour guide and its associated web-based work. These sit alongside, and in response to, a historic mid-twentieth century New Zealand mural: Te Ika-a-Maui [sic] by the artist E. Mervyn Taylor. Together, these works encourage public awareness of the jurisdictional limits of the internet, and illustrate ways in which an individual member of the public can respond to the supposedly ‘intangible’ internet in a physical manner. By strategically subverting popular nationalist symbolism, the works raise questions about the relevance of nationalism in an era of expanding globalisation and suggest the internet is increasingly becoming a tool of digital colonialism. By distributing this knowledge in the public sphere, this study challenges and tests the assumption—often asserted and implied by those who control this infrastructure and obscure it from public awareness—that public knowledge is a threat to the cable. Instead, viewers are encouraged to explore what individual agency they do, or do not, have as New Zealand citizens in shaping this dominant influence on contemporary New Zealand culture.Item Catching the next wave : the use of the Internet by justice and development voluntary organisations and people organisations : a thesis presented in partial fulfilment of the requirements for the degree of Master of Philosophy in Development Studies at Massey University(Massey University, 1998) Seymour, JoanneThis thesis examines the extent to which third world organisations have participated in the shaping, control and benefits of development theory and practice. It concludes that development theory has been a creation of the first world acting upon the third world which is often perceived as powerless to help itself. Modernisation theory, development theory, alternative theories and neo-liberalism are all theories that developed out of the first world experience of development. Development theory has not been shaped by the third world rather it has been manipulated and controlled from within the first world. The very poor of the poorest countries have not benefited from development theory. Participation, also perceived as empowerment, has been lauded by development practitioners as the new panacea for development ills. Even though such participation is not so evident in reality, third world organisations are becoming more participatory, especially where first world organisations have changed their role from funder and provider to solidarity partners and advocators (within their own country). This thesis examined the potential of the Internet to increase the participation of third world organisations in voicing their justice and development issues to the first world. The Internet is only a participatory tool when used in a participatory environment. Its use will not necessarily ensure greater participation, of the third world, in development issues. As yet the Internet's potential is largely unrealised. This thesis conducted descriptive research into the extent that third world organisations use the Internet to further their justice and development objectives. The research found that third world use of the Internet was low compared to first world use of the Internet. This thesis recommends that the use of email subscription lists and World Wide Web sites by grassroots organisations from within third world countries is a unique opportunity to promote the third world perception of development issues to the first world.Item Application of internet technologies to customer support services: a thesis presented in partial fulfilment of the requirements for the Master of Technology at Massey University(Massey University, 1999) Ramsay, Nigel JamesThe topic of this thesis was first proposed by the management of IBM New Zealand. One of the major products of IBM in New Zealand is called the Integrated Customer Management System, or ICMS. This is a software package that is sold to telecommunications companies worldwide. The ICMS product is currently undergoing a major upgrade which would see it converted from an RPG based application that is based on AS/400 type computers, to a C++ based application that would run on RS/6000 type computers (server) and Intel x86 computers (client). What was proposed was a course of research that would study how Internet based technologies could be applied in the future use of this newly upgraded product.Item Corporate control? Measuring private sector censorship of social media : a thesis presented in partial fulfilment of the requirements for the degree of Master of Information Science in Information Technology at Massey University, Albany, New Zealand(Massey University, 2016) Zhong, HanfengCensoring activities on sensitive topics have played a significant role on social network sites (SNSs). Owing to the difference in politics, economics and cultures in the various countries, many social network sites including Facebook, Twitter, Google, Reddit and Imgur might implement different censorship standards according to the situation of the country. This study aims to explore whether governments’ decision and censorship policies mentioned in previous studies have been implemented on main social network sites. Additionally, this article searches a list of sensitive keywords on each tested site, which is also the simplest approach applied to explore censorship on social network sites regulated using keywords filtering. Indeed, classifying a list of keywords into blacklist or merely blocking some defined sensitive topics refers to the primary method for censoring information on social network sites. The discussion makes us re-examine not only censorship on social network sites but also propose three possible conclusions concerning censorship on social network sites in specific country, such as ‘censorship is weaker than we anticipated’, 'some social network sites focus on supporting country’s censorship’ and 'censorship is imperfect to be implemented by social network sites’. As shown by results, some leaks still exist on current censorship of social network sites, while some sites fail to sensor harmful information that should be blocked. However, some harmless information is blocked by certain sites that may influence users’ browse information. By analyzing the censorship data of blocked keywords and pornography sites on Facebook, Twitter, Google, Reddit and Imgur, this research highlights the defect of censorship implemented on social network sites. Keywords: censorship standards, social network sites, censoringItem Developing an integrated internet presence : a thesis presented in partial fulfilment of the requirements for the degree of Master of Philosophy in Technology at Massey University(Massey University, 1996) Lusk, Simon JohnThis thesis aims to demonstrate a replicable process for creating an integrated internet presence. An integrated internet presence includes the use of the World Wide Web, Email, Email Lists and Newsgroups. Using the web alone is not using the medium either appropriately or to its full advantage. It has a business orientation, due to the fact that no non profit sites have been developed. Several concepts are dealt with in detail, including: What is the Internet? An Integrated Internet Presence Promoting Web Sites A Promotions or Selling Medium? Appropriate Use of the Medium Competitive Advantage A series of case studies designed to support these concepts form the second half of the thesis. The case studies are predominantly based on existing web sites developed by the author in the past year and a half. Those cases not based on developed sites have been chosen as they illustrate several concepts addressed. Due to the speed that technology is moving, a snapshot in time has been taken. The actual date of the chosen point in time, June 1996, is not as important as the sophistication of the browser. For the purposes of this thesis, the most widespread browser in use at the time of writing, Netscape Navigator 2.0 Netscape 2.0 may be found in Appendix 2, and run either from the CDRom or from the machine of the person viewing the CDRom, is the browser used.
