Dr. Alan Litchfield | Auckland University of Technology (original) (raw)
Papers by Dr. Alan Litchfield
Under the influence of Web 2.0 Work (purposeful directed action) is democratised moving it away f... more Under the influence of Web 2.0 Work (purposeful directed action) is democratised moving it away from productionist metaphysics. Web 2.0 symbolises a cultural phenomenon summarised as a collection of emerging technologies and methodologies that, in the enterprise, provides for a shift in the asymmetric distribution of power such that the technological human has access to mechanisms and processes that allow greater participation in formative decision-making. The technological enterprise, through fostering Web 2.0 technologies, is able to offer the infrastructure the technological human can use to build its own social networks. This provides an opportunity for employee to invest emotionally in the purposes and intentions of the enterprise.
This paper presents a method for a decentralised peer-to-peer software license validation system ... more This paper presents a method for a decentralised peer-to-peer software license validation system using cryptocurrency blockchain technology to ameliorate software piracy, and to provide a mechanism for software developers to protect copyrighted works. Protecting software copyright has been an issue since the late 1970's and software license validation has been a primary method employed in an attempt to minimise software piracy and protect software copyright. The method described creates an ecosystem in which the rights and privileges of participants are observed.
Journal of Computer Information Systems, 2016
Journal of Applied Computing and Information Technology, 2003
2014 47th Hawaii International Conference on System Sciences, 2014
2014 IEEE International Conference on Computer and Information Technology, 2014
International Journal of Computer Network and Information Security, 2014
The advance of technology often requires the emergence of complementary technologies, of which th... more The advance of technology often requires the emergence of complementary technologies, of which the transition from IPv4 to IPv6 presents a significant example. The move of protocol has focussed attention on the level of performance for associated technologies. Among the many Internet applications, in contemporary digital communications, VoIP stands apart in importance. This paper presents a performance analysis of VoIP using IPv4 and IPv6. Using OPNET to simulate the protocols and to investigate areas of performance weakness.
... maunga roho Ki uta Tokatoka E tu tonu Opunake te awa Kutereana ki te awa o te Wairoa Tainoa k... more ... maunga roho Ki uta Tokatoka E tu tonu Opunake te awa Kutereana ki te awa o te Wairoa Tainoa ki te wahapu o te Kaipara Ko Ahikiwi te marae Ko Te Arangamai o te Whakapono te whare Ng¯ati Hinga te hap¯u Ng¯ati Whatua ¯a Te Rarawa te iwi Ko Hame Nepia Te Morenga ...
The advent and rapid advancement of the internet and the Information and Communication Technology... more The advent and rapid advancement of the internet and the Information and Communication Technology (ICT) infrastructure as a whole has greatly revolutionised the world. The presence of this advanced technology has facilitated and eased communication and the relay of information. This has provided advantages for students and educators. Although the Saudi Arabian tertiary education system has been greatly transformed over the past couple of years, the most persistent challenge is how to access higher education. There is an urgent need for education delivery methods that take education beyond the traditional confines of campuses. Therefore, institutions of higher learning in Saudi Arabia have begun to explore various education delivery methods to identify the best course delivery methods for students. The introduction of e-learning will possibly increase the access to tertiary training and education. This study therefore investigates different multimodal delivery methods and technologies currently being employed by tertiary education institutions as well as the incorporation of technology into teaching practice to improve educational systems. This research is qualitative in nature and analyses published academic and industry literature. The relevant data is collected and categorized through the building of a taxonomy. The study relies on a sample of 34 universities (24 government universities, 9 private universities and 1 public research university) and employs symbolic interactionism. The study concludes that the taxonomy of Saudi tertiary education system has six main features on which the system is based. These features have influenced the adoption and implementation of e-learning in the education system.
Protecting software copyright has been an issue since the late 1970’s, and software license valid... more Protecting software copyright has been an issue since the
late 1970’s, and software license validation has been a
primary method employed in an attempt to minimise
software piracy and protect software copyright. This
paper presents a novel method for decentralised peer-topeer
software license validation using cryptocurrency
blockchain technology to ameliorate software piracy, and
to provide a mechanism for all software developers to
protect their copyrighted works.
Under the influence of Web 2.0 Work (purposeful directed action) is democratised moving it away f... more Under the influence of Web 2.0 Work (purposeful directed action) is democratised moving it away from productionist metaphysics. Web 2.0 symbolises a cultural phenomenon summarised as a collection of emerging technologies and methodologies that, in the enterprise, provides for a shift in the asymmetric distribution of power such that the technological human has access to mechanisms and processes that allow greater participation in formative decision-making. The technological enterprise, through fostering Web 2.0 technologies, is able to offer the infrastructure the technological human can use to build its own social networks. This provides an opportunity for employee to invest emotionally in the purposes and intentions of the enterprise.
This paper presents a method for a decentralised peer-to-peer software license validation system ... more This paper presents a method for a decentralised peer-to-peer software license validation system using cryptocurrency blockchain technology to ameliorate software piracy, and to provide a mechanism for software developers to protect copyrighted works. Protecting software copyright has been an issue since the late 1970's and software license validation has been a primary method employed in an attempt to minimise software piracy and protect software copyright. The method described creates an ecosystem in which the rights and privileges of participants are observed.
Journal of Computer Information Systems, 2016
Journal of Applied Computing and Information Technology, 2003
2014 47th Hawaii International Conference on System Sciences, 2014
2014 IEEE International Conference on Computer and Information Technology, 2014
International Journal of Computer Network and Information Security, 2014
The advance of technology often requires the emergence of complementary technologies, of which th... more The advance of technology often requires the emergence of complementary technologies, of which the transition from IPv4 to IPv6 presents a significant example. The move of protocol has focussed attention on the level of performance for associated technologies. Among the many Internet applications, in contemporary digital communications, VoIP stands apart in importance. This paper presents a performance analysis of VoIP using IPv4 and IPv6. Using OPNET to simulate the protocols and to investigate areas of performance weakness.
... maunga roho Ki uta Tokatoka E tu tonu Opunake te awa Kutereana ki te awa o te Wairoa Tainoa k... more ... maunga roho Ki uta Tokatoka E tu tonu Opunake te awa Kutereana ki te awa o te Wairoa Tainoa ki te wahapu o te Kaipara Ko Ahikiwi te marae Ko Te Arangamai o te Whakapono te whare Ng¯ati Hinga te hap¯u Ng¯ati Whatua ¯a Te Rarawa te iwi Ko Hame Nepia Te Morenga ...
The advent and rapid advancement of the internet and the Information and Communication Technology... more The advent and rapid advancement of the internet and the Information and Communication Technology (ICT) infrastructure as a whole has greatly revolutionised the world. The presence of this advanced technology has facilitated and eased communication and the relay of information. This has provided advantages for students and educators. Although the Saudi Arabian tertiary education system has been greatly transformed over the past couple of years, the most persistent challenge is how to access higher education. There is an urgent need for education delivery methods that take education beyond the traditional confines of campuses. Therefore, institutions of higher learning in Saudi Arabia have begun to explore various education delivery methods to identify the best course delivery methods for students. The introduction of e-learning will possibly increase the access to tertiary training and education. This study therefore investigates different multimodal delivery methods and technologies currently being employed by tertiary education institutions as well as the incorporation of technology into teaching practice to improve educational systems. This research is qualitative in nature and analyses published academic and industry literature. The relevant data is collected and categorized through the building of a taxonomy. The study relies on a sample of 34 universities (24 government universities, 9 private universities and 1 public research university) and employs symbolic interactionism. The study concludes that the taxonomy of Saudi tertiary education system has six main features on which the system is based. These features have influenced the adoption and implementation of e-learning in the education system.
Protecting software copyright has been an issue since the late 1970’s, and software license valid... more Protecting software copyright has been an issue since the
late 1970’s, and software license validation has been a
primary method employed in an attempt to minimise
software piracy and protect software copyright. This
paper presents a novel method for decentralised peer-topeer
software license validation using cryptocurrency
blockchain technology to ameliorate software piracy, and
to provide a mechanism for all software developers to
protect their copyrighted works.