Dr. Alan Litchfield | Auckland University of Technology (original) (raw)

Papers by Dr. Alan Litchfield

Research paper thumbnail of Democratisation of Work through the application of Web 2.0 technologies

Under the influence of Web 2.0 Work (purposeful directed action) is democratised moving it away f... more Under the influence of Web 2.0 Work (purposeful directed action) is democratised moving it away from productionist metaphysics. Web 2.0 symbolises a cultural phenomenon summarised as a collection of emerging technologies and methodologies that, in the enterprise, provides for a shift in the asymmetric distribution of power such that the technological human has access to mechanisms and processes that allow greater participation in formative decision-making. The technological enterprise, through fostering Web 2.0 technologies, is able to offer the infrastructure the technological human can use to build its own social networks. This provides an opportunity for employee to invest emotionally in the purposes and intentions of the enterprise.

Research paper thumbnail of ReSOLV: Applying Cryptocurrency Blockchain Methods to Enable Global Cross-platform Software License Validation

This paper presents a method for a decentralised peer-to-peer software license validation system ... more This paper presents a method for a decentralised peer-to-peer software license validation system using cryptocurrency blockchain technology to ameliorate software piracy, and to provide a mechanism for software developers to protect copyrighted works. Protecting software copyright has been an issue since the late 1970's and software license validation has been a primary method employed in an attempt to minimise software piracy and protect software copyright. The method described creates an ecosystem in which the rights and privileges of participants are observed.

Research paper thumbnail of Taxonomy for Identification of Security Issues in Cloud Computing Environments

Journal of Computer Information Systems, 2016

Research paper thumbnail of A Generalized Threat Taxonomy for Cloud Computing

Research paper thumbnail of A Systematic Review of Cloud Computing, Big Data and Databases on the Cloud

Research paper thumbnail of Modelling whakapapa with system dynamics: Developing ICT tools for genealogy research

Journal of Applied Computing and Information Technology, 2003

Research paper thumbnail of The semantics of work in a work system: a pragmatic philosophy of Information Systems

Research paper thumbnail of What is the Essence of Twenty-first Century Technology? Heidegger’s Question Concerning Technology Revisited

Research paper thumbnail of Holistic Pragmatism as a Philosophical Framework in Information Systems Research

Research paper thumbnail of Introduction to the Minitrack From Information Systems to Knowledge Systems: Issues in Knowledge and Systems Research

2014 47th Hawaii International Conference on System Sciences, 2014

Research paper thumbnail of ContoGram: A Novel Contextual Requirements Engineering Tool

2014 IEEE International Conference on Computer and Information Technology, 2014

Research paper thumbnail of VoIP Performance Analysis over IPv4 and IPv6

International Journal of Computer Network and Information Security, 2014

The advance of technology often requires the emergence of complementary technologies, of which th... more The advance of technology often requires the emergence of complementary technologies, of which the transition from IPv4 to IPv6 presents a significant example. The move of protocol has focussed attention on the level of performance for associated technologies. Among the many Internet applications, in contemporary digital communications, VoIP stands apart in importance. This paper presents a performance analysis of VoIP using IPv4 and IPv6. Using OPNET to simulate the protocols and to investigate areas of performance weakness.

Research paper thumbnail of Distributed Publishing — Publishing to Multiple Devices from a Single Source

Research paper thumbnail of Modelling tribal genealogies for information systems design and development

... maunga roho Ki uta Tokatoka E tu tonu Opunake te awa Kutereana ki te awa o te Wairoa Tainoa k... more ... maunga roho Ki uta Tokatoka E tu tonu Opunake te awa Kutereana ki te awa o te Wairoa Tainoa ki te wahapu o te Kaipara Ko Ahikiwi te marae Ko Te Arangamai o te Whakapono te whare Ng¯ati Hinga te hap¯u Ng¯ati Whatua ¯a Te Rarawa te iwi Ko Hame Nepia Te Morenga ...

Research paper thumbnail of E-learning in the KSA: A taxonomy of learning methods in Saudi Arabia

The advent and rapid advancement of the internet and the Information and Communication Technology... more The advent and rapid advancement of the internet and the Information and Communication Technology (ICT) infrastructure as a whole has greatly revolutionised the world. The presence of this advanced technology has facilitated and eased communication and the relay of information. This has provided advantages for students and educators. Although the Saudi Arabian tertiary education system has been greatly transformed over the past couple of years, the most persistent challenge is how to access higher education. There is an urgent need for education delivery methods that take education beyond the traditional confines of campuses. Therefore, institutions of higher learning in Saudi Arabia have begun to explore various education delivery methods to identify the best course delivery methods for students. The introduction of e-learning will possibly increase the access to tertiary training and education. This study therefore investigates different multimodal delivery methods and technologies currently being employed by tertiary education institutions as well as the incorporation of technology into teaching practice to improve educational systems. This research is qualitative in nature and analyses published academic and industry literature. The relevant data is collected and categorized through the building of a taxonomy. The study relies on a sample of 34 universities (24 government universities, 9 private universities and 1 public research university) and employs symbolic interactionism. The study concludes that the taxonomy of Saudi tertiary education system has six main features on which the system is based. These features have influenced the adoption and implementation of e-learning in the education system.

Research paper thumbnail of A Novel Method for Decentralised Peer-to-Peer Software License Validation Using Cryptocurrency Blockchain Technology

Protecting software copyright has been an issue since the late 1970’s, and software license valid... more Protecting software copyright has been an issue since the
late 1970’s, and software license validation has been a
primary method employed in an attempt to minimise
software piracy and protect software copyright. This
paper presents a novel method for decentralised peer-topeer
software license validation using cryptocurrency
blockchain technology to ameliorate software piracy, and
to provide a mechanism for all software developers to
protect their copyrighted works.

Research paper thumbnail of Democratisation of Work through the application of Web 2.0 technologies

Under the influence of Web 2.0 Work (purposeful directed action) is democratised moving it away f... more Under the influence of Web 2.0 Work (purposeful directed action) is democratised moving it away from productionist metaphysics. Web 2.0 symbolises a cultural phenomenon summarised as a collection of emerging technologies and methodologies that, in the enterprise, provides for a shift in the asymmetric distribution of power such that the technological human has access to mechanisms and processes that allow greater participation in formative decision-making. The technological enterprise, through fostering Web 2.0 technologies, is able to offer the infrastructure the technological human can use to build its own social networks. This provides an opportunity for employee to invest emotionally in the purposes and intentions of the enterprise.

Research paper thumbnail of ReSOLV: Applying Cryptocurrency Blockchain Methods to Enable Global Cross-platform Software License Validation

This paper presents a method for a decentralised peer-to-peer software license validation system ... more This paper presents a method for a decentralised peer-to-peer software license validation system using cryptocurrency blockchain technology to ameliorate software piracy, and to provide a mechanism for software developers to protect copyrighted works. Protecting software copyright has been an issue since the late 1970's and software license validation has been a primary method employed in an attempt to minimise software piracy and protect software copyright. The method described creates an ecosystem in which the rights and privileges of participants are observed.

Research paper thumbnail of Taxonomy for Identification of Security Issues in Cloud Computing Environments

Journal of Computer Information Systems, 2016

Research paper thumbnail of A Generalized Threat Taxonomy for Cloud Computing

Research paper thumbnail of A Systematic Review of Cloud Computing, Big Data and Databases on the Cloud

Research paper thumbnail of Modelling whakapapa with system dynamics: Developing ICT tools for genealogy research

Journal of Applied Computing and Information Technology, 2003

Research paper thumbnail of The semantics of work in a work system: a pragmatic philosophy of Information Systems

Research paper thumbnail of What is the Essence of Twenty-first Century Technology? Heidegger’s Question Concerning Technology Revisited

Research paper thumbnail of Holistic Pragmatism as a Philosophical Framework in Information Systems Research

Research paper thumbnail of Introduction to the Minitrack From Information Systems to Knowledge Systems: Issues in Knowledge and Systems Research

2014 47th Hawaii International Conference on System Sciences, 2014

Research paper thumbnail of ContoGram: A Novel Contextual Requirements Engineering Tool

2014 IEEE International Conference on Computer and Information Technology, 2014

Research paper thumbnail of VoIP Performance Analysis over IPv4 and IPv6

International Journal of Computer Network and Information Security, 2014

The advance of technology often requires the emergence of complementary technologies, of which th... more The advance of technology often requires the emergence of complementary technologies, of which the transition from IPv4 to IPv6 presents a significant example. The move of protocol has focussed attention on the level of performance for associated technologies. Among the many Internet applications, in contemporary digital communications, VoIP stands apart in importance. This paper presents a performance analysis of VoIP using IPv4 and IPv6. Using OPNET to simulate the protocols and to investigate areas of performance weakness.

Research paper thumbnail of Distributed Publishing — Publishing to Multiple Devices from a Single Source

Research paper thumbnail of Modelling tribal genealogies for information systems design and development

... maunga roho Ki uta Tokatoka E tu tonu Opunake te awa Kutereana ki te awa o te Wairoa Tainoa k... more ... maunga roho Ki uta Tokatoka E tu tonu Opunake te awa Kutereana ki te awa o te Wairoa Tainoa ki te wahapu o te Kaipara Ko Ahikiwi te marae Ko Te Arangamai o te Whakapono te whare Ng¯ati Hinga te hap¯u Ng¯ati Whatua ¯a Te Rarawa te iwi Ko Hame Nepia Te Morenga ...

Research paper thumbnail of E-learning in the KSA: A taxonomy of learning methods in Saudi Arabia

The advent and rapid advancement of the internet and the Information and Communication Technology... more The advent and rapid advancement of the internet and the Information and Communication Technology (ICT) infrastructure as a whole has greatly revolutionised the world. The presence of this advanced technology has facilitated and eased communication and the relay of information. This has provided advantages for students and educators. Although the Saudi Arabian tertiary education system has been greatly transformed over the past couple of years, the most persistent challenge is how to access higher education. There is an urgent need for education delivery methods that take education beyond the traditional confines of campuses. Therefore, institutions of higher learning in Saudi Arabia have begun to explore various education delivery methods to identify the best course delivery methods for students. The introduction of e-learning will possibly increase the access to tertiary training and education. This study therefore investigates different multimodal delivery methods and technologies currently being employed by tertiary education institutions as well as the incorporation of technology into teaching practice to improve educational systems. This research is qualitative in nature and analyses published academic and industry literature. The relevant data is collected and categorized through the building of a taxonomy. The study relies on a sample of 34 universities (24 government universities, 9 private universities and 1 public research university) and employs symbolic interactionism. The study concludes that the taxonomy of Saudi tertiary education system has six main features on which the system is based. These features have influenced the adoption and implementation of e-learning in the education system.

Research paper thumbnail of A Novel Method for Decentralised Peer-to-Peer Software License Validation Using Cryptocurrency Blockchain Technology

Protecting software copyright has been an issue since the late 1970’s, and software license valid... more Protecting software copyright has been an issue since the
late 1970’s, and software license validation has been a
primary method employed in an attempt to minimise
software piracy and protect software copyright. This
paper presents a novel method for decentralised peer-topeer
software license validation using cryptocurrency
blockchain technology to ameliorate software piracy, and
to provide a mechanism for all software developers to
protect their copyrighted works.