The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Specialists of a number of scientific institutes in this article present examples of successful models of modern press services in institutions in the field of science and education in Russia and research their key methods in work.
The article deals with the development of technology for extraction and processing of statistical information of private sector of regional healthcare. The concept of data mining from various sources in the Internet, methods of extraction and integration of information about medical organizations of private sector of regional healthcare are presented.
This work presents a methodology for evaluating informatics security in any kind of organization. We use the ISO-27002/2013 standard and the Mexican equivalent NMX-I27002.NYCE-2009 as basis to follow. The standards stablish fourteen controls: human factors, technological, process, and legal controls. The organization must choose adequate controls for it, then It can use the ”Minimal Distance Method...
Named Entity Recognition (NER) plays a significant role in Information Extraction (IE). In English, the NER systems have achieved excellent performance, but for the Indonesian language, the systems still need a lot of improvement. To create a reliable NER system using machine learning approach, a massive dataset to train the classifier is a must. Several studies have proposed methods in automatically...
The internet becomes the major channel for the college students to receive information and public or share their opinions to the world wide without any limitation, which makes more tougher for the public opinion management in college students. This research concentrates on the characteristics of the public opinion management in the network environment and the status of the university public opinion...
The purpose of this paper is to discuss how using Gephi to visualize the open ports at IP addresses in Shodan may provide a means of identifying SCADA devices. Visualizations were created using both IP addresses and open ports as nodes. Modularity, centralities, and layout were used to enhance the visualizations. From these visualizations we hope to gather a better understanding of what devices are...
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving...
The teaching development of university young teacher sets university training, university consulting and teaching reformation as its main content, and set personal development and organization development as basic purpose, moreover, it also organizes serious of activities which dedicate to improve the teaching capability of young teachers and carry forward the teaching culture. The application of...
In this paper, Social Engineering threats and trends are investigated and mitigation strategies recommended. The national and economic security of countries now relies on the Cyberspace because virtually all businesses processes are using the Internet. Unfortunately, Cyber-criminality is increasing and rated the fastest growing crime worldwide. Social engineering, a technique whereby cybercriminals...
Throughout the past few years, changes in the processes of enterprise's resources acquisition have been reflected by the news opportunities provided by web-based technology, changes in the behaviours and expectations of business partners and customers as well. The aim of the paper is to demonstrate that virtualization of resources acquisition processes has essential effect on the achievement of competitive...
Cyberspace is the processing, manipulation, and exploitation of information; the facilitation and augmentation of communication among people; and the interaction of people, information, and devices. The main characteristic of cyberspace is the interconnection of computers, information, devices, and people. Many actors are involved in cyberspace's construction and operation -- namely, telcos; application,...
E-business as one of the ICT infrastructure has experienced a high growth in last three decade, such that the approach and planning of the organization to enter the global market and attract the new customer has been affected in this regard. However the application of E-business in commercial activities requires attention to a range of internal and external factors affecting it. Due to these factors...
While confronting the global IPv4 address exhaustion, it is important and crucial for the entire Internet environment to smoothly upgrade to the next generation Internet Protocol, IPv6. Due to the budget constraints, different organizations should decide the priority of the IPv6 upgrade among all the provided services according to the degree of the necessity and the difficulty of the upgrade. Our...
In the current Internet-based systems, there are many problems using anonymity of the network communication such as personal information leak and crimes using the Internet systems. As a solution for solving the above problem, there is the approach of Policy-based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control of every user...
The International Organization of Supreme Audit Institutions (INTOSAI) recognizes that disclosure is a factor that has become crucial to the success of the work of Supreme Audit Institutions (SAI). This article aims to analyze whether the Spanish SAIs have implemented new information technology, and more specifically the Internet, as a means to improve both the transparency of its actions as interaction...
The advent of the Internet has provided people around the world with access to information and services from across the globe that is published without any mediation by governments or other agencies. However, access to this information and services may be restricted within the viewer's own country by their Government, Internet Service Providers, employers and families among others. The motivations...
After the Great East Japan Earthquake on 11 March 2011, there are many activities to cope with the disaster and future disasters. This paper discusses examples of disaster recovery activities, using Information and Communication Technology (ICT) around us in Japan.
This manuscript describes how we evaluated an implementation guide designed to help public organizations in Costa Rica that must implement an IT standard. In CLEI 2011 we described how we created the guide and how we used the guide in one financial entity. In this paper, we continue this effort by describing how we evaluated the quality of the designed implementation guide. To evaluate our product,...
With the development of sensing, wireless communication, and Internet technologies, we are now living in a world that is filled with various smart things — the Internet of Things. This paper introduces and prospects an emerging research area — the Internet of Things Application in China Logistics, which aims at revealing the opportunities, challenges and the explorations of this technology in China...
This paper seeks to conceptualize the evolution of ad-hoc and improvised self-coordination to institutionalized self-governance of non-binding virtual groups. It uses data collected from Face book group postings in the aftermath of the 2010 Haiti earthquake to discuss how netizens engage in loosely coordinated actions to contain hatred messages, and eventually evolve into a process of institutionalization...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.