The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Aim of this research was to examine familiarity of students in Croatia with threats in form of social engineering and phishing attacks. To obtain our research data, a practical assessment of student's capabilities to identify phishing attacks against them was conducted with the help of a graphical questionnaire that presented real phishing messages that tried to identify what kind of scams or attacks...
Efficient incident response operations require information sharing among parties to allow appropriate actions to be considered and executed. This sharing needs to be realized even beyond an organization's borders since many security incidents involve multiple organizations, but it is currently performed manually and thus is inefficient. In this paper, a scheme that facilitates the exchanges of enriched...
This paper presents the methodology and its correspondent software conceived by Daimon Engineering to propose the medium voltage distribution system work plan of CELESC. To accomplish this job, a specially designed computer program has been created to take into account several technical variables, according to the type of problem (overcapacity of conductors and voltage drops). As a result of this...
Computer science students use data array processing in many courses. To exploit the full power of caches and obtain higher performance, they mostly use the textbook example of sequential access of data arrays. However, a lot of discrepancies occur and the expected performance is not obtained in real life program executions, mostly due to the existence of several cache levels, with various architectures...
Teaching a hardware-based course for computer science students is a very challenging task. Students need to do a lot of practical work in the laboratory, usually do some practical project, learn theory and finally take the exam. This is a very hard task for the first hardware-based course — Computer architecture and organization (CAO), especially if it is offered in the first year of studies. Many...
Project Management (PM) tools are necessary to manage contemporary software projects. Computer professionals need to know how to use these tools, and higher-education computer courses teach their usage. Therefore, educators often adopt general usage tools, such as MS Project. However, as such tools lack didactic features, educational PM tools have been developed. Yet, previous studies have shown that...
Time based Self-destructing email mainly aims at protecting data privacy. In this paper we discussed the spear phishing process as a part of advanced persistent threat attack which gathers information and targets an individual or organization. It implements of social engineering techniques to gather data regarding recipient. Malicious emails are sent by combining the psychological and technical tricks,...
Any organization which is a large consumer of electrical energy should adopt suitable scheme of energy conservation to minimize the energy utility. Energy auditing, both the thermal energy auditing and electrical energy auditing is a usual procedure in an educational institution. Most of the commercial building in India, were not constructed by following the standard energy conservation code. Recent...
In computer-supported collaborative work (CSCW), role based access right (RBAC) is commonly accepted for controlling access to resources. Later, this role concept has been widely adopted into other CSCW research areas where it is known as role based management (RBM). However, RBM is studied within its limited scope without considering role in a bigger scale that covers various CSCW entities. Thus,...
In current time Cloud Computing is significant hi-tech research area in latest technology. These technologies give users several advantages: cost effectiveness, efficient resource utilisation, collaboration, disaster recovery and high performance. Cloud offers services for computing on single mouse click. Survey was carried out in form of an online questionnaire. This research also investigates Usability...
With the ever increasing man-machine interaction, automation of process and decline in hardware and software cost, the amount of digital data generated and used is increasing day by day. The big data referred here is the massive amount of digital data generated in each and every second in structured, semi-structured and unstructured format throughout the world. This emerging field of big data analytic...
Every cloud data center has a geographical location, which is known to, at least, its owner. Still, it is a challenge for a cloud customer to discover indisputably the location of the data center, which hosts an active cloud based service and its data. Knowing the location is necessary to assess that pertinent geographical obligations of service level agreements and legal requirements are fulfilled...
The aim of this study is to develop a conceptual model that could use to understanding the role of organizational factors in KMS acceptance. Theory Technology Acceptance Model (TAM) along with organizational factors are using in develop the conceptual model for this study. Study was conducted by collected and analysis relevant article in this area. Variable and indictors in the conceptual model was...
Searching relationship among persons is more and more growing importance to acquire related information, genealogical relationship and personnel history. In this paper, the framework with three portions is proposed for exploring peoples' relationship from their personnel information. The first portion focuses on storage structure to store data in Graph database by representing persons as nodes and...
Analyzing the implementation of private cloud and Openstack authentication is necessary to work in an Openstack environment. Private cloud is implemented using Openstack and the aim is to provide a better performance in using Openstack and focus is on the underlying infrastructure on the performance of private cloud deployment.This Openstack is highly beneficial for the Research Centre Communities...
There is a patient safety problem, specifically in maintaining practioner competency. Healthcare organizations feel the impact of regulatory, medical, and technological changes when practioners are unable to process, retain and utilize increasing amounts of information. The rising costs associated with medical errors have increased legal and financial impacts. With the majority of healthcare safety...
We present an interactive graphical tool for assisted curation of knowledge bases from unstructured text data. Given text input, the user can create a knowledge base from scratch, including sub-tasks of entity mention annotation, matching mentions that refer to the same entity, and extracting relations between entities. The interface is designed to enable organizations to extract valuable knowledge...
Green Information Technology (GIT) is emerging as an increasingly important issue as organizations come under pressure to address environmental sustainability concerns. Despite increased attention from business, government and more recently, Information Systems (IS) researchers, a measure to determine the capability of organizations to Green their IT remains elusive. The ultimate aim is to utilize...
We present the design and organization of an homogeneous asynchronous bit-level array based on Null Convention Logic. A bit element (bel) array represents a bit-level hybrid processor that exhibits both Spatial and Temporal computing characteristics. The bit elements are organized in a 2D grid, with eight-way connectivity. Programs represented as Directed Acyclic Graphs can be mapped to the array...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.