The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, many countries have used e-government to provide high quality services to their citizens. Thus, a number of studies have investigated user acceptance of e-government through the use of adoption models, such as the Unified Theory of Acceptance and Use of Technology (UTAUT) model. However, these models do not focus sufficiently on security. In order to develop a more security-focused...
Based on a dual approach, which incorporated both a literature survey as well as a direct experiment without the preamble to support any hypothesis, the objectives of the research was to determine the likeliness of a SNS users from two different parts of South Africa to accept a friend request from a totally unknown and fictitious user. The results seem to point to a general willingness to accept...
Participation in online social networks (OSNs) such as Facebook, Linked In, and Twitter has dramatically increased over the years. For example, it is estimated that Facebook has more than eight hundred million registered users. The popularity of OSNs has increased the sheer amount of personal information on the Internet. In this paper, we introduce a profiling and tracking attack that correlates a...
The rapid development of Internet, e-commerce comes with the problem of how to solve security, has become an urgent goals. The aim of this paper is to prove computer network security and the business transactions security. A number of conventional technology solutions are on this basis, Solve the security of computer networks and transactions is the key to improving the security environment and e-commerce...
Mobile phones are gradually replacing PCs and even laptops. With so many platforms and apps available, consumers are often confused and managing these devices security requires an extra knowledge. This paper presents the findings of a survey into the opinions of users regarding mobile security, their level of awareness towards current threats, and the need for more security. The paper concludes with...
The ideas that democratic governments should be open, accessible, and transparent to the governed are not new ones, but they are receiving renewed emphasis through the combination of government reform efforts and the emergence of Web 2.0 social media tools that promote information sharing, integration, and public discourse. Although these initiatives are young, they already exhibit daunting complexity,...
This paper aims at studying two main solutions to digital identity management, Cardspace from Microsoft and Liberty from Liberty Alliance Project, and the problem of interoperability between them in a heterogeneous environment. It also proposes some recommendations for implementing the interoperability at some given levels.
As digital resources increasingly growing and the economic benefit of digital intellectual property rights being increasingly important, people has been increasingly emphasis on information security issues brought by the data remnants in storage devices. They try their best to prevent the potential risks. In this paper, we survey comprehensively related technologies, standards and trends of erasure,...
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Outlier deTector (SPOT), to deal with the problem of anomaly detection from high-dimensional data streams. We conduct a case study of SPOT in this paper by deploying it on 1999 KDD Intrusion Detection application. Innovative approaches for training...
Robustness against geometric distortion is one of the most important problems in image authentication. In this paper, an image watermarking algorithm robust to geometric transformations is proposed. Radon transformation is used to detect and invert geometric transformations, and a perceptual hash feature detector is proposed to extract significant feature points, finally compares features from two...
This paper presents a course model for teaching component-based software development (CBSD) in the software engineering undergraduate curriculum to deepen and broaden student comprehension of component software. All hands-on lab practices are designed with open-source software tools. The course endows students the precious experiences of making design decisions via comparative study, risk analysis,...
Information privacy is usually concerned with the confidentiality of personally identifiable information (PII), such as electronic medical records. Nowadays, Web services are used to support different applications which may contain PII, such as healthcare applications. Thus, the information access control mechanism for Web services must be embedded into privacy-enhancing technologies. Further as application...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.