The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this research sex and age of the borrower are considered as factors influencing his intention to use lending services and a loan purpose. Target groups of clients are defined through logistic regression modeling. Implication of obtained results allows bank to increase efficiency of its credit policy in the retail market of bank crediting.
It has been recognized that current phishing filters in existence today are steadily lacking in effectiveness. Furthermore, users and organizations are lacking appropriate security policies and education, which has led to massive reports of data and privacy breaches in organizations. To address this issue, a phishing filter is proposed which will build upon and broaden the scope of existing techniques...
This paper presents a case study of a university campus in Kiziba refugee camp in Rwanda. It evaluates different aspects of this university as a unique example of education in an extreme environment. The goal is to answer what accommodations, educational and technical, need to be made for a university to function in such extreme environments. In the process, field measurements were made evaluating...
Millennials, Digital Natives, the ‘we want it now’ Generation-Y. Many names have been used to describe the new generation of college students referring to their technological abilities, teamwork skills, speed and openness. Everyday technology and the students of this generations change brought new standards to the world of education. They move global education ‘marketplace’ and its competition to...
The social networks are used by millions of users. Depending on the social media platform, members may be able to contact any other member. In other cases, members can contact anyone they have a connection to, and subsequently anyone that contact has a connection to, and so on. Some services require members to have a preexisting connection to contact other members [1]. According to [2], the number...
This research developed the MySQL Sandbox, a secured environment for processing SQL queries. It was implemented as a RESTful web service having three services - sandbox database creation, SQL statement processing and sandbox database resetting. It supports the simultaneous processing of multiple SQL statements from multiple users in multiple databases. It uses question identification (ID) and student...
Generally for most of the countries developing border areas is very important concern. However, due to security issues, most of the countries are not interested to place important industries in border areas. Tourism development is the most suitable solution for developing boarder areas. People Republic of China and Russian Federation are among big countries in the world and their border is about 4159...
Currently, blended learning has become an innovative learning model, which can improve learners' learning effect, expand learners' learning opportunities, enhance interaction between teachers and students, and support learners' self-regulated. The key to develop an effective blended learning is to provide learning support service. The paper advocates that the blended learning mainly needs the support...
This paper presents a case study from a project in Arusha region (north Tanzania), aiming at improving access to electricity in secondary schools through the establishment of a social enterprise, in charge of promoting rural electrification by applying the “4As Framework” with an innovative way and business structure. The work highlights benefits and challenges from the field, in order to drawn some...
Previous studies investigated various issues and concerns related to Facebook, but lacks to compare between the importance of these concerns. This study contributes in filling this research gap by (i) consolidating the key issues and concerns and confirming their importance to Facebook users, (ii) examining the relative importance ranking of these issues and concerns, and (iii) answering the question...
This paper considers the efficacy of using active network technology to offload computation from small mobile devices into network node computing centers. The performance of six algorithms for use in this process is compared and conclusions are drawn.
The IoT faces several challenges including security, privacy, scalability, etc. In addition, another major challenges of IoT is the processing, storing, and analyzing the large amount of data that comes from so many different resources. On the other hand, the IoT has many applications that are extremely useful in our daily life, such as smart cars, home appliances and security, health tracking wearable...
Significant benefits, like an IT cost savings, security, customability, knowledge sharing, can be achieved through the introduction and use of Free/Libre and Open Source Software (FLOSS) in high schools. By using FLOSS, level of students' innovation, computer literacy, knowledge and creativity could be increased. That benefit could be important for developing countries as a chance for strengthen local...
Present work deals with the problem of safety of cities on the ground of integral safety system management concept. The present knowledge and experiences show that humans have only the capability to ensure the safe city at certain interval of conditions. Therefore, the city public administration needs tools for ensuring the citizens' security under the conditions that are behind this interval. The...
Massively Open Online Courses (MOOCs) provide a unique opportunity to reach out to students who would not normally be reached by alleviating the need to be physically present in the classroom. However, teaching software security coursework outside of a classroom setting can be challenging. What are the challenges when converting security material from an on-campus course to the MOOC format? The goal...
Digital Game-Based Learning (DGBL) has been tested and proved to be a viable solution for many educational challenges. This research aims to study several frameworks used to develop games for educational purposes and formulate a framework for the development of game-based learning, specifically for Strategic Studies in International Relations Department, Bina Nusantara University. Literature reviews...
Privacy-preserving data publishing is an important problem which exists in research and has become increasingly vital in recent years. We come across situations where a data owner wishes to publish data without revealing private information. A known solution to this problem is differential privacy which is a research topic that implements noise injection using the Laplace distribution and building...
This paper starts with describing some methods of teaching the history of malware and the response to adult learners visiting an online malware museum. We also discuss some of the methodologies and tools that a student can use to see live malware processes on his/her laptop while enrolled in a malware class. The paper also discusses how to learn more about the activity of the malware, methods to remove...
With the development of information technology, the Smart Laboratory is an core research topic of the modern university, which is responsible for the laboratory safety. To this problem, we focus on the human management since many safety accidents are often occurred by improper operations. This paper proposes the concept of security credit, which consists of user characteristic, behavior preference,...
This paper adopts k-means algorithm to analyze the key characteristics of low-income groups in the application information of successful applicants of the Minimum Living Standard Security System (hereinafter called MLSSS). Based on this method, six evaluation indexes (including family population, average age, the proportion of children and elders, the proportion of the ill and the disabled, average...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.