The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This study was based on the validated Users' Information Security Awareness Questionnaire (UISAQ). Authors gathered information on risky behavior and security awareness among 355 pupils from three secondary schools: General program secondary school (Gymnasium), Business and administrative high school and Trade school. Aim of the study was to test adapted version of UISAQ questionnaire on secondary...
Honeypots and honeynets are unconventional security tools for the purpose of studying techniques, methods, tools, and goals of attackers. Analysis of data collected by these security tools is important for network security. In this paper, we focus on information about the locations, shapes of geographic features and the relationships between them, usually stored as coordinates and topology (spatial...
It is known that, for teenagers, internet addiction ratio is proportional to smartphone addiction. It means that, for same school age group, the higher internet addiction ratio is, the higher smartphone addiction ratio is. The research purpose of this paper is to investigate correlation of internet addiction and smartphone addiction of teenagers. For this purpose, extensive internet addiction survey...
The purpose of this study is to investigate correlation of internet addiction and school age. For this purpose, extensive and national survey works of NIA(National Information Society Agency of Korea) are analyzed. Based on thorough statistical analysis, it is concluded that there is a meaningful correlation between internet addiction and school age.
It is known that man is more immersed in internet use than woman. Actually, internet addiction ratio of man is higher than internet addiction ratio of woman. The research purpose of this paper is to investigate correlation of internet addiction and gender. For this purpose, extensive and national survey works of NIA(National Information Society Agency of Korea) are gathered and analyzed. Based on...
The prevalent use of computer applications and communication technologies has rising the numbers of network intrusion attempts. These malicious attempts including hacking, botnets and works are pushing organization networks to a risky atmosphere where the intruder tries to compromise the confidentiality, integrity and availability of resources. In order to detect these malicious activities, Intrusion...
High schools have rapidly adapted computers in their administration, management and academy. School management uses papers and computers as tools to store the administrative and management data. However computers are not used to analyze data and output information. Therefore, e-School Management System (e-SMS) is developed to facilitate teaching and administration staffs to manage school activities...
With the rapid development of information technology, search engine optimization (SEO) technology has attracted more and more attentions. In order to improve their website visit quantity, SEO techniques can make a better ranking in the search result using the keyword selection and deployment, high quality back links, rational website constitution, and rich content, etc. This paper discusses in detail...
The advances in information and communication technologies have changed the way the governments interact with their citizens. The development of the internet and its vast capabilities played a vital role in this change. According the UN report 2010, the UN e-Government development index of the world rated United Arab Emirates in 49 which comes late 17 places than 2008 ranking. During 2008 the UAE...
Egypt is investing in e-services as a driver for socio-economic development. Designing e-services that are conducive to novice users is central to their proliferation. This paper presents a study of novice user perception of e-services, based on a questionnaire derived from the e-Qual e-service quality dimensions, in an Egyptian government organization. Its main contribution is to show the difference...
Simulation modeling of computer networks is an effective technique for evaluating the performance of network and data transfer with various internet protocols. In this paper we are focusing on the impact of used transport layer protocol transferred with new internet protocol (IPv6) against network performance, especially network router load and efficiency. Higher values of load or worse efficiency...
As most of current researches on mobile services are focused on population living in urban areas, there is a lack of studies on users in rural areas. Unlike the fast and widespread adoption of mobile services in urban areas in China, adoption in rural areas is relatively slow. Compared to urban users, rural population's perception and use habits on mobile services have different features. This paper...
In order to improve the quality of teaching and learning, teachers and researchers today have created the Web-based teaching (WBET) environment to facilitate L2 learners to master L2 better. Web-based English teaching and learning in China has been developing very fast. And this paper deals with the study of Second Language Acquisition (SLA) and WEBT, and the problem of how to facilitate SLA theories...
In this paper, we study some geographic aspects of the Internet. We base our analysis on a large set of geolocated IP hop-level session data (including about 300, 000 backbone routers, 130 million end hosts, and one billion sessions) that we synthesized from a variety of different input sources such as US census data, computer usage statistics, Internet market share data, IP geolocation data sets,...
Nowadays, worms and other outside threats in the network recognized to be a serious and unexpected behavior. The main issue was addressed based on the behavioral patterns of worms that reflect application communications typical of worms. This representation of worm's behavior differs from those used in contemporary enterprise postures, which reliance on a particular type of signature-based intrusion...
In rapidly changing knowledge society, teachers should study continuously to use ICT (Information and Communication Technology) in education. It is expected from today's teachers to use ICT innovatively and also to be tool builders, not just tool users. In this article are presented the research results of survey conducted in Osjecko-baranjska county dealing with factors influencing the innovative...
We conducted a quasi-experiment through an online survey to investigate the effects of information security knowledge on users' adoption of security technologies. We found that knowledge can affect adoption decision in multiple ways. On the one hand, knowledge tends to increase a user's self-efficacy in using the technology, which in turn increases the perceived usefulness of the technology, consistent...
This study tries to use the theory of relationship marketing on the banking industry. Based on TAM and commitment -trust model, research and analysis the key factors of online bank brand choice intention. In addition, the study tries to find out the relationship between the user's knowledge and choice when environment changes to online bank. Moreover, the study aims to explore and summarize various...
Based on the artificial neural networks and grey correlation analyze, this paper presents a model forecasting the infection rate of computer viruses according to the number of vulnerabilities, the percentage of viruses infecting via web browsing and downloading and the percentage of viruses infecting via portable storage media. The prediction is realized precisely by MATLAB. The three factors are...
The Internet has become the main information resource, but the retrieval capacity of traditional search engines is poorly text-based or single-modal. In this paper, based on the category structure and conjunction reference analysis of the cross-media objects and their primary features, we intent to solve the problem of the heterogeneous and incompatibility among various categories of media features,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.