The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, many countries have used e-government to provide high quality services to their citizens. Thus, a number of studies have investigated user acceptance of e-government through the use of adoption models, such as the Unified Theory of Acceptance and Use of Technology (UTAUT) model. However, these models do not focus sufficiently on security. In order to develop a more security-focused...
In traditional online examination environments, physical interaction is often replaced with authentication mechanisms. The absence of face-to-face interaction increases the number of authentication challenges. The authors developed and implemented a Profile Based Authentication Framework (PBAF) with the aim to integrate learning and examination processes for secure online examinations. The PBAF approach...
Distributed data stream processing has been gaining increasing research attention in recent years. Data continuity and massiveness has made it is critical and challenging to design a scalable and efficient dissemination system. Thus, a system that enables changes in database to copy or duplicate from one physical location or system to another (typically from a master to a slave system) is pertinent...
XML databases are widely used in many different areas. They are multi user systems and can store a huge amount of data. Sensitive and important data need to be protected and stored securely. We have developed a dynamic trust based access control for XML databases to improve the security level and prevent malicious transactions from both internal and external users. Our system tracks user history of...
Through the use of awareness, safety awareness, for the new generation of migrant workers network leisure awareness, sense of self-control, learning consciousness, management consciousness, moral consciousness, and data analysis, can understand the development status of the Internet era Cenozoic migrant workers awareness of the network, and put forward some countermeasures to promote the migrant workers...
This paper is addressing the challenges of incorporating networking and security concepts into effective teaching and learning platform (PLab) that highlights real-world technical issues. PLab is an innovative portable learning platform that allows network applications to be safely tested. The isolated network without the need for a server promotes learning at anytime and anywhere. The strong connection...
Recently, research for Future Internet has been proposed and carried out in order to address two kinds of issues. First, the existing Internet protocol does not use new identifiers, and secondly the Internet protocol should be improved to meet usage requirements. Internet Protocol version 6 (IPv6) has been applied to fix the second issue. IPv6 has almost infinite address space. In addition, it has...
Network Security Checking is a process of scanning the network and assessing it for finding the vulnerabilities out of the network. Network scanning is done to find out live hosts and their open ports on the network. A single tool used for security checking process cant give reliable results. We proposed a framework in this project with multiple tools for network scanning as well as for vulnerability...
O2O E-commerce is booming. The consumer trust is important to the development of O2O, so this paper studies the related factors of consumer trust degree of O2O in four dimensions, including customer factor, vendor factor, website platform factor and transaction environment factor. We set up a comprehensive evaluation method based on Analytical Hierarchy Process and the fuzzy analysis. Empirical analysis...
Attainment of a degree is a key predictor of success in the workforce. In the United States, twenty percent (20%) of high school students drop-out before graduation. Individuals who lack workforce readiness skills face a lifetime of lost income, benefits, and job opportunities. The National Educational Technology Plan (NETP), put forth by the United States Department of Education, calls for a reinvention...
IPv6 has been developed to deal with the increase in number of hosts in the Internet. IPv6 address can be assigned to any network devices. IPv6 provides new function called SLAAC (Stateless Address Auto Configuration). SLAAC is a significant feature for host itself generating and configuring own addresses to enable communication. But this feature has drawbacks in term of security and management of...
The advent of the Internet has provided people around the world with access to information and services from across the globe that is published without any mediation by governments or other agencies. However, access to this information and services may be restricted within the viewer's own country by their Government, Internet Service Providers, employers and families among others. The motivations...
Based on a dual approach, which incorporated both a literature survey as well as a direct experiment without the preamble to support any hypothesis, the objectives of the research was to determine the likeliness of a SNS users from two different parts of South Africa to accept a friend request from a totally unknown and fictitious user. The results seem to point to a general willingness to accept...
Constrained Application Protocol (CoAP) has been developed as an alternative to the HyperText Transfer protocol (HTTP) to connect resource-limited devices to the Web. In addition to technical advantages, the success of Internet protocols depends also on their economic feasibility for the stakeholders involved in protocol deployment. Therefore, this paper studies the techno-economic feasibility of...
DHCP starvation attack is one of problems that has occured over the network communication. A number of researches have been proposed to solve this problem. However, traditional solutions had some limitation which can lead to denial of service to legitimate users. This paper proposed the solution for detecting the abnormal DHCPREQUEST originated by malicious users in a period of time in order to prevent...
The aim of this research is to examine whether or not an attacker could guess hand drawn images chosen as graphical password by others, based on knowledge of some cultural information like where they are come from or their religion or even their hopes and aims. Also, the aim was therefore to ascertain at what level the cross-cultural influences might affect our choice and use of drawn images as password...
The Communities vary from country to country. There are civil societies and rural communities, which also differ in terms of geography climate and economy. This shows that the use of social networks vary from region to region depending on the demographics of the communities. So, in this paper, we researched the most important problems of the Social Network, as well as the risk which is based on the...
The forthcoming internet of things—an intelligent collaboration of resource-limited devices such as wireless sensor nodes that are embedded in the daily lives of users—poses new challenges to security and end-user privacy. One of the most challenging problems is the thwarting of replica attacks. Once a sensor node is physically captured, it can be reprogrammed and replicated into a large number of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.