The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Big Data refer to the analysis of significantly large collection of data that may contain user data, sensor data or machine data. An analyzed Big Data can deliver new business insights, open new markets and create competitive advantages. It consists of data sets that are of large magnitude (Volume), large collection of data which diverse representation include structured, semi structured, or unstructured...
Bring your own device or BYOD is one of the technological trends that give direct impact for organizations, because of technology information adaptation in organizations. BYOD referred to an environment in which employees use personal technology such as laptops, smartphones, tablets, and even desktop PCs — to access corporate networks, applications, and data. Furthermore, basic motivation of this...
Social networking sites have become the lifeline for communication among individuals. Social network is a graph between the actors. Actors are represented as nodes. The links between the nodes represent the relationship between the actors. Social networking sites are one form of social media technology. Social media technology provides opportunity for synchronous and asynchronous communication. Various...
Manipulating online ratings of a product, in terms of both volume and value, can substantially influence its market performance, but the profits of a particular strategy can vary across products and might not be maximized by the highest rating values.
Data security is always an important aspect of any data transmission system. With the advancement of internet, various security threats and challenges are also becoming more powerful. However, among the various security challenges in any transmission system, confidentiality, portability, and data losses are most important concern. Therefore, to solve these issues, we have proposed a lossless fixed...
Privacy and security are the main concern of any social media network sites such as Facebook, Twitter, and Linked In etc. The primary purpose of these sites is to allow people to share interests, activities, real-life connections. Lack of attention to privacy and security on social media does seem to be odds with the belief as individual responsibility. Network virtualization, media independence and...
The emergence of social media and the huge amount of data generated by them, has lead researchers to study the possibility of their exploitation in order to identify hidden knowledge. Thus, two areas are attracting more and more interest in the research community, the opinion mining and sentiment analysis. The research papers in this field are increasing rapidly. However, few survey papers have been...
Online social media such as Facebook has started transforming our lives in the past few years. One of the main user concerns in social media is the privacy of personal information. Although social media provides options to manage privacy, those user settings are often complicated, vague, and not user friendly. In this paper, we propose an automated and simple way to manage Facebook privacy by changing...
In April 2013, the Securities and Exchange Commission (SEC) provided explicit guidance to public companies regarding social media use for material disclosures. Social media use is explored in three time periods: (1) prior to public SEC scrutiny of social media, (2) after the SEC filed a formal complaint about the use of social media, and (3) after the April 2013 guidance. Regression is used to test...
Integrating sensor networks and human social networks can provide rich data for many consumer applications. Conceptual analysis offers a way to reason about real-world concepts, which can assist in discovering hidden knowledge from the fused data. Knowledge discovered from such data can be used to provide mobile users with location-based, personalized and timely recommendations. Taking a multi-tier...
Although emerging organizational knowledge systems, such as social media, are widely researched, related knowledge security risks have received less attention. Traditional information security management models tend to concentrate on the technological viewpoint to secure existing information assets. However, the use of contemporary approaches for knowledge creation and sharing offer new important...
Incidents involving data breaches are ever-present in the media since several years. In order to overcome this threat, organizations apply enterprise content-aware data leakage prevention (DLP) solutions to monitor and control data access and usage. However, this paper argues that current solutions are not able to reliably protect information assets. The analyses of data breaches reported in 2014...
Passwords for locking smart phones are usually exposed to the menace of shoulder surfing or smudge attacks. The passwords can be glanced at when being inputted since smart phones are usually used in a public space. Moreover, the whole characters of a password can be presumable, even if attacker does not look at the screen of a phone well since the arrangement of software keys is fixed and passwords...
Billions of internet users are using social web sites, to stay connected with their friends, and to discover new friends to share photos, videos, social book marks and blogs which are considered as Big Data in social networks. With the increasing exposure to cyber attacks, it is necessary to develop trust and privacy among the user to secure photos and videos, profiles etc. In this paper, importance...
The recent advancements in social media and electronic commerce have produced a new business model called social commerce. This new business model has facilitated online business transactions via social media. Despite the advancement of technology, the issue of online trust has increased in social commerce. The purpose of this paper is to identify the factors that influence online trust in social...
In the modern market, e-commerce is absolutely essential in business marketing and advertising. Many studies have been conducted to explore the relations between players and companies by creating the trust within security and culture. Various models have been proposed to show the reliability of trust that in a successful e-commerce website. In this paper, we have built a new framework to aggregate...
Serving public transportation needs is crucial issues in every country, especially for air transport which transport is convenient, speediness, comfortable, and reliable traffics. The purpose of research creates an evaluation model for services innovation impact to customer satisfaction and customer value enhancement in airport. The research objective examines which factors influence to customer satisfaction,...
The Real-time Transport Protocol (RTP) supports a range of video conferencing, telephony, and streaming video applications, but offers few native security features. We discuss the problem of securing RTP, considering the range of applications. We outline why this makes RTP a difficult protocol to secure, and describe the approach we have recently proposed in the IETF to provide security for RTP applications...
Through the use of awareness, safety awareness, for the new generation of migrant workers network leisure awareness, sense of self-control, learning consciousness, management consciousness, moral consciousness, and data analysis, can understand the development status of the Internet era Cenozoic migrant workers awareness of the network, and put forward some countermeasures to promote the migrant workers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.