The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In an ever changing business environment, in order to bring value, security risk management must keep engaged at pace with the company, by following the enterprise goals and using the same methodologies as core business units. This paper analyses how information security risk management can be automated and interlinked with the processes in a software development company, using an Agile approach with...
The storage of large amounts of network data is a challenging problem, in particular if it still needs to be actively consulted as for example in the case of network forensics. Here we propose a method to compress NetFlow data while simultaneously adding domain knowledge. Our method is based on a pattern classification scheme by considering all flows from a single source IP address simultaneously...
Protecting intellectual property and confidential customer details from network based attacks is becoming increasingly difficult in modern times due to a dramatic increase in online based attacks. For companies such as The NPD Group, protecting this confidential information is key in keeping a positive perceived image while also doing its utmost to protect vital I. P. This paper proposes an architecture...
Mobile Applications of cloud play stores have a tremendous growth nowadays. Numerous applications are available to schedule our day to day activities, checking emails, making conference calls, connect using social network and so on. As the technology grows the fraudulence of applications has also increased. Some Application developers use tricky measures to rank their applications in the top Applications...
The discussion of data communications in Internet of Things (IoT) often concentrates on technical issues: physical signals, protocols, database architectures, stream processing, cloud storage. On the higher level data interoperability and common semantics are major problems. In this paper we want to discuss the issues related to data interchange between independent, collaborating parties. We will...
APT attack has caused chaos in society since 2006. Especially, the vulnerability of the infrastructure is exposed to the outside a lot due to the development of the IT infrastructure in Korea. In addition, APT attacks targeting companies' major confidential information are increasing every year. APT attack causes negative publicity for the company and financial damage. APT is completely different...
Enterprise Resource Planning along with Business Intelligence, if implemented effectively can provide several benefits such as improved visibility, real time data access, fast interdepartmental communications etc. In paper presented, a depth studies is carried out over ERP implementation and their issues. Some of the identified issues can be categorized into Misalignment and security aspects. Misalignment...
Digital Health is concerned with improving human health by utilizing such high profile applications of wearable and implantable technology, web and email, mobile technology and social networking, and data management and analytics. The changes that these technologies could bring to our lives have been well articulated, but there is a gap between the benefits that are envisioned and the challenges to...
Reputation management plays a key role in improving brand awareness and mastering the impact of harmful events. Aware of its importance, companies invest a lot in acquiring powerful social media monitoring tools (SMM). Several SMM tools are available today in the market, they help marketers and firms' managers follow relevant insights that inform them about what people think about their brand, who...
Abstract-Role of information technology (IT) within the organization become part of the strategy for the organization in achieving competitive advantage. This is because information technology can create added value for the organization. However, appropriate management of information technology has also become a challenge for the organization in creating effective use of IT and beneficial to the organization...
Bring Your Own Device (BYOD) is a rapidly growing trend in businesses concerned with information technology. BYOD presents a unique list of security concerns for businesses implementing BYOD policies. Recent publications indicate a definite awareness of risks involved in incorporating BYOD into business, however it is still an underrated issue compared to other IT security concerns. This paper focuses...
Smart meter, the core part of smart grid system, is becoming an active field of research for its immense potential in efficient power distribution and load management. It is expected to have potential applications in Bangladesh as well. Efforts are already underway from distribution companies to introduce intelligence in the meter system. This paper proposes several smart meter assisted economic energy...
Fatal accidents continue occurring even though speed tracking system has been made mandatory in Malaysia. Most fleet management system receives time and location data from GPS module installed in every express bus through internet connection. These data are then manipulated to derive information for fleet management system including the real-time speed of the travelling bus. However the assigned personnel...
With the further development of computer and network technologies, information security requirements in semiconductor field has been elevated to a new stage. Owing to the developments of advanced (e.g., 28nm and 14nm) technologies and the applications in high confidentiality arenas, more and more semiconductor design and manufacture companies realize the needs of tighter and more systematic controls...
Retargeting advertising is a new technique applied for online marketing. In the past few years, retargeting advertising had been used in online advertisement. It explored the product information for visitors and focused advertising spending on people who are already familiar with your brand and have recently demonstrated interest. This study applies Social Marketing Theory to develop retargeting advertising...
This paper presents a remote monitoring system based on the SCADA model (Supervisory Control And Data Acquisition), specifically developed for automated production processes in a food company. The goals defined for this project were the monitoring of three production lines and six silos of raw materials, along with the indication / evaluation of three performance measures demanded by the company:...
In recent years, many companies are embracing the Hadoop MapReduce system for large-data processing with completion time constrains. However, exiting Hadoop schedulers still suffer from the reducer load imbalancing problem. In this paper, we present a novel run-time load balancing method for MapReduce. Our approach predicts the workload of each reduce task at run-time, and assigns the reduce tasks...
Cloud computing is an internet based computing, providing the on demand services through the internet such as servers, storage disk, different platforms and applications to any business level company or organization. The cloud computing services are ‘Pay based on usage’ based on the agreement between Service Provider of the Cloud and customer. Service Level Agreement(SLA) is a contract, contracted...
Land Public Transport Commission (SPAD) in Malaysia has made it mandatory that GPS tracking systems installed in every express buses since 2008 so that the speed can be monitored and recorded based on real-time. Nonetheless, the effectiveness of the system is under question when Malaysia was startled by a series of bus accidents each killed close to 10 lives while several others were seriously injured...
The solutions of security problems and crisis situations are accompanied by many specific traits. Some of them are typical for all crisis situations, some of them denote the one singular form of crisis only. One common trait of crisis situations is shortage of time and information which places high demands on managers and decision-makers. Contemporary opinions about the solution of crisis situation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.