The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The number of users of computer as well as on-line international communication networks is growing increasingly and utilization of the modern communication technology has become the integral part of life at present.
Web is gigantic and being constantly update. Bangla news in web are rapidly grown in the era of information age where each news site has its own different layout and categorization for grouping news. These heterogeneity of layout and categorization can not always satisfy individual user's need. Removing these heterogeneity and classifying the news articles according to user preference is a formidable...
This paper describes the password habits of web users, particularly in Greece. A study was conducted online to ask users questions about the length of the password they use today, in how many web sites they use the same password, whether they use personal data while constructing their passwords and if they ever used as a password some of trivial words. They were also asked whether they reveal their...
In this paper we explore the feasibility of conducting software training in a peer learning context with the aid of student-produced screen casts. Three case studies were conducted to collect data. Wikispaces and Screencast-O-Matic were used during software training sessions to support peer learning in three Information Systems and Technologies (IST) courses. Screen casts were produced by students...
So far mobile network users are enjoying better protection than Internet users thanks to the SIM card, a tampered resistant module providing strong authentication. To offer better protection to Internet users this paper proposes a solution called Universal Mobile Identity, which extends the usage of the current mobile identity to the access of Internet services. For signing on from mobile phone, tablet,...
A system for protecting web resources on web site server is proposed. A few number of protection system have been developed over the past decade. However, because of the insecurity of internet, these traditional systems are quite fragile under the attacks from internet. We propose a protection system for protect the recourses on web site server by combining the hash signature algorithm and digital...
In this paper, we propose a digital watermarking method for stereoscopic video frames. A stereoscopic video frame is stored as two images and combined by software while displayed. These two stored images are with high similarity. On the other hand, a pirate can only clip half of a frame to remove watermarks. In the circumstances, it should be taken into consideration to resist collusion attacks and...
Web systems evolved in the last years starting from static websites to Web applications, up to Ajax-based Rich Internet Applications (RIAs). Reverse Engineering techniques followed the same evolution, too. The authors and many other WSE contributors proposed a lot of innovative and effective ideas providing important advances in the reverse engineering field. In this paper, we will show the historical...
In the last twenty years, the evolution of web systems has been driven along three dimensions: the processes used to develop, evolve, maintain and re-engineer the systems themselves; the end products (the pages, content and links) of such processes; and finally the people dimension, with the extraordinary shift in how developers and users shape, interact and maintain the code and content that they...
Workshops are sometimes known as effective ways to learn the human and social factors of software engineering. However, their effectiveness in learning agile development principles in particular has not yet been determined, despite the fact that numerous agile development workshops have been held over the years. In this paper, we analyze the effectiveness of agile development workshops through an...
Renewable energy applications nowadays are a critical factor to their success. Making sure that a specific information, service or product from an online provider is reliable and trustworthy may sometimes be a difficult task. The World Wide Web (WWW) is an open environment in which every person is allowed to populate some information. The accuracy or reliability of such information, to some extent,...
Personalization that uses information technology to tailor content and products/services to the preferences and tastes of individual customers has become a useful function in online relationship marketing. Many techniques have been developed, and research on personalized services has increased substantially in recent years. The objective of this research is to propose a relationship-building perspective...
Nowadays, growing and inevitable trend of globalization, increasing competition and promoting electronic commerce has changed the ways that individuals and organizations conduct their businesses. Most companies have realized the importance of e-business as they have begun to change traditional business into e-business and in this regard, are taking advantage of the benefits of using the Internet and...
Web Analytics tools were used to improve a sales website of IT services. Heuristics analyses of usability aided to evaluate the web site and to achieved the results. The technics used in the improvement process are discussed and the performance assessment results are showed in this paper.
Objective: the objectives of this article are: (a) to provide an analysis of the key factors of an efficient web strategy with regard to the issue of patient empowerment, (b) to build an index for measuring the degree of empowerment of healthcare providers' web sites, (c) to measure the degree of "patient web empowerment" within the Italian National Health Service (INHS). Methods: a Patient...
Online retailers are facing increasing competitions, thus, it is very important for them to attract and retain online customers. However, many factors can affect customer trust in online retailing (E-satisfaction) environment. This paper investigates the factors and their impacts on customer E-trust in online retail (B to C, C to C) in China. Based on the literature review and an exploratory study...
Perceived risk becomes more and more important in e-commerce when we explain the consumer's behaviors. Based on studying element and source of perceived risk that affected risk perceived during consumer's online shopping, this article firstly included conception of perceived risk in online purchasing, perceived risk types, the performances and source, and then analyzed the relationships between trust...
E-commerce transactions, in addition to the exchange of goods and services for payment, often entail an indirect transaction, where personal data are exchanged for better services or lower prices. This paper analyses buyer's and seller's privacy-related strategic choices in e-commerce transactions through game theory. We demonstrate how game theory can explain why buyers mistrust internet privacy...
In this paper, consideration is given to extending an existing on-line tutorial system in order to understand the user experience with the tutorial by including analysis of the tool use. The areas of web analytics and learning analytics will be considered and used. Reference to how web analytics tools are used and the features they provide will be made. Features of available analytics tools will be...
Reasonable and efficient use of information technology resources can serve education well and improve teaching quality. During the teaching process, it creates multiple virtual website by using internet service manager in servers through LAN access to the server of virtual web site. This can greatly improve the internet speed and meet the needs of teaching.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.