The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Documents such as the Geneva (1949) and Hague Conventions (1899 and 1907) that have clearly outlined the rules of engagement for warfare find themselves challenged by the presence of a new arena: cyber. Considering the potential nature of these offenses, operations taking place in the realm of cyber cannot simply be generalized as “cyber-warfare,” as they may also be acts of cyber-espionage, cyber-terrorism,...
Cyberloafing, defined as non-work-related Internet use during work hours, has brought about considerable loss of both employees' performance and organization's profits all over the world. Accordingly, more and more researchers have tried to explore the predictors of cyberloafing. While most researchers pay attention to some organization conditions or personal emotions, we suppose some personal characteristics...
Small-and Medium-Sized Audit Practices (SMP) in Poland face many challenges nowadays which are related to the legislation framework, public demands on quality of services, expectation of customers regarding low prices, competitors and impact of new technologies on accounting, financial reporting and auditing. Polish SMP are on the way to prepare their activities in order to meet regulations of ISA...
An advance in technology unlocks new opportunities for organizations to increase their productivity, efficiency and process automation while reducing the cost of doing business as well. The emergence of cloud computing addresses these prospects through the provision of agile systems that are scalable, flexible and reliable as well as cost effective. Cloud computing has made hosting and deployment...
A central information repository is a place for collecting data from various sources to satisfy the various data needs of users with various roles. Therefore, the usage policy for the central information repository is an important matter that organizations have to consider, in order to ensure that each user role uses data according to the specified policy. This research presents an approach to privacy-aware...
Cloud technologies are increasingly important for IT department for allowing them to concentrate on strategy as opposed to maintaining data centers; the biggest advantages of the cloud is the ability to share computing resources between multiple providers, especially hybrid clouds, in overcoming infrastructure limitations. User identity federation is considered as the second major risk in the cloud,...
In the Cloud manufacturing environment, there are a huge number of cloud services, which are dynamic and changeful. The management of cloud services is very difficult. The paper presents a hypergraph clustering-based method to manage cloud manufacturing services. The clustering-based Cloud Manufacturing Service Management Model is presented, which contains three layers: manufacturing resources, cloud...
This paper reports results from a set of experiments that evaluate an insider threat detection prototype on its ability to detect scenarios that have not previously been seen or contemplated by the developers of the system. We show the ability to detect a large variety of insider threat scenario instances imbedded in real data with no prior knowledge of what scenarios are present or when they occur...
Organizations often suffer harm from individuals who bear no malice against them but whose actions unintentionally expose the organizations to risk-the unintentional insider threat (UIT). In this paper we examine UIT cases that derive from social engineering exploits. We report on our efforts to collect and analyze data from UIT social engineering incidents to identify possible behavioral and technical...
Understanding complex situations is difficult. Intelligence analysis has long been the work of teams including subject matter specialists. Today collaborative analysis takes place in the context of “big data”, where information comes from a variety of human, communications, and sensor sources. Understanding the big picture is both about how analysts interact and combine their insights together and...
The organization of classes and assessment system on the Personal Computer Applications (PCA) course, in the professional study of electrical engineering at the Polytechnic of Zagreb, is based on the Moodle system. Moodle is widely used open source application designed for e-learning. This system enables students to prepare for lectures and exercises, while emphasis is placed on their independent...
The aim of this paper is to show that an accurate and efficient text classifier for relatively simple problem domains can be created in only a few hours of development time. The motivating example discussed in the paper is a recent HackerRank competition problem that tasked competitors with creating a classifier for questions from the popular question and answer platform StackExchange. The paper describes...
A repository is an institutional-scale collection, which feeds off individuals' document collections. Repositories provide interfaces for users to deposit items, and this involves uploading the document and filling-in the metadata. These interfaces have been criticised for requiring time and effort on the part of the user, especially with the filling-in of the metadata. This paper presents a repository...
Currently, the amount of data is huge. Not only is the quantity of data growing in size, it is also becoming much more diverse and complex, significantly complicating the issues around its creation. It is increasingly important to improve and maintain infrastructure services for a long time. Therefore, this study uses an automated approach in which digital policies and strategies are represented as...
The Communities vary from country to country. There are civil societies and rural communities, which also differ in terms of geography climate and economy. This shows that the use of social networks vary from region to region depending on the demographics of the communities. So, in this paper, we researched the most important problems of the Social Network, as well as the risk which is based on the...
Promoting inclusion of underrepresented groups in computing and technology fields remains a critical issue in computing education. Gender, ethnicity, and socioeconomic background are all key factors that limit access to technology and have lasting impacts on students and their career choices. This paper reports a new effort to broaden participation in computing, focused on recruitment and retention,...
Big data is data that exceeds the processing capacity of traditional database systems. The data is too voluminous, moves too fast, or is impossible to be managed by the structures of existing database architectures. Hence there must be an alternative way to process these data. This paper outlines the fundamental aspects of Big Data along with its opportunities and challenges. The paper builds on some...
The Indian Education sector has seen a tremendous rise in higher education since last decades. In modern era of education, IT plays a key role to gain success to the educational set up. But effective knowledge management is an important entity to ensure that academics are able to develop the educational potential in fullest.
In current scenario, wired and wireless networks are widely used in educational organizations to meet the various needs of education institutions. New types of security threats and vulnerabilities are increasing day by day, making wired and wireless networks insecure and unreliable. In this case study paper, a survey of different types of security threats and security mechanisms in educational environment...
We propose a technique of automatic classification of DRDO tender documents into predefined technological categories. The dataset comprised of 698 tender files obtained from DRDO website. The dataset was processed and fed into Weka toolkit. Experiments were conducted using Naïve Bayes classifier with 10 folds cross validation. The documents were classified with 75.21 percent accuracy by technology...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.