Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This paper presents an effective framework for market monitoring, supervision and price management in developing countries using Information and Communication Technology (ICT). This research also illustrates the possible ways to handle the price hike and also derives solutions to resist unethical and ill-motivated hoarding by integrating ICT. In this paper, we have presented an overview on the application...
The strategic benefits of computer based information systems have been well documented in the literature. In the same light, researchers have also unveiled various factors that promote strategic uses of computer based information systems. Among the identified factor is information technology infrastructure flexibility (ITIF). However, previous studies focusing on the contribution of information technology...
Outsourcing the processing of sensitive data is problematic and leads the implementation of procedures and specific authorizations. In this paper we examine the implementation of the decentralization of data in the case of bank data printing and review proposed safeguards to ensure the availability, integrity and confidentiality.
Let E{inn} = {xk = 1, xi + xj = xk, xi · xj = xk : i, j, k ∈ {1, …, n}}. For a positive integer n, let f (n) denote the smallest non-negative integer b such that for each system S ⊆ En with a solution in non-negative integers x1, …, xn there exists a solution of S in non-negative integers not greater than b. We prove that if a function Γ : ℕ \ {0} → ℕ is computable, then f dominates Γ i.e. there exists...
Considering the problem of tampering or forging the operational application information of military information systems, an information-tampered approach based on Winsock2 SPI technology is proposed in this paper. According to design the communication interface of systems information transmission service. In order to realize the purpose of monitoring and capturing the transmission information, we...
CAPTCHA is an acronym of the Completely Automated Public Turing test to tell Computers and Humans Apart. CAPTCHA is a technique of testing for ensures that only those people just passing the test and not the system computer generated (bots). The development of CAPTCHA system is to providing creative and validation tests can be easily solved by humans and difficult for bots. There are four types of...
Educational institutions across the World rely heavily on IT in teaching-learning that accept the services provision and business needs. Whereas buying and preserving a huge number of devices used in educational process whether it is licensed software and/or original hardware require great investment and special skills to support them in the current financial crisis which affect the growing needs...
Address shuffling is a type of moving target defense that prevents an attacker from reliably contacting a system by periodically remapping network addresses. Although limited testing has demonstrated it to be effective, little research has been conducted to examine the theoretical limits of address shuffling. As a result, it is difficult to understand how effective shuffling is and under what circumstances...
Today's computer and network systems were not originally designed for accountability which plays a crucial role in information assurance systems. To assure accountability, each entity in the system should be held responsible for its own behaviors so that the entity is part of larger chains of the system's accountability. In this paper, we propose designs of a multiresolution flow-net scheme to achieve...
Verificator is an educational tool meant for learning syntax and semantics of the C++ programming language at the introductory programming courses. With an objective to explore quality of Verificator from students' perspective, a pilot study was carried out. Data were collected by means of an online post-use questionnaire. The analysis of collected data uncovered pros and cons of Verificator perceived...
Textual passwords were first identified as a weak point in information system's security by Morris and Thompson in 1979. They found that 86% of the passwords were weak: being too short, containing lowercase letters only, digits only or a combination of the two, being easily found in dictionaries. OBJECTIVE: Despite the importance of passwords as the first line of defense in most information systems,...
This paper is built upon prior research on enterprise knowledge sharing. Our objective is to explore the role of affect among knowledge workers on adoption of knowledge sharing tools (KST). We examine two different constructs: positive affect and negative affect and their relationships. These affective constructs will be added into TAM (Technology Adoption Model) developed by Davis. Positive affect...
Neurophysiological tools are receiving increased attention in the field of information systems and by organizations to provide new modes of interaction with computers and more insights into the minds of end-users and customers. Academics and members of private industry are leading the charge with new research streams and systems development efforts, but what do our future contributors to society think...
Understanding the factors that influence the continuance in usage of smartphones in globally distributed teams is extremely helpful because most organizations are encouraging employees to use smartphones or bring your own device for self-advancement, job promotion, job security, performance, effectiveness, productivity, and service quality. To date, to the best of our knowledge, there are no published...
Assessment is integral to any learning environment in the present era of 'Information and Computer Technology' (ICT), where numerous and different e-Learning environments are on offer. For assessment of these environments, Computer Based Testing (CBT) is the norm that now eases the path for both learning and assessment in student-centered e-Learning environments. Current implementation of CBT in Saudi...
Relationships between Unified Modeling Language (UML) diagrams are complex. The complexity leads to inconsistencies between UML diagrams easily. This paper focus on how to identify and check inconsistencies between UML diagrams. 13 consistency rules are given to identify inconsistencies between the most frequent 6 types of UML diagrams in the domain of information systems analysis and design. These...
Discretization of continuous attributes is an important preprocessing step in knowledge discovery. Most consecutive property boundaries are blurred. It is suitable for soft classification. This paper introduced the fuzzy set of continuous attribute values are transformed into fuzzy attribute values. We presents the discretization method based on fuzzy similarity clustering. The experiment shows the...
Plagiarism is one of the growing issues in academia and is always a concern in Universities and other academic institutions. The situation is becoming even worse with the availability of ample resources on the web. This paper focuses on creating an effective and fast tool for plagiarism detection for text based electronic assignments. Our plagiarism detection tool named AntiPlag is developed using...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.