The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Owning a SOC is an important status symbol for many organizations. Although the concept of a 'SOC' can be considered a hype, only a few of them are actually effective in counteracting cybercrime and IT abuse. A literature review reveals that there is no standard framework available and no clear scope or vision on SOCs. In most of the papers, specific implementations are described, although often with...
3D die-stacking is a promising technique to address the well-known memory wall problem. As semiconductor processing technology scales down, data reliability become one of the most significant challenges to overcome to build robust memory system. Traditionally, the data reliability in memory has been achieved by employing effective data protection mechanisms such as a physical interleaving. When DRAMs...
Information security awareness is important among users because it can influence user's behavior towards complying with organization information security policies. Therefore, the current study was conducted to examine information security awareness factors affecting user's compliance behavior towards Health Information System (HIS) security policies based on extended Health Belief Model. The questionnaires...
This qualitative case study aims to describe and model the academicians Knowledge Sharing (KS) acknowledgement motivation (include monetary such as research grants, get promotion, gain award and non-monetary such as praise, image enhancement and letter of appreciation) in a largest Malaysian public university. A single case study was conducted with the aim to gather deeper insights on the acknowledgement...
Knowledge Management System (KMS) aims to improve the quality of human resources within an organization by improving communication between all parts of the organization and enhance the acquisition of knowledge with knowledge transfer. The application of KMS with a web-based system is expected to be the solution of knowledge transfer requirements that are not hindered by the limitations of time and...
This study aims to implement knowledge management system of teaching materials to improve the competence of teachers Mts Se-DKI Jakarta. The ability of teachers is urgent need improved Mts. Government and other related parties are required to how to improve the ability or competence of the teachers Mts spread in Jakarta. Improving the quality of teacher Mts through conventional training activities...
Although valuable crime information is available in human-readable form in online newspapers and electronic archives, software systems that can extract and present relevant information are limited and are of significant interest to researchers in the field of information extraction. This work aims to extract available drug crime information from online newspaper articles. This work has the following...
Software agents are known to assist humans in handling many complex systems. Currently, there are consciousness among researchers in software agents to continuously find ways to instill human traits in software agents' behaviors. Sincere behavior is one of the many noble human behaviors that one could consider to be adapted in software agents. Research show that sincerity culture within organizational...
This paper presents one of the approaches to improve quality of communication technology service using different techniques available today in the contest of Six Sigma and five steps of its cycle. In the scenario given in this paper telecommunication operator in its wide service portfolio is gathering a lot of information that is available through the reporting, but facing issue of defining areas...
This paper outlines the design of an authentication infrastructure for linking distributed heterogeneous cloud systems managed by different cloud management middleware to enable them to interoperate as an integrated inter-cloud system. This authentication infrastructure achieves single sign-on (SSO), which allows users to log in once and access the various cloud systems without being asked to log...
Outsourcing software development projects continues to be a very difficult task for many organizations. They struggle with the questions they should ask in the 'Request for Proposal (RFP)' phase. These organizations wish to find the questions that enable them to compare the bidding suppliers in an objective, yet meaningful way and they wish to select the right supplier based on this comparison. In...
ICT Projects have a bad reputation: they often exceed budget or change scope. It holds especially when writing new software is involved, however, writing mobile apps, joint & distributed software development across organizations, integration of new services, sizing maintenance or ICT portfolio projects is also affected. Project management is needed but without proper estimation methods and...
It's our great pleasure and honour to welcome you to the 2014 International Conference on Advanced Technologies for Communications co-organized by the IEEE Communications Society, together with the Radio-Electronics Association of Vietnam and Posts & Telecommunications Institute of Technology of Vietnam. Started in 2008, the conference has made a great tour across Vietnam, for better promoting...
Facing complex systems, i∗ needs mechanism of managing complexity and granularity. This paper proposes a holonic architecture to address this weakness of i∗. Our solution is based on the business unit, business services and business goal as basic granules that encapsulates the intentional units, intentions, goals of the organization. The architecture is based on three conceptual levels which are the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.