scholarly journals An Algorithm for Improvement of Email Security on Android Operating System in the Era of Industry 4.0.

Author(s):  
Isaac Moses Kisembo ◽  
Gilbert Gilibrays Ocen ◽  
Ocident Bongomin ◽  
Andrew Egwar Alunyu ◽  
Ildephonse Nibikora ◽  
...  

The world is attesting a tremendous change today which is remarkably coined as industry 4.0. Several terminologies have developed as a result of the emergency of industry 4.0, notably is cybersecurity which entails the security of communication and network operations activities either on or offline and the measures taken to achieve such security. The most common form of communication by organizations and Business today is the electronic mails (Email), although email is a valuable tool, it also creates security challenges when not properly managed. There is a growing adoption of email as official form of communication in many organizations with majority of users on mobile android devices due to the popularity of the android operating systems and the proliferation of mobile devices. Banks, health care, educational institutions and many other service providers are communicating to their clients through email where sensitive and confidential information are shared. One major threat to email communication is lack of confidentiality for emails accessed via android mobile devices due to weaknesses of android operating system (OS) platform that presents possibilities to penetrate by hackers and android email client since it accepts a onetime login and password authentication which is only required again if the email account is deleted from the android mobile device. In this study, an algorithm was designed and implemented on an android application that allows an email sender to compose an email and set the time the email will stay in the receiver inbox before it automatically wipes off. Primary data was collected from email users using tightly structured questionnaires and respondents comprised of those with email technical background and those that are typical email users inorder to get their opinion on the lack of confidentiality on the android mobile email client, while secondary data from scholarly journals and articles informed the study design. The designed algorithm was tested and evaluated through expert opinion. The result of the study indicates that the designed algorithm addresses the confidentiality issues and threats on android email clients.

2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Isaac Moses Kisembo ◽  
Gilbert Gilibrays Ocen ◽  
Ocident Bongomin ◽  
Andrew Egwar Alunyu ◽  
Ildephonse Nibikora ◽  
...  

The world is attesting a tremendous change today, which is remarkably coined as industry 4.0. With several technologies shaping industry 4.0 epoch, notably, its cybersecurity entails the security of communication and network operations activities. The most common form of communication in organisations and business today is electronic mails (email). One of the major threats to email communication is the lack of confidentiality for emails accessed via Android mobile devices due to the weaknesses of the Android operating system (OS) platform. In this study, an algorithm was designed and implemented on an Android application that allows an email sender to compose an email and set the time the email stays in the receiver inbox before it automatically wipes off. Primary data were collected from email users using tightly structured questionnaires and respondents comprised of those with email technical background and typical email users, while secondary data from scholarly journals and articles informed the study design. The designed algorithm was tested and evaluated through expert opinion. The result of the study indicates that the autowipe algorithm addresses the confidentiality issues and threats on Android email clients.


2018 ◽  
Vol 4 (1) ◽  
pp. 54-65
Author(s):  
Efmi Maiyana

Android is an Open Source operating system that gives developers the freedom to develop applications, with the advantages of android operating system, will help many android-based smartphone users to be able to enjoy various applications, one application is the Android-Based Preview Application, the main purpose of this Application is assisting Muslims in reciting the necessary prayers in daily life effectively and efficiently. The type of data used is a secondary data type in which data is obtained from reference books and literature related to this case. There are several stages in making this application, namely analysis, design, work processes, and evaluation of the program model that has been produced. This android-based prayer collection app, can be used on android-based smartphones in the least 4.1 version in this application testing can run smoothly


Unity Journal ◽  
2021 ◽  
Vol 2 ◽  
pp. 251-262
Author(s):  
Sumitra Karki

Nepal has been a home to diversified settlement in terms of ethnicity, religion, dialect and culture since its outset in civilization. It also lies between two great military and economic giants of Asia – India and China – that are hostile to each other. While these bring abundant opportunities for Nepal, it possesses several internal and external security threats. Nepal suffers from cyber-attack, environmental degradation, pandemic, ethnic, racial or religious conflicts, inequality and poverty, extremism, human trafficking, corruption, migration and trans-boundary crime. In addition, Nepal also faces several security threats, traditional and non–traditional, including terrorism and insurgency. These threats possess serious implications on peace and security of Nepal and the South Asian region. There is a need of serious study about the major internal and external security challenges that Nepal faces in recent decades. This study aims at examining some of the major security challenges, explore the factors behind it, and attempt to suggest few policy recommendations to the government of Nepal to deal with them. The study is conducted by reviewing the primary and secondary sources of data. The primary data includes documents of the government agencies, press release, joint statement and organizational reports. It also includes the interviews with security experts, bureaucrats, policy makers and academicians. Similarly, secondary data includes books, news reports, academic journals, seminars report and reports of research institutes and think tanks. The study highlights that Nepal should prepare itself to meet with the emerging internal and external security challenges what have emerged in recent times. With the rise of India and China, two adversarial powers in the region, Nepal possess extreme challenges in days to come. Similarly, hardly any countries of the world had prepared itself to deal with recent pandemic like COVID-19 that has shattered even the most powerful countries of the world. Taking lessons from these, it is time for Nepal to learn and prepare to mitigate the challenges.


2020 ◽  
Vol 10 (12) ◽  
pp. 4231
Author(s):  
Claudinei Morin da Silveira ◽  
Rafael T. de Sousa Jr ◽  
Robson de Oliveira Albuquerque ◽  
Georges D. Amvame Nze ◽  
Gildásio Antonio de Oliveira Júnior ◽  
...  

This paper proposes a new forensic analysis methodology that combines processes, techniques, and tools for physical and logical data acquisition from mobile devices. The proposed methodology allows an overview of the use of the In-System Programming (ISP) technique with the usage of Combination Firmware, aligned with specific collection and analysis processes. The carried out experiments show that the proposed methodology is convenient and practical and provides new possibilities for data acquisition on devices that run the Android Operating System with advanced protection mechanisms. The methodology is also feasible in devices compatible with the usage of Joint Test Action Group (JTAG) techniques and which use Embedded Multimedia Card (eMMC) or Embedded Multi-Chip Package (eMCP) as main memory. The techniques included in the methodology are effective on encrypted devices, in which the JTAG and Chip-Off techniques prove to be ineffective, especially on those that have an unauthorized access protection mechanism enabled, such as lock screen password, blocked bootloader, and Factory Reset Protection (FRP) active. Studies also demonstrate that data preservation and integrity are maintained, which is critical to a digital forensic process.


1970 ◽  
Vol 18 (2) ◽  
pp. 18-24 ◽  
Author(s):  
A Paudel ◽  
S Vogel

This study was carried out in Bhodkhore Community Forest Users Group in Parbat district, Nepal with the overall objective to develop a clearer understanding of the challenges for service providers while working towards improving the Community Forestry governance. The primary data were collected through personal interviews, group discussions, key informant interviews and direct observations using a series of questionnaires and check lists. Similarly, the secondary data were gathered from reports and records from Community Forestry User Group and service providers, and from relevant scientific literature. The data were analyzed using qualitative and quantitative tools. The results show that the existing challenges for service providers mainly include financial resource management, time management and inadequate technical support for forest management. Key words: Community Forestry, Governance, Service Providers, Challenges   doi: 10.3126/banko.v18i2.2169 Banko Janakari, Vol. 18, No. 2, 18-24


2021 ◽  
Vol 2 (3) ◽  
pp. 476-482
Author(s):  
Dyah Merryani ◽  
I Nyoman Putu Budiartha ◽  
I Made Minggu Widyantara

Car driving courses are tutoring related to driving skills that aim to provide knowledge of how to drive a car to course service users. Course service users are accompanied and trained by the instructor during the driving course. However, users of course services with instructors will be faced with unexpected events, which often occur, namely traffic accidents. The purpose of this research is to uncover the legal relationship that occurs between car driving course service providers and instructors and also the course service users form the responsibility of the car driving course service provider if an accident occurs during the driving course. This research is an empirical legal research with a sociological juridical approach and a statutory approach. The data collection technique was done by interview. Sources of data used in this research are primary data sources and secondary data sources. After the data was collected, it was analyzed systematically. The results of this research indicate that there is a legal relationship between the parties involved, namely the working relationship that occurs between the instructor and the driving course service provider, and the agreement from the course service user through filling out the course registration form to the driving course service provider. The occurrence of a traffic accident during the driving course practice will be accounted for by the driving course service provider as the employer and the instructor as a companion or trainer for the course service user during the driving course.


El Dinar ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 77-93
Author(s):  
Inayatillah Djakfar ◽  
Isnaliana Isnaliana ◽  
Yossie Kenanga Putri

This study aims to see the role of Bank Syariah Mandiri Kcp Ulee Kareng in developing halal tourism in the city of Banda Aceh. This study uses a qualitative method using a descriptive analysis approach. This research uses primary data and secondary data, namely by conducting interviews and centering studies and documentation which is analyzed in several stages, namely editing data, classifying, reducing, presenting data, and finally verifying. The results showed that Bank Syariah Mandiri Kcp Ulee Kareng has a role in developing halal tourism, namely in the Culinary Business Sector, Travel Service Providers and Lodging Providers. The financing provided to business actors is the financing of Micro Businesses. With the financing provided by this institution to players in the halal tourism industry, it has an impact on improving the economic welfare of the people.


2019 ◽  
Vol 23 (4) ◽  
pp. 472-483 ◽  
Author(s):  
Salvatore Garbellano ◽  
Maria do Rosário Da Veiga

Purpose This paper aims to focus on how Industry 4.0 technology transfer has been implemented by leading Italian innovative small, and medium-size companies (SMEs). Design/methodology/approach This exploratory-descriptive study uses qualitative methods for collecting primary data (interviews and ethnographic observation) and secondary data (surveys, press news and websites). Findings The paper contributes to the understanding of what building dynamic capabilities (DC) is, and to clarify pivotal roles, functions and dynamics of the entrepreneur and the executive team. Research limitations/implications The results that emerged from the present research unveil a great potential for further development. The study can be confirmed and/or extended by replicating it within other economic contexts such as the European Union allowing then comparative studies amongst regions and countries. Practical implications In Italian leading SMEs an “augmented management” emerged. The study shows that digital technologies are enriching not only “what” and “how” management performs its duties but also its role: “orchestration” – a key term in DC theory – has been enhanced by new meanings. Social implications The study points out the relevance of an inclusive approach to Industry 4.0 to leverage the collective intelligence of the company. Originality/value Implementing Industry 4.0 has required a renewal of the leadership executive team: new young executives coming from other companies and sons/daughters of the entrepreneurs have provided methodologies and commitment to foster the digital transformation.


2011 ◽  
Vol 58-60 ◽  
pp. 2027-2032 ◽  
Author(s):  
Qing Jian Wei ◽  
Jin Ning ◽  
Xi Zhong Lou ◽  
Ren Zhi Ma ◽  
Jia Xu

A mobile remote data monitoring center based on Android operating system is developed for the water environment monitoring system via wireless sensor network (WSN). The monitoring center collects the sensors data from the WSN based on C/S mode. The SQLite is adopted in database module to achieve high memory speed and efficient operation management. Dynamic graphical displays are accomplished to show the topology of the WSN, the state of the nodes and the real-time and historical water environment parameters of the sensor nodes. The experiments show that the software of water environment remote monitoring system, based on mobile devices of Android operating system, can conveniently satisfy the requirements of data collecting and monitoring for water environment monitoring system based on WSN.


2017 ◽  
Vol 9 (3) ◽  
pp. 240-262 ◽  
Author(s):  
Lay Hong Tan ◽  
Boon Cheong Chew ◽  
Syaiful Rizal Hamid

PurposeThis paper aims to provide a more holistic perspective on rationales that motivated Maybank to move toward a sustainable banking operating system. Design/methodology/approachThe case study was based on primary data collected through a series of qualitative interview with 35 bankers who were from different departments. Besides, the secondary data such as academic books and journals, government and regulatory authority’s publications, website publications, Maybank’s annual reports and Maybank’s sustainability reports were reviewed to obtain a more comprehensive understanding on rationales that motivated Maybank to move toward a sustainable banking operating system. FindingsWithin the corporation studied, the rationales for moving Maybank toward sustainable banking operating system are driven by macro-, meso- and micro-level drivers. In terms of macro-level drivers, the pressures come from the bank’s external environment. A PESTLE analysis is used to discuss the drivers for change present within the macro environment. The different national government bodies and non-government organizations are calling upon financial institutions to implement more socially and environmentally friendly lending policies. In terms of meso-level drivers, stakeholders are viewed as important driving forces for Maybank to integrate sustainability into banking operations. Internal driving forces are likely to emanate from employees, the board of directors and shareholders. External driving forces result from pressure from customers, governments, competitors, NGOs and society at large. Micro-level drivers are drivers of sustainable banking that include pressures generated from within the bank’s internal environment. Maybank is largely motivated by its mission statement and vision statement, which is articulated in their sustainable banking agenda. Research limitations/implicationsViewing the rationales that motivated Maybank to move toward a sustainable banking operating system through multiple perspectives – macro-, meso- and micro-level drivers present an interesting approach for research. Originality/valueThe rationales for moving Maybank toward a sustainable banking operating system are driven by macro-, meso- and micro-level drivers. This paper provides fresh insight into rationales that move toward the sustainable banking operating system.


Sign in / Sign up

Export Citation Format

Share Document