security effectiveness
Recently Published Documents


TOTAL DOCUMENTS

56
(FIVE YEARS 18)

H-INDEX

6
(FIVE YEARS 0)

2022 ◽  
pp. 1231-1248
Author(s):  
Marouane Balmakhtar ◽  
Scott E. Mensch

This research measured determinants that influence the willingness of IT/IA professionals to recommend Big Data analytics to improve information systems security in an organization. A review of the literature as well as the works of prior researchers provided the basis for formulation of research questions. Results of this study found that security effectiveness, organizational need, and reliability play a role in the decision to recommend big data analytics to improve information security. This research has implications for both consumers and providers of big data analytics services through the identification of factors that influence IT/IA professionals. These factors aim to improve information systems security, and therefore, which service offerings are likely to meet the needs of these professionals and their organizations.


Author(s):  
Utsab Mukherjee ◽  
Shawni Dutta ◽  
Samir Kumar Bandyopadhyay

Globalization and extreme competition in the market have made the food supply chain more complex than before.  To address the complexities in the food supply chain, blockchain has become more evident than the traditional ways. Use of blockchain technologies can ensure the efficiency, transparency and reliability of the food supply chain starting from the farms to forks. This study focuses on the applicability of blockchain systems to the agriculture field and provides comparative analysis among the existing methodologies that are dedicated to uplift the security, effectiveness and reliability of blockchain based food supply chains. This research has also proposed a novel model that couples blockchain and IoT based sensor modules, which can be applicable in real-life scenarios. The proposed method essentially follows a multi-layer architecture where each layer is presented by means of a blockchain technology. Each layer is fed by the ambient conditions which may impact better quality of crops. The IoT module will ensure better farming as well as the blockchain system will ensure the quality of the end product. If the packaged food degrades in quality, the reason behind the degradation can be located by the model presented in this paper. The presented framework may reach promising efficiency in practical life but the framework implementation cost may create a burden for the investors.


Author(s):  
Mamata Rath ◽  
Sushruta Mishra

Vehicular ad hoc networks (VANETs) have evolved as an invigorating network system and application domain in current communication technology. In smart city applications context, there are smart vehicles embedded with sensors and dynamically programmed IoT devices, which are to be managed and controlled energetically. Progressively, vehicles are being furnished with surrounded actuators, handling signals, and wireless communication abilities. This chapter focuses on the fact that this special network has opened various possible outcomes for intense and potential extraordinary applications on security, effectiveness, comfort, confidentiality effort, and interest while they are significantly vibrant. Irrespective of many challenges such as high frequency of topology change and link failure possibility, routing management in VANET has been successful in traffic scenario during vehicle-to-vehicle communication.


2020 ◽  
Vol 5 (12) ◽  
pp. 76-81
Author(s):  
HyunChul Joh

Popularity and marketshare are very important index for software users and vendors since more popular systems tend to engage better user experience and environments. periodical fluctuations in the popularity and marketshare could be vital factors when we estimate the potential risk analysis in target systems. Meanwhile, software vulnerabilities, in major relational database management systems, are detected every now and then. Today, all most every organizations depend on those database systems for store and retrieve their any kinds of informations for the reasons of security, effectiveness, etc. They have to manage and evaluate the level of risks created by the software vulnerabilities so that they could avoid potential losses before the security defects damage their reputations. Here, we examine the seasonal fluctuations with respect to the view of software security risks in the four major database systems, namely MySQL, MariaDB, Oracle Database and Microsoft SQL Server.


Computers ◽  
2020 ◽  
Vol 9 (3) ◽  
pp. 66
Author(s):  
Md Arif Hassan ◽  
Zarina Shukur ◽  
Mohammad Kamrul Hasan

E-commerce implies an electronic purchasing and marketing process online by using typical Web browsers. As e-commerce is quickly developing on the planet, particularly in recent years, many areas of life are affected, particularly the improvement in how individuals regulate themselves non-financially and financially in different transactions. In electronic payment or e-commerce payment, the gateway is a major component of the structure to assure that such exchanges occur without disputes, while maintaining the common security over such systems. Most Internet payment gateways in e-commerce provide monetary information to customers using trusted third parties directly to a payment gateway. Nonetheless, it is recognized that the cloud Web server is not considered a protected entity. This article aims to develop an efficient and secure electronic payment protocol for e-commerce where consumers can immediately connect with the merchant properly. Interestingly, the proposed system does not require the customer to input his/her identity in the merchant’s website even though the customer can hide his/her identity and make a temporary identity to perform the service. It has been found that our protocol has much improved security effectiveness in terms of confidentiality, integrity, non-repudiation, anonymity availability, authentication, and authorization.


2020 ◽  
Vol 4 (8) ◽  
Author(s):  
Hendra Saragih ◽  
Yanyan M Yani

<p align="center"><strong>Abstract</strong></p><p>            This paper seeks to emphasize that ASEAN's strategic position in the Southeast Asian region, which has never used military and armed forces in resolving conflicts between members of ASEAN or outside ASEAN Members and this is ASEAN's greatest achievement in regulating peaceful interactions within the region. The development and formation of the ASEAN security posture in the form of a Security Political Community are certainly expected to play a large role in the framework of becoming the forefront of ASEAN in the effort to improve relations that have been torn apart by the conflict and to re-knit it to be more peaceful and set an example for other regions.</p><p>Keywords: Regional Security, Effectiveness, region, Conflict</p><p align="center"><strong> </strong></p><p><strong> </strong></p><p align="center"><strong>Abstrak</strong></p><p>Makalah ini berupaya menegaskan bahwa posisi strategis ASEAN di kawasan Asia Tenggara yang tidak pernah menggunakan kekuatan militer dan bersenjata dalam menyelesaikan konflik baik antar sesama anggota ASEAN ataupun di luar Anggota ASEAN dan ini merupakan prestasi terbesar ASEAN dalam mengatur interaksi damai di dalam kawasan. Pembangunan dan pembentukan postur keamanan ASEAN yang berbentuk Komunitas Politik keamanan tentunya diharapkan akan banyak berperan dalam rangka menjadi garda terdepan ASEAN dalam upaya memperbaiki relasi-relasi yang sudah tercabik akibat konflik yang pernah terjadi dan merajutnya kembali agar lebih damai dan menjadi contoh bagi kawasan lainnya.</p>Kata Kunci : Keamanan Regional,Efektifitas,kawasan,Konflik


Sign in / Sign up

Export Citation Format

Share Document