2,011 research outputs found

    Blockchain-based Decentralized Distribution Management in E-Journals

    Get PDF
    The application of blockchain in the context of E-Journal distribution to journalists is aimed at making the management paper adequately distributed and not misused. The security system in the distribution or management paper process of an open journal system is currently considered to be very lacking because one can duplicate the journal in an open journal system easily. Furthermore, it can be transferred to anyone who is not responsible. The security system in the distribution of an open journal system and the management of the management paper process is currently considered to be very lacking because one can duplicate the journal in an open journal system easily. Furthermore, it can be transferred to anyone who is not responsible. With the implementation of this blockchain technology, there are 3 (three) benefits, namely (1) The distribution of E-Journal in the Open Journal System is more targeted, and there are no errors. (2) The reputation of the Open Journal System becomes better with a sense of trust. This research will be implemented in an E-Journal in an Open Journal System using blockchain technology. (3) The management paper processing in the open journal system runs according to the procedure so that in the management process the distribution of soft copies and hard copies of the journal is protected from hacker threats, and this blockchain is used to guarantee its security

    Virtual pedagogical model: development scenarios

    Get PDF
    info:eu-repo/semantics/publishedVersio

    ValuED: A Blockchain-based Trading Platform to EncourageStudent Engagement in Higher Education

    Get PDF
    The provision of higher education has been changing ever more quickly in the UK and worldwide, as a result of technological, economic, and geopolitical factors. The Covid-19 pandemic has accelerated such changes. The “student experience”—the interaction of students with their institution and with each other—has been changing accordingly, with less face-to-face contact. In this work, we have explored a way to improve student engagement in higher education. We describe “ValuED”, a blockchain-based trading platform using a cryptocurrency. It allows students both to buy and sell goods and services within their university community and to be rewarded for academic engagement. ValuED involves a reputation system to further incentivise participants. We describe the implementation and piloting of this platform and draw conclusions for its future use. The platform’s source code is publicly available

    Secure Cloud SDN Educational Management with Internet + Learning Management System

    Get PDF
    The education management model refers to the system and processes that colleges and universities use to manage and oversee their academic programs and operations. However, with the advent of digital technologies, there has been a growing trend towards the Internet+ college education management model, which integrates digital technologies into all aspects of college education management. This model includes the use of online learning platforms and tools, such as learning management systems (LMS), to deliver courses and manage student progress. It also includes the use of digital technologies for administrative tasks such as admissions, enrolment, and financial aid. However, the educational management model is subjected to the challenge of security for educational data management. Hence, this paper constructed a secure framework model of the Ethereum SDN Cloud Architecture (ESDNarc). The ESDNarc model uses the Software-defined Network (SDN) for the decentralized management of the network, secure transactions, and improved efficiency. The ESDNarch model incorporates the SDN with the cryptography scheme the secure the data. The constructed model uses the double-hashing Elliptical Curve Cryptography (DHECC) for the data stored in the Ethereum blockchain. The performance of the constructed model is evaluated with the KDD data set. Simulation analysis stated that ESDNarch significantly increases the data security in the cloud model for the attacks in the network

    Digitalization Online Exam Cards in the Era of Disruption 5.0 using the DevOps Method

    Get PDF
    In the current 5.0 era, almost all documents are digitally packaged, and the university needs to adapt to ever-evolving technology. For students, the test card is essential as proof of the contest to carry out the final exam. However, in practice, some University Student Exam Card sheets still adopt the traditional nature of queues. This will cause problems if the exam card can be lost or damaged. Digitalization can disruption the world of education, especially Exam Cards that are digital and systematically stored on the website page. SiS + is a Student iLearning Services that can make it easier for Raharja University students to access all their lecture needs by digitizing them. The YII Framework-based SiS + website's development uses the DevOps method to get online exam cards because applicable regulations fulfill student attendance. This research is expected to transform the student management system efficiency, reduce queues, and implement physical distancing during a pandemic

    Application of Blockchain Technology at Sekolah Islam Terpadu Al-Madinah

    Get PDF
    Abstract: The purpose of this study is to discuss Blockchain Technology and the application of Sisko at the Al-Madinah Integrated Islamic School, where the students’ cognitive development varies from 4 years to 17 years old. This article uses the library research method which refers to 19 articles downloaded from Google Scholar and Crossref. Blockchain technology is a system that limits its users according to its boundaries but can still be connected with other users. One of the systems for implementing Blockchain Technology at the Sekolah Islam Terpadu Al-Madinah is Sisko SIT Al-Madinah, which contains a database about education from Kindergarten to High School within the Al-Madinah Integrated Islamic School. The menu in the Sisko system is different for each user, for example students use Sisko for exams and assignments, teachers use Sisko to input grades and savings, principals and vice principals use Sisko to manage curriculum, add and edit student data, map students into classes, and finally the Sisko admin uses it to add and edit report formats, map user accounts and archive school databases. Sisko is highly recommended for schools that want to be more effective and efficient in managing data, finances, learning outcomes and in archiving all of their data because schools must be ready to shift into school digitalization in this era

    The political imaginaries of blockchain projects: discerning the expressions of an emerging ecosystem

    Get PDF
    There is a wealth of information, hype around, and research into blockchain’s ‘disruptive’ and ‘transformative’ potential concerning every industry. However, there is an absence of scholarly attention given to identifying and analyzing the political premises and consequences of blockchain projects. Through digital ethnography and participatory action research, this article shows how blockchain experiments personify ‘prefigurative politics’ by design: they embody the politics and power structures which they want to enable in society. By showing how these prefigurative embodiments are informed and determined by the underlying political imaginaries, the article proposes a basic typology of blockchain projects. Furthermore, it outlines a frame to question, cluster, and analyze the expressions of political imaginaries intrinsic to the design and operationalization of blockchain projects on three analytic levels: users, intermediaries, and institutions.</p

    HANDLING WORK FROM HOME SECURITY ISSUES IN SALESFORCE

    Get PDF
    Security is a vital component when it is identified with an endeavor record or our genuine materials. To protect our home or valuable things like gold, cash we use bank storage administrations or underground secret storage spaces at home. Similarly, IT enterprises put tremendous measure of capital in expanding security to its business and the archives. Associations use cryptography procedures to get their information utilizing progressed encryption calculations like SHA-256, SHA-512, RSA-1024, RSA-2048 pieces’ key encryption and Elliptic Curve Cryptography (ECC) calculations. These industry standard calculations are difficult to break. For instance, to break RSA-2048-piece encryption key, an old-style PC needs around 300 trillion years. As indicated by the continuous examination, a quantum PC can break it in 10seconds, yet such a quantum PC doesn\u27t yet exist. Despite the fact that these cryptographic calculations guarantee an awesome degree of safety, there will be dependably a space for breaking the security. Programmers will attempt new techniques to break the security. Thus, the association likewise should continue to utilize new strategies to build the level and nature of the security. Now it is time to check how the security aspect is taken care of when the IT employees are at work from home. The 2020 year has made many professionals work from home because of the Covid-19 pandemic. The Covid-19 has transformed almost all organizations to work from home, this has become standard advice, and technology plays an important role during work from home to monitor the employee works and provide security when the work is being carried away from their respective organization. Employees\u27 information security awareness will become one of the most important parts of safeguarding against nefarious information security practices during this work from home. Most of the workers like the expediency of work from home and the flexibility provided for the employees. But in this situation, workers need guarantees that their privacy is secured when using company laptops and phones. Cyber security plays an important role in maintaining a secured environment when working from home. This work focusses on managing the security break attack in the course of work from home. The focus of the study is on dealing with security breaches that occur when salespeople operate from home. The problem of security isn\u27t new. Security issues existed prior to the lockdown or pandemic, but because the staff was working from the office at the time, the system administrator was available to address them. However, how can an employee\u27s laptop and account be secured when working from home? MFH\u27s salesforce has leveraged a variety of innovative technologies to address security concerns during their tenure. Because the IT behemoth Salesforce has made it possible for all employees, including freshly hired ones, to seek WFH on a permanent basis. To address the security breach difficulties faced by employees, the organization used a number of new approaches, including tracking working hours, raising password difficulty, employing VPN (virtual private network), mandating video during meetings, continuously checking right to use control, and MFA (multi-factor authentication). Improvement of existing multi-factor authentication (MFA) is the focused topic discussed in the thesis. To add an additional step of protection to the login process Blockchain technology is proposed and to identify the employee identification a hybrid recognition model is proposed using face and fingerprint recognition. This leads to the employee going through multiple processes to authenticate his or her identity in numerous ways in order to access the business laptop. This procedure entails connecting his or her laptop to his or her mobile phone or email account. Keywords: MFA, WFH, Cyber Security, Encryption, Decryption
    corecore