426 research outputs found

    Conceptual Model for Bomb Victims Information System (BVIS) In Iraq Using WAP Standard

    Get PDF
    Many Iraqis have died resulting from insurgent bombings, revenge killings and U.S. military intervention during the 2003 invasion. This situation led to the destabilization of the security in the country and increased the number of dead and missing, making the search for missing loved ones very complex. To find a missing person, many procedures needed to be satisfied, one of which is to search in the area of bomb explosion, in the casualties section of the hospitals and in the police stations. Moreover, the Iraqis who are killed by terrorists are published in the newspapers but they do not account for all the victims and their information are imprecise. Wireless Application Protocol (WAP) is a technology that may provide the solution to problem of looking for loved ones. WAP is characterized as easy, fast delivery of relevant information and services to mobile users. It is a secure technology allowing users to access instant information through wireless handheld devices like mobile phones, pagers, two-way radios, smart phones and communications. The goal of the present study is to develop a conceptual design model of Bomb Victims Information System (BVIS) through the use of WAP Standard to provide information regarding Iraqi bomb victims

    Application of Data Flow Model to a Wireless Application Protocol for Institutional Information System

    Get PDF
    ABSTRACT The limitation of information dissemination through files and hard copies pasted on noticeboards and the bottleneck of keeping paper documents necessitated the need for this work. Automating and digitalizing all forms of records about staff and students using current software technologies such as ASP.NET and SQL 2000 eliminates manual dissemination of information. This was achieved by capturing staff and student's biographical data through the paperbased data capturing form. This paper takes a look at how a data flow model can be applied to WAP application for Institutional Information Systems. This resulted into a data-driven mobile web application which leads to the Institutional Information System having components to capture, store, retrieve, and distribute information from the Institution's gateway and security to protect information from unauthorized access

    Development of an M-commerce security framework

    Get PDF
    Research shows how M-Commerce has managed to find its way to previously inaccessible parts of the world as a major Information and Communication Technologies (ICT) tool for development due to widespread introduction of mobile phones in remote areas. M-Commerce has offered valuable advantages: anytime, anywhere, more personal, more location-aware, more context-aware, more age aware, always online and instant connectivity. But this is not without its problems, of which security is high on the list. The security issues span the whole M-Commerce spectrum, from the top to the bottom layer of the OSI network protocol stack, from machines to humans. This research proposes a threat-mitigation modular framework to help address the security issues lurking in M-Commerce systems being used by marginalised rural community members. The research commences with a literature survey carried out to establish security aspects related to M-Commerce and to determine requirements for a security framework. The framework classifies M-Commerce security threat-vulnerability-risks into four levels: human behaviour and mobile device interaction security, mobile device security, M-Commerce access channel security, wireless network access security. This is followed by a review of the supporting structures or related frameworks that the proposed framework could leverage to address security issues on M-Commerce systems as ICT4D initiatives. The proposed security framework based on the requirements discovered is then presented. As a proof-of-concept, a case study was undertaken at the Siyakhula Living Lab at Dwesa in the Eastern Cape province of South Africa in order to validate the components of the proposed framework. Following the application of the framework in a case study, it can be argued that the proposed security framework allows for secure transacting by marginalised users using M-Commerce initiatives. The security framework is therefore useful in addressing the identified security requirements of M-Commerce in ICT4D contexts

    Research into the use of ICT and e-learning for work-based learning in the skills sector

    Get PDF
    This research has been commissioned by Becta to provide an evidence-based overview of the current use and effectiveness of work-based e-learning and its integration with more traditional learning methods. The specific objectives of the research were to: investigate the known impact of ICT and e-learning on the skills sector; and describe the ways in which ICT and e-learning can support key workforce development issues such as addressing skills gaps and achieving sustainability in training and development

    Research into the use of ICT and e-learning for work-based learning in the skills sector

    Get PDF
    The report provided an overview of the research commissioned by Becta into the use of ICT for learning by SMEs and the public sector, in the context of work-based learning (WBL). The findings were illustrated with a number of case studies and vignettes of good practice. The report was targeted at stakeholders in work-based learning (WBL)

    Electronic Payment Systems Observatory (ePSO). Newsletter Issues 9-15

    Get PDF
    Abstract not availableJRC.J-Institute for Prospective Technological Studies (Seville
    • …
    corecore