1,525 research outputs found

    Tasks and User Performance Improvement for UUM Online Payment Using Key Stroke Level Model

    Get PDF
    Online payment is one of the components in postgraduate website in University Utara Malaysia (UUM). Not a lot of Student prefers to use this task, this research will focus a weakness points in the current payment model interface and strength points in proposed new online payment model by using Keystroke-Level Model (KLM) technique and improve weakness points in the current payment model interface. The study will be guided by a research question which was formulated as Follows. What is the efficiency problem of online payment that effect user to use the system? .How can the recommended online payment Model achieve efficiency of system and user aim? What is the user performance of current online payment Model to achieve the tasks? The population for this study will be the (undergraduate and postgraduate) students and staff in the University Utara Malaysia (UUM). The quantitative research approach was used since the researcher aimed to explore the important of (KLM) technique to enhance the current online payment model, and increases the acceptance level of the system

    CPA\u27s guide to getting started with nonprofit organization tax issues

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/1518/thumbnail.jp

    Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud

    Get PDF
    This research paper aims at solving the gap of information related to cloud security alliance top twenty critical controls. By reviewing the controls against the major cloud providers. Most organizations are adopting cloud for their business-critical applications. To make it secure, they need to understand the security controls they have access to and how they can perform cloud audits to assure the organization is secure in the cloud environment and complaint. To counter this predicament, Information technology professionals need to review the cloud security measures in AWS, Google Cloud, Azure against CIS top 20 controls, which will help security professionals identify the right cloud vendor for their business needs. This paper provides additional information to the reader who wants to understand the role of security controls in cloud environment and how they address the cloud security risk. Cloud users, cloud architects and cloud consumers will be able to understand how various cloud providers offer tools which assist in maintain the security controls. This research paper provides the base layer information and will help future research in cloud security controls

    IoTsafe, Decoupling Security from Applications for a Safer IoT

    Get PDF
    The use of robust security solutions is a must for the Internet of Things (IoT) devices and their applications: regulators in different countries are creating frameworks for certifying those devices with an acceptable security level. However, even for already certified devices, security protocols have to be updated when a breach is found or a certain version becomes obsolete. Many approaches for securing IoT applications are nowadays based on the integration of a security layer [e.g., using transport layer security, (TLS)], but this may result in difficulties when upgrading the security algorithms, as the whole application has to be updated. This fact may shorten the life of IoT devices. As a way to overcome these difficulties, this paper presents IoTsafe, a novel approach relying on secure socket shell (SSH), a feasible alternative to secure communications in IoT applications based on hypertext transfer protocol (HTTP and HTTP/2). In order to illustrate its advantages, a comparison between the traditional approach (HTTP with TLS) and our scheme (HTTP with SSH) is performed over low-power wireless personal area networks (6loWPAN) through 802.15.4 interfaces. The results show that the proposed approach not only provides a more robust and easy-To-update solution, but it also brings an improvement to the overall performance in terms of goodput and energy consumption. Core server stress tests are also presented, and the server performance is also analyzed in terms of RAM consumption and escalation strategies

    The InfoSec Handbook

    Get PDF
    Computer scienc

    Revista Economica

    Get PDF

    Networking And Security Solutions For Vanet Initial Deployment Stage

    Get PDF
    Vehicular ad hoc network (VANET) is a special case of mobile networks, where vehicles equipped with computing/communicating devices (called smart vehicles ) are the mobile wireless nodes. However, the movement pattern of these mobile wireless nodes is no more random, as in case of mobile networks, rather it is restricted to roads and streets. Vehicular networks have hybrid architecture; it is a combination of both infrastructure and infrastructure-less architectures. The direct vehicle to vehicle (V2V) communication is infrastructure-less or ad hoc in nature. Here the vehicles traveling within communication range of each other form an ad hoc network. On the other hand, the vehicle to infrastructure (V2I) communication has infrastructure architecture where vehicles connect to access points deployed along roads. These access points are known as road side units (RSUs) and vehicles communicate with other vehicles/wired nodes through these RSUs. To provide various services to vehicles, RSUs are generally connected to each other and to the Internet. The direct RSU to RSU communication is also referred as I2I communication. The success of VANET depends on the existence of pervasive roadside infrastructure and sufficient number of smart vehicles. Most VANET applications and services are based on either one or both of these requirements. A fully matured VANET will have pervasive roadside network and enough vehicle density to enable VANET applications. However, the initial deployment stage of VANET will be characterized by the lack of pervasive roadside infrastructure and low market penetration of smart vehicles. It will be economically infeasible to initially install a pervasive and fully networked iv roadside infrastructure, which could result in the failure of applications and services that depend on V2I or I2I communications. Further, low market penetration means there are insufficient number of smart vehicles to enable V2V communication, which could result in failure of services and applications that depend on V2V communications. Non-availability of pervasive connectivity to certification authorities and dynamic locations of each vehicle will make it difficult and expensive to implement security solutions that are based on some central certificate management authority. Nonavailability of pervasive connectivity will also affect the backend connectivity of vehicles to the Internet or the rest of the world. Due to economic considerations, the installation of roadside infrastructure will take a long time and will be incremental thus resulting in a heterogeneous infrastructure with non-consistent capabilities. Similarly, smart vehicles will also have varying degree of capabilities. This will result in failure of applications and services that have very strict requirements on V2I or V2V communications. We have proposed several solutions to overcome the challenges described above that will be faced during the initial deployment stage of VANET. Specifically, we have proposed: A VANET architecture that can provide services with limited number of heterogeneous roadside units and smart vehicles with varying capabilities. A backend connectivity solution that provides connectivity between the Internet and smart vehicles without requiring pervasive roadside infrastructure or large number of smart vehicles. A security architecture that does not depend on pervasive roadside infrastructure or a fully connected V2V network and fulfills all the security requirements. v Optimization solutions for placement of a limited number of RSUs within a given area to provide best possible service to smart vehicles. The optimal placement solutions cover both urban areas and highways environment

    Corporate governance, firm risk and shareholder value of dutch firms

    Get PDF

    Corporate governance, firm risk and shareholder value of dutch firms

    Get PDF

    Selected organizational and operational aspects of the Milan Fruit Grower\u27s Association, Tennessee

    Get PDF
    The study was made: 1) to describe briefly the situation which gave rise to the Association; 2) to describe the procedure followed in organizing the Association; 3) to appraise and evaluate the financial growth and development of the Association; and h) to suggest some possible ways of improving or strengthening the Association
    corecore