41,204 research outputs found
Recommended from our members
A method for identifying communication breakdowns in user-interfaces
Businesses are increasingly communicating with their customers via web-based interfaces. However, users are experiencing a lack of guidance and support in the communication of these often complex services. This paper proposes a method for identifying where and why there is a breakdown in communication between the interface and the user. In creating the method, the importance and value of having such a method are considered and discussed, particularly for communication rich interfaces. The method is developed based on the results from user trials with a mortgage application interface using the existing evaluation method. Although the results from piloting the method suggest that it is useful for identifying communication breakdowns within the user-interfaces, more work is required before a definitive method can be produced. As a result of this study it appears that communication breakdowns are related either to the information within an interface or to the process
Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications
Social Virtual Reality based Learning Environments (VRLEs) such as vSocial
render instructional content in a three-dimensional immersive computer
experience for training youth with learning impediments. There are limited
prior works that explored attack vulnerability in VR technology, and hence
there is a need for systematic frameworks to quantify risks corresponding to
security, privacy, and safety (SPS) threats. The SPS threats can adversely
impact the educational user experience and hinder delivery of VRLE content. In
this paper, we propose a novel risk assessment framework that utilizes attack
trees to calculate a risk score for varied VRLE threats with rate and duration
of threats as inputs. We compare the impact of a well-constructed attack tree
with an adhoc attack tree to study the trade-offs between overheads in managing
attack trees, and the cost of risk mitigation when vulnerabilities are
identified. We use a vSocial VRLE testbed in a case study to showcase the
effectiveness of our framework and demonstrate how a suitable attack tree
formalism can result in a more safer, privacy-preserving and secure VRLE
system.Comment: Tp appear in the CCNC 2019 Conferenc
A prototype mobile money implementation in Nigeria
Researchers have shown that majority of the populace in the developing nations are rural dwellers that do not have access to basic financial services and are poor. This class of people are peasant farmers and petty traders who rely mostly on remittances from their wards and relations in major cities and abroad to meet their financial obligations at home. The methods of remittances are encumbered with challenges. Mobile money is a tool that allows individuals to make financial transactions using mobile cell phones. Nigeria is one of the fastest growing telecoms nations of the world and the adoption of mobile money will help a great deal to solve the problems associated with remittances. In this paper, we present a short messages services (SMS) and unstructured supplementary service data (USSD) implementation of mobile money implementation in Nigeria modelled using Django and Python as the programming language, MySQL as the data store and Apache hypertext transfer protocol (HTTP) as the Web server. The system made comparative analysis with M-PESA implementation in Kenya: the first mobile money implantation in Africa. Furthermore, the system was tested among a selected few of the populace to evaluate the usability of the design. Findings revealed that the prototype implementation is user-friendly and can be used by all without many problems except for the illiterate populace; hence, the need to have a combined bank and agent-based implementation. This approach will help with time to reduce the number of unbanked populace, which is currently at 80%
Selection of Statistical Software for Solving Big Data Problems for Teaching
The need for analysts with expertise in big data software is becoming more apparent in 4 today’s society. Unfortunately, the demand for these analysts far exceeds the number 5 available. A potential way to combat this shortage is to identify the software sought by 6 employers and to align this with the software taught by universities. This paper will 7 examine multiple data analysis software – Excel add-ins, SPSS, SAS, Minitab, and R – and 8 it will outline the cost, training, statistical methods/tests/uses, and specific uses within 9 industry for each of these software. It will further explain implications for universities and 10 students (PDF
Technology and Service Quality in the Banking Industry: An Empirical Study of Various Factors in Electronic Banking Services
Technology-based self service has greatly changed the way that service Firms and consumers
interact and are raising a host of research and practice issues relating to the delivery of e-service which has
become increasingly important not only in determining the success or failure of electronic commerce but also
in providing consumers with a superior experience with respect to the interactive flow of information. The
purpose of this research study was to establish the relationship between technology and service quality in the
banking industry in Nigeria. The research was carried out through a cross sectional smvey design which
questioned respondents one e-banking services. The population of study mainly constituted of customers of
Oceanic bank within Lagos metropolis and its environs. The respondents of the study were customers of banks
using e-banking services (internet banking, mobile banking and AIM). The sample in this study consisted of
120 respondents who are users of thee-banking services. The data collected was analyzed by use of frequency,
percentage, means and correlation analysis. The findings revealed that secure services as the most important
dimension, followed by convenient location of AIM, efficiency (not need to wait, ability to set up accounts
so that the customer can perform transactions immediately, accurately of records, user friendly, ease of user,
complaint satisfaction, accurate transactions and operation in 24 h)
Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value. The problem of social engineering attack is that there is no single solution to eliminate it completely, since it deals largely with the human factor. This is why implementing empirical experiments is very crucial in order to study and to analyze all malicious and deceiving phishing website attack techniques and strategies. In this paper, three different kinds of phishing experiment case studies have been conducted to shed some light into social engineering attacks, such as phone phishing and phishing website attacks for designing effective countermeasures and analyzing the efficiency of performing security awareness about phishing threats. Results and reactions to our experiments show the importance of conducting phishing training awareness for all users and doubling our efforts in developing phishing prevention techniques. Results also suggest that traditional standard security phishing factor indicators are not always effective for detecting phishing websites, and alternative intelligent phishing detection approaches are needed
ERP implementation methodologies and frameworks: a literature review
Enterprise Resource Planning (ERP) implementation is a complex and vibrant process, one that involves a combination of technological and organizational interactions. Often an ERP implementation project is the single largest IT project that an organization has ever launched and requires a mutual fit of system and organization. Also the concept of an ERP implementation supporting business processes across many different departments is not a generic, rigid and uniform concept and depends on variety of factors. As a result, the issues addressing the ERP implementation process have been one of the major concerns in industry. Therefore ERP implementation receives attention from practitioners and scholars and both, business as well as academic literature is abundant and not always very conclusive or coherent. However, research on ERP systems so far has been mainly focused on diffusion, use and impact issues. Less attention has been given to the methods used during the configuration and the implementation of ERP systems, even though they are commonly used in practice, they still remain largely unexplored and undocumented in Information Systems research. So, the academic relevance of this research is the contribution to the existing body of scientific knowledge. An annotated brief literature review is done in order to evaluate the current state of the existing academic literature. The purpose is to present a systematic overview of relevant ERP implementation methodologies and frameworks as a desire for achieving a better taxonomy of ERP implementation methodologies. This paper is useful to researchers who are interested in ERP implementation methodologies and frameworks. Results will serve as an input for a classification of the existing ERP implementation methodologies and frameworks. Also, this paper aims also at the professional ERP community involved in the process of ERP implementation by promoting a better understanding of ERP implementation methodologies and frameworks, its variety and history
- …