5 research outputs found

    Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment

    Get PDF
    In the 21st century and the emergence of a digital economy, knowledge and the knowledge base economy are rapidly growing. To effectively be able to understand the processes involved in the creating, managing and sharing of knowledge management in the business environment is critical to the success of an organization. This study builds on the previous research of the authors on the enablers of knowledge management by identifying the relationship between the enablers of knowledge management and the role played by information communication technologies (ICT) and ICT infrastructure in a business setting. This paper provides the findings of a survey collected from the four major Indian cities (Chennai, Coimbatore, Madurai and Villupuram) regarding their views and opinions about the enablers of knowledge management in business setting. A total of 80 organizations participated in the study with 100 participants in each city. The results show that ICT and ICT infrastructure can play a critical role in the creating, managing and sharing of knowledge in an Indian business environment

    The enablers and implementation model for mobile KMS in Australian healthcare

    Get PDF
    In this research project, the enablers in implementing mobile KMS in Australian regional healthcare will be investigated, and a validated framework and guidelines to assist healthcare in implementing mobile KMS will also be proposed with both qualitative and quantitative approaches. The outcomes for this study are expected to improve the understanding the enabling factors in implementing mobile KMS in Australian healthcare, as well as provide better guidelines for this process

    Internet and Tor Traffic Classification Using Machine Learning

    Get PDF
    Privacy has always been a concern over the internet. A new wave of privacy networks struck the world in 2002 when the TOR Project was released to the public. The core principle of TOR, popularly known as the onion routing protocol, was developed by the ā€˜United States Naval Research Laboratoryā€™ in the mid-1990s. It was further developed by ā€˜Defense Advanced Research Projects Agencyā€™. The project that started as an attempt to create a secured communication network for the U.S. Intelligence was soon released as a general anonymous network. These anonymous networks are run with the help of volunteers that serve the physical need of the network, while the software fills up the gaps using encryption algorithms. Fundamentally, the volunteers along with the encryption algorithms are the network. Once a part of such a network, the identity, and activity of a user is invisible. The users remain completely anonymous over the network if they follow a few steps and rules. As of December 2017, there are more than 3 million TOR users as per the TOR Projectā€™s website. Today, the anonymous web is used by people of all kinds. While, some just want to use it to make sure nobody could possibly spy on them, others are also using it to buy and sell things. Thus, functioning as a censorship-resistant peer-to-peer network. Through this thesis, we propose a novel approach to identifying traffic and without sacrificing the privacy of the Tor nodes or clients. We recorded traffic over our own Tor Exit and Middle nodes to train Decision Tree classifiers to identify and differentiate between different types of traffic. Our classifiers can accurately differentiate between regular internet and Tor traffic while can also be combined together for detailed classification. These classifiers can be used to selectively drop traffic on a Tor node, giving more control to the users while providing scope for censorship

    Internet anonymization technologies

    Get PDF
    Internet je nepogreŔljiv in ključni del sodobnega življenjaposamezniki ga uporabljajo za iskanje informacij, branje novic, komuniciranje, nakupovanje in uporabo storitev e-uprave. V zadnjih letih pa se je povečala tudi skrb glede anonimnosti uporabnikov na internetu, saj želijo v veliki meri preprečiti zlorabe in različna nadlegovanja. Vse to kaže na povečano potrebo po anonimizacijskih orodjih in tehnikah. Eno takŔnih je odprtokodno programsko orodje Tor, ki je trenutno najbolj priljubljeno med uporabniki in zagotavlja visoko stopnjo anonimnosti. V sklopu magistrske naloge smo izvedli anketni vpraŔalnik in ugotovili, da je anonimnost na internetu za uporabnike zelo pomembna lastnost ter da uporabljajo tehnike anonimnosti predvsem zato, da bi zaŔčitili svoje osebne podatke in povečali varnost. Zato smo izdelali vtičnik za Google Chrome, ki uporabnike med brskanjem opozarja o pomanjkljivih nastavitvah brskalnika, povezanih z njihovo zasebnostjo.The internet is indispensable and a key part of modern life, which individuals use to find information, read news, communicate, shop and use e-government services. In recent years, concerns have been raised about the anonymity of users on the internet, as they want to greatly prevent abuse and various forms of harassment of users. All this points to an increased need for anonymisation tools and techniques. One such is the open-source Tor software tool, which is currently the most popular among users and provides a high level of anonymity. As part of the master\u27s thesis, we conducted a survey questionnaire where we found that anonymity on the internet is a very important feature for users and that they use anonymity techniques, in particular to protect their personal data and increase security. To this end, we\u27ve created a Google Chrome plug-in that alerts users when browsing about the inadequate browser settings associated with their privacy
    corecore