4 research outputs found

    The conceptual design of Malaysia geopostcode and its implementation issues

    Get PDF
    The study of Malaysia Geopostcode structure has been done by Wan Mohamad Nazmeen et al. (2015) and Nur Baizura (2015). Their study area covered the states of Johor Bahru (Othman et al. , 2015), Kuala Lumpur and Selangor (Napiah, 2015). They proposed the structure to be in eight alphanumerical characters. The structure by Wan Mohamad Nazmeen et al. (2015), Nur Baizura (2015) and this study was named as Geopostcode V1, Geopostcode V2 (Napiah, 2015) and Geopostcode V3 respectively. Geopostcode V1, Geopostcode V2 and the potential Geopostcode V3 structure being presented to the stakeholders in order to collect their perceptions on these Malaysia Geopostcode structures. Geopostcode V3 was designed by considering the administrative boundaries for every state in Malaysia and enhanced according to the input from the interviews with the stakeholders. The issues in Malaysia Geopostcode implementation have also been discussed. The structure of Geopostcode V3 has been shortened to seven characters. On top of that, the implementation issues are ranked in order to determine the biggest issues in Malaysia Geopostcode Implementation. The methodology of interviewing the stakeholders, analysing and designing the Malaysia Geopostcode are presented in this report. The final product from this study is the enhanced Malaysia Geopostcode structure which look suitable to be used for every states in Malaysia and the biggest issues in Malaysia Geopostcode implementation

    Behavioral authentication for security and safety

    Get PDF
    The issues of both system security and safety can be dissected integrally from the perspective of behavioral appropriateness. That is, a system that is secure or safe can be judged by whether the behavior of certain agent(s) is appropriate or not. Specifically, a so-called appropriate behavior involves the right agent performing the right actions at the right time under certain conditions. Then, according to different levels of appropriateness and degrees of custodies, behavioral authentication can be graded into three levels, i.e., the authentication of behavioral Identity, Conformity, and Benignity. In a broad sense, for the security and safety issue, behavioral authentication is not only an innovative and promising method due to its inherent advantages but also a critical and fundamental problem due to the ubiquity of behavior generation and the necessity of behavior regulation in any system. By this classification, this review provides a comprehensive examination of the background and preliminaries of behavioral authentication. It further summarizes existing research based on their respective focus areas and characteristics. The challenges confronted by current behavioral authentication methods are analyzed, and potential research directions are discussed to promote the diversified and integrated development of behavioral authentication
    corecore