1,658 research outputs found

    Tasks and User Performance Improvement for UUM Online Payment Using Key Stroke Level Model

    Get PDF
    Online payment is one of the components in postgraduate website in University Utara Malaysia (UUM). Not a lot of Student prefers to use this task, this research will focus a weakness points in the current payment model interface and strength points in proposed new online payment model by using Keystroke-Level Model (KLM) technique and improve weakness points in the current payment model interface. The study will be guided by a research question which was formulated as Follows. What is the efficiency problem of online payment that effect user to use the system? .How can the recommended online payment Model achieve efficiency of system and user aim? What is the user performance of current online payment Model to achieve the tasks? The population for this study will be the (undergraduate and postgraduate) students and staff in the University Utara Malaysia (UUM). The quantitative research approach was used since the researcher aimed to explore the important of (KLM) technique to enhance the current online payment model, and increases the acceptance level of the system

    Pay the midwife! The cost of delivery in nineteenth-century rural West Flanders : the case of midwife Joanna Mestdagh

    Get PDF
    This article focuses on the determinants of the economic cost of at-home childbirth in Flanders in the nineteenth century. Literature on the remuneration of medical professionals in the nineteenth century is sparse. Yet the few existing studies show that fixed rates per delivery did not exist during the nineteenth century. Before that time, pricing was influenced by factors such as the professional experience of the midwife, the distance between the residence of the midwife and the client, the social status of the client and the specific circumstances of the client’s condition. I analyse these factors with regard to home births that were assisted by a certified midwife, using the casebook of a rural Flemish midwife for the period 1831-1892

    Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud

    Get PDF
    This research paper aims at solving the gap of information related to cloud security alliance top twenty critical controls. By reviewing the controls against the major cloud providers. Most organizations are adopting cloud for their business-critical applications. To make it secure, they need to understand the security controls they have access to and how they can perform cloud audits to assure the organization is secure in the cloud environment and complaint. To counter this predicament, Information technology professionals need to review the cloud security measures in AWS, Google Cloud, Azure against CIS top 20 controls, which will help security professionals identify the right cloud vendor for their business needs. This paper provides additional information to the reader who wants to understand the role of security controls in cloud environment and how they address the cloud security risk. Cloud users, cloud architects and cloud consumers will be able to understand how various cloud providers offer tools which assist in maintain the security controls. This research paper provides the base layer information and will help future research in cloud security controls

    Networking And Security Solutions For Vanet Initial Deployment Stage

    Get PDF
    Vehicular ad hoc network (VANET) is a special case of mobile networks, where vehicles equipped with computing/communicating devices (called smart vehicles ) are the mobile wireless nodes. However, the movement pattern of these mobile wireless nodes is no more random, as in case of mobile networks, rather it is restricted to roads and streets. Vehicular networks have hybrid architecture; it is a combination of both infrastructure and infrastructure-less architectures. The direct vehicle to vehicle (V2V) communication is infrastructure-less or ad hoc in nature. Here the vehicles traveling within communication range of each other form an ad hoc network. On the other hand, the vehicle to infrastructure (V2I) communication has infrastructure architecture where vehicles connect to access points deployed along roads. These access points are known as road side units (RSUs) and vehicles communicate with other vehicles/wired nodes through these RSUs. To provide various services to vehicles, RSUs are generally connected to each other and to the Internet. The direct RSU to RSU communication is also referred as I2I communication. The success of VANET depends on the existence of pervasive roadside infrastructure and sufficient number of smart vehicles. Most VANET applications and services are based on either one or both of these requirements. A fully matured VANET will have pervasive roadside network and enough vehicle density to enable VANET applications. However, the initial deployment stage of VANET will be characterized by the lack of pervasive roadside infrastructure and low market penetration of smart vehicles. It will be economically infeasible to initially install a pervasive and fully networked iv roadside infrastructure, which could result in the failure of applications and services that depend on V2I or I2I communications. Further, low market penetration means there are insufficient number of smart vehicles to enable V2V communication, which could result in failure of services and applications that depend on V2V communications. Non-availability of pervasive connectivity to certification authorities and dynamic locations of each vehicle will make it difficult and expensive to implement security solutions that are based on some central certificate management authority. Nonavailability of pervasive connectivity will also affect the backend connectivity of vehicles to the Internet or the rest of the world. Due to economic considerations, the installation of roadside infrastructure will take a long time and will be incremental thus resulting in a heterogeneous infrastructure with non-consistent capabilities. Similarly, smart vehicles will also have varying degree of capabilities. This will result in failure of applications and services that have very strict requirements on V2I or V2V communications. We have proposed several solutions to overcome the challenges described above that will be faced during the initial deployment stage of VANET. Specifically, we have proposed: A VANET architecture that can provide services with limited number of heterogeneous roadside units and smart vehicles with varying capabilities. A backend connectivity solution that provides connectivity between the Internet and smart vehicles without requiring pervasive roadside infrastructure or large number of smart vehicles. A security architecture that does not depend on pervasive roadside infrastructure or a fully connected V2V network and fulfills all the security requirements. v Optimization solutions for placement of a limited number of RSUs within a given area to provide best possible service to smart vehicles. The optimal placement solutions cover both urban areas and highways environment

    Corporate governance, firm risk and shareholder value of dutch firms

    Get PDF

    Corporate governance, firm risk and shareholder value of dutch firms

    Get PDF

    IoTsafe, Decoupling Security from Applications for a Safer IoT

    Get PDF
    The use of robust security solutions is a must for the Internet of Things (IoT) devices and their applications: regulators in different countries are creating frameworks for certifying those devices with an acceptable security level. However, even for already certified devices, security protocols have to be updated when a breach is found or a certain version becomes obsolete. Many approaches for securing IoT applications are nowadays based on the integration of a security layer [e.g., using transport layer security, (TLS)], but this may result in difficulties when upgrading the security algorithms, as the whole application has to be updated. This fact may shorten the life of IoT devices. As a way to overcome these difficulties, this paper presents IoTsafe, a novel approach relying on secure socket shell (SSH), a feasible alternative to secure communications in IoT applications based on hypertext transfer protocol (HTTP and HTTP/2). In order to illustrate its advantages, a comparison between the traditional approach (HTTP with TLS) and our scheme (HTTP with SSH) is performed over low-power wireless personal area networks (6loWPAN) through 802.15.4 interfaces. The results show that the proposed approach not only provides a more robust and easy-To-update solution, but it also brings an improvement to the overall performance in terms of goodput and energy consumption. Core server stress tests are also presented, and the server performance is also analyzed in terms of RAM consumption and escalation strategies

    The InfoSec Handbook

    Get PDF
    Computer scienc

    Revista Economica

    Get PDF

    Finansal araçların vergilendirilmesinin İstanbul Menkul Kıymetler Borsasında işlem gören hisse senetlerinin getirilerine etkileri: IMKB-30 endeksinden kanıtlar

    Get PDF
    Türkiyede 2006 yılı finansal araçların vergilendirileme politikaları yönünden bir dönüm noktasıdır. Bu dönem itibariyle finansal piyasa işlemleri ilk kez olarak vergi mevzuatı içinde tanımlanmış ve "menkul kıymet ve diğer sermaye piyasası araçları" terimi yasa metnine dahil edilmiştir. Yeni vergilendirme politikalarının amacı vergilendirme işlemlerinin basitleştirilmesi ve yatırımcılar arasında kanunun uygulanması bakımından eşitliğin sağlanmasıdır.  Bu çalışma Türkiyede finansal piyasa araçlarının vergilendirilmesi ile ilgili düzenlemeleri analiz edip, IMKB-30 endeksinde kayıtlı hisselerin getiri ve hacim verilerini kullanarak vergilendirmenin hisse senedi piyasası üzerindeki etkilerini ampirik olarak araştırmaktadır. Ampirik çalışma için "Olay Analizi" metodu uygulanmıştır. IMKB'nin yarı güçlü formda etkinliğinin ölçülebilmesi için büyük vergisel değişikliklerin olduğu tarihlerdeki anormal getiri ve hacim verileri hesaplanmıştır.  Çalışmanın sonuçları IMKB-30 endeksinde kayıtlı hisse senetleri için çok küçük miktarda anormal fiyat hareketleri göstermektedir. Ancak, öte yandan vergi oranlarının değişiklik gösterdiği tarihten önceki ve sonraki dönemlere anormal hacim hareketleri gözlemlenmiş, bu hareketlerin istatistiki olarak anlamlı olduğu yönünde bulgular elde edilmiştir. Bu istatistik veriler hisse senedi işlemlerinin vergilendirilmesinin fiyat üzerinde oldukça düşük bir etkisinin bulunduğunu, diğer yandan hisse senedi hacmi ele alındığında vergi oranlarının değiştiği tarihlerden önce ve sonra anormal hisse hacmi gözlemlendiğini göstermektedir. Bu durum IMKB'nin yarı güçlü etkin formda bir piyasa olmadığını ortaya koymaktadır. Öte yandan, hacim yüksekken fiyatların çok fazla değişmemesi İMKB-30 hisselerinin derinliği olan bir piyasada işlem gördüğünün bir kanıtıdır. The year 2006 is a turning point on taxation of financial market transactions in Turkey. Financial market transactions were defined for the first time within the law enforcement and the terms of "security and capital market instruments" went into legislation. The purpose of the new taxation policies is to simplify the process and bring equality in implementation of law among the investors.  This study analysis the tax regulations of the financial market instruments in Turkey and try to investigate the effects of taxation on the stock market empirically by using the return and volume data of stocks listed in ISE- 30 index. We implement the "Event Study" methodology for the empirical investigation. Abnormal return and volume measurements around the major tax amendments calculated to evaluate the semi-strong form of market efficiency in ISE.  Results of the study suggest that there is very little unusual price behavior observed for the stocks listed ISE-30 index. There exists, however, strong evidence that points toward the unusual volume behavior before and after the tax rate amendments, which is statistically significant. These empirical findings prove that taxation of stock transactions plays a minor role in price formation, however when the stock volume is considered, we observe abnormal volumes before and after the tax rate amendments. Our results indicate that the ISE is not an efficient market at semi-strong form of efficiency. On the other hand, the result that high volume and big price changes are not interrelated indicates that ISE-30 stocks are traded in a "deep market"
    corecore