44 research outputs found
The Application of AHP Model to Guide Decision Makers: A Case Study of E-banking Security
Changes in technology have resulted in new ways for bankers to deliver their
services to costumers. Electronic banking systems in various forms are the
evidence of such advancement. However, information security threats also
evolving along this trend. This paper proposes the application of Analytic
Hierarchy Process (AHP) methodology to guide decision makers in banking
industries to deal with information security policy. The model is structured
according aspects of information security policy in conjunction with
information security elements. We found that cultural aspect is valued on the
top priority among other security aspects, while confidentiality is considered
as the most important factor in terms of information security elements.Comment: 5 page
A New Fuzzy MCDM Framework to Evaluate E-Government Security Strategy
Ensuring security of e-government applications and infrastructures is crucial
to maintain trust among stakeholders to store, process and exchange information
over the e-government systems. Due to dynamic and continuous threats on
e-government information security, policy makers need to perform evaluation on
existing information security strategy as to deliver trusted e-government
services. This paper presents an information security evaluation framework
based on new fuzzy multi criteria decision making (MCDM) to help policy makers
conduct comprehensive assessment of e-government security strategy.Comment: IEEE 4th International Conference on Application of Information and
Communication Technologies AICT201
A Novel Framework to Select Intelligent Video Streaming Scheme for Learning Software as a Service
Cloud computing offers many benefits for government, business and educational institutions as exemplified in many cases. Options to deliver video streaming contents for educational purposes over cloud computing infrastructures are highlighted in this study. In such case, parameters that affect video quality directly or indirectly must be taken into account such as bandwidth, jitter and loss of data. Currently, several intelligent schemes to improve video streaming services have been proposed by researchers through different approaches. This study aims to propose a novel framework to select appropriate intelligent video streaming schemes for efficiently delivering educational video contents for Learning Software as a Service (LSaaS)
A Novel Framework to Select Intelligent Video Streaming Scheme for Learning Software as a Service
Cloud computing offers many benefits for government, business and educational institutions as exemplified in many cases. Options to deliver video streaming contents for educational purposes over cloud computing infrastructures are highlighted in this study. In such case, parameters that affect video quality directly or indirectly must be taken into account such as bandwidth, jitter and loss of data. Currently, several intelligent schemes to improve video streaming services have been proposed by researchers through different approaches. This study aims to propose a novel framework to select appropriate intelligent video streaming schemes for efficiently delivering educational video contents for Learning Software as a Service (LSaaS)
A Survey of RFID Authentication Protocols Based on Hash-Chain Method
Security and privacy are the inherent problems in RFID communications. There
are several protocols have been proposed to overcome those problems. Hash chain
is commonly employed by the protocols to improve security and privacy for RFID
authentication. Although the protocols able to provide specific solution for
RFID security and privacy problems, they fail to provide integrated solution.
This article is a survey to closely observe those protocols in terms of its
focus and limitations.Comment: Third ICCIT 2008 International Conference on Convergence and Hybrid
Information Technolog
IMPLEMENTASI DAN PENGELOLAAN DATA KEPENDUDUKAN DESA BERBASIS WEB
IMPLEMENTASI DAN PENGELOLAAN DATA KEPENDUDUKAN DESABERBASIS WE
PERANCANGAN GERBANG PEMBAYARAN (PAYMENT GATEWAY) UANG KULIAH TUNGGAL BERBASIS AKUN VIRTUAL
PERANCANGAN GERBANG PEMBAYARAN (PAYMENT GATEWAY) UANG KULIAH TUNGGAL BERBASIS AKUN VIRTUA