79 research outputs found

    Improving Public Administration Performance through Electronic Government Applications

    Get PDF
    Electronic Government applications have been the focus of hundreds of local and national government administrations all over the world during the past decade. The emphasis of most of these applications lies in their effort to improve the experience of the user in interacting with public administration services and to minimise waiting times in completing transactions public services and citizens. Early applications were relying mainly on the speed and simplicity of submitting a request by the user while most of the work beyond the web based interaction was carried out as in the era before the introduction of the web based applications. The benefits from such endeavours have been short lived as citizens are looking for real enhancements in they way public administration serves their needs and responds to their requests. The authors argue that for e-government applications to succeed changes would have to be effected in the way public administration organizes itself and how it utilizes information management systems to respond to user / citizen requirements including and addressing the goals of all stakeholders involved. Currently the number of successful applications to that end is quite low when compared to the projects implemented so far. The authors propose steps that would maintain the focus of future implementations in doing so

    The Behaviour and Perceptions of On-Line Consumers: Risk, Risk Perception and Trust

    Get PDF
    The growth and the expansion of the Internet and the World Wide Web continue to impact society in new and amazing ways. The role of economic commerce has not been as dynamic as some predicted, but has still demonstrated remarkable success and tremendous potential. Any failure to meet some of the expectations may be explained in large part by questions and concerns surrounding existing methods of electronic commerce and of the Internet. A key negative perception centres on the security involved in Internet practice and electronic payment systems. Negative perceptions are then compounded and reinforced by massive media exposure of Internet security incidents. Many consumers still lack the necessary trust in on-line merchants and Internet security procedures and continue to use the Web to simply browse. The types of attack individuals face include confidence-trick or actual encounters calculated to extract bank or personal details, computer spyware that opens on accessing the Internet, enticing users with offers of non-existent free gifts while copying confidential files, and programmes that can infiltrate networks, operating within them undetected, ultimately causing them to crash. Social Engineering is one such method used by an attacker to get information. There are two main categories under which all social engineering attempts could be classified, computer or technology-based deception and human based deception. The technology-based approach is to deceive the user into believing that is interacting with the ‘real’ computer system (such as popup window, informing the user that the computer application has had a problem) and get the user to provide confidential information. The human approach is done through deception, by taking advantage of the victim’s ignorance, and the natural human inclination to be helpful and liked. One of the most effective technology-based approach is a scam, called “phishing” as a form of identity theft. This is a technique used to gain personal information for the purposes of identity theft, using fraudulent e-mail messages that appear to come from legitimate businesses. These authentic-looking messages are designed to fool recipients into divulging personal data such as account numbers and passwords, credit card numbers and Social Security numbers. This paper provides an overview of electronic commerce and the impact of risk and trust on on-line shopping consumer behaviour. Due to the growth and potential of on-line shopping and the lack of academic-based research on Internet-related consumer behaviour, there is a tremendous need for impartial, academic investigation into the behaviour and perceptions of on-line consumers

    A personalized adaptive e-learning approach based on semantic web technology

    Get PDF
    Recent developments in semantic web technologies heightened the need for online adaptive learning environment. Adaptive learning is an important research topic in the field of web-based systems as there are no fixed learning paths which are appropriate for all learners. However, most studies in this field have only focused on learning styles and habits of learners. Far too little attention has been paid on understanding the ability of learners. Therefore, it is becoming increasingly difficult to ignore adaptation in the field of e-learning systems. Many researchers are adopting semantic web technologies to find new ways for designing adaptive learning systems based on describing knowledge using ontological models. Ontologies have the potential to design content and learner models required to create adaptive e-learning systems based on various characteristics of learners. The aim of this paper is to present an ontology-based approach to develop adaptive e-learning system based on the design of semantic content, learner and domain models to tailor the teaching process for individual learner’s needs. The proposed new adaptive e-learning has the ability to support personalization based on learner’s ability, learning style, preferences and levels of knowledge. In our approach the ontological user profile is updated based on achieved learner’s abilities

    Examination of Cyber-criminal Behaviour

    Get PDF
    Cybercrime is the world’s biggest growth industry and is now costing an estimated €180 billion loss to organisations and individuals, every year. The creation of ‘virtual identities’ gives a greater anonymity to the activities of organised criminals. Today our commonwealth is protected by firewalls rather than firepower. This is an issue of global importance as new technology has provided a world of opportunity for criminals. As a consequence law enforcement agencies all over the world are struggling to cope. Therefore, today’s top priority is to use computer technology to fight computer crime

    Evaluation of tools for protection of interest against hacking and cracking

    Get PDF
    The internet considered a tool that effectively ensures communication globally has been hindered by hackers and crackers continuously. In so doing, a multitude of network facilitated tools such as firewalls, virtual private networks (VPN) and a variety of antivirus software packages has been enabled for dealing with such predicaments. However, more often than not these facilitated tools are marketed as perfect solutions to the ever culminating problems such as loss of data and privacy in networked and world wide intercommunications. We provide a forum for addressing these perceived problems in this paper

    Vulnerability considerations for power line communication's supervisory control and data acquisition

    Get PDF
    Due to the increasing importance of communication networking, the power line (PL) channel has been considered as a good candidate for the communication medium. Power line communications (PLC) term stands for the technologies for the data communication over the electrical power supply network. The PL channels were not designed to transmit high speed data; therefore, they exhibit hostile medium for communication signal transmission. There are many factors such as noises, attenuation, distance, etc. affecting the quality of the transmission over PL channels. This paper presents PL model in the first sections of the work. Then it covers the security assessment of the PL system in the supervisory control and data acquisition (SCADA) context
    • 

    corecore