5 research outputs found

    The effect of web-based social networking on consultancy

    Get PDF
    Social networking has become a fact that we cannot live without even if we try. It has become a day to day activity or even yet a chore. Where we share our life experiences. We have all become its slave! Social networks bring many benefits to the user and the world at large. These advantages from an expert perspective includes sharing of information, collaboration, promote products and services, building a group community, donations etc. This paper provides a review of the Effect of Web-based Social Networking on Consultancy

    Information technology (IT) based intervention among individuals with ASD (autism spectrum disorder): A review

    Get PDF
    The aim of this article is to provide systematic analysis of studies using ICT (information and Communication Technology) tools as intervention. These tools are categorized into two categories: (a) assessment tools and (b) Intervention tools. This review gives a brief description about the technological features and the functionality related to it. The intervention tools assist in enhancing cognitive and social abilities of the individual with ASD. Here we try to identify the latest advancement by reviewing these related articles and recommend future direction of extended research work

    Measuring secure software development awareness and usage among software developers

    No full text
    Abstract: Secure software development practices adoption could be the most influential factor for the future of software industry. Awareness and knowledge about security mechanisms and secure coding techniques plays a vital role in decision to consider security during software development by the software developers. This study aims to explore the security and secure software development awareness among software developers. The results of the study related to the use of secure software development methodologies showed a very low level of adoption level by the developers. It was revealed by the respondents that 82.72% respondents have never used any secure development methodology, about 13.67% respondents were using secure software development methodology in their software development from 1 to 4 years, 2.09% respondents using secure software development methodology in their software development from more than five years and only 1.57% respondents were using secure software development methodologies in their software development from less than a year. All the respondents were well aware of the software security but only 22.51% of the respondents were aware of the latest secure software development methodologies

    A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases

    No full text
    Many approaches for modelling security requirements have been proposed,but software industry did not reach on an agreement on how to express security requirements in a system model for software architecture. The main objective of this perspective paper is to summarize the problem space of representation of security patterns are proposed in the literature to help the developers who lack expertise in security to implement it. Applications of security patterns has been hindered by the fact that they lack directions for their implementations in a specific scenario. This paper presents a techniques for using mitigation use cases for representation solution provided by security patterns. Different challenges and issues were identified related to the application of security patterns in industry

    A review of near field communication process: how do it works?

    No full text
    Living in digital era and surrounding with intelligent devices has made things easy for us, But we are still looking for ways to make the mainstay of human living easy so that it can be made without wasting time and energy. Monetary transactions are mostly done under the same conventional system in developed and developing countries. While few countries have successfully adopted new trends and development in the MP systems and with the introduction of Near Filed Communication (NFC) technology which is around for more than a decade and almost showing everywhere nowadays due to its convenience and mobility. NFC technology has paved a track for secure and fastest MP technology. In this paper the authors have discussed the type of tags, modes of operation, and usage of NFC for different purpose
    corecore