7 research outputs found

    Biometric Security for Cell Phones

    Get PDF
    Cell phones are already prime targets for theft. The increasing functionality of cell phones is making them even more attractive. With the increase of cell phone functionality including personal digital assistance, banking, e-commerce, remote work, internet access and entertainment, more and more confidential data is stored on these devices. What is protecting this confidential data stored on cell phones? Studies have shown that even though most of the cell phone users are aware of the PIN security feature more than 50% of them are not using it either because of the lack of confidence in it or because of the inconvenience. A large majority of those users believes that an alternative approach to security would be a good idea.biometrics, security, fingerprint, face recognition, cell phones

    Mobile Learning Applications Audit

    Get PDF
    While mobile learning (m-learning) applications have proven their value in educational activities, there is a need to measure their reliability, accessibility and further more their trustworthiness. Mobile devices are far more vulnerable then classic computers and present inconvenient interfaces due to their size, hardware limitations and their mobile connectivity. Mobile learning applications should be audited to determine if they should be trusted or not, while multimedia contents like automatic speech recognition (ASR) can improve their accessibility. This article will start with a brief introduction on m-learning applications, then it will present the audit process for m-learning applications, it will iterate their specific security threats, it will define the ASR process, and it will elaborate how ASR can enhance accessibility of these types of applications.IT Audit, Software Testing, Penetration Testing, Mobile Applications, Multimedia, Automatic Speech Recognition

    Mobile Learning Applications Audit

    Get PDF
    While mobile learning (m-learning) applications have proven their value in educational activities, there is a need to measure their reliability, accessibility and further more their trustworthiness. Mobile devices are far more vulnerable then classic computers and present inconvenient interfaces due to their size, hardware limitations and their mobile connectivity. Mobile learning applications should be audited to determine if they should be trusted or not, while multimedia contents like automatic speech recognition (ASR) can improve their accessibility. This article will start with a brief introduction on m-learning applications, then it will present the audit process for m-learning applications, it will iterate their specific security threats, it will define the ASR process, and it will elaborate how ASR can enhance accessibility of these types of applications

    Online Services Management Support for an Intelligent Locality

    No full text
    As the number of habitants of large cities is expanding, put greater pressure on city infrastructure delivering vital services, such as health, education, public safety and transport. These efforts are added to changing public demands for better information, better education, environmental programs, a more open government, lower maintenance costs and other housing options for older people. Therefore, to achieve these goals, it must take into account the quality of all services, but especially the quality of online services based on the use of modern information and communication technologies. The management of service quality on-line offers a performance evaluation and comparative analysis of indicators. He also works as a decision support to improve the quality of online services and increasing customer satisfaction, essential elements in an intelligent city

    Online Services Management Support for an Intelligent Locality

    No full text
    As the number of habitants of large cities is expanding, put greater pressure on city infrastructure delivering vital services, such as health, education, public safety and transport. These efforts are added to changing public demands for better information, better education, environmental programs, a more open government, lower maintenance costs and other housing options for older people. Therefore, to achieve these goals, it must take into account the quality of all services, but especially the quality of online services based on the use of modern information and communication technologies. The management of service quality on-line offers a performance evaluation and comparative analysis of indicators. He also works as a decision support to improve the quality of online services and increasing customer satisfaction, essential elements in an intelligent city.intelligent locality; online services; Internet; virtual networks; quality management.

    Distributed Parallel Architecture for "Big Data"

    No full text
    This paper is an extension to the "Distributed Parallel Architecture for Storing and Processing Large Datasets" paper presented at the WSEAS SEPADS’12 conference in Cambridge. In its original version the paper went over the benefits of using a distributed parallel architecture to store and process large datasets. This paper analyzes the problem of storing, processing and retrieving meaningful insight from petabytes of data. It provides a survey on current distributed and parallel data processing technologies and, based on them, will propose an architecture that can be used to solve the analyzed problem. In this version there is more emphasis put on distributed files systems and the ETL processes involved in a distributed environment

    Consumer Rights in Digital Economy. Case Study of Romanian e-commerce Usage

    No full text
    Current economy or digital economy is driven by modern information and new technologies, which offer to organizations or to the public access to almost any type of information, regardless of its form of existence, storage type or geographical location. These tools encourage the development of new activities, services and products. All developed countries have issued and implemented government policies supporting: the evolution and the adoption of new technology, the national information infrastructure consolidation, the training and the attraction of new technology experts, the adult education, and the cooperation with the private sector to encourage investment in this new economic branch, and promoting government projects to demonstrate the benefits for the current society services. This work aims to highlight the pattern of trade activities using the convenience of the Internet – e-commerce, with emphasis on legal regulations in regard to currently available services. Also the present study summarizes existing legislation, for electronic commerce, at national and international level. A case study was performed to highlight the current state of Romanian e-commerce activity, regarding the applicability of existing legislation, the frequency of electronic commerce usage, the usefulness of the service and the selection of the most frequently purchased products online. The research emphasizes on the existing legislation, its applicability and the degree in which the users are informed about it
    corecore