27 research outputs found

    ICT4ELT: A Study with Reference to Kashmir

    Get PDF
    AbstractBenefits of Information and Communication Technologies (ICT), especially the web 2.0 tools, like blogs and podcasts in English Language Teaching (ELT) classrooms have been confirmed by research conducted in the context of developed countries. Lack of infrastructure and a forward looking policy is hampering developing countries like India to reap the benefits of ICT. The present study reports the outcome of a survey conducted to find out the available ICT infrastructure and its use in colleges of one of Kashmir division of the northern state of Jammu and Kashmir of India. It further aims to highlight the benefits of using blogs and podcasts in ELT

    Drag and Drop Image CAPTCHA

    Get PDF
    The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether a user is human or robot. A Human Interaction Proof (HIP) like Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) offers a way to make such a distinction. CAPTCHA is essentially a modern implementation of Turing test, which carries out its job through a particular text based, image based or audio based challenge response system. In this paper we present a new image based CAPTCHA technique. Properties of the proposed technique offer all of the benefits of image based CAPTCHAs; grant an improved security control over the usual text based techniques and at the same time improve the user-friendliness of the Web page. Further, the paper briefly reviews various other existing CAPTCHA techniques

    A Concise Study of Web Filtering

    Get PDF
    Cybercriminals are constantly developing techniques to infect computers by embedding malicious code on innocent websites and luring victims to them. To prevent data loss in a mobile connected world, corporations are employing a variety of techniques. These include filters, anti-virus software, encryption and firewalls, access control, written policies and improved employee training. This paper conducts a concise study of web filtering vis-Ã -vis their installed positions, deployment layers, employed filter technologies and comparison between Web Filters that are in place in Canada, United Kingdom, and China

    Emerging Legal Issues of E-Commerce IT ACT 2008

    Get PDF
    Internet has unfolded a new market for businesses to explore and exploit. The enormous flexibility and speed of Internet makes it the most modern platform for businesses as well as consumers to execute business transactions. The goods and services of diverse nature are being offered to the businesses or to the consumers globally. The whole world has been converted in to the market to be available on the click of a mouse on the laptop or palmtop. To provide security and legal recognition to the transactions executed electronically, the Indian Parliament enacted the Information Technology Act, 2000 modeled on UNCITRAL\u27s Model Law, though it departs in many respects from the spirit of the Model Law. Immediately after the enactment of the IT Act, it was found that certain significant provisions are missing in this enactment; its provisions lack harmony and above all many legal issues have not been properly spelled out. The IT Act was amended in the year 2008 with four fold objectives. Interestingly, the draftsmen have admitted that the digital signatures prescribed for authentication of electronic records in the original IT Act are linked with specific technology, it has become necessary to provide for alternative technology of electronic signatures, nevertheless the original provision for digital signatures has been retained which has compounded the confusion. Furthermore, the Indian courts have not yet found any opportunity to appraise the impact of the provisions of the IT Act on substantive principles of contract formation codified in the Indian Contract Act, 1872. An analytical evaluation is therefore, needed to identify the issues raised by the information technology relating to contract formation, impact of the IT Act on the principles relating to contract formation provided in the Contract Act, and impact of non-inclusion of the principles governing e-commerce, provided in the Model Law but not reflected in the IT Act

    Emerging Legal Issues of E-Commerce

    Get PDF
    Internet has unfolded a new market for businesses to explore and exploit. The enormous flexibility and speed of Internet makes it the most modern platform for businesses as well as consumers to execute business transactions. The goods and services of diverse nature are being offered to the businesses or to the consumers globally. The whole world has been converted in to the market to be available on the click of a mouse on the laptop or palmtop. To provide security and legal recognition to the transactions executed electronically, the Indian Parliament enacted the Information Technology Act, 2000 modeled on UNCITRAL\u27s Model Law, though it departs in many respects from the spirit of the Model Law. Immediately after the enactment of the IT Act, it was found that certain significant provisions are missing in this enactment; its provisions lack harmony and above all many legal issues have not been properly spelled out. The IT Act was amended in the year 2008 with four fold objectives. Interestingly, the draftsmen have admitted that the digital signatures prescribed for authentication of electronic records in the original IT Act are linked with specific technology, it has become necessary to provide for alternative technology of electronic signatures, nevertheless the original provision for digital signatures has been retained which has compounded the confusion. Furthermore, the Indian courts have not yet found any opportunity to appraise the impact of the provisions of the IT Act on substantive principles of contract formation codified in the Indian Contract Act, 1872. An analytical evaluation is therefore, needed to identify the issues raised by the information technology relating to contract formation, impact of the IT Act on the principles relating to contract formation provided in the Contract Act, and impact of non-inclusion of the principles governing e-commerce, provided in the Model Law but not reflected in the IT Act

    System Analysis of SPAM

    Get PDF
    Increasing reliance on the electronic mail (e-mail) has attracted spammers to send more and more spam e-mails in order to maximizing their financial gains. These unwanted e-mails are not only clogging the Internet traffic but are also causing storage problems at the receiving servers. Besides these, spam e-mails also serve as a vehicle to a variety of online crimes and abuses. Although several anti-spam procedures are currently employed to distinguish spam e-mails from the legitimate e-mails yet spammers and phishes obfuscate their e-mail content to circumvent anti-spam procedures. Efficiency of anti-spam procedures to combat spam entry into the system greatly depend on their level of operation and a clear insight of various possible modes of spamming. In this paper we investigate directed graph model of Internet e-mail infrastructure and spamming modes used by spammers to inject spam into the system. The paper outlines the routes, system components, devices and protocols exploited by each spamming mode

    Web Portal for Kashmir Tourism Industry:Design Guidelines

    Get PDF
    Tourism is a dynamic and competitive industry that requires the ability to constantly adapt to customers\u27 changing needs and desires, as the customer satisfaction, safety and enjoyment are particularly the focus of tourism business. Developments in search engines, carrying capacity and speed of networks have influenced travelers around the globe to use technologies for planning and experiencing their travels. Tourism uses Internet marketing and Web portals by utilizing Information and Communication Technology (ICT) and ICT enabled services in order to gather and/or disseminate information and ease online booking and reservations. In this article an attempt has been made to identify the requirements of efficient Web portal for Kashmir Tourism Industry. This article provides a complete series of design guidelines vis-Ã -vis Web Portal strategy, structure, design, architecture, level of facilitation and features, Technologies and tools and process model for its successful implementation
    corecore