13 research outputs found

    Survey of Protections from Buffer-Overflow Attacks

    Get PDF
    Buffer-overflow attacks began two decades ago and persist today. Over that time, many solutions to provide protection from buffer-overflow attacks have been proposed by a number of researchers. They all aim to either prevent or protect against buffer-overflow attacks. As defenses improved, attacks adapted and became more sophisticated. Given the maturity of field and the fact that some solutions now exist that can prevent most buffer-overflow attacks, we believe it is time to survey these schemes and examine their critical issues. As part of this survey, we have grouped approaches into three board categories to provide a basis for understanding buffer-overflow protection schemes

    Teachers’ Perception for Integrating Educational Robots and Use as Teaching Assistants in Thai Primary Schools

    Get PDF
    This study focused on teachers’ perception for integrating educational robots into learning and the feedback of teachers and students who used an education robot prototype as a part of learning. Data were collected from 510 primary school teachers who were used in a confirmatory analysis of factor model. Confirmatory Factor Analysis (CFA) indicated a good fit with a six-factor model in the observed data, which could be presented through six dimensions of robotic education quality, including social interaction, cognitive function, teaching method, learner characteristics, main features, and content. The prototype-testing phase was carried out using 5th grade students at a primary school in Thailand. The robot was tested for 10 hours, which included 20 students participating in the focus group. The research results showed that integrating the six dimensions of robotic education into the educational robot prototype resulted in a strong positive improvement in the focus groups learners’ behavior and supported the instructors during the learning process. In contrast, some teachers lacked experience and confidence with robots integrated with LMS, which caused challenging obstacles in teaching. The results were achieved when integrating the six-factor model into education robots to improve student learning. Future researchers should expand their studies to look into the opportunities and challenges that teachers and school administrators face in the classroom. Doi: 10.28991/esj-2021-SP1-09 Full Text: PD

    An Innovative Mobile Application for Wellness Tourism Destination Competitiveness Assessment: The Research and Development Approach

    Get PDF
    Objectives: This research developed and evaluated the effectiveness of an innovative mobile application for wellness tourism destination competitiveness and also studied the adoption effectiveness of this application. Methods/Analysis: A mixed-methods research and development approach was applied to construct a wellness tourism destination competitiveness evaluation model for qualitative research using in-depth interviews, followed by quantitative research using a questionnaire. Weighted scores of criteria and indicators for wellness tourism destination competitiveness were evaluated by the DEMATEL method. The cut-off points for classifying the competitiveness level were set by K-means cluster analysis, while the internal and external accuracy of the model were validated by the confusion matrix technique and the Kruskal-Wallis test. The innovative mobile application was developed using a linear waterfall conceptual design consisting of five software development phases: requirement, design, implementation, verification, and maintenance. A questionnaire was also used to assess the adoption and commercialization of the innovative mobile application. Findings: Results showed that 1) the model gave high accuracy with the confusion matrix technique at 85.42% and the Kruskal-Wallis test classified destination competitiveness at a significance level of 0.0001; and 2) the level of adoption of the innovative mobile application was high. Target users were interested in purchasing a license as the commercial mode of the program. Novelty/Improvement:This research provides a tool to assess the overall competitiveness of wellness tourism destinations. Results can be used to support decision-making and provide practical suggestions for wellness tourism cluster users to adapt when conducting their own competitiveness assessment. The competitiveness assessment results were accurate and in line with the research objectives. Doi: 10.28991/HIJ-2023-04-03-010 Full Text: PD

    A FRAMEWORK FOR ASSESSING WELLNESS TOURISM DESTINATION COMPETITIVENESS: A PERSPECTIVE FROM THE WELLNESS TOURISM CLUSTERS IN THAILAND

    Get PDF
    This article aims to identify the variables that determine wellness tourism destination competitiveness using a case study in Thailand. This study outlines a suggested competitiveness framework for wellness tourism destinations based on the viewpoint of wellness tourism clusters. The study’s model illustrates the different categories and components and their relationship to competitiveness. Thirteen in-depth qualitative interviews were conducted with leading experts in wellness tourism. Thematic and content analysis was used to examine the interview data using the Nvivo 12 programme. The study identified seven emerging themes that encompass factors that affect a wellness tourism destination’s competitiveness. These factors include the destination’s environment, the area’s policy and strategy to facilitate travelling and wellness tourism, infrastructure and capability to support wellness tourism, human-made resources and culture of wellness tourism, strategy and structure for healthcare services, potential for developing innovation and cooperation to build collaborative strengths and proactive marketing. The participants’ descriptions show the existence of a comprehensive framework for assessing the competitiveness of wellness tourism destinations in the Thai wellness tourism market. The concept elucidates the dynamic complexity of wellness tourism destination competition, which is believed to guarantee success for both individual stakeholders and society

    Secure Bit: Transparent, Hardware Buffer-Overflow Protection

    No full text

    Survey of Protections from Buffer-Overflow Attacks

    No full text

    Designing model for calculating the amount of cyber risk insurance

    No full text
    In the last few years, rising sophistication and impact of cyberattacks has led companies to reassessment of their approach to risk management. Many of them admitted that they are not able to successfully prevent these attacks and they tried to find other ways to mitigate the risk. One of the possible solutions can be a cybersecurity insurance that enables companies to transfer the risk connected with a security breach to an insurance company. Basic problem is then how the cost of insurance should be calculated and how to assess the level of client's IT security controls and related risk. Unlike traditional insurance that derives the premium from target value and statistical models, the cyber insurance should take into account other factors. In this article, authors propose scoring model for cyber insurance that is based on the results of internal and external audits and compliance with mandatory and voluntary standards. © 2017 IEEE.TBU IGA project: Design methodology for determination of prices also of the information system organization in terms of cyber risks [IGA/FAI/2017/008
    corecore