39 research outputs found

    The Application of AHP Model to Guide Decision Makers: A Case Study of E-banking Security

    Full text link
    Changes in technology have resulted in new ways for bankers to deliver their services to costumers. Electronic banking systems in various forms are the evidence of such advancement. However, information security threats also evolving along this trend. This paper proposes the application of Analytic Hierarchy Process (AHP) methodology to guide decision makers in banking industries to deal with information security policy. The model is structured according aspects of information security policy in conjunction with information security elements. We found that cultural aspect is valued on the top priority among other security aspects, while confidentiality is considered as the most important factor in terms of information security elements.Comment: 5 page

    A New Fuzzy MCDM Framework to Evaluate E-Government Security Strategy

    Full text link
    Ensuring security of e-government applications and infrastructures is crucial to maintain trust among stakeholders to store, process and exchange information over the e-government systems. Due to dynamic and continuous threats on e-government information security, policy makers need to perform evaluation on existing information security strategy as to deliver trusted e-government services. This paper presents an information security evaluation framework based on new fuzzy multi criteria decision making (MCDM) to help policy makers conduct comprehensive assessment of e-government security strategy.Comment: IEEE 4th International Conference on Application of Information and Communication Technologies AICT201

    A Novel Framework to Select Intelligent Video Streaming Scheme for Learning Software as a Service

    Get PDF
    Cloud computing offers many benefits for government, business and educational institutions as exemplified in many cases. Options to deliver video streaming contents for educational purposes over cloud computing infrastructures are highlighted in this study. In such case, parameters that affect video quality directly or indirectly must be taken into account such as bandwidth, jitter and loss of data. Currently, several intelligent schemes to improve video streaming services have been proposed by researchers through different approaches. This study aims to propose a novel framework to select appropriate intelligent video streaming schemes for efficiently delivering educational video contents for Learning Software as a Service (LSaaS)

    A Novel Framework to Select Intelligent Video Streaming Scheme for Learning Software as a Service

    Full text link
    Cloud computing offers many benefits for government, business and educational institutions as exemplified in many cases. Options to deliver video streaming contents for educational purposes over cloud computing infrastructures are highlighted in this study. In such case, parameters that affect video quality directly or indirectly must be taken into account such as bandwidth, jitter and loss of data. Currently, several intelligent schemes to improve video streaming services have been proposed by researchers through different approaches. This study aims to propose a novel framework to select appropriate intelligent video streaming schemes for efficiently delivering educational video contents for Learning Software as a Service (LSaaS)

    A Survey of RFID Authentication Protocols Based on Hash-Chain Method

    Get PDF
    Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication. Although the protocols able to provide specific solution for RFID security and privacy problems, they fail to provide integrated solution. This article is a survey to closely observe those protocols in terms of its focus and limitations.Comment: Third ICCIT 2008 International Conference on Convergence and Hybrid Information Technolog

    IMPLEMENTASI DAN PENGELOLAAN DATA KEPENDUDUKAN DESA BERBASIS WEB

    Get PDF
    IMPLEMENTASI DAN PENGELOLAAN DATA KEPENDUDUKAN DESABERBASIS WE

    PERANCANGAN GERBANG PEMBAYARAN (PAYMENT GATEWAY) UANG KULIAH TUNGGAL BERBASIS AKUN VIRTUAL

    Get PDF
    PERANCANGAN GERBANG PEMBAYARAN (PAYMENT GATEWAY) UANG KULIAH TUNGGAL BERBASIS AKUN VIRTUA
    corecore