Статьи журнала - International Journal of Information Engineering and Electronic Business

Все статьи: 642

Role of m-Banking for Indian Rural Consumers, its Adaptation Strategies, and Challenges: Consumer Behavior Analysis

Role of m-Banking for Indian Rural Consumers, its Adaptation Strategies, and Challenges: Consumer Behavior Analysis

Shyam R. Sihare

Статья научная

An information technology is a part of modern society for completion of their daily schedule with sophisticated accuracy, effectiveness, efficiency and maintaining transparency. However, modern technology penetration into root level in modern Indian society is not in an appreciable in particular of rural India. Among different applications of wireless communication means a significant application is m-banking. Mobile banking mainly concerned the things of a transaction as well as financial services. In this paper, we discuss adaptation strategies and make an analysis of rural consumer behavior about mobile banking. Similarly, we discuss different mobile banking facilities and upcoming facilities which should be utilized by rural Indian people to connect rest of the world with efficiently. With that, we have a study, which factor play significant roles in rural India for deep penetration of mobile banking. As well as, study about his behavior and make an analysis of rural consumers for adaptation of beneficial technology and services to come out from a root and play at tip position in modern society. It is evident in recent time that mobile devices or handheld devices like PDA (Personal Digital Assistance) application are widespread due to its cost, ease of use, efficiency, and effectiveness. But optimum penetration exhibit inhibits by social misconception such as security and not maintain transparency before, during and after transactions.

Бесплатно

Roles of E–content for E–business: analysis

Roles of E–content for E–business: analysis

Shyam R. Sihare

Статья научная

E–content marketing is an emerging strategy in a marketing arena to shift the paradigm from traditional marketing to digital marketing. Digital marketing is an appropriate alternative to collaborate with a traditional marketing for enhance marketing strategies to reach globally. In India used the different kind of marketing strategies, however, in recent times, marketers focus on a digital marketing keeping view of its effectiveness and efficiency. Furthermore, a marketer needs to develop such strategies which should be consumer oriented. The digital marketing should be based on consumer interest and their product requirements. In this research paper, we discuss digital marketing with a perspective of consumer interest and requirements. After analysis of the digital marketing, we found that it is a robust medium to reach as globally within a fraction of the second.

Бесплатно

Sales Management Application at Widya Collection Store Web-based

Sales Management Application at Widya Collection Store Web-based

Vilianty Rafida, Ita Arfyanti, Irfan Hidayat

Статья научная

Widya Collection Store is a business that provides sports clothing, as well as one of the producers in the Samarinda area. Sales management is still not optimal because it still uses paper notes and is still being written which makes it easy for errors to occur in writing prices, quantities of goods and total prices so that it takes a long time to process transactions, both from payment in full or receivables. In addition, managing stock of goods is also more difficult because it is not recorded in the database. Therefore, a Sales Management application was made at the Web-Based Widya Collection Store to process item data, sales transactions, make complete notes and reports and make the transaction process faster. The long-term goal to be achieved is that the stock management process has been recorded in order to know the stock that must be ordered from the supplier. In addition, to simplify and expedite activities in searching for sales transaction data if one day it is needed. In this study, the method used to build a Sales Management Application at a Web-Based Widya Collection Store is the System Development Life Cycle (SDLC) development stage which consists of needs analysis, system design, and implementation.

Бесплатно

Scheme of Global Scrum Management Software

Scheme of Global Scrum Management Software

M. Rizwan Jameel Qureshi, Isaac Sayid

Статья научная

Many software development companies faced the challenge of coupling agile models and global software development in distributed projects. The challenges are related to the communication, management and control of the development process. These challenges emerged because global development involves developers from different geographical locations, time zones and with different cultures. Coupling agile models and global software development seems impossible at first glance, as they require frequent communications, rapid development, and resources management of distributed teams. However, researchers proposed several solutions and advices included tailoring of agile practices and addition of non-agile practices. Nevertheless, further efforts were needed to activate and unify these solutions. This paper introduces a new web based project management system for Scrum projects called global scrum management. It is a web application that manages Scrum process from planning phase to delivery of the last product increment. Moreover, the application features social networks functionalities to provide seamless communication, collaboration and knowledge transferring to the distributed team members. Also, developers' actions to the sprint tasks, including updating task status, will be reflected to the burn down charts of the sprint and product backlog instantly. Several diagrams are provided in this paper to explain the solution including UML diagrams.

Бесплатно

Scientific and Methodological bases of Complex Assessment of Threats and Damage to Information Systems of the Digital Economy

Scientific and Methodological bases of Complex Assessment of Threats and Damage to Information Systems of the Digital Economy

Alovsat Garaja Aliyev, Roza Ordukhan Shahverdiyeva

Статья научная

The article examines the scientific and methodological basis of a comprehensive assessment of threats and damage to information systems of the digital economy. The information infrastructure and tasks of the digital economy have been defined. Sources of information security in the digital economy sectors and their information security requirements have been studied. The results of the analysis of the situation in the countries of the world on the Global Cyber security Index are shown schematically. The graph of the dynamics of cybersecurity expenditures in the ICT segments is shown. It is argued that cybersecurity, which is formed and developed through the use of digital systems, is a priority. Many goals and methods of cyber-attacks are given on the platform of the 4.0 Industrial revolution. Cases of information security violations in the digital economy and the processes of assessing the damage caused by them have been studied. Generalized criteria for assessing information damage in the digital economy have been proposed. Threats to information and communication systems and classification of damage are given. A structural scheme of the conceptual model of threats and damage to information systems and resources in the field of digital economy of Azerbaijan has been proposed. An expert description of the ways in which information threats are disseminated has been developed using a fuzzy approach. The main types of damage caused by threats to the security of information systems are given. The security aspects of the abundance and surplus of information in the digital economy are shown. The directions of increasing the level of security and confidence in the digital economy and the structures to ensure its security are given. The main directions of information security in the digital economy have been identified, the directions of ensuring its security and increasing its confidence have been identified. Commonly used universal base technologies have been proposed in the digital economy sectors. Some methodological approaches to integrated risk and damage assessment in the digital economy have been explored. A scientific-methodological approach based on fuzzy methods has been proposed for the implementation of complex risk and damage assessment in the digital economy. Purpose of the research. The main purpose of the research in the article was to develop a scientific and methodological bases for identifying and comprehensively assessing the scope of possible threats, dangers and damage to information systems that make up the infrastructure of the digital economy in its formation conditions. Attention was paid to the development of recommendations on promising areas for improving multi-criteria expert assessment methods in increasing the effectiveness of management of threats and damage to information systems of the digital economy and the assessment of their performance. By applying the results of multi-criteria expert assessments in decision-making processes it has been possible to get results. Attempts have been made to classify threats and damages in information systems and resources in the sphere of digital economy and to develop a conceptual model of their impact. The spread of information threats using a fuzzy approach has been described by expert methods. Defining the main directions of information security in the digital economy, defining the directions of ensuring security and increasing confidence, using universal basic technologies to ensure security in the digital economy sectors are also included in the research goals. One of the goals was to propose the main stages of an approach based on fuzzy methods for the implementation of integrated risk and damage assessment issues in the digital economy. Research methods used. Research methods such as system analysis, correlation and regression analysis, mathematical and econometric modeling methods, expert assessment method, measurement theory, algorithmization, ICT tools and technologies have been used in the development of scientific and methodological bases of complex assessment of threats and damage to information systems of digital economy.

Бесплатно

Scrum Practices and Global Software Development

Scrum Practices and Global Software Development

Areej Sewalh AL_Zaidi, M. Rizwan Jameel Qureshi

Статья научная

Global software development (GSD) is one of the emerging areas of software engineering. Stakeholders are distributed located that brings into several challenges to coordinate and collaborate effectively. Scrum is one the widely practiced agile methodologies. Majority of the software development companies showed a great interest from last few years to apply Scrum methodology in distributed development to solve the coordination and communication problems. Although Scrum contains good features and strengths but still there are improvement possibilities to solve the problems of coordination and collaboration in GSD. Majority of software development companies face the problems of coordination and communication in GSD projects. This paper proposes a novel solution to mitigate the coordination and communication challenges of GSD projects. The survey is used as a research methodology to evaluate the proposed solution. The proposed solution is supported by 62.24%. We anticipate that the proposed solution will help the software development companies to mitigate the coordination and communication challenges of GSD projects.

Бесплатно

Secure Communication using Symmetric and Asymmetric Cryptographic Techniques

Secure Communication using Symmetric and Asymmetric Cryptographic Techniques

Omar M.Barukab, Asif Irshad Khan, Mahaboob Sharief Shaik , MV Ramana Murthy, Shahid Ali Khan

Статья научная

Satellite based communication is a way to transmit digital information from one geographic location to another by utilizing satellites. Satellite as communication medium to transfer data vulnerable various types of information security threat, and require a novel methodology for safe and secure data transmission over satellite. In this paper a methodology is proposed to ensure safe and secured transferred of data or information for satellite based communication using symmetric and asymmetric Cryptographic techniques.

Бесплатно

Security Analysis in Online Transaction Systems: A Proposed Framework

Security Analysis in Online Transaction Systems: A Proposed Framework

Rakin S. Aftab, Md. Kais K. Emon, Sanjana F. Anny, Durjoy Sarker, Md. Mazid-Ul-Haque

Статья научная

The safety of online transactions is paramount in the modern world, mainly since technology develops at a dizzying rate. This study aims to shed light on the numerous threats that users of online transaction systems face. The study used a mixed-methods research strategy to investigate the experiences and perspectives of 400 individuals from various backgrounds. Worryingly, the results show a significant knowledge gap on the many types of cyber hazards. The research reveals a troubling lack of awareness about various cyber risks, including fraud, phishing, and identity theft. It highlights the user’s common functional difficulties. The study proposes a novel framework named COTSEF: A Comprehensive Framework for Enhancing Security in Online Transactions to enhance online transaction security alongside these findings. This comprehensive framework aims to provide a safer and more dependable environment for online commerce by mitigating the identified risks and challenges. The demographic breakdown of the users is also investigated, with the results indicating the increased vulnerability of some age groups and professions to various hazards. It also highlights the need for educational activities to address the significant need for more awareness about data protection rules. The study is a critical resource for policymakers, corporations, and educational institutions, offering actionable insights for developing more secure and user-friendly online transaction systems.

Бесплатно

Security Challenges and Attacks in Mobile Ad Hoc Networks

Security Challenges and Attacks in Mobile Ad Hoc Networks

CH.V. Raghavendran, G. Naga Satish, P. Suresh Varma

Статья научная

Mobile Ad hoc Network (MANET) is an autonomous collection of mobile nodes that form a temporary network without of any existing network infrastructure or central access point. The popularity of these networks created security challenges as an important issue. The traditional routing protocols perform well with dynamically changing topology but are not designed to defense against security challenges. In this paper we discuss about current challenges in an ad hoc environment which includes the different types of potential attacks that are possible in the Mobile Ad hoc Networks that can harm its working and operation. We have done literature study and gathered information relating to various types of attacks. In our study, we have found that there is no general algorithm that suits well against the most commonly known attacks. But the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET. To develop suitable security solutions for such environments, we must first understand how MANETs can be attacked. This paper provides a comprehensive study of attacks against mobile ad hoc networks. We present a detailed classification of the attacks against MANETs.

Бесплатно

Security Framework for Social Internet of Things: A Relativity Strength Approach

Security Framework for Social Internet of Things: A Relativity Strength Approach

K.S. Santhosh Kumar, Hanumanthappa J., S.P. Shiva Prakash, Kirill Krinkin

Статья научная

The evolution of the Internet of Things (IoT) into the Social Internet of Things (SIoT) involves the integration of social networking features into smart devices. In this paradigm, smart devices emulate human social behavior by forming social relationships with other devices within the network. These relationships are leveraged for service discovery, emphasizing the need for robust security to foster collaboration and cooperation among devices. Security is paramount in the SIoT landscape, as malicious messages from devices can disrupt service functionality, impacting service quality and reliability. These challenges are particularly pronounced in social networks, introducing unique considerations such as heterogeneity and navigability. This study introduces a Security Framework for the Social Internet of Things, adopting a Relativity Strength Approach to enhance the security and reliability of IoT devices within social network contexts. The framework incorporates a relativity-based security model, utilizes Q-learning for efficient device navigation, and employs decision tree classification for assessing service availability. By optimizing hop counts and considering the strength of relationships between devices, the framework enhances security, resource utilization, and service reliability. The proposed security framework introduces a” Relationship key” derived from device-to-device relationships as a central element. This key, coupled with a standard 256-bit Advanced Encryption Standard (AES) algorithm, is employed for encryption and decryption processes. The relationship key technique ensures data protection during transmission, guaranteeing confidentiality and service integrity during network navigation. The system demonstrates an overall security effectiveness of 88.75%, showcasing its robustness in thwarting attacks and preventing unauthorized access. With an impressive overall communication efficiency of 91.75%, the framework minimizes errors and delays, facilitating optimal information trans- mission in smart environments. Furthermore, its 97.5% overall service availability assures a continuous and reliable user experience, establishing the framework’s capability to deliver secure, efficient, and highly accessible smart services.

Бесплатно

Security Measures in Data Mining

Security Measures in Data Mining

Anish Gupta, Vimal Bibhu, Rashid Hussain

Статья научная

Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirement for data mining applications. In this paper we present security requirement measures for the data mining. We summarize the requirements of security for data mining in tabular format. The summarization is performed by the requirements with different aspects of security measure of data mining. The performances and outcomes are determined by the given factors under the summarization criteria. Effects are also given under the tabular form for the requirements of different parameters of security aspects.

Бесплатно

Security and Privacy for Data Storage Service Scheme in Cloud Computing

Security and Privacy for Data Storage Service Scheme in Cloud Computing

Jayashree Agarkhed, Ashalatha R.

Статья научная

The cloud computing features aim at providing security and confidentiality to its customers. The business officials have gained maximum profit using the cloud environment. Therefore the critical data moving to and from the cloud server must be secured. The security and confidentiality issue is the most critical challenge that we are facing in today’s world of the cloud environment. The business officials have gained maximum profit accessing the cloud environment. Before the disaster occurrence, the critical data moving to and from the cloud must be preserved. The privacy preservation and cloud security issue is the most serious issue that we are facing in today’s world in cloud era.

Бесплатно

Security risk analysis and management in banking sector: a case study of a selected commercial bank in Nigeria

Security risk analysis and management in banking sector: a case study of a selected commercial bank in Nigeria

Noah N. Gana, Shafi’i M. Abdulhamid, Joseph A. Ojeniyi

Статья научная

In this paper research was carried out in order to evaluate the security risk analysis and management in banking company through the use of a questionnaire to determine the level of risk that customer of the financial institution is likely to encounter. It was discovered that though the majority of financial institution users are familiar with the possible risk associated with some banking transaction, some aspect still exists that financial institution users are not familiar with which serves as a vulnerable point that could be exploited. The study makes a recommendation for proper enlightenment of financial institution users so as to stay abreast with possible security challenge associated with some banking transaction processes to be able to mitigate possible exploit.

Бесплатно

Selection of Database Management System with Fuzzy-AHP for Electronic Medical Record

Selection of Database Management System with Fuzzy-AHP for Electronic Medical Record

M. Ebrahimi, M. Taheri

Статья научная

Database selection is one of the main problems in designing electronic medical record (EMR) Software, since there are many different data with different types and formats in it. This work provides an approach for selecting suitable database management system (DBMS) with fuzzy analytical hierarchical process that gives capabilities of requirements to electronic medical record software. Criteria are choose based upon capabilities of requirements including supporting from type of operating system and programming language, maximum of table size, indexing, replication and access control. In addition, alternatives are PostgreSQL, MySQL, Oracle, DB2 and Microsoft SQL Server. According to the application of fuzzy analytical hierarchical process a ranking is obtained to decision making the best database management system for electronic medical record software.

Бесплатно

Self-Healing Mechanism for Reliable Architecture with Focus on Failure Detection

Self-Healing Mechanism for Reliable Architecture with Focus on Failure Detection

Eslam Nazemi, Tahere Talebi, Hadi Elyasi

Статья научная

Many companies are embracing e-commerce, or business conducted on-line over electronically networks, as a means of expanding markets, improving customer service, reducing costs, and enhancing productivity. Like other companies, banks are taking steps to expand the use of computer science technology in their business operations. On the other hand, in recent years, the adoption of e-banking began to occur quite extensively as a channel of distribution for financial services due to rapid advances in IT and intensive competitive banking markets. For a bank that wants to remain in the competition, it's more important that each e-banking service have some features such as reliability, availability, extensibility. So we have represented a new e-banking framework which used a biology concept so called self-healing. In our framework, we presented some additional services respect to self-healing cycle for decrease the failure frequency and consequently increase services reliability.

Бесплатно

Sensing as a Service: Vision, Practices and Architecture

Sensing as a Service: Vision, Practices and Architecture

Maha Arooj, Muhammad Asif

Статья научная

The Internet of Things (IoT) is becoming pervasive and immersive due to the recent advancements in communication and sensing technologies. The proliferation of smart devices and their sensing capabilities has opened new opportunities and business models. The billions of connected sensing devices are generating enormous amount of data. The sensing as a service concept has the potential to provide a wide variety of services to citizens, companies and public administrations. This paper presents a sensing as service vision for IoT in different domains such as agriculture, waste management, supply chain, traffic management and others. Moreover, different applications of sensing as service model is analyzed and discussed in detail. In this paper, we specifically propose a service oriented sensing as service architecture to realize the vision of sensing as a service. The proposed service oriented architecture has the potential to address the challenges of heterogeneity, integration and interoperability of a sensing as service concept and can open new business opportunities.

Бесплатно

Sensing the Material Position in Construction Project

Sensing the Material Position in Construction Project

NIE Wen-hui, ZOU Zhi-wen, JU Shi-guang

Статья научная

In order to improve the monitoring and controlling performances in construction projects, especially in multi-story projects, This paper researched the approaches to track the materials and components on construction project. A locating model in 3 dimensional spaces is proposed. The mentioned locating algorithms are compared, and shortages and advantages of each are given. The purpose is to find an optimal solution to manage the location information in construction project site with lower costs, higher locating accuracy and ideal reliability.

Бесплатно

Sentence Clustering Using Parts-of-Speech

Sentence Clustering Using Parts-of-Speech

Richard Khoury

Статья научная

Clustering algorithms are used in many Natural Language Processing (NLP) tasks. They have proven to be popular and effective tools to use to discover groups of similar linguistic items. In this exploratory paper, we propose a new clustering algorithm to automatically cluster together similar sentences based on the sentences’ part-of-speech syntax. The algorithm generates and merges together the clusters using a syntactic similarity metric based on a hierarchical organization of the parts-of-speech. We demonstrate the features of this algorithm by implementing it in a question type classification system, in order to determine the positive or negative impact of different changes to the algorithm.

Бесплатно

Sentiment Analysis of Review Datasets Using Naïve Bayes' and K-NN Classifier

Sentiment Analysis of Review Datasets Using Naïve Bayes' and K-NN Classifier

Lopamudra Dey, Sanjay Chakraborty, Anuraag Biswas, Beepa Bose, Sweta Tiwari

Статья научная

The advent of Web 2.0 has led to an increase in the amount of sentimental content available in the Web. Such content is often found in social media web sites in the form of movie or product reviews, user comments, testimonials, messages in discussion forums etc. Timely discovery of the sentimental or opinionated web content has a number of advantages, the most important of all being monetization. Understanding of the sentiments of human masses towards different entities and products enables better services for contextual advertisements, recommendation systems and analysis of market trends. The focus of our project is sentiment focussed web crawling framework to facilitate the quick discovery of sentimental contents of movie reviews and hotel reviews and analysis of the same. We use statistical methods to capture elements of subjective style and the sentence polarity. The paper elaborately discusses two supervised machine learning algorithms: K-Nearest Neighbour(K-NN) and Naïve Bayes' and compares their overall accuracy, precisions as well as recall values. It was seen that in case of movie reviews Naïve Bayes' gave far better results than K-NN but for hotel reviews these algorithms gave lesser, almost same accuracies.

Бесплатно

Shape Design of Lifting body Based on Genetic Algorithm

Shape Design of Lifting body Based on Genetic Algorithm

Yongyuan Li, Yi Jiang, Chunping Huang

Статья научная

This paper briefly introduces the concept and history of lifting body, and puts forward a new method for the optimization of lifting body. This method has drawn lessons from the die line design of airplane is used to parametric numerical modeling for the lifting body, and extract the characterization of shape parameters as design variables, a combination of lifting body reentry vehicle aerodynamic conditions, aerodynamic heating, volumetric Rate and the stability of performance. Multi-objective hybrid genetic algorithm is adopted to complete the aerodynamic shape optimization and design of hypersonic lifting body vehicle when under more variable and constrained condition in order to obtain the Pareto optimal solution of Common Aero Vehicle shape.

Бесплатно

Журнал