The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Virtual laboratories are fully interactive simulations in which students conduct experiments, collect data and answer questions to assess their understanding. The primary objective of virtual cloud-based lab solutions is to provide customized IT environments for users. In today's information, networks and security training, time and location are one of the crucial elements for participants. Many universities...
To assess cybersecurity capabilities in developing countries, governments need to develop a social influence strategy. The main aim is to explore the social influence in the cyberworld and its ability to improve the cybersecurity capabilities in cyberspace' users. Developing countries are from the most source and target of cybercrime in the world, however, their poor infrastructures make them as an...
To assess cybersecurity capabilities in developing countries, governments need to develop a social influence strategy. The main aim is to explore the social influence in the cyberworld and its ability to improve the cybersecurity capabilities in cyberspace' users. Developing countries are from the most source and target of cybercrime in the world, however, their poor infrastructures make them as an...
Nowadays employees are compelled in their workplaces to use different types of Information and Communication Technologies (ICTs). ICTs are frequently updated in routine work without necessarily having the means to use them effectively. This inefficiency often causes stress for both ICTs employees and users. This type of stress is generally known as Technostress and it is dealt with by professionals...
The main objective of the work is to enhance and optimize the performance of the Datagram Transport Layer Security (DTLS) network for Constrained Application CoAP in Internet of Things. So two mechanisms were designed which lead to the higher performance and the efficiency of the protocol DTLS. Our contribution in this paper is to reduce the cost of communication of the DTLS protocol and improve the...
Cybersecurity is an ever-changing ecosystem with a vast and highly complicated field of study, involving specific confidential information which is the most important element for each organization, regardless its industry segment; accordingly, this matter requires continuous attention. The cybersecurity is crucial due to its strong presence in national security. In this respect, States, enterprises...
An effective national cybersecurity strategy conforms to international standards serves to preserve organization's information assets. The principle is to support a cybersecurity consistent approach including legal, technological and organizational dimensions. The promise of this research program is to identify the key areas for an effective cybersecurity strategy addressed to organizations (administration...
The use of open source software (OSS) offers several advantages such as cost savings, security and the ability to modify the source code [1], which encourages companies to adopt it. Today there is a large number of OSS available that meet different requirements (Feller, and Fitzgerald, 2002) [2] [3], which makes their selection a very difficult stage. The contribution of this work is to develop our...
To increase their performance, many companies have chosen to adopt ERP solutions in their information system including Moroccan companies. This paper attempts to identify important issues affecting Enterprise Resource Planning (ERP) implementation in Moroccan context. The results presented are based on a case study (action research) in two large Moroccan companies: the first in the industry field...
There are a number of reasons that encourage the use of open source software ‘OSS’ such as: cost savings, fast time-to-market and high-quality software[1]. Various organizations have considered the use of free software in their IT infrastructure for economic, security or other reasons. With a large number of free software available on the internet, choosing the best one has become a daunting task...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.