The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The SSL protocol has been widely used for verifying digital identities and to secure Internet traffic since the early days of the web. Although X.509 certificates have been in existence for more than two decades, individual user uptake has been low due to the high cost of issuance and maintenance of such certs. This has led to a situation whereby users are able to verify the identity of an organization...
We consider the economic and mathematical model of forming unified information Internet space for scientific and educational resources by integration of scientific and educational resources in certain “cloud”, based on the needs of consumers, the possibility of required generation in information sources and the availability of nodes (providers) in the network to organize the process of receiving,...
With the continuing development and innovation of modern information and communication technologies in recent years, social media platforms, such as WeChat and Microblog, have been witnessed to play a key role in employee management for enterprises or organizations, enabling individual or groups of employees to express their viewpoints or report their works in a real-time fashion. The resulting Cyber-workspace...
This paper presents a case study of a university campus in Kiziba refugee camp in Rwanda. It evaluates different aspects of this university as a unique example of education in an extreme environment. The goal is to answer what accommodations, educational and technical, need to be made for a university to function in such extreme environments. In the process, field measurements were made evaluating...
The Internet disruption has resulted in an exponential increase in the growth of new technologies [1] and resultant technology disruptions within the workplace [2]. With the rapid changes in the technology landscape, Chief Information Officers (CIO's) and key decision makers need to learn to maneuver though the plethora of emerging technologies that can result in business model innovation [3] and...
This paper presents the current problematic of development a set of indicators user direction, informational direction and reputational direction to perform task of directions of the organization of life cycle of virtual community. The method of determination of possible variants of balancing indicators of virtual community is developed. These indicators based on the analysis of the subject area of...
Specialists of a number of scientific institutes in this article present examples of successful models of modern press services in institutions in the field of science and education in Russia and research their key methods in work.
Lately the development of information and communication technologies has led to the creation of a new type of economy, called information economy, based on the introduction of the latest advances in computer technology. The innovative economy expansion requires new advanced approaches in all areas of development, including engineering and economic education. In the last few years, the evolution of...
This article considers the results of a survey of the Internet space in order to identify interest and ideas about innovative activities and readiness for it. Understanding of the essence of innovation activity by respondents, its effectiveness, participation in innovation competitions, awareness of leading innovative programs, participation in the registration of intellectual property and other aspects...
The article deals with the development of technology for extraction and processing of statistical information of private sector of regional healthcare. The concept of data mining from various sources in the Internet, methods of extraction and integration of information about medical organizations of private sector of regional healthcare are presented.
This work presents a methodology for evaluating informatics security in any kind of organization. We use the ISO-27002/2013 standard and the Mexican equivalent NMX-I27002.NYCE-2009 as basis to follow. The standards stablish fourteen controls: human factors, technological, process, and legal controls. The organization must choose adequate controls for it, then It can use the ”Minimal Distance Method...
“Internet + intelligent education” is the inevitable trend with the development of the education industry. iStudy, a Generic practice platform is a kind of practical curriculum evaluation platform for teachers and students, which combines operation, practice, evaluation, examination and item bank management with comprehensive teaching system and management system and is being accepted and enjoyed...
In the paper we deal with Massive Open Online Courses (MOOCs) on safe Internet usage among primary school children. This topic is getting more important every day due to the current age of digital technology. We focus on MOOCs used by primary school students, since Internet safety is definitely a topic which they must get to know. The results show that, with suitable motivation and students' active...
The blockchain constitutes a technology-based, rather than social or regulation based, means to lower uncertainty about one another in order to exchange value. However, its use may very well also lead to increased complexity resulting from having to subsume work that displaced intermediary institutions had performed. We present our perspective that smart contracts may be used to mitigate this increased...
The aged care sector has been a late adopter of social media platforms for communicating, collaborating, marketing and creating brand awareness. There is little research that examines the adoption of social media by aged care service providers for these purposes. This paper reviews the status of social media adoption in the Australian aged care industry, to understand in what ways social media can...
The Domain Name System (DNS) is a key part of the infrastructure of the Internet. Recent discussions have centered on the removal of the shared DNS resolver and the use of a local full-service resolver instead. From the viewpoint of the cache mechanism, these discussions involve removing the shared DNS cache from the Internet. Although the removal of unnecessary parts from a total system tends to...
Used by both information systems designers and security personnel, the Attack Tree method provides a graphical analysis of the ways in which an entity (a computer system or network, an entire organization, etc.) can be attacked and indicates the countermeasures that can be taken to prevent the attackers to reach their objective. In this paper, we built an Attack Tree focused on the goal “compromising...
Cybersecurity is a process that involves prevention, detection and reaction or response, and must include a learning element for the continuous improvement of the process itself. This study aims to determine the most used models of cybersecurity maturity. For this, a systematic review of studies published from 2012 to 2017 was carried out. Finding 201 articles that mention the different maturity models...
Introduction: Analyzing social media, insights about how products or services are perceived and used by customers can bring useful information. The aim of this study was to develop and validate 4 self-administered questionnaires to be used in the assessment of how consumers, healthcare professionals, medical students and healthcare providers use social media to retrieve health-related information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.