The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Increased interest in security has resulted in greater demand for automated test systems to comply with security standards. Automated test systems have traditionally been operated in isolated environments because of their unique characteristics. However, changes in United States defense acquisition regulations require that defense contractors bring these test systems into compliance with National...
Information and communication technology, services and corporate security shape modern working places creating new added values. The development of technology markets and new innovations impose phrase how to lead IT and thereby be successful. The article describes and develops pragmatism and interdisciplinary of information systems of companies with the help of ITIL methodology. The construction of...
This paper aims to propose and discuss concepts of how users can recognise information seeking behaviour automatically and what implications such an automatic recognition can have. The authors develop the discussion around variables proposed in Wilson's second model of information behaviour and state how they can collect data necessary to recognise information behaviour automatically. The authors...
We consider binary voting in a replica voting setup with a small number of redundant components. Seeking to understand the implications of corrupted components on voting schemes, we consider a simplified setup where one node is highly compromised and the remaining nodes are functionally homogenous. We show that if the homogenous nodes are slightly better than average at voting correctly and the highly...
Advanced information technology offers greater convenience to the general public. However, information technology can cause failures that have significant negative impacts (e.g., system failures and personal information leaks). To improve this situation, it is important to understand past failures, extract their causes, and define countermeasures. In this paper, we focus on communications networks...
The Institute of Technology is an educational institution delivering Diploma Licenses according to the LMD principle. Students must formalize an administrative enrolment at the beginning of the Academic year and an academic enrolment each semester. The IUT has recently made an overhaul of its educational program, and the new program is planned to be implemented in Academic year 2016-2017. New students...
paper deals with the transition of companies to information systems operated using cloud computing services. The influence on the competitiveness of company and its organizational support is analysed. The developmental trends and their impact on company management are also described. The benefits and drawbacks from the transition to flexible ICT architecture are emphasized. Theoretical framework and...
This tool allows children to describe how autonomous characters in their video games should behave at the minimal cost of understanding ovals (states) and arrows (transitions). Its use in educational practices for a decade has confirmed that the tool helps children find their own talent and understand the fundamental concepts of computers such as finite state machines, concurrent processing, object...
Higher educational institutions have made asubstantial investment in the adoption of LearningManagement Systems to enhance their learning and teachingactivities, however, these systems are not used by the facultymembers with their fullest capabilities. This research mainlyaims to verify the key factors that affect learningmanagement system (LMS) adoption by instructors inPalestinian universities and...
Role-based access control is widely used in information system of internal network, but there are still many limitations when there is a large number of roles and objects in the system, such as to achieve fine-grained access controls may lead to role-permission explosion problem, and the users in the network can easily evade the existing access control mechanism to gain access to the system by altering...
Open source e-Learning system is an alternative learning environment in high education to support conventional learning to be more efficient. Most of e-Learning systems are multi platform systems over intranet/internet. High education institutions such as universities have to implement such system to support learning process. E-Learning system has to be suitable with the needs and characteristics...
The item-based collaborative filtering (CF) is one of the most successful approaches utilized by the recommendation systems. The basic concept behind it is to recommend those items to users which are similar to other items that these users have been interested in recently. This paper proposes a hybrid method that integrates user trust relations with item-based CF. This is achieved by incorporating...
In the present paper, the desired Data/Info that the operational officers need is examined, both during the design phase and during the execution of operational missions. This information has been developed and organized by several military and civilian authorities and organizations at national and international level, but there are severe problems in acquiring external collections of Data/Info. In...
The acquisition of reading skills is decisive for the academic achievement of elementary school students. However, unlike other domains of human development, learning to read is a complex process. With this in mind, several attempts have been made to find new educational strategies to foster students reading motivation. That is the context in which Letrinhas appears. Considering the enormous potential...
Recently, information system operation becomes more important because of increasing size of information system and outsourcing the system operation. However, it is not easy for customers to judge the validity of the system operation cost. To provide information which helps the judgment, we analyzed factors which affect system operation cost. Working time of system operation service provider has the...
This paper looks at cyber security threats to cyber banking in South Africa. Cyber-attacks on information systems, especially financial systems have been a common phenomenon in recent times. This phenomenon has spurred financial institutions in South Africa to look at risk management as a crucial entity in their business model. Continuous investment in up-to-date security measures and technologies...
Despite being the most widely used method of authentication, passwords still pose a significant threat to an information system's security. This threat is mostly attributed to the human factor, as users tend to select passwords that are easy to remember, but are not resilient to brute force or dictionary attacks. Worse yet, when not prompted to change their passwords on a regular basis the users tend...
In an increasingly competitive environment the successful functioning of any business requires continuous improvement of services, expanding the range of products and range of services, standardization, and implementation of new busines ideas, establishment and dissemination of innovative solutions on the market. The implementation of such measures were carried out in a well-developed business projects...
Deepens the theoretical issues related to the Information and Knowledge Engineering with emphasis on reflection about its importance in the field of scientific research and social contribution to the development of the country. The paper presents these theoretical concepts: Information Engineering as the creation process and systematization of a volume of value-added data to a particular business...
This study demonstrates how to extract essential information from a set of financial and non-financial business indicators, leading to a better understanding of company performance. The use of Rough Set Theory and the Dominance principle associated with the probabilistic relationship between conditions and decisions in decision algorithms, is justified by the possibility of there being uncertain data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.