Enhancement in technology is leading to a change in the way governments, individuals, institutions and
business entities provide quality services to the citizen. Today's education system plays crucial role for
developing cognizance in society so e-government service is obliged to integrate with educational system.
In this work we proposed a novel framework for integrating educational service within e-government
services. One of the main tasks of this paper is to explore or propose a Secure Examination Management
System (SEMS). The system has been designed using cryptographic primitives, which enables students to
take the exam from anywhere. The student is allowed to take the exam after he gives his necessary
authentication details. In SEMS, it is important to exclude false students while ensuring the privacy for the
honest students. It allows evaluators to share student examination papers for evaluation with proper
authentication. This is done using digital signatures, authentication and confidentiality provided by public
key cryptographic system.
Comparative review on information and communication technology issues in educ...riyaniaes
The use of information and communication technology is very beneficial in the education sector because it can enhance the quality of education. However, the implementation of ICT in the education sector of developed and developing countries is a challenging task. This paper explains the comparative study of ICT issues in the education sector of developed and developing countries. In particular, we compare issues between Pakistan and high-tech countries. Our study reveals the fact that the education sector is facing numerous ICT problems that are based on culture, finance, management, infrastructure, lack of training, lack of equipment, teacher’s refusal, and ethical issues. At the end of this paper, various issues faced by the implementation of ICT in the education sector of Pakistan have been categorized into various types, namely, infrastructure, lack of IT professionals, lack of high-speed internet and equipment. Our research is based on five key research questions related to ICT issues. We used a mixed approach where the results of this study can be used as a set of guidelines to help make the learning environment technology-oriented, fast, planned, and productive. Future directions are also given at the end of this paper.
Tanzania government has been making efforts to provide its information and services through internet. However, e-government adoption has been quite slow. Few publications explore e-government adoption in Tanzanian context; therefore, the purpose of this paper is to assess factors that influence citizen adoption of e-government in Tanzania.Design/methodology/approach- A survey was administered to elicit factors for egovernment adoption in Tanzania. Findings- The results of multiple linear regressions indicate that social influence and system quality significantly influence e-government adoption in Tanzania.Research limitation/implications- In light of these findings, researchers should conduct a similar study using other different models of e-government adoption, in order to identify more factors that influence e-government adoption in Tanzania.
Practical implications- Policy makers and e-government project teams should consider these factors to facilitate e-government adoption within the country.
ASSESSING THE ADOPTION OF E-GOVERNMENT USING TAM MODEL: CASE OF EGYPTIJMIT JOURNAL
Electronic government (e-government) was known as an efficient method for government expertness and proficiency as a vital facilitator for citizen-oriented services. Since their initiation over a decade ago, Egovernment services are recognised as a vehicle for accessing online public services. Both governments and academic researchers understand the difficulty of low-level adoption of e-government services among citizens; a common problem between both developing and developed countries. This paper investigates determinants and factors necessary to enhance adoption of citizens for e-government services in developing countries, with particular focus on Egypt, by extending the Technology Acceptance Model (TAM) using a set of political, social, and design constructs that were developed from different sources of research literature.
Assessing the adoption of e government using tam model case of egyptIJMIT JOURNAL
Electronic government (e-government) was known as an efficient method for government expertness and proficiency as a vital facilitator for citizen-oriented services. Since their initiation over a decade ago, Egovernment services are recognised as a vehicle for accessing online public services. Both governments and academic researchers understand the difficulty of low-level adoption of e-government services among citizens; a common problem between both developing and developed countries. This paper investigates determinants and factors necessary to enhance adoption of citizens for e-government services in developing countries, with particular focus on Egypt, by extending the Technology Acceptance Model (TAM) using a set of political, social, and design constructs that were developed from different sources of research literature.
The Contribution of Information Technology Infrastructure in the Information ...IJRES Journal
There are some great innovations in e-government during the past decade. And there is intense competition between some governments and leaders in the supply of services on the Internet. Some countries do not want to stay behind in this area, where many governments have developed detailed strategies to realize the e-government programs. Despite differences in goals behind these programs from one country to another, but there are still many points of convergence between them particularly in information technology infrastructure field. However, Problems associated with the process of application and adoption of e-government due to poor systems and infrastructure construction, which negatively affects the adoption of the public services through the e-government portal, in particular in developing countries. This study argued contribution the information technology Infrastructure in Information Systems success in e-government agencies. Where there are weaknesses in the understanding of this contribution and its importance in many developing countries, so the researcher proposed a model to clarify this contribution, and expected a positive relationship between the information technology infrastructure factors and information systems success, and this affects positively or negatively the adoption of e-government.
Comparative review on information and communication technology issues in educ...riyaniaes
The use of information and communication technology is very beneficial in the education sector because it can enhance the quality of education. However, the implementation of ICT in the education sector of developed and developing countries is a challenging task. This paper explains the comparative study of ICT issues in the education sector of developed and developing countries. In particular, we compare issues between Pakistan and high-tech countries. Our study reveals the fact that the education sector is facing numerous ICT problems that are based on culture, finance, management, infrastructure, lack of training, lack of equipment, teacher’s refusal, and ethical issues. At the end of this paper, various issues faced by the implementation of ICT in the education sector of Pakistan have been categorized into various types, namely, infrastructure, lack of IT professionals, lack of high-speed internet and equipment. Our research is based on five key research questions related to ICT issues. We used a mixed approach where the results of this study can be used as a set of guidelines to help make the learning environment technology-oriented, fast, planned, and productive. Future directions are also given at the end of this paper.
Tanzania government has been making efforts to provide its information and services through internet. However, e-government adoption has been quite slow. Few publications explore e-government adoption in Tanzanian context; therefore, the purpose of this paper is to assess factors that influence citizen adoption of e-government in Tanzania.Design/methodology/approach- A survey was administered to elicit factors for egovernment adoption in Tanzania. Findings- The results of multiple linear regressions indicate that social influence and system quality significantly influence e-government adoption in Tanzania.Research limitation/implications- In light of these findings, researchers should conduct a similar study using other different models of e-government adoption, in order to identify more factors that influence e-government adoption in Tanzania.
Practical implications- Policy makers and e-government project teams should consider these factors to facilitate e-government adoption within the country.
ASSESSING THE ADOPTION OF E-GOVERNMENT USING TAM MODEL: CASE OF EGYPTIJMIT JOURNAL
Electronic government (e-government) was known as an efficient method for government expertness and proficiency as a vital facilitator for citizen-oriented services. Since their initiation over a decade ago, Egovernment services are recognised as a vehicle for accessing online public services. Both governments and academic researchers understand the difficulty of low-level adoption of e-government services among citizens; a common problem between both developing and developed countries. This paper investigates determinants and factors necessary to enhance adoption of citizens for e-government services in developing countries, with particular focus on Egypt, by extending the Technology Acceptance Model (TAM) using a set of political, social, and design constructs that were developed from different sources of research literature.
Assessing the adoption of e government using tam model case of egyptIJMIT JOURNAL
Electronic government (e-government) was known as an efficient method for government expertness and proficiency as a vital facilitator for citizen-oriented services. Since their initiation over a decade ago, Egovernment services are recognised as a vehicle for accessing online public services. Both governments and academic researchers understand the difficulty of low-level adoption of e-government services among citizens; a common problem between both developing and developed countries. This paper investigates determinants and factors necessary to enhance adoption of citizens for e-government services in developing countries, with particular focus on Egypt, by extending the Technology Acceptance Model (TAM) using a set of political, social, and design constructs that were developed from different sources of research literature.
The Contribution of Information Technology Infrastructure in the Information ...IJRES Journal
There are some great innovations in e-government during the past decade. And there is intense competition between some governments and leaders in the supply of services on the Internet. Some countries do not want to stay behind in this area, where many governments have developed detailed strategies to realize the e-government programs. Despite differences in goals behind these programs from one country to another, but there are still many points of convergence between them particularly in information technology infrastructure field. However, Problems associated with the process of application and adoption of e-government due to poor systems and infrastructure construction, which negatively affects the adoption of the public services through the e-government portal, in particular in developing countries. This study argued contribution the information technology Infrastructure in Information Systems success in e-government agencies. Where there are weaknesses in the understanding of this contribution and its importance in many developing countries, so the researcher proposed a model to clarify this contribution, and expected a positive relationship between the information technology infrastructure factors and information systems success, and this affects positively or negatively the adoption of e-government.
The advancement of the information and communications technology has helped almost all governments across the world as they have exploited these technologies for delivering services to their citizens. However, this phenomenon may face several challenges and barriers that lead to the failure in its adoption, use, or continuous usage. In the Arab countries, the rate of failure in the use of electronic services is high in the public sector. Therefore, previous studies have concentrated on this critical issue and highlighted on the citizens’ perspective andignored the perspective of employees in the government organizations.In addition, very few previous studies dealt with the quality of the services based on the employees’viewpoint. Thus, based on the arguments that have been stated earlier, this preliminary study strives to identify the factors that may affect the electronic administrative adoption according to the employees’ perspective. With regard to the data collection, the quantitative method, self-administered questionnaires will be distributed among the staff of the Al-Mustansiriyah University, Iraq.With regard to data analysis, a partial least squares structural equation modelling will be used as a technique to analyse the collected data from a key respondent (Employee). In fact, this research strivesto enrich the literature by adding more information about the factors that may hinder theadoption of modern technologies in general and electronic administration in particular. With regard to the Al-Mustansiriyah University, the present study is considered as the first study conducted in this area; therefore the outputs will assist the government to remedy these obstacles before beginning any project in the public sector including the use of ICT instead of the conventional manner.The result of the analysis showed that system quality, service quality, trust of organization, and usefulness were found as significant factors that affect the employees’ adoption of e-administration services in University.
M-government Implications For E-Government In Developing Countries: The Case ...Peachy Essay
This paper contributes to the issue of mGovernment implementations by exploring the government’s policy on ICT and e-Government in Saudi Arabia, and sheds light on the role of mGovernment applications for enhancing information and service delivery to citizens. This also describes the results of a survey on the available mGovernment applications, and provides an overall evaluation of them in Saudi Arabia.
Top Cited Articles International Journal of Managing Information Technology (...IJMIT JOURNAL
International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas
THE CRITICAL ORGANIZATIONAL FACTORS OF E-GOVERNMENT IN KENYA Editor IJCATR
eGovernment focusses on the use of technology to achieve levels of improvement in various areas of government, transforming the nature of politics and relations between the government and citizens. However, in Kenya, just like in other developing nations, many eGovernment projects have either stalled or failed to meet their objectives due to some key organizational factors. This study therefore highlights critical organizational factors affecting eGovernment projects and the nature of their relationships with eGovernment performance. The study employed cross-sectional survey design. Targeting the entire 18 eGovernment projects implemented through the Information Communications Authority of Kenya since 2005. Both primary and secondary data was collected and analyzed based on response from 217 respondents out of the 300 who participated (72% response rate). At the end, it emerged that out of the various organizational factors hypothesized to predict eGovernment projects Performance, only organizational structure, prioritization of deliverables, and organizational culture are critical in Kenyan context. Others identified in previous studies such as future needs of the organization, power distribution, structure, information system strategy alignment, prioritization of deliverables, and training were also important but not critical.
Examining relationship between service quality, user satisfaction and perform...IJECEIAES
Governments attempt to use all forms of information technologies including Internet and mobile computing to be able to transform relationships with citizens. However, there is a clear gap between the indicator of the impact of technology innovation output and government’s vision in United Arab Emirates (UAE). In this regard, investigating the relationship between service quality, user satisfaction, and performance impact may help the government to mark its current progress and milestone achievement. This research proposed a model based on Delone & McLean IS success model by considering the research context. The modeling of structural equations via PLS (Partial least squares) regression was applied to evaluate the model within the context of public sector in the UAE. The data was collected from a sample of 147 employees in public organizations using a questionnaire. Results demonstrated that the quality of service has a significant effect on user satisfaction. In addition, quality of service and user satisfaction positively influences the staff performance. The outcome of this research helps to enhance the understanding of the impact of smart government applications.
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEMIAEME Publication
Recently, information security incidents such as personal information leakage have been regarded as serious risk factors that directly affect corporate sales reduction and corporate image loss. In order to manage information security systematically, enterprises have been introducing information security systems more than ever before. This study aims to derive major items of the information security system mainly for corporate organizational management, with a focus on the technology-organizationenvironment (TOE) framework, and suggests a direction for system build-up and management. To this end, the Analytic Hierarchy Process (AHP) was conducted on 20 items derived from previous studies. A survey was conducted among 24 individuals, including 12 corporate internal administrators and 12 corporate external consultants. As a result, it turned out that environmental factors affected the information security system more significantly among technical, organizational, and environmental factors. Notably, 'compliance with legal requirements,' 'protection of information subjects' rights,' and 'increase of the information security awareness' affected the operation of the information security system or related decision-making processes. This finding suggests that although technical and organizational management is also essential when it comes to corporate information security system operation, the system needs to respond swiftly to rapid market changes and legal and administrative changes concerning information security.
The Impact of Information Technology on Business Transformation in the Operat...IJMIT JOURNAL
The study aims at measuring the effects of information technology on the transformation of businesses in communication companies in Jordan. The study population consisted of companies' directors as well as their deputies, assistants, advisors, in addition to department managers and their assistants. The total number of the study subjects is 3 designated communication companies in Jordan; these are: Zain, Umniah, and Orange. To achieve the aim of the study, the researcher had prepared a questionnaire which comprises of 45 items covering the three factors of the independent variable (Information Technology): infrastructure, developmental environment, and executive support systems and applications, as well as the three factors of the dependent variable (Transformation of Businesses): operations, organization change, and workers' competence. In order to test the hypotheses, the following three criteria were adequately used: The Medians, the Standard Deviations, as well as the Regression Analysis. The study has reached a number of results; the most notable amongst these results is that there is a positive effect that is statistically significant of information technology on the elements of business transformation in Jordanian communication companies and all of their relating elements.
The last decade of the twentieth century and the turn of twenty-first century witnessed significant progress in technology in general and information technology and communication in particular. Such progress still continues until today, accelerating with wide quick strides more than ever. This age has produced many mechanisms for manufacturing knowledge and more advanced technological means that have made the globe as a small village. Communication technology, which is represented by the internet, has played a huge rule in transferring information and technological revolution from the north to the south passing by the east and the west at the same time. All of that have had an impact on all political, economic, educational, teaching, social, media, and advertisement systems in all communities.
The term technology is derived from Greek. It consists of two parts, techno, which means skills or art, and logy, which means science or study. Thus, the word technology means the science of performance, science of implementation, or the technical methods to achieve a practical purpose, the science of industrial operation.
In this modern era Information Technology has become an important part of life as it allows the users to easily access, store, transfer and manipulate information. Read this document, we have mentioned some useful information regarding Information Technology.
https://www.instantassignmenthelp.com.au/it-assignment-help
The Impact of Information Technology on Business Transformation in the Operat...IJMIT JOURNAL
The study aims at measuring the effects of information technology on the transformation of businesses in communication companies in Jordan. The study population consisted of companies' directors as well as their deputies, assistants, advisors, in addition to department managers and their assistants. The total number of the study subjects is 3 designated communication companies in Jordan; these are: Zain, Umniah, and Orange. To achieve the aim of the study, the researcher had prepared a questionnaire which comprises of 45 items covering the three factors of the independent variable (Information Technology): infrastructure, developmental environment, and executive support systems and applications, as well as the three factors of the dependent variable (Transformation of Businesses): operations, organization change, and workers' competence. In order to test the hypotheses, the following three criteria were adequately used: The Medians, the Standard Deviations, as well as the Regression Analysis. The study has reached a number of results; the most notable amongst these results is that there is a positive effect that is statistically significant of information technology on the elements of business transformation in Jordanian communication companies and all of their relating elements.
A Mediating Role of Knowledge Management System in the Relationship between I...Editor IJCATR
This paper as a qualitative paper attempts to review extant research in term of e-government performance, knowledge
management system, and information technology infrastructure. Nowadays, various countries are trying to improve their performance
by using information technology. In this regard, knowledge management can be considered an influential factor which plays a vital
role in the relationship between IT infrastructure and e-government performance. In the sequel, this paper proposes a framework which
can be applied for future study.
AN EFFICIENT AND SECURE DIGITAL MULTI-SIGNATURE PROTOCOL BASED ON ECCijcisjournal
Digital Signatures play a crucial role today as it ensures authentication, integrity and non-repudiation of a digital message. Many researches are ongoing based on elliptic curve cryptography due to its significant high performance. In this paper we propose an efficient and secure digital multi-signature protocol based on elliptic curve cryptography. The proposed protocol is efficient with reduced time complexity as compared to Chen et al.[14], Sahu and Sharma [18] and Chande and Thakur’s [20] digital multi-signature schemes. Also the proposed protocol overcomes the insider attack as specified by Liu et al. [19] in the Chen et.al’s digital multi-signature scheme.
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEMEijcisjournal
The certificate-based cryptosystems is traditional way in providing the system parameters. Identity-based
cryptography is more efficient than certificate-based cryptosystems. Each user in identity-based
cryptography uses any arbitrary string that uniquely identifies him as his public key. This paper proposes
a new identity-based tripartite signcryption scheme based on the elliptic curve discrete logarithm problem.
The proposed id-based tripartite signcryption scheme does not use the bilinear pairings in both the
Signcryption and unsigncryption phases. The proposed scheme used to reduce the communication over
head when three entities wants to communicate securely as in authentication protocol in GSM and in ecommerce.
The proposed scheme satisfies various desirable security properties. Also, the performance of
the proposed scheme is tested.
The advancement of the information and communications technology has helped almost all governments across the world as they have exploited these technologies for delivering services to their citizens. However, this phenomenon may face several challenges and barriers that lead to the failure in its adoption, use, or continuous usage. In the Arab countries, the rate of failure in the use of electronic services is high in the public sector. Therefore, previous studies have concentrated on this critical issue and highlighted on the citizens’ perspective andignored the perspective of employees in the government organizations.In addition, very few previous studies dealt with the quality of the services based on the employees’viewpoint. Thus, based on the arguments that have been stated earlier, this preliminary study strives to identify the factors that may affect the electronic administrative adoption according to the employees’ perspective. With regard to the data collection, the quantitative method, self-administered questionnaires will be distributed among the staff of the Al-Mustansiriyah University, Iraq.With regard to data analysis, a partial least squares structural equation modelling will be used as a technique to analyse the collected data from a key respondent (Employee). In fact, this research strivesto enrich the literature by adding more information about the factors that may hinder theadoption of modern technologies in general and electronic administration in particular. With regard to the Al-Mustansiriyah University, the present study is considered as the first study conducted in this area; therefore the outputs will assist the government to remedy these obstacles before beginning any project in the public sector including the use of ICT instead of the conventional manner.The result of the analysis showed that system quality, service quality, trust of organization, and usefulness were found as significant factors that affect the employees’ adoption of e-administration services in University.
M-government Implications For E-Government In Developing Countries: The Case ...Peachy Essay
This paper contributes to the issue of mGovernment implementations by exploring the government’s policy on ICT and e-Government in Saudi Arabia, and sheds light on the role of mGovernment applications for enhancing information and service delivery to citizens. This also describes the results of a survey on the available mGovernment applications, and provides an overall evaluation of them in Saudi Arabia.
Top Cited Articles International Journal of Managing Information Technology (...IJMIT JOURNAL
International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas
THE CRITICAL ORGANIZATIONAL FACTORS OF E-GOVERNMENT IN KENYA Editor IJCATR
eGovernment focusses on the use of technology to achieve levels of improvement in various areas of government, transforming the nature of politics and relations between the government and citizens. However, in Kenya, just like in other developing nations, many eGovernment projects have either stalled or failed to meet their objectives due to some key organizational factors. This study therefore highlights critical organizational factors affecting eGovernment projects and the nature of their relationships with eGovernment performance. The study employed cross-sectional survey design. Targeting the entire 18 eGovernment projects implemented through the Information Communications Authority of Kenya since 2005. Both primary and secondary data was collected and analyzed based on response from 217 respondents out of the 300 who participated (72% response rate). At the end, it emerged that out of the various organizational factors hypothesized to predict eGovernment projects Performance, only organizational structure, prioritization of deliverables, and organizational culture are critical in Kenyan context. Others identified in previous studies such as future needs of the organization, power distribution, structure, information system strategy alignment, prioritization of deliverables, and training were also important but not critical.
Examining relationship between service quality, user satisfaction and perform...IJECEIAES
Governments attempt to use all forms of information technologies including Internet and mobile computing to be able to transform relationships with citizens. However, there is a clear gap between the indicator of the impact of technology innovation output and government’s vision in United Arab Emirates (UAE). In this regard, investigating the relationship between service quality, user satisfaction, and performance impact may help the government to mark its current progress and milestone achievement. This research proposed a model based on Delone & McLean IS success model by considering the research context. The modeling of structural equations via PLS (Partial least squares) regression was applied to evaluate the model within the context of public sector in the UAE. The data was collected from a sample of 147 employees in public organizations using a questionnaire. Results demonstrated that the quality of service has a significant effect on user satisfaction. In addition, quality of service and user satisfaction positively influences the staff performance. The outcome of this research helps to enhance the understanding of the impact of smart government applications.
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEMIAEME Publication
Recently, information security incidents such as personal information leakage have been regarded as serious risk factors that directly affect corporate sales reduction and corporate image loss. In order to manage information security systematically, enterprises have been introducing information security systems more than ever before. This study aims to derive major items of the information security system mainly for corporate organizational management, with a focus on the technology-organizationenvironment (TOE) framework, and suggests a direction for system build-up and management. To this end, the Analytic Hierarchy Process (AHP) was conducted on 20 items derived from previous studies. A survey was conducted among 24 individuals, including 12 corporate internal administrators and 12 corporate external consultants. As a result, it turned out that environmental factors affected the information security system more significantly among technical, organizational, and environmental factors. Notably, 'compliance with legal requirements,' 'protection of information subjects' rights,' and 'increase of the information security awareness' affected the operation of the information security system or related decision-making processes. This finding suggests that although technical and organizational management is also essential when it comes to corporate information security system operation, the system needs to respond swiftly to rapid market changes and legal and administrative changes concerning information security.
The Impact of Information Technology on Business Transformation in the Operat...IJMIT JOURNAL
The study aims at measuring the effects of information technology on the transformation of businesses in communication companies in Jordan. The study population consisted of companies' directors as well as their deputies, assistants, advisors, in addition to department managers and their assistants. The total number of the study subjects is 3 designated communication companies in Jordan; these are: Zain, Umniah, and Orange. To achieve the aim of the study, the researcher had prepared a questionnaire which comprises of 45 items covering the three factors of the independent variable (Information Technology): infrastructure, developmental environment, and executive support systems and applications, as well as the three factors of the dependent variable (Transformation of Businesses): operations, organization change, and workers' competence. In order to test the hypotheses, the following three criteria were adequately used: The Medians, the Standard Deviations, as well as the Regression Analysis. The study has reached a number of results; the most notable amongst these results is that there is a positive effect that is statistically significant of information technology on the elements of business transformation in Jordanian communication companies and all of their relating elements.
The last decade of the twentieth century and the turn of twenty-first century witnessed significant progress in technology in general and information technology and communication in particular. Such progress still continues until today, accelerating with wide quick strides more than ever. This age has produced many mechanisms for manufacturing knowledge and more advanced technological means that have made the globe as a small village. Communication technology, which is represented by the internet, has played a huge rule in transferring information and technological revolution from the north to the south passing by the east and the west at the same time. All of that have had an impact on all political, economic, educational, teaching, social, media, and advertisement systems in all communities.
The term technology is derived from Greek. It consists of two parts, techno, which means skills or art, and logy, which means science or study. Thus, the word technology means the science of performance, science of implementation, or the technical methods to achieve a practical purpose, the science of industrial operation.
In this modern era Information Technology has become an important part of life as it allows the users to easily access, store, transfer and manipulate information. Read this document, we have mentioned some useful information regarding Information Technology.
https://www.instantassignmenthelp.com.au/it-assignment-help
The Impact of Information Technology on Business Transformation in the Operat...IJMIT JOURNAL
The study aims at measuring the effects of information technology on the transformation of businesses in communication companies in Jordan. The study population consisted of companies' directors as well as their deputies, assistants, advisors, in addition to department managers and their assistants. The total number of the study subjects is 3 designated communication companies in Jordan; these are: Zain, Umniah, and Orange. To achieve the aim of the study, the researcher had prepared a questionnaire which comprises of 45 items covering the three factors of the independent variable (Information Technology): infrastructure, developmental environment, and executive support systems and applications, as well as the three factors of the dependent variable (Transformation of Businesses): operations, organization change, and workers' competence. In order to test the hypotheses, the following three criteria were adequately used: The Medians, the Standard Deviations, as well as the Regression Analysis. The study has reached a number of results; the most notable amongst these results is that there is a positive effect that is statistically significant of information technology on the elements of business transformation in Jordanian communication companies and all of their relating elements.
A Mediating Role of Knowledge Management System in the Relationship between I...Editor IJCATR
This paper as a qualitative paper attempts to review extant research in term of e-government performance, knowledge
management system, and information technology infrastructure. Nowadays, various countries are trying to improve their performance
by using information technology. In this regard, knowledge management can be considered an influential factor which plays a vital
role in the relationship between IT infrastructure and e-government performance. In the sequel, this paper proposes a framework which
can be applied for future study.
AN EFFICIENT AND SECURE DIGITAL MULTI-SIGNATURE PROTOCOL BASED ON ECCijcisjournal
Digital Signatures play a crucial role today as it ensures authentication, integrity and non-repudiation of a digital message. Many researches are ongoing based on elliptic curve cryptography due to its significant high performance. In this paper we propose an efficient and secure digital multi-signature protocol based on elliptic curve cryptography. The proposed protocol is efficient with reduced time complexity as compared to Chen et al.[14], Sahu and Sharma [18] and Chande and Thakur’s [20] digital multi-signature schemes. Also the proposed protocol overcomes the insider attack as specified by Liu et al. [19] in the Chen et.al’s digital multi-signature scheme.
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEMEijcisjournal
The certificate-based cryptosystems is traditional way in providing the system parameters. Identity-based
cryptography is more efficient than certificate-based cryptosystems. Each user in identity-based
cryptography uses any arbitrary string that uniquely identifies him as his public key. This paper proposes
a new identity-based tripartite signcryption scheme based on the elliptic curve discrete logarithm problem.
The proposed id-based tripartite signcryption scheme does not use the bilinear pairings in both the
Signcryption and unsigncryption phases. The proposed scheme used to reduce the communication over
head when three entities wants to communicate securely as in authentication protocol in GSM and in ecommerce.
The proposed scheme satisfies various desirable security properties. Also, the performance of
the proposed scheme is tested.
A proposed assessment metrics for image steganographyijcisjournal
Data security has become an important problem in the communication systems. Steganography is used to
hide existence of a secret-message. In this article a modified Steganography algorithm will be proposed
depending on decomposition principle of both secret-message and cover-image. A fuzzification is
performed in the secret message to optimize the decomposed coefficients before embedding in the coverimage
to get a Stego Image. The well known metrics (Cor., MSE, PSNR, and Entropy) were used to
evaluate the modified algorithm. Also, a trade-off factor was introduced to determine an optimum value for
the embedding strength factor to get an acceptable degradation. Moreover to evaluate and assess the
modified algorithm and any Steganography algorithms, a new histogram metrics are proposed which
represents the relative frequency occurrence of the various images.
Performance Analysis of CRT for Image Encryption ijcisjournal
With the fast advancements of information technology, the security of image data transmitted or stored over
internet is become very difficult. To hide the details, an effective method is encryption, so that only
authorized persons can decrypt the image with the keys available. Since the default features of digital
image such as high capacity data, large redundancy and large similarities among pixels, the conventional
encryption algorithms such as AES, , DES, 3DES, and Blow Fish, are not applicable for real time image
encryption. This paper presents the performance of CRT for image encryption to secure storage and
transmission of image over internet.
Shift Invarient and Eigen Feature Based Image Fusion ijcisjournal
Image fusion is a technique of fusing multiple images for better information and more accurate image
compared input images. Image fusion has applications in biomedical imaging, remote sensing, pattern
recognition, multi-focus image integration, and modern military. The proposed methodology uses benefits
of Stationary Wavelet Transform (SWT) and Principal Component Analysis (PCA) to fuse the two images.
The obtained results are compared with exiting methodologies and shows robustness in terms of entropy,
Peak Signal to Noise Ratio (PSNR) and standard deviation.
Secure routing path using trust values forijcisjournal
Traditional cryptography-based security mechanisms such as authentication and authorization are not
effective against insider attacks like wormhole, sinkhole, selective forwarding attacks, etc., Trust based
approaches have been widely used to counter insider attacks in wireless sensor networks. It provides a
quantitative way to evaluate the trustworthiness of sensor nodes. An untrustworthy node can wreak
considerable damage and adversely affect the quality and reliability of data. Therefore, analyzing the trust
level of a node is important. In this paper we focused about indirect trust mechanism, in which each node
monitors the forwarding behavior of its neighbors in order to detect any node that behaves selfishly and
does not forward the packets it receives. For this, we used a link state routing protocol based indirect
trusts which forms the shortest route and finds the best trustworthy route among them by comparing the
values of all the calculated route trusts as for each route present in the network. And finally, we compare
our work with similar routing protocols and show its advantages over them.
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...ijcisjournal
This paper presents a new encryption scheme called Compact Coding that encodes information in time, phase, and intensity domains, simultaneously. While these approaches have previously been used one at a time, the proposed scheme brings to bear for the first time their strengths simultaneously leading to an increase in the secure information transfer rate. The proposed scheme is applicable to both optical fibers and free space optics, and can be considered as an alternative to polarization coding. This paper applies the proposed compact coding scheme to multi-photon tolerant quantum protocols in order to produce quantum-level security during information transfer. We present the structure of the proposed coding scheme in a multi-photon environment and address its operation.
Design of Processing Element (PE3) for Implementing Pipeline FFT Processor ijcisjournal
Multiplexing is a method by which multiple analog message signals or digital data streams are combined
into one signal over a shared medium. In communication, different multiplexing schemes are used. To
achieve higher data rates, Orthogonal Frequency Division Multiplexing (OFDM) is used due to its high
spectral efficiency. OFDM became a serious alternative for modern digital signal processing methods
based on the Fast Fourier Transform (FFT).The problems with Orthogonal subcarriers can be addressed
with FFT in communication applications. An 8-bit processing element (PE3), used in the execution of a
pipeline FFT processoris designed and presented in this paper. Simulations are carried out using Mentor
Graphics tools in 130nm technology.
Error Correction for Parallel FIR Filters Using Hamming Codesijcisjournal
In this paper ,we propose a error correction for parallel FIR filters using Hamming code in which single
parallel FIR filter is taken as a bit in ECC technique. In many complex circuits, reliability plays a crucial
role and it requires fault tolerant filter implementations. Now a days, technology grows up, the complex
system use many filters which operates simultaneously. Consider an example in which same parallel filter
is applied to different inputs. To achieve fault tolerance, an ECC technique uses the presence of parallel
filters are considered. The ECC technique provides protection where more number of parallel filters are
used by using the case study, the effectiveness in error correction and circuit design cost is evaluated.
Global stabilization of a class of nonlinear system based on reduced order st...ijcisjournal
The problem of global stabilization for a class of nonlinear system is considered in this paper.The sufficient
condition of the global stabilization of this class of system is obtained by deducing thestabilization of itself
from the stabilization of its subsystems. This paper will come up with a designmethod of state feedback
control law to make this class of nonlinear system stable, and indicate the efficiency of the conclusion of
this paper via a series of examples and simulations at the end. Theresults presented in this paper improve
and generalize the corresponding results of recent works.
Randomness evaluation framework of cryptographic algorithmsijcisjournal
Nowadays, computer systems are developing very rapidly and become more and more complex, which
leads to the necessity to provide security for them. This paper is intended to present software for testing
and evaluating cryptographic algorithms. When evaluating block and stream ciphers one of the most basic
property expected from them is to pass statistical randomness testing, demonstrating in this way their
suitability to be random number generators. The primary goal of this paper is to propose a new framework
to evaluate the randomness of cryptographic algorithms: based only on a .dll file which offers access to the
encryption function, the decryption function and the key schedule function of the cipher that has to be tested
(block cipher or stream cipher), the application evaluates the randomness and provides an interpretation of
the results. For this, all nine tests used for evaluation of AES candidate block ciphers and three NIST
statistical tests are applied to the algorithm being tested. In this paper, we have evaluated Tiny Encryption
Algorithm (block cipher), Camellia (block cipher) and LEX (stream cipher) to determine if they pass
statistical randomness testing.
RSA ALGORITHM WITH A NEW APPROACH ENCRYPTION AND DECRYPTION MESSAGE TEXT BY A...ijcisjournal
In many research works, there has been an orientation to studying and developing many of the applications of public-key cryptography to secure the data while transmitting in the systems, In this paper we present an approach to encrypt and decrypt the message text according to the ASCII(American Standard Code for Information Interchange) and RSA algorithm by converting the message text into binary representation and dividing this representation to bytes(8s of 0s and 1s) and applying a bijective function between the group of those bytes and the group of characters of ASCII and then using this mechanism to be compatible with using RSA algorithm, finally, Java application was built to apply this approach directly.
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTSijcisjournal
National Institute of Science and Technology (NIST) published the first Secure Hash Standard SHA-0 in
1993 as Federal Information Processing Standard publication (FIPS PUBS) which two years later was
replaced by SHA-1 to improve the original design and added SHA-2 family by subsequent revisions of the
FIPS. Most of the widely used cryptographic hash functions are under attack today. With the need to
maintain a certain level of security, NIST had selected new cryptographic hash function through public
competition. The winning algorithm, Keccak will not only have to establish a strong security, but also has
to exhibit good performance and capability to run. In this context, we have analysed SHA-3 finalists along
with the used standard SHA-2. The performances of respective algorithms are evaluated by computing
cycles per byte. The empirical analysis shows that two SHA-3 finalists viz. Skein and BLAKE perform better
which are nearly same as the performance of SHA-2.
Nowadays, the information processing system plays crucial part in the internet. Online information security
has become the top priority in all sectors. Failing to provide online information security may cause loss of
critical information or someone may use or distribute such information for malicious purpose. Recently QR
barcodes have been used as an effective way to securely share information. This paper presents the survey
on information hiding techniques which can share high security information over network using QR
barcode
Automatic tempest test and analysis systemijcisjournal
Today, it is clearly known that the electronic devices generate electromagnetic radiations unintentionally,
which may contain critical information called compromising emanations (CE). CE is also known as
TEMPEST radiation, which is a code name firstly used by an U.S government program. Every developed
country has a TEMPEST Test Laboratory (TTL) connected to their National Security Agency (NSA). The
main objective of these laboratories is to investigate equipment, systems, and platforms processing
cryptographic information in terms of CE. TEMPEST tests might take very long time depending on the item
under test. In this paper, a complete Automatic TEMPEST Test and Analysis System (ATTAS) developed in
TUBITAK, BILGEM TTL is introduced. The system has the following properties, which are automatic
system calibration unit, automatic test matrix generator based on the SDIP-27/1 standard, implementation
of tunable and nontunable tests, automatic CE investigations, rendering of the CE of video display units,
playing of the CE of audio signals, measurement of detection system sensitivity, zoning of TEMPEST
equipment based on SDIP-28 standard, and generation of graphical results.
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Crypt...ijcisjournal
Recently the demand of mobile phones and their applications are increasing rapidly and as a result, it
becomes essential to design and/or improve the existing PKI (Public Key Infrastructure) useful for mobile
phones or devices. Since a mobile phone has small screen, low computing power, small storage capacity
etc, the present paper proposes an ECC-based mobile-PKI that overcomes these limitations and supports
various mobile-based applications, because the use of ECC significantly reduces the computation cost,
message size and transmission overhead over RSA based PKI as 160-bit key-size in ECC provides
comparable security with 1024-bit key in RSA. Also the proposed method includes a Mobile Home Agent
(MHA) per user and a Registration Authority (RA) that further minimize the major work/processing loads
of mobile phone and Certificate Authority (CA), respectively. This paper addresses a secure
implementation of the proposed M-PKI, whose security analysis against different attacks shows that all
attacks are protected. Finally, a comparative study of the M-PKI with the existing PKI is done, which gives
satisfactory performance.
In this paper we analyze the cryptanalysis of the simplified data encryption standard algorithm using metaheuristics
and in particular genetic algorithms. The classic fitness function when using such an algorithm
is to compare n-gram statistics of a the decrypted message with those of the target message. We show that
using such a function is irrelevant in case of Genetic Algorithm, simply because there is no correlation
between the distance to the real key (the optimum) and the value of the fitness, in other words, there is no
hidden gradient. In order to emphasize this assumption we experimentally show that a genetic algorithm
perform worse than a random search on the cryptanalysis of the simplified data encryption standard
algorithm.
A Secure Color Image Steganography in Transform Domain ijcisjournal
Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted image is also similar to the secret image. This is proved by the high PSNR (Peak Signal to Noise Ratio), value for both stego and extracted secret image. The results are compared with the results of similar techniques and it is found that the proposed technique is simple and gives better PSNR values than others.
A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENTijcisjournal
In this paper, we consider an RSA modulus N=pq, where the prime factors p, q are of the same size. We
present an attack on RSA when the decryption exponent d is in the form d=Md1+d0 where M is a given
positive integer and d1 and d0 are two suitably small unknown integers. In 1999, Boneh and Durfee
presented an attack on RSA when
0.292 d < N . When d=Md1+d0, our attack enables one to overcome
Boneh and Durfee's bound and to factor the RSA modulus
A Mediating Role of Knowledge Management System in the Relationship between I...Editor IJCATR
This paper as a qualitative paper attempts to review extant research in term of e-government performance, knowledge
management system, and information technology infrastructure. Nowadays, various countries are trying to improve their performance
by using information technology. In this regard, knowledge management can be considered an influential factor which plays a vital
role in the relationship between IT infrastructure and e-government performance. In the sequel, this paper proposes a framework which
can be applied for future study
Promoting transparency in university administration through e governanceVijay Bhaskar
The advances in information and communication technology (ICT) has created opportunities to transform the relationship between universities, students and other stake holders in new ways that contribute to the attainment of good governance. They provide choices for the universities and its stake holders to involve in the process of governance at all levels. They facilitate larger participation and better service delivery, thus making governance more efficient and effective. In addition, e-governance may lower transaction costs both for the university and its stake holders. E-governance presents many avenues for improving administrative trans- parency and performance efficiency. It has opened up new opportunities for universities to manage things differently and in a more efficient manner by utilizing information and re-engineering the processes. Many universities have launched specific initiatives for transparent administration. Students are being perceived as clients rather than beneficiaries. The Internet revolution has proved to be a powerful tool for student-centric governance of universities. An important dimension of the Internet potential is the possibility of providing educational services anytime, anywhere. This paper investigates the role of e-governance in promoting trans- parent administration in the universities.
The Implementation of E-learning System Governance to Deal with User Need, In...TELKOMNIKA JOURNAL
In this digital era, it has been proven that the proper of e-learning system implementation provides
various advantages and huge benefits. But to achieve the proper implementation is not an easy way since
there are many obstacles have to be addressed. Beside the benefits and advantages, such as the other IT
based system, e-learning also bring many risks that come from its environment or embedded in. Although
many methods or approaches proposed to tackle those obstacles and risks, but the study that tackle those
problems from IT Governance view is still limited. The study presents the report of the IT Governance
approach to address some of the risks of eLearning system implementation such as: miss alignment with
the enterprise goal and strategies, uncomplianceness with the government regulation, and unmatched with
the stakeholder needs. The governance of eLearning system proposed has been implemented in the
private university situated in Jakarta, Indonesia for two semesters. Based on the general observation, the
University can get some benefits such as their succeed in maintaining its institution as the university that
comply with government regulatory.
International Journal of Computer Science, Engineering and Information Techno...ijcseit
In the last decade, a lot of countries started to adopt e-government to reduce costs, improve services, save
time and increase effectiveness and efficiency, and improve trust between governments and citizens.
Therefore, it is very important to put e-government adoption in all countries under the light spot. In this
paper, we will discuss the advantages, challenges of e-government as an international approach with a
focused view on the Arabian Gulf countries. We will investigate the advantages of implementing egovernment
systems throughout those countries. In addition, the understanding of these advantages can
help decision-makers recognize the success and risk factors in e-government adoption. Furthermore, we
will discuss the challenges facing the adoption of e-government in the Arabian Gulf countries. We will also
highlight some important points that need to be taken into account in all phases of the engineering process
of the e-government.
Successful factors determining the significant relationship between e-governa...riyaniaes
Every government's major objective is to provide the greatest services in order to establish efficiency and quality of performance. Syria's government has understood how critical it is to go in the direction of information technology. However, there are gaps and poor links across government sectors, which has tainted the image of Syrian e-governance. As a result, one of the main aims of this study is to figure out what factors impact Syrians' acceptance of the e-government system. A total of 600 questionnaires were delivered to Syrian individuals as part of a survey. The data was analysed using the structural equation model (SEM) using AMOS version 21.0. User intention to utilise an e-government system was shown to be influenced by performance expectations, effort expectations, system flexibility, citizens-centricity, and facilitating conditions. Assurance, responsiveness, reliability, tangibles, and empathy are five fundamental factors that have a major impact on government operation excellence. Behavioural Intention is being utilised as a mediator between the government operation excellence (GOE) initiative and the e-government platform.
THE EFFECT OF INTERNAL FACTORS WITHIN THE GOVERNMENT ENTITIES ON THE IMPLEMEN...ijmpict
The building of e-government has become a priority issue as well as a challenge for many local, state, and
federal government agencies worldwide. Information and Communication Technology (ICT) is now widely
employed to help the governments transformation toward smart governments. Many critical success factors
(CSF) are there to determine the chance a transformation project can go-live. It has been noticed that the
implementation journey for IT solutions in the public sector has lots of barriers and challenges which lead
to low success rate of projects. This study examines the effect of the Ease of Delivery of the implementation
journey on the Success of Delivery. The result shows that the Ease of Delivery is positively related to the
Success of Delivery. The result of this study has the potential to increase the success rate of IT projects in
government sector by shedding the light on the most important factors affecting the delivery journey for egovernment projects
Financial Management Information System within Government Institution and Sup...sececonf
The provision of comprehensive financial
information by the government institution is needed by
the wider community to boost the effectiveness of the
information to the society and government, and
decision-making. This system produces information that
is able to encourage the realization of a clean,
transparent, and able government to respond to
changing demands effectively. Therefore, the success of
the information system if the users are successful in the
model of acceptance of the systems and information
technology and it would be improving their
performance. This research aims to examine the
acceptance of regional financial information systems in
government using the Technology Acceptance Model
(TAM) and evidence of its influence on the
performance. The study found 556 respondents who are
civil servants in Lampung Province. The finding using
SEM analysis shows that all constructs have an effect in
conformity with the concept of TAM in a government
institution. This study reveals that all variables which
include the model of TAM theory have a positive impact
on the user's performance. It also improvesthe
effectiveness of the information system within the
government institution, especially the implementation of
the financial management information system.
Keywords-Financial Management Information System,
supply chain strategy, Technology Acceptance Model
(TAM), User’s Performance
Use of information Systems in Yemeni Universities Future Vision EECJOURNAL
This research examines the use of computed information systems in Yemeni universities through the use of intermediate variable technology to test the indirect impact of the information systems structure on the relationship between information technology, and the final performance in the computed information systems in Yemeni universities. The applied situation was exemplified by the selection of four universities where the data on the study were collected through special friendly questionnaire, and the number of respondent (224) persons had been used. Many statistical means, percentages, arithmetic mean, standard deviation, and intermediate deviation have been used for the description of the study sample, and for the study variables, as for hypothesis testing, the intermediate variant method was used and the end result was to prove that there was a relationship An incomplete mediation attributed to the structure of information systems that has an indirect impact on the resulting relationship between information technology and the final performance of information systems.
Similar to Framework for Securing Educational E-Government Service (20)
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Framework for Securing Educational E-Government Service
1. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
DOI: 10.5121/ijci.2016.5404 29
FRAMEWORK FOR SECURING EDUCATIONAL
E-GOVERNMENT SERVICE
Mr. Tesfayee Meshu1
and Dr. G Sanjiv Rao2
1
Head of the Department, Department of Computer Science & Information Technology
and Software Engineering, School of Electrical Engineering & Computing, Addis Ababa
Science & Technology University, Ethiopia.
2
Associate Professor, Department of Computer Science & Information Technology and
Software Engineering, School of Electrical Engineering & Computing, Addis Ababa
Science & Technology University, Ethiopia.
ABSTRACT
Enhancement in technology is leading to a change in the way governments, individuals, institutions and
business entities provide quality services to the citizen. Today's education system plays crucial role for
developing cognizance in society so e-government service is obliged to integrate with educational system.
In this work we proposed a novel framework for integrating educational service within e-government
services. One of the main tasks of this paper is to explore or propose a Secure Examination Management
System (SEMS). The system has been designed using cryptographic primitives, which enables students to
take the exam from anywhere. The student is allowed to take the exam after he gives his necessary
authentication details. In SEMS, it is important to exclude false students while ensuring the privacy for the
honest students. It allows evaluators to share student examination papers for evaluation with proper
authentication. This is done using digital signatures, authentication and confidentiality provided by public
key cryptographic system.
KEYWORDS
Framework, Educational System, Secure Examination, E-government services, Encryption, Examination
Server, Authentication.
1. INTRODUCTION
In today’s society, e-government and digital government are those terms that are used to describe
the application of information and communication technologies (ICTs) to improve public
services, educational services and to increase citizen participation in democratic government [1].
In most of the countries, e-government has been the dominant term used for policy-making. This
term gives emphasis on user-centric services that can be integrated to support easy and efficient
use of services by citizens, businesses and education services as shown in Fig.1.
2. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
30
Fig.1. E-government Service Components
1.1. E-Government Services
Electronic Government or e-government is at the forefront of current public sector reform
policies across the world, where the use of computer-based information and communication
technologies (e.g. telecom networks, computers and mobile phones) to deliver public services in
the public sector is seen as a major leverage of public sector innovation. E-Government is usually
seen as using ICT in order to provide easy and very efficient access to government information
and services to the citizens, businesses and government agencies and also improve the quality of
services, by increased speed and efficiency, provide citizens with the opportunities to participate
in different kinds of democratic processes [2]. The digital interactions between a citizen and their
government (C2G), between governments and government agencies (G2G), between government
and citizens (G2C), between government and employees (G2E), and between government and
businesses/commerce (G2B). Essentially, e-government delivery models can be broken down into
the following categories [3], which shown in Fig.2.
• G2G (government to governments)
• G2C (government to citizens)
• G2E (government to employees)
• G2B (government to businesses)
Fig.2. Digital interactions between e-government service components
1.2. Benefits of E-Government Services
So many authors explained about the use of the e-government services in their tasks.
Accordingly the benefits of these services are described in [4] as follows.
• Huge or large benefits are offered by the e-government for citizens through: It is
providing the every government information and services through a single window. It
3. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
31
allows more flexibility and convenience for most of the government offices and agencies,
through online access of services. Here, it meets the target of minimizing the turn-around
time for citizens in the provision of every government services.
• Businesses also benefited by it: e-government is serving as a gateway for the mutual
development and beneficial interactions between the government and businesses. It is
eliminating the administrative procedures when dealing with the government, thus
resulting in considerable time and costs savings for the businesses; and providing a
secure and trustworthy environment for conducting online transactions with the
government.
• An E-Government service helps the government by: It is improving the means of
providing information sharing and communication among all those government offices
that belongs. As the result of this, there is a major enhancement in the organization of
most public sector resources. Here, it avails more tools in order to solve the raising
number of problems that facilitates efficiency of related issues.
1.3. Need of E-Government Services in Education System
Education is the key service in the society where we are living. There is no question about the
importance of this sector for the society. Unfortunately, no emphasis is given to incorporate it to
the e-government services. In this sector, there is a high competition among the students for to be
employed but most of the tasks are within the government offices. By incorporating this sector,
we can improve issues like vacancy and their exam requirements.
Using ICT as a means, education is becoming moving from a knowledge-transfer model to a
collaborative, active, self-directed, and engaging model that helps students increase their
knowledge and develop the skills needed to succeed in the “Learning Society [5]. So the need of
e-government services in education system plays a vital role in the present society.
Technology is just one of many methods that have its own contribution in education today [5].
This is to say we are living in the age where the assets of information and the acquiring of new
things bring its own impact on educational institutions to rethink the means of teaching and
learning in a global market. Accordingly, this system also needs to follow an appropriate
guidelines and one of the major element from this service is delivering its assessment sub service
in a secured way.
But from our discussions, reading and revision so far no one: be it an individual, public and
private sectors give an appropriate emphasis on educational systems especially on making the
exams at different stages of educational hierarchy to be a secured one. So, the purpose of this
study is to build an initial framework to secure the sub service of the educational system.
2. LITERATURE REVIEW
Steve Harrison [6] tried to develop a framework by utilising the Open Web Application Security
Project’s (OWASP) Application Security Verification Standard (ASVS). The author in his work
focused on developing his own security framework that can be used within Agile sprints to
develop secure applications and to give assurance to the business owner that any technical risks
have been mitigated.
Geoffrey Rwezaura [7] focused on proposing a framework for enhancing services in government
to efficiently offer secure way of e-government services. He came up with a new approach by
4. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
32
incorporating security services into eGMMs. In addition, he enhanced the awareness, need and
importance of security services to be an integral part of eGMMs to different groups such as
research organizations, academia, practitioners, policy and decision makers, stakeholders, and the
community.
Min-Shiang HWANG [8] proposed a classification of e-government applications and some
problems in e-government by considering from the four perspectives such as technical, political,
cultural, and legal aspects.
However; in all the above tasks the authors in their research strategies did not take into
consideration about the education system in e- government services, which we believe that this
is one of the important sectors to be considered. Besides, there is no task so far on the secured
based framework on this area.
3. THE PROPOSED FRAMEWORK
Framework is always needed to do tasks as per their standards; hence we came up with the
framework that facilitates to conduct secured exams as shown in Fig.3. The proposed framework
addresses the integration of educational service within the existing e-government services. The
framework was developed with the intension of responding to the inefficient and weak privacy
checking systems of conducting exams in government educational system. The Secure Exam
Management System (SEMS) will be assumed to serve as a benchmark for conducting secured
examination in educational e-government services. This helps to improve the standard of
conducting examination for the entire educational system in the present and puts great milestone
for the upcoming society too.
Fig.3. Framework for SEMS
The framework also addresses a lot of security related issues. Some of these concepts include
proper way of using information: privacy, modification and availability. The use of these are
5. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
33
making a genuine method of assets being stored, processed, and transmitted within and between
e-government domains( government , education service, students, employees ) as shown in Fig.4.
Fig.4. E-government service domains
3.1. The Secure Exam Management System (SEMS)
Examination system is one of the efficient methods for testing the ability of students in any
education system. Examination is considered to be very crucial process in determining the
progress and mostly about the understanding of subjects or courses of any academic activities.
But currently examination is taken without properly identifying the target individuals, conducting
the examinations and evaluating them. Using Secure Exam Management System (SEMS) these
very weak methods of assessments and arrangements will be eliminated.
SEMS has been designed using cryptographic primitives, which enables students to attend
examination from anywhere. The student is allowed to write exam only after his registration
process has been completed and verified by the system for secure authentication purpose. In this
system students are allowed to write objective and descriptive type examinations [9]. It allows
evaluators to share student examination papers for evaluation with proper authentication.
Instructors can design the model papers and conduct examinations with efficient security. SEMS
is considered to be one of very important methods for faster, safer and efficient implementation
of examination procedures for the progress of academic activities. Registering the users and
identifying them as valid are the most important phases where security must be provided to the at
most level. Examination paper will be generated at the time of examination so that reliability is
maintained.
This paper is an effort towards attaining a good if not the best solution to the registration and
identification of students in SEMS and provides confidentiality to question papers, answers,
evaluation & results. The answer papers are encrypted by using student’s private key & decrypted
by using student’s public key. The SEMS also supports the requirements, such as completeness,
soundness, privacy, un-reusability, eligibility, fairness, authentication, confidentiality, receipt-
freeness, non-duplication, public participation, and private error correction.
With the above requirements in mind, our goal was to develop a secure, user-friendly SEMS,
which can be accessed anywhere from any place. Besides, there are three steps absolutely
required for any of the examination system. These are registration, examination and evaluation.
1. For registration, the student must send user authentication details to SEMS, which goes to
the appropriate administrator to his identity, prove for secure authentication, and stores
that in server along with some essential authentication details.
2. For examination, the student can simply download the exam applet from his client
system, and he need to provide his authentication details, and it is to be verified by the
system.
6. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
34
3. For evaluation, evaluators can share all the exam papers among themselves for
perfection. The results announced without delay.
We also able to maintain a centralized database containing the details of all the students who
have registered and they can be accessed from any client system, so that they can write
examination from anywhere.
3.2. System Design
There are three main stages:
1. Registration
2. Examination
3. Evaluation
Notation Used
→ WAP : Wireless Application Protocol
→ AS : Admin server
→ EVS : Evaluating server
→ ES : Examination server
→ Vi : Student i
→ vi : Examination selected by Student from mobile phone
→ KU : Public key
→ KR : Private key
1. Registration Stage
Fig.5. shows the registration process of SEMS where students at the Examination server ( ES)
accesses the AS to download the registration form and submit the authentication details. These
details are encrypted with public key of WAP and then sent to AS. AS decrypts them with its
private key. If the student signature does not match with the one at AS then, AS gives an error
message. Otherwise the student is allowed to enter the examination stage.
Fig.5. Registration Stage
7. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
35
2. Examination Stage
In the examination stage as depicted in Fig.6, AS checks whether the student has previously was
taken the examination or not. If the student has already taken the examination, AS rejects him or
her. Otherwise the student is allowed to download the examination form. Then, the student selects
an examination vi and this is encrypted with the public key of ES as xi. Encrypted examination xi
is then blinded as ei. Examination ei is then signed by student as si and sent to AS. AS verifies
the signature si of examination ei, if it is valid gives its signature to the examination ei as di. This
is sent back to the student. Student retrieves the examination di and unbinds it to get yi. (xi, yi) is
then sent to the ES.
Fig.6. Examination Stage
3. Evaluation Stage
Fig.7 shows the evaluation process of SEMS, here EVS checks whether yi is valid signature of
xi. If verification fails the examination is discarded. Otherwise EVS decrypts the examination xi
with its private key and stores the examination results in the database. EVS publishes the
examination results after the evaluation period is over. Students can view their results
immediately after the evaluation process has been completed.
8. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
36
Fig.7. Evaluation Stage
4. CONCLUSIONS
This paper is aimed for developing a novel framework for integrating educational service with e-
government services. In doing so, we identified the problems seen in currently educational
systems to conduct exams. A framework was proposed that facilitates delivering examination for
all categories. Moreover, we designed a Secure Examination Management System (SEMS) that
helps the eligible student to take examination from anywhere, make all the assessments processes
very efficient, transparent for every one and also facilitates the students to know their results very
fast. In essence, it will create a greater and smooth environment in the education system.
ACKNOWLEDGEMENTS
The authors would like to thank to God and the Electrical Engineering and computing School
particularly the CSIT staffs and authorities of Addis Ababa Science and Technology University
for their constant support and cooperation!.
REFERENCES
[1] Benefits, adoption barriers and myths of open data and open government / M. Janssen, Y.
Charalabidis, A. Zuiderwijk, Information systems management v. 29, no. 4, p. 258-268. A Digital
Single Market strategy for Europe / European Commission. 6 May 2015. COM(2015) 192 final.
[2] Lea Thiel, "Interplay between E-Government Service Adoption Preferences and E-Government
Service Delivery in Germany" 2016 49th Hawaii International Conference on System Sciences.
[3] Adrião, Renato: "Best Practice Long Description: Portuguese Public eProcurement Program.
Tampere 2006". http://www.4qconference.org/liitetiedostot/bp_long_descriptions/PortugalB_
long.pdf
[4] Anders Jacobi, Mikkel Lund Jensen, "Security of eGovernment Systems"
http://www.ep.europa.eu/stoa/