Pub Date : 2023-04-01DOI: 10.18844/gjit.v13i1.8863
From the formation stages of the information society to the present day, new developments have been experienced in many areas such as data formation, processing, storage and sharing of data in electronic environments. In this context, many new technological concepts have been included in our lives. When it comes to data storage environments, the concept of "Cloud Computing", which has been developing and increasing in popularity in recent years, comes to our minds. Cloud computing, with its known definition, is an internet-based technology service that provides access to the data stored on its servers at any time through internet access and allows users to benefit from the services offered by the system to the extent they want. While the advantages of cloud computing systems such as low cost, high performance, not requiring physical materials and being flexible can be mentioned, it is also emphasized that it brings many problems in terms of system. The most important of these problems; the lack of resources in cloud computing service providers, causing unpredictable delays in server response times. Based on all this information, this research is structured on the development of solution processes on these delays. In this sense, it is possible to consider three areas of cloud infrastructure; cloud computing, distributed storage and streaming communications. One of the first solutions that comes to mind is duplicating a task on multiple machines and waiting for the earliest copy to finish can reduce service latency; but intuitively, it costs additional computing resources and increases the queue load on servers. In this context, the effect of redundancy on the tail will be analyzed in the first part of the research. As a solution proposal, in this section, it will be discussed that service delays and queue load can be reduced by using the replication method, thus making the system more efficient. In a similar way, by requesting more than one copy of a file and waiting for any of them to arrive, the cloud storage requests will be accelerated for content download. In the second part of the research, generalization will be made from replication to coding and the (n, k) fork-join model will be studied to analyze the delay in accessing a storage system with (n, k) deletion code. This analysis will provide practical information that several users can access a content at the same time and provide faster service to the relevant users. Achieving low latency in streaming communication is even more difficult, as packets must be transmitted quickly and sequentially. Based on this structure, in the third part of the research, it is aimed to develop deletion codes to transmit redundant packet combinations and ensure smooth playback. Experimental modeling method was used as a research method in the study. In general, the aim of the research is to blend various mathematical tools from queuing, theory coding and renewal processes. It is foreseen that the techniques
{"title":"Investigation of Efficient Backup Tecniques To Reduce Late In Cloud Systems: A Modeling Study","authors":"","doi":"10.18844/gjit.v13i1.8863","DOIUrl":"https://doi.org/10.18844/gjit.v13i1.8863","url":null,"abstract":"From the formation stages of the information society to the present day, new developments have been experienced in many areas such as data formation, processing, storage and sharing of data in electronic environments. In this context, many new technological concepts have been included in our lives. When it comes to data storage environments, the concept of \"Cloud Computing\", which has been developing and increasing in popularity in recent years, comes to our minds. Cloud computing, with its known definition, is an internet-based technology service that provides access to the data stored on its servers at any time through internet access and allows users to benefit from the services offered by the system to the extent they want. While the advantages of cloud computing systems such as low cost, high performance, not requiring physical materials and being flexible can be mentioned, it is also emphasized that it brings many problems in terms of system. The most important of these problems; the lack of resources in cloud computing service providers, causing unpredictable delays in server response times. Based on all this information, this research is structured on the development of solution processes on these delays. In this sense, it is possible to consider three areas of cloud infrastructure; cloud computing, distributed storage and streaming communications. One of the first solutions that comes to mind is duplicating a task on multiple machines and waiting for the earliest copy to finish can reduce service latency; but intuitively, it costs additional computing resources and increases the queue load on servers. In this context, the effect of redundancy on the tail will be analyzed in the first part of the research. As a solution proposal, in this section, it will be discussed that service delays and queue load can be reduced by using the replication method, thus making the system more efficient. In a similar way, by requesting more than one copy of a file and waiting for any of them to arrive, the cloud storage requests will be accelerated for content download. In the second part of the research, generalization will be made from replication to coding and the (n, k) fork-join model will be studied to analyze the delay in accessing a storage system with (n, k) deletion code. This analysis will provide practical information that several users can access a content at the same time and provide faster service to the relevant users. Achieving low latency in streaming communication is even more difficult, as packets must be transmitted quickly and sequentially. Based on this structure, in the third part of the research, it is aimed to develop deletion codes to transmit redundant packet combinations and ensure smooth playback. Experimental modeling method was used as a research method in the study. In general, the aim of the research is to blend various mathematical tools from queuing, theory coding and renewal processes. It is foreseen that the techniques","PeriodicalId":188272,"journal":{"name":"Global Journal of Information Technology: Emerging Technologies","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127106458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-01DOI: 10.18844/gjit.v13i1.8495
Wenjuan Xu
These days small businesses deploy different information systems to be more competitive and efficient, at the same time , which leads to different cyber attacks. To reduce the possible infrastructure damage and financial loss, business owners need to be aware of and recognize these various attacks, and know how to reduce or prevent them. In this paper, to help with the local small business owners, we propose an information security course especially designed for educating the business owners in cyber security for small business-related fields. This paper examines the course design details including the course structure, main contents, different exercises and main challenges.
{"title":"Information Security for Small Business Course Proposal and Design","authors":"Wenjuan Xu","doi":"10.18844/gjit.v13i1.8495","DOIUrl":"https://doi.org/10.18844/gjit.v13i1.8495","url":null,"abstract":"These days small businesses deploy different information systems to be more competitive and efficient, at the same time , which leads to different cyber attacks. To reduce the possible infrastructure damage and financial loss, business owners need to be aware of and recognize these various attacks, and know how to reduce or prevent them. \u0000In this paper, to help with the local small business owners, we propose an information security course especially designed for educating the business owners in cyber security for small business-related fields. This paper examines the course design details including the course structure, main contents, different exercises and main challenges. ","PeriodicalId":188272,"journal":{"name":"Global Journal of Information Technology: Emerging Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121347914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-31DOI: 10.18844/gjit.v12i2.8264
Nadire Cavus, Adeoluwa Atanda
Mobile technology is becoming more central to human life, especially with the current ongoing global pandemic which points out that there will be an increasing need for mobile payment service as it requires little or no contact in making payments. However, mobile payment is not among the most commonly used mobile utilities because of the security and privacy concerns posed by mobile payment. The prime aim of this study is to determine the security and privacy concerns with the highest existence and then address them by identifying a rational and objectively agreed approach on how to resolve the problems discovered. A sensitive Analytical Hierarchy Process (AHP) Pairwise Comparison approach will be used to solve the security and privacy challenges associated with mobile payment services. This study shows that leakage of personal data is the highest risk concern by most users of the mobile payment system (MPS) while loss of “intended purchase” has the lowest risk concern from what we could derive. Keywords: AHP Model; Mobile Technology; Mobile Payment Services; Pairwise Comparison.
{"title":"Security and privacy concerns in mobile payment services","authors":"Nadire Cavus, Adeoluwa Atanda","doi":"10.18844/gjit.v12i2.8264","DOIUrl":"https://doi.org/10.18844/gjit.v12i2.8264","url":null,"abstract":"Mobile technology is becoming more central to human life, especially with the current ongoing global pandemic which points out that there will be an increasing need for mobile payment service as it requires little or no contact in making payments. However, mobile payment is not among the most commonly used mobile utilities because of the security and privacy concerns posed by mobile payment. The prime aim of this study is to determine the security and privacy concerns with the highest existence and then address them by identifying a rational and objectively agreed approach on how to resolve the problems discovered. A sensitive Analytical Hierarchy Process (AHP) Pairwise Comparison approach will be used to solve the security and privacy challenges associated with mobile payment services. This study shows that leakage of personal data is the highest risk concern by most users of the mobile payment system (MPS) while loss of “intended purchase” has the lowest risk concern from what we could derive.\u0000Keywords: AHP Model; Mobile Technology; Mobile Payment Services; Pairwise Comparison.","PeriodicalId":188272,"journal":{"name":"Global Journal of Information Technology: Emerging Technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132732227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-31DOI: 10.18844/gjit.v12i2.8471
Sihem Boubekeur
Information and communication technologies have become vital in the educational realm over the past two decades and a significant subject in the English language educational system. E-materials are not available for all the students, and that causes an impediment for foreign language teachers at Dr. Moulay Tahar University of Saida-Algeria. This research paper aims at investigating e-teaching and e-learning effectiveness in the Algerian university. The researcher only describes the existing phenomenon based on personal classroom observations and interviews with some teachers at Dr. Moulay Tahar University. The findings revealed that e-teaching and online learning are in vain as they are still new for both tutors and learners. Thus, e-education ought to start at an early age so that learners will get used to it. Both students and teachers should be trained in virtual learning and teaching methods. Keywords: EFL students; English; ICT; online; language; learning; teaching.
{"title":"E-teaching and E-learning challenges during the coronavirus: Case study of an Algerian University","authors":"Sihem Boubekeur","doi":"10.18844/gjit.v12i2.8471","DOIUrl":"https://doi.org/10.18844/gjit.v12i2.8471","url":null,"abstract":"Information and communication technologies have become vital in the educational realm over the past two decades and a significant subject in the English language educational system. E-materials are not available for all the students, and that causes an impediment for foreign language teachers at Dr. Moulay Tahar University of Saida-Algeria. This research paper aims at investigating e-teaching and e-learning effectiveness in the Algerian university. The researcher only describes the existing phenomenon based on personal classroom observations and interviews with some teachers at Dr. Moulay Tahar University. The findings revealed that e-teaching and online learning are in vain as they are still new for both tutors and learners. Thus, e-education ought to start at an early age so that learners will get used to it. Both students and teachers should be trained in virtual learning and teaching methods. \u0000Keywords: EFL students; English; ICT; online; language; learning; teaching. \u0000 ","PeriodicalId":188272,"journal":{"name":"Global Journal of Information Technology: Emerging Technologies","volume":"39 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125734884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-15DOI: 10.18844/gjit.v12i2.8110
E. Yildiz
The year 2022 promises many exciting developments for the Global Journal of Information Technology: Emerging Technologies (GJIT). In addition, every year, the number of citations continues to rise strongly in proportion to the increase in the number of articles published. In this respect, first of all, we would like to thank all our authors who have contributed to the success of our journal. While reviewing our new issue, we saw articles from different authors from different countries: Cyprus, Jordan, Iran etc. The multiculturalism policy followed in our globally-focused journal makes us happy with every new issue. We examine the following research areas in the current issue; The topics of “Creating a Mobile Application for Online Shopping that has all the Features Required for the Process”, “Requirements For The Use Of E-Learning In University Education (Theoretical Study)”, “Attitudes Of Physical Education Teachers InJordan Towards The Use Of The Internet In The Educational Process”, “An Inquest into the Degree of M.A. Translation Students’ Familiarity with Computer-Assisted Translation (CAT) Tools”. We will continue to contribute to the literature within the scope of Educational Technologies with our strong team. Thanks to all our authors the contributors to this issue. Hope to see you in our new issue. Asist. Prof. Dr. Ezgi Pelin YILDIZ Global Journal of Information Technology: Emerging Technologies Chef Editor
《全球信息技术杂志:新兴技术》(GJIT)有望在2022年取得许多令人兴奋的发展。此外,每年的被引次数与发表文章数量的增长成比例地持续强劲增长。在这方面,首先,我们要感谢所有为本刊的成功做出贡献的作者。在回顾我们的新一期时,我们看到了来自不同国家的不同作者的文章:塞浦路斯,约旦,伊朗等。我们以全球为中心的杂志遵循的多元文化政策使我们对每一期新刊都感到高兴。在本期中,我们考察了以下几个研究领域;主题为“创建一个具有所有过程所需功能的在线购物移动应用程序”,“在大学教育中使用电子学习的要求(理论研究)”,“约旦体育教师对在教育过程中使用互联网的态度”,“调查硕士翻译学生对计算机辅助翻译(CAT)工具的熟悉程度”。我们将继续与我们强大的团队一起为教育技术领域的文献做出贡献。感谢我们所有的作者和贡献者。希望在我们的新一期中见到你。milwaukee Asist。Ezgi Pelin YILDIZ全球信息技术杂志:新兴技术首席编辑
{"title":"Message from the editor in Chief","authors":"E. Yildiz","doi":"10.18844/gjit.v12i2.8110","DOIUrl":"https://doi.org/10.18844/gjit.v12i2.8110","url":null,"abstract":" \u0000The year 2022 promises many exciting developments for the Global Journal of Information Technology: Emerging Technologies (GJIT). In addition, every year, the number of citations continues to rise strongly in proportion to the increase in the number of articles published. In this respect, first of all, we would like to thank all our authors who have contributed to the success of our journal. While reviewing our new issue, we saw articles from different authors from different countries: Cyprus, Jordan, Iran etc. \u0000The multiculturalism policy followed in our globally-focused journal makes us happy with every new issue. We examine the following research areas in the current issue; The topics of “Creating a Mobile Application for Online Shopping that has all the Features Required for the Process”, “Requirements For The Use Of E-Learning In University Education (Theoretical Study)”, “Attitudes Of Physical Education Teachers InJordan Towards The Use Of The Internet In The Educational Process”, “An Inquest into the Degree of M.A. Translation Students’ Familiarity with Computer-Assisted Translation (CAT) Tools”. We will continue to contribute to the literature within the scope of Educational Technologies with our strong team. Thanks to all our authors the contributors to this issue. \u0000Hope to see you in our new issue. Asist. Prof. Dr. Ezgi Pelin YILDIZ \u0000Global Journal of Information Technology: Emerging Technologies Chef Editor \u0000 ","PeriodicalId":188272,"journal":{"name":"Global Journal of Information Technology: Emerging Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125509465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-14DOI: 10.18844/gjit.v12i2.7879
Randa Saleh Jawarneh, M. Al-Momani
The study aimed to identify the attitudes of physical education teachers in Jordan towards Internet use in teaching-learning process; where the descriptive approach was used in addition to the use of the questionnaire as a tool for the study which has been applied to the study sample made up of 328 teachers and educator and that in class in the second academic year school 2021–2022. The study, after carrying out the necessary statistical treatment, concluded: The presence of positive attitudes among teachers towards the use of the Internet in the educational process. There is a disparity in the use of the Internet in the educational process. Keywords: Internet, the educational process, physical education subject, physical education teachers;
{"title":"Attitudes of physical education teachers in Jordan towards the use of the Internet in the educational process","authors":"Randa Saleh Jawarneh, M. Al-Momani","doi":"10.18844/gjit.v12i2.7879","DOIUrl":"https://doi.org/10.18844/gjit.v12i2.7879","url":null,"abstract":"The study aimed to identify the attitudes of physical education teachers in Jordan towards Internet use in teaching-learning process; where the descriptive approach was used in addition to the use of the questionnaire as a tool for the study which has been applied to the study sample made up of 328 teachers and educator and that in class in the second academic year school 2021–2022. The study, after carrying out the necessary statistical treatment, concluded: The presence of positive attitudes among teachers towards the use of the Internet in the educational process. There is a disparity in the use of the Internet in the educational process.\u0000 \u0000Keywords: Internet, the educational process, physical education subject, physical education teachers;","PeriodicalId":188272,"journal":{"name":"Global Journal of Information Technology: Emerging Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133607208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-30DOI: 10.18844/gjit.v12i1.7111
Leire Ozaeta, Itsaso Perez, Itziar Rekalde
Memory is one of our fundamental mental functions, which allows us to revive the past in our minds. When memory is mentioned, we usually want to refer to a particular kind of memory, which is autobiographical memory. Access to these memories can be altered by various affective disorders, especially depression. Regarding these techniques, this study aims to focus on storytelling to contribute to the resilience of children using a social robot approach, as they do not perceive the robot as a figure of superiority, but as a peer. The article follows a literature review method. This paper presents a preliminary scenario for child-robot interaction in three phases, using interactive storytelling as a way to review the children's past experiences. To help those people, particularly children who have faced trauma, to remember the past in a structured and positive way, life review techniques have been developed. Keywords: Autobiographical; memory; robotics; storytelling.
{"title":"Interactive storytelling for the retelling of autobiographical memory in children: A social robotics approach","authors":"Leire Ozaeta, Itsaso Perez, Itziar Rekalde","doi":"10.18844/gjit.v12i1.7111","DOIUrl":"https://doi.org/10.18844/gjit.v12i1.7111","url":null,"abstract":"Memory is one of our fundamental mental functions, which allows us to revive the past in our minds. When memory is mentioned, we usually want to refer to a particular kind of memory, which is autobiographical memory. Access to these memories can be altered by various affective disorders, especially depression. Regarding these techniques, this study aims to focus on storytelling to contribute to the resilience of children using a social robot approach, as they do not perceive the robot as a figure of superiority, but as a peer. The article follows a literature review method. This paper presents a preliminary scenario for child-robot interaction in three phases, using interactive storytelling as a way to review the children's past experiences. To help those people, particularly children who have faced trauma, to remember the past in a structured and positive way, life review techniques have been developed.\u0000Keywords: Autobiographical; memory; robotics; storytelling.","PeriodicalId":188272,"journal":{"name":"Global Journal of Information Technology: Emerging Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115873536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-30DOI: 10.18844/gjit.v12i1.7434
Gjergji Mulla, Igli Tafa
The purpose of this article is to provide an analysis and a methodology for the implementation of a new CCBS (Centralized Core Banking System) for a Retail Bank. This article has been written based on the highest evaluation standard set by institutions like World Bank for such systems implementation. The scope of work, that will be defined in this article identifies all components and work required for the proposed implementation under this article. The proposed CCBS solution will be implemented based on a phased approach implementation methodology. The implementation team will undertake a confirmatory analysis of functionality during the Inception Reporting period and also illustrate how data will be migrated from the legacy systems into the new CCBS. Banking IT personnel will receive advanced administration training to become experts on subjects matter for using and administrating this product so they can act as the first line of support to the bank. Keywords: Core Banking; Digital payments; Training.
{"title":"Core banking system implementation proposal","authors":"Gjergji Mulla, Igli Tafa","doi":"10.18844/gjit.v12i1.7434","DOIUrl":"https://doi.org/10.18844/gjit.v12i1.7434","url":null,"abstract":"The purpose of this article is to provide an analysis and a methodology for the implementation of a new CCBS (Centralized Core Banking System) for a Retail Bank. This article has been written based on the highest evaluation standard set by institutions like World Bank for such systems implementation. The scope of work, that will be defined in this article identifies all components and work required for the proposed implementation under this article. The proposed CCBS solution will be implemented based on a phased approach implementation methodology. The implementation team will undertake a confirmatory analysis of functionality during the Inception Reporting period and also illustrate how data will be migrated from the legacy systems into the new CCBS. Banking IT personnel will receive advanced administration training to become experts on subjects matter for using and administrating this product so they can act as the first line of support to the bank.\u0000Keywords: Core Banking; Digital payments; Training.","PeriodicalId":188272,"journal":{"name":"Global Journal of Information Technology: Emerging Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116213715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-30DOI: 10.18844/gjit.v12i1.7749
Elira Hoxha, Igli Tafa, Kristi Ndoni, Islam Tahiraj, Andrea Muco
The concept of Internet security is studied by computer science as a safe medium for exchanging data while minimizing the likelihood of online threats. The extensive use of advanced web-based software in different industries such as education, retail, medical care, and payment systems, represents a security challenge for the programmers and an opportunity for the hackers to attack through session hijacking. Based on recent OWASP guidelines, this kind of attack is indeed one of the most frequent attacks that happens lately. Session hijacking happens as a result of poorly designed websites and a lack of security mechanisms, where the user's identity and session data are exposed. This paper will present this kind of vulnerability with the respective control mechanisms and will propose an approach for avoiding hijacking threats by using one-time cookies along with other prevention strategies. Keywords: session hijacking, vulnerability, one-time cookies.
{"title":"Session hijacking vulnerabilities and prevention algorithms","authors":"Elira Hoxha, Igli Tafa, Kristi Ndoni, Islam Tahiraj, Andrea Muco","doi":"10.18844/gjit.v12i1.7749","DOIUrl":"https://doi.org/10.18844/gjit.v12i1.7749","url":null,"abstract":"The concept of Internet security is studied by computer science as a safe medium for exchanging data while minimizing the likelihood of online threats. The extensive use of advanced web-based software in different industries such as education, retail, medical care, and payment systems, represents a security challenge for the programmers and an opportunity for the hackers to attack through session hijacking. Based on recent OWASP guidelines, this kind of attack is indeed one of the most frequent attacks that happens lately. Session hijacking happens as a result of poorly designed websites and a lack of security mechanisms, where the user's identity and session data are exposed. This paper will present this kind of vulnerability with the respective control mechanisms and will propose an approach for avoiding hijacking threats by using one-time cookies along with other prevention strategies. \u0000 \u0000Keywords: session hijacking, vulnerability, one-time cookies.","PeriodicalId":188272,"journal":{"name":"Global Journal of Information Technology: Emerging Technologies","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134014305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-30DOI: 10.18844/gjit.v12i1.6941
Uğur Gürbüz, Mine Afacan Fındıklı, Sebnem Özdemir
Today, “Talent Gap” poses as one of the biggest problems in the business world. As the ratio of this talent gap increases, so too does the desperation of businesses to alleviate this problem. This study aims to answer the research problem defined as, “Does using game-based assessment provide an advantage to companies in the war of attracting and retaining young talents?” To answer this, the aptitudes and perspectives of 35 candidates towards the companies in terms of some criteria were measured by means of Analytic Hierarchy Process. In conclusion, this study shows that the companies, offering game based assessment, witnessed a 72 percent more advantageous situation than companies offering traditional assessment tests. Keywords: Game Based Assessment, Traditional Assessment, Digital HR, Talent Acquisition
{"title":"Digital HR: A study on how game-based assessments can attract talents","authors":"Uğur Gürbüz, Mine Afacan Fındıklı, Sebnem Özdemir","doi":"10.18844/gjit.v12i1.6941","DOIUrl":"https://doi.org/10.18844/gjit.v12i1.6941","url":null,"abstract":"Today, “Talent Gap” poses as one of the biggest problems in the business world. As the ratio of this talent gap increases, so too does the desperation of businesses to alleviate this problem. This study aims to answer the research problem defined as, “Does using game-based assessment provide an advantage to companies in the war of attracting and retaining young talents?” To answer this, the aptitudes and perspectives of 35 candidates towards the companies in terms of some criteria were measured by means of Analytic Hierarchy Process. In conclusion, this study shows that the companies, offering game based assessment, witnessed a 72 percent more advantageous situation than companies offering traditional assessment tests. \u0000Keywords: Game Based Assessment, Traditional Assessment, Digital HR, Talent Acquisition","PeriodicalId":188272,"journal":{"name":"Global Journal of Information Technology: Emerging Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123032209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}