首页 > 最新文献

International Journal of Computing and Engineering最新文献

英文 中文
Clouding the Future: Innovating Towards Net-Zero Emissions 遮蔽未来:创新实现净零排放
Pub Date : 2024-07-27 DOI: 10.47941/ijce.2127
Sridhar Mahadevan
Purpose: This paper explores the intersection of cloud computing, generative artificial intelligence (AI), and sustainability, focusing on how these technologies can drive the transition towards net-zero emissions. The aim is to assess how integrating cloud-based solutions and AI can enhance energy efficiency and support environmental goals. Methodology: The study employs a comprehensive review of recent literature, industry reports, and case studies from major cloud providers and technology companies. It analyzes the sustainability commitments of leading cloud providers, evaluates the role of generative AI in optimizing resource utilization, and examines the benefits of serverless automation in reducing carbon footprints. Findings: The research finds that cloud providers are making significant strides in sustainability through ambitious climate commitments and energy-efficient technologies. Generative AI is shown to improve decision-making and resource management, while serverless automation optimizes resource use and minimizes energy consumption. These advancements collectively contribute to achieving long-term sustainability goals and enhancing operational efficiency. Unique Contribution to Theory, Practice, and Policy: This paper provides a novel perspective on leveraging generative AI and serverless automation for sustainability. It offers actionable recommendations for organizations to integrate these technologies into their cloud strategies, emphasizing the importance of aligning with ESG criteria and optimizing data center operations. The findings support the development of policies that encourage technological innovation in the pursuit of environmental stewardship and carbon neutrality.
目的:本文探讨了云计算、生成式人工智能(AI)和可持续发展的交叉点,重点关注这些技术如何推动向净零排放过渡。目的是评估基于云的解决方案与人工智能的整合如何提高能源效率并支持环保目标。研究方法:本研究全面回顾了近期文献、行业报告以及主要云提供商和技术公司的案例研究。它分析了领先云提供商的可持续发展承诺,评估了生成式人工智能在优化资源利用方面的作用,并研究了无服务器自动化在减少碳足迹方面的优势。研究结果:研究发现,云提供商通过雄心勃勃的气候承诺和节能技术,在可持续发展方面取得了长足进步。研究表明,生成式人工智能可改善决策和资源管理,而无服务器自动化可优化资源利用并最大限度地降低能耗。这些进步共同有助于实现长期可持续发展目标和提高运营效率。对理论、实践和政策的独特贡献:本文提供了利用生成式人工智能和无服务器自动化促进可持续发展的新视角。它为企业将这些技术整合到其云战略中提供了可行的建议,强调了与 ESG 标准保持一致和优化数据中心运营的重要性。研究结果支持制定鼓励技术创新的政策,以实现环境管理和碳中和。
{"title":"Clouding the Future: Innovating Towards Net-Zero Emissions","authors":"Sridhar Mahadevan","doi":"10.47941/ijce.2127","DOIUrl":"https://doi.org/10.47941/ijce.2127","url":null,"abstract":"Purpose: This paper explores the intersection of cloud computing, generative artificial intelligence (AI), and sustainability, focusing on how these technologies can drive the transition towards net-zero emissions. The aim is to assess how integrating cloud-based solutions and AI can enhance energy efficiency and support environmental goals. \u0000Methodology: The study employs a comprehensive review of recent literature, industry reports, and case studies from major cloud providers and technology companies. It analyzes the sustainability commitments of leading cloud providers, evaluates the role of generative AI in optimizing resource utilization, and examines the benefits of serverless automation in reducing carbon footprints. \u0000Findings: The research finds that cloud providers are making significant strides in sustainability through ambitious climate commitments and energy-efficient technologies. Generative AI is shown to improve decision-making and resource management, while serverless automation optimizes resource use and minimizes energy consumption. These advancements collectively contribute to achieving long-term sustainability goals and enhancing operational efficiency. \u0000Unique Contribution to Theory, Practice, and Policy: This paper provides a novel perspective on leveraging generative AI and serverless automation for sustainability. It offers actionable recommendations for organizations to integrate these technologies into their cloud strategies, emphasizing the importance of aligning with ESG criteria and optimizing data center operations. The findings support the development of policies that encourage technological innovation in the pursuit of environmental stewardship and carbon neutrality.","PeriodicalId":198033,"journal":{"name":"International Journal of Computing and Engineering","volume":"87 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141797829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast and Efficient UserID Lookup in Distributed Authentication: A Probabilistic Approach Using Bloom Filters 分布式身份验证中快速高效的用户 ID 查询:使用 Bloom 过滤器的概率方法
Pub Date : 2024-07-24 DOI: 10.47941/ijce.2124
Purshotam S Yadav
Purpose: User authentication in distributed systems presents unique challenges due to the decentralized nature of these environments and the potential for high-volume login attempts. This paper proposes an efficient method for UserID existence checking during the login process using Bloom filters, a space-efficient probabilistic data structure. Our approach aims to reduce authentication latency and minimize network traffic while maintaining a high level of security. Methodology: We present a novel system architecture that incorporates Bloom filters at strategic points within the distributed system to perform rapid preliminary checks on UserID existence. This method allows for quick rejection of non-existent UserIDs without querying the main user database, significantly reducing the load on central authentication servers. The paper details the implementation of Bloom filters optimized for UserID storage and lookup, including considerations for filter size, hash function selection, and false positive rate management. We also describe the integration of this method into a typical authentication workflow, highlighting the points at which Bloom filter checks are performed and how they interact with existing security measures. Findings: To evaluate the effectiveness of our approach, we conducted extensive experiments simulating various scales of distributed systems and login attempt patterns. Our results demonstrate that the Bloom filter-based UserID existence checking method reduces authentication latency by an average of 37% compared to traditional database lookup methods. Additionally, we observed a 42% decrease in network traffic related to authentication processes, indicating improved scalability for large-scale distributed systems. The paper also discusses the trade-offs inherent in using probabilistic data structures for security-critical operations, addressing potential vulnerabilities and proposing mitigation strategies. We conclude by outlining future research directions, including adaptive Bloom filter sizing and the potential application of this method to other aspects of distributed system security. Unique Contribution to Theory, Policy and Practice: This research contributes to the field of distributed systems security by providing a practical, efficient, and scalable solution for UserID existence checking, potentially improving the performance and user experience of large-scale authentication systems.
目的:分布式系统中的用户身份验证具有独特的挑战性,因为这些环境具有分散性,而且可能会出现大量登录尝试。本文提出了一种在登录过程中使用布鲁姆过滤器(一种空间效率高的概率数据结构)进行用户 ID 存在性检查的高效方法。我们的方法旨在减少身份验证延迟和网络流量,同时保持高水平的安全性。方法:我们提出了一种新颖的系统架构,该架构在分布式系统的战略点上整合了 Bloom 过滤器,以便对用户 ID 是否存在进行快速初步检查。这种方法可以在不查询主用户数据库的情况下快速拒绝不存在的用户 ID,从而大大减轻中央认证服务器的负担。本文详细介绍了针对用户 ID 存储和查询进行优化的 Bloom 过滤器的实现方法,包括过滤器大小、散列函数选择和误报率管理等方面的注意事项。我们还介绍了如何将这种方法集成到典型的身份验证工作流程中,重点说明了执行 Bloom 过滤器检查的要点,以及它们如何与现有的安全措施相互作用。研究结果为了评估我们的方法的有效性,我们对各种规模的分布式系统和登录尝试模式进行了广泛的模拟实验。实验结果表明,与传统的数据库查询方法相比,基于 Bloom 过滤器的用户 ID 存在性检查方法平均减少了 37% 的验证延迟。此外,我们还观察到与身份验证过程相关的网络流量减少了 42%,这表明大规模分布式系统的可扩展性得到了改善。本文还讨论了使用概率数据结构进行安全关键操作的内在权衡,解决了潜在漏洞并提出了缓解策略。最后,我们概述了未来的研究方向,包括自适应布鲁姆过滤器的大小以及将此方法应用于分布式系统安全其他方面的可能性。对理论、政策和实践的独特贡献:本研究为用户 ID 存在性检查提供了一种实用、高效和可扩展的解决方案,可能会改善大规模身份验证系统的性能和用户体验,从而为分布式系统安全领域做出贡献。
{"title":"Fast and Efficient UserID Lookup in Distributed Authentication: A Probabilistic Approach Using Bloom Filters","authors":"Purshotam S Yadav","doi":"10.47941/ijce.2124","DOIUrl":"https://doi.org/10.47941/ijce.2124","url":null,"abstract":"Purpose: User authentication in distributed systems presents unique challenges due to the decentralized nature of these environments and the potential for high-volume login attempts. This paper proposes an efficient method for UserID existence checking during the login process using Bloom filters, a space-efficient probabilistic data structure. Our approach aims to reduce authentication latency and minimize network traffic while maintaining a high level of security. \u0000Methodology: We present a novel system architecture that incorporates Bloom filters at strategic points within the distributed system to perform rapid preliminary checks on UserID existence. This method allows for quick rejection of non-existent UserIDs without querying the main user database, significantly reducing the load on central authentication servers. The paper details the implementation of Bloom filters optimized for UserID storage and lookup, including considerations for filter size, hash function selection, and false positive rate management. We also describe the integration of this method into a typical authentication workflow, highlighting the points at which Bloom filter checks are performed and how they interact with existing security measures. \u0000Findings: To evaluate the effectiveness of our approach, we conducted extensive experiments simulating various scales of distributed systems and login attempt patterns. Our results demonstrate that the Bloom filter-based UserID existence checking method reduces authentication latency by an average of 37% compared to traditional database lookup methods. Additionally, we observed a 42% decrease in network traffic related to authentication processes, indicating improved scalability for large-scale distributed systems. The paper also discusses the trade-offs inherent in using probabilistic data structures for security-critical operations, addressing potential vulnerabilities and proposing mitigation strategies. We conclude by outlining future research directions, including adaptive Bloom filter sizing and the potential application of this method to other aspects of distributed system security. \u0000Unique Contribution to Theory, Policy and Practice: This research contributes to the field of distributed systems security by providing a practical, efficient, and scalable solution for UserID existence checking, potentially improving the performance and user experience of large-scale authentication systems.","PeriodicalId":198033,"journal":{"name":"International Journal of Computing and Engineering","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141807442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Chatbots: Real-Time Sentiment Analysis for Customer Support 自适应聊天机器人:客户支持的实时情感分析
Pub Date : 2024-07-24 DOI: 10.47941/ijce.2123
Rekha Sivakolundhu, Deepak Nanuru Yagamurthy
In the era of digital transformation and increasing online interactions, customer support is a critical aspect of business success. This paper investigates the development of adaptive customer support chatbots that use real-time sentiment analysis to generate contextually appropriate responses. By leveraging advanced sentiment detection techniques, the system aims to enhance user interaction, satisfaction, and overall customer service experience. This innovation is particularly relevant in today's fast-paced, digitally connected world where personalized and empathetic customer service can significantly impact brand loyalty and customer retention. The proposed approach addresses the growing demand for more intelligent and emotionally aware chatbots, aligning with current trends in artificial intelligence and consumer expectations.
在数字化转型和在线互动日益增加的时代,客户支持是企业成功的一个重要方面。本文研究了自适应客户支持聊天机器人的开发,该聊天机器人利用实时情感分析生成与上下文相适应的回复。通过利用先进的情感检测技术,该系统旨在增强用户互动、满意度和整体客户服务体验。在当今快节奏的数字互联世界中,个性化和感同身受的客户服务会极大地影响品牌忠诚度和客户保留率,因此这种创新尤为重要。所提出的方法满足了人们对更智能、更具情感意识的聊天机器人日益增长的需求,符合当前人工智能的发展趋势和消费者的期望。
{"title":"Adaptive Chatbots: Real-Time Sentiment Analysis for Customer Support","authors":"Rekha Sivakolundhu, Deepak Nanuru Yagamurthy","doi":"10.47941/ijce.2123","DOIUrl":"https://doi.org/10.47941/ijce.2123","url":null,"abstract":"In the era of digital transformation and increasing online interactions, customer support is a critical aspect of business success. This paper investigates the development of adaptive customer support chatbots that use real-time sentiment analysis to generate contextually appropriate responses. By leveraging advanced sentiment detection techniques, the system aims to enhance user interaction, satisfaction, and overall customer service experience. This innovation is particularly relevant in today's fast-paced, digitally connected world where personalized and empathetic customer service can significantly impact brand loyalty and customer retention. The proposed approach addresses the growing demand for more intelligent and emotionally aware chatbots, aligning with current trends in artificial intelligence and consumer expectations.","PeriodicalId":198033,"journal":{"name":"International Journal of Computing and Engineering","volume":"67 26","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141806779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensive Guide to AI Regulations: Analyzing the EU AI Act and Global Initiatives 人工智能法规综合指南:分析欧盟人工智能法案和全球倡议
Pub Date : 2024-07-17 DOI: 10.47941/ijce.2110
Puneet Matai
Purpose: The whitepaper is a comprehensive guide on global AI regulations, focusing on the EU AI Act as a pivotal framework. It analyses its impact on industries, outlines key guidelines, and compares global AI initiatives. Methodology: The whitepaper employs a detailed analysis of the EU AI Act, examining its stringent rules for AI ethics and safety. It also involves a comparative study of global AI initiatives to understand the broader landscape of AI regulations. Findings: The whitepaper finds that the EU AI Act inspires global standards for AI ethics and safety. It highlights businesses' compliance challenges and the need for responsible innovation to build consumer trust. Unique contribution to theory, practice, and policy (recommendations): Businesses should stay updated on evolving AI laws to ensure ethical AI use. The whitepaper offers insights into the regulatory landscape and practical compliance advice, suggesting that aligning global AI regulations with the strict standards of the EU AI Act could be beneficial
目的:本白皮书是关于全球人工智能法规的综合指南,重点关注作为关键框架的《欧盟人工智能法案》。它分析了该法案对各行业的影响,概述了主要指导方针,并对全球人工智能倡议进行了比较。研究方法:白皮书详细分析了《欧盟人工智能法》,研究了其对人工智能道德和安全的严格规定。白皮书还对全球人工智能计划进行了比较研究,以了解人工智能法规的更广阔前景。研究结果白皮书发现,《欧盟人工智能法》激发了全球人工智能道德和安全标准。它强调了企业在合规方面面临的挑战,以及负责任的创新以建立消费者信任的必要性。对理论、实践和政策的独特贡献(建议):企业应随时了解不断演变的人工智能法律,以确保合乎道德地使用人工智能。白皮书提供了对监管环境的见解和实用的合规建议,建议将全球人工智能法规与欧盟《人工智能法》的严格标准统一起来,这可能是有益的
{"title":"Comprehensive Guide to AI Regulations: Analyzing the EU AI Act and Global Initiatives","authors":"Puneet Matai","doi":"10.47941/ijce.2110","DOIUrl":"https://doi.org/10.47941/ijce.2110","url":null,"abstract":"Purpose: The whitepaper is a comprehensive guide on global AI regulations, focusing on the EU AI Act as a pivotal framework. It analyses its impact on industries, outlines key guidelines, and compares global AI initiatives. \u0000Methodology: The whitepaper employs a detailed analysis of the EU AI Act, examining its stringent rules for AI ethics and safety. It also involves a comparative study of global AI initiatives to understand the broader landscape of AI regulations. \u0000Findings: The whitepaper finds that the EU AI Act inspires global standards for AI ethics and safety. It highlights businesses' compliance challenges and the need for responsible innovation to build consumer trust. \u0000Unique contribution to theory, practice, and policy (recommendations): Businesses should stay updated on evolving AI laws to ensure ethical AI use. The whitepaper offers insights into the regulatory landscape and practical compliance advice, suggesting that aligning global AI regulations with the strict standards of the EU AI Act could be beneficial","PeriodicalId":198033,"journal":{"name":"International Journal of Computing and Engineering","volume":"212 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141828274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Frameworks for Cloud Computing Environments 云计算环境的网络安全框架
Pub Date : 2024-07-12 DOI: 10.47941/ijce.2058
Elizabeth Shelly
Purpose: The general objective of this study was to explore cybersecurity frameworks for cloud computing environments. Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library. Findings: The findings reveal that there exists a contextual and methodological gap relating to explore cybersecurity frameworks for cloud computing environments. The study emphasized the necessity of robust, comprehensive security measures to address the unique challenges of cloud infrastructures. It highlighted the importance of advanced security measures like encryption, multi-factor authentication, and continuous monitoring to mitigate risks. The research underscored the need for holistic and adaptable frameworks that integrate technological solutions and human factors, while also stressing regulatory compliance. The findings had significant implications for cloud service providers, businesses, regulatory bodies, and cybersecurity professionals, suggesting a focus on new technologies like AI and blockchain for future research. Unique Contribution to Theory, Practice and Policy: The Diffusion of Innovations Theory, Technology Acceptance Model (ATM) and Socio-Technical Systems Theory may be used to anchor future studies on cybersecurity frameworks for cloud computing environments. The study made significant theoretical, practical, and policy recommendations. It emphasized the need for an integrated theoretical approach, the adoption of multi-layered security practices, and regular security assessments. The study also advocated for standardized and specific regulatory frameworks tailored to cloud environments and international cooperation for consistent global cybersecurity policies. These recommendations aimed to enhance the understanding, implementation, and governance of cloud security, ultimately contributing to a more resilient and secure cloud computing ecosystem.
目的:本研究的总体目标是探索云计算环境的网络安全框架。研究方法:本研究采用桌面研究方法。桌面研究指的是二手数据或无需实地考察即可收集的数据。案头研究基本上是从现有资源中收集数据,因此与实地研究相比,案头研究通常被认为是一种低成本技术,因为主要成本涉及执行人员的时间、电话费和目录。因此,本研究依赖于已出版的研究、报告和统计数据。这些二手数据可通过在线期刊和图书馆轻松获取。研究结果:研究结果表明,在探索云计算环境的网络安全框架方面存在背景和方法上的差距。研究强调,有必要采取强大、全面的安全措施来应对云基础设施的独特挑战。它强调了加密、多因素身份验证和持续监控等先进安全措施对降低风险的重要性。研究强调,需要建立整合技术解决方案和人为因素的整体性、适应性框架,同时还要强调合规性。研究结果对云服务提供商、企业、监管机构和网络安全专业人员具有重要意义,建议今后的研究重点放在人工智能和区块链等新技术上。对理论、实践和政策的独特贡献:创新扩散理论、技术接受模型(ATM)和社会技术系统理论可用于未来云计算环境网络安全框架的研究。本研究提出了重要的理论、实践和政策建议。它强调了综合理论方法、采用多层次安全实践和定期安全评估的必要性。研究还提倡针对云环境制定标准化的具体监管框架,并开展国际合作,以制定一致的全球网络安全政策。这些建议旨在加强对云计算安全的理解、实施和管理,最终促进建立一个更有弹性、更安全的云计算生态系统。
{"title":"Cybersecurity Frameworks for Cloud Computing Environments","authors":"Elizabeth Shelly","doi":"10.47941/ijce.2058","DOIUrl":"https://doi.org/10.47941/ijce.2058","url":null,"abstract":"Purpose: The general objective of this study was to explore cybersecurity frameworks for cloud computing environments. \u0000Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library. \u0000Findings: The findings reveal that there exists a contextual and methodological gap relating to explore cybersecurity frameworks for cloud computing environments. The study emphasized the necessity of robust, comprehensive security measures to address the unique challenges of cloud infrastructures. It highlighted the importance of advanced security measures like encryption, multi-factor authentication, and continuous monitoring to mitigate risks. The research underscored the need for holistic and adaptable frameworks that integrate technological solutions and human factors, while also stressing regulatory compliance. The findings had significant implications for cloud service providers, businesses, regulatory bodies, and cybersecurity professionals, suggesting a focus on new technologies like AI and blockchain for future research. \u0000Unique Contribution to Theory, Practice and Policy: The Diffusion of Innovations Theory, Technology Acceptance Model (ATM) and Socio-Technical Systems Theory may be used to anchor future studies on cybersecurity frameworks for cloud computing environments. The study made significant theoretical, practical, and policy recommendations. It emphasized the need for an integrated theoretical approach, the adoption of multi-layered security practices, and regular security assessments. The study also advocated for standardized and specific regulatory frameworks tailored to cloud environments and international cooperation for consistent global cybersecurity policies. These recommendations aimed to enhance the understanding, implementation, and governance of cloud security, ultimately contributing to a more resilient and secure cloud computing ecosystem.","PeriodicalId":198033,"journal":{"name":"International Journal of Computing and Engineering","volume":"50 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141654660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software-Defined Networking (SDN) for Efficient Network Management 软件定义网络(SDN)实现高效网络管理
Pub Date : 2024-07-12 DOI: 10.47941/ijce.2056
Binti Shalom
Purpose: The general objective of this study was to examine Software-Defined Networking (SDN) for efficient network management. Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library. Findings: The findings reveal that there exists a contextual and methodological gap relating to Software-Defined Networking (SDN) for efficient network management. Preliminary empirical review revealed that SDN offered significant advantages in enhancing network agility, scalability, and operational efficiency. By centralizing network management functions and abstracting network control, SDN enabled dynamic resource allocation and optimized traffic flows. However, challenges such as security vulnerabilities, interoperability issues, and the need for specialized skills were identified. Successful SDN implementation required careful planning, rigorous testing, and strategic integration with existing IT infrastructures. Future research recommendations included further exploration of SDN technologies, evaluation of their impact on network performance and security, and the development of best practices for deployment and management to maximize benefits. Unique Contribution to Theory, Practice and Policy: The Diffusion of Innovations Theory, Technology Acceptance Model (TAM) and Resource Based View (RBV) Theory may be used to anchor future studies on Software-Defined Networking (SDN). The recommendations drawn from the study on Software-Defined Networking (SDN) for Efficient Network Management focused on enhancing theoretical frameworks, improving practical implementations, informing policy development, promoting industry collaboration, addressing security concerns, and facilitating stakeholder engagement. These initiatives aimed to strengthen SDN adoption and implementation by refining theoretical models, advocating for supportive policy environments, fostering industry partnerships, addressing security challenges, and engaging stakeholders throughout the deployment process. By integrating these strategies, the study sought to optimize network management efficiency and promote sustainable technological advancements in SDN.
目的:本研究的总体目标是研究软件定义网络(SDN),以实现高效的网络管理。研究方法:本研究采用桌面研究方法。案头研究指的是二手数据或无需实地考察即可收集到的数据。案头研究基本上是从现有资源中收集数据,因此与实地研究相比,案头研究通常被认为是一种低成本技术,因为主要成本涉及管理人员的时间、电话费和目录。因此,本研究依赖于已出版的研究、报告和统计数据。这些二手数据可通过在线期刊和图书馆轻松获取。研究结果:研究结果表明,在软件定义网络(SDN)用于高效网络管理方面存在背景和方法上的差距。初步实证审查显示,SDN 在提高网络敏捷性、可扩展性和运营效率方面具有显著优势。通过集中网络管理功能和抽象网络控制,SDN 实现了动态资源分配和优化流量。然而,安全漏洞、互操作性问题和专业技能需求等挑战也随之而来。要成功实施 SDN,需要精心规划、严格测试,并与现有 IT 基础设施进行战略性整合。未来的研究建议包括进一步探索 SDN 技术,评估其对网络性能和安全性的影响,以及开发部署和管理的最佳实践,以实现效益最大化。对理论、实践和政策的独特贡献:创新扩散理论、技术接受模型 (TAM) 和基于资源的观点 (RBV) 理论可用于今后对软件定义网络 (SDN) 的研究。从 "软件定义网络(SDN)促进高效网络管理 "研究中得出的建议侧重于加强理论框架、改进实际实施、为政策制定提供信息、促进行业合作、解决安全问题以及促进利益相关者的参与。这些举措旨在通过完善理论模型、倡导支持性政策环境、促进行业合作、应对安全挑战以及让利益相关者参与整个部署过程,来加强 SDN 的采用和实施。通过整合这些战略,本研究旨在优化网络管理效率,促进 SDN 的可持续技术进步。
{"title":"Software-Defined Networking (SDN) for Efficient Network Management","authors":"Binti Shalom","doi":"10.47941/ijce.2056","DOIUrl":"https://doi.org/10.47941/ijce.2056","url":null,"abstract":"Purpose: The general objective of this study was to examine Software-Defined Networking (SDN) for efficient network management. \u0000Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library. \u0000Findings: The findings reveal that there exists a contextual and methodological gap relating to Software-Defined Networking (SDN) for efficient network management. Preliminary empirical review revealed that SDN offered significant advantages in enhancing network agility, scalability, and operational efficiency. By centralizing network management functions and abstracting network control, SDN enabled dynamic resource allocation and optimized traffic flows. However, challenges such as security vulnerabilities, interoperability issues, and the need for specialized skills were identified. Successful SDN implementation required careful planning, rigorous testing, and strategic integration with existing IT infrastructures. Future research recommendations included further exploration of SDN technologies, evaluation of their impact on network performance and security, and the development of best practices for deployment and management to maximize benefits. \u0000Unique Contribution to Theory, Practice and Policy: The Diffusion of Innovations Theory, Technology Acceptance Model (TAM) and Resource Based View (RBV) Theory may be used to anchor future studies on Software-Defined Networking (SDN). The recommendations drawn from the study on Software-Defined Networking (SDN) for Efficient Network Management focused on enhancing theoretical frameworks, improving practical implementations, informing policy development, promoting industry collaboration, addressing security concerns, and facilitating stakeholder engagement. These initiatives aimed to strengthen SDN adoption and implementation by refining theoretical models, advocating for supportive policy environments, fostering industry partnerships, addressing security challenges, and engaging stakeholders throughout the deployment process. By integrating these strategies, the study sought to optimize network management efficiency and promote sustainable technological advancements in SDN.","PeriodicalId":198033,"journal":{"name":"International Journal of Computing and Engineering","volume":"86 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141652921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big Data Analytics for Smart Cities 智能城市大数据分析
Pub Date : 2024-07-12 DOI: 10.47941/ijce.2057
Cassie Davies
Purpose: This study sought to explore big data analytics for smart cities. Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library. Findings: The findings reveal that there exists a contextual and methodological gap relating to exploring big data analytics for smart cities. The integration of big data analytics into smart city operations significantly improved urban management efficiency, sustainability, and residents' quality of life. By leveraging advanced analytics, cities optimized traffic flow, reduced energy consumption, enhanced public safety, improved healthcare delivery, and monitored environmental conditions in real-time. These advancements led to smoother services, economic sustainability, better public safety, effective disaster management, and proactive environmental and health interventions, making cities more responsive, resilient, and sustainable. Unique Contribution to Theory, Practice and Policy: The Diffusion of Innovations Theory, Socio-Technical Systems Theory and Actor- Network Theory may be used to anchor future studies on big data analytics for smart cities. The study made significant contributions to theory, practice, and policy by extending the Diffusion of Innovations and Socio-Technical Systems theories with empirical evidence, recommending robust data governance frameworks and skilled analytics units for practical implementation, and advocating for comprehensive policies to ensure data privacy and security. It highlighted the importance of stakeholder collaboration, investment in technological infrastructure, and future research on long-term impacts, ethical considerations, and emerging technologies to enhance the efficiency and sustainability of smart cities.
目的:本研究旨在探讨智慧城市的大数据分析。研究方法:本研究采用桌面研究方法。案头研究指的是二手数据或无需实地考察即可收集的数据。案头研究基本上是从现有资源中收集数据,因此与实地研究相比,案头研究通常被认为是一种低成本技术,因为主要成本涉及执行人员的时间、电话费和目录。因此,本研究依赖于已出版的研究、报告和统计数据。这些二手数据可通过在线期刊和图书馆轻松获取。研究结果:研究结果表明,在探索智慧城市大数据分析方面存在背景和方法上的差距。将大数据分析融入智慧城市运营,可显著提高城市管理效率、可持续性和居民生活质量。通过利用先进的分析技术,城市优化了交通流量,降低了能源消耗,加强了公共安全,改善了医疗服务,并对环境状况进行了实时监控。这些进步带来了更顺畅的服务、经济可持续性、更好的公共安全、有效的灾害管理以及积极的环境和健康干预,使城市更具响应性、复原力和可持续性。对理论、实践和政策的独特贡献:创新扩散理论、社会技术系统理论和行动者网络理论可用于未来智慧城市的大数据分析研究。本研究以经验证据扩展了创新扩散理论和社会-技术系统理论,建议建立强大的数据治理框架和熟练的分析部门以切实可行,并倡导制定全面的政策以确保数据隐私和安全,从而为理论、实践和政策做出了重大贡献。报告强调了利益相关者合作、技术基础设施投资以及未来对长期影响、伦理因素和新兴技术研究的重要性,以提高智慧城市的效率和可持续性。
{"title":"Big Data Analytics for Smart Cities","authors":"Cassie Davies","doi":"10.47941/ijce.2057","DOIUrl":"https://doi.org/10.47941/ijce.2057","url":null,"abstract":"Purpose: This study sought to explore big data analytics for smart cities. \u0000Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library. \u0000Findings: The findings reveal that there exists a contextual and methodological gap relating to exploring big data analytics for smart cities. The integration of big data analytics into smart city operations significantly improved urban management efficiency, sustainability, and residents' quality of life. By leveraging advanced analytics, cities optimized traffic flow, reduced energy consumption, enhanced public safety, improved healthcare delivery, and monitored environmental conditions in real-time. These advancements led to smoother services, economic sustainability, better public safety, effective disaster management, and proactive environmental and health interventions, making cities more responsive, resilient, and sustainable. \u0000Unique Contribution to Theory, Practice and Policy: The Diffusion of Innovations Theory, Socio-Technical Systems Theory and Actor- Network Theory may be used to anchor future studies on big data analytics for smart cities. The study made significant contributions to theory, practice, and policy by extending the Diffusion of Innovations and Socio-Technical Systems theories with empirical evidence, recommending robust data governance frameworks and skilled analytics units for practical implementation, and advocating for comprehensive policies to ensure data privacy and security. It highlighted the importance of stakeholder collaboration, investment in technological infrastructure, and future research on long-term impacts, ethical considerations, and emerging technologies to enhance the efficiency and sustainability of smart cities.","PeriodicalId":198033,"journal":{"name":"International Journal of Computing and Engineering","volume":"8 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141655617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wearable Technology for Health Monitoring and Diagnostics 用于健康监测和诊断的可穿戴技术
Pub Date : 2024-07-10 DOI: 10.47941/ijce.2041
Sara Boyd
Purpose: The general objective of this study was to investigate wearable technology for health monitoring and diagnostics. Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library. Findings: The findings reveal that there exists a contextual and methodological gap relating to wearable technology for health monitoring and diagnostics. The advancement of wearable technology in health monitoring and diagnostics transformed the healthcare landscape by enabling continuous, real-time data collection and analysis, empowering individuals to manage their health proactively. Despite its benefits, challenges such as data privacy, device accuracy, and user adherence needed addressing. Ensuring robust data protection, validating device accuracy in diverse environments, and understanding barriers to sustained use were essential. Addressing the digital divide was also vital for equitable access. Overall, wearable technology held significant promise for preventive care and early diagnosis, but required ongoing research and collaboration to maximize its impact. Unique Contribution to Theory, Practice and Policy: The Technology Acceptance Model (TAM), Health Belief Model (HBM) and Unified Theory of Acceptance and Use of Technology (UTAUT) may be used to anchor future studies on wearable technology for health monitoring and diagnostics. The study recommended integrating technology acceptance and health behavior theories to provide a comprehensive understanding of adoption factors, emphasizing user-centered design for enhanced engagement, and advocating for stringent data privacy and security standards. It highlighted the importance of integrating wearable technology into healthcare systems for better clinical decisions, promoting equitable access, and using wearables in public health initiatives. The study also called for collaboration between technology developers, healthcare providers, and policymakers to address challenges and maximize the benefits of wearable health technology.
目的:本研究的总体目标是调查用于健康监测和诊断的可穿戴技术。研究方法:本研究采用桌面研究方法。案头研究指的是二手数据或无需实地考察即可收集到的数据。案头研究基本上是从现有资源中收集数据,因此与实地研究相比,案头研究通常被认为是一种低成本技术,因为主要成本涉及执行人员的时间、电话费和目录。因此,本研究依赖于已出版的研究、报告和统计数据。这些二手数据可通过在线期刊和图书馆轻松获取。研究结果:研究结果表明,用于健康监测和诊断的可穿戴技术在背景和方法上存在差距。可穿戴技术在健康监测和诊断方面的进步改变了医疗保健领域的面貌,它实现了连续、实时的数据收集和分析,使个人有能力积极主动地管理自己的健康。尽管可穿戴技术好处多多,但仍需应对数据隐私、设备准确性和用户依从性等挑战。确保强大的数据保护、在不同环境中验证设备的准确性以及了解持续使用的障碍至关重要。解决数字鸿沟问题对于公平使用也至关重要。总之,可穿戴技术在预防保健和早期诊断方面大有可为,但需要持续的研究和合作才能最大限度地发挥其影响。对理论、实践和政策的独特贡献:技术接受模型(TAM)、健康信念模型(HBM)和技术接受与使用统一理论(UTAUT)可用于今后对用于健康监测和诊断的可穿戴技术的研究。研究建议整合技术接受理论和健康行为理论,以全面了解采用因素,强调以用户为中心的设计以提高参与度,并倡导严格的数据隐私和安全标准。研究强调了将可穿戴技术整合到医疗保健系统中的重要性,以便做出更好的临床决策、促进公平使用以及在公共卫生活动中使用可穿戴设备。该研究还呼吁技术开发商、医疗保健提供商和政策制定者之间开展合作,以应对挑战并最大限度地发挥可穿戴健康技术的效益。
{"title":"Wearable Technology for Health Monitoring and Diagnostics","authors":"Sara Boyd","doi":"10.47941/ijce.2041","DOIUrl":"https://doi.org/10.47941/ijce.2041","url":null,"abstract":"Purpose: The general objective of this study was to investigate wearable technology for health monitoring and diagnostics. \u0000Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library. \u0000Findings: The findings reveal that there exists a contextual and methodological gap relating to wearable technology for health monitoring and diagnostics. The advancement of wearable technology in health monitoring and diagnostics transformed the healthcare landscape by enabling continuous, real-time data collection and analysis, empowering individuals to manage their health proactively. Despite its benefits, challenges such as data privacy, device accuracy, and user adherence needed addressing. Ensuring robust data protection, validating device accuracy in diverse environments, and understanding barriers to sustained use were essential. Addressing the digital divide was also vital for equitable access. Overall, wearable technology held significant promise for preventive care and early diagnosis, but required ongoing research and collaboration to maximize its impact. \u0000Unique Contribution to Theory, Practice and Policy: The Technology Acceptance Model (TAM), Health Belief Model (HBM) and Unified Theory of Acceptance and Use of Technology (UTAUT) may be used to anchor future studies on wearable technology for health monitoring and diagnostics. The study recommended integrating technology acceptance and health behavior theories to provide a comprehensive understanding of adoption factors, emphasizing user-centered design for enhanced engagement, and advocating for stringent data privacy and security standards. It highlighted the importance of integrating wearable technology into healthcare systems for better clinical decisions, promoting equitable access, and using wearables in public health initiatives. The study also called for collaboration between technology developers, healthcare providers, and policymakers to address challenges and maximize the benefits of wearable health technology.","PeriodicalId":198033,"journal":{"name":"International Journal of Computing and Engineering","volume":"35 25","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141659219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of Edge Computing on Real-Time Data Processing 边缘计算对实时数据处理的影响
Pub Date : 2024-07-10 DOI: 10.47941/ijce.2042
Brian Kelly
Purpose: The study sought to explore the impact of edge computing on real-time data processing. Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library. Findings: The findings reveal that there exists a contextual and methodological gap relating to the impact of edge computing on real-time data processing. Preliminary empirical review reveled that edge computing significantly reduced latency and enhanced efficiency in real-time data processing across various industries by bringing computational resources closer to data sources. It highlighted the technology's ability to handle large volumes of IoT-generated data, improve security by localizing data processing, and drive innovation and economic growth through new applications and services. Edge computing's decentralized approach proved essential for reliable and robust data handling, particularly in critical sectors like healthcare and finance, ultimately solidifying its importance in the digital transformation landscape. Unique Contribution to Theory, Practice and Policy: The Diffusion of Innovations Theory, Resource-Based View (RBV) and Sociotechnical Systems Theory may be used to anchor future studies on edge computing on real-time data processing. The study recommended expanding theoretical frameworks to include the unique aspects of edge computing, investing in robust edge infrastructure, and developing standardized protocols and best practices. It emphasized the need for government incentives and supportive regulatory frameworks to promote adoption, and suggested that academic institutions incorporate edge computing into curricula. Additionally, the study called for ongoing research to address emerging challenges and opportunities, ensuring continuous advancement and effective implementation of edge computing technologies.
目的:本研究旨在探讨边缘计算对实时数据处理的影响。研究方法:研究采用桌面研究方法。桌面研究指的是二手数据或无需实地考察即可收集的数据。案头研究基本上是从现有资源中收集数据,因此与实地研究相比,案头研究通常被认为是一种低成本技术,因为主要成本涉及执行人员的时间、电话费和目录。因此,本研究依赖于已出版的研究、报告和统计数据。这些二手数据可通过在线期刊和图书馆轻松获取。研究结果:研究结果表明,在边缘计算对实时数据处理的影响方面存在背景和方法上的差距。初步实证审查显示,边缘计算通过使计算资源更接近数据源,大大减少了延迟,提高了各行业实时数据处理的效率。它强调了该技术处理大量物联网数据的能力,通过本地化数据处理提高安全性的能力,以及通过新应用和服务推动创新和经济增长的能力。事实证明,边缘计算的去中心化方法对于可靠、稳健的数据处理至关重要,尤其是在医疗保健和金融等关键领域,最终巩固了其在数字化转型中的重要地位。对理论、实践和政策的独特贡献:创新扩散理论、基于资源的观点(RBV)和社会技术系统理论可用于未来有关实时数据处理的边缘计算研究。该研究建议扩展理论框架,以纳入边缘计算的独特方面,投资于强大的边缘基础设施,并制定标准化协议和最佳实践。研究强调需要政府激励措施和支持性监管框架来促进采用,并建议学术机构将边缘计算纳入课程。此外,该研究还呼吁持续开展研究,以应对新出现的挑战和机遇,确保边缘计算技术的不断进步和有效实施。
{"title":"The Impact of Edge Computing on Real-Time Data Processing","authors":"Brian Kelly","doi":"10.47941/ijce.2042","DOIUrl":"https://doi.org/10.47941/ijce.2042","url":null,"abstract":"Purpose: The study sought to explore the impact of edge computing on real-time data processing. \u0000Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library. \u0000Findings: The findings reveal that there exists a contextual and methodological gap relating to the impact of edge computing on real-time data processing. Preliminary empirical review reveled that edge computing significantly reduced latency and enhanced efficiency in real-time data processing across various industries by bringing computational resources closer to data sources. It highlighted the technology's ability to handle large volumes of IoT-generated data, improve security by localizing data processing, and drive innovation and economic growth through new applications and services. Edge computing's decentralized approach proved essential for reliable and robust data handling, particularly in critical sectors like healthcare and finance, ultimately solidifying its importance in the digital transformation landscape. \u0000Unique Contribution to Theory, Practice and Policy: The Diffusion of Innovations Theory, Resource-Based View (RBV) and Sociotechnical Systems Theory may be used to anchor future studies on edge computing on real-time data processing. The study recommended expanding theoretical frameworks to include the unique aspects of edge computing, investing in robust edge infrastructure, and developing standardized protocols and best practices. It emphasized the need for government incentives and supportive regulatory frameworks to promote adoption, and suggested that academic institutions incorporate edge computing into curricula. Additionally, the study called for ongoing research to address emerging challenges and opportunities, ensuring continuous advancement and effective implementation of edge computing technologies.","PeriodicalId":198033,"journal":{"name":"International Journal of Computing and Engineering","volume":"25 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141660712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ethical Considerations in the Collection and Handling of Financial Data in ETC 收集和处理 ETC 财务数据的道德考虑因素
Pub Date : 2024-04-24 DOI: 10.47941/ijce.1823
Pankaj Lembhe Pankaj Lembhe
Purpose: This research note provides some practical advice on accessing financial reports on the internet and the collection of associated data for subsequent analysis. Methodology: Potential methodological problems, such as biases or conflicts of interest, should be acknowledged and strategies for addressing them should be outlined. Findings: Additionally, the confidentiality and privacy of individuals or companies whose financial data is being collected must be protected. Unique contribution to theory, practice, and policy: The guidance on accessing and collecting financial data online contributes to both the theoretical framework of financial analysis and practical applications for researchers and practitioners, ensuring ethical standards are maintained.
目的:本研究说明就如何在互联网上获取财务报告和收集相关数据以进行后续分 析提供了一些实用建议。方法:应认识到潜在的方法问题,如偏见或利益冲突,并概述解决这些问题的策略。研究结果:此外,必须保护被收集财务数据的个人或公司的保密性和隐私。对理论、实践和政策的独特贡献:关于在线访问和收集财务数据的指南既有助于财务分析的理论框架,也有助于研究人员和从业人员的实际应用,确保道德标准得到维护。
{"title":"Ethical Considerations in the Collection and Handling of Financial Data in ETC","authors":"Pankaj Lembhe Pankaj Lembhe","doi":"10.47941/ijce.1823","DOIUrl":"https://doi.org/10.47941/ijce.1823","url":null,"abstract":"Purpose: This research note provides some practical advice on accessing financial reports on the internet and the collection of associated data for subsequent analysis. \u0000Methodology: Potential methodological problems, such as biases or conflicts of interest, should be acknowledged and strategies for addressing them should be outlined. \u0000Findings: Additionally, the confidentiality and privacy of individuals or companies whose financial data is being collected must be protected. \u0000Unique contribution to theory, practice, and policy: The guidance on accessing and collecting financial data online contributes to both the theoretical framework of financial analysis and practical applications for researchers and practitioners, ensuring ethical standards are maintained.","PeriodicalId":198033,"journal":{"name":"International Journal of Computing and Engineering","volume":"41 19","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140662570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Computing and Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1