首页 > 最新文献

Journal of Information and Organizational Sciences最新文献

英文 中文
A DSDEVS-Based Model for Verifying Structural Constraints in Dynamic Business Processes 基于dsdev的动态业务流程结构约束验证模型
IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-12-18 DOI: 10.31341/jios.44.2.4
Sofiane Boukelkoul, R. Maamri
This paper presents a DSDEVS-based model “Dynamic Structure Discrete Event System specification” for modeling and simulating business processes with dynamic structure regarding to different contexts. Consequently, this model, formally, improves the reuse of configurable business processes. Thus, the proposed model allows the analysts to personalize their configurable business processes in a sound manner by verifying a set of structure properties, such as, the lack of synchronization and the deadlock by means of simulation. The implementation was done in DEVS-Suite simulator, which is based on DEVSJAVA models.
本文提出了一种基于dsdevs的模型“动态结构离散事件系统规范”,用于对不同环境下具有动态结构的业务流程进行建模和模拟。因此,该模型在形式上改进了可配置业务流程的重用。因此,建议的模型允许分析人员通过验证一组结构属性(例如,通过模拟验证缺乏同步和死锁),以合理的方式个性化其可配置的业务流程。在基于DEVSJAVA模型的DEVS-Suite模拟器中实现。
{"title":"A DSDEVS-Based Model for Verifying Structural Constraints in Dynamic Business Processes","authors":"Sofiane Boukelkoul, R. Maamri","doi":"10.31341/jios.44.2.4","DOIUrl":"https://doi.org/10.31341/jios.44.2.4","url":null,"abstract":"This paper presents a DSDEVS-based model “Dynamic Structure Discrete Event System specification” for modeling and simulating business processes with dynamic structure regarding to different contexts. Consequently, this model, formally, improves the reuse of configurable business processes. Thus, the proposed model allows the analysts to personalize their configurable business processes in a sound manner by verifying a set of structure properties, such as, the lack of synchronization and the deadlock by means of simulation. The implementation was done in DEVS-Suite simulator, which is based on DEVSJAVA models.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"44 1","pages":"257-273"},"PeriodicalIF":0.6,"publicationDate":"2020-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41430527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Controlled DDoS Attack on IPv4/IPv6 Network Using Distributed Computing Infrastructure 基于分布式计算基础设施的IPv4/IPv6网络受控DDoS攻击
IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-12-18 DOI: 10.31341/jios.44.2.6
M. Cernanský, L. Huraj, M. Šimon
The paper focuses on design, background and experimental results of real environment of DDoS attacks. The experimental testbed is based on employment of a tool for IT automation to perform DDoS attacks under monitoring. DDoS attacks are still serious threat in both IPv4 and IPv6 networks and creation of simple tool to test the network for DDoS attack and to allow evaluation of vulnerabilities and DDoS countermeasures of the networks is necessary. In proposed testbed, Ansible orchestration tool is employed to perform and coordinate DDoS attacks. Ansible is a powerful tool and simplifies the implementation of the test environment. Moreover, no special hardware is required for the attacks execution, the testbed uses existing infrastructure in an organization. The case study of implementation of this environment shows straightforwardness to create a testbed comparable with a botnet with ten thousand bots. Furthermore, the experimental results demonstrate the potential of the proposed environment and present the impact of the attacks on particular target servers in IPv4 and IPv6 networks.
本文重点介绍了DDoS攻击真实环境的设计、背景和实验结果。实验测试平台基于使用IT自动化工具在监控下执行DDoS攻击。DDoS攻击在IPv4和IPv6网络中仍然是严重的威胁,创建简单的工具来测试网络的DDoS攻击,并允许评估网络的漏洞和DDoS对策是必要的。在所提出的测试平台中,采用了可操作的编排工具来执行和协调DDoS攻击。Ansible是一个强大的工具,它简化了测试环境的实现。此外,执行攻击不需要特殊的硬件,测试平台使用组织中的现有基础设施。该环境实现的案例研究表明,创建一个与具有10,000个机器人的僵尸网络相当的测试平台非常简单。此外,实验结果证明了所提出环境的潜力,并展示了攻击对IPv4和IPv6网络中特定目标服务器的影响。
{"title":"Controlled DDoS Attack on IPv4/IPv6 Network Using Distributed Computing Infrastructure","authors":"M. Cernanský, L. Huraj, M. Šimon","doi":"10.31341/jios.44.2.6","DOIUrl":"https://doi.org/10.31341/jios.44.2.6","url":null,"abstract":"The paper focuses on design, background and experimental results of real environment of DDoS attacks. The experimental testbed is based on employment of a tool for IT automation to perform DDoS attacks under monitoring. DDoS attacks are still serious threat in both IPv4 and IPv6 networks and creation of simple tool to test the network for DDoS attack and to allow evaluation of vulnerabilities and DDoS countermeasures of the networks is necessary. In proposed testbed, Ansible orchestration tool is employed to perform and coordinate DDoS attacks. Ansible is a powerful tool and simplifies the implementation of the test environment. Moreover, no special hardware is required for the attacks execution, the testbed uses existing infrastructure in an organization. The case study of implementation of this environment shows straightforwardness to create a testbed comparable with a botnet with ten thousand bots. Furthermore, the experimental results demonstrate the potential of the proposed environment and present the impact of the attacks on particular target servers in IPv4 and IPv6 networks.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"44 1","pages":"297-316"},"PeriodicalIF":0.6,"publicationDate":"2020-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46686157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Impact of Pair Programming on the Performance of Slow-Paced Students 配对编程对慢节奏学生学习成绩的影响
IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-12-18 DOI: 10.31341/jios.44.2.1
M. Ayub, Oscar Karnalim, Laurentius Risal, M. Wijanto
A study shows that pair programming can help slow-paced students in completing Introductory Programming assessment. This paper replicates the study on Data Structure course, in which the completion of the assessments does not only rely on logic but also theoretical knowledge. The aim is to check whether pair programming is still helpful on such new assessment characteristics. Three classes of Data Structure course with 14 teaching weeks and a total of 72 undergraduate students are considered in this study. Two of the classes are about Basic Data Structure while another one is the advanced one. Our evaluation shows that pair programming can help slow-paced students in both pair and individual academic performance. It also increases overall academic performance if the tasks are more logic oriented. Nevertheless, no benefits provided for fast-paced students paired to the slow-paced ones, even though all students appreciate the use of pair programming.
一项研究表明,结对编程可以帮助慢节奏的学生完成入门编程评估。本文复制了数据结构课程的研究,在该课程中,评估的完成不仅依赖于逻辑,还依赖于理论知识。其目的是检查配对编程是否仍然有助于这种新的评估特征。本研究考虑了三个班的数据结构课程,共14个教学周,共72名本科生。其中两个类是关于基本数据结构的,而另一个类是高级类。我们的评估表明,结对编程可以帮助慢节奏的学生在结对和个人学习表现方面都有所帮助。如果任务更加注重逻辑,它还可以提高整体学习成绩。尽管如此,尽管所有学生都喜欢配对编程,但对于快节奏的学生和慢节奏的学生配对并没有任何好处。
{"title":"The Impact of Pair Programming on the Performance of Slow-Paced Students","authors":"M. Ayub, Oscar Karnalim, Laurentius Risal, M. Wijanto","doi":"10.31341/jios.44.2.1","DOIUrl":"https://doi.org/10.31341/jios.44.2.1","url":null,"abstract":"A study shows that pair programming can help slow-paced students in completing Introductory Programming assessment. This paper replicates the study on Data Structure course, in which the completion of the assessments does not only rely on logic but also theoretical knowledge. The aim is to check whether pair programming is still helpful on such new assessment characteristics. Three classes of Data Structure course with 14 teaching weeks and a total of 72 undergraduate students are considered in this study. Two of the classes are about Basic Data Structure while another one is the advanced one. Our evaluation shows that pair programming can help slow-paced students in both pair and individual academic performance. It also increases overall academic performance if the tasks are more logic oriented. Nevertheless, no benefits provided for fast-paced students paired to the slow-paced ones, even though all students appreciate the use of pair programming.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"44 1","pages":"211-229"},"PeriodicalIF":0.6,"publicationDate":"2020-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45714756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comparison of Approaches for Measuring the Semantic Similarity of Short Texts Based on Word Embeddings 基于词嵌入的短文本语义相似度度量方法比较
IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-12-18 DOI: 10.31341/jios.44.2.2
Karlo Babić, F. Guerra, Sanda Martinčić-Ipšić, A. Meštrović
Measuring the semantic similarity of texts has a vital role in various tasks from the field of natural language processing. In this paper, we describe a set of experiments we carried out to evaluate and compare the performance of different approaches for measuring the semantic similarity of short texts. We perform a comparison of four models based on word embeddings: two variants of Word2Vec (one based on Word2Vec trained on a specific dataset and the second extending it with embeddings of word senses), FastText, and TF-IDF. Since these models provide word vectors, we experiment with various methods that calculate the semantic similarity of short texts based on word vectors. More precisely, for each of these models, we test five methods for aggregating word embeddings into text embedding. We introduced three methods by making variations of two commonly used similarity measures. One method is an extension of the cosine similarity based on centroids, and the other two methods are variations of the Okapi BM25 function. We evaluate all approaches on the two publicly available datasets: SICK and Lee in terms of the Pearson and Spearman correlation. The results indicate that extended methods perform better from the original in most of the cases.
测量文本的语义相似性在自然语言处理领域的各种任务中起着至关重要的作用。在本文中,我们描述了我们进行的一组实验,以评估和比较测量短文本语义相似性的不同方法的性能。我们对基于单词嵌入的四个模型进行了比较:Word2Verc的两个变体(一个基于在特定数据集上训练的Word2Ver,第二个通过词义嵌入对其进行扩展)、FastText和TF-IDF。由于这些模型提供了词向量,我们尝试了各种基于词向量计算短文本语义相似性的方法。更准确地说,对于这些模型中的每一个,我们测试了五种将单词嵌入聚合为文本嵌入的方法。我们通过对两种常用的相似性度量进行变异,介绍了三种方法。一种方法是基于质心的余弦相似性的扩展,另外两种方法是Okapi-BM25函数的变体。我们在两个公开可用的数据集上评估了所有方法:SICK和Lee的Pearson和Spearman相关性。结果表明,在大多数情况下,扩展方法的性能比原来的要好。
{"title":"A Comparison of Approaches for Measuring the Semantic Similarity of Short Texts Based on Word Embeddings","authors":"Karlo Babić, F. Guerra, Sanda Martinčić-Ipšić, A. Meštrović","doi":"10.31341/jios.44.2.2","DOIUrl":"https://doi.org/10.31341/jios.44.2.2","url":null,"abstract":"Measuring the semantic similarity of texts has a vital role in various tasks from the field of natural language processing. In this paper, we describe a set of experiments we carried out to evaluate and compare the performance of different approaches for measuring the semantic similarity of short texts. We perform a comparison of four models based on word embeddings: two variants of Word2Vec (one based on Word2Vec trained on a specific dataset and the second extending it with embeddings of word senses), FastText, and TF-IDF. Since these models provide word vectors, we experiment with various methods that calculate the semantic similarity of short texts based on word vectors. More precisely, for each of these models, we test five methods for aggregating word embeddings into text embedding. We introduced three methods by making variations of two commonly used similarity measures. One method is an extension of the cosine similarity based on centroids, and the other two methods are variations of the Okapi BM25 function. We evaluate all approaches on the two publicly available datasets: SICK and Lee in terms of the Pearson and Spearman correlation. The results indicate that extended methods perform better from the original in most of the cases.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"44 1","pages":"231-246"},"PeriodicalIF":0.6,"publicationDate":"2020-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46637142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Challenges Behind the Development and Increased Use of Open Source Web Content Management Systems 开发和增加使用开源Web内容管理系统背后的安全挑战
IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-06-25 DOI: 10.31341/jios.44.1.9
D. Viduka, V. Kraguljac, Igor Lavrnić
Nowadays the IT market is enriched with free Open Source Web Content Systems offers that are available to all users. No system is perfect, and some of them have better solutions in one segment but are more vulnerable in others and vice versa, all in order to be more user-friendly. The most common form of Content Management System (CMS) implemented on the Internet today is the Web Content Management System(WCMS). This solution includes numerous advantages for site administrators as well as communication with the site designer for all users in order to improve the content, through written remarks, opinions and evaluations of the site content, resulting in a more dynamic and interactive site. This modern approach offers users with a poor IT background the opportunity to be independent and creative in creating their own website. In this paper we present data collected from several websites monitored for various cyber-attacks. Moreover, we will describe and analyze security challenges that follow cyber-attacks. During the monitoring process we followed 15 web addresses over a period of nine months and collected 520 reports of various cyber-attacks. The following analysis presents the different kinds of attacks, their frequency and some of the ways to reduce cyber-attacks to the lowest possible level.
如今,IT市场充斥着所有用户都可以使用的免费开源Web内容系统。没有一个系统是完美的,有些系统在一个部分有更好的解决方案,但在其他部分更脆弱,反之亦然,所有这些都是为了更方便用户。目前在Internet上实现的最常见的内容管理系统(CMS)形式是Web内容管理系统(WCMS)。这种解决方案为网站管理员带来了许多好处,也为所有用户提供了与网站设计师的沟通,以便通过对网站内容的书面评论、意见和评估来改进内容,从而使网站更具活力和互动性。这种现代方法为IT背景较差的用户提供了在创建自己的网站时独立和创造性的机会。在本文中,我们介绍了从几个网站收集的数据,以监测各种网络攻击。此外,我们将描述和分析网络攻击后的安全挑战。在监测过程中,我们在9个月的时间里跟踪了15个网址,收集了520份各种网络攻击的报告。下面的分析提出了不同种类的攻击,它们的频率和一些方法来减少网络攻击到尽可能低的水平。
{"title":"Security Challenges Behind the Development and Increased Use of Open Source Web Content Management Systems","authors":"D. Viduka, V. Kraguljac, Igor Lavrnić","doi":"10.31341/jios.44.1.9","DOIUrl":"https://doi.org/10.31341/jios.44.1.9","url":null,"abstract":"Nowadays the IT market is enriched with free Open Source Web Content Systems offers that are available to all users. No system is perfect, and some of them have better solutions in one segment but are more vulnerable in others and vice versa, all in order to be more user-friendly. The most common form of Content Management System (CMS) implemented on the Internet today is the Web Content Management System(WCMS). This solution includes numerous advantages for site administrators as well as communication with the site designer for all users in order to improve the content, through written remarks, opinions and evaluations of the site content, resulting in a more dynamic and interactive site. This modern approach offers users with a poor IT background the opportunity to be independent and creative in creating their own website. In this paper we present data collected from several websites monitored for various cyber-attacks. Moreover, we will describe and analyze security challenges that follow cyber-attacks. During the monitoring process we followed 15 web addresses over a period of nine months and collected 520 reports of various cyber-attacks. The following analysis presents the different kinds of attacks, their frequency and some of the ways to reduce cyber-attacks to the lowest possible level.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"1 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44759249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identifying Factors Influencing on Agile Practices for Software Development 识别影响软件开发敏捷实践的因素
IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-06-25 DOI: 10.31341/jios.44.1.1
Gloria Arcos-Medina, D. Mauricio
Agile practices are activities or actions that are utilized during software development to improve the quality and productivity of the resulting software. Those practices are influenced by a set of factors that affect the realization of their objectives. The purpose of this study is to determine the influence of organizational factors and the personnel working on the software development project to the agile practices. To this end, a model has been proposed that is composed of six critical success factors derived from the theories of administrative and human behavior and four groups of agile practices, and resulted in identifying 13 factor-practice relationships. The results from 146 questionnaires addressed to individuals involved in the software development process show that the factors of Confidence, Perception of Self-efficacy, Integrity and Availability of the Information and Experiences Learned, and Media Used all have a noteworthy positive influence on teamwork agile practices.
敏捷实践是在软件开发过程中用来提高最终软件的质量和生产力的活动或动作。这些做法受到影响其目标实现的一系列因素的影响。本研究的目的是确定组织因素和从事软件开发项目的人员对敏捷实践的影响。为此,有人提出了一个模型,该模型由源自管理和人类行为理论的六个关键成功因素以及四组敏捷实践组成,并最终确定了13个因素与实践的关系。对参与软件开发过程的个人进行了146份问卷调查,结果表明,信心、自我效能感、信息和经验的完整性和可用性、媒介使用等因素对团队敏捷实践都有显著的正向影响。
{"title":"Identifying Factors Influencing on Agile Practices for Software Development","authors":"Gloria Arcos-Medina, D. Mauricio","doi":"10.31341/jios.44.1.1","DOIUrl":"https://doi.org/10.31341/jios.44.1.1","url":null,"abstract":"Agile practices are activities or actions that are utilized during software development to improve the quality and productivity of the resulting software. Those practices are influenced by a set of factors that affect the realization of their objectives. The purpose of this study is to determine the influence of organizational factors and the personnel working on the software development project to the agile practices. To this end, a model has been proposed that is composed of six critical success factors derived from the theories of administrative and human behavior and four groups of agile practices, and resulted in identifying 13 factor-practice relationships. The results from 146 questionnaires addressed to individuals involved in the software development process show that the factors of Confidence, Perception of Self-efficacy, Integrity and Availability of the Information and Experiences Learned, and Media Used all have a noteworthy positive influence on teamwork agile practices.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.31341/jios.44.1.1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48231455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Machine Translation System for the Industry Domain and Croatian Language 工业领域机器翻译系统与克罗地亚语
IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-06-25 DOI: 10.31341/jios.44.1.2
I. Dunđer
Machine translation is increasingly becoming a hot research topic in information and communication sciences, computer science and computational lingui
机器翻译正日益成为信息与通信科学、计算机科学和计算语言学的研究热点
{"title":"Machine Translation System for the Industry Domain and Croatian Language","authors":"I. Dunđer","doi":"10.31341/jios.44.1.2","DOIUrl":"https://doi.org/10.31341/jios.44.1.2","url":null,"abstract":"Machine translation is increasingly becoming a hot research topic in information and communication sciences, computer science and computational lingui","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"44 1","pages":"33-50"},"PeriodicalIF":0.6,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48515322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Cloud Solution for Securing Medical Image Storage 保护医学图像存储的云解决方案
IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-06-25 DOI: 10.31341/jios.44.1.5
M. Marwan, Abdelkarim Ait Temghart, Fatima Sifou, F. Alshahwan
Cloud computing is an easy-to-use, affordable solution to manage and analyze medical data. Therefore, this paradigm has gained wide acceptance in the healthcare sector as a cost-efficient way for a successful Electronic Medical Records (EMR) implementation. Cloud technology is, however, subject to increasing criticism because of the numerous security vulnerabilities. In this regard, we propose a framework to protect confidential data through the development of new security measures, including compression, secret share scheme and XOR operation. The primary objective of the proposal is to achieve the right balance between security and usability. To this aim, we divide an image into several blocks and then encrypt each piece separately with different cryptographic keys. To enhance privacy and performance, we suggest DepSky architecture to keep data on various storage nodes. Simulation experiments have been conducted to prove the effectiveness of the proposed methodology.
云计算是一种易于使用、价格合理的医疗数据管理和分析解决方案。因此,这种模式作为成功实现电子医疗记录(EMR)的一种经济有效的方式,在医疗保健部门得到了广泛的接受。然而,由于存在大量的安全漏洞,云技术受到越来越多的批评。在这方面,我们提出了一个框架,通过开发新的安全措施来保护机密数据,包括压缩、秘密共享方案和异或操作。该建议的主要目标是在安全性和可用性之间实现适当的平衡。为此,我们将图像分成几个块,然后用不同的加密密钥分别对每个块进行加密。为了增强隐私性和性能,我们建议采用DepSky架构将数据保存在不同的存储节点上。仿真实验证明了该方法的有效性。
{"title":"A Cloud Solution for Securing Medical Image Storage","authors":"M. Marwan, Abdelkarim Ait Temghart, Fatima Sifou, F. Alshahwan","doi":"10.31341/jios.44.1.5","DOIUrl":"https://doi.org/10.31341/jios.44.1.5","url":null,"abstract":"Cloud computing is an easy-to-use, affordable solution to manage and analyze medical data. Therefore, this paradigm has gained wide acceptance in the healthcare sector as a cost-efficient way for a successful Electronic Medical Records (EMR) implementation. Cloud technology is, however, subject to increasing criticism because of the numerous security vulnerabilities. In this regard, we propose a framework to protect confidential data through the development of new security measures, including compression, secret share scheme and XOR operation. The primary objective of the proposal is to achieve the right balance between security and usability. To this aim, we divide an image into several blocks and then encrypt each piece separately with different cryptographic keys. To enhance privacy and performance, we suggest DepSky architecture to keep data on various storage nodes. Simulation experiments have been conducted to prove the effectiveness of the proposed methodology.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":"44 1","pages":"113-139"},"PeriodicalIF":0.6,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44166885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Does Cloud-Based Accounting Information System Harmonize the Small Business Needs? 基于云的会计信息系统是否协调了小企业的需求?
IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-06-25 DOI: 10.31341/jios.44.1.6
B. Pramuka, Margani Pinasti
Cloud technology is now becoming a valuable resource, as it provides cost-saving business technology. Businesses exist to earn a profit by keeping their capital and expenses low. In an attempt to address the issue, this study employs structural equation model to complement literature on users' technology acceptance behavior. The framework of the study was based on the technology acceptance model (TAM) to better understand the adoption of cloud computing by small businesses owners. This study looks at the perception and attitudes of small businesses (SMEs) towards cloud technology based accounting information systems, therefore, their intention to adopt the technology. Result support the view that perceived usefulness, ease of use and credibility positively influenced SMEs' attitudes towards cloud-based accounting information systems and therefore their intention to adopt the technology. The result enhances literature in the field of cloud-based accounting systems for small businesses.
云技术现在正成为一种宝贵的资源,因为它提供了节省成本的商业技术。企业的存在是为了通过保持低资本和低支出来赚取利润。为了解决这个问题,本研究采用结构方程模型来补充关于用户技术接受行为的文献。该研究的框架基于技术接受模型(TAM),以更好地了解小企业主对云计算的采用情况。本研究考察了小企业(SME)对基于云技术的会计信息系统的看法和态度,以及他们采用该技术的意图。结果支持这样一种观点,即感知的有用性、易用性和可信度对中小企业对基于云的会计信息系统的态度产生了积极影响,从而影响了他们采用该技术的意图。这一结果增强了小企业基于云的会计系统领域的文献。
{"title":"Does Cloud-Based Accounting Information System Harmonize the Small Business Needs?","authors":"B. Pramuka, Margani Pinasti","doi":"10.31341/jios.44.1.6","DOIUrl":"https://doi.org/10.31341/jios.44.1.6","url":null,"abstract":"Cloud technology is now becoming a valuable resource, as it provides cost-saving business technology. Businesses exist to earn a profit by keeping their capital and expenses low. In an attempt to address the issue, this study employs structural equation model to complement literature on users' technology acceptance behavior. The framework of the study was based on the technology acceptance model (TAM) to better understand the adoption of cloud computing by small businesses owners. This study looks at the perception and attitudes of small businesses (SMEs) towards cloud technology based accounting information systems, therefore, their intention to adopt the technology. Result support the view that perceived usefulness, ease of use and credibility positively influenced SMEs' attitudes towards cloud-based accounting information systems and therefore their intention to adopt the technology. The result enhances literature in the field of cloud-based accounting systems for small businesses.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49042739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Help Me TripAdvisor! Examining the Relationship between TripAdvisor e-WOM Attributes, Trusts towards Online Reviews and Travellers Behavioural Intentions 帮助我TripAdvisor!TripAdvisor电子口碑属性、对在线评论的信任与旅行者行为意向之间的关系研究
IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-06-25 DOI: 10.31341/jios.44.1.4
Nur Zarifah Dhabitah Mahat, M. Hanafiah
This paper aims to examine the impact of TripAdvisor reviews on behavioural intentions, basing on travellers' trust towards the e-WOM reviews. Four factors are proposed for building travellers’ trust and behavioural intentions: information quality, credibility, adoption and usefulness. Trust is expected to mediate the relationship between eWOM attributes and travellers’ behavioural intention. Data from 410 travellers were analysed using Partial Least Square-Structural Equation Modeling (PLS-SEM), and the findings show that TripAdvisor e-WOM attributes (information credibility, adoption and usefulness) significantly influence the traveller's trust. Besides, traveller behavioural intention was influenced considerably by TripAdvisor eWOM information credibility and usefulness. Lastly, trust in e-WOM significantly mediates travellers' behavioural intention. This paper confirms the importance of eWOM in the context of the tourism industry and travellers' trust and behaviour towards online review, which altered how consumers behave before deciding to travel.
本文旨在基于旅行者对e-WOM评论的信任,研究TripAdvisor评论对行为意向的影响。对于建立旅行者的信任和行为意向,提出了四个因素:信息质量、可信度、采纳和有用性。信任在eWOM属性与出境者行为意愿之间起中介作用。我们使用偏最小二乘结构方程模型(PLS-SEM)分析了410名旅行者的数据,结果表明TripAdvisor e-口碑属性(信息可信度、采用度和有用性)显著影响旅行者的信任度。此外,TripAdvisor eWOM信息可信度和有用性对旅行者的行为意愿有显著影响。最后,对电子口碑的信任显著调节旅行者的行为意愿。本文证实了eom在旅游业和旅行者对在线评论的信任和行为的背景下的重要性,这改变了消费者在决定旅行之前的行为。
{"title":"Help Me TripAdvisor! Examining the Relationship between TripAdvisor e-WOM Attributes, Trusts towards Online Reviews and Travellers Behavioural Intentions","authors":"Nur Zarifah Dhabitah Mahat, M. Hanafiah","doi":"10.31341/jios.44.1.4","DOIUrl":"https://doi.org/10.31341/jios.44.1.4","url":null,"abstract":"This paper aims to examine the impact of TripAdvisor reviews on behavioural intentions, basing on travellers' trust towards the e-WOM reviews. Four factors are proposed for building travellers’ trust and behavioural intentions: information quality, credibility, adoption and usefulness. Trust is expected to mediate the relationship between eWOM attributes and travellers’ behavioural intention. Data from 410 travellers were analysed using Partial Least Square-Structural Equation Modeling (PLS-SEM), and the findings show that TripAdvisor e-WOM attributes (information credibility, adoption and usefulness) significantly influence the traveller's trust. Besides, traveller behavioural intention was influenced considerably by TripAdvisor eWOM information credibility and usefulness. Lastly, trust in e-WOM significantly mediates travellers' behavioural intention. This paper confirms the importance of eWOM in the context of the tourism industry and travellers' trust and behaviour towards online review, which altered how consumers behave before deciding to travel.","PeriodicalId":43428,"journal":{"name":"Journal of Information and Organizational Sciences","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.31341/jios.44.1.4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45109808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
Journal of Information and Organizational Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1