首页 > 最新文献

2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

英文 中文
Effects of lexicon size on solving bananagrams 词汇量对香蕉图解题的影响
Paul Helling, Ahana Roy, Aspen Olmsted
In this paper, we investigate the problem of playing Bananagrams with a computer player. Bananagrams is a fast-paced board game where players compete to place and rearrange their letter tiles as quickly as possible. Despite being superficially similar Scrabble, Bananagrams is not nearly as well studied. We seek to address this knowledge gap by designing a simple program that plays Bananagrams by itself. In this paper, we investigate the effects of lexicon size on the ability of the program to play Bananagrams. We found that using a larger lexicon was slower but increased the win rate.
在本文中,我们研究了用电脑玩家玩香蕉图的问题。香蕉拼图是一款快节奏的棋盘游戏,玩家需要尽可能快地放置和重新排列字母贴图。尽管表面上类似于Scrabble,但香蕉拼图并没有得到很好的研究。我们试图通过设计一个简单的程序来解决这个知识差距,这个程序可以自己玩香蕉图。在本文中,我们研究了词汇大小对程序玩香蕉图能力的影响。我们发现,使用更大的词汇会更慢,但会增加胜率。
{"title":"Effects of lexicon size on solving bananagrams","authors":"Paul Helling, Ahana Roy, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356413","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356413","url":null,"abstract":"In this paper, we investigate the problem of playing Bananagrams with a computer player. Bananagrams is a fast-paced board game where players compete to place and rearrange their letter tiles as quickly as possible. Despite being superficially similar Scrabble, Bananagrams is not nearly as well studied. We seek to address this knowledge gap by designing a simple program that plays Bananagrams by itself. In this paper, we investigate the effects of lexicon size on the ability of the program to play Bananagrams. We found that using a larger lexicon was slower but increased the win rate.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125689511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preventing vendor lock-ins via an interoperable multi-cloud deployment approach 通过可互操作的多云部署方法防止供应商锁定
R. Pellegrini, Patrick Rottmann, G. Strieder
A vendor lock-in makes customers dependent of a propriety product, service or technology provided by a vendor. In terms of cloud services, it is achieved by providing and developing services that are platform-dependent with proprietary technologies, interfaces or formats. This can be a huge barrier to adopt cloud services because customers are tied to specific vendors which prevent portability through proprietary or a limited set of interfaces. As consequence, customers are hindered to alternate venders easily without substantial migration costs. A multi-cloud strategy is one possible way to avoid vendor lock-ins. The scope of the is paper is to design and implement a solution-stack to provide web services which operate independent from proprietary cloud service provider technologies. We provide a solution stack prototype which will support key functionalities such as portability, interoperability and platform-independency by implementing modern technologies and standards.
供应商锁定使客户依赖于供应商提供的专有产品、服务或技术。就云服务而言,它是通过提供和开发具有专有技术、接口或格式的平台相关服务来实现的。这可能是采用云服务的一个巨大障碍,因为客户与特定的供应商绑定在一起,这阻碍了通过专有或有限的接口集进行可移植性。因此,客户在没有大量迁移成本的情况下很容易更换供应商。多云策略是避免供应商锁定的一种可能方法。本文的范围是设计和实现一个解决方案栈,以提供独立于专有云服务提供商技术运行的web服务。我们提供了一个解决方案栈原型,它将通过实现现代技术和标准来支持诸如可移植性、互操作性和平台独立性等关键功能。
{"title":"Preventing vendor lock-ins via an interoperable multi-cloud deployment approach","authors":"R. Pellegrini, Patrick Rottmann, G. Strieder","doi":"10.23919/ICITST.2017.8356428","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356428","url":null,"abstract":"A vendor lock-in makes customers dependent of a propriety product, service or technology provided by a vendor. In terms of cloud services, it is achieved by providing and developing services that are platform-dependent with proprietary technologies, interfaces or formats. This can be a huge barrier to adopt cloud services because customers are tied to specific vendors which prevent portability through proprietary or a limited set of interfaces. As consequence, customers are hindered to alternate venders easily without substantial migration costs. A multi-cloud strategy is one possible way to avoid vendor lock-ins. The scope of the is paper is to design and implement a solution-stack to provide web services which operate independent from proprietary cloud service provider technologies. We provide a solution stack prototype which will support key functionalities such as portability, interoperability and platform-independency by implementing modern technologies and standards.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124506117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
intel-LEACH: An optimal framework for node selection using dynamic clustering for wireless sensor networks 基于动态聚类的无线传感器网络节点选择优化框架
Prathap Siddavaatam, R. Sedaghat, A. Sharma
Over the last decade, the field of Wireless Sensor Networks (WSNs) has made expansive strides in the area of Radio Communication Systems. A vast majority of these systems are deployed in failure-prone environments which results in chronic communication losses due to unreliable wireless connections, malicious attacks and resource-constrained features. Hence WSNs necessitate adaptive protocol frameworks applicable for differing network densities either as sparse or denser deployments. One of the major challenges in WSNs is to achieve an optimal trade-off between data precision and energy efficiency of a sensor node from the perspective of network longevity. In this article, we propose an optimized protocol intel-LEACH for selecting high yield nodes among randomly deployed sensor nodes based on dynamic optimization strategy. Our proposed model selects a node that can guarantee higher data precision and has maximal residual energy to serve as a cluster head (CH). Meanwhile, the others sensor nodes apart from CHs must also exhibit capability in terms of data transmission accuracy to join a given cluster irrespective of the distance between the sensor nodes and CHs. Thus our model minimizes loss of high yield nodes for every round and overall WSN performance is boosted by its network lifetime extension.
在过去的十年中,无线传感器网络(WSNs)在无线电通信系统领域取得了长足的进步。这些系统绝大多数部署在故障易发的环境中,由于不可靠的无线连接、恶意攻击和资源受限的特点,导致长期通信丢失。因此,wsn需要适用于不同网络密度的自适应协议框架,无论是稀疏部署还是密集部署。从网络寿命的角度来看,如何在传感器节点的数据精度和能量效率之间实现最佳平衡是无线传感器网络面临的主要挑战之一。本文提出了一种基于动态优化策略从随机部署的传感器节点中选择高产节点的优化协议intel-LEACH。该模型选择数据精度高、剩余能量最大的节点作为簇头(CH)。同时,除了CHs之外的其他传感器节点也必须在数据传输精度方面表现出加入给定集群的能力,而不考虑传感器节点与CHs之间的距离。因此,我们的模型最大限度地减少了每轮高收益节点的损失,并且通过网络生命周期的延长提高了WSN的整体性能。
{"title":"intel-LEACH: An optimal framework for node selection using dynamic clustering for wireless sensor networks","authors":"Prathap Siddavaatam, R. Sedaghat, A. Sharma","doi":"10.23919/ICITST.2017.8356419","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356419","url":null,"abstract":"Over the last decade, the field of Wireless Sensor Networks (WSNs) has made expansive strides in the area of Radio Communication Systems. A vast majority of these systems are deployed in failure-prone environments which results in chronic communication losses due to unreliable wireless connections, malicious attacks and resource-constrained features. Hence WSNs necessitate adaptive protocol frameworks applicable for differing network densities either as sparse or denser deployments. One of the major challenges in WSNs is to achieve an optimal trade-off between data precision and energy efficiency of a sensor node from the perspective of network longevity. In this article, we propose an optimized protocol intel-LEACH for selecting high yield nodes among randomly deployed sensor nodes based on dynamic optimization strategy. Our proposed model selects a node that can guarantee higher data precision and has maximal residual energy to serve as a cluster head (CH). Meanwhile, the others sensor nodes apart from CHs must also exhibit capability in terms of data transmission accuracy to join a given cluster irrespective of the distance between the sensor nodes and CHs. Thus our model minimizes loss of high yield nodes for every round and overall WSN performance is boosted by its network lifetime extension.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132160256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Shared situational awareness in information security incident management 信息安全事件管理中的共享态势感知
Keshnee Padayachee, Elias Worku
The role of participatory reportage and awareness-raising in the process of Information Security Incident Management (ISIM) has been identified as a critical approach towards proactive information security in organizations. Studies show that reporting, communication and awareness processes are fragmented and imprecise. This paper presents a review and discussion of the concept of Shared Situational Awareness towards addressing this concern. Based on this review of extant literature, this paper aims to propose a conceptual model combining the planned and participatory reporting and awareness mechanisms of Shared Situational Awareness in organizations, towards improving the process of ISIM.
参与式报告和提高意识在信息安全事件管理(ISIM)过程中的作用已被确定为实现组织主动信息安全的关键方法。研究表明,报告、沟通和意识过程是碎片化和不精确的。本文对共享态势感知的概念进行了回顾和讨论,以解决这一问题。在回顾现有文献的基础上,本文旨在提出一个概念模型,将组织中共享态势感知的计划性、参与性报告和意识机制结合起来,以改进ISIM的过程。
{"title":"Shared situational awareness in information security incident management","authors":"Keshnee Padayachee, Elias Worku","doi":"10.23919/ICITST.2017.8356454","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356454","url":null,"abstract":"The role of participatory reportage and awareness-raising in the process of Information Security Incident Management (ISIM) has been identified as a critical approach towards proactive information security in organizations. Studies show that reporting, communication and awareness processes are fragmented and imprecise. This paper presents a review and discussion of the concept of Shared Situational Awareness towards addressing this concern. Based on this review of extant literature, this paper aims to propose a conceptual model combining the planned and participatory reporting and awareness mechanisms of Shared Situational Awareness in organizations, towards improving the process of ISIM.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124942509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reveal false names of accounts as a result of hackers attacks: Security systems with heightened safety of information 揭露因黑客攻击而导致的虚假帐户名称:提高信息安全性的安全系统
D. Andreev, S. Petrakieva, I. Taralova
The aim of the paper is to reveal false names of accounts as a result of hackers attacks. The probability a given account to be either false or actual is calculated using methods for machine learning analysis. The suspected account will be used as a pattern and by classification techniques clusters will be formed with a respective probability this name to be false. The purpose of investigation is to determine if there exists a trend, which arises during the creation of new accounts, to detect the false ones and to discriminate them from the real ones independently of that if two types of accounts are generated with the same speed. These security systems are applied in different areas, where the security of the data in users' accounts is required. For example, they can be used in on-line voting for balloting, in studying the social opinion by inquiries, in protection of the information in different user accounts of given system etc.
这篇论文的目的是揭露因黑客攻击而导致的虚假账户名。使用机器学习分析方法计算给定帐户为假或为真的概率。可疑的帐户将被用作模式,通过分类技术将以该名称为假的相应概率形成集群。调查的目的是确定在创建新账户的过程中是否存在一种趋势,以检测虚假账户并将其与真实账户区分开来,而不是以相同的速度生成两种类型的账户。这些安全系统应用于不同的领域,这些领域对用户帐户中的数据的安全性有要求。例如,它们可以用于网上投票,通过查询来研究社会舆论,保护特定系统中不同用户帐户的信息等。
{"title":"Reveal false names of accounts as a result of hackers attacks: Security systems with heightened safety of information","authors":"D. Andreev, S. Petrakieva, I. Taralova","doi":"10.23919/ICITST.2017.8356342","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356342","url":null,"abstract":"The aim of the paper is to reveal false names of accounts as a result of hackers attacks. The probability a given account to be either false or actual is calculated using methods for machine learning analysis. The suspected account will be used as a pattern and by classification techniques clusters will be formed with a respective probability this name to be false. The purpose of investigation is to determine if there exists a trend, which arises during the creation of new accounts, to detect the false ones and to discriminate them from the real ones independently of that if two types of accounts are generated with the same speed. These security systems are applied in different areas, where the security of the data in users' accounts is required. For example, they can be used in on-line voting for balloting, in studying the social opinion by inquiries, in protection of the information in different user accounts of given system etc.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126181138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data visibility and trust enhancement of enterprise customers in cloud computing services 云计算服务中企业客户的数据可见性和信任增强
W. P. Yuen, K. B. Chuah
This Cloud computing is a pervasive technology and has been a platform in IT for several years. Cloud service providers (CSP) have developed and offered different service platforms to accommodate different needs of enterprise subscribers. However, there still exists the situation of enterprise customers' hesitation and reluctance to deploy their core applications using cloud service platforms. Our survey results show that security is the perceived major concern of existing and prospective enterprise customers of cloud services. The research investigates the trust between enterprise customers and cloud service provider with regards to the perceived security of cloud services. Enterprise customers expected to be reassured of cloud service security in a more visible way from cloud service provider. The perception of data security in cloud computing platform can be enhanced by data visibility. The term data visibility has been widely used in the IT industry especially from ICT product and solution vendors. However, there is no common practice guideline or standard in industry. This paper defines the characteristic and elements of data visibility and proposes a model and architecture as best practice reference for the industry. We expect that the enhancement of data visibility can earn the trust of enterprise customers in adopting public cloud services.
云计算是一种普及的技术,多年来一直是IT领域的一个平台。云服务提供商(CSP)开发并提供了不同的服务平台,以适应企业用户的不同需求。然而,企业客户对于将其核心应用部署到云服务平台上仍然存在犹豫和不情愿的情况。我们的调查结果显示,安全是云服务的现有和潜在企业客户所关注的主要问题。本研究调查了企业客户与云服务提供商之间对云服务安全感知的信任程度。企业客户希望从云服务提供商那里以更明显的方式获得云服务安全性的保证。云计算平台中数据的可见性可以增强对数据安全的感知。数据可见性这个术语在IT行业中被广泛使用,尤其是在ICT产品和解决方案供应商中。然而,在行业中并没有通用的实践指南或标准。本文定义了数据可见性的特征和要素,并提出了一个模型和架构,作为业界的最佳实践参考。我们期望通过数据可见性的增强,能够赢得企业客户对采用公有云服务的信任。
{"title":"Data visibility and trust enhancement of enterprise customers in cloud computing services","authors":"W. P. Yuen, K. B. Chuah","doi":"10.23919/ICITST.2017.8356435","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356435","url":null,"abstract":"This Cloud computing is a pervasive technology and has been a platform in IT for several years. Cloud service providers (CSP) have developed and offered different service platforms to accommodate different needs of enterprise subscribers. However, there still exists the situation of enterprise customers' hesitation and reluctance to deploy their core applications using cloud service platforms. Our survey results show that security is the perceived major concern of existing and prospective enterprise customers of cloud services. The research investigates the trust between enterprise customers and cloud service provider with regards to the perceived security of cloud services. Enterprise customers expected to be reassured of cloud service security in a more visible way from cloud service provider. The perception of data security in cloud computing platform can be enhanced by data visibility. The term data visibility has been widely used in the IT industry especially from ICT product and solution vendors. However, there is no common practice guideline or standard in industry. This paper defines the characteristic and elements of data visibility and proposes a model and architecture as best practice reference for the industry. We expect that the enhancement of data visibility can earn the trust of enterprise customers in adopting public cloud services.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115636723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multiple assignment secret sharing scheme using hierarchical threshold scheme 采用分层阈值方案的多任务秘密共享方案
Kouya Tochikubo
We propose a new secret sharing scheme realizing general access structures, which is based on unauthorized subsets. In the proposed scheme, shares are generated by Tassa's (k, n)-hierarchical threshold scheme. The proposed scheme can reduce the number of shares distributed to each participant.
提出了一种基于未授权子集的通用访问结构的秘密共享方案。在该方案中,股票由Tassa的(k, n)分层阈值方案生成。所提出的方案可以减少分配给每个参与者的股份数量。
{"title":"Multiple assignment secret sharing scheme using hierarchical threshold scheme","authors":"Kouya Tochikubo","doi":"10.23919/ICITST.2017.8356447","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356447","url":null,"abstract":"We propose a new secret sharing scheme realizing general access structures, which is based on unauthorized subsets. In the proposed scheme, shares are generated by Tassa's (k, n)-hierarchical threshold scheme. The proposed scheme can reduce the number of shares distributed to each participant.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114670455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Customer churn analysis : A case study on the telecommunication industry of Thailand 顾客流失分析:以泰国电信业为例
Paweena Wanchai
Customer churn creates a huge anxiety in highly competitive service sectors especially the telecommunications sector. The objective of this research was to develop a predictive churn model to predict the customers that will be to churn; this is the first step to construct a retention management plan. The dataset was extracted from the data warehouse of the mobile telecommunication company in Thailand. The system generated the customer list, to implement a retention campaign to manage the customers with tendency to leave the company. WEKA software was used to implement the followings techniques: C4.5 decision trees algorithm, the logistic regression algorithm and the neural network algorithm. The C4.5 algorithm of decision trees proved optimal among the models. The findings are unequivocally beneficial to industry and other partners.
在竞争激烈的服务行业,尤其是电信行业,客户流失造成了巨大的焦虑。本研究的目的是开发一个预测流失模型,以预测将流失的客户;这是构建留存管理计划的第一步。数据集是从泰国移动电信公司的数据仓库中提取的。系统生成客户名单,实施挽留活动,对有离开公司倾向的客户进行管理。使用WEKA软件实现以下技术:C4.5决策树算法、逻辑回归算法和神经网络算法。决策树的C4.5算法在模型中被证明是最优的。研究结果无疑对工业界和其他合作伙伴有利。
{"title":"Customer churn analysis : A case study on the telecommunication industry of Thailand","authors":"Paweena Wanchai","doi":"10.23919/ICITST.2017.8356410","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356410","url":null,"abstract":"Customer churn creates a huge anxiety in highly competitive service sectors especially the telecommunications sector. The objective of this research was to develop a predictive churn model to predict the customers that will be to churn; this is the first step to construct a retention management plan. The dataset was extracted from the data warehouse of the mobile telecommunication company in Thailand. The system generated the customer list, to implement a retention campaign to manage the customers with tendency to leave the company. WEKA software was used to implement the followings techniques: C4.5 decision trees algorithm, the logistic regression algorithm and the neural network algorithm. The C4.5 algorithm of decision trees proved optimal among the models. The findings are unequivocally beneficial to industry and other partners.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115012366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The study of public organization's intention to use an open government data assessment application: Testing with an applicable TAM 公共组织使用开放政府数据评估应用程序的意图研究:使用适用的TAM进行测试
Chatipot Srimuang, N. Cooharojananone, U. Tanlamai, A. Chandrachai, K. Atchariyachanvanich
Open Government Data (OGD) project can help citizen to better understand government administrations. In the open data initiatives. Thailand is now in the process of providing a draft OGD country roadmap. This paper, we develop OGD assessment application based on our developed assessment model and test the application acceptance. The developed assessment model consists of nine components which include the enterprise architecture as a new the assessment component. The enterprise architecture is now becoming the key activity to transform the digital government. Therefore, to enhance the user experience in assessment, the web-based application is developed. Testing the application acceptance by using Technology Acceptance Model (TAM). The data were collected from 30 public organizations. The result shows that most public organizations intend to use the application proposed model.
政府数据公开项目可以帮助公民更好地了解政府管理。在开放数据倡议中。泰国目前正在提供OGD国家路线图草案。本文在开发的OGD评估模型的基础上开发了OGD评估应用程序,并对应用程序的验收情况进行了测试。所开发的评估模型由九个组件组成,其中企业体系结构是一个新的评估组件。企业架构正在成为数字化政府转型的关键活动。因此,为了提高用户在评估中的体验,我们开发了基于web的应用程序。使用技术接受模型(TAM)测试应用程序的接受程度。这些数据是从30个公共机构收集的。结果表明,大多数公共组织都有使用该模型的意向。
{"title":"The study of public organization's intention to use an open government data assessment application: Testing with an applicable TAM","authors":"Chatipot Srimuang, N. Cooharojananone, U. Tanlamai, A. Chandrachai, K. Atchariyachanvanich","doi":"10.23919/ICITST.2017.8356389","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356389","url":null,"abstract":"Open Government Data (OGD) project can help citizen to better understand government administrations. In the open data initiatives. Thailand is now in the process of providing a draft OGD country roadmap. This paper, we develop OGD assessment application based on our developed assessment model and test the application acceptance. The developed assessment model consists of nine components which include the enterprise architecture as a new the assessment component. The enterprise architecture is now becoming the key activity to transform the digital government. Therefore, to enhance the user experience in assessment, the web-based application is developed. Testing the application acceptance by using Technology Acceptance Model (TAM). The data were collected from 30 public organizations. The result shows that most public organizations intend to use the application proposed model.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123389513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Factors affecting the implementation of information assurance for eGovernment in Indonesia 影响印尼电子政府资讯保障实施的因素
R. Utomo, R. Walters, G. Wills
Electronic government (eGovernment) services are aimed to improve government services to the public by improving the quality and availability of services that can be accessed regardless of time and place. Consequently, the services must always be available at any time, and any threat to the information and systems should receive attention to ensure business continuity in the event of an incident. Accordingly, in the implementation of eGovernment, information assurance (IA) should be considered. In Indonesia, the implementation of eGovernment is still in the early stage according to the eGovernment roadmap of Indonesia. However, there is no study so far that has focused on IA for eGovernment in Indonesia. Therefore, research on a framework of IA is needed to support the implementation of eGovernment in Indonesia. The aim of this research is to develop an IA framework for eGovernment within the Indonesian context. The development of the framework is divided into four stages, which are identifying the factors from IA international standards for organisations, determining success factors from literature, identifying the challenges, and evaluating and harmonising all the factors categorised into three categories. This research proposes an IA framework, which is expected to assist eGovernment implementation in Indonesia.
电子政府服务旨在改善政府向市民提供的服务的质素和可用性,使市民不论时间和地点均可获得这些服务。因此,服务必须在任何时候都是可用的,任何对信息和系统的威胁都应该得到关注,以确保在事件发生时业务的连续性。因此,在实施电子政府时,应考虑信息保障(IA)。在印尼,根据印尼的电子政务路线图,电子政务的实施仍处于早期阶段。然而,到目前为止,还没有研究集中在印度尼西亚的电子政务IA。因此,需要对IA框架进行研究,以支持印度尼西亚电子政务的实施。本研究的目的是在印度尼西亚的背景下为电子政务开发一个IA框架。该框架的发展分为四个阶段,分别是从IA国际标准中为组织确定因素,从文献中确定成功因素,确定挑战,以及评估和协调分为三类的所有因素。本研究提出了一个IA框架,预计将有助于印度尼西亚电子政府的实施。
{"title":"Factors affecting the implementation of information assurance for eGovernment in Indonesia","authors":"R. Utomo, R. Walters, G. Wills","doi":"10.23919/ICITST.2017.8356388","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356388","url":null,"abstract":"Electronic government (eGovernment) services are aimed to improve government services to the public by improving the quality and availability of services that can be accessed regardless of time and place. Consequently, the services must always be available at any time, and any threat to the information and systems should receive attention to ensure business continuity in the event of an incident. Accordingly, in the implementation of eGovernment, information assurance (IA) should be considered. In Indonesia, the implementation of eGovernment is still in the early stage according to the eGovernment roadmap of Indonesia. However, there is no study so far that has focused on IA for eGovernment in Indonesia. Therefore, research on a framework of IA is needed to support the implementation of eGovernment in Indonesia. The aim of this research is to develop an IA framework for eGovernment within the Indonesian context. The development of the framework is divided into four stages, which are identifying the factors from IA international standards for organisations, determining success factors from literature, identifying the challenges, and evaluating and harmonising all the factors categorised into three categories. This research proposes an IA framework, which is expected to assist eGovernment implementation in Indonesia.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124643194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1