Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356413
Paul Helling, Ahana Roy, Aspen Olmsted
In this paper, we investigate the problem of playing Bananagrams with a computer player. Bananagrams is a fast-paced board game where players compete to place and rearrange their letter tiles as quickly as possible. Despite being superficially similar Scrabble, Bananagrams is not nearly as well studied. We seek to address this knowledge gap by designing a simple program that plays Bananagrams by itself. In this paper, we investigate the effects of lexicon size on the ability of the program to play Bananagrams. We found that using a larger lexicon was slower but increased the win rate.
{"title":"Effects of lexicon size on solving bananagrams","authors":"Paul Helling, Ahana Roy, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356413","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356413","url":null,"abstract":"In this paper, we investigate the problem of playing Bananagrams with a computer player. Bananagrams is a fast-paced board game where players compete to place and rearrange their letter tiles as quickly as possible. Despite being superficially similar Scrabble, Bananagrams is not nearly as well studied. We seek to address this knowledge gap by designing a simple program that plays Bananagrams by itself. In this paper, we investigate the effects of lexicon size on the ability of the program to play Bananagrams. We found that using a larger lexicon was slower but increased the win rate.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125689511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356428
R. Pellegrini, Patrick Rottmann, G. Strieder
A vendor lock-in makes customers dependent of a propriety product, service or technology provided by a vendor. In terms of cloud services, it is achieved by providing and developing services that are platform-dependent with proprietary technologies, interfaces or formats. This can be a huge barrier to adopt cloud services because customers are tied to specific vendors which prevent portability through proprietary or a limited set of interfaces. As consequence, customers are hindered to alternate venders easily without substantial migration costs. A multi-cloud strategy is one possible way to avoid vendor lock-ins. The scope of the is paper is to design and implement a solution-stack to provide web services which operate independent from proprietary cloud service provider technologies. We provide a solution stack prototype which will support key functionalities such as portability, interoperability and platform-independency by implementing modern technologies and standards.
{"title":"Preventing vendor lock-ins via an interoperable multi-cloud deployment approach","authors":"R. Pellegrini, Patrick Rottmann, G. Strieder","doi":"10.23919/ICITST.2017.8356428","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356428","url":null,"abstract":"A vendor lock-in makes customers dependent of a propriety product, service or technology provided by a vendor. In terms of cloud services, it is achieved by providing and developing services that are platform-dependent with proprietary technologies, interfaces or formats. This can be a huge barrier to adopt cloud services because customers are tied to specific vendors which prevent portability through proprietary or a limited set of interfaces. As consequence, customers are hindered to alternate venders easily without substantial migration costs. A multi-cloud strategy is one possible way to avoid vendor lock-ins. The scope of the is paper is to design and implement a solution-stack to provide web services which operate independent from proprietary cloud service provider technologies. We provide a solution stack prototype which will support key functionalities such as portability, interoperability and platform-independency by implementing modern technologies and standards.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124506117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356419
Prathap Siddavaatam, R. Sedaghat, A. Sharma
Over the last decade, the field of Wireless Sensor Networks (WSNs) has made expansive strides in the area of Radio Communication Systems. A vast majority of these systems are deployed in failure-prone environments which results in chronic communication losses due to unreliable wireless connections, malicious attacks and resource-constrained features. Hence WSNs necessitate adaptive protocol frameworks applicable for differing network densities either as sparse or denser deployments. One of the major challenges in WSNs is to achieve an optimal trade-off between data precision and energy efficiency of a sensor node from the perspective of network longevity. In this article, we propose an optimized protocol intel-LEACH for selecting high yield nodes among randomly deployed sensor nodes based on dynamic optimization strategy. Our proposed model selects a node that can guarantee higher data precision and has maximal residual energy to serve as a cluster head (CH). Meanwhile, the others sensor nodes apart from CHs must also exhibit capability in terms of data transmission accuracy to join a given cluster irrespective of the distance between the sensor nodes and CHs. Thus our model minimizes loss of high yield nodes for every round and overall WSN performance is boosted by its network lifetime extension.
{"title":"intel-LEACH: An optimal framework for node selection using dynamic clustering for wireless sensor networks","authors":"Prathap Siddavaatam, R. Sedaghat, A. Sharma","doi":"10.23919/ICITST.2017.8356419","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356419","url":null,"abstract":"Over the last decade, the field of Wireless Sensor Networks (WSNs) has made expansive strides in the area of Radio Communication Systems. A vast majority of these systems are deployed in failure-prone environments which results in chronic communication losses due to unreliable wireless connections, malicious attacks and resource-constrained features. Hence WSNs necessitate adaptive protocol frameworks applicable for differing network densities either as sparse or denser deployments. One of the major challenges in WSNs is to achieve an optimal trade-off between data precision and energy efficiency of a sensor node from the perspective of network longevity. In this article, we propose an optimized protocol intel-LEACH for selecting high yield nodes among randomly deployed sensor nodes based on dynamic optimization strategy. Our proposed model selects a node that can guarantee higher data precision and has maximal residual energy to serve as a cluster head (CH). Meanwhile, the others sensor nodes apart from CHs must also exhibit capability in terms of data transmission accuracy to join a given cluster irrespective of the distance between the sensor nodes and CHs. Thus our model minimizes loss of high yield nodes for every round and overall WSN performance is boosted by its network lifetime extension.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132160256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356454
Keshnee Padayachee, Elias Worku
The role of participatory reportage and awareness-raising in the process of Information Security Incident Management (ISIM) has been identified as a critical approach towards proactive information security in organizations. Studies show that reporting, communication and awareness processes are fragmented and imprecise. This paper presents a review and discussion of the concept of Shared Situational Awareness towards addressing this concern. Based on this review of extant literature, this paper aims to propose a conceptual model combining the planned and participatory reporting and awareness mechanisms of Shared Situational Awareness in organizations, towards improving the process of ISIM.
{"title":"Shared situational awareness in information security incident management","authors":"Keshnee Padayachee, Elias Worku","doi":"10.23919/ICITST.2017.8356454","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356454","url":null,"abstract":"The role of participatory reportage and awareness-raising in the process of Information Security Incident Management (ISIM) has been identified as a critical approach towards proactive information security in organizations. Studies show that reporting, communication and awareness processes are fragmented and imprecise. This paper presents a review and discussion of the concept of Shared Situational Awareness towards addressing this concern. Based on this review of extant literature, this paper aims to propose a conceptual model combining the planned and participatory reporting and awareness mechanisms of Shared Situational Awareness in organizations, towards improving the process of ISIM.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124942509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356342
D. Andreev, S. Petrakieva, I. Taralova
The aim of the paper is to reveal false names of accounts as a result of hackers attacks. The probability a given account to be either false or actual is calculated using methods for machine learning analysis. The suspected account will be used as a pattern and by classification techniques clusters will be formed with a respective probability this name to be false. The purpose of investigation is to determine if there exists a trend, which arises during the creation of new accounts, to detect the false ones and to discriminate them from the real ones independently of that if two types of accounts are generated with the same speed. These security systems are applied in different areas, where the security of the data in users' accounts is required. For example, they can be used in on-line voting for balloting, in studying the social opinion by inquiries, in protection of the information in different user accounts of given system etc.
{"title":"Reveal false names of accounts as a result of hackers attacks: Security systems with heightened safety of information","authors":"D. Andreev, S. Petrakieva, I. Taralova","doi":"10.23919/ICITST.2017.8356342","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356342","url":null,"abstract":"The aim of the paper is to reveal false names of accounts as a result of hackers attacks. The probability a given account to be either false or actual is calculated using methods for machine learning analysis. The suspected account will be used as a pattern and by classification techniques clusters will be formed with a respective probability this name to be false. The purpose of investigation is to determine if there exists a trend, which arises during the creation of new accounts, to detect the false ones and to discriminate them from the real ones independently of that if two types of accounts are generated with the same speed. These security systems are applied in different areas, where the security of the data in users' accounts is required. For example, they can be used in on-line voting for balloting, in studying the social opinion by inquiries, in protection of the information in different user accounts of given system etc.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126181138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356435
W. P. Yuen, K. B. Chuah
This Cloud computing is a pervasive technology and has been a platform in IT for several years. Cloud service providers (CSP) have developed and offered different service platforms to accommodate different needs of enterprise subscribers. However, there still exists the situation of enterprise customers' hesitation and reluctance to deploy their core applications using cloud service platforms. Our survey results show that security is the perceived major concern of existing and prospective enterprise customers of cloud services. The research investigates the trust between enterprise customers and cloud service provider with regards to the perceived security of cloud services. Enterprise customers expected to be reassured of cloud service security in a more visible way from cloud service provider. The perception of data security in cloud computing platform can be enhanced by data visibility. The term data visibility has been widely used in the IT industry especially from ICT product and solution vendors. However, there is no common practice guideline or standard in industry. This paper defines the characteristic and elements of data visibility and proposes a model and architecture as best practice reference for the industry. We expect that the enhancement of data visibility can earn the trust of enterprise customers in adopting public cloud services.
{"title":"Data visibility and trust enhancement of enterprise customers in cloud computing services","authors":"W. P. Yuen, K. B. Chuah","doi":"10.23919/ICITST.2017.8356435","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356435","url":null,"abstract":"This Cloud computing is a pervasive technology and has been a platform in IT for several years. Cloud service providers (CSP) have developed and offered different service platforms to accommodate different needs of enterprise subscribers. However, there still exists the situation of enterprise customers' hesitation and reluctance to deploy their core applications using cloud service platforms. Our survey results show that security is the perceived major concern of existing and prospective enterprise customers of cloud services. The research investigates the trust between enterprise customers and cloud service provider with regards to the perceived security of cloud services. Enterprise customers expected to be reassured of cloud service security in a more visible way from cloud service provider. The perception of data security in cloud computing platform can be enhanced by data visibility. The term data visibility has been widely used in the IT industry especially from ICT product and solution vendors. However, there is no common practice guideline or standard in industry. This paper defines the characteristic and elements of data visibility and proposes a model and architecture as best practice reference for the industry. We expect that the enhancement of data visibility can earn the trust of enterprise customers in adopting public cloud services.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115636723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356447
Kouya Tochikubo
We propose a new secret sharing scheme realizing general access structures, which is based on unauthorized subsets. In the proposed scheme, shares are generated by Tassa's (k, n)-hierarchical threshold scheme. The proposed scheme can reduce the number of shares distributed to each participant.
{"title":"Multiple assignment secret sharing scheme using hierarchical threshold scheme","authors":"Kouya Tochikubo","doi":"10.23919/ICITST.2017.8356447","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356447","url":null,"abstract":"We propose a new secret sharing scheme realizing general access structures, which is based on unauthorized subsets. In the proposed scheme, shares are generated by Tassa's (k, n)-hierarchical threshold scheme. The proposed scheme can reduce the number of shares distributed to each participant.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114670455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356410
Paweena Wanchai
Customer churn creates a huge anxiety in highly competitive service sectors especially the telecommunications sector. The objective of this research was to develop a predictive churn model to predict the customers that will be to churn; this is the first step to construct a retention management plan. The dataset was extracted from the data warehouse of the mobile telecommunication company in Thailand. The system generated the customer list, to implement a retention campaign to manage the customers with tendency to leave the company. WEKA software was used to implement the followings techniques: C4.5 decision trees algorithm, the logistic regression algorithm and the neural network algorithm. The C4.5 algorithm of decision trees proved optimal among the models. The findings are unequivocally beneficial to industry and other partners.
{"title":"Customer churn analysis : A case study on the telecommunication industry of Thailand","authors":"Paweena Wanchai","doi":"10.23919/ICITST.2017.8356410","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356410","url":null,"abstract":"Customer churn creates a huge anxiety in highly competitive service sectors especially the telecommunications sector. The objective of this research was to develop a predictive churn model to predict the customers that will be to churn; this is the first step to construct a retention management plan. The dataset was extracted from the data warehouse of the mobile telecommunication company in Thailand. The system generated the customer list, to implement a retention campaign to manage the customers with tendency to leave the company. WEKA software was used to implement the followings techniques: C4.5 decision trees algorithm, the logistic regression algorithm and the neural network algorithm. The C4.5 algorithm of decision trees proved optimal among the models. The findings are unequivocally beneficial to industry and other partners.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115012366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356389
Chatipot Srimuang, N. Cooharojananone, U. Tanlamai, A. Chandrachai, K. Atchariyachanvanich
Open Government Data (OGD) project can help citizen to better understand government administrations. In the open data initiatives. Thailand is now in the process of providing a draft OGD country roadmap. This paper, we develop OGD assessment application based on our developed assessment model and test the application acceptance. The developed assessment model consists of nine components which include the enterprise architecture as a new the assessment component. The enterprise architecture is now becoming the key activity to transform the digital government. Therefore, to enhance the user experience in assessment, the web-based application is developed. Testing the application acceptance by using Technology Acceptance Model (TAM). The data were collected from 30 public organizations. The result shows that most public organizations intend to use the application proposed model.
{"title":"The study of public organization's intention to use an open government data assessment application: Testing with an applicable TAM","authors":"Chatipot Srimuang, N. Cooharojananone, U. Tanlamai, A. Chandrachai, K. Atchariyachanvanich","doi":"10.23919/ICITST.2017.8356389","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356389","url":null,"abstract":"Open Government Data (OGD) project can help citizen to better understand government administrations. In the open data initiatives. Thailand is now in the process of providing a draft OGD country roadmap. This paper, we develop OGD assessment application based on our developed assessment model and test the application acceptance. The developed assessment model consists of nine components which include the enterprise architecture as a new the assessment component. The enterprise architecture is now becoming the key activity to transform the digital government. Therefore, to enhance the user experience in assessment, the web-based application is developed. Testing the application acceptance by using Technology Acceptance Model (TAM). The data were collected from 30 public organizations. The result shows that most public organizations intend to use the application proposed model.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123389513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356388
R. Utomo, R. Walters, G. Wills
Electronic government (eGovernment) services are aimed to improve government services to the public by improving the quality and availability of services that can be accessed regardless of time and place. Consequently, the services must always be available at any time, and any threat to the information and systems should receive attention to ensure business continuity in the event of an incident. Accordingly, in the implementation of eGovernment, information assurance (IA) should be considered. In Indonesia, the implementation of eGovernment is still in the early stage according to the eGovernment roadmap of Indonesia. However, there is no study so far that has focused on IA for eGovernment in Indonesia. Therefore, research on a framework of IA is needed to support the implementation of eGovernment in Indonesia. The aim of this research is to develop an IA framework for eGovernment within the Indonesian context. The development of the framework is divided into four stages, which are identifying the factors from IA international standards for organisations, determining success factors from literature, identifying the challenges, and evaluating and harmonising all the factors categorised into three categories. This research proposes an IA framework, which is expected to assist eGovernment implementation in Indonesia.
{"title":"Factors affecting the implementation of information assurance for eGovernment in Indonesia","authors":"R. Utomo, R. Walters, G. Wills","doi":"10.23919/ICITST.2017.8356388","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356388","url":null,"abstract":"Electronic government (eGovernment) services are aimed to improve government services to the public by improving the quality and availability of services that can be accessed regardless of time and place. Consequently, the services must always be available at any time, and any threat to the information and systems should receive attention to ensure business continuity in the event of an incident. Accordingly, in the implementation of eGovernment, information assurance (IA) should be considered. In Indonesia, the implementation of eGovernment is still in the early stage according to the eGovernment roadmap of Indonesia. However, there is no study so far that has focused on IA for eGovernment in Indonesia. Therefore, research on a framework of IA is needed to support the implementation of eGovernment in Indonesia. The aim of this research is to develop an IA framework for eGovernment within the Indonesian context. The development of the framework is divided into four stages, which are identifying the factors from IA international standards for organisations, determining success factors from literature, identifying the challenges, and evaluating and harmonising all the factors categorised into three categories. This research proposes an IA framework, which is expected to assist eGovernment implementation in Indonesia.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124643194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}