首页 > 最新文献

2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

英文 中文
Entity identity, performance, and storage 实体标识、性能和存储
Aspen Olmsted
When a database designer needs to model an entity that exists in a domain that does not have a global name authority, the designer must resort to using surrogate identifiers. Traditionally, these entities were referred to as Weak-Entities in Entity-Relationship models. There are many choices available to a database modeler, but each choice comes with sacrifices. This paper documents an experiment that evaluates several of these choices and hypothesizes the best solution from both a performance and a storage perspective. We then apply the suggested best algorithm to a production system and discover tremendous savings in disk space requirements and execution time on certain queries.
当数据库设计人员需要对存在于没有全局名称权限的域中的实体进行建模时,设计人员必须求助于使用代理标识符。传统上,这些实体被称为实体关系模型中的弱实体。数据库建模师有很多选择,但是每个选择都有牺牲。本文记录了一个实验,该实验评估了其中的几种选择,并从性能和存储的角度假设了最佳解决方案。然后,我们将建议的最佳算法应用于生产系统,并发现在磁盘空间需求和某些查询的执行时间方面节省了大量资金。
{"title":"Entity identity, performance, and storage","authors":"Aspen Olmsted","doi":"10.23919/ICITST.2017.8356368","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356368","url":null,"abstract":"When a database designer needs to model an entity that exists in a domain that does not have a global name authority, the designer must resort to using surrogate identifiers. Traditionally, these entities were referred to as Weak-Entities in Entity-Relationship models. There are many choices available to a database modeler, but each choice comes with sacrifices. This paper documents an experiment that evaluates several of these choices and hypothesizes the best solution from both a performance and a storage perspective. We then apply the suggested best algorithm to a production system and discover tremendous savings in disk space requirements and execution time on certain queries.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130631832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web service injection attack detection Web服务注入攻击检测
Victor A. Clincy, H. Shahriar
Injection attacks on web services can expose valuable information resources. To protect deployed web services against injection attacks, it is important to have defense techniques. Intrusion Detection Systems (IDS) are popular defense techniques to mitigate network layer attacks. This paper proposes an IDS for mitigating injection attacks on web services. We apply Genetic Algorithm (GA) as part of new attack signature generation for web services. The approach has been applied to a prototype web service and was found effective in generation of new attack signatures.
对web服务的注入攻击会暴露有价值的信息资源。为了保护已部署的web服务免受注入攻击,拥有防御技术非常重要。入侵检测系统(IDS)是缓解网络层攻击的常用防御技术。本文提出了一种用于减少web服务注入攻击的IDS。我们将遗传算法(GA)作为web服务新攻击签名生成的一部分。将该方法应用于一个web服务原型,结果表明该方法在生成新的攻击签名方面是有效的。
{"title":"Web service injection attack detection","authors":"Victor A. Clincy, H. Shahriar","doi":"10.23919/ICITST.2017.8356371","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356371","url":null,"abstract":"Injection attacks on web services can expose valuable information resources. To protect deployed web services against injection attacks, it is important to have defense techniques. Intrusion Detection Systems (IDS) are popular defense techniques to mitigate network layer attacks. This paper proposes an IDS for mitigating injection attacks on web services. We apply Genetic Algorithm (GA) as part of new attack signature generation for web services. The approach has been applied to a prototype web service and was found effective in generation of new attack signatures.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130090046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An architecture for privacy-preserving sharing of CTI with 3rd party analysis services 用于与第三方分析服务共享CTI的隐私保护架构
F. Giubilo, Ali Sajjad, M. Shackleton, D. Chadwick, Wenjun Fan, R. Lemos
Increasing numbers of Small and Medium Enterprises (SME) are outsourcing or hosting their services on different Cloud Service Providers (CSP). They are also using different security services from these CSPs such as firewalls, intrusion detection/prevention systems and anti-malware. Although for the SMEs the main purpose of using these security services is to protect their cyber assets, either physical or virtual, from security threats and compromises, a very useful and valuable by-product of these security services is the wealth of Cyber Threat Information (CTI) that is collected over time. However, a common problem faced by SMEs is that they lack the resources and expertise for monitoring, analysing and reacting to any security notifications, alerts or events generated by the security services they have subscribed to. An obvious solution to this problem is that the SMEs outsource this problem to a cloud based service as well, by sharing their CTI with this service and allowing it to analyse the information and generate actionable reports or patches. The more CTI obtained from different SMEs, the better the analysis result. In this paper, we try to address some of the privacy and confidentiality issues that arise as a result of different SMEs sharing their CTI with such a third party analysis service for the aggregate analysis scenario we just described. We present the design and architecture of our solution that aims to allow SMEs to perform policy-based sharing of CTI, while also offering them flexible privacy and confidentiality controls.
越来越多的中小型企业(SME)将其服务外包或托管在不同的云服务提供商(CSP)上。他们还使用来自这些csp的不同安全服务,如防火墙、入侵检测/防御系统和反恶意软件。虽然对于中小企业来说,使用这些安全服务的主要目的是保护其物理或虚拟的网络资产免受安全威胁和危害,但这些安全服务的一个非常有用和有价值的副产品是随着时间的推移收集的丰富的网络威胁信息(CTI)。然而,中小企业面临的一个共同问题是,他们缺乏资源和专业知识来监测、分析和响应他们所订阅的安全服务产生的任何安全通知、警报或事件。这个问题的一个明显的解决方案是,中小企业也将这个问题外包给基于云的服务,通过与该服务共享他们的CTI,并允许它分析信息并生成可操作的报告或补丁。不同中小企业的CTI数据越多,分析结果越好。在本文中,我们试图解决由于不同的中小企业与我们刚刚描述的聚合分析场景的第三方分析服务共享其CTI而产生的一些隐私和机密性问题。我们介绍了我们的解决方案的设计和架构,旨在允许中小企业执行基于策略的CTI共享,同时还为他们提供灵活的隐私和机密控制。
{"title":"An architecture for privacy-preserving sharing of CTI with 3rd party analysis services","authors":"F. Giubilo, Ali Sajjad, M. Shackleton, D. Chadwick, Wenjun Fan, R. Lemos","doi":"10.23919/ICITST.2017.8356404","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356404","url":null,"abstract":"Increasing numbers of Small and Medium Enterprises (SME) are outsourcing or hosting their services on different Cloud Service Providers (CSP). They are also using different security services from these CSPs such as firewalls, intrusion detection/prevention systems and anti-malware. Although for the SMEs the main purpose of using these security services is to protect their cyber assets, either physical or virtual, from security threats and compromises, a very useful and valuable by-product of these security services is the wealth of Cyber Threat Information (CTI) that is collected over time. However, a common problem faced by SMEs is that they lack the resources and expertise for monitoring, analysing and reacting to any security notifications, alerts or events generated by the security services they have subscribed to. An obvious solution to this problem is that the SMEs outsource this problem to a cloud based service as well, by sharing their CTI with this service and allowing it to analyse the information and generate actionable reports or patches. The more CTI obtained from different SMEs, the better the analysis result. In this paper, we try to address some of the privacy and confidentiality issues that arise as a result of different SMEs sharing their CTI with such a third party analysis service for the aggregate analysis scenario we just described. We present the design and architecture of our solution that aims to allow SMEs to perform policy-based sharing of CTI, while also offering them flexible privacy and confidentiality controls.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130251316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Undecidable problems in malware analysis 恶意软件分析中不可确定的问题
A. Selçuk, Fatih Orhan, Berker Batur
Malware analysis is a challenging task in the theory as well as the practice of computer science. Many important problems in malware analysis have been shown to be undecidable. These problems include virus detection, detecting unpacking execution, matching malware samples against a set of given templates, and detecting trigger-based behavior. In this paper, we will give a review of the undecidability results in malware analysis and discuss what can be done in practice.
恶意软件分析在计算机科学的理论和实践中都是一项具有挑战性的任务。恶意软件分析中的许多重要问题已被证明是不可确定的。这些问题包括病毒检测、检测解包执行、将恶意软件样本与一组给定模板进行匹配,以及检测基于触发器的行为。在本文中,我们将回顾恶意软件分析中的不可判定结果,并讨论在实践中可以做些什么。
{"title":"Undecidable problems in malware analysis","authors":"A. Selçuk, Fatih Orhan, Berker Batur","doi":"10.23919/ICITST.2017.8356458","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356458","url":null,"abstract":"Malware analysis is a challenging task in the theory as well as the practice of computer science. Many important problems in malware analysis have been shown to be undecidable. These problems include virus detection, detecting unpacking execution, matching malware samples against a set of given templates, and detecting trigger-based behavior. In this paper, we will give a review of the undecidability results in malware analysis and discuss what can be done in practice.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129980884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Optimizing synchronization of cloud storage services: Combining benchmark monitoring and learning-based framework 云存储服务同步优化:结合基准监控和基于学习的框架
Preston T. Owens, Aspen Olmsted
With data storage moving further away from locally based storage and into an age of cloud storage, users are going to need their data on the go, and they're going to need it to be fast, and they're going to need it to be accurate. Eventual consistency is the theoretical guarantee that, provided no new updates to an entity are made, all reads of the entity return the last updated value. In this paper, a comparison is made on cloud-based studies to formulate an idea as to how to improve the synchronization of cloud storage systems by first benchmarking the eventual consistency and then utilizing a framework that dynamically learns the characteristics of a storage node so that eventually consistency is achieved quickly.
随着数据存储从基于本地的存储进一步转移到云存储时代,用户将需要他们的数据在移动中,他们将需要数据快速,他们将需要数据准确。最终一致性是理论上的保证,即在不对实体进行新的更新的情况下,对实体的所有读取都返回最后更新的值。本文对基于云的研究进行了比较,提出了如何通过首先对最终一致性进行基准测试,然后利用动态学习存储节点特征的框架来快速实现最终一致性,从而提高云存储系统的同步性的想法。
{"title":"Optimizing synchronization of cloud storage services: Combining benchmark monitoring and learning-based framework","authors":"Preston T. Owens, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356426","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356426","url":null,"abstract":"With data storage moving further away from locally based storage and into an age of cloud storage, users are going to need their data on the go, and they're going to need it to be fast, and they're going to need it to be accurate. Eventual consistency is the theoretical guarantee that, provided no new updates to an entity are made, all reads of the entity return the last updated value. In this paper, a comparison is made on cloud-based studies to formulate an idea as to how to improve the synchronization of cloud storage systems by first benchmarking the eventual consistency and then utilizing a framework that dynamically learns the characteristics of a storage node so that eventually consistency is achieved quickly.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134415473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A collaborative system for corporate performance evaluation using gamification and the learning vectors model 使用游戏化和学习向量模型的企业绩效评估协作系统
Michelle G. Cacais, G. Sales
Corporate strategies should contribute to the achievement of the objectives of companies, and, consequently, guarantee their sustainability. In order to keep the employees engaged and committed to their own income, we propose Process Planning and Institutional Evaluation (PIPA), a gamified system that uses the Learning Vector Model for corporate performance evaluation and follow-up of tasks. The system can be applied in entities and companies with the purpose of socializing, motivating or promoting the interaction of users. It was verified through field research, that PIPA improved the performance of the evaluated team and motivated the professionals. The evaluation using the Learning Vector Model helped in the monitoring and the progress of the evaluated ones, since besides accompanying their own income through constant verification and feedback of the supervisors. They also could interact more with the work team.
公司战略应有助于实现公司的目标,从而保证其可持续性。为了保持员工的参与度和对自己收入的承诺,我们提出了过程规划和制度评估(PIPA),这是一个游戏化的系统,使用学习向量模型进行企业绩效评估和任务跟踪。该系统可应用于实体和公司,目的是社交、激励或促进用户的互动。通过实地调研证实,PIPA提高了被评估团队的绩效,激励了专业人员。使用学习向量模型的评估有助于被评估者的监控和进步,因为通过主管的不断验证和反馈,被评估者的收入也随之增加。他们还可以与工作团队进行更多的互动。
{"title":"A collaborative system for corporate performance evaluation using gamification and the learning vectors model","authors":"Michelle G. Cacais, G. Sales","doi":"10.23919/ICITST.2017.8356455","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356455","url":null,"abstract":"Corporate strategies should contribute to the achievement of the objectives of companies, and, consequently, guarantee their sustainability. In order to keep the employees engaged and committed to their own income, we propose Process Planning and Institutional Evaluation (PIPA), a gamified system that uses the Learning Vector Model for corporate performance evaluation and follow-up of tasks. The system can be applied in entities and companies with the purpose of socializing, motivating or promoting the interaction of users. It was verified through field research, that PIPA improved the performance of the evaluated team and motivated the professionals. The evaluation using the Learning Vector Model helped in the monitoring and the progress of the evaluated ones, since besides accompanying their own income through constant verification and feedback of the supervisors. They also could interact more with the work team.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133034388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of fake online hotel reviews 检测虚假在线酒店评论
Anna V. Sandifer, Casey Wilson, Aspen Olmsted
Individuals use online reviews to make decisions about available products and services. In recent years, businesses and the research community have shown a great amount of interest in the identification of fake online reviews. Applying accurate algorithms to detect fake online reviews can protect individuals from spam and misinformation. We gathered filtered and unfiltered online reviews for several hotels in the Charleston area from yelp.com. We extracted part-of-speech features from the data set, applied three classification models, and compared accuracy results to related works.
个人使用在线评论来对可用的产品和服务做出决定。近年来,企业和研究界对识别虚假在线评论表现出了极大的兴趣。应用精确的算法来检测虚假的在线评论可以保护个人免受垃圾邮件和错误信息的侵害。我们从yelp.com上收集了查尔斯顿地区几家酒店经过过滤和未经过滤的在线评论。我们从数据集中提取词性特征,应用三种分类模型,并将准确率结果与相关工作进行比较。
{"title":"Detection of fake online hotel reviews","authors":"Anna V. Sandifer, Casey Wilson, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356460","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356460","url":null,"abstract":"Individuals use online reviews to make decisions about available products and services. In recent years, businesses and the research community have shown a great amount of interest in the identification of fake online reviews. Applying accurate algorithms to detect fake online reviews can protect individuals from spam and misinformation. We gathered filtered and unfiltered online reviews for several hotels in the Charleston area from yelp.com. We extracted part-of-speech features from the data set, applied three classification models, and compared accuracy results to related works.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"12 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120899508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
LSB-hamming based chaotic steganography (LH-Steg) 基于LSB-hamming的混沌隐写(LH-Steg)
Marwa Saidi, Houcemeddine Hermassi, Rhouma Rhouma, S. Belghith
This work introduces a novel secret-key spatial steganographic approach based on Hamming codes and LSB embedding. The embedding artifacts are restricted to rich textured zones of the cover image. We exploited the standard deviation measurement to select potential candidate block of pixels to hold the secret message. In the aim of ensuring the security aspect of our proposed method, we use the Skew Tent Map as a random generator to select exploited bits in the embedding procedure. Such a chaotic function shows an efficient performance in terms of randomness and perfect sensibility to slight alteration of the initial condition or the control parameter (sensibility: 10−14). the proposed approach showed an effective resistance to the state-of-art steganalysis attacks.
本文提出了一种基于汉明码和LSB嵌入的密钥空间隐写方法。嵌入的伪影被限制在封面图像纹理丰富的区域。我们利用标准偏差测量来选择潜在的候选像素块来保存秘密消息。为了确保我们提出的方法的安全性,我们使用倾斜帐篷映射作为随机生成器来选择嵌入过程中被利用的位。这种混沌函数在随机性和对初始条件或控制参数的微小变化的完美敏感性方面表现出高效的性能(敏感性:10−14)。所提出的方法显示出对最先进的隐写分析攻击的有效抵抗。
{"title":"LSB-hamming based chaotic steganography (LH-Steg)","authors":"Marwa Saidi, Houcemeddine Hermassi, Rhouma Rhouma, S. Belghith","doi":"10.23919/ICITST.2017.8356340","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356340","url":null,"abstract":"This work introduces a novel secret-key spatial steganographic approach based on Hamming codes and LSB embedding. The embedding artifacts are restricted to rich textured zones of the cover image. We exploited the standard deviation measurement to select potential candidate block of pixels to hold the secret message. In the aim of ensuring the security aspect of our proposed method, we use the Skew Tent Map as a random generator to select exploited bits in the embedding procedure. Such a chaotic function shows an efficient performance in terms of randomness and perfect sensibility to slight alteration of the initial condition or the control parameter (sensibility: 10−14). the proposed approach showed an effective resistance to the state-of-art steganalysis attacks.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124543649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Handling an organization's communication needs with a single web service 使用单个web服务处理组织的通信需求
Casey Wilson, Aspen Olmsted
Successful communication of information via web services can be a complex and error-prone task, in large part due to network complexity between multiple fine-grained web services. This complexity can decrease ease of maintainability and increase inconsistency between the source and target destinations. A single all-encompassing web service that meets all of an organization's needs can be implemented that performs both generic or highly specific tasks. We have created a REST web service in Salesforce that handles multiple objects and performs specific tasks to test the viability of a single web service to meet all of an organization's needs. We found that one web service can be implemented to handle multiple or specific tasks with a single call. We show that as the number of database actions per single request increases so does the efficiency with which each individual action is processed. A reduction in the number of web services coupled with an increase of the functionality of a single web service provides many benefits when compared to multiple smaller web services.
通过web服务成功地进行信息通信可能是一项复杂且容易出错的任务,这在很大程度上是由于多个细粒度web服务之间的网络复杂性。这种复杂性会降低可维护性,并增加源和目标目的地之间的不一致性。可以实现一个满足组织所有需求的包罗一切的web服务,它既可以执行一般任务,也可以执行高度特定的任务。我们在Salesforce中创建了一个REST web服务,它处理多个对象并执行特定的任务,以测试单个web服务的可行性,以满足组织的所有需求。我们发现一个web服务可以通过一个调用来处理多个或特定的任务。我们将展示,随着每个请求的数据库操作数量的增加,处理每个单独操作的效率也会提高。与多个较小的web服务相比,web服务数量的减少加上单个web服务功能的增加提供了许多好处。
{"title":"Handling an organization's communication needs with a single web service","authors":"Casey Wilson, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356382","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356382","url":null,"abstract":"Successful communication of information via web services can be a complex and error-prone task, in large part due to network complexity between multiple fine-grained web services. This complexity can decrease ease of maintainability and increase inconsistency between the source and target destinations. A single all-encompassing web service that meets all of an organization's needs can be implemented that performs both generic or highly specific tasks. We have created a REST web service in Salesforce that handles multiple objects and performs specific tasks to test the viability of a single web service to meet all of an organization's needs. We found that one web service can be implemented to handle multiple or specific tasks with a single call. We show that as the number of database actions per single request increases so does the efficiency with which each individual action is processed. A reduction in the number of web services coupled with an increase of the functionality of a single web service provides many benefits when compared to multiple smaller web services.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127609948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Role of transformational leadership on e-govemment switching: Multi-channel and digital divide 变革型领导在电子政府转换中的作用:多渠道与数字鸿沟
Khurram Mahmood, Zainab Nayyar, Hafiz Mushtaq
It has been observed from last 16 years that to switch from the manual government processes to Electronic government can put a huge impact in regulating the government processes. The purpose of electronic government is to use Information and communication technologies in government sector, combined with organizational change and new skills to improve government sector service delivery, democratic processes and capacity building to give strength and support the government policies. Previously government servants always work through traditional channels like front desks or telephones to fulfill their requirements. The use of traditional channels was time consuming and was only fulfill the requirements of one user at a time. These consequences lead towards a digital divide dilemma in which people moved far away from the electronic process. This study is based upon filling the gaps between E-Government and digital divide by utilizing the multi-channel services governed by transformational leaders. The study will reveal new ways of switching to electronic government through digital channels. Transformational leadership will influence the adapting phase of this concept. Data gathered through questionnaires has shown that transformational leaders along with digital channels have put a positive effect in switching from manual to electronic government processes. These aspects have increased the transparency, efficiency, accountability and security in government processes.
从过去16年的观察来看,从人工政务向电子政务的转变对政府流程的监管产生了巨大的影响。电子政府的目的是在政府部门使用信息和通信技术,结合组织变革和新技能,改善政府部门的服务提供,民主进程和能力建设,以加强和支持政府的政策。以前,公务员总是通过前台或电话等传统渠道来满足他们的要求。传统渠道的使用耗时长,一次只能满足一个用户的需求。这些后果导致了人们远离电子过程的数字鸿沟困境。本研究的基础是通过利用转型领导者管理的多渠道服务来填补电子政务和数字鸿沟之间的差距。这项研究将揭示通过数码渠道转向电子政府的新途径。变革型领导将影响这一概念的适应阶段。通过问卷调查收集的数据表明,变革型领导者以及数字渠道在从手动到电子政务流程的转换中发挥了积极作用。这些方面增加了政府程序的透明度、效率、问责制和安全性。
{"title":"Role of transformational leadership on e-govemment switching: Multi-channel and digital divide","authors":"Khurram Mahmood, Zainab Nayyar, Hafiz Mushtaq","doi":"10.23919/ICITST.2017.8356453","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356453","url":null,"abstract":"It has been observed from last 16 years that to switch from the manual government processes to Electronic government can put a huge impact in regulating the government processes. The purpose of electronic government is to use Information and communication technologies in government sector, combined with organizational change and new skills to improve government sector service delivery, democratic processes and capacity building to give strength and support the government policies. Previously government servants always work through traditional channels like front desks or telephones to fulfill their requirements. The use of traditional channels was time consuming and was only fulfill the requirements of one user at a time. These consequences lead towards a digital divide dilemma in which people moved far away from the electronic process. This study is based upon filling the gaps between E-Government and digital divide by utilizing the multi-channel services governed by transformational leaders. The study will reveal new ways of switching to electronic government through digital channels. Transformational leadership will influence the adapting phase of this concept. Data gathered through questionnaires has shown that transformational leaders along with digital channels have put a positive effect in switching from manual to electronic government processes. These aspects have increased the transparency, efficiency, accountability and security in government processes.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130813548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1