2024-03-28T18:06:25Z
http://eprints.rclis.org/cgi/oai2
oai:eprints.rclis.org:3911
2014-10-02T11:56:43Z
7374617475733D707562
7375626A656374733D4C2E:4C48
7375626A656374733D472E:4748
7375626A656374733D472E:4749
7375626A656374733D4C2E:4C49
74797065733D626F6F6B63686170746572
636F756E74726965733D4555524F5045:45532D
http://eprints.rclis.org/3911/
Experiencia práctica en la adaptación de la asignatura "Seguridad de la información" a la metodología del EEES
Alonso-Berrocal, José-Luis
G.-Figuerola, Carlos
Zazo, Ángel F.
Gómez-Díaz, Raquel
LH. Computer and network security.
GH. Education.
GI. Training.
LI. Authentication, and access control.
We analyze the adaptation process to the European Space for High Education of a subject of the Information Science degree. We describes the development carried out using the Moodle platform, focusing in the created and generate aspects for this adaptation. The possibilities of the platform and its acceptation by the students were also analyzed.
Ediciones Universidad de Salamanca
Torres, J.
Moro, M.
2008
Book chapter
PeerReviewed
application/pdf
en
http://eprints.rclis.org/3911/1/seguridad.pdf
Alonso-Berrocal, José-Luis and G.-Figuerola, Carlos and Zazo, Ángel F. and Gómez-Díaz, Raquel . Experiencia práctica en la adaptación de la asignatura "Seguridad de la información" a la metodología del EEES., 2008 In: La adaptación al Espacio Europeo de Educación Superior en la Facultad de Traducción y Documentación. Ediciones Universidad de Salamanca, pp. 201-219. [Book chapter]
oai:eprints.rclis.org:7508
2014-10-02T12:03:10Z
7374617475733D707562
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C49
74797065733D6A6F75726E616C70
636F756E74726965733D41534941:494E2D
http://eprints.rclis.org/7508/
An introduction to auditing and control of digital library systems
Das, Anup Kumar
Dutta, Bidyarthi
LH. Computer and network security.
LI. Authentication, and access control.
Digital libraries consist of interactive and integrated digital information systems. The intelligent control of information systems is necessary to enhance the capabilities and effectiveness of such digital libraries. The information systems auditing and control is popular in other information systems, like e-banking systems, CRM systems, e-governance systems, etc. To exploit the optimum benefits from a digital library system, some auditing and control measures should be maintained. This paper depicts the issues and elements of auditing and control of digital library systems.
National Institute of Science Communication and Information Resources, India
2004
Journal article (Paginated)
PeerReviewed
application/pdf
en
http://eprints.rclis.org/7508/1/Das_Dutta_Auditing1.pdf
Das, Anup Kumar and Dutta, Bidyarthi An introduction to auditing and control of digital library systems. Annals of Library and Information Studies, 2004, vol. 51, n. 3, pp. 99-103. [Journal article (Paginated)]
oai:eprints.rclis.org:7926
2014-10-02T12:04:13Z
7375626A656374733D4C2E:4C48
7375626A656374733D422E:4246
74797065733D7072657072696E74
636F756E74726965733D414652494341:4E472D
http://eprints.rclis.org/7926/
Information and Communication Technology Policy in Academic and Research Libraries in Oyo and Ogun States, Nigeria
Utulu, Samuel C.
LH. Computer and network security.
BF. Information policy
The study adopted case study research methodology to evaluate ICT policy use in ten academic and research libraries in Oyo and Ogun States. Convenient sampling method was adopted. The finding showed that only six of the ten academic and research libraries have ICT policy, despite the fact that all of them have procured major ICT facilities. The study also revealed that the existing policies are comprehensive and adequate. However, it was also revealed that the libraries still face challenges in major areas like capital sharing, access, security, ethics, staffing, understanding users’ characteristics and need, procedures required for ICT use and benefit maximization.
2006
Preprint
NonPeerReviewed
application/pdf
en
http://eprints.rclis.org/7926/1/nla.pdf
Utulu, Samuel C. Information and Communication Technology Policy in Academic and Research Libraries in Oyo and Ogun States, Nigeria., 2006 [Preprint]
oai:eprints.rclis.org:8258
2014-10-02T12:04:57Z
7374617475733D707562
7375626A656374733D4C2E:4C48
74797065733D6A6F75726E616C70
636F756E74726965733D41534941:49522D
http://eprints.rclis.org/8258/
Information security technologies: a classification approach
Asadi, Maryam
LH. Computer and network security.
The most important advantage and mission for any computer network is to share the hardware and software resources as well as providing a quick and easy access to information. Controlling the extent of access to the shared resources, is one of the most important goals of a network security system. With expansion of computer networks (internet in particular), the attitude towards data security as well as security of other shared resources has entered a new level. It is therefore necessary for organizations to follow a specific strategy for implementation of a security system in order to protect valuable data. An appropriate security system, may lead to somewhat negative, unexpected consequences. Success in securing information is contingent upon protecting information and information systems against intrusions and attacks. To this end numerous security protocols are employed. The present paper attempts to classify these security protocols based on the level of interaction between technology and information as well as levels of security implementation of information systems.
Iranian Information and Documentation Center (IRANDOC)
2005
Journal article (Paginated)
NonPeerReviewed
application/pdf
en
http://eprints.rclis.org/8258/1/Information_Security.pdf
Asadi, Maryam Information security technologies: a classification approach. Iranian Journal of Information Science, 2005, vol. 20, n. 3&4, pp. 1-16. [Journal article (Paginated)]
oai:eprints.rclis.org:8262
2014-10-02T12:04:57Z
7374617475733D707562
7375626A656374733D4C2E:4C48
74797065733D6A6F75726E616C65
636F756E74726965733D41534941:49522D
http://eprints.rclis.org/8262/
Network security using honeypot
Sahraie Kalejahi, Masumeh
LH. Computer and network security.
We always hear news about hacker's being arrested or a group of internet saboteurs discovered. Hacking techniques have improved to the point that little or no traces of unauthorized access is left. Computer security experts often use a tool called honeypot to entrap intruders. The present paper outlines honeypot techniques, its variants and various technologies applied to this effect.
Iranian Information and Documentation Center (IRANDOC)
2005
Journal article (Unpaginated)
PeerReviewed
application/pdf
en
http://eprints.rclis.org/8262/1/kalejahi.pdf
Sahraie Kalejahi, Masumeh Network security using honeypot. Nama, 2005, vol. 5, n. 2. [Journal article (Unpaginated)]
oai:eprints.rclis.org:9291
2014-10-02T12:07:11Z
7374617475733D707562
7375626A656374733D4C2E:4C44
7375626A656374733D4A2E:4A48
7375626A656374733D482E:484C
7375626A656374733D4C2E:4C45
7375626A656374733D492E:494B
7375626A656374733D482E
7375626A656374733D4C2E:4C48
7375626A656374733D482E:4850
7375626A656374733D4C2E:4C4A
7375626A656374733D442E:4446
7375626A656374733D482E:4843
7375626A656374733D482E:4844
7375626A656374733D442E:444C
7375626A656374733D482E:4845
7375626A656374733D482E:4849
7375626A656374733D4A2E:4A47
74797065733D7265706F7274
636F756E74726965733D41534941:494E2D
http://eprints.rclis.org/9291/
Digital Archive of Kerala Legislative Assembly Proceedings
Sathikumar, C. S.
Raman Nair, R.
Bhagi, N. K.
LD. Computers.
JH. Digital preservation.
HL. Databases and database Networking.
LE. Scanners.
IK. Design, development, implementation and maintenance
H. Information sources, supports, channels.
LH. Computer and network security.
HP. e-resources.
LJ. Software.
DF. Government libraries.
HC. Archival materials.
HD. Rare books and manuscripts.
DL. Archives.
HE. Print materials.
HI. Electronic Media.
JG. Digitization.
Technical Report on developing a Digital Archives of Kerala Legislative Assembly Records from the year 1888 to 2011. The Assembly records consist of proceedings of Legislative Council of Travancore from 1888, Travancore Sri Mulam Popular Assembly from 1904, Sri Mulam Assembly and the Sri Chitra State Council from 1933, Travancore Legislative Assembly from 1948, Cochin Legislative Council from 1925, Cochin Legislative Assembly from 1948, Travancore-Cochin Legislative Assembly from 1949 and Kerala Legislative Assembly from 1957. These records are authentic sources for research on the region’s history, polity and economic development. Their importance for legislative business is unique and form the most important records collection held by government. The report makes recommendations for ensuring their conservation and safety, efficient organization and management, and speedy and effective dissemination of the content for the business of the Assembly, for the reference of the judiciary and government as well as for research. Covers aspects like the process of conversion of the records into digital form, implementing a Digital Library System having specialized hardware and software that can ensure storage without possibility of tampering or editing originals, and techniques to be used for full text indexing, data basing and organization of digitized records as a functional digital library. The report estimates total cost of the project as Rs. 1,30,36457 which includes consultancy, digital archiving, indexing and data basing of approximately 6.2 lakhs printed pages, and acquiring hardware and software to establish a Digital Library. Estimated time required completion is three years.
2007
Report
PeerReviewed
image/gif
en
http://eprints.rclis.org/9291/1/Cover.gif
application/pdf
en
http://eprints.rclis.org/9291/2/2007KLAP.pdf
Sathikumar, C. S. and Raman Nair, R. and Bhagi, N. K. Digital Archive of Kerala Legislative Assembly Proceedings., 2007 [Report]
oai:eprints.rclis.org:10614
2014-10-02T12:09:51Z
7374617475733D707562
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C48
7375626A656374733D462E
74797065733D6A6F75726E616C65
636F756E74726965733D4E4341:43552D
http://eprints.rclis.org/10614/
Intranets: las tecnologías de información y comunicación en función de la organización
Aportela Rodríguez, Ivett M.
LB. Computer networking.
LH. Computer and network security.
F. Management.
The intranet is one of the most powerful technologies than can be used in an organization, if it is adequately applied. Its design and implementation, oriented towards organizational objectives, provide the institution with a fundamental tool for the management of the information that contributes to knowledge management, and for the internal communication that permits to improve and to speed up organizational dynamics. Nevertheless, this is only possible when the employees participate actively in its maintenance and updating. An approach to this technology is carried out, starting from its conceptual definition and characterization in the context of the organizations. It is analyzed as a tool for the information management and as a communication medium.
Editorial de Ciencias Médicas, ECIMED
2007
Journal article (Unpaginated)
PeerReviewed
application/pdf
en
http://eprints.rclis.org/10614/1/04-Intranets__las_tecnolog%C3%ADas_de_informaci%C3%B3n_y_comunicaci%C3%B3n.pdf
Aportela Rodríguez, Ivett M. Intranets: las tecnologías de información y comunicación en función de la organización. ACIMED, 2007, vol. 16, n. 4. [Journal article (Unpaginated)]
oai:eprints.rclis.org:10728
2014-10-02T12:10:02Z
7374617475733D707562
7375626A656374733D492E:4946
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
74797065733D636F6E667061706572
636F756E74726965733D4555524F5045:47522D
http://eprints.rclis.org/10728/
Θέματα ασφάλειας διακίνησης πληροφοριών στη βιβλιοθηκονομική κοινότητα
Καρεκλάς, Νικόλαος
Δενδρινός, Μάρκος
IF. Information transfer: protocols, formats, techniques.
LC. Internet, including WWW.
LH. Computer and network security.
In the last part becomes a short presentation of the said social engineering, a regular interception of elements that are supported in the carelessnesses and the gullible movements of users. Even if it has almost not been heard in the libraries' communities, it is a term that should have occupies us to a large extent, as it can involve most important destructions in a library with the loss of material, the destruction of network systems or even the spying of users' movements of library's computers. The presentation is completed with the pointing out of those voids of safety that it can exploit a social engineer. The threats for the safety of library's network can emanate from a big number of sources, with a lot of different ways, covering a wide spectrum of cases. The existing tendency for the bigger possible automation of communication processes constitutes simultaneously also achillean heel of many interconnections of information systems. The need for continuous vigilance on issues safety is the price, between the other, that we were called to pay for the multiple profits that offers a found connections society. In this article initially becomes a report in the viruses that are trafficked via the Internet, and more concretely the classic viruses, the viruses of macros, the viruses of environment Java or Javascript, the viruses of “doyreiou horse” type and the viruses via the electronic mail. Afterwards is presented the big problem undesirable (unnecessary or even dangerous) correspondence, said spam mails, is given tactics for their reject as well as tactics for their confrontation in the case where already they have been received. Then are presented the dangerous technique of hail with electronic messages as well as the question of report of users' personal elements, which can afterwards constitute objectives of attacks. This part closes with a line of advisory steps for the protection of library's transporter.
2005
Conference paper
PeerReviewed
application/pdf
en
http://eprints.rclis.org/10728/1/14psab024.pdf
Καρεκλάς, Νικόλαος and Δενδρινός, Μάρκος Θέματα ασφάλειας διακίνησης πληροφοριών στη βιβλιοθηκονομική κοινότητα., 2005 . In 14ο Πανελλήνιο Συνέδριο Ακαδημαϊκών Βιβλιοθηκών, Αθήνα (GR), 1-3 Δεκεμβρίου. [Conference paper]
oai:eprints.rclis.org:11497
2014-10-02T12:11:23Z
7374617475733D756E707562
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C52
7375626A656374733D4C2E:4C42
74797065733D7265706F7274
636F756E74726965733D4E4341:4D582D
http://eprints.rclis.org/11497/
Is thin-client becoming the new paradigm in networking technologies? A research paper for the course Networking Technologies at the Master in Library Science program, Department of Library and Information Studies, State University of New York at Buffalo (USA)
Muela-Meza, Zapopan Martín
LH. Computer and network security.
LR. OPAC systems.
LB. Computer networking.
This is a research paper for the course of Networking Technologies at the Master of Library Science, Dept. of Library and Information Studies, State University of New York at Buffalo; Professor of the course Neil Yerkey, December 11, 2000. It focuses on the thin-client networking. It strongly supports the idea that this type of network is going to become the new paradigm in networking because of these benefits of social and economical impacts: a) savings in upgrading software, b) savings in recycling old hardware, c) ubiquity: have communication access through the network at any time and everywhere, d) security, e) vast content of data and information, f) fastest application deployment, among others. Gives two examples of successful applications of thin-client networking in libraries: a) State University of New York at Stony Brook and b) at the The Tulsa City-County Library System in Oklahoma and its 22 branches. And reviews superficially some of the major products and companies dealing with thin-client networking, it includes a directory. Remarkable is the section of Glossary where the reader can go to look up and certainly find every new term.
2000
Report
NonPeerReviewed
application/pdf
en
http://eprints.rclis.org/11497/1/2000.Muela.Z.Thin.Client.Networking.Techologies.pdf
Muela-Meza, Zapopan Martín Is thin-client becoming the new paradigm in networking technologies? A research paper for the course Networking Technologies at the Master in Library Science program, Department of Library and Information Studies, State University of New York at Buffalo (USA)., 2000 (Unpublished) [Report]
oai:eprints.rclis.org:11811
2014-10-02T12:11:55Z
7374617475733D707562
7375626A656374733D4C2E:4C48
74797065733D636F6E667061706572
636F756E74726965733D4555524F5045:42472D
http://eprints.rclis.org/11811/
Improved Cryptoanalysis of the Self-shrinking p-adic Cryptographic Generator
Stoyanov, Borislav
LH. Computer and network security.
The Self-shrinking p-adic cryptographic generator (SSPCG) is a fast software stream cipher. Improved cryptoanalysis of the SSPCG is introduced. This cryptoanalysis makes more precise the length of the period of the generator. The linear complexity and the cryptography resistance against most recently used attacks are invesigated. Then we discuss how such attacks can be avoided. The results show that the sequence generated by a SSPCG has a large period, large linear complexity and is stable against the cryptographic attacks. This gives the reason to consider the SSPSG as suitable for critical cryptographic applications in stream cipher encryption algorithms.
Markov, Krassimir
Ivanova, Krassimira
Mitov, Ilia
2008
Conference paper
NonPeerReviewed
application/pdf
en
http://eprints.rclis.org/11811/1/i.TECH08-Stoyanov.pdf
Stoyanov, Borislav Improved Cryptoanalysis of the Self-shrinking p-adic Cryptographic Generator., 2008 . In International Conference Information Research and Applications - i.TECH 2008, Varna, BULGARIA, 23 June - 03 July, 2008. [Conference paper]
oai:eprints.rclis.org:11928
2014-10-02T12:12:07Z
7374617475733D707562
7375626A656374733D4C2E:4C48
74797065733D6A6F75726E616C70
636F756E74726965733D4555524F5045:45532D
http://eprints.rclis.org/11928/
Concepto y fuentes para el estudio de la Information Warfare
Tramullas Saz, Jesús
LH. Computer and network security.
This paper broaches the concept of Information Warfare, as well as the main definitions proposed for it. The different types of action included in this field are established, and some implications for the information specialist are outlined. A selection of information sources is included as a starting point for the the study of the subject.
Servicio de Publicaciones, Universidad de Murcia (Spain)
1998
Journal article (Paginated)
PeerReviewed
application/pdf
en
http://eprints.rclis.org/11928/1/ad0111.pdf
Tramullas Saz, Jesús Concepto y fuentes para el estudio de la Information Warfare. Anales de Documentación, 1998, vol. 1, pp. 185-192. [Journal article (Paginated)]
oai:eprints.rclis.org:14456
2014-10-02T12:16:47Z
7374617475733D707562
7375626A656374733D4C2E:4C48
7375626A656374733D442E:4442
7375626A656374733D4A2E:4A48
7375626A656374733D482E:4844
7375626A656374733D4C2E
74797065733D7265706F7274
636F756E74726965733D4555524F5045:45532D
http://eprints.rclis.org/14456/
Ptolomeo sufre de nuevo
Prieto-Gutiérrez, Juan-José
LH. Computer and network security.
DB. National libraries.
JH. Digital preservation.
HD. Rare books and manuscripts.
L. Information technology and library technology
Vamos Zsolt´s operations were frustrated in August 2009 when the Heritage Group of the Central Operational Unit (COU) of the Guardia Civil arrested him. Having caused unprecedented damage on a range of libraries and historical archives of several Spanish towns.
2009-09-11
Report
NonPeerReviewed
application/pdf
en
http://eprints.rclis.org/14456/1/Ptolomeo_sufre_de_nuevo.pdf
Prieto-Gutiérrez, Juan-José Ptolomeo sufre de nuevo., 2009 [Report]
oai:eprints.rclis.org:15422
2014-10-02T12:18:44Z
7374617475733D707562
7375626A656374733D472E:4742
7375626A656374733D472E:4743
7375626A656374733D4C2E:4C44
7375626A656374733D4C2E:4C48
74797065733D6E65777361727469636C65
636F756E74726965733D4555524F5045:45532D
http://eprints.rclis.org/15422/
Datacenters: tendencias y seguridad.
González-Fernández, Jonathan
GB. Software industry.
GC. Computer and telecommunication industry.
LD. Computers.
LH. Computer and network security.
Trends and security that must be considered while building a datacenter facility to store mussion critical information
Fundacion Dintel
2009-05
Newspaper/magazine article
NonPeerReviewed
application/pdf
en
http://eprints.rclis.org/15422/1/Datacenters%2C%20Tendencias%20y%20Seguridad%20-%20Seccion%20Seguridad%20Publica.pdf
González-Fernández, Jonathan Datacenters: tendencias y seguridad., 2009 [Newspaper/magazine article]
oai:eprints.rclis.org:16358
2014-10-02T12:20:43Z
7374617475733D707562
7375626A656374733D422E:4241
7375626A656374733D422E:4243
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C49
74797065733D6E65777361727469636C65
636F756E74726965733D536F757468416D6572696361:41522D
http://eprints.rclis.org/16358/
En la ciencia de lo secreto
Franganillo, Jorge
BA. Use and impact of information.
BC. Information in society.
LH. Computer and network security.
LI. Authentication, and access control.
Cryptography has had a significant historical influence for over two millennia. It's an ancient science which was already used by Romans, among others, to keep their communications safe from enemies. For centuries, until the 1970s, it was a black art practised by only a few governments and armies. It is now a well-established discipline that is taught in universities, it's available for use by businesses and individuals, and it protects many areas of everyday life. This ancient technique now faces the threat of quantum computing, which might cause the collapse of the cryptographic techniques known to date.
2011-12-07
Newspaper/magazine article
PeerReviewed
application/pdf
en
http://eprints.rclis.org/16358/1/secreto.pdf
Franganillo, Jorge En la ciencia de lo secreto., 2011 [Newspaper/magazine article]
oai:eprints.rclis.org:16968
2014-10-02T12:22:24Z
7374617475733D756E707562
7375626A656374733D4C2E:4C48
74797065733D6F74686572
636F756E74726965733D41534941:49442D
http://eprints.rclis.org/16968/
KEJAHATAN TERHADAP INFORMASI (CYBERCRIME) DALAM KONTEKS PERPUSTAKAAN DIGITAL KEJAHATAN TERHADAP INFORMASI (CYBERCRIME) DALAM KONTEKS PERPUSTAKAAN DIGITAL
Ali, Irhamni
LH. Computer and network security.
The information-computers technology has reaches to the steps which the smaller size, the faster speed, but the price is lower than the performances. Online and digital library can be considered as a new form of information institution or the existing library services extends. But it’s not easy to control the impact of the luxury of online and digital library. There are dangerous threats to relate with the security of data and digital library collections. Illegal access to the data, digital vandalism, data mutilation, and other threats will be existed to attack time by time. So, digital librarians should able to identify the cybercrime modes in the digital library systems, and also their weak-point to anticipate and minimizing threats to their systems.
2011-11-01
Other
NonPeerReviewed
application/pdf
en
http://eprints.rclis.org/16968/1/KEJAHATAN%20TERHADAP%20INFORMASI%20%28CYBERCRIME%29.pdf
Ali, Irhamni KEJAHATAN TERHADAP INFORMASI (CYBERCRIME) DALAM KONTEKS PERPUSTAKAAN DIGITAL KEJAHATAN TERHADAP INFORMASI (CYBERCRIME) DALAM KONTEKS PERPUSTAKAAN DIGITAL., 2011 UNSPECIFIED. (Unpublished) [Other]
oai:eprints.rclis.org:18401
2014-10-02T12:24:59Z
7374617475733D707562
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C51
7375626A656374733D4C2E:4C52
74797065733D636F6E66706F73746572
636F756E74726965733D4555524F5045:54522D
http://eprints.rclis.org/18401/
Monitoring electronic resources and devices with Nagios in ITU Library
Çelikbaş, Zeki
Çelikbaş, Sema
LB. Computer networking.
LH. Computer and network security.
LQ. Library automation systems.
LR. OPAC systems.
In this study applications for "Monitoring in Libraries" used in ITU Mustafa Inan Library are presented. Nagios open source monitoring application is used in this project. The subject of "Monitoring in Librararies" covers controling the network objects (devices, servers and services) located inside and outside the library. Installation, configuration, stages and reporting of monitoring are described in detail below this work.
2012-08-10
Conference poster
PeerReviewed
other
en
http://eprints.rclis.org/18401/6/celikbas_Monitoring_in_Libraries_ITU.pdf
Çelikbaş, Zeki and Çelikbaş, Sema Monitoring electronic resources and devices with Nagios in ITU Library., 2012 . In 78th IFLA World Library and Information Congress, Helsinki (Finland), 11-17 August 2012. [Conference poster]
oai:eprints.rclis.org:19015
2014-10-02T12:25:46Z
7374617475733D707562
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C5A
74797065733D636F6E667061706572
636F756E74726965733D536F757468416D6572696361:45432D
636F756E74726965733D4555524F5045:45532D
http://eprints.rclis.org/19015/
Modelo de confianza para comunidades virtuales de aprendizaje
Chamba-Eras, Luis-Antonio
Arruarte, Ana
Elorriaga, Jon-Ander
LH. Computer and network security.
LZ. None of these, but in this section.
This work describes a trust model for virtual learning
communities (VLC). The model consists of six factors that
will assess the confidence of the different participants of
VLC, as well as, the elements involved in it. The participants are able to comply the moderator or student roles on the learning spaces created. The proposed model is generic in the virtual communities field and configurable according of the weights of each factor within the model. The factors which are integrated into the model are; Role, Knowledge, Reputation, Quality, Digital Rights Certificate and Previous Experience. A practical study has been carried out under an educational environment at the University of Loja (Ecuador). The aim of this work is evaluate the importance of the model factors in two different groups for students. Surveys and a procedure were designed to obtain the weights of each factor and to achieve the proposed objective. The system VLC and EQAULA have been used in this research, as well as, Limesurvey in order to surveys online.
Nuevas Ideas en Informática Educativa
Sánchez-Llabaca, Jaime
2011-12
Conference paper
PeerReviewed
text
es
http://eprints.rclis.org/19015/1/PaperTISE2011.pdf
Chamba-Eras, Luis-Antonio and Arruarte, Ana and Elorriaga, Jon-Ander Modelo de confianza para comunidades virtuales de aprendizaje., 2011 . In XVI Congreso Internacional de Informática Educativa 2011 (TISE), Santiago de Chile (Chile), 30 November to 1-2 December 2011. [Conference paper]
oai:eprints.rclis.org:19710
2014-10-02T12:26:46Z
7374617475733D707562
7375626A656374733D422E:4246
7375626A656374733D4C2E
7375626A656374733D4C2E:4C48
74797065733D636F6E667061706572
636F756E74726965733D41534941:494E2D
http://eprints.rclis.org/19710/
Academic Social Networking in India and Dissemination of Indigenous Knowledge: A Study
Jasimudeen, S
Maghesh Rajan, M
BF. Information policy
L. Information technology and library technology
LH. Computer and network security.
Discusses the advantages of academic networks and the problems of access to journal articles via e-journal consortium's in India. Proposal for an educational social network as part of teh National Knowledge Network (NKN) platform is put forth. The need for digitization of indigenous academic resources and its dissemination through networks for better access is also emphasized
2012-07-26
Conference paper
PeerReviewed
text
en
http://eprints.rclis.org/19710/1/ERIS.pdf
text
en
http://eprints.rclis.org/19710/2/ERIS.pdf
Jasimudeen, S and Maghesh Rajan, M Academic Social Networking in India and Dissemination of Indigenous Knowledge: A Study., 2012 . In International Seminar on Gandhian Educational Principles and Practices for the Emerging Global Scenario, Thiruvananthapuram, 25-27 July 2012. [Conference paper]
oai:eprints.rclis.org:23692
2014-10-02T12:32:43Z
7374617475733D707562
7375626A656374733D422E:4249
7375626A656374733D4B2E:4B47
7375626A656374733D4C2E:4C48
74797065733D6A6F75726E616C65
636F756E74726965733D4E4341:43522D
http://eprints.rclis.org/23692/
CAPTCHA: ¿solución para la seguridad informática o problema para la accesibilidad/usabilidad web?
Vega, Omar Antonio, AVO
Vinasco-Salazar, Ronald Eduardo, VSR
BI. User interfaces, usability.
KG. Safety.
LH. Computer and network security.
CAPTCHAs, which constitute the most widely used human interactive proofs (HIP), appear as a method of differentiation between human computer users and machines to provide security for information on the Internet and avoid spam, especially. Therefore, this paper makes an introductory presentation of HIPs, and then delves into CAPTCHAs, their evolution and classification, specifying their generation techniques, some of its applications
and types of attacks to which they are subjected. It then discusses some implications that CAPTCHAs have had on usability/accessibility to the Internet services for human users, which leads to the question of whether they become a new problem, rather than a solution.
Universidad de Costa Rica. Escuela de Bibliotecología y Ciencias de la Información.
2014-06-01
Journal article (Unpaginated)
PeerReviewed
text
en
http://eprints.rclis.org/23692/1/4-2-1e.pdf
Vega, Omar Antonio, AVO and Vinasco-Salazar, Ronald Eduardo, VSR CAPTCHA: ¿solución para la seguridad informática o problema para la accesibilidad/usabilidad web? e-Ciencias de la Información, 2014, vol. 4, n. 2. [Journal article (Unpaginated)]
oai:eprints.rclis.org:28254
2015-11-11T12:38:14Z
7374617475733D707562
7375626A656374733D422E:4241
7375626A656374733D462E:4641
7375626A656374733D472E:4744
7375626A656374733D4C2E
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C44
7375626A656374733D4C2E:4C48
74797065733D6A6F75726E616C70
636F756E74726965733D41534941:4D592D
http://eprints.rclis.org/28254/
Virtual R&D teams: A new model for product development
Ebrahim, Nader Ale
BA. Use and impact of information.
FA. Co-operation.
GD. Organizations.
L. Information technology and library technology
LB. Computer networking.
LD. Computers.
LH. Computer and network security.
Increased global competitions have urged small and medium enterprises (SMEs) to develop new products faster. Virtual research and development (R&D) teams in SMEs can offer a solution to speed up time-to-market of new product development (NPD). However, factors that affect the effectiveness of virtual teams for NPD are still not adequately verified. This paper presents the correlations between virtual R&D team constructs and virtual team effectiveness by developing a “Virtual Research and Development Team” (ViR&DT) model. The items, which may influence the effectiveness of virtual teams, are taken from the literature. Through an online survey and by application of structural equation modeling (SEM) technique, the proposed model (ViR&DT) has been tested. The results suggest that the process construct is strongly correlated to the effectiveness of virtual teams. Therefore, NPD managers in virtual R&D teams should concentrate on the process of new product development rather than simply equipping the teams with the latest technology or employing highly qualified experts. Further empirical research is recommended to fully explore and appreciate the breadth of application of the ViR&DT model.
2015-10-27
Journal article (Paginated)
PeerReviewed
archive
en
cc_by_nd
http://eprints.rclis.org/28254/1/pdf_20
text
en
http://eprints.rclis.org/28254/2/43-150-1-PB.pdf
Ebrahim, Nader Ale Virtual R&D teams: A new model for product development. International Journal of Innovation, 2015, vol. 3, n. 2, pp. 1-27. [Journal article (Paginated)]
http://dx.doi.org/10.5585/iji.v3i2.43
doi:10.5585/iji.v3i2.43
oai:eprints.rclis.org:28365
2015-11-24T07:31:30Z
7375626A656374733D4C2E:4C48
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:49542D
http://eprints.rclis.org/28365/
Computer Forensics: the new boundaries of legality
Giovinazzo, Giulio
LH. Computer and network security.
New technologies are making a decisive contribution to the reinvention of life in a new global environment represented by the network. This increasingly often turns into an environment accessible to different types of crime and abuse. Pedophilia computer fraud economic are already numerous cases of wrongdoing made through computer support over the last ten years. The computer foresics began as an attempt by the institutions to fight and prevent more or less serious offenses that are committed in the network every day. In this article we analyze the main performances by the Italian government with the enactment of laws aimed at this end and with the creation of special police computer during the period between 2008 and 2012.
2015-11
Preprint
NonPeerReviewed
text
it
http://eprints.rclis.org/28365/1/computer%20forensics.pdf
Giovinazzo, Giulio Computer Forensics: the new boundaries of legality., 2015 [Preprint]
oai:eprints.rclis.org:28630
2015-12-21T06:47:33Z
7374617475733D707562
7375626A656374733D412E:4142
7375626A656374733D422E:4243
7375626A656374733D422E:4249
7375626A656374733D472E:4741
7375626A656374733D472E:4742
7375626A656374733D472E:4743
7375626A656374733D482E:4850
7375626A656374733D482E:4851
7375626A656374733D492E:4942
7375626A656374733D4B2E:4B47
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C44
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C4A
7375626A656374733D4C2E:4C4B
7375626A656374733D4C2E:4C53
74797065733D6A6F75726E616C65
636F756E74726965733D4555524F5045:55412D
http://eprints.rclis.org/28630/
Development of a software for computer-linguistic verification of socio-demographic profile of web-community member
Feduhko, Solomia
AB. Information theory and library theory.
BC. Information in society.
BI. User interfaces, usability.
GA. Information industry.
GB. Software industry.
GC. Computer and telecommunication industry.
HP. e-resources.
HQ. Web pages.
IB. Content analysis (A and I, class.)
KG. Safety.
LB. Computer networking.
LC. Internet, including WWW.
LD. Computers.
LH. Computer and network security.
LJ. Software.
LK. Software methodologies and engineering.
LS. Search engines.
This article considers the current important scientific and applied problem of socio-demographic characteristics validation of virtual community members by computer-linguistic analysis of web-community members' information track. A systematic analysis of the web-members information content and the research of the web-communication specificity of each socio-demographic characteristics value by virtual community content validation for further modeling socio-demographic profiles of web-members are realized. Mathematical models of basic virtual community member socio-demographic characteristics for creating a socio-demographic profile of virtual community member are generated. The method of registration and validation of virtual community member's personal data by checking the maximum amount of virtual community member's data for improving the quality of content and methods of virtual community management is developed. The software for socio-demographic characteristics verification of web-community member, "Socio-demographic profile verifier", is developed, by forming socio-demographic profile of virtual community member that is based on the system building information model of socio-demographic profile of virtual community member for the automation of the verification process of web-custom content.
Webology Center
2014-12-27
Journal article (Unpaginated)
PeerReviewed
text
en
http://eprints.rclis.org/28630/2/Development%20of%20a%20software%20for%20computer-linguistic%20verification%20of%20socio-demographic%20profile%20of%20web-community%20member.pdf
Feduhko, Solomia Development of a software for computer-linguistic verification of socio-demographic profile of web-community member. Webology, 2014, vol. 11, n. 2. [Journal article (Unpaginated)]
oai:eprints.rclis.org:29131
2016-03-23T15:02:21Z
7374617475733D707562
7375626A656374733D422E:425A
7375626A656374733D452E:4545
7375626A656374733D4C2E:4C48
74797065733D6A6F75726E616C65
636F756E74726965733D4555524F5045:47422D
http://eprints.rclis.org/29131/
The digital divide in the post-Snowden era
Clark, Ian
BZ. None of these, but in this section.
EE. Intellectual freedom.
LH. Computer and network security.
Edward Snowden's disclosure of mass surveillance of the internet has necessitated a re-examining of our relationship with the internet. Rather than a tool that broadens democratic engagement, the internet is increasingly used as a tool to manage and direct citizens, particularly via the mass collection of personal data by both the state and large multi-national corporations. Although online tools are available to protect intellectual privacy and ensure individuals can fully engage in the democratic process, they are subject to the same limitations as other aspects of the digital divide in terms of social, economic and cultural capital. Regarding online intellectual privacy, the evidence suggests there are more efforts by the library profession to protect the rights of the individual in the United States, the home of the NSA, than in the United Kingdom. This paper seeks to investigate the state of this aspect of the digital divide and what is being done to address it.
2016-03-14
Journal article (Unpaginated)
PeerReviewed
text
en
cc_by
http://eprints.rclis.org/29131/1/Clark-2016.pdf
Clark, Ian The digital divide in the post-Snowden era. Journal of Radical Librarianship, 2016, vol. 2. [Journal article (Unpaginated)]
oai:eprints.rclis.org:30016
2016-09-22T08:02:55Z
7374617475733D7375626D6974746564
7375626A656374733D442E:444B
7375626A656374733D452E:4546
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
74797065733D70726573656E746174696F6E
636F756E74726965733D4555524F5045:47422D
http://eprints.rclis.org/30016/
Access denied? Managing access to the Web within the NHS in England: technology, risk, culture, policy and practice
Ebenezer, Catherine
Bath, Peter
Pinfield, Stephen
DK. Health libraries, Medical libraries.
EF. Censorship.
LC. Internet, including WWW.
LH. Computer and network security.
1. Introduction
The research project as a whole examined the factors that bear on the accessibility of online published professional information within the National Health Service (NHS) in England, and the implications that these have for library and information services.
The overall aim of this study was to investigate the apparent disjunction between stated policy regarding evidence-based practice and professional learning, and actual IT (information technology) strategy, service delivery and security practice at NHS trust level, from both technical and organisational perspectives. The presentation discusses the following specific issues:
1) the nature and extent of restrictions on access to websites and web applications within NHS organisations;
2) the impacts of these on professional information seeking and working practices;
3) the technical and organisational factors which bear on how web security is implemented within NHS trusts, in relation to overall organisational priorities and strategies.
2. Methods
The study adopted a qualitative case study method, taking three NHS trusts of different types for its setting. The lead researcher [CE] conducted a total of 40 semi-structured interviews with library and workforce development staff, IT managers, information governance managers, and clinical professionals. Interview findings are set in the context of the trusts’ and other relevant reports, policies, strategies and standards.
3. Results
Staff in the teaching hospital trust experienced the greatest number of obstacles to information seeking caused by the blocking of legitimate websites (‘false positives’). This affected the work of clinical educators in particular.
Much decision-making in relation to information security issues seemed to be tacit. IT security managers reported not having the time to evaluate the effectiveness or impact of the web security devices they deploy on NHS networks. They were likely to accept the default configurations and categorisations of content offered by the suppliers. The focus of their attention appeared to be on the potential security risks posed by ‘recreational’/non-work use of the web.
4. Conclusions
Little attention has been paid within the NHS information systems community to the issue of access to legitimate published information. The focus is heavily on the secure and appropriate management of clinical records and systems. Community-based staff appeared to be more likely (than their hospital-based colleagues) to be significantly disadvantaged by restrictive access control policies.
2016-09-16
Presentation
NonPeerReviewed
slideshow
en
http://eprints.rclis.org/30016/1/CME-HLG-conference-presentation-0916-v2.3.pptx
slideshow
en
http://eprints.rclis.org/30016/2/CME-HLG-conference-presentation-0916-v2.3.pdf
Ebenezer, Catherine and Bath, Peter and Pinfield, Stephen Access denied? Managing access to the Web within the NHS in England: technology, risk, culture, policy and practice., 2016 . In Health Libraries Group, Scarborough (United Kingdom), 15-16 September 2016. (Submitted) [Presentation]
oai:eprints.rclis.org:30026
2016-10-07T13:03:26Z
7374617475733D707562
7375626A656374733D422E:425A
7375626A656374733D442E:444B
7375626A656374733D482E:48542E
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
74797065733D70726573656E746174696F6E
636F756E74726965733D4555524F5045:47422D
http://eprints.rclis.org/30026/
Social media applications within the NHS: role and impact of organisational culture, information governance, and communications policy
Ebenezer, Catherine
Bath, Peter A
Pinfield, Stephen
BZ. None of these, but in this section.
DK. Health libraries, Medical libraries.
HT. Web 2.0, Social networks
LC. Internet, including WWW.
LH. Computer and network security.
The paper focuses on health professionals’ attitudes to and use of Web 2.0 and social media within their practice and on the management of access to Web 2.0 and social media applications within NHS organisations. It discusses the following specific issues:
1) the nature and extent of restrictions on access to such applications within NHS organisations arising from organisational policies;
2) their impacts on professional information seeking and sharing, and working practices in general;
3) the attitudes, professional norms, presuppositions and practices which bear on how social media policy is implemented within NHS trusts, in relation to overall organisational strategies.
There is a need to develop a better understanding of, on the one hand, a clear need for robust information governance and network security, with, on the other hand, systems and procedures that enable appropriate access to valid online resources to support professional information needs. Particular questions that need to be addressed include: Why are restrictions imposed on access to Web 2.0 or social media-based information resources, or technologies to support professional information seeking? What issues for the accessibility of information within the English NHS are posed by current approaches to information governance risk?
2015-10-21
Presentation
NonPeerReviewed
slideshow
en
http://eprints.rclis.org/30026/1/C%26L-AHPR-research-presentation-211015.pptx
slideshow
en
http://eprints.rclis.org/30026/2/C%2526L-AHPR-research-presentation-211015.pdf
Ebenezer, Catherine and Bath, Peter A and Pinfield, Stephen Social media applications within the NHS: role and impact of organisational culture, information governance, and communications policy., 2015 . In Cumbria and Lancashire Allied Health Professions Research Hub Event, Rheged (United Kingdom), 21st October 2015. [Presentation]
oai:eprints.rclis.org:30158
2016-10-29T02:25:27Z
7374617475733D707562
7375626A656374733D4C2E:4C48
74797065733D6A6F75726E616C65
636F756E74726965733D41534941:494E2D
http://eprints.rclis.org/30158/
A Novel Intrusion Detection System for Detecting Black Hole Attacks in Wireless Sensor Network using AODV Protocol
Ghugar, Umashankar
Pradhan, Jayaram
Biswal, Monalisa
LH. Computer and network security.
Wireless Sensor Networks (WSN) has wide application in data gathering and data transmission as per the user’s requirement and it consist of number of nodes. These nodes have limited battery power, limited resources and limited computational power .Due to all these factors, WSN faces more security threats. Security issues are a vital problem to be solved in Wireless Sensor networks (WSNs). Different types of intrusion detection systems (IDS) are developed to make WSN more secure. In this paper the proposed IDS are based on watchdog monitoring technique and are able to detect Black Hole attacks using AODV (Ad- Hoc On-Demand Distance Vector) Protocol. Besides, the betterment that makes watchdog monitoring technique more reliable are described and the results of simulations of the IDS on NS-2 simulator are presented.
DLAR LABS PVT LTD
2016-08-31
Journal article (Unpaginated)
PeerReviewed
text
en
http://eprints.rclis.org/30158/1/A-Novel-Intrusion-Detection-System-for-Detecting-Black-Hole-Attacks-in-Wireless-Sensor-Network-using-AODV-Protocol.pdf
text
en
http://eprints.rclis.org/30158/2/A-Novel-Intrusion-Detection-System-for-Detecting-Black-Hole-Attacks-in-Wireless-Sensor-Network-using-AODV-Protocol.pdf
Ghugar, Umashankar and Pradhan, Jayaram and Biswal, Monalisa A Novel Intrusion Detection System for Detecting Black Hole Attacks in Wireless Sensor Network using AODV Protocol. IJCSN - International Journal of Computer Science and Network, 2016, vol. 5, n. 4. [Journal article (Unpaginated)]
oai:eprints.rclis.org:31069
2017-10-14T04:27:04Z
7374617475733D707562
7375626A656374733D482E:484C
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C48
74797065733D636F6E667061706572
636F756E74726965733D41534941:494E2D
http://eprints.rclis.org/31069/
Virtual Private Network for E-Resources Sharing: A Case Study.
V., Vimal Kumar
HL. Databases and database Networking.
LB. Computer networking.
LH. Computer and network security.
Mahatma Gandhi University central library has established an SSH-based Virtual Private Network (VPN) to share information resources with libraries located outside the campus. Off-Campus libraries of Mahatma Gandhi University are extensively using by faculty members and research scholars from affiliated colleges. An SSH protocol based encrypted communication tunnel is the main component of VPN service. Open Source software and standards have adopted to reduce total cost ownership of the system. Mahatma Gandhi University Library VPN service ensures seamless access to online resources to the academic community away from the main campus through Off-Campus libraries.
Bharathidasan University
S., Srinivasa Raghavan
R., Balasubramani
B., Ramesh Babu
2017-02
Conference paper
PeerReviewed
text
en
http://eprints.rclis.org/31069/1/Virtual%20private%20network%20for%20E-resources%20sharing.pdf
V., Vimal Kumar Virtual Private Network for E-Resources Sharing: A Case Study., 2017 . In International Conference on Knowledge Resources and Library Technologies, Department of Library and Information Science, Bharathidasan University, 24-25 February 2017. [Conference paper]
oai:eprints.rclis.org:31861
2018-01-28T18:43:16Z
7374617475733D707562
7375626A656374733D4C2E:4C48
74797065733D6E65777361727469636C65
636F756E74726965733D536F757468416D6572696361:42522D
http://eprints.rclis.org/31861/
Segurança da informação em bibliotecas universitárias: a atuação do bibliotecário no planejamento e na implantação de políticas institucionais
Lima, Juliana Soares
Araújo, Ana Rafaela Sales de
Santos, Francisco Edvander Pires
Barbosa, Luiz Gonzaga Mota
Santos, Izabel Lima dos
LH. Computer and network security.
This study presents a short discussion about the role of the librarian as a mediator at planning, developing and implementing an Information Security Policy in Academic Libraries, by working together with professionals in the field of Information Technology. It also discusses the main virtual threats and some risks that are prone to infect computers in libraries. Based on the current legislation and on some normative documents about information security, it is confirmed the importance of the librarian take part in the main decision-making related to information security, such as planning a consistent Information Security Policy which be able to see the specific needs of Academic Libraries as institutions prone to cyberattacks. The main topics and guidelines to carry out an Information Security Policy are presented based on the results that were obtained through an action research, by visiting libraries to fill in application forms and to compose reports whose content was analyzed. Finally, the study concludes that Information Security Policy must be validated by managers of sectors or departments which the Academic Library is hierarchically subordinate to.
2017-08-01
Newspaper/magazine article
PeerReviewed
text
pt
http://eprints.rclis.org/31861/1/8646416-25836-6-PB.pdf
Lima, Juliana Soares and Araújo, Ana Rafaela Sales de and Santos, Francisco Edvander Pires and Barbosa, Luiz Gonzaga Mota and Santos, Izabel Lima dos Segurança da informação em bibliotecas universitárias: a atuação do bibliotecário no planejamento e na implantação de políticas institucionais., 2017 [Newspaper/magazine article]
http://doi.org/10.20396/rdbci.v15i2.8646416
doi:10.20396/rdbci.v15i2.8646416
oai:eprints.rclis.org:31899
2017-11-05T23:04:05Z
7374617475733D707562
7375626A656374733D4C2E:4C48
74797065733D6E65777361727469636C65
636F756E74726965733D536F757468416D6572696361:42522D
http://eprints.rclis.org/31899/
Para uma política de informação no ciberespaço: avanços, perspectivas e desafios
Villota Enríquez, Jakeline Amparo
Ogécime, Mardochée
Villota Enríquez, Maribel Deicy
González Valencia, Heriberto
LH. Computer and network security.
This article is to describe and analyze the policies of information in cyberspace, both global and regionally, in different directions: programs, resolutions, and projects from the information sector. Likewise, an overview of the same is presented in the Latin American and Caribbean region. Through documentary analysis of the literature related to the topic, the article is based on a review of literature raised from scientific materials such as: books, thesis papers, dissertations, texts on internet sites and articles, resolutions, projects and decrees dealing with the same topic. As a result, cyberspace is conceptualized and its elements, dimensions, strategies and variations are characterized, by analyzing the information from cyberspace policy, based on the global stage
to relate it, finally, to the region of Latin America and the Caribbean, with the idea of better addressing the problems. The cyberspace information policy experience a minor and slow process in the field of cyber war; resulting from the obstacle of international cooperation defined by the disparate ambitions of the State or region.
2017
Newspaper/magazine article
PeerReviewed
text
en
http://eprints.rclis.org/31899/1/8647632-28836-4-PB.pdf
Villota Enríquez, Jakeline Amparo and Ogécime, Mardochée and Villota Enríquez, Maribel Deicy and González Valencia, Heriberto Para uma política de informação no ciberespaço: avanços, perspectivas e desafios., 2017 [Newspaper/magazine article]
http://doi.org/10.20396/rdbci.v15i3.8647632
doi:10.20396/rdbci.v15i3.8647632
oai:eprints.rclis.org:33602
2018-10-25T11:20:37Z
7374617475733D756E707562
7375626A656374733D4C2E:4C48
74797065733D746563687265706F7274
636F756E74726965733D41534941:504B2D
http://eprints.rclis.org/33602/
Cooperation for Vehicular Delay Tolerant Network
Zeeshan, Haider
Shariq, Butt
LH. Computer and network security.
This article reviews the literature related to Vehicular Delay Tolerant Network with focus on Cooperation. It starts by examining definitions of some of the fields of research in VDTN. An overview of VDTN with cooperative networks is presented.
2018-10-16
Technical report
NonPeerReviewed
text
en
http://eprints.rclis.org/33602/1/Cooperation%20in%20Vehicular%20Delay%20Tolerant%20Network1x.pdf
Zeeshan, Haider and Shariq, Butt Cooperation for Vehicular Delay Tolerant Network., 2018 (Unpublished) [Technical report]
oai:eprints.rclis.org:33616
2018-10-18T07:30:14Z
7374617475733D756E707562
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C48
74797065733D746563687265706F7274
636F756E74726965733D4555524F5045:50542D
http://eprints.rclis.org/33616/
A Survey on Cooperation for VDTN
Zeeshan, Haider
Shariq, Butt
LB. Computer networking.
LH. Computer and network security.
Vehicular Delay-Tolerant Networks (VDTNs) are composed of mobile nodes (vehicles) that communicate with each other wirelessly and using store carry and forward paradigm to forward data despite intermittent connectivity. There are major challenges in establishing effective communications between nodes in Vehicular Ad Hoc Networks (VANETs). In them the systems are subject to wireless interference and disconnections, thus hindering the availability and reliability of source-destination connections. Another major problem arises when VANETs are sparse, causing excessive retransmissions and delays due to long periods without maintaing connection between pair of vehicles. This article reviews the literature related to Vehicular Delay Tolerant Network with focus on Cooperation. It starts by examining definitions of some of the fields of research in VDTN. An overview of VDTN with cooperative networks is presented
2018-10-17
Technical report
NonPeerReviewed
text
en
http://eprints.rclis.org/33616/1/vdtn.pdf
Zeeshan, Haider and Shariq, Butt A Survey on Cooperation for VDTN., 2018 (Unpublished) [Technical report]
oai:eprints.rclis.org:33929
2019-06-11T17:35:42Z
7375626A656374733D422E:4243
7375626A656374733D4C2E:4C48
74797065733D7072657072696E74
636F756E74726965733D4F4345414E4941:41552D
636F756E74726965733D536F757468416D6572696361:42522D
http://eprints.rclis.org/33929/
Sistemas nacionais de prontuários eletrônicos frente à privacidade de dados
Ricarte, Ivan L. M.
BC. Information in society.
LH. Computer and network security.
This paper analyzes privacy issues contemplated in national electronic health record systems, with the My Health Record system from Australia as a case study. Privacy issues are organized in accordance with a conceptual framework of informational privacy that addresses corporate privacy practices and customer behavior. After searching the bibliographic databases that cover the health area, 18 articles were selected and analyzed that addressed the privacy practices offered by the government, the perceptions or attitudes of users, as well as their intentions or behavior related to informational privacy. Regarding privacy practices, the aspects of collection and storage of information about patients, as well as the degree of transparency and control exercised by the patient about their data, were addressed. Concerning patient perception, there is a fear of inappropriate access to data as well as identity theft and misuse of information by insurance companies or employers, but not different from that of on paper. Finally, as the patient has access to information about their health, there is a need for these patients to be able to understand what has been registered, that is, there is a demand for better health literacy, but health professionals fear that this access by patients can lead to unnecessary confusion and worry, leading to an increase in workload. It is concluded that the patient-controlled electronic health record at the national level can be an effective tool to empower the citizen in controlling his health and a motivator to broaden the conditions of his health literacy. However, privacy issues involved demand that there be an explicit and clear position on the part of the governments on the guarantee of the confidentiality of the data and secondary uses that may be made of this information.
2019-06-10
Preprint
PeerReviewed
text
pt
cc_by_nc_sa_4
http://eprints.rclis.org/33929/1/Ricarte%20EDICIC2019%20preprint.pdf
Ricarte, Ivan L. M. Sistemas nacionais de prontuários eletrônicos frente à privacidade de dados., 2019 [Preprint]
oai:eprints.rclis.org:34014
2019-12-21T10:28:19Z
7374617475733D756E707562
7375626A656374733D422E:42422E
7375626A656374733D4C2E
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
74797065733D7265706F7274
636F756E74726965733D4555524F5045:54522D
http://eprints.rclis.org/34014/
Securing Data Encryption
Abbas, Khurum
BJ. Communication
L. Information technology and library technology
LA. Telecommunications.
LB. Computer networking.
LC. Internet, including WWW.
LH. Computer and network security.
This article provide analysis about information security using cryptography techniques. After the analyzing different techniques of encryption, we are proposing Advance Encryption Standard (AES). The AES has the better security compared others encryption algorithm and prevent data from Spoofing. It is very efficient in both hardware and software.
2019-02-20
Report
NonPeerReviewed
text
en
http://eprints.rclis.org/34014/1/dcn%20new%20reprt.pdf
Abbas, Khurum Securing Data Encryption., 2019 (Unpublished) [Report]
oai:eprints.rclis.org:34017
2019-03-03T18:10:47Z
7374617475733D707562
7375626A656374733D412E
7375626A656374733D412E:4141
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
74797065733D636F6E667061706572
636F756E74726965733D41534941:494E2D
http://eprints.rclis.org/34017/
INTERNET OF THINGS: APPLICATIONS IN EDUCATION SECTOR
Sengupta, Shantashree
A. Theoretical and general aspects of libraries and information.
AA. Library and information science as a field.
LC. Internet, including WWW.
LH. Computer and network security.
Today the objects around us are getting connected with each other in ‘Smart’ ways. Our home, office, industries etc. are connected with each other with the help of latest technologies. Internet of Things is one such technology which is connecting our surroundings very easily. In spite of the successful intervention of IoT in our home automation, office automation, industrial automation etc., the education sector is somewhere laid behind. The educational institutions are very slowly starting understanding the importance and effectiveness of IoT. Use of IoT in daily teaching can completely revolutionize the ways of teaching and learning. The present article emphasizes upon the concept of IoT and how it can very efficiently restructure our traditional education and learning methods.
AJANTA PRAKASHAN, AURANGABAD
2019-01
Conference paper
PeerReviewed
text
en
http://eprints.rclis.org/34017/1/Shantashree%20Sengupta%20MMCC%20Paper%202019.pdf
Sengupta, Shantashree INTERNET OF THINGS: APPLICATIONS IN EDUCATION SECTOR., 2019 . In TEACHING LEARNING WITH ICT: AN INNOVATIVE APPROACH, PUNE, 1.2.2019 TO 2.2.2019. [Conference paper]
oai:eprints.rclis.org:34203
2019-04-17T13:25:42Z
7375626A656374733D4C2E:4C48
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:54522D
http://eprints.rclis.org/34203/
Solution for TCP/IP Flooding
Ullah, Kiramat
LH. Computer and network security.
TCP stands for transmission control protocol. It was defined by Internet Engineering Task Force (IETF). It is used in establishing and maintaining communication between applications on different computers and provide full duplex acknowledgement and flow control service to upper layer protocol and application. [2][3][4][5]
In this report proposes solution for TCP SYN flood.
2019-03-10
Preprint
NonPeerReviewed
text
en
cc_public_domain
http://eprints.rclis.org/34203/1/syn%20flooding%20%282%29.pdf
text
en
http://eprints.rclis.org/34203/7/solution%20for%20flooding.pdf
Ullah, Kiramat Solution for TCP/IP Flooding., 2019 [Preprint]
oai:eprints.rclis.org:34204
2019-04-17T13:25:03Z
7374617475733D756E707562
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C542E
74797065733D7475746F7269616C
636F756E74726965733D4555524F5045:42452D
http://eprints.rclis.org/34204/
Tutorials for Internet of Things(IoT)
Khurum, Abbas
LB. Computer networking.
LH. Computer and network security.
LT. Mobile devices
We’re entering a new era of computing technology that many are calling the Internet of Things (IoT). Machine to machine, machine to infrastructure, machine to environment, the Internet of Everything, the Internet of Intelligent Things, intelligent systems—call it what you want, but it’s happening, and its potential is huge.
. The IoT is comprised of smart machines interacting and communicating with other machines, objects, environments and infrastructures. As a result, huge volumes of data are being generated, and that data is being processed into useful actions that can “command and control” things to make our lives much easier and safer—and to reduce our impact on the environment.
2019-03-10
Tutorial
NonPeerReviewed
text
en
http://eprints.rclis.org/34204/1/IoT-Tut-Waji.pdf
Khurum, Abbas Tutorials for Internet of Things(IoT)., 2019 (Unpublished) [Tutorial]
oai:eprints.rclis.org:38581
2019-06-20T21:09:11Z
7375626A656374733D4C2E:4C48
74797065733D7072657072696E74
636F756E74726965733D536F757468416D6572696361:42522D
http://eprints.rclis.org/38581/
Preservação digital de software livre: o archivematica à luz da resolução nº 43 do Conselho Nacional de Arquivos
Gomes, Wellington da Silva
Autran, Marynice Medeiros de Matos
LH. Computer and network security.
The advent of information technology allowed information to evolve into different types of devices, including applications, hardware, and software. These mechanisms are representative of the machine / software (hardware) and of the logical processes (software), are responsible for the actuality, for the generation of information in the virtual environment, and, thus, for the dynamization of the means of communication instrumented by the computer and internet. This is one of the most important cases that we have as a reason, an acceleration of the development of studies in the fields, such as in Information Science (IC) and Archivology. To observe, then, that the digital document is being used in a large part of human activities and, therefore, within institutions, considering the advantages they produce in the production, processing, organization, access and information storage . Digital archive of archival digital content (RDC-Arq), which establishes the guidelines for the implementation of reliable digital repositories. To reach such purpose, it is proposed: to analyze the characteristics and characteristics of Archivematica; characterize such a system; its pre-existing functions and previous characteristics are preconditioned by Resolution 43; to verify the compatibility of Archivematica with the requirements of the aforementioned resolution. The data programological methods, the research is projected as descriptive in comparative bias; regarding the design, is presented as a bibliographical and documentary, with a qualitative approach. For a collection of data, consult the Electronic Archive website with your manuals. The preliminary results point to the compatibility of the Resolution nº 43 of CONARQ with the characteristics of Archivematica.
2019-06-14
Preprint
PeerReviewed
text
pt
cc_by_sa
http://eprints.rclis.org/38581/1/EDICIC_RESUMO%20Wellington.docx
Gomes, Wellington da Silva and Autran, Marynice Medeiros de Matos Preservação digital de software livre: o archivematica à luz da resolução nº 43 do Conselho Nacional de Arquivos., 2019 [Preprint]
info:eu-repo/semantics/other
info:eu-repo/date/embargoEnd/2020-06-14
info:eu-repo/semantics/embargoedAccess
oai:eprints.rclis.org:39125
2019-10-17T14:05:26Z
7374617475733D707562
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C49
74797065733D6A6F75726E616C70
636F756E74726965733D4555524F5045:45532D
http://eprints.rclis.org/39125/
Solución para garantizar la privacidad en Internet de las cosas
José-Antonio, Sánchez-Alcón
Lourdes, López-Santidrián
José-Fernán, Martínez
LH. Computer and network security.
LI. Authentication, and access control.
New products and services offered by the “internet of things” will make us more efficient, more able to understand our environment and take action, and new assistive technologies will allow us to extend our working lives. Nonetheless, we will coexist with a large number of devices collecting information about our activities, habits, preferences, etc. This situation could threaten our privacy. Distrust could be a barrier to the full development of these new products and services. This article offers a possible solution to ensure security and privacy for personal data on the internet of things, using techniques that result from a collaboration between the business, legislative and technological areas and are designed to build trust with all stakeholders.
Ediciones Profesionales de la Información SL, Spain
2015-01-01
Journal article (Paginated)
PeerReviewed
text
es
cc_by
http://eprints.rclis.org/39125/7/Soluci%C3%B3n%20para%20garantizar%20la%20privacidad%20en%20internet%20de%20las%20cosas.pdf
José-Antonio, Sánchez-Alcón and Lourdes, López-Santidrián and José-Fernán, Martínez Solución para garantizar la privacidad en Internet de las cosas. El profesional de la información, 2015, vol. 24, n. 1, pp. 62-70. [Journal article (Paginated)]
oai:eprints.rclis.org:39224
2021-02-23T12:25:00Z
7374617475733D707562
7375626A656374733D4C2E:4C48
74797065733D6A6F75726E616C70
636F756E74726965733D4555524F5045:41542D
http://eprints.rclis.org/39224/
News analysis for the detection of cyber security issues in digital healthcare: A text mining approach to uncover actors, attack methods and technologies for cyber defense
Bertl, Markus
LH. Computer and network security.
Objectives: This research reviews the possibilities of text mining in the area of cybercrime in digital healthcare showing how advanced information retrieval and natural language processing can be used to get insights. The aim is to mine news data to find out what is reported about digital healthcare, what security-related critical events happened, and what actors, attack methods, and technologies play a role there. Methods: Different projects already apply text mining successfully in the cyber domain. However, none of these are specifically tailored to threats in the digital healthcare sector or uses an as big data foundation for analysis. To achieve that goal, different text mining methodologies like fact extraction, semantic fields as well as statistical methods like frequency, correlation and trend calculations were used. The news data for the analysis was provided by the DocCenter from the National Defense Academy (DocCenter/NDA) of the Austrian Armed Forces. About 300,000 news articles were processed and analyzed. Additionally, the open source GDELT dataset was investigated. Results & Conclusion: The data points out that cyber threats are present in digital health technologies and cyberattacks are more and more threatening to organizations, governments, and every person them self. Not only hacker groups, firms, and governments are involved in these attacks, also terroristic organizations use cyberwarfare. That, together with the amount of technology in digital healthcare like pacemakers, IoT, wearables but also the importance of healthcare as critical infrastructure and the dependence on electronic health records makes our society vulnerable.
Verein zur Förderung der Informationswissenschaft
2019
Journal article (Paginated)
PeerReviewed
text
de
http://eprints.rclis.org/39224/7/YIS_4_2019_1_Bertl.pdf
Bertl, Markus News analysis for the detection of cyber security issues in digital healthcare: A text mining approach to uncover actors, attack methods and technologies for cyber defense. Young Information Scientist, 2019, vol. 4, pp. 1-15. [Journal article (Paginated)]
oai:eprints.rclis.org:39300
2019-12-14T13:40:45Z
7374617475733D756E707562
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C49
7375626A656374733D4C2E:4C542E
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:42452D
636F756E74726965733D4555524F5045:444B2D
636F756E74726965733D4555524F5045:47422D
636F756E74726965733D41534941:4D592D
636F756E74726965733D4555524F5045:504C2D
636F756E74726965733D4555524F5045:50542D
636F756E74726965733D4555524F5045:54522D
http://eprints.rclis.org/39300/
Pipelining protocols in TCP
Abbas, Khurum
LA. Telecommunications.
LB. Computer networking.
LC. Internet, including WWW.
LH. Computer and network security.
LI. Authentication, and access control.
LT. Mobile devices
Transmission Control Protocol (TCP), the most popular transport layer communication protocol for the Internet.It was originally designed for wired networks, where Bit Error Rate (BER) is low and congestion is the primary cause of packet loss [1].This article analyzes handshaking issues and pipeline protocols, such as slow start, congestion control, collisions, low BER etc. Then it provides pipeline protocols to wireless network i.e., Head of Line Blocking. At the end it proposes solution for TCP enhancement specific to wireless network.
2019-12-13
Preprint
NonPeerReviewed
text
en
http://eprints.rclis.org/39300/1/decreport.pdf
Abbas, Khurum Pipelining protocols in TCP., 2019 (Unpublished) [Preprint]
oai:eprints.rclis.org:39303
2019-12-19T09:39:12Z
7374617475733D756E707562
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C49
7375626A656374733D4C2E:4C542E
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:444B2D
636F756E74726965733D4555524F5045:50542D
636F756E74726965733D4555524F5045:54522D
http://eprints.rclis.org/39303/
Ubiquity of Healthcare System
Asam, Muhammad
Ghuman, Kashif
Ajaz, Aleena
Jamal, Tauseef
LA. Telecommunications.
LB. Computer networking.
LC. Internet, including WWW.
LH. Computer and network security.
LI. Authentication, and access control.
LT. Mobile devices
Healthcare systems defines the standards for health facilities to communities. Therefore, it is of equal importance to everyone. In addition, it included in every fields of technology such as Internet of Things (IoT), Body Area Networks (BANs), Big Data, Context Aware Computing as well as Machine Learning. Therefore, researchers have opportunity to contribute towards well-being smart society easily. E-health on other hand is trying to provide remote access and availability of Wireless BANs (WBANs) facilities. Since, the tiny economical sensors are attached to body (either by implant or wearable fashion) to monitor the health parameters and act accordingly. Therefore, WBAN standards need special attention for optimization. In our previous work, we have proposed relaying protocol, while in this work we aim to extend the relaying protocol to WBANs in order to achieve better performance and safeguard the Master Node (MN). In order to make ubiquity, we propose to extend this work to small world network. This document described the initial proposal in this regards.
2019-12-05
Preprint
NonPeerReviewed
text
en
http://eprints.rclis.org/39303/1/asimproject.pdf
Asam, Muhammad and Ghuman, Kashif and Ajaz, Aleena and Jamal, Tauseef Ubiquity of Healthcare System., 2019 (Unpublished) [Preprint]
oai:eprints.rclis.org:39305
2019-12-19T09:33:31Z
7374617475733D756E707562
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C49
7375626A656374733D4C2E:4C542E
74797065733D7475746F7269616C
636F756E74726965733D4555524F5045:42452D
636F756E74726965733D4555524F5045:444B2D
636F756E74726965733D41534941:4D592D
636F756E74726965733D4555524F5045:504C2D
636F756E74726965733D4555524F5045:54522D
http://eprints.rclis.org/39305/
Wireless Communication and its Technical Issues
Danish, naveed
Abbas, khurum
LA. Telecommunications.
LB. Computer networking.
LC. Internet, including WWW.
LH. Computer and network security.
LI. Authentication, and access control.
LT. Mobile devices
Wireless communication is the transfer of information between two or more nodes that are not connected directly through the cable network or by any other physi-cal/tangible way of conducting electrical signals or light signals such as fiber optics. This report provides systematic tutorial of wireless technologies and its issues.
2019-12-06
Tutorial
NonPeerReviewed
text
en
http://eprints.rclis.org/39305/1/danishnaveed.pdf
Danish, naveed and Abbas, khurum Wireless Communication and its Technical Issues., 2019 (Unpublished) [Tutorial]
oai:eprints.rclis.org:39306
2019-12-19T09:36:27Z
7374617475733D756E707562
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C49
7375626A656374733D4C2E:4C542E
74797065733D7475746F7269616C
636F756E74726965733D4555524F5045:444B2D
636F756E74726965733D41534941:4D592D
636F756E74726965733D41534941:504B2D
636F756E74726965733D4555524F5045:54522D
http://eprints.rclis.org/39306/
Architecture of Wireless LAN
Musadiq, Umair
Abbas, Khurum
LA. Telecommunications.
LB. Computer networking.
LC. Internet, including WWW.
LH. Computer and network security.
LI. Authentication, and access control.
LT. Mobile devices
Wireless communication is the fast growing industry and will continue to evolve. A wireless local area network (WLAN) is a flexible data communications system that use radio frequency to transmit and receive information over the air instead of physical wires. Wireless connectivity allows free movement hence world has become in-creasingly mobile.
2019-12-06
Tutorial
NonPeerReviewed
text
en
http://eprints.rclis.org/39306/1/musadiqrt.pdf
Musadiq, Umair and Abbas, Khurum Architecture of Wireless LAN., 2019 (Unpublished) [Tutorial]
oai:eprints.rclis.org:39336
2019-12-16T09:13:36Z
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C542E
74797065733D7072657072696E74
636F756E74726965733D41534941:41462D
636F756E74726965733D4555524F5045:41542D
636F756E74726965733D41534941:42442D
636F756E74726965733D4555524F5045:42452D
636F756E74726965733D4555524F5045:444B2D
636F756E74726965733D41534941:504B2D
636F756E74726965733D4555524F5045:54522D
http://eprints.rclis.org/39336/
WLAN Advantages, an Overview
kiramat, ullah
LA. Telecommunications.
LB. Computer networking.
LC. Internet, including WWW.
LH. Computer and network security.
LT. Mobile devices
Wireless communication is the fast growing industry and will continue to evolve. A wireless local area network (WLAN) is a flexible data communications system that use radio frequency to transmit and receive information over the air instead of physi- cal wires. Wireless connectivity allows free movement hence world has become in- creasingly mobile.
2019-12-08
Preprint
NonPeerReviewed
text
en
http://eprints.rclis.org/39336/1/kiramat.pdf
kiramat, ullah WLAN Advantages, an Overview., 2019 [Preprint]
oai:eprints.rclis.org:39401
2020-02-24T08:12:02Z
7374617475733D756E707562
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C49
7375626A656374733D4C2E:4C542E
74797065733D7475746F7269616C
636F756E74726965733D41534941:41462D
636F756E74726965733D4555524F5045:42452D
636F756E74726965733D4555524F5045:444B2D
636F756E74726965733D414652494341:474D2D
636F756E74726965733D41534941:494E2D
636F756E74726965733D414652494341:4D412D
636F756E74726965733D4555524F5045:504C2D
636F756E74726965733D4555524F5045:50542D
636F756E74726965733D4555524F5045:524F2D
636F756E74726965733D4555524F5045:52532D
636F756E74726965733D4555524F5045:53452D
636F756E74726965733D4555524F5045:54522D
636F756E74726965733D414652494341:5A412D
636F756E74726965733D414652494341:5A572D
http://eprints.rclis.org/39401/
Wireless Communication in Personal Space
kiramat, ullah
LA. Telecommunications.
LB. Computer networking.
LC. Internet, including WWW.
LH. Computer and network security.
LI. Authentication, and access control.
LT. Mobile devices
In communications the area of coverage is very important, such that personal space or long range to send information. The distance refers to class of networks such as per-sonal range or wide area, while the protocols of communications refer to mode or type of networks, such as ad-hoc or self organization etc. in this report we refer to the for-mer part and analyze some of the used cases for students as tutorials.
2019-12-16
Tutorial
NonPeerReviewed
text
en
http://eprints.rclis.org/39401/1/kiramat%20copy.pdf
kiramat, ullah Wireless Communication in Personal Space., 2019 (Unpublished) [Tutorial]
oai:eprints.rclis.org:39487
2020-01-08T08:51:18Z
7374617475733D756E707562
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C542E
74797065733D7475746F7269616C
636F756E74726965733D4555524F5045:42452D
636F756E74726965733D4555524F5045:42472D
636F756E74726965733D4555524F5045:4C552D
636F756E74726965733D4555524F5045:504C2D
636F756E74726965733D4555524F5045:50542D
636F756E74726965733D4555524F5045:53452D
636F756E74726965733D4555524F5045:54522D
http://eprints.rclis.org/39487/
Security Issues and Requirements in Body Area Networks
Asam, Muhammad
Khurrum, Abbas
Haider, Zeeshan
Ghuman, Kashif
LA. Telecommunications.
LB. Computer networking.
LC. Internet, including WWW.
LH. Computer and network security.
LT. Mobile devices
Wireless Body Area Network (WBAN) refers to short-range, wireless communications near or inside a human body. WBAN is emerging solution to cater the needs of local and remote health care related facility. Medical and non-medical applications have been revolutionarily under consideration for providing a healthy and gratify service to the humanity. This article addresses the security issues and requirements in WEBANs.
2020-01-06
Tutorial
NonPeerReviewed
text
en
http://eprints.rclis.org/39487/1/Security%20requ%20WBAN.pdf
Asam, Muhammad and Khurrum, Abbas and Haider, Zeeshan and Ghuman, Kashif Security Issues and Requirements in Body Area Networks., 2020 (Unpublished) [Tutorial]
oai:eprints.rclis.org:39643
2020-02-24T08:12:15Z
7374617475733D756E707562
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C542E
74797065733D7475746F7269616C
636F756E74726965733D4555524F5045:50542D
http://eprints.rclis.org/39643/
Issues of WLAN
khurrum, abbas
LA. Telecommunications.
LB. Computer networking.
LH. Computer and network security.
LT. Mobile devices
In communications the area of coverage is very important, such that personal space or long range to send information. The distance refers to class of networks such as per-sonal range or wide area, while the protocols of communications refer to mode or type of networks, such as ad-hoc or self organization etc. in this report we refer to the for-mer part and analyze some of the used cases for students as tutorials.
2020-02-12
Tutorial
NonPeerReviewed
text
en
http://eprints.rclis.org/39643/1/new%20report2020.pdf
khurrum, abbas Issues of WLAN., 2020 (Unpublished) [Tutorial]
oai:eprints.rclis.org:39646
2020-02-27T08:39:14Z
7374617475733D756E707562
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C542E
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:50542D
http://eprints.rclis.org/39646/
WBAN Applications and Issues
abbas, khurrum
LA. Telecommunications.
LB. Computer networking.
LC. Internet, including WWW.
LH. Computer and network security.
LT. Mobile devices
In communications the area of coverage is very important, such that personal space or long range to send information. The distance refers to class of networks such as per-sonal range or wide area, while the protocols of communications refer to mode or type of networks, such as ad-hoc or self organization etc. Our aim is to provide a tutorial to introduce WBAN and its working knowledge as well as architecture. We will address Emergency health issues and suggest how it can be improved.
2020-02-14
Preprint
NonPeerReviewed
text
en
http://eprints.rclis.org/39646/1/new%20report%20feb%202020.pdf
abbas, khurrum WBAN Applications and Issues., 2020 (Unpublished) [Preprint]
oai:eprints.rclis.org:39669
2020-03-12T08:29:09Z
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:50542D
http://eprints.rclis.org/39669/
WBAN Used Cases
kiramat, ullah
LA. Telecommunications.
LB. Computer networking.
LC. Internet, including WWW.
LH. Computer and network security.
In communications the area of coverage is very important, such that personal space or long range to send information. The distance refers to class of networks such as per-sonal range or wide area, while the protocols of communications refer to mode or type of networks, such as ad-hoc or self organization etc. Our aim is to provide a tutorial to introduce WBAN and its working knowledge as well as architecture. We will address Emergency health issues and suggest how it can be improved.
2020-03-11
Preprint
NonPeerReviewed
text
en
http://eprints.rclis.org/39669/1/new%20report%20feb%202020.pdf
kiramat, ullah WBAN Used Cases., 2020 [Preprint]
oai:eprints.rclis.org:39706
2020-03-09T09:16:42Z
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C542E
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:50542D
http://eprints.rclis.org/39706/
WBAN Routing Protocols in Health care
abbas, khurram
LA. Telecommunications.
LB. Computer networking.
LC. Internet, including WWW.
LH. Computer and network security.
LT. Mobile devices
The emergence of wireless body area network (WBAN) technology has brought hope and dawn to solve the problems of population aging, various chronic diseases, and medical facility shortage. The increasing demand for real-time applications in such networks stimulates many research activities. Our aim is to provide a tutorial to introduce WBAN routing protocols. We classify, and compare the advantages and disadvantages of various routing protocols. We also address Emergency health issues and suggest how it can be improved.
2020-03-05
Preprint
NonPeerReviewed
text
en
http://eprints.rclis.org/39706/1/March2020test%20report.pdf
abbas, khurram WBAN Routing Protocols in Health care., 2020 [Preprint]
oai:eprints.rclis.org:39747
2020-03-20T09:11:02Z
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C48
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:50542D
http://eprints.rclis.org/39747/
Routing Protocols for WBAN
kiramat, ullah
LA. Telecommunications.
LB. Computer networking.
LH. Computer and network security.
The emergence of wireless body area network (WBAN) technology has brought hope and dawn to solve the problems of population aging, various chronic diseases, and medical facility shortage. The increasing demand for real-time applications in such networks stimulates many research activities. Our aim is to provide a tutorial to introduce WBAN routing proto-cols. We classify, and compare the advantages and disadvantages of various routing proto-cols. We also address Emergency health issues and suggest how it can be improved.
2020-03-17
Preprint
NonPeerReviewed
text
en
http://eprints.rclis.org/39747/1/luis-report.pdf
kiramat, ullah Routing Protocols for WBAN., 2020 [Preprint]
oai:eprints.rclis.org:40017
2020-08-14T07:58:04Z
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C48
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:45452D
http://eprints.rclis.org/40017/
The Ritva Blockchain: Enabling Confidential Transactions at Scale
Vitols, Peter
Aare, Henri
LB. Computer networking.
LH. Computer and network security.
The distributed ledger technology has been widely hailed as the break- through technology. It has realised a great number of application scenarios, and improved workflow of many domains. Nonetheless, there remain a few major concerns in adopting and deploying the distributed ledger technology at scale. In this white paper, we tackle two of them, namely the through- put scalability and confidentiality protection for transactions. We learn from the existing body of research, and build a scale-out blockchain plat- form that champions privacy called RVChain. RVChain takes advantage of trusted execution environment to offer confidentiality protection for trans- actions, and scale the throughput of the network in proportion with the number of network participants by supporting parallel shadow chains.
2020-05-20
Preprint
NonPeerReviewed
text
en
http://eprints.rclis.org/40017/1/paper.pdf
Vitols, Peter and Aare, Henri The Ritva Blockchain: Enabling Confidential Transactions at Scale., 2020 [Preprint]
oai:eprints.rclis.org:40124
2020-07-10T08:32:40Z
7374617475733D756E707562
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
74797065733D7475746F7269616C
636F756E74726965733D4555524F5045:50542D
http://eprints.rclis.org/40124/
Intelligent predictor in Health care systems
Abbas, Khurum
LA. Telecommunications.
LB. Computer networking.
LC. Internet, including WWW.
LH. Computer and network security.
transcriptome profiling. Using RNA sequence, It has become possible to arrange and quantify transcriptional outputs of single cells or hundreds of samples. These transcriptomes provide a link between cellular phenotypes and molecular underpin-nings such as mutations . In the framework of cancer, this link gives a chance to dis-member the heterogeneity and complexity of tumours.
We classify, and compare the advantages and disadvantages of various routing proto-cols. We also address Emergency health issues and suggest how it can be improved.
2020-07-07
Tutorial
NonPeerReviewed
text
en
http://eprints.rclis.org/40124/1/july%202020%20report.pdf
Abbas, Khurum Intelligent predictor in Health care systems., 2020 (Unpublished) [Tutorial]
info:eu-repo/semantics/other
info:eu-repo/semantics/openAccess
oai:eprints.rclis.org:40125
2020-07-20T22:14:53Z
7374617475733D756E707562
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
74797065733D7475746F7269616C
636F756E74726965733D4555524F5045:50542D
http://eprints.rclis.org/40125/
Deep Reinforcement Learning in Health care systems
Kiramat, Ullah
LA. Telecommunications.
LB. Computer networking.
LC. Internet, including WWW.
LH. Computer and network security.
In computational science, particle swarm optimization (PSO) is a computational method that optimizes a problem by iteratively trying to improve a candidate solution with regard to a given measure of quality.
We classify, and compare the advantages and disadvantages of various routing proto-cols. We also address Emergency health issues and suggest how it can be improved.
2020-07-08
Tutorial
NonPeerReviewed
text
en
http://eprints.rclis.org/40125/1/august%20report%202020.pdf
Kiramat, Ullah Deep Reinforcement Learning in Health care systems., 2020 (Unpublished) [Tutorial]
oai:eprints.rclis.org:40151
2020-07-16T08:45:35Z
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:50542D
http://eprints.rclis.org/40151/
Blockchain Wallets in Health care systems
Fernando, Andrea
Abbas, Khurum
LA. Telecommunications.
LB. Computer networking.
LC. Internet, including WWW.
LH. Computer and network security.
The whole concept of Blockchain is fascinating, no doubt. However, there is a catch here. As cryptocurrencies are becoming the order of the day in financial markets, a lot of patience goes into understanding and managing them. We know that cryptocurrencies are digital money, so where do we store them? The answer to this question is Blockchain Wallets. We classify, and compare the advantages and disad-vantages of various routing protocols. We also address Emergency health issues and suggest how it can be improved.
2020-07-14
Preprint
NonPeerReviewed
text
en
http://eprints.rclis.org/40151/1/august%20report%202020.pdf
Fernando, Andrea and Abbas, Khurum Blockchain Wallets in Health care systems., 2020 [Preprint]
oai:eprints.rclis.org:40154
2020-07-16T07:48:02Z
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:50542D
http://eprints.rclis.org/40154/
Era of Deep Learning in Wireless Networking
Kiramat, Ullah
LA. Telecommunications.
LB. Computer networking.
LC. Internet, including WWW.
LH. Computer and network security.
This work deals with the use of emerging deep learning techniques in future wireless communication networks. It will be shown that data-driven approaches should not replace, but rather complement traditional design techniques based on mathematical models. Extensive motivation is given for why deep learning based on artificial neural networks will be an indispensable tool for the design and operation of future wireless communication networks, and our vision of how artificial neural networks should be integrated into the architecture of future wireless communication networks is present-ed. A thorough description of deep learning methodologies is provided, starting with the general machine learning paradigm, followed by a more in-depth discussion about deep learning and artificial neural networks, covering the most widely-used artificial neural network architectures and their training methods. Deep learning will also be connected to other major learning frameworks such as reinforcement learning and transfer learning. A thorough survey of the literature on deep learning for wireless communication networks is provided, followed by a detailed description of several novel case-studies wherein the use of deep learning proves extremely useful for net-work design. For each case-study, it will be shown how the use of (even approximate) mathematical models can significantly reduce the amount of live data that needs to be acquired/measured to implement data-driven approaches.
2020-07-15
Preprint
NonPeerReviewed
text
en
http://eprints.rclis.org/40154/1/pre-report%202020%20kiramat.pdf
Kiramat, Ullah Era of Deep Learning in Wireless Networking., 2020 [Preprint]
oai:eprints.rclis.org:40169
2020-07-20T22:13:34Z
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:50542D
http://eprints.rclis.org/40169/
Wireless Communications and Mobile Computing using Machine learning
Silva, Adriana
LA. Telecommunications.
LB. Computer networking.
LC. Internet, including WWW.
LH. Computer and network security.
This work deals with the use of emerging deep learning techniques in future wireless communication networks. It will be shown that data-driven approaches should not re-place, but rather complement traditional design techniques based on mathematical models. Extensive motivation is given for why deep learning based on artificial neural networks will be an indispensable tool for the design and operation of future wireless communication networks, and our vision of how artificial neural networks should be integrated into the architecture of future wireless communication networks is present-ed. A thorough description of deep learning methodologies is provided, starting with the general machine learning paradigm, followed by a more in-depth discussion about deep learning and artificial neural networks, covering the most widely-used artificial neural network architectures and their training methods. Deep learning will also be connected to other major learning frameworks such as reinforcement learning and transfer learning. A thorough survey of the literature on deep learning for wireless communication networks is provided, followed by a detailed description of several novel case-studies wherein the use of deep learning proves extremely useful for net-work design. For each case-study, it will be shown how the use of (even approximate) mathematical models can significantly reduce the amount of live data that needs to be acquired/measured to implement data-driven approaches.
2020-07-20
Preprint
NonPeerReviewed
text
en
http://eprints.rclis.org/40169/1/august%20report%202020.pdf
Silva, Adriana Wireless Communications and Mobile Computing using Machine learning., 2020 [Preprint]
oai:eprints.rclis.org:40180
2020-07-28T08:35:26Z
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:50542D
http://eprints.rclis.org/40180/
Artificial iIntelligence for Big Data: issues and challenges
Silva, Adriana
LA. Telecommunications.
LB. Computer networking.
LC. Internet, including WWW.
LH. Computer and network security.
Artificial intelligence (AI) concerns the study and development of intelligent ma-chines and software. The associated ICT research is highly technical and specialized, and its focal problems include the developments of software that can reason, gather knowledge, plan intelligently, learn, communicate, perceive and manipulate objects. AI also allows users of big data to automate and enhance complex descriptive and predictive analytical tasks that, when performed by humans, would be extremely la-bour intensive and time consuming. Thus, unleashing AI on big data can have a sig-nificant impact on the role data plays in deciding how we work, how we travel and how we conduct business. This paper explores how Artificial Intelligence, in conjunc-tion with Big Data technologies, can help organizations to bring about operational and business transformation.Deep learning will also be connected to other major learning frameworks such as reinforcement learning and transfer learning. A thorough survey of the literature on deep learning for wireless communication networks is provided, followed by a detailed description of several novel case-studies wherein the use of deep learning proves extremely useful for network design. For each case-study, it will be shown how the use of (even approximate) mathematical models can significantly reduce the amount of live data that needs to be acquired/measured to implement data-driven approaches.
2020-07-23
Preprint
NonPeerReviewed
text
en
http://eprints.rclis.org/40180/1/august%20report%202020.pdf
Silva, Adriana Artificial iIntelligence for Big Data: issues and challenges., 2020 [Preprint]
oai:eprints.rclis.org:40181
2020-07-28T08:36:06Z
7374617475733D756E707562
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
74797065733D7475746F7269616C
636F756E74726965733D4555524F5045:50542D
http://eprints.rclis.org/40181/
Distributed Denial of Service Attack in Networks
Silva, Adriana
LA. Telecommunications.
LB. Computer networking.
LC. Internet, including WWW.
LH. Computer and network security.
In communications the area of coverage is very important, such that personal space or long range to send information. The distance refers to class of networks such as per-sonal range or wide area, while the protocols of communications refer to mode or type of networks, such as ad-hoc or self organization etc. Our aim is to provide a tutorial to introduce DDoS attack and its working knowledge as well as rectifications. We will address its issues and suggest how it can overcome.
2020-07-23
Tutorial
NonPeerReviewed
text
en
http://eprints.rclis.org/40181/1/new-report-as.pdf
Silva, Adriana Distributed Denial of Service Attack in Networks., 2020 (Unpublished) [Tutorial]
oai:eprints.rclis.org:40192
2020-07-28T08:36:31Z
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C49
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:50542D
http://eprints.rclis.org/40192/
Internet of Things and WBAN: Attacks Presentations
Silva, Adriana
LA. Telecommunications.
LB. Computer networking.
LC. Internet, including WWW.
LH. Computer and network security.
LI. Authentication, and access control.
What we are approaching is a world where basic healthcare would become out of
reach to most people, a large section of society would go unproductive owing to old
age and people would be more prone to chronic disease.
A new paradigm, known as the Internet of Things (IoT), has an extensive applicability
in numerous areas, including healthcare.
The full application of this paradigm in healthcare area is a mutual hope because it
allows medical centers to function more competently and patients to obtain better
treatment.
2020-07-26
Preprint
NonPeerReviewed
text
en
http://eprints.rclis.org/40192/1/Preprint_dos.pdf
Silva, Adriana Internet of Things and WBAN: Attacks Presentations., 2020 [Preprint]
oai:eprints.rclis.org:40231
2020-07-31T19:30:18Z
7374617475733D707562
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C44
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C4B
74797065733D636F6E667061706572
636F756E74726965733D41534941:494E2D
http://eprints.rclis.org/40231/
Comparison and Analysis on AI Based Data Aggregation Techniques in Wireless Networks
Hradesh, Kumar
Pradeep Singh, Kumar
LB. Computer networking.
LD. Computers.
LH. Computer and network security.
LK. Software methodologies and engineering.
In modern era WSN, data aggregation technique is the challenging area for researchers from long time. Numbers of researchers have proposed neural network (NN) and fuzzy logic based data aggregation methods in Wireless Environment. The main objective of this paper is to analyse the existing work on artificial intelligence (AI) based data aggregation techniques in WSNs. An attempt has been made to identify the strength and weakness of AI based techniques.In addition to this, a modified protocol is designed and developed.And its implementation also compared with other existing approaches ACO and PSO. Proposed approach is better in terms of network lifetime and throughput of the networks. In future an attempt can be made to overcome the existing challenges during data aggregation in WSN using different AI and Meta heuristic based techniques.
2018
Conference paper
PeerReviewed
text
en
http://eprints.rclis.org/40231/1/Comparison%20and%20Analysis%20on%20AI%20Based%20Data%20Aggregation%20Techniques%20in%20Wireless%20Networks.pdf
Hradesh, Kumar and Pradeep Singh, Kumar Comparison and Analysis on AI Based Data Aggregation Techniques in Wireless Networks., 2018 . In International Conference on Computational Intelligence and Data Science, 2018. [Conference paper]
oai:eprints.rclis.org:40247
2020-08-05T01:42:22Z
7374617475733D707562
7375626A656374733D422E:4246
7375626A656374733D4C2E
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C49
7375626A656374733D4C2E:4C542E
74797065733D6A6F75726E616C70
636F756E74726965733D41534941:494E2D
http://eprints.rclis.org/40247/
Security Challenges and Policies in Cloud Computing for Services
Dattatray, B.P
Devare, A.S
BF. Information policy
L. Information technology and library technology
LH. Computer and network security.
LI. Authentication, and access control.
LT. Mobile devices
Cloud computing is becoming most emerging trend in IT industry. With its potential growth and lucrative services cloud computing has acquired mass market in the industry large enterprises running their business on the cloud. A greater acceptance of public cloud by various businesses has given it a wide popularity, strengthening of public cloud security is big milestone. The article talks about cloud computing and its service models and deployment models. Different threats have been discovered in recent years. Database security in public cloud raised some critical issues for cloud service provider.Further, various security issues and policies related to cloud computing also discussed. Findings emphasis that rapid adaptation to the clouds have increased concerns on a critical issue for successive growth of communication technology and information security. From a cloud security perspective, a number of unexplored risks and challenges are faced by cloud because of migration, causing degradation of the effectiveness of traditional protection mechanisms.
https://www.ijret.org
2018
Journal article (Paginated)
PeerReviewed
text
en
http://eprints.rclis.org/40247/1/SECURITY%20CHALLENGES%20AND%20POLICIES%20IN%20CLOUD%20COMPUTING%20FOR%20SERVICES.pdf
Dattatray, B.P and Devare, A.S Security Challenges and Policies in Cloud Computing for Services. International Journal of Research in Engineering and Technology, 2018, vol. 3, n. 12, pp. 59-63. [Journal article (Paginated)]
oai:eprints.rclis.org:40305
2020-08-20T09:32:08Z
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:50542D
http://eprints.rclis.org/40305/
Reducing Jamming Attack effects
Silva, Adriana
LA. Telecommunications.
LB. Computer networking.
LC. Internet, including WWW.
LH. Computer and network security.
Jamming as a form of denial-of-service is a commonly-used attack initiated against security at the physical layer of a wireless system. A new paradigm, known as the Internet of Things (IoT), has an extensive applicability in numerous are-as, including healthcare.
The full application of this paradigm in healthcare area is a mutual hope because it allows medical centers to function more competently and patients to obtain better treatment.
2020-08-19
Preprint
NonPeerReviewed
text
en
http://eprints.rclis.org/40305/1/preprint-sep2020.pdf
Silva, Adriana Reducing Jamming Attack effects., 2020 [Preprint]
oai:eprints.rclis.org:40936
2021-01-26T03:14:48Z
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:50542D
http://eprints.rclis.org/40936/
Distributed denial-of-service attacks
Adriana, Silva
LA. Telecommunications.
LB. Computer networking.
LC. Internet, including WWW.
LH. Computer and network security.
Distributed Denial-of-Service (DDoS) attacks are the intimidation trials on the Inter-net that deplete the network bandwidth. Researchers have introduced various defense mechanisms including attack prevention, traceback, reaction, detection, and character-ization against DDoS attacks, but the number of these attacks increases every year, and the ideal solutions to this problem have eluded us so far. A classification of detec-tion approaches against DDoS attacks is presented with the aim of giving deep insight into the DDoS problem.
2021-01-10
Preprint
NonPeerReviewed
text
en
http://eprints.rclis.org/40936/1/dddos-reoprt121.pdf
Adriana, Silva Distributed denial-of-service attacks., 2021 [Preprint]
oai:eprints.rclis.org:40990
2021-02-16T00:13:49Z
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C48
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:50542D
http://eprints.rclis.org/40990/
Issues and Deployment of Secure Telecommunications
andrea, silva
LA. Telecommunications.
LB. Computer networking.
LH. Computer and network security.
Distributed Denial of Services (DDoS) is such kind of DOS attack there are many step stone systems are used for generating malicious traffic and after that directed the flow of malicious traffic to the victim system and that cause a Denial of Service (DoS) attack.
2021-02-01
Preprint
NonPeerReviewed
text
en
http://eprints.rclis.org/40990/1/jan21report.pdf
andrea, silva Issues and Deployment of Secure Telecommunications., 2021 [Preprint]
oai:eprints.rclis.org:41808
2021-02-20T12:42:12Z
7374617475733D756E707562
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C48
74797065733D7265706F7274
636F756E74726965733D4555524F5045:54522D
http://eprints.rclis.org/41808/
Security and Diversity in WLAN
Kiramat, Ullah
LA. Telecommunications.
LB. Computer networking.
LH. Computer and network security.
Cooperative communications is the general idea of pooling the re-sources of distributed nodes to improve the overall performance of a wireless network. In cooperative networks the nodes cooperate to help each other. A co-operative node offering help is acting like a middle man or proxy and can convey messages from source to destination.
This concept gives rise to pure wireless self-organizing networks without any need for base stations. It can be employed in various applications of networked embedded systems. Cars use it to communicate directly with each other, for in-stance, to exchange reports on accidents, traffic jams, or bad road conditions. Autonomous robots may use it to build a wireless network in areas without in-frastructure, e.g., in deserts and in space.
2021-02-19
Report
NonPeerReviewed
text
en
http://eprints.rclis.org/41808/1/diversity%20and%20security.pdf
Kiramat, Ullah Security and Diversity in WLAN., 2021 (Unpublished) [Report]
oai:eprints.rclis.org:42073
2021-06-08T22:10:23Z
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C48
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:50542D
http://eprints.rclis.org/42073/
Cooperative MAC Protocols for Mobile Communication Networks
ADRIANA, SILVA
LA. Telecommunications.
LB. Computer networking.
LH. Computer and network security.
Cooperative communications is the general idea of pooling the resources of dis-tributed nodes to improve the overall performance of a wireless network. In co-operative networks the nodes cooperate to help each other. A cooperative node offering help is acting like a middle man or proxy and can convey messages from source to destination.
Cooperative communication is a promising and practical technique for realizing spatial diversity through a virtual antenna array formed by multiple antennas of different nodes. There has been a growing interest in designing and evaluating efficient cooperative medium access control (MAC) protocols in recent years
2021-05-17
Preprint
PeerReviewed
text
en
http://eprints.rclis.org/42073/1/jmY21.pdf
ADRIANA, SILVA Cooperative MAC Protocols for Mobile Communication Networks., 2021 [Preprint]
oai:eprints.rclis.org:42143
2021-07-10T05:00:54Z
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C49
7375626A656374733D4C2E:4C542E
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:50542D
636F756E74726965733D4555524F5045:54522D
http://eprints.rclis.org/42143/
Home based Smart Health Model
kiramat, ullah
LA. Telecommunications.
LB. Computer networking.
LH. Computer and network security.
LI. Authentication, and access control.
LT. Mobile devices
This article is about an architectural hardware-software model creation—home-based smart health model—to boost healthcare to a higher position within society. As an emerging field, smart health modeling is still insufficient. Current smart health ser-vices are hospital centered, data are scattered and application dependent, and health service provision presents attention delays. Analyses of Internet of things, Internet of medical things, and smart health applications potentials are the bases for the pro-posed home-based smart health model.
2021-06-16
Preprint
NonPeerReviewed
text
en
http://eprints.rclis.org/42143/1/isat2021.pdf
kiramat, ullah Home based Smart Health Model., 2021 [Preprint]
oai:eprints.rclis.org:42267
2021-07-20T05:33:37Z
7375626A656374733D4C2E:4C41
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C48
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:47422D
http://eprints.rclis.org/42267/
Review of 802.15.6 Specifications and Challenges
musadiq, umair
LA. Telecommunications.
LB. Computer networking.
LH. Computer and network security.
with the growth of population enhanced the demands of assistive technologies, especially in case of people with disabilities. The aim of monitoring health and assisting people leads to healthy life and improve the quality of life. Studies of health care systems have introduced variety of methods and standards. Wireless Body Area Network (WBAN) is set of tiny sensors that are used to monitor various functions of human body as well as connect living things to machines. Medium Access Control (MAC) layer on other hand is used to access the medium and establishes communications between sensors and devices. In this article, we surveyed various MAC protocols used in WBAN, issues in MAC layer as well as its security challenges. This article also provides a comprehensive analysis of research work done in recent years.
2021-07-16
Preprint
NonPeerReviewed
text
en
http://eprints.rclis.org/42267/1/review802156spec.pdf
musadiq, umair Review of 802.15.6 Specifications and Challenges., 2021 [Preprint]
oai:eprints.rclis.org:42329
2021-08-04T18:42:07Z
7374617475733D707562
7375626A656374733D442E:4443
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
74797065733D6A6F75726E616C65
636F756E74726965733D4E4341:43412D
636F756E74726965733D4E4341:55532D
http://eprints.rclis.org/42329/
Aiding and Abetting: Third-Party Tracking and (In)secure Connections in Public Libraries
Gardner, Gabriel
DC. Public libraries.
LC. Internet, including WWW.
LH. Computer and network security.
Patron privacy, as articulated in the American Library Association (ALA) Code of Ethics, is a longstanding concern for librarians. In online environments, the possibility of tracking by third parties, usage of HTTPS/TLS to provide secure connections, and easy disclosure of a site’s privacy policies all have implications for user privacy. This paper presents new empirical evidence about these issues and discusses their ethical implications. Data about the incidence of third-party tracking, usage of HTTPS by default, and easy discoverability of a privacy policy or terms of service (TOS) were collected for public libraries across Canada and the United States. The sample consisted of 178 public libraries; members of the Canadian Urban Libraries Council and Urban Libraries Council. Several common commercial databases (e.g. OverDrive) were also examined using the same criteria. Results show that only 12% of libraries were devoid of third-party tracking, with Google Analytics being the most common third-party tracker. While libraries may support HTTPS under certain circumstances, it was found that a majority of libraries serve neither their websites nor their online catalogs (OPACs) HTTPS by default. Regarding disclosure of possible tracking, it was found that 58% of libraries did not link to a TOS or privacy policy from their homepage. Together with previous research on the usage of privacy-enhancing tools in public libraries, these results suggest that public libraries are accessories to third-party tracking on a large scale. Implications of this fact in light of library professional ethics are discussed.
Taylor & Francis
2021-08-02
Journal article (Unpaginated)
PeerReviewed
text
en
http://eprints.rclis.org/42329/1/Gardner_Aiding_and_Abetting_postprint.pdf
other
en
http://eprints.rclis.org/42329/2/bibliography.txt
Gardner, Gabriel Aiding and Abetting: Third-Party Tracking and (In)secure Connections in Public Libraries. The Serials Librarian, 2021. [Journal article (Unpaginated)]
oai:eprints.rclis.org:42915
2022-02-18T11:39:33Z
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C48
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:47422D
http://eprints.rclis.org/42915/
Malware Detection and Challenges in WBAN
Umair, Musadiq
LB. Computer networking.
LH. Computer and network security.
The popularity of smartphones has led to an increasing demand for health apps. As a result, the healthcare industry is embracing mobile technology and the security of mHealth is essential in protecting patient’s user data and WBAN in a clinical setting. Breaches of security can potentially be life-threatening as someone with malicious intentions could misuse mHealth devices and user information.
2022-02-16
Preprint
NonPeerReviewed
text
en
http://eprints.rclis.org/42915/1/silva22.pdf
Umair, Musadiq Malware Detection and Challenges in WBAN., 2022 [Preprint]
oai:eprints.rclis.org:42923
2022-05-04T17:32:32Z
7374617475733D756E707562
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C4C
7375626A656374733D4C2E:4C50
74797065733D64617461736574
636F756E74726965733D41534941:49442D
http://eprints.rclis.org/42923/
Should be acknowledged for forethought in using 5G technologies
(A Collection of Data)
SARBUNAN, THOBIAS
LB. Computer networking.
LC. Internet, including WWW.
LH. Computer and network security.
LL. Automated language processing.
LP. Intelligent agents.
The goal of this data is to increase understanding and awareness of the 5G system and technology that has been obtained by a number of contemporary and wealthy countries to date. A large number of countries outside of the richest and most sophisticated nations, on the other hand, have simply observed and attempted to produce this progress. Despite this, the preparedness to grow, investigate, and adapt to the full scope of 5G activities remained a mystery. The likelihood is based on human capability and facility preparedness, which is characterized as crystallization to the next generation. COVID-19, on the other hand, caused significant changes, with one suggestion that the outbreak had an influence on teaching and learning methods as well as English as a foreign language instruction. In short, 5G provided the opportunity to bridge unusual scenarios such as COVID-19 while simultaneously maintaining educational consistency.
2022-02-18
Dataset
PeerReviewed
text
en
cc_by_4
http://eprints.rclis.org/42923/1/NEW%20MANUSCRIPT.pdf
SARBUNAN, THOBIAS Should be acknowledged for forethought in using 5G technologies (A Collection of Data)., 2022 (Unpublished) [Dataset]
oai:eprints.rclis.org:43530
2022-08-31T08:19:01Z
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C48
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:47422D
http://eprints.rclis.org/43530/
Relaying Based Handover Techniques
Musadiq, Umair
LB. Computer networking.
LH. Computer and network security.
The real-time monitoring and autonomous decision-making through Unmanned Aerial Vehicles (UAVs) are the potential applications of Future networks. Vertical handover in future networks is a mechanism to switch communication between different network access technologies like Wire-less Local Area Network (WLAN), Worldwide Interoperability for Wireless Microwave Access (WiMAX), Third-Generation (3G), Fourth-Generation (4G), Fifth- Generation (5G) mobile technologies. These technologies have significant importance in providing fast, reliable, and timely communication. However, during a vertical handover, an inadequate delay and packet loss can cause considerable disruption in maintaining communication sessions and results in intolerable end to end delay, disconnectivity, and poor packet delivery ratio.
Kiramat, Ullah
2022-08-29
Preprint
NonPeerReviewed
text
en
http://eprints.rclis.org/43530/1/kiramat-01sep2022.pdf
Musadiq, Umair Relaying Based Handover Techniques., 2022 [Preprint]
oai:eprints.rclis.org:43657
2023-02-01T13:52:11Z
7374617475733D707562
7375626A656374733D452E:4544
7375626A656374733D472E:4742
7375626A656374733D4A2E:4A48
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C4B
74797065733D6A6F75726E616C70
636F756E74726965733D536F757468416D6572696361:50452D
http://eprints.rclis.org/43657/
Un rinconcito en el archivo de tu corazón:
Tecnología Blockchain y privatización de activos digitales
Cavero Safra, Enrique
Legua Zúñiga, Claudia
ED. Intellectual property: author's rights, ownership, copyright, copyleft, open access.
GB. Software industry.
JH. Digital preservation.
LH. Computer and network security.
LK. Software methodologies and engineering.
The present paper makes an approach to Distributed Ledger Technology (DLT) to see if it can be an answer to the “public goods dilemma” present within intellectual goods and personal data; and, thereby, modify fundamentally the enforcement of laws of intellectual property (patents and copyrights) and personal data protec- tion. As part of this analysis, we will explore the possibilities of reducing costs of exclusion of digital assets that Blockchain represents, and the consequential privatization of said goods.
Pontificia Universidad Católica del Perú
2019
Journal article (Paginated)
PeerReviewed
text
en
http://eprints.rclis.org/43657/1/document.pdf
Cavero Safra, Enrique and Legua Zúñiga, Claudia Un rinconcito en el archivo de tu corazón: Tecnología Blockchain y privatización de activos digitales. Revista de Actualidad Mercantil, 2019, n. 6, pp. 172-187. [Journal article (Paginated)]
oai:eprints.rclis.org:44393
2023-05-26T19:26:41Z
7374617475733D707562
7375626A656374733D442E:444C
7375626A656374733D482E:4852
7375626A656374733D4B2E:4B45
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C48
74797065733D6A6F75726E616C65
636F756E74726965733D536F757468416D6572696361:42522D
http://eprints.rclis.org/44393/
Análise da encontrabilidade da informação do website do Archivo General de la Nación da Colômbia
Maria Girleza Pérez Amaya, Universidade Estadual de Londrina
Mylena de Souza Santos, Universidade Estadual de Londrina
Fernando Luiz Vechiato, Universidade Federal do Rio Grande do Norte
Ana Cristina de Albuquerque, Universidade Estadual de Londrina
DL. Archives.
HR. Portals.
KE. Architecture.
LC. Internet, including WWW.
LH. Computer and network security.
Based on the importance that digital information environments currently represent in accessing and retrieving information, we seek to assess the findability of information on the website of the Archivo General de la Nación de Colombia. For this purpose, a checklist was used to analyze the attributes of information findability in informational environments. The mentioned website satisfied some of the attributes, and it is still necessary to implement improvements that suit both these attributes and the current technological requirements. Based on a less technical view, the importance of the participation of Information Science professionals in the design and development process of digital information environments is emphasized
Universidad de Antioquia
2022-02-18
Journal article (Unpaginated)
PeerReviewed
text
en
http://eprints.rclis.org/44393/1/v46n2e344969.pdf
Maria Girleza Pérez Amaya, Universidade Estadual de Londrina and Mylena de Souza Santos, Universidade Estadual de Londrina and Fernando Luiz Vechiato, Universidade Federal do Rio Grande do Norte and Ana Cristina de Albuquerque, Universidade Estadual de Londrina Análise da encontrabilidade da informação do website do Archivo General de la Nación da Colômbia. Revista Interamericana de Bibliotecologia, 2022, vol. 46, n. 02. [Journal article (Unpaginated)]
oai:eprints.rclis.org:44481
2023-06-14T20:10:42Z
7374617475733D756E707562
7375626A656374733D4C2E:4C48
74797065733D6A6F75726E616C70
636F756E74726965733D4555524F5045:524F2D
http://eprints.rclis.org/44481/
The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN)
Ferenț, Darius-Antoniu
LH. Computer and network security.
In this paper I will highlight a modus operandi of hackers launching Denial of Service (DoS) cyberattacks. I will theoretically show how CAM Overflow and TCP SYN Flood attacks can be performed, using Kali Linux, a Linux distribution used by cyber criminals to launch MitM (Man-in-the-Middle) attacks, DoS attacks, observing traffic in a computer network, etc. Hackers can affect the functioning of devices on an organization’s local network (server, router, switch, etc.) by sending thousands of packets per second to the target device. CAM Overflow is an attack where a hacker aims to overcrowd the CAM table of a switch with MAC addresses, and TCP SYN Flood is an attack that can be launched against a server in the computer network.
MultiMedia Publishing
2022-08-10
Journal article (Paginated)
NonPeerReviewed
text
en
http://eprints.rclis.org/44481/1/Intelligence_Info-1-1-Securitate-The_impact_of_DoS-Darius_Antoniu_Ferent.pdf
Ferenț, Darius-Antoniu The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN). Intelligence Info, 2022, vol. 1, n. 1, pp. 124-129. (Unpublished) [Journal article (Paginated)]
oai:eprints.rclis.org:44622
2023-08-29T07:51:13Z
7374617475733D707562
7375626A656374733D412E:4141
7375626A656374733D412E:4143
7375626A656374733D4C2E:4C42
7375626A656374733D4C2E:4C43
7375626A656374733D4C2E:4C44
7375626A656374733D4C2E:4C48
7375626A656374733D4C2E:4C4A
7375626A656374733D4C2E:4C4B
7375626A656374733D4C2E:4C4C
7375626A656374733D4C2E:4C4D
7375626A656374733D4C2E:4C4E
7375626A656374733D4C2E:4C50
7375626A656374733D4C2E:4C51
7375626A656374733D4C2E:4C53
7375626A656374733D4C2E:4C542E
7375626A656374733D4C2E:4C5A
74797065733D626F6F6B63686170746572
636F756E74726965733D4555524F5045:54522D
http://eprints.rclis.org/44622/
Yapay Zekâ: Disiplinlerarası Yaklaşımlar = Artificial Intelligence: Interdisciplinary Approaches
Şerefoğlu Henkoğlu, H.
Henkoğlu, T.
Alimen, N.
Öner Bulut, S.
Karadağ, A. B.
Gedikli, M. E.
Cibaroğlu, M. O.
Yıldırım, S.
Serin, O.
Yalçınkaya, B.
Ergün, C.
Çakmak, T.
Eroğlu, Ş.
Torunlar, M.
Ünal, M. A.
Özdemirci, F.
AA. Library and information science as a field.
AC. Relationship of LIS with other fields .
LB. Computer networking.
LC. Internet, including WWW.
LD. Computers.
LH. Computer and network security.
LJ. Software.
LK. Software methodologies and engineering.
LL. Automated language processing.
LM. Automatic text retrieval.
LN. Data base management systems.
LP. Intelligent agents.
LQ. Library automation systems.
LS. Search engines.
LT. Mobile devices
LZ. None of these, but in this section.
In this book, a perspective is presented to the reader about the effects of artificial intelligence in many fields, from the health system to the banking system, from library to archiving, and besides general information about artificial intelligence, the applications of artificial intelligence in various fields, especially linguistics, banking, health, law, librarianship, archiving is explained. From this point of view, the chapters in the book examine the emergence of artificial intelligence, the current situation in these fields and the social and ethical problems that may arise with future evaluations, and also contain basic information about these fields of study. Readers who are curious about what artificial intelligence is, will be able to find basic information on the subject in this book, as well as have information about the applications of artificial intelligence in different fields. As such, it is hoped that this book, which includes an interdisciplinary perspective, will help to better understand artificial intelligence and prepare society for the upcoming future.
VakıfBank Kültür Yayınları
Küçükcan, Berrin
Yıldırım, Banu Fulya
2023-06-14
Book chapter
PeerReviewed
text
tr
http://eprints.rclis.org/44622/1/Yapay%20Zeka%20Disiplinleraras%C4%B1%20Yakla%C5%9F%C4%B1mlar.pdf
Şerefoğlu Henkoğlu, H. and Henkoğlu, T. and Alimen, N. and Öner Bulut, S. and Karadağ, A. B. and Gedikli, M. E. and Cibaroğlu, M. O. and Yıldırım, S. and Serin, O. and Yalçınkaya, B. and Ergün, C. and Çakmak, T. and Eroğlu, Ş. and Torunlar, M. and Ünal, M. A. and Özdemirci, F. . Yapay Zekâ: Disiplinlerarası Yaklaşımlar = Artificial Intelligence: Interdisciplinary Approaches., 2023 In: Yapay Zekâ: Disiplinlerarası Yaklaşımlar = Artificial Intelligence: Interdisciplinary Approaches. VakıfBank Kültür Yayınları, pp. 1-16. [Book chapter]
oai:eprints.rclis.org:44671
2023-08-31T08:40:35Z
7375626A656374733D4C2E:4C48
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:524F2D
http://eprints.rclis.org/44671/
Tehnologia blockchain
Sfetcu, Nicolae
LH. Computer and network security.
Blockchain, originally called block chain, is an ever-growing list of records called blocks that communicate with each other through encrypted messages. Each block contains a cryptographic hash of the previous block, a timestamp, and the transaction data. By design, a blockchain is "an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way," typically managed by a peer-to-peer network that adheres to a protocol for communication between nodes and validating new blocks. Once recorded, the data in a given block cannot be changed retroactively without changing all subsequent blocks, which requires network consensus.
2019-02-15
Preprint
NonPeerReviewed
text
en
http://eprints.rclis.org/44671/1/Nicolae_Sfetcu-Tehnologia_blockchain-C.pdf
Sfetcu, Nicolae Tehnologia blockchain., 2019 [Preprint]
oai:eprints.rclis.org:44995
2023-11-06T10:27:49Z
7375626A656374733D4C2E:4C48
74797065733D7072657072696E74
636F756E74726965733D4555524F5045:524F2D
http://eprints.rclis.org/44995/
Philosophy of Blockchain Technology - Ontologies
Sfetcu, Nicolae
LH. Computer and network security.
About the necessity and usefulness of developing a philosophy specific to the blockchain technology, emphasizing on the ontological aspects. After an Introduction that highlights the main philosophical directions for this emerging technology, in Blockchain Technology I explain the way the blockchain works, discussing ontological development directions of this technology in Designing and Modeling. The next section is dedicated to the main application of blockchain technology, Bitcoin, with the social implications of this cryptocurrency. There follows a section of Philosophy in which I identify the blockchain technology with the concept of heterotopia developed by Michel Foucault and I interpret it in the light of the notational technology developed by Nelson Goodman as a notational system. In the Ontology section, I present two developmental paths that I consider important: Narrative Ontology, based on the idea of order and structure of history transmitted through Paul Ricoeur's narrative history, and the Enterprise Ontology system based on concepts and models of an enterprise, specific to the semantic web, and which I consider to be the most well developed and which will probably become the formal ontological system, at least in terms of the economic and legal aspects of blockchain technology. In Conclusions I am talking about the future directions of developing the blockchain technology philosophy in general as an explanatory and robust theory from a phenomenologically consistent point of view, which allows testability and ontologies in particular, arguing for the need of a global adoption of an ontological system for develop cross-cutting solutions and to make this technology profitable.
2019-04-23
Preprint
NonPeerReviewed
text
en
http://eprints.rclis.org/44995/1/Philosophy_of_blockchain_technology-Nicolae_Sfetcu-GMM.pdf
Sfetcu, Nicolae Philosophy of Blockchain Technology - Ontologies., 2019 [Preprint]
oai:eprints.rclis.org:45191
2023-12-30T10:28:23Z
7374617475733D707562
7375626A656374733D4C2E:4C48
74797065733D6A6F75726E616C70
636F756E74726965733D4555524F5045:524F2D
http://eprints.rclis.org/45191/
Proiectarea și modelarea tehnologiei blockchain – Bitcoin
Sfetcu, Nicolae
LH. Computer and network security.
Ontology engineering, together with Semantic Web technologies, enable the semantic modeling and development of operational flow required for TB design. The most widely used blockchain modeling system by abstractly representing, describing and defining structure, processes, information and resources is enterprise modeling. Enterprise modeling uses domain ontologies using model representation languages. Bitcoin is the leading peer-to-peer payment system and digital currency that uses blockchain technology.
MultiMedia Publishing
2022-12-01
Journal article (Paginated)
PeerReviewed
text
en
cc_by_4
http://eprints.rclis.org/45191/1/IT%26C-1-2-Afaceri_online-Proiectarea_si_modelarea_tehnologiei_blockchain-Bitcoin-Nicolae_Sfetcu.pdf
Sfetcu, Nicolae Proiectarea și modelarea tehnologiei blockchain – Bitcoin. IT & C, 2022, vol. 1, n. 2, pp. 85-92. [Journal article (Paginated)]
oai:eprints.rclis.org:45349
2024-01-20T22:26:40Z
7374617475733D707562
7375626A656374733D4C2E:4C48
74797065733D6A6F75726E616C70
636F756E74726965733D41534941:49522D
http://eprints.rclis.org/45349/
The Blockchain Technology: Benefits and Applications in Healthcare Information Systems
Mohammadi, Farzaneh
Noruzi, Alireza
LH. Computer and network security.
Healthcare information systems aim to provide high-quality healthcare services to ensure the security of patients’ health information. They can also assist in safeguarding an encyclopedia of clinical data to make more informed decisions in a private environment. However, the majority of today’s healthcare information systems are centralized and have great difficulty in providing indispensable information security and privacy, patient health records immutability, transparency, and flexibility to detect vulnerabilities and cyber invasions. The current study has explored the striking benefits and opportunities for blockchain technology in the healthcare information systems sector. It has identified the key applications that blockchain technology offers to provide indispensable information security and privacy, the immutability of patient health records, transparency, and flexibility to detect vulnerabilities and cyber invasions. Blockchain technology as a regulatory technology can enhance healthcare information services by bringing high-quality healthcare services in a crystal clear view that is decentralized, immutable, tamper-resistant, flexible, traceable, and secure. It also enables clinical professionals to effectively detect vulnerabilities and cyber invasions related to patients’ health information. The practical deployment of blockchain technology in healthcare information systems takes years of research and experience to reach fruition. In order to enable the practical deployment of blockchain technology in healthcare information systems, a series of research will need to be conducted.
Informology Center
2023-12-25
Journal article (Paginated)
PeerReviewed
text
en
http://eprints.rclis.org/45349/1/a26.pdf
Mohammadi, Farzaneh and Noruzi, Alireza The Blockchain Technology: Benefits and Applications in Healthcare Information Systems. Informology, 2023, vol. 2, n. 2, pp. 95-116. [Journal article (Paginated)]