首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Today’s data is sensitive that requires privacy and security both from the cloud service providers (CSP) as well as from users in its all the form of data states: data at rest, while transferring data, enquiring data, and processing the data. Cloud computing has been applied in the health sector, national security services, banking and other business and companies that store confidential data into the cloud as we have seen in recent years. Therefore, information and data security is a crucial issue that needs to be addressed thoroughly in the cloud computing business. This research deals with the performance analysis of recent cloud data security models. This paper proposes cloud data security models based on Business Process Modeling Notations (BPMN) and simulation results can reveal performances issues related to data security as part of any organizations initiative on Business process management (BPM).  相似文献   

2.
Despite mobile applications being at the frontier of mobile computation technologies, security issues pose a threat to their adoption and diffusion. Recent studies suggest that security violations could be mitigated through improved security behaviors and attitudes, not just through better technologies. Existing literature on behavioral security suggests that one of the main predictors of users’ perceptions of security is their perceived privacy concerns. Using communication privacy management theory (CPM), this study examines the effects of privacy-related perceptions, such as privacy risk and the effectiveness of privacy policies, on the security perceptions of mobile app users. To empirically test the proposed theoretical model, two survey studies were conducted using mobile apps requesting less sensitive information (n = 487) and more sensitive information (n = 559). The findings show that the perceived privacy risk negatively influences the perceived security of the mobile apps; the perceived effectiveness of a privacy policy positively influences user perceptions of mobile app security; and perceived privacy awareness moderates the effect of perceived privacy risk on the perceived security of mobile apps. The results also suggest that users have different privacy-security perceptions based on the information sensitivity of the mobile apps. Theoretical and practical implications are discussed.  相似文献   

3.
The advancement in mobile technology and the introduction of cloud computing systems enable the use of educational materials on mobile devices for a location- and time-agnostic learning process. These educational materials are delivered in the form of data and compute-intensive multimedia-enabled learning objects. Given these constraints, the desired objective of mobile learning (m-learning) may not be achieved. Accordingly, a number of m-learning systems are being developed by the industry and academia to transform society into a pervasive educational institute. However, no guideline on the technical issues concerning the m-learning environment is available. In this study, we present a taxonomy of such technical issues that can impede the life cycle of multimedia-enabled m-learning applications. The taxonomy is devised based on the issues related to mobile device heterogeneity, network performance, content heterogeneity, content delivery, and user expectation. These issues are discussed, along with their causes and measures, to achieve solutions. Furthermore, we identify several trending areas through which the adaptability and acceptability of multimedia-enabled m-learning platforms can be increased. Finally, we discuss open challenges, such as low complexity encoding, data dependency, measurement and modeling, interoperability, and security as future research directions.  相似文献   

4.
张金学 《科技广场》2011,(9):145-148
移动商务是电子商务的一个分支,移动商务是通过移动通信网络数据传输,使用移动信息终端参与各种商业经营活动的一种新的电子商务模型,它是新技术条件、新的市场环境下的新的电子商务的形式。本文采用J2ME开发了一款移动商务应用程序,主要是针对用户的重要私人信息,例如通信录、记事本、日程安排等数据进行管理。该程序能够实现各种事务的添加、修改、删除、分组、查询、账务管理等。  相似文献   

5.
王巍 《科技广场》2014,(8):99-103
本文基于移动云计算和Mashup技术构建个人学习环境支持系统,为学习者提供符合个性化的知识与学习资源的信息推送与引导,即时获取和存储在云端的学习资源,实现任何时间、任何地点实时满足学习者的学习需求,为进一步研究基于移动互联网环境下的提升高校教学能力的深入挖掘提供依据。  相似文献   

6.
The mechanism of business analytics affordances enhancing the management of cloud computing data security is a key antecedent in improving cloud computing security. Based on information value chain theory and IT affordances theory, a research model is built to investigate the underlying mechanism of business analytics affordances enhancing the management of cloud computing data security. The model includes business analytics affordances, decision-making affordances of cloud computing data security, decision-making rationality of cloud computing data security, and the management of cloud computing data security. Simultaneously, the model considers the role of data-driven culture and IT business process integration. It is empirically tested using data collected from 316 enterprises by Partial Least Squares-based structural equation model. Without data-driven culture and IT business process integration, the results suggest that there is a process from business analytics affordances to decision-making affordances of cloud computing data security, decision-making rationality of cloud computing data security, and to the management of cloud computing data security. Moreover, Data-driven culture and IT business process integration have a positive mediation effect on the relationship between business analytics affordances and decision-making affordances of cloud computing data security. The conclusions in this study provide useful references for the enterprise to strengthen the management of cloud computing data security using business analytics.  相似文献   

7.
Increasing people are using mobile applications (apps) for information and activities related to their travel and tourism. Therefore, customer engagement (customer attraction and retention) with mobile travel applications becomes extremely important for travel-related companies. However, there is little empirical research on what factors may drive customers’ engagement of using mobile travel apps. This study proposes a research framework, based on the Stimulus-Organism-Response (S-O-R) model, to explore how and to what extent two types of app attributes (i.e., app design and app performance attributes) stimulate travel apps engagement. Based on a user acceptance testing (UAT testing) of a real travel app development project, the study uses survey data from 804 tourists to validate the proposed research model. The results reveal different effectiveness of app design and app performance attributes, and demonstrate that two app design features (i.e., user interface attractiveness and privacy/security) and three app performance attributes (i.e., compatibility, ease of use, and relative advantages) are important drivers of users’ behavioral engagement of mobile travel apps. Further, psychological engagement and three types of benefit perception (i.e., hedonic benefit, utilitarian benefit, and social benefit) serially mediate the relationships. The results can be used to improve the related mobile app engagement research and the mobile travel app design.  相似文献   

8.
Managing personal information such as to-dos and contacts has become our daily routines, consuming more time than needed. Existing PIM tools require extensive involvement of human users. This becomes a problem in using mobile devices due to their physical constraints. To address the limitations of traditional PIM tools, we propose a model of mobile PIM agent (PIMA) that aims to improve PIM on mobile devices through natural language interface and application integration. We conducted a user study to evaluate PIMA empirically with prototype systems. The results show that mobile PIMA improved perceived usefulness, ease-of-use, and efficiency of PIM on mobile devices, which in turn accounted for positive attitude and intention to use the system. The findings of this study provide suggestions for designing and developing PIM applications on mobile devices.  相似文献   

9.
Industry 4.0 places a premium on cloud security since more and more companies are moving their activities to the cloud to reap the benefits of the Fourth Industrial Revolution.The term “cloud computing” refers to a collection of Internet-based hardware and software tools. Providers of cloud services use data centers situated in various physical locations. Cloud computing makes life easier for users by making remote, simulated resources available over the internet. Google Apps and Microsoft SharePoint are two examples of popular cloud applications. In addition to its exciting potential, the “cloud computing” industry's lightning-fast expansion raises serious security concerns. When discussing security, cloud really suffers from Open Systems' and the internet's perennial problem. The only thing stopping the widespread use of cloud computing is the lack of trust in the system. There are a number of security concerns with cloud computing, including protecting user data and vetting cloud service providers' practices. Using encryption, confidential information can be sent over an unsecured channel without fear of data loss or manipulation. Data encryption using various protocols has been used in various settings. Different cryptosystems were developed and used at various times. Additionally, cloud computing enables multiple users to access and retrieve data simultaneously through their own personal Internet connections, which increases the risk of confidential data loss and exposure in a number of different places. Elliptic Curve Cryptography and other cryptographic algorithms have been used to develop numerous methods and protocols that guarantee the security and privacy of transmitted data. In this paper, we suggest a safe and efficient method for sharing information in the cloud without compromising its safety or integrity. The proposed system is able to guarantee authentication and data integrity because it uses a hybrid of the ECC and the Advanced Encryption Standard (AES) technique. The experimental results confirm the proposed approach outperforms the current gold standard.  相似文献   

10.
Cloud computing has become the buzzword in the industry today. Though, it is not an entirely new concept but in today's digital age, it has become ubiquitous due to the proliferation of Internet, broadband, mobile devices, better bandwidth and mobility requirements for end-users (be it consumers, SMEs or enterprises). In this paper, the focus is on the perceived inclination of micro and small businesses (SMEs or SMBs) toward cloud computing and the benefits reaped by them. This paper presents five factors influencing the cloud usage by this business community, whose needs and business requirements are very different from large enterprises. Firstly, ease of use and convenience is the biggest favorable factor followed by security and privacy and then comes the cost reduction. The fourth factor reliability is ignored as SMEs do not consider cloud as reliable. Lastly but not the least, SMEs do not want to use cloud for sharing and collaboration and prefer their old conventional methods for sharing and collaborating with their stakeholders.  相似文献   

11.
The emergence of sophisticated and powerful mobile devices with impressive computing capabilities and storage capacity paves the way for an era of advanced mobile-based applications. Monitoring of time-critical data, process control, and security are possible candidate applications. In this work we propose a stock monitoring system that utilizes mobile phones. The system was designed to provide an alternative to costly GPRS connections for stock market traders. The system grants real-time monitoring of stock information through a user-friendly and easy to use GUI with plenty of useful features. The system was implemented by combining various Java technologies, specifically J2ME and J2EE. It was tested using the Dubai Financial Market with favorable results.  相似文献   

12.
大数据时代的信息安全管理体系研究是企业信息安全保障体系建设的重要组成成分,对完善企业信息安全体系建设,保障企业信息安全,提高企业信息化水平具有重要意义。针对大数据环境下企业信息安全管理体系进行理论框架和应用策略研究,分析安全管理现状,指出国内企业在大数据安全管理方面存在不足;探索大数据云安全管理体系构建,给出大数据云安全体系框架;研究大数据安全管理体系应用过程实施策略,给出过程模型及具体工作实施规划。为企业建立健全网络信息安全管理体系提供借鉴。  相似文献   

13.
This study examines characteristics that relate to lead userness in using business mobile services. From a large dataset of 2306 business decision-makers, the study identifies 205 lead users who are ahead of the majority in using business mobile services, while for the majority (n = 2101), business mobile services mainly supplement desktop and laptop computers. The authors test a binary logistic regression model in which individual technology readiness, sociodemographic variables, Internet use, and perceived importance of digital touchpoints predict lead userness in relation to business mobile services. The results show that job level is a highly significant predictor for lead userness in a work-related context, with senior management and entrepreneurs having the greatest likelihood for the use of business mobile services. Innovativeness and the perceived importance of mobile applications and social media also serve as positive predictors, while the perceived importance of websites and email result in a negative effect. The findings further suggest that the odds of being a lead user decrease by 2 percent per additional year of age, and that the odds of men is over 1.4 times greater than the odds of women.  相似文献   

14.
胡昌平  查梦娟  石宇 《情报科学》2021,39(6):117-122
【目的/意义】公共云存储平台中学术信息资源的内容安全保障既关系到用户科研活动的持续性和稳定性, 也符合云环境下学术信息资源的数据管理需求。【方法/过程】本文在分析了学术信息资源内容安全特点及其对云 存储平台内容安全保障的影响的基础上,结合学术信息资源内容安全特点,提出从内容安全审核、存储控制、传播 控制入手,构建面向学术信息资源的一体化内容安全保障模型。【结果/结论】设计了基于学术信息资源云存储流程 的一体化内容安全保障模型,同时论证了该模型的推进需要同步落实专门化的学术信息资源云存储服务组织、推 进云存储用户实名制、提高身份认证安全等级以及强化用户协同机制和约束机制。【创新/局限】关注到了资源行业 领域特点导致的内容安全保障需求差异,提出了基于内容安全审核结果的分级存储控制和实时传播控制机制,进 而构建了存储、使用到传播的一体化学术信息资源内容安全保障方案。  相似文献   

15.
张苹 《科技广场》2012,(2):139-142
随着手机的普及和移动互联网的发展,手机具备了巨大的广告价值潜力。我国的手机广告产业发展处于初期阶段,手机平台巨大的广告潜力尚未得到充分认识和合理利用。本文将以手机广告市场的宏观现状、趋势和广告行情为基础,对中国手机广告产业的商业模式和计费方式进行探讨。  相似文献   

16.
伴随着以无线网络、3G技术等为代表的移动网络技术的飞速发展,基于手机、PDA等移动终端的移动云计算(MobileCloudComputing)逐渐受到研究者的关注。如何将移动云计算运用到远程移动学习中已成为当前教育研究的热点问题。在分析移动云计算优势的基础上,根据移动云计算的特.羔,设计了一个整合高性能计算(HPC)集群架构和校园Moodle的云计算远程移动学习平台。该平台能够充分发挥云计算的优势,降低远程教育成本,为我国远程教育的发展提供强有力的支撑。  相似文献   

17.
随着移动通信技术的发展和移动设备的普及,企业管理将逐渐进入移动商务时代。移动商务的优越性使得供应链成本管理面临新一轮的机遇和挑战。本文介绍了移动商务和移动供应链管理模式,并系统地阐述了移动商务环境下的供应链成本管理。  相似文献   

18.
Internet of things (IoT) coupled with mobile cloud computing has made a paradigm shift in the service sector. IoT-assisted mobile cloud based e-healthcare services are making giant strides and are likely to change the conventional ways of healthcare service delivery. Though numerous approaches for preventing unauthorized access to information exchanged between a mobile phone and cloud platform do exist, but there is no security mechanism to prevent unauthorized access by the cloud administrators. With an aim to ensure security of client data such as Electronic Patient Records (EPR), we propose a novel high-capacity and reversible data hiding approach for securely embedding EPR within the medical images using Optimal Pixel Repetition (OPR). OPR converts every pixel of the input image to a 2 × 2 block to facilitate reversibility by ensuring all the pixels in a 2 × 2 block to have different values. Since a 2 × 2 block is comprised of 4-pixel elements, which could be arranged in sixteen possible ways; we generate a lookup table corresponding to sixteen possible positions of pixels. EPR hiding in each block is achieved by permuting the pixels of a block according to the four-bit word of secret data, resulting in a histogram invariant stego image. The histogram invariance improves the robustness of the proposed scheme to statistical attacks. A stego image is said to hide embedded data securely, when it provides better imperceptivity for an appreciably high payload. Thus, while using information embedding approach for securing client data on a mobile-cloud platform, high imperceptivity is a desirable feature. Experimental results show that average PSNR obtained is 42 dB for payload 1.25 bpp by our scheme, showing its effectiveness for preventing unauthorized access to client’s sensitive data.  相似文献   

19.
云计算作为一种全新的服务模式,其特点决定了它面临着比传统网络和信息安全更多的安全风险问题,且该问题已成为制约云计算发展的重要因素.介绍了云计算体系结构及特征,分析了云计算安全风险研究现状,重点剖析了云计算技术和管理的安全风险因素,并给出应对策略,可供云服务商、云用户和云监管机构参考或借鉴,对云计算的进一步发展具有一定的指导意义.  相似文献   

20.
信息技术为图书馆资源建设提供了显而易见的有利条件。图书馆要充分把握图书馆用户需求主体日益增加、需求内容趋向多元、需求结构逐步改善等多种特点,把握大数据、云计算、全媒体、区块链、移动互联网等多种技术和手段的特点和内容,利用这些信息技术来优化馆藏资源配置、改善读者阅读体验、提升人技融合能力。图书馆要充分利用大数据和云计算技术,凭借移动互联网技术的支持和全媒体技术的有效运用,并借助区块链技术,有力推动图书馆资源的稳步建设和持续发展。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号