(1) Conference Proceedings are Peer-Reviewed, (2) All Academic Journals are Double Blind Reviewed, (3) Both Conference Proceedings
and Journals are Indexed and Archived with the U.S. Library of Congress, Washington DC, USA, (4) Journals are Listed and Indexed
with Major Directories e.g. EBSCOhost Discovery - Worldwide, Cabell's, JournalSeek, Google Scholar, etc.
MARCH 16-17, 2018 ACADEMIC CONFERENCE, SAN ANTONIO, TX, USA
MAY 25-26, 2018 ACADEMIC CONFERENCE, NASHVILLE, TN - USA
OCTOBER 19-20, 2018 ACADEMIC CONFERENCE, ATLANTA, GA - USA
DECEMBER 21-22, 2018 ACADEMIC CONFERENCE, LAS VEGAS, NV - USA
MARCH 16-17, 2018 ACADEMIC CONFERENCE, SAN ANTONIO, TX, USA
![]() |
![]() |
![]() |
JISTP - Journal of Information Systems Technology and Planning
Volume: 5, Issue: 12
Authors can view an Abstract, and order a Full Article, which is in the Electronic Copy of the Journal. Please send an email request to obtain the Journal chief-editor@intellectbase.org.
With the rapid growth of internet and cutting edge technology, there is a great need to automatically detect a variety of intrusions. In recent years, the rapidly expanding area of mobile and wireless computing applications definitely redefined the concept of network security. Even though that wireless had opened a new and exciting world with its advancing technology, the biggest concern with either wireless or mobile computing applications in security. It can no longer be effective in the traditional way of securing networks with the use of firewalls and even with the use of stronger encryption algorithm keys. Intrusion Detection Systems (IDS) with the use of mobile agents are the current trend and efficient techniques for detecting attacks on mobile wireless networks. The paper provides an in-depth analysis of the weaknesses of the wireless networks and discusses how an intrusion detection system can be used to secure these networks. The paper reviews foundations of intrusion detection systems and the methodologies. The paper presents a way to secure these networks by using mobile agents. A mobile agent is a type of agent with the ability to migrate from one host to another where it can resume its execution and also it can collaborate in detection tasks. This technique still has some drawbacks. In this paper, we propose an efficient approach to Intrusion Detection using mobile handheld devices.
Keywords: Mobile Agent, Network Security, Intrusion Detection Systems (IDS), Firewall, Intrusion, Mobile Device.
Penetration testing is the practice of testing computer systems, networks or web applications for their vulnerabilities and security weaknesses. These tests can either be conducted by automated software or manually [6.] Wikipedia has defined penetration testing as "a method of evaluating the security of a computer system or network by simulating an attack from a malicious source..." [11]. There are many different levels of penetration tests that can be performed on an organizations network and security infrastructure. These tests can range from simply attempting a brute force password attack on a particular system, all the way up to a simulated attack including, but not limited to social engineering.
Keywords: Penetration Testing, Black Box Penetration Testing, White Box Penetration Testing, Scanning and Enumeration, Target Testing, Internal Testing, Blind Testing, Double Blind Testing.
Information technology plays a huge role in evolution of organizational and managerial theories. The study of the impact of IT is significant to understand the current organization and management thought. The six core concepts utilized by organization theorists and the five main managerial functions present the impact of IT on organization and management theory. Change is theory has also resulted in a change in practices that has seen an increase in the importance of IT and IT personnel management practices.
Keywords: Theory, Organization Theory, Management Theory, Information Technology, Evolution, and Management Thought.
Very few scholars and business leaders would argue that there are very few business intelligence (BI) models in use today which focus on meeting the servicing needs of small businesses. It is no secret that small businesses have similar BI system needs as large organizations, yet they lack both the infrastructure and financial capabilities. To this end, the Motivations-Attributes-Skills-Knowledge Inverted Funnel Validation (MIFV) Model will provide small businesses with the opportunity to explore and deploy a BI system that is both effective and affordable. Fundamentally, the MIFV is an upstream, sequentially driven competency validation model whose goal it is to achieve a defined competency cluster, which in this case is implementing a BI system for small organizations. To this point, far too often small organizations have a number of fragmented data marts that often work against each other as opposed to a logical BI system that provides a small organization with a single version of the truth. In this case, the competency cluster would investigate several variables facing leadership development. Once it is determined which BI variables will be addressed, a set of competencies will be developed to enable said variables. Once this set of variables is mastered, other BI system variables can be deployed as the BI system matures. The individual competencies will be grouped to form a competency cluster. Based on the afore mentioned foundation is developed the MIFV will serve as the critical key related in developing an effective BI system to put a small organization in a position to better compete today and into the future. Further, the MIFV can become the standard for developing the competency cluster validation process that will link traditional information service processes in small organizations with critical motivations, attributes, skills and knowledge aspects of BI systems.
Keywords: Business Intelligence, Competency Clusters, Validation Modeling, Motivations-Attributes-Skills-Knowledge, and Environmental Scanning.
Effective and efficient load and performance testing is a critical success factor (CSF) for a company's e-commerce systems with regard to meeting performance and load objectives, and thus revenue goals. It is now necessary to enable remediation of both performance and load issues, not simply report test results. With the rapid growth of load testing and performance testing, best practices should be identified. Any company's assets, (e.g. time and money), are finite, thus this paper describes tool independent load and performance testing best practices and how the trusted consultant can help increase the return on asset (ROA) and return on investment (ROI) for clients. In this article load and performance testing goals, methodologies, processes, procedures, and outcomes (results) will be discussed individually. The processes provided in this paper present best practices for both load and performance testing and can be used as a template for testing different systems. Consequently, less effort would be required for development and maintenance, and more resources will be free to be dedicated to the required testing project; thus increasing customer satisfaction through increased return on asset and return on investment. Satisfied customers are expected to be return customers and share their satisfaction through positive word-of-mouth advertising.
Keywords: Computer Information Systems, Load & Performance Testing, Return on Assets, Return on Investment, Customer Satisfaction.
The purpose of the current research is to investigate to what extent website continuance intention is determined by website satisfaction. Moreover, we desire to test the mediating impact of emotions between cognitive absorption and website satisfaction. Data collection is carried out on a sample of 300 respondents and is conducted by an experiment in laboratory, followed by a survey administration. Results suggest that positive emotions mediate the relation between cognitive absorption and satisfaction; and that website satisfaction positively influences users continuance intention. Theoretical and practical implications are considered.
Keywords: Cognitive Absorption, Emotion, Website Satisfaction, Website Continuance Intention, Human-Machine Interaction.
There is an increasing demand on citizens to participate in social network websites and to create and share their own user-generated content (UGC), such as photographs, videos, and blogs. While many organizations are turning to such technologies aid their innovation process, little is known about what motivates individual to engage in UCG. We are of the position that investigation of UGC is essential to ensure both users and organizations gain true value from the active participation in content creation. This study examines the impact of personality types on UGC. Given that the level of Internet usage is often discretionary rather than mandated, and thus more likely to reflect personal motives, needs, values, preferences and other personality attributes, we investigated the mediating role on inter use on personality traits and UGC. The study proposes a research model and questions that postulates links between three personality types (extraversion, neuroticism, and psychoticism), Internet use, and four types of user generated content (UGC). A methodology and a design layout for data collection and analysis are presented.
Keywords: User-Generated Content, Consumer-Generated Media, Personality Traits, Internet Use.
Video games are not just a favorite pastime among youth and adults, but they are also a multi-billion dollar industry (NPD Group, 2012.) In spite of the fact that playing electronic games is becoming an important fact of modern life, practically no research has been done to find out why some who play video games consider themselves to be "gamers". Using qualitative data this study explores the various facets or characteristics of being a gamer, as described by those who consider themselves to be gamers. The results of this study indicate that there are at least 7Es related to being a gamer and these are: engagement, enjoyment, equipment, existential, experience, expertise, and extent. This study also found that there could be what can be labeled a "gamer divide" or "gamer gap" among male and female game players.
Keywords: Electronic Games, Gamers, Gamer Characteristics, Gamer Divide / Gap.
To prevent and police academic dishonesty, schools have increasingly turned to modern technologies. The outcomes have been at best mixed, as current social, technological, and legal trends may have sheltered and favored the cheaters. This paper examines academic dishonesty and the tools, practices and strategies to mitigate the problem from a formal ethical perspective, with special attention to more currently prominent technologies. However, technologies do not address the many underlying pressures, skill factors, and value traits driving students to cheat. Hybrid approaches, integrating technology into the development of personal virtues and ethical culture at schools may prove more potent (Kitahara, et. al., 2011).
Keywords: Academic Integrity, Technology, Biometrics, Electronic Monitoring, Ethics.
Recent and significant changes to Australian consumer protection legislation provide an opportunity to dovetail the burgeoning world of e-commerce with the existing bricks and mortar based consumer legislation Australians had become rather familiar and indeed comfortable with. Consumer protection has since the Trade Practices Act of 1974 (TPA) was enacted, become part and parcel of everyday transactions, but have only been loosely adapted to the emerging electronic environment, and this has raised some significant issues. This has implications for both Australians undertaking online transactions, and those seeking to do similar business with them. The operative components of the TPA have been largely mirrored in Schedule 2 of the Consumer and Competition Act 2010, which is itself part of the Australian Consumer Law (ACL) enacted towards the end of last year and which became law on 1st January 2011. There are however some subtle differences worthy of study and exploration, and this paper sets out to achieve just that. By way of an example, the definitions of 'goods', 'services' and 'consumer' in the ACL have regard to implied "consumer warranties" which are something more than the previously implied contract conditions. The ACL achieves this change by implying these consumer guarantees into every contract for the sale of goods regardless of where in the world the contract originates from as long as there is an 'Australian connection'. This eliminates the traditional common law distinction between conditions and warranties, and this can be expected to result in easier access to the law by consumers without the need to resort to specialist legal advice, and indeed no longer require resort to the law of Contract in any detailed way to access appropriate remedies for breaches of such guarantees. Following the Gutnick decision Australian courts can now seize jurisdiction with regard to an international electronic transaction as long as the effect on the consumer (and this of course applies to businesses as consumers) is felt in Australia through an appropriate connection. In addition, the ACL has provided a broader catch-all section dealing with misleading and deceptive conduct by replacing the previous restrictive applicability to "a corporation" with the broader "a person" in the critical Section 18. And although this does not completely eliminate dealings under caveat emptor, it has made the provision universal in its application. The changes in the Consumer Protection regime made under this legislation are being viewed as an opportunity to bring the rapidly expanding area of e-commerce within its reach. Recent research indicates that as a society Australians engage in online transactions more readily than ever before, with major implications for those doing business in the traditional 'bricks and mortar' business world, or making the changeover to the world of e-commerce. The paper therefore explores the relevant provisions of the ACL as they relate to consumer protection under both traditional and electronic contract, through an analysis of the role of e-commerce in Australia under the new law, together with its implications for Australians and those seeking to do online business with Australians and will analyse the implications of this.
Keywords: E-Commerce, Australian Consumer Law (ACL), Consumer Protection Legislation, Trade Practices Act, Consumer and Competition Act.
The price of Universal Serial Bus (USB) thumb drives is affordable to most college students compared to other portable and bootable storage devices. There are many technologies available for installing and running Linux operating system (O.S.) in a bootable USB thumb drive from a computer that can boot with the USB device. Plus, computers with BIOS that support USB boot have been sold for several years. Using bootable thumb drive to teach Linux shell scripting and Java programming becomes practical and cost-effective. In this paper, the authors describe how they use bootable USB thumb drives to teach Linux shell scripting and Java programming.
Keywords: USB Drive, USB Bootable Drive, Portable Lab, Portable Programming Lab, USB Programming Lab.
This paper applies a queuing model for multiple servers and a single line (M/M/s) to study the process of admission of the Adult Emergency Room at Good Samaritan Hospital in Aguadilla, Puerto Rico. Based on analysis of historical data on the arrival rates of patients to the emergency room, as well as their service times, we determined the probability distributions that these rates followed, respectively. The data utilized here was collected from hospital registrations corresponding to the years 2007-2009. Queuing analysis was used to determine the minimum number of health care providers needed to maintain a desired waiting time in the emergency room, in this case set at an average of five minutes. Furthermore, linear programming was applied to determine the optimal distribution of personnel needed in order to maintain the expected waiting times with the minimum number of care givers on the payroll, thus reducing the cost. Thus, we conclude that it is possible to reduce the average waiting time in the emergency room environment while keeping the corresponding costs under control. This paper is meant to illustrate the potential benefits of applying Operations Research techniques to the health care management environment. It should serve as a valuable decisional tool for health professionals.
Keywords: Queuing Theory, Linear Programming, Emergency Room Waiting Times, Operations Research, Health Care Personnel Assignment.