Enterprise information systems with a great use of Web 2.0 technologies will be more open, free, and more efficient. With the contrast between classic Web technologies and Web 2.0 technologies, we represent a sample o...Enterprise information systems with a great use of Web 2.0 technologies will be more open, free, and more efficient. With the contrast between classic Web technologies and Web 2.0 technologies, we represent a sample of enterprise information system based on Web 2.0, and show how the use of Web 2. 0 technologies changes the system data exchange model of the enterprise information systems and how it improves the efficiency and effectiveness of information systems.展开更多
This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data ...This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data in the stock market being crucial, the implementation of robust systems which guarantee trust between the different actors is essential. We therefore proposed, after analyzing the limits of several security approaches in the literature, an architecture based on blockchain technology making it possible to both identify and reduce the vulnerabilities linked to the design, implementation work or the use of web applications used for transactions. Our proposal makes it possible, thanks to two-factor authentication via the Blockchain, to strengthen the security of investors’ accounts and the automated recording of transactions in the Blockchain while guaranteeing the integrity of stock market operations. It also provides an application vulnerability report. To validate our approach, we compared our results to those of three other security tools, at the level of different metrics. Our approach achieved the best performance in each case.展开更多
Web 2.0的出现使信息构建(IA)的内容发生了深刻变化,IA已进入"信息构建2.0"(IA2.0)阶段。在IA2.0阶段,IA作为一门学科、一种角色和一类社团的协调统一体而存在,它强调真正"以用户为中心"和"丰富的用户体验&qu...Web 2.0的出现使信息构建(IA)的内容发生了深刻变化,IA已进入"信息构建2.0"(IA2.0)阶段。在IA2.0阶段,IA作为一门学科、一种角色和一类社团的协调统一体而存在,它强调真正"以用户为中心"和"丰富的用户体验"的核心理念,以满足新环境下的用户需求。Web2.0网站的IA,是IA2.0的典型应用,也是IA2.0阶段研究的主要内容,本文将其称为网站IA2.0。文中设计了一个网站IA2.0模型,并进行了简单的实例分析。展开更多
Web 2.0的出现使得"网络推手"现象已经成为目前网络中不可忽略的一个现象,并且随着众多网络推手公司等的成立,"网络推手"行业正逐渐产业化。采用案例研究方法,并经时序分析和逻辑模型分析步骤,通过对所选取的"...Web 2.0的出现使得"网络推手"现象已经成为目前网络中不可忽略的一个现象,并且随着众多网络推手公司等的成立,"网络推手"行业正逐渐产业化。采用案例研究方法,并经时序分析和逻辑模型分析步骤,通过对所选取的"天仙MM"和"我爸是李刚"事件的分析,研究得出"网络推手"事件的演进阶段;寻找出"网络推手"炒作的基本流程,并构建了"网络推手"炒作模式图。研究具有深入了解"网络推手"现象炒作原理和其中群体协作模式的意义。展开更多
基金Supported by the China New Gernation InternetProgramof China (CNGI-04-6-2T)
文摘Enterprise information systems with a great use of Web 2.0 technologies will be more open, free, and more efficient. With the contrast between classic Web technologies and Web 2.0 technologies, we represent a sample of enterprise information system based on Web 2.0, and show how the use of Web 2. 0 technologies changes the system data exchange model of the enterprise information systems and how it improves the efficiency and effectiveness of information systems.
文摘This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data in the stock market being crucial, the implementation of robust systems which guarantee trust between the different actors is essential. We therefore proposed, after analyzing the limits of several security approaches in the literature, an architecture based on blockchain technology making it possible to both identify and reduce the vulnerabilities linked to the design, implementation work or the use of web applications used for transactions. Our proposal makes it possible, thanks to two-factor authentication via the Blockchain, to strengthen the security of investors’ accounts and the automated recording of transactions in the Blockchain while guaranteeing the integrity of stock market operations. It also provides an application vulnerability report. To validate our approach, we compared our results to those of three other security tools, at the level of different metrics. Our approach achieved the best performance in each case.