The online car-hailing industry, which provides the right of use, has a certain impact on the traditional automobile market, but there is no unified theory on whether it has a positive impact or a negative impact. Bas...The online car-hailing industry, which provides the right of use, has a certain impact on the traditional automobile market, but there is no unified theory on whether it has a positive impact or a negative impact. Based on 362 consumer questionnaire data, this study builds a structural equation model to discuss the driving factors of residents’ choice of online car-hailing and whether the development of online car-hailing will have a certain substitution impact on the sales of private cars. From the perspective of consumers’ purchase intention, the research results show that consumers’ price consciousness, convenience consciousness, environmental protection consciousness and possession tendency will affect their choice of travel mode, and the use of online car-hailing is positively correlated with consumers’ willingness to replace private car ownership with online car-hailing.展开更多
Over the past decade, there has been an increase in cybersecurity breaches through identity theft, hacking, phishing attacks, and the use of malware such as viruses, worms, or trojans. The breaches have triggered an i...Over the past decade, there has been an increase in cybersecurity breaches through identity theft, hacking, phishing attacks, and the use of malware such as viruses, worms, or trojans. The breaches have triggered an increase in investment in information security in organizations. As technology continues to improve, the risks of having cybersecurity incidents also increase. Cybersecurity firms reported that in 2016, there were 1209 total breaches with 1.1 billion identities exposed. Most experts agree that human vulnerability is a significant factor in cybersecurity. Most issues related to advanced threats come from human nature and ignorance. For the study, the researcher examined the relationship between Millennial professionals’ perceptions of cybersecurity risks and users’ online security behaviors. The study focused on two elements of perception which are perceived benefits and perceived barriers. The researcher administered a survey to 109 participants randomly selected among Survey Monkey audience members. The Spearman’s correlation test performed supported the analysis of the strength of the relationship and the level of significance between each of the independent variables and the dependent variable. The results from the statistical test provided enough evidence to reject each of the null hypothesis tested in this study. There were significant correlations between each of the independent variables, Perceived Benefits (PBE) and Perceived Barriers (PBA) and the dependent variable Online Security Behaviors (OSB).展开更多
Advancements in the internet technology triggered a line of developments in the field of marketing. As an alternative to the conventional shopping, online shopping over the internet has gained substantial share of ret...Advancements in the internet technology triggered a line of developments in the field of marketing. As an alternative to the conventional shopping, online shopping over the internet has gained substantial share of retail market. Customers get used to this new shopping venue and nowadays prefer it more and more according to the researchers, ten percent of the global population now uses internet for shopping. In this research, the author explored the relationship between the security measures implemented by a company, very active in the online shopping domain, and the customer trust and loyalty on the online services provided by this company. Findings of this research are based on survey data analyzed in SPSS. This research supports the existence of a relationship between the security of a company's website and customer trust and loyalty on the online services of this company When the perception of security measures improves, customer trust and loyalty increases accordingly展开更多
With the continuous development and advancement of science and technology,WEB-based online insurance system has become an inevitable choice to adapt to the development trend of the times.On the basis of establishing a...With the continuous development and advancement of science and technology,WEB-based online insurance system has become an inevitable choice to adapt to the development trend of the times.On the basis of establishing a system,it is necessary to manage the safe operation structure,thus effectively establishing complete supervision and maintenance.The system ensures that the management level of insured information security technology can be optimized.This paper briefly analyzes the framework of the WEB-based online insurance system and discusses the security mode and system implementation.展开更多
In this paper, online security warning and risk assessment of power grid are proposed, based on data from EMS (Energy Management System), combined with information of real-time operation state, component status and ...In this paper, online security warning and risk assessment of power grid are proposed, based on data from EMS (Energy Management System), combined with information of real-time operation state, component status and external operating environment. It combines the two factors, contingency likelihood and severity, that determine system reliability, into risk indices on different loads and operation modes, which provide precise evaluation of the power grid's security performance. According to these indices, it can know the vulnerable area of the system and whether the normal operating mode or repair mode is over-limited or not, and provide decision-making support for dispatchers. Common cause outages and equipment-aging are considered in terms of the establishment of outage model. Multiple risk indices are defined in order to reflect the risk level of the power grid more comprehensively.展开更多
BACKGROUND Online surveys can align with youth’s increased use of the internet and can be a mechanism for expanding youth participation in research.This is particularly important during the coronavirus disease 2019(C...BACKGROUND Online surveys can align with youth’s increased use of the internet and can be a mechanism for expanding youth participation in research.This is particularly important during the coronavirus disease 2019(COVID-19)pandemic,when inperson interactions are limited.However,the advantages and drawbacks of online systems used for research need to be carefully considered before utilizing such methodologies.AIM To describe and discuss the strengths and limitations of an online system developed to recruit adolescent girls for a sexual health research study and conduct a three-month follow up survey.METHODS This methodology paper examines the use of an online system to recruit and follow participants three months after their medical visit to evaluate a mobile sexual and reproductive health application,Health-E You/Salud iTuTM,for adolescent girls attending school-based health centers(SBHCs)across the United States.SBHC staff gave adolescent girls a web link to an online eligibility and consent survey.Participants were then asked to complete two online surveys(baseline and 3-month follow-up).Surveys,reminders,and incentives to complete them were distributed through short message service(SMS)text messages.Upon completing each survey,participants were also sent an email with a link to an electronic gift card as a thank-you for their participation.Barriers to implementing this system were discussed with clinicians and staff at each participating SBHC.RESULTS This online recruitment and retention system enabled participant recruitment at 26 different SBHCs in seven states across the United States.Between September 2021 and June 2022,415 adolescent girls were screened using the Qualtrics online survey platform,and 182 were eligible to participate.Of those eligible,78.0%(n=142)completed the baseline survey.Participants were racially,geographically,and linguistically diverse.Most of the participants(89.4%)were non-White,and 40.8%spoke Spanish.A total of 62.0%(n=88)completed the 3-month follow-up survey.Limitations of this system included reliance on internet access(via Wi-Fi or cell service),which was not universally available or reliable.In addition,an individual unrelated to the study obtained the survey link,filled out multiple surveys,and received multiple gift cards before the research team discovered and stopped this activity.As a result,additional security protocols were instituted.CONCLUSION Online systems for health research can increase the reach and diversity of study participants,reduce costs for research personnel time and travel,allow for continued study operation when in-person visits are limited(such as during the COVID-19 pandemic),and connect youth with research using technology.However,there are challenges and limitations to online systems,which include limited internet access,intermittent internet connection,data security concerns,and the potential for fraudulent users.These challenges should be considered prior to using online systems for research.展开更多
Business model innovation faces multiple tests of legitimacy.Most extant research in this area has been conducted from institutional and strategic perspectives while paying insufficient attention to the perspective of...Business model innovation faces multiple tests of legitimacy.Most extant research in this area has been conducted from institutional and strategic perspectives while paying insufficient attention to the perspective of evaluators.Based on the institutionalization of China's online car-hailing industry from 2012 to 2018,this paper analyzes the legitimacy judgment of the stakeholders from the perspective of evaluator categorization and explores the legitimation mechanism of business model innovation.It finds that evaluators judge the legitimacy of business models based on category cognition.Therefore,to achieve the bridging,spillover,and accumulation effects of legitimacy,the legitimation strategy of online car-hailing platforms should dynamically adapt to different evaluators,judgment models,and categorization standards.Ultimately,as quantitative changes lead to qualitative changes,the legitimation of innovative business models is achieved in this way.In this process,stakeholders categorize and evaluate online car-hailing based on prototypes and value goals,and establish a two-way interactive mechanism,which is from behavior guided by cognition to cognition given feedback by behavior.This paper combines the legitimacy judgment with category theory to explain how individual cognition drives the emergence of new categories and identifies a series of legitimacy strategies based on categorization,thus providing theoretical support and practical inspiration for exploring the legitimation of business model innovation.展开更多
Considering its structural features, geometric shapes, service mode, environmental media, mechanical behavior, etc, the special nature and complexity of tailings dam were summarized. The technical approach to safety m...Considering its structural features, geometric shapes, service mode, environmental media, mechanical behavior, etc, the special nature and complexity of tailings dam were summarized. The technical approach to safety management for tailings dam was proposed, which is the on-line automated monitoring and early warning information. The results show that a strong theoretical basis can be provided for security monitoring and security management of tailings dam. Online automated monitoring system for tailings dam has full implementation of the information. It is applied widely in Lingnan gold mine, Xiadian gold mine and Hedong gold mine in Zhaoyuan, Shandong Province, and achieves good effect.展开更多
Power transmission systems are being operated closer to their stability limits compared to twenty years ago. As a result, an increasing risk of blackouts combined with extremely high costs economically and socially is...Power transmission systems are being operated closer to their stability limits compared to twenty years ago. As a result, an increasing risk of blackouts combined with extremely high costs economically and socially is observed. To reduce this risk the personnel in the control rooms of the transmission system operators have to be assisted by a system, which assesses the dynamic state of security online. The system presented in this paper is designed to investigate the security with regards to voltage stability, transient stability and small signal oscillatory stability. New technologies of visualizing the degree of stability to non dynamic stability experts are used as well as integration in existing SCADA/EMS systems are realized. The performance of the system is sufficiently high to be employed in the online environment of the control room.展开更多
A security architecture using secret key algorithm and vertical authentication mode is proposed. Establish security protocols in the chip of smart key at network client or mobile phone, and establish key exchange prot...A security architecture using secret key algorithm and vertical authentication mode is proposed. Establish security protocols in the chip of smart key at network client or mobile phone, and establish key exchange protocol in the chip of encryption cards at network key management center. A combined key real-time generation algorithm is used to solve the update and management problems. Online or offline authentication and documents encryption transmission protocols are adopted to achieve credible connection between users. Accordingly, set up security layer over Internet, which provides convenient encryption ability to each network user, and build credible and secure network system.展开更多
To improve the security and reliability of a distribution network, several issues, such as influences of operation con-strains, real-time load margin calculation, and online security level evaluation, are with great s...To improve the security and reliability of a distribution network, several issues, such as influences of operation con-strains, real-time load margin calculation, and online security level evaluation, are with great significance. In this pa-per, a mathematical model for load capability online assessment of a distribution network is established, and a repeti-tive power flow calculation algorithm is proposed to solve the problem as well. With assessment on three levels: the entire distribution network, a sub-area of the network and a load bus, the security level of current operation mode and load transfer capability during outage are thus obtained. The results can provide guidelines for prevention control, as well as restoration control. Simulation results show that the method is simple, fast and can be applied to distribution networks belonged to any voltage level while taking into account all of the operation constraints.展开更多
As the economy increases its dependence on the internet to increase efficiency and productivity in all aspects of society, close attention has been directed to solve the challenges related to internet security. Despit...As the economy increases its dependence on the internet to increase efficiency and productivity in all aspects of society, close attention has been directed to solve the challenges related to internet security. Despite the large amount of resource invested so far in this area, cybersecurity challenges are still great as the media frequently report new cyber breaches. Although researchers acknowledge that great progress has been made in protecting digital assets, cybercriminals are still successful in their operations which are no longer limited to government entities and corporations but also individual computer users. To improve users’ security posture, the researcher examined the relationship between Millennials’ perceptions of cybersecurity threat, users’ online security behaviors and avoidance motivation. The study focused on three constructs which are Perceived Threat (PTH), Online Security Behaviors (OSB) and Avoidance Motivation (AMO). The researcher administered a survey to 109 participants randomly selected in the United States. The Spearman’s correlation test performed supported the analysis of the strength of the relationship and the level of significance between the independent variable and the dependent variables. The results from the statistical test provided enough evidence to fail to reject the null hypothesis related to relationships between PTH and OSB and to reject the null hypothesis regarding the relationship between PTH and AMO.展开更多
Aiming at the characteristics of huge knowledge points,strong practicality and diversity of software security course,adhering to the“Π”scheme for emerging engineering education,based on Tencent classroom,Tencent co...Aiming at the characteristics of huge knowledge points,strong practicality and diversity of software security course,adhering to the“Π”scheme for emerging engineering education,based on Tencent classroom,Tencent conference and Lan ink cloud class,and guided by BOPPPS teaching model and deep learning theory,“three preparations before class,five channels in class and five tracking after class”is proposed.Three preparations before class and five tracking after class serve the five channels in class.Five channels in class take live teaching as the core,and teach students knowledge through five channels.Practice has proved that this mode can effectively solve the problem of teaching a large number of knowledge in limited class hours,improve students’practical ability and enhance the effect of classroom teaching.展开更多
Different domains of computing systems require higher level of focus towards specific quality factors like privacy, integrity, flexibility, usability etc. Moreover, certain quality factors help in each other’s existe...Different domains of computing systems require higher level of focus towards specific quality factors like privacy, integrity, flexibility, usability etc. Moreover, certain quality factors help in each other’s existence while others oppose each other significantly. Usability of software applications is one factor that reduces security and privacy up to a substantial level. This paper examines the differences between usability factors and aspects related to security and privacy. A clear understanding of gaps between these two opposing factors has been presented in this paper. In addition, an account of efforts carried out to bridge these gaps has also been presented. We have divided these efforts into the categories of guidelines, frameworks and use of technology. The fields of e-banking and social networks have been considered specifically for identification of gaps in these particular fields.展开更多
A news agency is an organization that gathers news reports and sells them to subscribing news organization, such as newspapers, magazines, radio and television broadcasters. A news agency may also be referred to as a ...A news agency is an organization that gathers news reports and sells them to subscribing news organization, such as newspapers, magazines, radio and television broadcasters. A news agency may also be referred to as a wire service, newswire, or news service. The main purpose of this paper is to evaluate the security policies and analyze the content of five press agencies in gulf countries which are (Kuwait News Agency (KUNA), Emirates News Agency (WAM), Saudi Press Agency (SPA), Bahrain News Agency (BNA), and Oman News Agency (OMA)) by using a fuzzy VIKOR approach where linguistic variables are applied to solve the uncertainties and subjectivities in expert decision making. Fuzzy VIKOR approach is one of the best Multi-Criteria Decision Making (MCDM) techniques working in fuzzy environment. This study benefits security and content analysis experts know which press agency has the mandate and the competence to educate the public on news agencies. Besides, this paper contributes to Gulf agencies in helping them in their resolve to ensure the quality of content information and information security policies over the internet.展开更多
The increasing popularity of wireless networks makes the protection of online privacy be a common concern of users and internet service providers.Because of the difference of wireless networks and wired networks,it is...The increasing popularity of wireless networks makes the protection of online privacy be a common concern of users and internet service providers.Because of the difference of wireless networks and wired networks,it is proved to be easier for hackers to steal information related to users' privacy in wireless networks than that of wired networks.The issue that whether online privacy protection is necessary or reasonable has given rise to much controversy.In this paper,the discussion of this issue includes what online protection of privacy is,current problems of online privacy protection in wireless networks,exploration of solutions and problems that may caused by the protection.No matter what extent the protection will be,it is proved to be essential for experts,users and IT staff to enhance the protection in wireless networks via new technologies,policy and law.It is also a way for improving the security of information management and business communication in wireless networks.展开更多
The house rental issue is one of the elemental parts of society. Nowadays, it is extremely difficult to find suitable accommodation in city areas if people search for it physically. On the other hand, the land owner a...The house rental issue is one of the elemental parts of society. Nowadays, it is extremely difficult to find suitable accommodation in city areas if people search for it physically. On the other hand, the land owner also needs to rent the house. It can be difficult to find tenants just to hang a lease sign on a building, and as a result, they lose money. An online common platform can play a vital role in this case. The purpose of the study is to develop a common web-based online platform for both tenants and house owners so that both tenants and landowners will mutually benefit from the system. This paper presents the development of web applications for the people of Bangladesh where both house owners and tenants can register and tenants can have houses for rent via sophisticated contact with the house owner. In this paper, a common online-based smart house rental web application has been developed both for tenants and for house owners. This web application is very user-friendly, efficient and it has got many unique features that are not offered by other currently available house rental websites here in Bangladesh. Tenants can register using their phone number, store information about their identity, search for available houses, send messages to house owners, and choose a suitable house using developed web applications. House owners can also register for the system, which will manually verify and authenticate the knowledge provided by the house owner can view a tenant’s information history whenever a tenant makes contact through text and supply house-related information accordingly. The proposed online smart house system has been tested and validated. It works very efficiently with many features. The application provided faster and improved opportunities to get houses, as well as ensuring the availability of houses for rent in the greatest number of areas. The system will help to spread trustworthy services nationwide and supply users with the chance to speak and improve the house rent in Bangladesh. Because it has many smart features, this developed online smart house rental web application will make it very easy for tenants to find a house to rent. House owners, on the other hand, can easily rent out their properties.展开更多
文摘The online car-hailing industry, which provides the right of use, has a certain impact on the traditional automobile market, but there is no unified theory on whether it has a positive impact or a negative impact. Based on 362 consumer questionnaire data, this study builds a structural equation model to discuss the driving factors of residents’ choice of online car-hailing and whether the development of online car-hailing will have a certain substitution impact on the sales of private cars. From the perspective of consumers’ purchase intention, the research results show that consumers’ price consciousness, convenience consciousness, environmental protection consciousness and possession tendency will affect their choice of travel mode, and the use of online car-hailing is positively correlated with consumers’ willingness to replace private car ownership with online car-hailing.
文摘Over the past decade, there has been an increase in cybersecurity breaches through identity theft, hacking, phishing attacks, and the use of malware such as viruses, worms, or trojans. The breaches have triggered an increase in investment in information security in organizations. As technology continues to improve, the risks of having cybersecurity incidents also increase. Cybersecurity firms reported that in 2016, there were 1209 total breaches with 1.1 billion identities exposed. Most experts agree that human vulnerability is a significant factor in cybersecurity. Most issues related to advanced threats come from human nature and ignorance. For the study, the researcher examined the relationship between Millennial professionals’ perceptions of cybersecurity risks and users’ online security behaviors. The study focused on two elements of perception which are perceived benefits and perceived barriers. The researcher administered a survey to 109 participants randomly selected among Survey Monkey audience members. The Spearman’s correlation test performed supported the analysis of the strength of the relationship and the level of significance between each of the independent variables and the dependent variable. The results from the statistical test provided enough evidence to reject each of the null hypothesis tested in this study. There were significant correlations between each of the independent variables, Perceived Benefits (PBE) and Perceived Barriers (PBA) and the dependent variable Online Security Behaviors (OSB).
文摘Advancements in the internet technology triggered a line of developments in the field of marketing. As an alternative to the conventional shopping, online shopping over the internet has gained substantial share of retail market. Customers get used to this new shopping venue and nowadays prefer it more and more according to the researchers, ten percent of the global population now uses internet for shopping. In this research, the author explored the relationship between the security measures implemented by a company, very active in the online shopping domain, and the customer trust and loyalty on the online services provided by this company. Findings of this research are based on survey data analyzed in SPSS. This research supports the existence of a relationship between the security of a company's website and customer trust and loyalty on the online services of this company When the perception of security measures improves, customer trust and loyalty increases accordingly
文摘With the continuous development and advancement of science and technology,WEB-based online insurance system has become an inevitable choice to adapt to the development trend of the times.On the basis of establishing a system,it is necessary to manage the safe operation structure,thus effectively establishing complete supervision and maintenance.The system ensures that the management level of insured information security technology can be optimized.This paper briefly analyzes the framework of the WEB-based online insurance system and discusses the security mode and system implementation.
文摘In this paper, online security warning and risk assessment of power grid are proposed, based on data from EMS (Energy Management System), combined with information of real-time operation state, component status and external operating environment. It combines the two factors, contingency likelihood and severity, that determine system reliability, into risk indices on different loads and operation modes, which provide precise evaluation of the power grid's security performance. According to these indices, it can know the vulnerable area of the system and whether the normal operating mode or repair mode is over-limited or not, and provide decision-making support for dispatchers. Common cause outages and equipment-aging are considered in terms of the establishment of outage model. Multiple risk indices are defined in order to reflect the risk level of the power grid more comprehensively.
基金Supported by a Patient-Centered Outcomes Research Institute(PCORI)Dissemination and Implementation Award,No.DI-2020C2-20372.
文摘BACKGROUND Online surveys can align with youth’s increased use of the internet and can be a mechanism for expanding youth participation in research.This is particularly important during the coronavirus disease 2019(COVID-19)pandemic,when inperson interactions are limited.However,the advantages and drawbacks of online systems used for research need to be carefully considered before utilizing such methodologies.AIM To describe and discuss the strengths and limitations of an online system developed to recruit adolescent girls for a sexual health research study and conduct a three-month follow up survey.METHODS This methodology paper examines the use of an online system to recruit and follow participants three months after their medical visit to evaluate a mobile sexual and reproductive health application,Health-E You/Salud iTuTM,for adolescent girls attending school-based health centers(SBHCs)across the United States.SBHC staff gave adolescent girls a web link to an online eligibility and consent survey.Participants were then asked to complete two online surveys(baseline and 3-month follow-up).Surveys,reminders,and incentives to complete them were distributed through short message service(SMS)text messages.Upon completing each survey,participants were also sent an email with a link to an electronic gift card as a thank-you for their participation.Barriers to implementing this system were discussed with clinicians and staff at each participating SBHC.RESULTS This online recruitment and retention system enabled participant recruitment at 26 different SBHCs in seven states across the United States.Between September 2021 and June 2022,415 adolescent girls were screened using the Qualtrics online survey platform,and 182 were eligible to participate.Of those eligible,78.0%(n=142)completed the baseline survey.Participants were racially,geographically,and linguistically diverse.Most of the participants(89.4%)were non-White,and 40.8%spoke Spanish.A total of 62.0%(n=88)completed the 3-month follow-up survey.Limitations of this system included reliance on internet access(via Wi-Fi or cell service),which was not universally available or reliable.In addition,an individual unrelated to the study obtained the survey link,filled out multiple surveys,and received multiple gift cards before the research team discovered and stopped this activity.As a result,additional security protocols were instituted.CONCLUSION Online systems for health research can increase the reach and diversity of study participants,reduce costs for research personnel time and travel,allow for continued study operation when in-person visits are limited(such as during the COVID-19 pandemic),and connect youth with research using technology.However,there are challenges and limitations to online systems,which include limited internet access,intermittent internet connection,data security concerns,and the potential for fraudulent users.These challenges should be considered prior to using online systems for research.
基金supported by the National Natural Science Foundation of China(No.72072008)the special fund for first-class discipline construction of Beijing University of Chemical Technology(No.XK1802-5).
文摘Business model innovation faces multiple tests of legitimacy.Most extant research in this area has been conducted from institutional and strategic perspectives while paying insufficient attention to the perspective of evaluators.Based on the institutionalization of China's online car-hailing industry from 2012 to 2018,this paper analyzes the legitimacy judgment of the stakeholders from the perspective of evaluator categorization and explores the legitimation mechanism of business model innovation.It finds that evaluators judge the legitimacy of business models based on category cognition.Therefore,to achieve the bridging,spillover,and accumulation effects of legitimacy,the legitimation strategy of online car-hailing platforms should dynamically adapt to different evaluators,judgment models,and categorization standards.Ultimately,as quantitative changes lead to qualitative changes,the legitimation of innovative business models is achieved in this way.In this process,stakeholders categorize and evaluate online car-hailing based on prototypes and value goals,and establish a two-way interactive mechanism,which is from behavior guided by cognition to cognition given feedback by behavior.This paper combines the legitimacy judgment with category theory to explain how individual cognition drives the emergence of new categories and identifies a series of legitimacy strategies based on categorization,thus providing theoretical support and practical inspiration for exploring the legitimation of business model innovation.
基金Projects(50874064,50804026,50904039)supported by the National Natural Science Foundation of ChinaProject(200804290002)supported by Research Fund for the Doctoral Program of Higher Education of ChinaProject(G2010F10)supported by S&T Plan Project from Shandong Provincial Education Department
文摘Considering its structural features, geometric shapes, service mode, environmental media, mechanical behavior, etc, the special nature and complexity of tailings dam were summarized. The technical approach to safety management for tailings dam was proposed, which is the on-line automated monitoring and early warning information. The results show that a strong theoretical basis can be provided for security monitoring and security management of tailings dam. Online automated monitoring system for tailings dam has full implementation of the information. It is applied widely in Lingnan gold mine, Xiadian gold mine and Hedong gold mine in Zhaoyuan, Shandong Province, and achieves good effect.
文摘Power transmission systems are being operated closer to their stability limits compared to twenty years ago. As a result, an increasing risk of blackouts combined with extremely high costs economically and socially is observed. To reduce this risk the personnel in the control rooms of the transmission system operators have to be assisted by a system, which assesses the dynamic state of security online. The system presented in this paper is designed to investigate the security with regards to voltage stability, transient stability and small signal oscillatory stability. New technologies of visualizing the degree of stability to non dynamic stability experts are used as well as integration in existing SCADA/EMS systems are realized. The performance of the system is sufficiently high to be employed in the online environment of the control room.
文摘A security architecture using secret key algorithm and vertical authentication mode is proposed. Establish security protocols in the chip of smart key at network client or mobile phone, and establish key exchange protocol in the chip of encryption cards at network key management center. A combined key real-time generation algorithm is used to solve the update and management problems. Online or offline authentication and documents encryption transmission protocols are adopted to achieve credible connection between users. Accordingly, set up security layer over Internet, which provides convenient encryption ability to each network user, and build credible and secure network system.
文摘To improve the security and reliability of a distribution network, several issues, such as influences of operation con-strains, real-time load margin calculation, and online security level evaluation, are with great significance. In this pa-per, a mathematical model for load capability online assessment of a distribution network is established, and a repeti-tive power flow calculation algorithm is proposed to solve the problem as well. With assessment on three levels: the entire distribution network, a sub-area of the network and a load bus, the security level of current operation mode and load transfer capability during outage are thus obtained. The results can provide guidelines for prevention control, as well as restoration control. Simulation results show that the method is simple, fast and can be applied to distribution networks belonged to any voltage level while taking into account all of the operation constraints.
文摘As the economy increases its dependence on the internet to increase efficiency and productivity in all aspects of society, close attention has been directed to solve the challenges related to internet security. Despite the large amount of resource invested so far in this area, cybersecurity challenges are still great as the media frequently report new cyber breaches. Although researchers acknowledge that great progress has been made in protecting digital assets, cybercriminals are still successful in their operations which are no longer limited to government entities and corporations but also individual computer users. To improve users’ security posture, the researcher examined the relationship between Millennials’ perceptions of cybersecurity threat, users’ online security behaviors and avoidance motivation. The study focused on three constructs which are Perceived Threat (PTH), Online Security Behaviors (OSB) and Avoidance Motivation (AMO). The researcher administered a survey to 109 participants randomly selected in the United States. The Spearman’s correlation test performed supported the analysis of the strength of the relationship and the level of significance between the independent variable and the dependent variables. The results from the statistical test provided enough evidence to fail to reject the null hypothesis related to relationships between PTH and OSB and to reject the null hypothesis regarding the relationship between PTH and AMO.
基金This research was funded by 2020 Shandong Province Undergraduate Teaching Reform Research and Cultivation Project“Research and Practice of Mixed Teaching Mode Under the Construction of MOOC Teaching Pilot College”(Project Number:26)Harbin Institute of Technology under Grant No.JPPY-2021056,and 2021 First class courses in Shandong Province“Software Engineering”.
文摘Aiming at the characteristics of huge knowledge points,strong practicality and diversity of software security course,adhering to the“Π”scheme for emerging engineering education,based on Tencent classroom,Tencent conference and Lan ink cloud class,and guided by BOPPPS teaching model and deep learning theory,“three preparations before class,five channels in class and five tracking after class”is proposed.Three preparations before class and five tracking after class serve the five channels in class.Five channels in class take live teaching as the core,and teach students knowledge through five channels.Practice has proved that this mode can effectively solve the problem of teaching a large number of knowledge in limited class hours,improve students’practical ability and enhance the effect of classroom teaching.
文摘Different domains of computing systems require higher level of focus towards specific quality factors like privacy, integrity, flexibility, usability etc. Moreover, certain quality factors help in each other’s existence while others oppose each other significantly. Usability of software applications is one factor that reduces security and privacy up to a substantial level. This paper examines the differences between usability factors and aspects related to security and privacy. A clear understanding of gaps between these two opposing factors has been presented in this paper. In addition, an account of efforts carried out to bridge these gaps has also been presented. We have divided these efforts into the categories of guidelines, frameworks and use of technology. The fields of e-banking and social networks have been considered specifically for identification of gaps in these particular fields.
文摘A news agency is an organization that gathers news reports and sells them to subscribing news organization, such as newspapers, magazines, radio and television broadcasters. A news agency may also be referred to as a wire service, newswire, or news service. The main purpose of this paper is to evaluate the security policies and analyze the content of five press agencies in gulf countries which are (Kuwait News Agency (KUNA), Emirates News Agency (WAM), Saudi Press Agency (SPA), Bahrain News Agency (BNA), and Oman News Agency (OMA)) by using a fuzzy VIKOR approach where linguistic variables are applied to solve the uncertainties and subjectivities in expert decision making. Fuzzy VIKOR approach is one of the best Multi-Criteria Decision Making (MCDM) techniques working in fuzzy environment. This study benefits security and content analysis experts know which press agency has the mandate and the competence to educate the public on news agencies. Besides, this paper contributes to Gulf agencies in helping them in their resolve to ensure the quality of content information and information security policies over the internet.
文摘The increasing popularity of wireless networks makes the protection of online privacy be a common concern of users and internet service providers.Because of the difference of wireless networks and wired networks,it is proved to be easier for hackers to steal information related to users' privacy in wireless networks than that of wired networks.The issue that whether online privacy protection is necessary or reasonable has given rise to much controversy.In this paper,the discussion of this issue includes what online protection of privacy is,current problems of online privacy protection in wireless networks,exploration of solutions and problems that may caused by the protection.No matter what extent the protection will be,it is proved to be essential for experts,users and IT staff to enhance the protection in wireless networks via new technologies,policy and law.It is also a way for improving the security of information management and business communication in wireless networks.
文摘The house rental issue is one of the elemental parts of society. Nowadays, it is extremely difficult to find suitable accommodation in city areas if people search for it physically. On the other hand, the land owner also needs to rent the house. It can be difficult to find tenants just to hang a lease sign on a building, and as a result, they lose money. An online common platform can play a vital role in this case. The purpose of the study is to develop a common web-based online platform for both tenants and house owners so that both tenants and landowners will mutually benefit from the system. This paper presents the development of web applications for the people of Bangladesh where both house owners and tenants can register and tenants can have houses for rent via sophisticated contact with the house owner. In this paper, a common online-based smart house rental web application has been developed both for tenants and for house owners. This web application is very user-friendly, efficient and it has got many unique features that are not offered by other currently available house rental websites here in Bangladesh. Tenants can register using their phone number, store information about their identity, search for available houses, send messages to house owners, and choose a suitable house using developed web applications. House owners can also register for the system, which will manually verify and authenticate the knowledge provided by the house owner can view a tenant’s information history whenever a tenant makes contact through text and supply house-related information accordingly. The proposed online smart house system has been tested and validated. It works very efficiently with many features. The application provided faster and improved opportunities to get houses, as well as ensuring the availability of houses for rent in the greatest number of areas. The system will help to spread trustworthy services nationwide and supply users with the chance to speak and improve the house rent in Bangladesh. Because it has many smart features, this developed online smart house rental web application will make it very easy for tenants to find a house to rent. House owners, on the other hand, can easily rent out their properties.