Search results

1 – 10 of 204
Content available

Abstract

Details

Library Hi Tech News, vol. 20 no. 8
Type: Research Article
ISSN: 0741-9058

Open Access
Article
Publication date: 7 April 2020

Fatima M. Isiaka, Salihu Abdullahi Audu and Mustafa Ahmed Umar

The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered…

2284

Abstract

Purpose

The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered national economies, enhanced how governments interact with their citizens and how ordinary people connect with friends and family. However, this dependence has equally resulted to a high rise in vulnerability, threat and risk associated with more use of information and communication technology. Cyber-attacks that have the potential to disrupt or damage information system infrastructure are getting more complex with some level of sophistication. Traditional protection of information system infrastructure is no longer sufficient; systems have proven to be immune to failure or incidents. This paper aims to ensure that there is a continuous availability of services through a fail-safe proof.

Design/methodology/approach

MYSQL replication technique was used to develop a model based on three-tier layers using the principle of network interdependency and the replication techniques. Tier 1 depicts a Telecom organization serving as service provider that provides internet service to Tier 2 organization – a Bank; Tier 3 is the financial App that can be used by bank staff and customers. The fail-safe mode integrated mechanism enables Tier 3 to continue to render its services in the event of an attack on Tier 1 such as DDoS without disruption.

Findings

This technique succeeded in mitigating the loss of data if cyber incident occurred or reception of uninterrupted services is countered, which give rise to future master-to-master architecture.

Research limitations/implications

The study conducted is limited to the design and development of a fail-safe system for interdependent networks or systems using MYSQL replication technique.

Originality/value

In an interdependent environment such as the cyberspace, the sectors are interdependent for optimal results. The originality of the work ensures that there is availability of services which is sustained and that data integrity is assured using the fail-safe technique based on MySQL replication method.

Details

International Journal of Crowd Science, vol. 4 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Content available
Article
Publication date: 1 June 2000

David Johnson

180

Abstract

Details

Library Hi Tech News, vol. 17 no. 6
Type: Research Article
ISSN: 0741-9058

Open Access
Article
Publication date: 3 July 2017

Nina Steinhauer, Michael Gros, Martin Ebner, Markus Ebner, Anneliese Huppertz, Mike Cormann, Susanne Biermeier, Lena Burk, Konstanze Edtstadler, Sonja Gabriel, Martina Wintschnig, Christian Aspalter and Susanne Martich

Due to the important role of orthography in society, the project called IDeRBlog presented in this paper created a web-based tool to motivate pupils to write text as well as to…

1696

Abstract

Purpose

Due to the important role of orthography in society, the project called IDeRBlog presented in this paper created a web-based tool to motivate pupils to write text as well as to read and to comment on texts written by fellow students. In addition, IDeRBlog aims to improve student’s German orthography skills and supports teachers and parents with training materials for their students. The paper aims to discuss these issues.

Design/methodology/approach

With the aid of learning analytics, the submitted text is analyzed and special feedback is given to the students so that they can try to correct the misspelled words themselves. The teachers as well as the parents are benefiting from the analysis and exercises suggested by the system.

Findings

A recent study showed the efficiency of the system in form of an improvement of the students’ orthographic skills. Over a period of four months 70 percent of the students achieved a significant reduction of their spelling mistakes.

Originality/value

IDeRBlog is an innovative approach to improving orthography skills combining blogging and new media with writing and practice.

Details

Journal of Research in Innovative Teaching & Learning, vol. 10 no. 2
Type: Research Article
ISSN: 2397-7604

Keywords

Open Access
Article
Publication date: 14 February 2023

Lemma Lessa and Daniel Gebrehawariat

This study is aimed at assessing the information security management practice with a focus on banking card security in selected financial institutions in Ethiopia, using an…

1186

Abstract

Purpose

This study is aimed at assessing the information security management practice with a focus on banking card security in selected financial institutions in Ethiopia, using an international information security standard as a benchmark. It is to identify the gaps and recommend best security practices to help financial institutions meet the required security compliance.

Design/methodology/approach

Two financial sectors were purposively selected. A total of twenty-five respondents (IT executives and IT staff) were included in the study. Quantitative data was collected using the PCI-DSS (Payment Card Industry Data Security Standard) security standard questionnaire. In addition, observation and document analysis were made.

Findings

The result shows that most of the essential security management activities in the financial sectors do not comply with the international security standard. Similarly, the level of most of the indispensable security requirements that should be in place is found to be below the acceptable level. The study also revealed major security factors that prohibit the financial sectors from PCI-DSS security standard compliance.

Originality/value

This study assessed the information security management practice with a focus on banking card security and tried to figure out the limitations of security practices of the organizations surveyed based on the standard adopted. The topic has not been well explored especially in the Ethiopia context. Hence, the result can positively influence security policies, particularly in the banking sector.

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Content available
Article
Publication date: 1 January 2003

Gerry McKiernan

186

Abstract

Details

Library Hi Tech News, vol. 20 no. 1
Type: Research Article
ISSN: 0741-9058

Content available

Abstract

Details

Library Hi Tech News, vol. 40 no. 4
Type: Research Article
ISSN: 0741-9058

Open Access
Book part
Publication date: 4 June 2021

Eva PenzeyMoog and Danielle C. Slakoff

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this…

Abstract

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this chapter, we discuss three unique types of technological abuse: (1) financial abuse via banking websites and apps; (2) abuse via smart home devices (i.e., “Internet of Things” abuse); and (3) stalking via geo-location or GPS. We also argue pregnancy and wellness apps provide an opportunity for meaningful intervention for pregnant victims of domestic violence.

While there is no way to ensure users' safety in all situations, we argue thoughtful considerations while designing and building digital products can result in meaningful contributions to victims' safety. This chapter concludes with PenzeyMoog's (2020) “Framework for Inclusive Safety,” which is a roadmap for building technology that increases the safety of domestic violence survivors. This framework includes three key points: (1) the importance of educating technologists about domestic violence; (2) the importance of identifying possible abuse situations and designing against them; and (3) identifying user interactions that might signal abuse and offering safe interventions.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Abstract

Details

Library Hi Tech News, vol. 30 no. 1
Type: Research Article
ISSN: 0741-9058

Content available
2729

Abstract

Details

Library Hi Tech News, vol. 19 no. 7
Type: Research Article
ISSN: 0741-9058

1 – 10 of 204