Hae
Aineistot 1-10 / 11
Design and implementation of UHF RFID smart readers
(2019-12-17)
The traditional process of integrating RFID technology into business processes can be very costly and tedious. The readers were only capable of doing a single task which is listen for requests from a client application, ...
Ensuring the integrity of nodes under the context of container live migration in a secure network
(2019-12-17)
The amount of data generated in our hyper-connected networks is rising exponentially. More and more consumer electronic devices rely on the internet to provide users with seamless access to services. Cloud computing has ...
FACTORS AFFECTING PHISHING SUSCEPTIBILITY OF THE STUDENTS
(2018-11-20)
The purpose of this study is to identify and examine the factors that may affect phishing susceptibility of the students. Using a role-play task in an online survey, data were collected from students of the University of ...
Real time Learning State Evaluation System for Elearning
(2019-10-30)
In the information age, the popularity of the Internet is profoundly changing the way people live. In this context, the online classrooms, which are spawned as a supplement to traditional classroom teaching, ...
On the State of Information Security in Public Sector Organizations in Ethiopia
(2020-06-05)
Information and communication technology (ICT) has become a vital part of the developing countries economy. As the use of ICT is increasing in day to day work of the organizations, there is a need to implement measures for ...
Achieving ISO 27001 Certification by implementing an Information Security Management System
(2018-12-04)
Information security is intended to protect the confidentiality, integrity and availability of information assets within an organisation. In recent times, there has been a significant trend in increasing cyber-attacks, ...
2.4GHz RF Front-end Module Based on 0.18μm CMOS Process
(2020-05-06)
With the increasing number of wireless communication applications, the demand for low-power and low-cost radio frequency (RF) wireless transceiver chips is increasing. Therefore, the idea of using complementary metal oxide ...
Antecedents of Continued Use Intention in the Era of Data Breaches: An Empirical Study of Pakistani Online Banking Users
(2020-04-14)
Data breaches are a rising threat to the banking sector in which the customer’s information is accessed by unauthorized persons leading to reduced trust and reputation. The reduction in trust and satisfaction may result ...
Path Planning of Autonomous Agricultural Vehicles
(2020-04-28)
Autonomy in the automotive industry is not a new concept. Advanced changes in technology have made it possible. With this trend, bringing autonomy to industrial agricultural fields in this era is also possible. With the ...
Security Assessment of LoRaWAN Based IoT Asset Tracking System
(2020-06-24)
Asset tracking solutions has a wide range of use including supply chain and logistics, and private property tracking. In the supply chain and logistics industry, asset tracking can increase savings, either it be monetary ...