Welcome to Guest !
 
       IUP Publications
              (Since 1994)
Home About IUP Journals Books Archives Publication Ethics
     
  Subscriber Services   |   Feedback   |   Subscription Form
 
 
Login:
- - - - - - - - - - - - - - - - - -- - - - - - - - - - - -
-
   
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
The IUP Journal of Information Technology

Sep'13
Focus

Classification is a fundamental data mining technique used to predict group membership for data instances. Conventional classifiers such as decision tree,

Articles
   
Price
(INR)
Buy
Preventing Phishing Attacks with Virtual Browser Extension
Worm Attack Detection in Network-Based System
Algorithm for Performance Improvement of DRTS Under Static Load Sharing Scheme
Social Web: A Snapshot of Issues in the New Dimension of FIRO-B
Digital Innovation in Design Practices: Technologies, Opportunities and Challenges
Select/Remove All    

Preventing Phishing Attacks with Virtual Browser Extension

-- Swapan Purkait

The scale of phishing problems has necessitated a response to help protect vulnerable users. As a consequence, anti-phishing and wider identity protection features are a commonplace within both web browsers and Internet security suites. A huge number of phishing defences are available. These solutions range from quick fix changes to more substantial redesigns. With all these counter measures readily available, researchers have found that many users cannot distinguish a legitimate website from a spoofed website; they have also found that browser security indicators are misunderstood or ignored frequently, and many users have never even noticed them. In this study, we propose Virtual Browser Extension (VBEx), a web browser plugin, which works on binary principle of legitimate or phishing and provides a trusted path between browser and the legitimate website. Unlike others, it does not provide any user interface to accept any wrong certificate or allow user to bypass the tool. It allows only a legitimate site to open and prevents all others from loading on the web browser. Our new solution checks for the authoritative name server and verifies the same for a visiting website. It also maintains a white list of websites so that when a user requires to access any of these, the default protocol should always be HTTPS, failing which it will prevent the web browser from loading the requested website. We conducted a series of laboratory tests on the VBEx prototype and found that the VBEx is a promising approach.

Worm Attack Detection in Network-Based System

--Ogwueleka Francisca Nonyelum

Organizations, business enterprise, government agencies and institutions depend on computer network to carry out routine activities because computer network provides a flexible, convenient and cost-effective way of storing, sharing, retrieving and transferring information. As these routine activities are carried out on the network, one great threat to these information assets is that of computer worm attacks. Traditionally, detection method involves the use of firewall, but despite that, computer worms still finds a way to evade them because of several weaknesses that exist in firewalls. In this research, the detection method considered is the use of Intrusion Detection System (IDS) behind routers and firewalls. This paper proposes an IDS that incorporates the signature-based and anomaly-based detection scheme that functions as an independent IDS to form a hybrid signature-based-anomaly-based detection system. The hybrid system improved the effectiveness and reliability of computer worm detection by a very great extent and thus it should be used at strategic locations on the network to provide a distributed solution with a defence-in-depth network security architecture.

Algorithm for Performance Improvement of DRTS Under Static Load Sharing Scheme

--Urmani Kaushal, Avanish Kumar and Narendra Kumar

The performance of parallel applications is fundamentally dependent on the agreement of the task execution on processors available in Distributed Real Time System (DRTS). For such type of large and multifaceted real-time parallel applications, DRTS is one of the best platforms for execution. The parallel application is divided into multiple tasks which is to be executed over the nodes available in DRTS. These tasks have to be processed in relatively short periods of time, or the computation in real-time fashion is required. Using efficient load sharing and clustering policy can improve the performance of the system. The task allocation algorithm, which is NP-hard in complexity, must minimize the inter-task communication which can be achieved by clustering, and on the other hand, the clusters must be allocated on the appropriate node in DRTS. The algorithm proposed in this paper has used static load sharing policy and an effective clustering mechanism. The proposed algorithm was illustrated using a practical example and simulated in MATLAB 7.11.0.

Social Web: A Snapshot of Issues in the New Dimension of FIRO-B

--Ramana Rao M V, Yuva Raju Macha, P Usha Gayatri,
Chandra Sekharaiah K, K S Niraja and T Arundhathi

The paper gives a snapshot of the kind of issues that mold the making up of the social media on the web. Five issues are brought out based on the literature survey. One, young people are very conscious and strategic in their visual self-presentation on Social Networking Sites (SNSs) with regard to building their profiles. The ‘ideal self’ or the ‘ought self’ guides the SNS users to present and make up their profiles in SNSs by photo selection for visual impression management. Two, singles present more photos of themselves and display higher numbers of friends, more group memberships and more wall postings on their SNS online profiles than persons who are in a relationship. Popular serves as an indicator of social attraction. Three, privacy concerns of the SNS users are increasingly becoming sensitive as a majority of users change the default privacy settings into more restrictive settings. Four, average Internet usage time is rapidly increasing, the starting age of Internet user is steadily decreasing. Parents, psychologists, educators, technology creators and lawmakers must become aware of the potential risks and rewards of this phenomenon. Five, cyberbullying is another undesirable phenomenon in SNSs. There could be many other issues. But for a basic study of the trends with reference to social networking websites, we have considered a snapshot of five issues only within the framework and scope of our study of the existing literature. Fundamental Interpersonal Relations Orientation Behavior (FIRO-B) value computation with reference to web-based interpersonal relations is found as an open area having potential for researchers. We conclude that existing literature failed to come up with revised FIRO-B scale in the context of SNSs. Hence, our future research work will be in this direction.

Digital Innovation in Design Practices: Technologies, Opportunities and Challenges

--Runddy D Ramilo

Architectural practices are currently facing technological advancement with consequential technological and organizational challenges. They are embracing new modes of information sharing, adopting new technology and new digital processes such as Building Information Modeling (BIM), parametric design, digital collaboration, building performance simulation and other related technologies. With this recurrence, collaboration in research and architecture practices is increasing through which digital technology, building technology and computer science are collaborated. However, issues relating to the process management, specifically on the organization aspects are less examined and often taken for granted. Organization is a key essential element in digital innovation processes, but a majority of architects do not pay much attention to it. The success of digital innovation does not depend only on the knowledge of new digital technology, but it is also influenced by the knowledge of implementation processes. To unearth this problem, the paper investigates the factors that impede the effective adoption of emerging digital technologies for the efficient delivery of design projects that are computationally and digitally driven. This involves evaluating technical, financial and organizational barriers when digital innovation is implemented. In order to gain insights into these issues, a research was conducted based on literature and the relevant attributes and pattern of variables were found. They are grouped into three categories and can be used in establishing a framework for digital innovation.

Search
 

  www
  IUP

Search
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Click here to upload your Article

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Automated Teller Machines (ATMs): The Changing Face of Banking in India

Bank Management
Information and communication technology has changed the way in which banks provide services to its customers. These days the customers are able to perform their routine banking transactions without even entering the bank premises. ATM is one such development in recent years, which provides remote banking services all over the world, including India. This paper analyzes the development of this self-service banking in India based on the secondary data.

The Information and Communication Technology (ICT) is playing a very important role in the progress and advancement in almost all walks of life. The deregulated environment has provided an opportunity to restructure the means and methods of delivery of services in many areas, including the banking sector. The ICT has been a focused issue in the past two decades in Indian banking. In fact, ICTs are enabling the banks to change the way in which they are functioning. Improved customer service has become very important for the very survival and growth of banking sector in the reforms era. The technological advancements, deregulations, and intense competition due to the entry of private sector and foreign banks have altered the face of banking from one of mere intermediation to one of provider of quick, efficient and customer-friendly services. With the introduction and adoption of ICT in the banking sector, the customers are fast moving away from the traditional branch banking system to the convenient and comfort of virtual banking. The most important virtual banking services are phone banking, mobile banking, Internet banking and ATM banking. These electronic channels have enhanced the delivery of banking services accurately and efficiently to the customers. The ATMs are an important part of a bank’s alternative channel to reach the customers, to showcase products and services and to create brand awareness. This is reflected in the increase in the number of ATMs all over the world. ATM is one of the most widely used remote banking services all over the world, including India. This paper analyzes the growth of ATMs of different bank groups in India.
International Scenario

If ATMs are largely available over geographically dispersed areas, the benefit from using an ATM will increase as customers will be able to access their bank accounts from any geographic location. This would imply that the value of an ATM network increases with the number of available ATM locations, and the value of a bank network to a customer will be determined in part by the final network size of the banking system. The statistical information on the growth of branches and ATM network in select countries.

Indian Scenario

The financial services industry in India has witnessed a phenomenal growth, diversification and specialization since the initiation of financial sector reforms in 1991. Greater customer orientation is the only way to retain customer loyalty and withstand competition in the liberalized world. In a market-driven strategy of development, customer preference is of paramount importance in any economy. Gone are the days when customers used to come to the doorsteps of banks. Now the banks are required to chase the customers; only those banks which are customercentric and extremely focused on the needs of their clients can succeed in their business today.

more...

 
View Previous Issues
Information Technology