Welcome to Guest !
 
       IUP Publications
              (Since 1994)
Home About IUP Journals Books Archives Publication Ethics
     
  Subscriber Services   |   Feedback   |   Subscription Form
 
 
 
Login:
- - - - - - - - - - - - - - - - - -- - - - - - - - - - - -
-
   
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
The IUP Journal of Information Technology
Focus

Unprecedented use of computer and communication network in our private and professional life gives rise to fraud and malevolence in various forms. These offences may range from simple nuisances aiming at creating chaos and embarrassment to cyber crimes and deadly attacks on critical computing assets. Although security threats are inevitable due to systemic flaws, security failures and casual practices, organizations need to reinforce their security capabilities to remain safe in a borderless and increasingly complex digital world. In the past decades, technical means to counter these security attacks have grown tremendously. Cryptography plays a vital role in designing countermeasures to many of the security attacks. It is widely used for secure data transmission or entity authentication over computer and communication networks. Cryptographic techniques use cryptographic keys that need to be managed and protected effectively such that sensitive information is transmitted securely across the digital networks. The paper, “An Improved Efficient Fault-Tolerant Group Key Agreement Protocol”, by Indu Bala Thingom and Bubu Bhuyan, presents a key management scheme which is resistant to different key and message tampering attacks. The proposal, which is an improvement on an earlier work found elsewhere, claims to be more efficient in terms of computational cost.

Computing technology has undergone a significant evolution over the past decades. Storage devices are becoming smaller and have higher capacities. Processors are becoming very small and more powerful making computing devices tiny. Computing pervades every sphere of life and is available anytime anywhere. It is increasingly destined to serve our on-the-go lifestyle. Further, the shift from server and software to service-based thinking has changed the way computing technology and applications are designed and delivered, thanks to ‘cloud computing’. The development of cloud computing service models promise to offer computing technology more efficiently with affordable cost than ever before transforming the way organizations use it traditionally. However, these advances have created new security challenges, including issues whose full impact is still emerging. The paper, “Binary CD&M Encryption Algorithm for Enhancing Security in Cloud”, by Arshia S Mohammadi and Divya Binish, proposes a new symmetric encryption algorithm. The authors assert that the algorithm is simple, cost-effective and best suitable for data security when size of data is small.

The method of biometric system is preferred over traditional passwords and PIN methods due to several reasons. It is becoming widespread as it uses unique physiological characteristics to identify or authenticate the identity of an individual. Multimodal biometric system is one that utilizes more than one physiological or behavioral characteristic for identification and authentication. It takes the advantages of capabilities of each biometric technology while overcoming the limitations of a single technology. The use of sophisticated multimodal biometric system by border control agencies worldwide is now common due to increasing terrorist activities. It provides more reliable, accurate and fast identification of citizens and foreign travelers. There is a great potential of multimodal biometric products in the coming years.

The paper, “Genetic Algorithm-Based Bacterial Foraging Optimization Watermarking Model for Fingerprint and Palmprint Multimodal Biometric System”, by S Anu H Nair and P Aruna, presents a novel approach for creating a multimodal biometric system. It uses a fusion mechanism and the Genetic Algorithm-Based Bacterial Foraging Optimization Algorithm (GA-Based BFOA) for watermarking of images. According to the authors, the hybrid approach provides better results and survives all attacks on the system.

According to statistics, nearly one in four people worldwide use social network, which translates to around 1.8 billion users. This figure will reach 2.5 billion by 2017 as forecasted elsewhere. The growth of social network audiences in emerging markets of Asia-Pacific, Middle East and Africa will be huge, making Asia-Pacific the home to the largest social network population worldwide through 2017. Facebook, Twitter, Google and Instagram are the top social networks, on which people of different age groups spend most of their time. Consequently, businesses and marketers love social media. There has been considerable growth in digital journalism on the Internet. However, the rapid growth of social media will revolutionize digital journalism as the reachability of social media is unprecedented. The paper, “Social Media as a New Trend in Sri Lankan Digital Journalism: A Study”, by S Thuseethan and S Vasanthapriyan, presents a study that explores the new trend in digital journalism. It tries to understand the effectiveness of social media as news media with the explosive growth of social media users.

E-commerce provides new channels for businesses and individuals for buying and selling. It is growing and will continue to grow in size and technical sophistication. Mobile agents are software entities which represent buyers and sellers who move from one marketplace to another on the Internet. Mobile agent technology is very promising for e-commerce applications and will revolutionize the way we buy and sell. However, the technology comes with associated security issues. The paper, “A Review of Security Issues in Mobile Agent-Based E-Commerce”, by Ananta Charan Ojha, provides a lucid review of this subject. It presents a categorization of security issues, analyzes requirements for security and presents the available countermeasures for mobile agents-based e-commerce.

Finally, the paper, “A Comparative Study of Histogram Shifting, Reversible Contrast Mapping and Difference Expansion Methods”, by Navnath S Narawade and Rajendra D Kanphade, presents a comparative study of three different algorithms for reversible watermarking and finds their suitability for different categories of images.

-- A C Ojha
Consulting Editor

<< Back
Search
 

  www
  IUP

Search
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Click here to upload your Article

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Automated Teller Machines (ATMs): The Changing Face of Banking in India

Bank Management
Information and communication technology has changed the way in which banks provide services to its customers. These days the customers are able to perform their routine banking transactions without even entering the bank premises. ATM is one such development in recent years, which provides remote banking services all over the world, including India. This paper analyzes the development of this self-service banking in India based on the secondary data.

The Information and Communication Technology (ICT) is playing a very important role in the progress and advancement in almost all walks of life. The deregulated environment has provided an opportunity to restructure the means and methods of delivery of services in many areas, including the banking sector. The ICT has been a focused issue in the past two decades in Indian banking. In fact, ICTs are enabling the banks to change the way in which they are functioning. Improved customer service has become very important for the very survival and growth of banking sector in the reforms era. The technological advancements, deregulations, and intense competition due to the entry of private sector and foreign banks have altered the face of banking from one of mere intermediation to one of provider of quick, efficient and customer-friendly services. With the introduction and adoption of ICT in the banking sector, the customers are fast moving away from the traditional branch banking system to the convenient and comfort of virtual banking. The most important virtual banking services are phone banking, mobile banking, Internet banking and ATM banking. These electronic channels have enhanced the delivery of banking services accurately and efficiently to the customers. The ATMs are an important part of a bank’s alternative channel to reach the customers, to showcase products and services and to create brand awareness. This is reflected in the increase in the number of ATMs all over the world. ATM is one of the most widely used remote banking services all over the world, including India. This paper analyzes the growth of ATMs of different bank groups in India.
International Scenario

If ATMs are largely available over geographically dispersed areas, the benefit from using an ATM will increase as customers will be able to access their bank accounts from any geographic location. This would imply that the value of an ATM network increases with the number of available ATM locations, and the value of a bank network to a customer will be determined in part by the final network size of the banking system. The statistical information on the growth of branches and ATM network in select countries.

Indian Scenario

The financial services industry in India has witnessed a phenomenal growth, diversification and specialization since the initiation of financial sector reforms in 1991. Greater customer orientation is the only way to retain customer loyalty and withstand competition in the liberalized world. In a market-driven strategy of development, customer preference is of paramount importance in any economy. Gone are the days when customers used to come to the doorsteps of banks. Now the banks are required to chase the customers; only those banks which are customercentric and extremely focused on the needs of their clients can succeed in their business today.

more...

 
View Previous Issues
Information Technology