Online vendors' strategies for reaching the end‐user: DATA‐STAR

Online Review ◽  
1992 ◽  
Vol 16 (5) ◽  
pp. 323-330
Author(s):  
Richard Poynder
Keyword(s):  
End User ◽  
2011 ◽  
Vol 52-54 ◽  
pp. 713-716
Author(s):  
Xiao Ying Gan ◽  
Bin Liu

Based on the TNC architecture, using a trusted network of repair techniques in the trusted network access scenario does not meet the requirements of integrity verification solution for end users. Put forward a credible fix the overall network design, reliable model restoration and repair services, network workflow. The system is in need of restoration to provide safe and reliable repair end-user data transmission, providing a humane, reasonable repair services to ensure the credibility of fixed network and the isolation effect of the terminal to be repaired and strengthened the security of fixed server. Realized the classification of various types of repair resources management, restoration of resources in ensuring the transfer of fast, reliable, based on the performance with a certain extension.


Author(s):  
Hourieh Khalajzadeh ◽  
Mohamed Abdelrazek ◽  
John Grundy ◽  
John G. Hosking ◽  
Qiang He

Author(s):  
Kashif Ali Dahri ◽  
Muhammad Saleem Vighio ◽  
Baqar Ali Zardari

The Internet is not safe anymore, malware can be discovered anywhere on the Internet. The risk of malware has increased also due to the increasing popularity and use of Smartphones and their underlying cost-free applications. With its great market share, the Android operating system has become a prime target for malware developers. When an Android phone is injected with a malware, it may result in compromising the privacy of the user by stealing sensitive and private information like contacts, ids, passwords, photos, call records, and so on. Compared to any other Android-based application category, games are the most preferred zone for attackers, due to the high interest of users in game applications. When an end user downloads a game, which is injected with malicious code, user data is infected without bringing in the knowledge of the user. Though, there still are not sufficient protection mechanisms or guidelines stated for end user against Android malware, this study offers a novel approach to detect Android malware in order to ensure the safe usage of Android applications. The advantage of this approach is its ability to utilize Android manifest files for the detection of malware. The availability of manifest file in every Android application makes this approach applicable to all Android applications. It can also be considered as a lightweight method for malware detection, and its efficiency is experimentally confirmed by testing and comparing the results of 50 Android games samples. Experiments are carried out using the Android Package Kit (APK) tools, and based on the experiments, different kinds of malware identification and prevention guidelines have been proposed for the safe and secure usage of the Android operating system.


Author(s):  
Akashdeep Bhardwaj

With more and more organizations working on the cloud over unsecure internet, sharing files and emails and saving them on cloud storage imperative. Securing the end user sensitive data in transit has thus started to get maximum priority to protect it from Cloud company staff, hackers and data thieves. In this study, an attempt is made to review the research of end user data security. There is an urgent need for solutions for end users' data protection, privacy and during the times when migrating from one Cloud service provider to other. This chapter identifies end user data challenges and issues on cloud and presents use of Public Key Cryptography, Multi Factor Authentication and use of Cloud Aware applications as possible solutions.


2018 ◽  
Vol 10 (10) ◽  
pp. 98
Author(s):  
Prakash Hardaha ◽  
Shailendra Singh

Due to the exponential growth of the data and its services, visiting multiple webs/apps by a user raises three issues—(1) consumption of extra bytes; (2) time killing process of surfing inside the webs/apps; (3) tedious task of remembering address of webs/apps with their credentials. The data mashup is a set of techniques and user-friendly approaches which not only resolves above issues but also allows ordinary user to fetch required data from multiple disparate data sources and to create the integrated view in his defined digital place. In this paper, we have proposed an extension of existing REST protocol called Structured Data REST (SDRest) protocol and user-friendly novel approach which allows even ordinary users to develop end to end data mashup, using the innovative concept of Structured Data Mashup Box (SDMB) and One Time Configuration (OTC)-Any Time Access (ATA) models. Our implementation shows that pre-mashup configuration can easily be performed by an ordinary user and an integrated user interface view of end user data mashup can be created without any technical knowledge or programming. We have also evaluated the proposed work by comparing it with some of the related works and found that the proposed work has developed user friendly configurable approach using the current state of the art techniques to involve not only the ordinary user but also the mashup service provider and the data service provider to develop public, private and hybrid data mashup.


Author(s):  
Hourieh Khalajzadeh ◽  
Mohamed Abdelrazek ◽  
John Grundy ◽  
John Hosking ◽  
Qiang He

2016 ◽  
Vol 6 (27) ◽  
pp. 222-229
Author(s):  
Akashdeep Bhardwaj ◽  
GVB Subramanyam ◽  
Vinay Avasthi ◽  
Hanumat Sastry

2017 ◽  
Vol 14 (1) ◽  
pp. 14-29
Author(s):  
Kelli C.A.S. Smythe ◽  
Carla Galvão Spinillo

Este artigo apresenta a avaliação de métodos e técnicas para coleta de dados cognitivos espaciais dos usuários, aplicáveis em sistemas de wayfinding para ambientes hospitalares. A partir de uma revisão de literatura, 25 métodos/técnicas foram avaliados por 45 profissionais (designers e arquitetos) através de questionário online. A análise quanti/qualitativa possibilitou a identificação das práticas profissionais bem como de métodos e técnicas que com potencial aplicabilidade na coleta de dados dos usuários, na fase inicial do processo de design. Deste modo este trabalho objetivou trazer contribuições metodológicas para o incremento dos sistemas de wayfinding, beneficiando tanto desenvolvedores como o usuário final da informação. This paper presents a methods and techniques evaluation for spatial cognitive data collect of users applicable in wayfinding systems for healthcare. From a literature review, 25 methods/techniques were evaluated by 45 professionals (designers and architects) through an online questionnaire. A quantitative and qualitative analysis allowed to identify professionals practices as well as methods and techniques potentially aplicable with user data collect, in the initial phase of design process. This article aimed to provide methodological contributions to the increment of the wayfinding systems, benefiting both developers and the information end user.


2017 ◽  
Vol 898 ◽  
pp. 052034 ◽  
Author(s):  
M Fischer ◽  
C Heidecker ◽  
E Kuehn ◽  
G Quast ◽  
M Giffels ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document