scholarly journals User Access Management Based on Network Pricing for Social Network Applications

Sensors ◽  
2018 ◽  
Vol 18 (3) ◽  
pp. 664 ◽  
Author(s):  
Fuhong Lin ◽  
Zhibo Pang ◽  
Xingmin Ma ◽  
Qing Gu
2019 ◽  
Vol 14 (1) ◽  
pp. 15-34 ◽  
Author(s):  
Lorraine Lee ◽  
Rebecca Sawyer

ABSTRACT The verification of Information Technology (IT) controls is a core responsibility of IT auditors. This case places the student in the role of an IT auditor assigned to test the operating effectiveness of a specific IT general control: user access management. In addition to learning about IT controls, the case introduces several Excel functions such as VLOOKUP, MATCH, INDEX, and various text functions. The student documents the results of the IT controls tests by completing a testing matrix and writing a memo. General controls, user access management, and Excel applications are all topics taught in Accounting Information Systems (AIS) and Audit courses. As such, instructors can use this case at the undergraduate or graduate level in an IT Audit, Accounting Information Systems, or Audit class.


Author(s):  
Abhilash Srivastav ◽  
Alok Chauhan

Social network data analysis is an important problem due to proliferation of social network applications, amount of data these applications generate and potential of insight based on this big data. The objective of present work is to propose architecture for a semantic web application to facilitate meaningful social network data analytics as well as answering query about concerned ontology. Proposed technique links, on one hand, tools based on semantic technology provided by social network applications with data analytics tools and on the other hand extends this link to ontology authoring tools for further inference.   Results obtained from data analytics tool, results of query on generated ontology and benchmarking of the performance of data analytics tool are shown. It has been observed that a semantic web application utilizing above mentioned tools and technologies is more versatile and flexible and further improvements are possible by applying generic data mining algorithms to the above scenario.    


2013 ◽  
Vol 5 (2) ◽  
pp. 45-49
Author(s):  
Suha Hameed ◽  
Zahraa Muhsen ◽  
Salwa Alsamarai

2011 ◽  
Vol 3 (3) ◽  
pp. 14-30 ◽  
Author(s):  
Jakob Eg Larsen ◽  
Arkadiusz Stopczynski

This paper reports on the authors’ experiences with an exploratory prototype festival-wide social network. Unique 2D barcodes were applied to wristbands and mobile phones to uniquely identify the festival participants at the CO2PENHAGEN music festival in Denmark. The authors describe experiences from initial use of a set of social network applications involving participant profiles, a microblog and images shared on situated displays, and competitions created for the festival. The pilot study included 73 participants, each creating a unique profile. The novel approach had potential to enable anyone at the festival to participate in the festival-wide social network, as participants did not need any special hardware or mobile client application to be involved. The 2D barcodes was found to be a feasible low-cost approach for unique participant identification and social network interaction. Implications for the design of future systems of this nature are discussed.


2014 ◽  
Vol 2 (4) ◽  
pp. 422-435 ◽  
Author(s):  
Thuan Duong-Ba ◽  
Thinh Nguyen ◽  
Bella Bose ◽  
Duc A. Tran

Sign in / Sign up

Export Citation Format

Share Document