{"title":"Safeguarding the Information Systems in an Organization through Different Technologies, Policies, and Actions","authors":"H. Alkahtani","doi":"10.5539/CIS.V12N2P117","DOIUrl":"https://doi.org/10.5539/CIS.V12N2P117","url":null,"abstract":"Background: Information system use has substantially increased among the organization based on its effective integration of the resources and improved performance. The increasing reliance on the information system serves as a great security threat for the firms. Objective: The study intends to evaluate the security of the information system in the organization located in the region of Saudi Arabia, concerning the user’s awareness level. Methods: The quantitative design of the study is adopted which uses the survey approach. A close-ended questionnaire is used for evaluating the awareness level among the individuals. A total of 109 participants (males and females) in the Saudi Company were recruited for the study. Results: Despite the implementation of the policy, employees were unaware of it. The study highlights that the development of the firm’s information security policy requires the firm to make employees aware of the significance of the information security. Conclusion: The study concludes that the organization needs to educate the workforce of the information security policy and develop their necessary understanding of the information security system. This allows the employees to identify and report security threats and risks which helps in the improvement of information security awareness.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"253 1","pages":"117-125"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74998487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Opinion Spam Detection based on Annotation Extension and Neural Networks","authors":"Yuanchao Liu, B. Pang","doi":"10.5539/CIS.V12N2P87","DOIUrl":"https://doi.org/10.5539/CIS.V12N2P87","url":null,"abstract":"Online reviews play an increasingly important role in the purchase decisions of potential customers. Incidentally, driven by the desire to gain profit or publicity, spammers may be hired to write fake reviews and promote or demote the reputation of products or services. Correspondingly, opinion spam detection has attracted attention from both business and research communities in recent years. However, unlike other tasks such as news classification or blog classification, the existing review spam datasets are typically limited due to the expensiveness of human annotation, which may further affect detection performance even if excellent classifiers have been developed. We propose a novel approach in this paper to boost opinion spam detection performance by fully utilizing the existing labelled small-size dataset. We first design an annotation extension scheme that uses extra tree classifiers to train multiple estimators and then iteratively generate reliable labelled samples from unlabeled ones. Subsequently, we examine neural network scenarios on a newly extended dataset to learn the distributed representation. Experimental results suggest that the proposed approach has better generalization capability and improved performance than state-of-the-art methods.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"45 1","pages":"87-"},"PeriodicalIF":0.0,"publicationDate":"2019-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82812592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing a Web Credibility Evaluation Tool Using PROMETHEE Method","authors":"Mona Alghamdi, Khalid Alomar","doi":"10.5539/cis.v12n2p46","DOIUrl":"https://doi.org/10.5539/cis.v12n2p46","url":null,"abstract":"In recent years, the Internet has become an indispensable way for users to find information which is almost instantaneously available. However, the presence of information on different websites makes the user needs to pre-check the credibility of the selected websites. Most users find it difficult to assess website credibility in terms of its particular characteristics or factors. Accordingly, we proposed an automated evaluation tool which considers various factors to assess the credibility of different websites and rank them from the highest credibility score to the lowest in order to allow the user to select the most credible website. We used the Preference Ranking Organization Method for Enrichment Evaluations (PROMOTHEE). The latter is one of the Multi-Criteria Decision Making methods (MCDM). It combines pairwise comparison and outranking methods in order to give more accurate and superior credibility scores due to its enrichment evaluations. For the proposed tool to be acceptable, we carried out a correlation analysis to determine the coefficient of correlation between human judges and the proposed tool. We found the coefficient of correlation rho is 0.943 which indicates that there is a strong correlation between the human judges’ ranking and the ranking given by the proposed website evaluation tool.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"61 8","pages":"46-57"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91473335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Multi-User k-Means Clustering Based on Encrypted IoT Data","authors":"Yanling Li, Chuansheng Wang, Qi Wang, Jieling Dai, Yushan Zhao","doi":"10.5539/cis.v12n2p35","DOIUrl":"https://doi.org/10.5539/cis.v12n2p35","url":null,"abstract":"IoT technology collects information from a lot of clients, which may relate to personal privacy. To protect the privacy, the clients would like to encrypt the raw data with their own keys before uploading. However, to make use of the information, the data mining technology with cloud computing is used for the knowledge discovery. Hence, it is an emergent issue of how to effectively performing data mining algorithm on the encrypted data. In this paper, we present a k-means clustering scheme with multi-user based on the IoT data. Although, there are many privacy-preserving k-means clustering protocols, they rarely focus on the situation of encrypting with different public keys. Besides, the existing works are inefficient and impractical. The scheme we propose in this paper not only solves the problem of evaluation on the encrypted data under different public keys but also improves the efficiency of the algorithm. It is semantic security under the semi-honest model according to our theoretical analysis. At last, we evaluate the experiment based on a real dataset, and comparing with previous works, the result shows that our scheme is more efficient and practical.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"19 1","pages":"35-45"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75591323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Portrait Extraction Algorithm Based on Face Detection and Image Segmentation","authors":"Chongyi Yang, Wanyu Huang, Ruoqi Zhang, Rui Kong","doi":"10.5539/cis.v12n2p1","DOIUrl":"https://doi.org/10.5539/cis.v12n2p1","url":null,"abstract":"Aiming to solve a series of problems in photo collection over citizen’s license, this paper proposes Portrait Extraction Algorithm over our face based on facial detection technology and state-of-the-art image segmentation algorithm. Considering an input image where the foreground stands a man with unfixed size and its background is all sorts of complicated background, firstly we use Haar&Adaboost facial detection algorithm as a preprocessing method so as to divide the image into different sub-systems, and we get a fix-sized image of human face. Then we use GrabCut and closed-form algorithm to segment the preprocessed image and output an image which satisfies our requirements (i.e. the fixed size and fixed background). Up to now the GrabCut and closed-form algorithm has been realized, both of which have its own advantages and shortages.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"117 1","pages":"1-13"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79395057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Channel Digital Oscilloscope Implementation over Android Device","authors":"Chongyi Yang, Chanpin Chen, Zhenhao Wu, Jiashun Jiang, Sicheng Su, Xue Kang, Qingping Dou","doi":"10.5539/cis.v12n2p58","DOIUrl":"https://doi.org/10.5539/cis.v12n2p58","url":null,"abstract":"Signal monitoring and waveform analysis play a significant role in state-of-the-art signal processing and electronic measurement. Traditional oscilloscopes tend to be heavy and huge, which makes it impossible for outdoor signal measurement. In addition, most of those oscilloscopes can measure merely two signals simultaneously. This article proposes the design of multi-channel digital oscilloscope over common Android mobile device. In our system we use STM32 development board to implement up to eight input channels, data processing and wireless transmission. In addition, an Android application is designed for Wi-Fi data reception, respective waveform demonstration and derivation of each signal’s amplitude and frequency. In order to transmit up to eight digital signals simultaneously as fast as possible, we designed an algorithm where all signals’ data can be transmitted within a surprisingly small amount of wireless data. In our system test, wireless data transmission is implemented and each waveform can be recovered and demonstrated basically.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"17 1","pages":"58-70"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87090760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ant Colony Optimization (ACO) Based MANET Routing Protocols: A Comprehensive Review","authors":"A. Habboush","doi":"10.5539/cis.v12n1p82","DOIUrl":"https://doi.org/10.5539/cis.v12n1p82","url":null,"abstract":"Application of mobile ad hoc networks (MANETs) has gained significant popularity among researchers in the field of data communication networks. However, a MANET operating in a wireless environment imposes a number of challenges for the implementers so far as routing of packets across it is concerned. There is a wide range of research contributions are available in the literature wherein authors propose various solutions to overcome the problems and bottleneck related to routing in MANET. Especially soft computing techniques and Ant Colony Optimization (ACO) in particular has been significantly popular among the researchers to resolve MANET routing issues. This technique plays a vital role in route discovery in particular. In this paper, we have conducted a comprehensive review of this technique applied to routing in MANET with respect to various criteria. Hopefully this paper serves to a perfect document for researchers in this field.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"65 1","pages":"82-92"},"PeriodicalIF":0.0,"publicationDate":"2019-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78587355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Stage Image Restoration in High Noise and Blur Settings","authors":"S. Voronin","doi":"10.5539/cis.v12n1p72","DOIUrl":"https://doi.org/10.5539/cis.v12n1p72","url":null,"abstract":"We describe a simple approach useful for improving noisy, blurred images. Our approach is based on the use of a parallel block-based low rank factorization technique for projection based reduction of matrix dimensions and on a customized iteratively reweighted CG approach followed by the use of a Fourier Wiener filter. The regularization scheme with a transform basis offers variable residual penalty and increased per-iteration performance. The outlined approach is particularly aimed at high blur and noise settings.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"76 2 1","pages":"72-81"},"PeriodicalIF":0.0,"publicationDate":"2019-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89711085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applicability Analysis of Semi-Network Operating System","authors":"Yin Sheng Zhang","doi":"10.5539/cis.v12n1p93","DOIUrl":"https://doi.org/10.5539/cis.v12n1p93","url":null,"abstract":"Innovation of computing technology is either to improve the security and performance, or to improve the convenience of user operation of system, networking and device, but sometimes it’s hard to get a very good balance between the two, in particular, the traditional localized OS and computing devices are inherently incompatible in some respects with today's network environment, therefore, although many innovations help to improve the safety, autonomy and controllability of system and device, but they are still always lacking the trustworthiness of users, one of the reasons is that their performance is lower than user's expectation, but their operation become more complicated than before. \u0000 \u0000The semi-network operating system is designed according to user's actual experience, which not only utilizes the shared attributes of network to increase the flexibility of OS, but also utilizes the stability and user-autonomy attributes of local platform ensure the base functions of OS, in addition, it can greatly reduce the burden on user’s operation and maintenance of computing system, so which will be a trustworthy system architecture for users.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"60 1","pages":"93-97"},"PeriodicalIF":0.0,"publicationDate":"2019-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84471178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ikram Dehmouch, B. E. Asri, Maryem Rhanoui, Mina Elmaallam
{"title":"Feature Models Preconfiguration Based on User Profiling","authors":"Ikram Dehmouch, B. E. Asri, Maryem Rhanoui, Mina Elmaallam","doi":"10.5539/cis.v12n1p59","DOIUrl":"https://doi.org/10.5539/cis.v12n1p59","url":null,"abstract":"Feature modeling is used to express commonality and variability among a family of software products called the software product line. To offer customized products to their customers, organizations need to build packages of features taking into consideration customer needs and preferences. This paper presents a platform named SPLP (Software Product Line Profiling) which allows pre-configuring feature models through the restriction of the configuration space to meet the requirements of a specific market segment. Considering that concerns and preferences of this latter are a key criteria to achieve a tailored pre-configuration, authors propose the integration of user profiling in the SPLP platform through the definition of a user profile model describing information about the user and the products he is used to consume. This information is then exploited by the SPLP platform to perform an automated pre-configuration according to each user profile requirements and preferences.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"31 1","pages":"59-71"},"PeriodicalIF":0.0,"publicationDate":"2019-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81371031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}