S. Ganesan, V. Muthuswamy, Ganapathy Sannasi, Kannan Arputharaj
{"title":"A Comprehensive Analysis of Congestion Control Models in Wireless Sensor Networks","authors":"S. Ganesan, V. Muthuswamy, Ganapathy Sannasi, Kannan Arputharaj","doi":"10.4018/ijsita.2018100102","DOIUrl":"https://doi.org/10.4018/ijsita.2018100102","url":null,"abstract":"Congestion control is an important factor for performance improvement in wireless sensor networks (WSNs). Congestion occurs due to various reasons including a variation in the data rate between incoming and outgoing links, buffer size, flooding attacks and multiple inputs and minimum output capability. Various outcomes of congestion in sensor networks include immense packet loss or packet drop, fast energy depletion, unfairness across the network, reduced node performance and increased delay in packet delivery. Hence, there is an extreme need to check channel congestion in order to enhance the performance with better congestion management. The job of choosing a suitable congestion control technique is a challenging task for the network designer. In this article, the authors traverse through the underlying conceptual ideas on congestion control schemes which come under six unique models. This article highlights a survey on the existing works done so far on congestion control domains in sensor networks. A comparative analysis based on Quality of Service parameters has been discussed.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131240905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Contextual Influencer User Measure to Improve the Accuracy of Recommender System","authors":"Maryam Jallouli, Sonia Lajmi, Ikram Amous","doi":"10.4018/ijsita.2018100103","DOIUrl":"https://doi.org/10.4018/ijsita.2018100103","url":null,"abstract":"In the last decade, social-based recommender systems have become the best way to resolve a user's cold start problem. In fact, it enriches the user's model by adding additional information provided from his social network. Most of those approaches are based on a collaborative filtering and compute similarities between the users. The authors' preliminary objective in this work is to propose an innovative context aware metric between users (called contextual influencer user). These new similarities are called C-COS, C-PCC and C-MSD, where C refers to the category. The contextual influencer user model is integrated into a social based recommendation system. The category of the items is considered as the most pertinent context element. The authors' proposal is implemented and tested within the food dataset. The experimentation proved that the contextual influencer user measure achieves 0.873, 0.874, and 0.882 in terms of Mean Absolute Error (MAE) corresponding to C-cos, C-pcc and C-msd, respectively. The experimental results showed that their model outperforms several existing methods.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115780444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sudhanshu Joshi, Manu Sharma, Satinder Kumar, M. Pant
{"title":"Co-Creation Among Small Scale Tourism Firm: Role of Information Communication and Technology in Productivity and Sustainability","authors":"Sudhanshu Joshi, Manu Sharma, Satinder Kumar, M. Pant","doi":"10.4018/ijsita.2018100101","DOIUrl":"https://doi.org/10.4018/ijsita.2018100101","url":null,"abstract":"ICT enabled tourism brings planners and actors into a common platform. Uttarakhand falls under the L4 (above average) category as per an e-readiness report and subsequently within the span of 5 years, it has climbed to level L3 after the infusion of web-based technologies. Tourism Firm's innovation is primarily based on following criteria: coexistence with existing competitors, cross-value chain income generating activities (IGA) along tourism, new products/processes developed in the past 2 years. An intensive literature review has been done, out of which three critical success factors were identified: (a) Internet usage; (b) firm's innovation and competitiveness; (c) income generating activities (IGA) by the firm. Together, these critical success factors (CSFs) express high cumulative variance. The study identifies co-innovation strategies among supply chain actors at the micro and small levels, which is based on cross-functional linkage between allied industries, and on internet use and IGAs. Validation has been done using an explorative study.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116412908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of Excessive Access Permissions and Insider Threat Opportunity in the Financial Industry: A Qualitative Study","authors":"Azucena Quispe","doi":"10.4018/IJSITA.2018070103","DOIUrl":"https://doi.org/10.4018/IJSITA.2018070103","url":null,"abstract":"The purpose of this qualitative, exploratory research study was to gain insights into the correlations between: (a) security threats related to the dangers of excessive access permissions in information systems (IS); and (b) the potential risk exposure to insider threat in the financial sector. The study examined the vulnerability risk to insider threats from the view of the possible connection to excessive access permissions which represent a gap in the literature. The central research question of the study was: What are the determinants that influence the applicability of internal security controls such as segregation of duties (SoD), the least privilege principle, the need-to-know concept and the relationship between access permissions and insider threat in IS? A sample of 15 financial sector professionals that included business users, IT personnel, and certified fraud examiners were interviewed to answer the central research question.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127105384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cell Phone Security: User Awareness of Security Issues and Mobile Device Management","authors":"Scott E. Mensch, LeAnn Wilkie","doi":"10.4018/IJSITA.2018070102","DOIUrl":"https://doi.org/10.4018/IJSITA.2018070102","url":null,"abstract":"People use smartphones for a variety of purposes. However, little is known about users' mobile security awareness. This study examines mobile security behaviors of college students. The study's findings conclude that college students, while technologically savvy, may not take appropriate measures to protect their personal data from hackers and thieves.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"60 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127582540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Corporate Social Responsibility for Sustainable Strategy","authors":"N. Baporikar","doi":"10.4018/IJSITA.2018070101","DOIUrl":"https://doi.org/10.4018/IJSITA.2018070101","url":null,"abstract":"Growing importance of CSR is making the industry, governments, policy makers and international associations seriously view the issue of corporate social responsibility (CSR) with an aim to link sustainability for the organizations, sector and economy. Hence, more and more of them are entering the arena of setting guidelines on reporting CSR initiatives. Banking is no exception. Through in-depth literature review and grounded theory approach, this article delves into the CSR initiatives by Bank Windhoek, and the multi-pronged approach adopted in developing sustainable strategy in its pursuit and endurance to be a frontrunner in the Namibian banking sector.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"1998 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123896715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Contribution of ICTs to Sustainable Urbanization and Health in Urban Areas in Cameroon","authors":"Adolphe Ayissi Etémé, J. M. Ngossaha","doi":"10.4018/IJSITA.2018070104","DOIUrl":"https://doi.org/10.4018/IJSITA.2018070104","url":null,"abstract":"The uncontrolled urbanization in African cities with inadequate access to urban domestic waste, housing and sanitation management services (DWHSMS) generates landscapes that become places of the spread of many pathologies leading to many public health problems. The city of Yaoundé (Cameroon) is not an exception in this situation which exposes an urban population to the most recurrent diseases. The situation become more complex in the fact that, the performance of the policies and the actions undertaken implied in developing countries, is not known in a precisely. The information sources are dispersed, old and not coordinated. ICT can, at the service of the great causes like the sustainable urbanization and/or environmental health, constitute the irreplaceable ones and essential decision-making tools. For this purpose, integrated and interoperable YUSIIP platform has proposed and deployed. The objective of this article is to present this Domestic platform and to show its contribution in (DWHSMS).","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115072851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Big Data and IoT-Allied Challenges Associated With Healthcare Applications in Smart and Automated Systems","authors":"Mamata Rath","doi":"10.4018/IJSITA.2018040102","DOIUrl":"https://doi.org/10.4018/IJSITA.2018040102","url":null,"abstract":"Most of the current smart applications are developed with basis on intelligent computing, most of which are implemented using big data analytics and much other advanced technology. With emerging technology, industrial and instructive improvements are causing greater changes in the lifestyle of people in smart cities and there is more chance of various health problems in urban areas. The way of life in metro urban areas with an expansive volume of people is similarly influenced by different applications and administration frameworks. In this way, the majority of the urban communities are transforming into smart urban areas by receiving mechanized frameworks in every conceivable segment. Therefore, there is more health-related issues and health hazard issues can be identified in urban areas. This article carries out a comprehensive survey of health care issues and improved solutions in automated systems using Big Data Analytics in smart cities integrated with IoT.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114971866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}