Now showing items 1-5 of 5
A Security Evaluation Framework for U.K. E-Goverment Services Agile Software Development
This study examines the traditional approach to software development within the United Kingdom Government and the accreditation process. Initially we look at the Waterfall methodology that has been ...
Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Activities
(EAI Transactions on Secutiry and Safety, 2015-11-28)
Online shopping and banking institutes are a current trend in e-commerce, where online shopping and banking are frequently used over the Internet. With the fast growth of the technology and on-line practices, criminal ...
On Data Leakage from Non-production Systems
This study is an exploration of areas pertaining to the use of production data in non-production environments. During the software development lifecycle, non-production environments are used to serve various purposes to ...
A Framework for Minimising Data Leakage from Non-Production Systems
(Chapman and Hall, 2017-03-03)
There is much research and advice around de-identification techniques and data governance. This brings together the practical aspects to propose a simplified business model and framework for informed decision making for ...
Personalized Students' Profile Based on Ontology and Rule-based Reasoning
(ICST Transactions, 2016)
Nowadays, most of the existing e-learning architecture provides the same content to all learners due to "one size fits for all" concept. E-learning refers to the utilization of electronic innovations to convey and encourage ...