Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2007

Journal

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 64

Full-Text Articles in Computer Engineering

Sold Downstream: Free Speech, Fair Use, And Anti-Circumvention Law, R. Terry Parker Dec 2007

Sold Downstream: Free Speech, Fair Use, And Anti-Circumvention Law, R. Terry Parker

The University of New Hampshire Law Review

[Excerpt] “Here’s a hypo. Living in Asia, I purchased a shameful amount of music and movies, all legit purchases through reputable stores, HMV and Tower Records, but little of which will get reissued. I wanted to preserve my collection but software in the discs prevented me from ripping backup copies to my computer. Lacking the technological savvy to get around this software myself, I purchased and used a product to help me circumvent these controls. Discuss.

Courts agree that copying the music and movies here is infringement but that fair use may provide a defense. However, courts do not agree …


Analysis Of Three Phase Controlled Rectifier With The Same Distance Control As Compared To The Same Angle Control, Sudirman S., Sri Kurniati A. Nov 2007

Analysis Of Three Phase Controlled Rectifier With The Same Distance Control As Compared To The Same Angle Control, Sudirman S., Sri Kurniati A.

Makara Journal of Technology

Analysis of three phase controlled rectifier with the same distance control as compared to the same angle control. This research aim to compare the firing of the same distance and the same angle control at three phase controlled rectifier with seen generated harmonic at input (AC side). Then calculate of rectifier efficiency and power factor comparison from both the control type. The rectifier use passive filter with resistance 11 ohm and is analysed with program simulation using PSPICE version 7.1. Result of research indicate that use of the same distance control generates the 5th and 7th harmonics, while the same …


Limiting Maximum Drag Reduction Asymptote For The Moment Coefficient Of An Enclosed Rotating Disk With Fine Spiral Grooves, Budiarso Budiarso, Keizo Watanabe, Satoshi Ogata Nov 2007

Limiting Maximum Drag Reduction Asymptote For The Moment Coefficient Of An Enclosed Rotating Disk With Fine Spiral Grooves, Budiarso Budiarso, Keizo Watanabe, Satoshi Ogata

Makara Journal of Technology

In this study, the limiting maximum drag reduction asymptote for the moment coefficient of an enclosed rotating disk with fine spiral grooves in turbulent flow region were obtained analytically. Analysis which were based on an assumption for a simple parabolic velocity distribution of turbulent pipe flow to represent relative tangential velocity, was carried out using momentum integral equations of the boundary layer. For a certain K- parameter the moment coefficient results agree well with experimental results for maximum drag reduction in an enclosed rotating disk with fine spiral grooves and drag reduction ratio approximately was 15 %. Additionally, the experimental …


Reverse Link Cdma System Capacity Evaluation For Stratospheric Platform Mobile Communications, Iskandar Iskandar Nov 2007

Reverse Link Cdma System Capacity Evaluation For Stratospheric Platform Mobile Communications, Iskandar Iskandar

Makara Journal of Technology

We propose an analysis of reverse link CDMA multispot beam stratospheric platforms (SPF) in this paper. The SPF is currently proposed as a novel wireless technology for the development of the next generation fixed and mobile communications. The geometry of this technology is different from that of the terrestrial but rather similar to the satellite based cellular system. However, evaluation on the CDMA system capacity of this technology has not been much reported. This paper addresses all possible multiple access interference analyses including the effects of channel fading and shadowing in order to evaluate the system capacity. Single SPF and …


Trajectory Shaping Of Surface-To-Surface Missile With Terminal Impact Angle Constraint, S. Subchan Nov 2007

Trajectory Shaping Of Surface-To-Surface Missile With Terminal Impact Angle Constraint, S. Subchan

Makara Journal of Technology

This paper presents trajectory shaping of a surface-to-surface missile attacking a fixed with terminal impact angle constraint. The missile must hit the target from above, subject to the missile dynamics and path constraints. The problem is reinterpreted using optimal control theory resulting in the formulation of minimum integrated altitude. The formulation entails nonlinear, two-dimensional missile flight dynamics, boundary conditions and path constraints. The generic shape of optimal trajectory is: level flight, climbing, diving; this combination of the three flight phases is called the bunt manoeuvre. The numerical solution of optimal control problem is solved by a direct collocation method. The …


Effect Of Contact Time On Interface Reaction Between Aluminum Silicon (7% And 11%) Alloy And Steel Dies Skd 61, Bambang Suharno, Neni Octapiani Nurhayati, Bustanul Arifin, Sri Harjanto Nov 2007

Effect Of Contact Time On Interface Reaction Between Aluminum Silicon (7% And 11%) Alloy And Steel Dies Skd 61, Bambang Suharno, Neni Octapiani Nurhayati, Bustanul Arifin, Sri Harjanto

Makara Journal of Technology

Effect of Contact Time on Interface Reaction between Aluminum Silicon (7% and 11%) Alloy and Steel Dies SKD 61. Die soldering (die sticking) is a defect of metal casting in which molten metal “welds” to the metallic die mold surface during casting process. Die soldering is the result of an interface reaction between the molten aluminum and the die material. Aluminum alloy with 7 and 11% silicon and SKD 61 die steel are the most common melt and die material used in aluminum die casting. This research is done to study the morphology and the characteristics of the formed AlxFeySiz …


Co2 Absorption From Its Mixture With Ch4 Or N2 Through Hollow Fiber Membrane Contactor Using Water As Solvent, Sutrasno Kartohardjono, Anggara Anggara, Subihi Subihi, Yuliusman Yuliusman Nov 2007

Co2 Absorption From Its Mixture With Ch4 Or N2 Through Hollow Fiber Membrane Contactor Using Water As Solvent, Sutrasno Kartohardjono, Anggara Anggara, Subihi Subihi, Yuliusman Yuliusman

Makara Journal of Technology

CO2 Absorption from Its Mixture with CH4 or N2 through Hollow Fiber Membrane Contactor using Water as Solvent. Hollow fiber membrane contactors have been widely used as gas-liquid contactors recently such as in the CO2 absorption process from gas stream. This research aims to evaluate the effectiveness of hollow fiber membrane contactor to absorb CO2 from its mixture with CH4 or N2 using water through mass transfer and hydrodynamic tests. There are 3 membrane modules used in this research with shell diameter of 1.9 cm, length of 40 cm, outer fiber diameter of 2.7 mm and fiber number in the …


The Use Of Red Cabbage’S Anthocyanine Extract As A Photosensitizer On A Dye-Sensitized Nanocrystalline Tio2 Solar Cell, Akhiruddin Maddu, Mahfuddin Zuhri, Irmansyah Irmansyah Nov 2007

The Use Of Red Cabbage’S Anthocyanine Extract As A Photosensitizer On A Dye-Sensitized Nanocrystalline Tio2 Solar Cell, Akhiruddin Maddu, Mahfuddin Zuhri, Irmansyah Irmansyah

Makara Journal of Technology

The use of Red Cabbage’s anthocyanine extract as a photosensitizer on a Dye-Sensitized Nanocrystalline TiO2 Solar Cell. A solid-state dye-sensitized nanocrystalline TiO2 solar cell utilizing anthocyanin extract form red cabbage as photosensitizer was fabricated. The solar cell was formed in sandwich structure, which two electrodes sandwiching polymer electrolyte containing a redox couple (I-/I3 -). One of the electrodes, namely working electrode, TiO2 layer on TCO (transparent conducting oxide) coated glass substrate was sensitized with anthocyanin dye as electron donor in the system. Another electrode was a carbon sheet as a counter electrode. Gel electrolyte based on PEG (polyethylene glycol) containing …


The Potency Of Fire And Explosion Hazard On Premium Oil Storage Tank At Depot X 2007, Fatma Lestari, Warid Nurdiansyah Nov 2007

The Potency Of Fire And Explosion Hazard On Premium Oil Storage Tank At Depot X 2007, Fatma Lestari, Warid Nurdiansyah

Makara Journal of Technology

The Potency of Fire and Explosion Hazard on Premium Oil Storage Tank at Depot X 2007. Premium oil storage tanks have fire and explosion risk because Premium oil is flammable liquid. Because of that, fire and explosion risk assessment on Premium oil storage tank at Depot X is needed as foundation to fire and explosion risk management, and comply with regulations. Method of this research is Dow’s Fire and Explosion Index. This research indicate that F&EI value for Premium oil storage tank is 118,82. Based on that F&EI value, level of risk at Premium oil storage tank is intermediate risk.


Building National Digital Infrastructure: A Case Study Of Semiconductor Complex Limited, Deepak Kappor Jul 2007

Building National Digital Infrastructure: A Case Study Of Semiconductor Complex Limited, Deepak Kappor

Business Review

The digital revolution and the rapid technology developments thereafter created a real danger of the modem world getting divided into a new type of 'digital-haves and digital-have not's'. It was feared that developing countries like India may not be able to reap the benefits of the 'information age' because of the ever widening gap in technology and relevant infrastructure. As a strategic step to bridge the growing digital divide between India and the technologically advanced economies, the Government of India (GO I) decided to set up Semiconductor Complex Limited (SCL) in the year 1983 to develop Indian capabilities in the …


Simple: System Automatic Essay Assessment For Indonesian Language Subject Examination, Anak Agung Putri Ratna, Bagio Budiardjo, Djoko Hartanto Apr 2007

Simple: System Automatic Essay Assessment For Indonesian Language Subject Examination, Anak Agung Putri Ratna, Bagio Budiardjo, Djoko Hartanto

Makara Journal of Technology

SIMPLE: System Automatic Essay Assessment for Indonesian Language Subject Examination. Evaluation of study of a student is a very important aspect of an educational process. Evaluation is aimed at measuring the level of student understanding of the given lecture materials. Measuring student understanding of the course material, using essay-type exam, is generally used as the evaluation tool. In this essay-type exam, the student has to answer questions using sentences, whereby choices of possible answers are not indicated. The student has to answer the questions with his/her sentences. The answers may vary, since it reflects the student’s best thoughts of the …


Biodesulphurization Within Natural Gas In Oil And Gas Field, Sri Astuti Rahayu, M. Fierdaus, Syafrizal Syafrizal, M. Udiharto Apr 2007

Biodesulphurization Within Natural Gas In Oil And Gas Field, Sri Astuti Rahayu, M. Fierdaus, Syafrizal Syafrizal, M. Udiharto

Makara Journal of Technology

The presence of sulphur compounds in natural gas can interfere to the quality of natural gas. The decline of combustion gas capacity, metal instrument corrosion in gas piping, and the environmental pollution from gas emission can affect by their presence. Bio-filter is one of the methods that selected to reduce sulphur content in natural gas. A lab scale study of hydrogen sulphide reduction in natural gas had conducted in oil and gas field using bio-filter method. The bio-filter system (±1 L volume) contains an active carbon and thiosulphide medium as a substrate, Thiobacillus thioparus as a single culture of sulphur …


Mechanical Study On Using Of Accr Thermal Conductor At 500 Kv Sutet, Suprihadi Prasetyono Apr 2007

Mechanical Study On Using Of Accr Thermal Conductor At 500 Kv Sutet, Suprihadi Prasetyono

Makara Journal of Technology

Mechanical Study on using of ACCR Thermal Conductor at 500 kV SUTET. At the height of electricity demand increasing recently, circumstance of environment more limited and also expense of high investment, making thermal conductor (conductor thermal resistance) considered to be one of alternative in the electricity transmission bottlenecks. These days it has been developed thermal conductor ACCR (Aluminium Conductor Composite Reinforced) which can operate with temperature up to 240oC, so that making the current carrying capacity being higher than conventional conductor. This research aimed to study load current leading to mechanical characteristic ACCR conductor included tension, length of elongation and …


Kinetic Model For Triglyceride Hydrolysis Using Lipase:Review, Heri Hermansyah, A. Wijanarko, Dianursanti Dianursanti, Misri Gozan, Praswasti P. D.K Wulan, Rita Arbianti, Roekmijati W. Soemantojo, Tania Surya Utami, Yuliusman Yuliusman, Momoji Kubo, Naomi Shibasaki Kitakawa, Toshiy Yonemoto Apr 2007

Kinetic Model For Triglyceride Hydrolysis Using Lipase:Review, Heri Hermansyah, A. Wijanarko, Dianursanti Dianursanti, Misri Gozan, Praswasti P. D.K Wulan, Rita Arbianti, Roekmijati W. Soemantojo, Tania Surya Utami, Yuliusman Yuliusman, Momoji Kubo, Naomi Shibasaki Kitakawa, Toshiy Yonemoto

Makara Journal of Technology

Triglyceride hydrolysis using lipase has been proposed as a novel method to produce raw materials in food and cosmetic industries such as diacylglycerol, monoacylglycerol, glycerol and fatty acid. In order to design a reactor for utilizing this reaction on industrial scale, constructing a kinetic model is important. Since the substrates are oil and water, the hydrolysis takes place at oil-water interface. Furthermore, the triglyceride has three ester bonds, so that the hydrolysis stepwise proceeds. Thus, the reaction mechanism is very complicated. The difference between the interfacial and bulk concentrations of the enzyme, substrates and products, and the interfacial enzymatic reaction …


Sulfonation Of Cptfe Film Grafted Styrene For Proton Exchange Membrane Fuel Cell, Yohan Yohan Apr 2007

Sulfonation Of Cptfe Film Grafted Styrene For Proton Exchange Membrane Fuel Cell, Yohan Yohan

Makara Journal of Technology

Sulfonation of cPTFE Film grafted Styrene for Proton Exchange Membrane Fuel Cell. Sulfonation of γ-ray iradiated and styrene-grafted crosslinked polytetrafluoroethylene film (cPTFE-g-S film) have been done. The aim of the research is to make hydropyl membrane as proton exchange membrane fuel cell. Sulfonation was prepared with chlorosulfonic acid in chloroethane under various conditions. The impact of the percent of grafting, the concentration of chlorosulfonic acid, the reaction time,and the reaction temperature on the properties of sulfonated film is examinated. The results show that sulfonation of surface-grafted films is incomplete at room temperature. The increasing of concentration of chlorosulfonic acid and …


Utilization Of Bagasse Cellulose For Ethanol Production Through Simultaneous Saccharification And Fermentation By Xylanase, M. Samsuri, Misri Gozan, R. Mardias, M. Baiquni, Heri Hermansyah, Anondho Wijanarko, Bambang Prasetya, M. Nasikin Apr 2007

Utilization Of Bagasse Cellulose For Ethanol Production Through Simultaneous Saccharification And Fermentation By Xylanase, M. Samsuri, Misri Gozan, R. Mardias, M. Baiquni, Heri Hermansyah, Anondho Wijanarko, Bambang Prasetya, M. Nasikin

Makara Journal of Technology

Utilization of Bagasse Cellulose for Ethanol Production through Simultaneous Saccharification and Fermentation by Xylanase. Bagasse is a solid residue from sugar cane process, which is not many use it for some product which have more added value. Bagasse, which is a lignosellulosic material, be able to be use for alternative energy resources like bioethanol or biogas. With renewable energy resources a crisis of energy in Republic of Indonesia could be solved, especially in oil and gas. This research has done the conversion of bagasse to bioethanol with xylanase enzyme. The result show that bagasse contains of 52,7% cellulose, 20% hemicelluloses, …


Construction Of Short-Length High-Rates Ldpc Codes Using Difference Families, Deny Hamdani, Ery Safrianti Apr 2007

Construction Of Short-Length High-Rates Ldpc Codes Using Difference Families, Deny Hamdani, Ery Safrianti

Makara Journal of Technology

Low-density parity-check (LDPC) code is linear-block error-correcting code defined by sparse parity-check matrix. It is decoded using the massage-passing algorithm, and in many cases, capable of outperforming turbo code. This paper presents a class of low-density parity-check (LDPC) codes showing good performance with low encoding complexity. The code is constructed using difference families from combinatorial design. The resulting code, which is designed to have short code length and high code rate, can be encoded with low complexity due to its quasi-cyclic structure, and performs well when it is iteratively decoded with the sum-product algorithm. These properties of LDPC code are …


Production Of Medium Chain Length Polyhydroxyalkanoates From Oleic Acid Using Pseudomonas Putida Pga1 By Fed Batch Culture, Sidik Marsudi, Irene K.P. Tan, Seng Neon Gan, K. B. Ramachandran Apr 2007

Production Of Medium Chain Length Polyhydroxyalkanoates From Oleic Acid Using Pseudomonas Putida Pga1 By Fed Batch Culture, Sidik Marsudi, Irene K.P. Tan, Seng Neon Gan, K. B. Ramachandran

Makara Journal of Technology

Bacterial polyhydroxyalkanoates (PHAs) are a class of polymers currently receiving much attention because of their potential as renewable and biodegradable plastics. A wide variety of bacteria has been reported to produce PHAs including Pseudomonas strains. These strains are known as versatile medium chain length PHAs (PHAs-mcl) producers using fatty acids as carbon source. Oleic acid was used to produce PHAs-mcl using Pseudomonas putida PGA 1 by continuous feeding of both nitrogen and carbon source, in a fed batch culture. During cell growth, PHAs also accumulated, indicating that PHA production in this organism is growth associated. Residual cell increased until the …


Book Review: No Place To Hide, Gary C. Kessler Jan 2007

Book Review: No Place To Hide, Gary C. Kessler

Journal of Digital Forensics, Security and Law

This issue presents the second Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).


Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki J. Lee, Il-Yeol Song Jan 2007

Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki J. Lee, Il-Yeol Song

Journal of Digital Forensics, Security and Law

Current approaches of phishing filters depend on classifying messages based on textually discernable features such as IP-based URLs or domain names as those features that can be easily extracted from a given phishing message. However, in the same sense, those easily perceptible features can be easily manipulated by sophisticated phishers. Therefore, it is important that universal patterns of phishing messages should be identified for feature extraction to serve as a basis for text classification. In this paper, we demonstrate that user perception regarding phishing message can be identified in central and peripheral routes of information processing. We also present a …


Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth Jan 2007

Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth

Journal of Digital Forensics, Security and Law

When considering the legal implications of monitoring and surveillance in the workplace, the question may be asked why companies deploy computer surveillance and monitoring in the first place. Several reasons may be put forward to justify why more than 80% of all major American firms monitor employee e-mails and Internet usage. However, what most companies forget is the fact that the absence or presence of monitoring and surveillance activities in a company holds serious legal consequences for companies. From the discussion in this paper it will become apparent that there is a vast difference in how most countries approach this …


The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney Jan 2007

The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney

Journal of Digital Forensics, Security and Law

Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which …


Information Technology Act 2000 In India - Authentication Of E-Documents, R. G. Pawar, B. S. Sawant, A. Kaiwade Jan 2007

Information Technology Act 2000 In India - Authentication Of E-Documents, R. G. Pawar, B. S. Sawant, A. Kaiwade

Journal of Digital Forensics, Security and Law

The Information Technology Act 2000 has enacted in India on 9th June 2000. This Act has mentioned provision of authentication of electronic document. It is the need of hour at that time that such provision is needed in the Indian Law system, especially for electronic commerce and electronic governance. Electronic commerce”, which involve the use of alternatives to paper based methods of communication and storage information. To do electronic commerce there should be authentication of particular document. The working of internet is the documents are traveling in terms of bits from one destination to other destination, through various media like …


The Common Body Of Knowledge: A Framework To Promote Relevant Information Security Research, Kenneth J. Knapp, F. N. Ford, Thomas E. Marshall, R. K. Rainer Jan 2007

The Common Body Of Knowledge: A Framework To Promote Relevant Information Security Research, Kenneth J. Knapp, F. N. Ford, Thomas E. Marshall, R. K. Rainer

Journal of Digital Forensics, Security and Law

This study proposes using an established common body of knowledge (CBK) as one means of organizing information security literature. Consistent with calls for more relevant information systems (IS) research, this industrydeveloped framework can motivate future research towards topics that are important to the security practitioner. In this review, forty-eight articles from ten IS journals from 1995 to 2004 are selected and cross-referenced to the ten domains of the information security CBK. Further, we distinguish articles as empirical research, frameworks, or tutorials. Generally, this study identified a need for additional empirical research in every CBK domain including topics related to legal …


An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros Jan 2007

An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros

Journal of Digital Forensics, Security and Law

The interaction between disjunctive interpersonal relationships, those where the parties to the relationship disagree on the goals of the relationship, and the use of computer mediated communications channels is a relatively unexplored domain. Bargh (2002) suggests that CMC channels can amplify the development of interpersonal relationships, and notes that the effect is not constant across communications activities. This proposal suggests a line of research that explores the interaction between computer mediated communications (CMC) and stalking, which is a common form of disjunctive relationships. Field data from cyberstalking cases will be used to look at the effects of CMC channels on …


Making Molehills Out Of Mountains: Bringing Security Research To The Classroom, Richard G. Taylor Jan 2007

Making Molehills Out Of Mountains: Bringing Security Research To The Classroom, Richard G. Taylor

Journal of Digital Forensics, Security and Law

Security research published in academic journals rarely finds its way to the business community or into the classroom. Even though the research is of high quality, it is written in a manner that is difficult to read and to understand. This paper argues that one way to get this academic research into the business community is to incorporate it into security classrooms. To do so, however, academic articles need to be adapted into a classroom-friendly format. This paper suggests ways to do this and provides an example of an academic article that was adapted for use in a security management …


Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam Jan 2007

Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam

Journal of Digital Forensics, Security and Law

Rapid development of information technology (IT) has brought with it many new applications such as e-commerce and global business. The past few years have seen activities in the legislative arena covering issues such as digital signatures, the international recognition of electronic documents and privacy and data protection. Both the developed and developing countries have exhibited keenness to embrace the IT environment. Securing this electronic environment from intrusion, however, continues to be problematic. A particular favorite form of computer crime would be ‘hacking’. As more computer systems move on to on-line processing and improved telecommunications, computer hackers are now a real …


Providing A Foundation For Analysis Of Volatile Data Stores, Timothy Vidas Jan 2007

Providing A Foundation For Analysis Of Volatile Data Stores, Timothy Vidas

Journal of Digital Forensics, Security and Law

Current threats against typical computer systems demonstrate a need for forensic analysis of memory-resident data in addition to the conventional static analysis common today. Certain attacks and types of malware exist solely in memory and leave little or no evidentiary information on nonvolatile stores such as a hard disk drive. The desire to preserve system state at the time of response may even warrant memory acquisition independent of perceived threats and the ability to analyze the acquired duplicate.

Tools capable of duplicating various types of volatile data stores are becoming widely available. Once the data store has been duplicated, current …


Education Organization Baseline Control Protection And Trusted Level Security, Wasim A. Al-Hamdani Jan 2007

Education Organization Baseline Control Protection And Trusted Level Security, Wasim A. Al-Hamdani

Journal of Digital Forensics, Security and Law

Many education organizations have adopted for security the enterprise best practices for implementation on their campuses, while others focus on ISO Standard (or/and) the National Institution of Standards and Technology.

All these adoptions are dependent on IT personal and their experiences or knowledge of the standard. On top of this is the size of the education organizations. The larger the population in an education organization, the more the problem of information and security become very clear. Thus, they have been obliged to comply with information security issues and adopt the national or international standard. The case is quite different when …


Securitycom: A Multi-Player Game For Researching And Teaching Information Security Teams, Douglas P. Twitchell Jan 2007

Securitycom: A Multi-Player Game For Researching And Teaching Information Security Teams, Douglas P. Twitchell

Journal of Digital Forensics, Security and Law

A major portion of government and business organizations’ attempts to counteract information security threats is teams of security personnel. These teams often consist of personnel of diverse backgrounds in specific specialties such as network administration, application development, and business administration, resulting in possible conflicts between security, functionality, and availability. This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game. It will be used to study how information security teams work together to defend against attacks using a multi-player game, and to study …