Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Digital Communications and Networking

Snitch Application: Addressing Cyber Trust In Future Living Spaces, Russell Moore Aug 2020

Snitch Application: Addressing Cyber Trust In Future Living Spaces, Russell Moore

Cybersecurity Undergraduate Research Showcase

The future of smart homes is filled with excitement and ample opportunity to live in an environment that features extraordinary convenience and energy efficiency. Devices such as Amazon Alexa and Roku Smart TV’s feature voice interaction options that provide the user with enhanced functionality. While voice-activated devices are accommodating, it is imperative to acknowledge how they work on the backend. The problem is that these devices collect and share a large amount of data from users who are oftentimes unaware that it’s even happening. The Snitch App is being developed in order to inform the user of what exactly is …


Usability And Accessibility Model For E-Government Websites In Ethiopia, Yoseph Zeleke Jul 2020

Usability And Accessibility Model For E-Government Websites In Ethiopia, Yoseph Zeleke

African Conference on Information Systems and Technology

The development of websites and portals are main components of the e-Government strategy implementations for the last nine years in Ethiopia. However, services optimizations with usability and accessibility are key issues of Ethiopia e-Government services development.

Therefore, the ultimate goal of this study is creation of usable, accessible and sustainable Ethiopian eGovernment websites with four stage of research analysis, through proposed model. The investigations results are used to provide a clear picture of what needs to be improves from management and user point of views and also from other stakeholders of e-Government services. This study applies mixed methods of data …


Artificial Intelligence Towards Future Industrial Opportunities And Challenges, Gizealew Dagnaw Jul 2020

Artificial Intelligence Towards Future Industrial Opportunities And Challenges, Gizealew Dagnaw

African Conference on Information Systems and Technology

The industry 4.0 will bring reflective changes to our society, including an important digital shift in the manufacturing sector. At present, several manufacturing firms are trying to adopt the practices of industry 4.0 throughout their supply chain. The Fourth Industrial Revolution and the artificial intelligence at its core are fundamentally changing the way we live, work and interact as citizens. The complexity of this transformation may look overwhelming and to many threatening. Recently, the dramatic growth of new generation information technologies has prompted several countries to seek new strategies for industrial revolution. The globalization and the competitiveness are forcing companies …


Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle Jul 2020

Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle

African Conference on Information Systems and Technology

Most researches have been conducted to develop models, algorithms and systems to detect intrusions. However, they are not plausible as intruders began to attack systems by masking their features. While researches continued to various techniques to overcome these challenges, little attention was given to use data mining techniques, for development of intrusion detection. Recently there has been much interest in applying data mining to computer network intrusion detection, specifically as intruders began to cheat by masking some detection features to attack systems. This work is an attempt to propose a model that works based on semi-supervised collective classification algorithm. For …


Human Behavior Is A Significant Flaw In Maintaining Cyber Security, Elizabeth Jackson Jul 2020

Human Behavior Is A Significant Flaw In Maintaining Cyber Security, Elizabeth Jackson

Cybersecurity Undergraduate Research Showcase

Human behavior and data security utilization must be intertwined; in order to mitigate the negative effects of cyber attacks. No consumer wants their data hacked, breached, stolen, shared or wiped out. It is imperative to survey the type of education is needed to keep users safe and interested in securing their data. This can be done by simply seeking out the consumer's view of data security. The information obtained would allow the cybersecurity community to offer a simple way for consumers to protect their mobile data. There is a constant interaction between human behavior and the need for increased data …


Iot Devices In The Public Health Sector, Cayla Young Jan 2020

Iot Devices In The Public Health Sector, Cayla Young

Cybersecurity Undergraduate Research Showcase

In this research, proper attention is drawn to privacy and security concerns with the integration of Internet of Things (IoT) devices in the public health sector. Often, not much attention is given to IoT devices and its vulnerabilities concerning the medical industry. Effects of COVID-19 contact tracing applications are explored through research of various source types. Mitigation techniques for these privacy and security issues is given. Focus is brought to topics outlining the risks associated with genetic testing companies and the vulnerabilities of data collection and data storage. Recommendations are provided to help consumers avoid these risks. Lastly, a comprehensive …