|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
October 2020 | Vol. 98
No.20 |
Title: |
TOWARD ACHIEVING SELF-RESOURCE DISCOVERY IN DISTRIBUTED SYSTEMS BASED ON
DISTRIBUTED QUADTREE |
Author: |
SALEH ALI ALOMARI, MUHYEEDDIN ALQARALEH, EMRAN ALJARRAH, MOWAFAQ SALEM ALZBOON |
Abstract: |
Shared computing infrastructures such as Peer-to-Peer (P2P) networks and grid
technologies allow sharing resources between a large amount of geographically
and dynamically distributed resources to achieve an efficient degree of the
performance of supercomputing. The main issue of this performance refers to the
resource discovery as it is considered an essential and significant part in the
infrastructure of shared computing. Several approaches pertaining to the
resource discovery are suggested to perform resource discovery objective. These
approaches cause an extensive response time, higher query cost and exceptional
network traffic where the reasons behind these causes refer back to the dynamic
construction and the distribution call of these approaches. Additionally, very
rare approaches could tackle the problems of query hitting rate, memory
utilisation and locality. These issues are critical to performance of a system.
Therefore, an in-network querying organisation method, namely, the Distributed
Quadtree (DQT) is proposed in this paper. This method produces efficient
in-network resources of values nod’s, including the distance conscious querying.
The answering price of a query that is related to the value of definite
resources at their maximum value is a static factor of the distance “d” to the
close resources within the network. The construction of the DQT is local and
does not include any existing announcements. Further, according to its stateless
setting and orderly organisation, the proposed method is considered flexible
within a failure intelligence. |
Keywords: |
Shared Computing, Resource Discovery, Quad-Tree. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2020 -- Vol. 98. No. 20 -- 2020 |
Full
Text |
|
Title: |
A MODEL OF THE E-WALLET ADOPTION IN SMALL AND MEDIUM ENTERPRISES (SME)
INDONESIA |
Author: |
HENDRO GUNAWAN, SEK YONG WEE, RAJA RINA BINTI RAJA IKRAM |
Abstract: |
Information technology (IT) is widely recognized as an important resource for
increasing the productivity of a country's economy. New technological
innovations in business transactions have a huge impact on current business
activities. Electronic Wallet (E-Wallet) is one of the technological innovations
that is currently developing. E-wallet is a software that uses electronic
devices such as personal computers or smartphones to make transactions online.
Along with the development of e-wallet in Indonesia, this study aims to find out
the e-wallet adoption model to analyze the decisions of SMEs using e-wallet. To
analyze an organization about the adoption of a technology, the adoption of
suitable theories is the Technology-Organization-Environment (TOE) and Diffusion
of Innovations (DOI). The proposed research model was developed by extending the
TOE and DOI by adding the Technology acceptance model (TAM) and guanxi theories.
The variables that will be used to analyze the determinant factors of e-wallet
adoption in Small and Medium Enterprises (SME) in Indonesia are: perceived
compatibility, perceived security, perceived cost, perceived benefits, firm's
financial resources, perceived complexity, employee IT Knowledge, SME IT
infrastructure, top management support, culture, competitive pressure, customer
pressure, government support, perceived usefulness, perceived ease of use and
knowledge sharing. The result of this study would be useful to understand about
the adoption of E-Wallet in Small and Medium Enterprises (SME) Indonesia. |
Keywords: |
E-Wallet, Small And Medium Enterprises (SME), Technology Acceptance Model (TAM),
Diffusion Of Innovations (DOI), Technology-Organization-Environment (TOE),
Guanxi. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2020 -- Vol. 98. No. 20 -- 2020 |
Full
Text |
|
Title: |
CHALLENGES AND OPPORTUNITIES FOR INTRUSION DETECTION SYSTEM IN CLOUD COMPUTING
ENVIRONMENT |
Author: |
HESHAM M. EL MASRY , AYMAN E. KHEDR , HATEM M. ABDUL-KADER |
Abstract: |
The paper suggests an anomaly multi Phases intrusion detection technique for
discovering the zero-day, fast-spreading and complicated network attacks on the
cloud platform with the least amount of false alarm rate. Cloud computing is
commonly regarded as an attractive business model, because it minimizes
expenditure and its costs are directly related to use and demand. But the
distributed nature of cloud computing environments, their vast aggregation of
resources, large user access, efficient and automated resource sharing allow
Intruders to use cloud to their advantage. The objective of this paper is to use
the comparative approach to review, analyze and evaluate all of the existing
Intrusion Detection Systems (IDSs) types, techniques, algorithms and all of the
previous attempts related to securing and detecting the attacks on the cloud
environment. The article concluded that the existing IDS techniques and
algorithms are not capable in detecting the unknown attacks with minimum false
alert rate in cloud platform. The effectiveness of the new intrusion detection
technique can be evaluated by measuring the accuracy and false alert rate. |
Keywords: |
Intrusion Detection Systems (IDS), Hybrid Based IDS, Binary Classification and
K-NN, PSO and Machine Learning, Genetic Algorithm and Artificial Neural Network. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2020 -- Vol. 98. No. 20 -- 2020 |
Full
Text |
|
Title: |
PSEUDO RANDOM NUMBER GENERATOR BASED ON LOOK-UP TABLE AND CHAOTIC MAPS |
Author: |
MOUSA FARAJALLAH, MOHAMMAD ABUTAHA, MOHAMMAD ABU JOODEH, OMAR SALHAB, NOOR
JWEIHAN |
Abstract: |
Pseudo-Random Number Generators (PRNGs) play an important role in many
cryptographic applications. Many network security algorithms and protocols that
are based on cryptography also require random or pseudorandom numbers at certain
points. PRNG is an algorithm that is used to generate a random sequence that has
the same behavior of truly random numbers. Each generated number should not
depend on the previously generated numbers, and thus it is not possible to
predict such numbers. However, not all PRNGs are suitable for cryptographic
applications. Therefore, various statistical tests can be applied to the
obtained sequence to evaluate and compare it with truly random sequences. A PRNG
that passes all statistical tests can be considered as a statistically secure
PRNG. Based on some properties of chaos, such as randomness, unpredictability,
and high sensitivity to the secret key, we proposed a new PRNG. The proposed
PRNG is based on a modified chaotic map proposed in [20], and a new lookup
table, which is created in such way that the stored numbers will not be
duplicated in the same row, column, or diameter. The proposed map and lookup
table are used to produce non-linear and non-invertible functions, which are the
main targets of any secure PRNG. As a result, the behavior of the proposed PRNG
simulates the behavior of TRNGs. The obtained results from the cryptographic
analysis and the standard statistical National Institute of Standards and
Technology (NIST) tests indicate the robustness of the proposed PRNG.
Furthermore, it is robust against known cryptographic attacks, and it has a
strong non-linearity compared to the other systems. A comparison study of
efficiency in terms of both speed performance and robustness against
cryptanalysis was done, and the results demonstrate the superiority of the
proposed algorithm. |
Keywords: |
PRNG, Cryptographic, Randomness, Statistical Tests, Chaos. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2020 -- Vol. 98. No. 20 -- 2020 |
Full
Text |
|
Title: |
DORSAL FIN INTERACTION ANALYSIS OF A BIOINSPIRED SURFPERCHE ROBOT |
Author: |
FAUSTO CABRERA, CLAUDIO ROSSI, DANIEL NOBOA |
Abstract: |
Marine species such as fish have a morphology that has been adapted over time to
reduce resistance in underwater displacement as well as staying submerged,
therefore the present research focuses on the study of the bluebird fish robot,
under four parameters of analysis, hydrodynamics, hydrostatics, kinematics and
dynamics, to submerge the robot in the Amazonian rivers where the habitat of
this species is found, there is in the future to monitor underwater life. A
dorsal fin of 2 degrees of freedom was designed an built using a 3D printer, the
rigid fin was driven by a servomotor and control system, all of them were
waterproofed, the body can stay underwater near to zero buoyancy with tendency
to submerge, the reaction of the movement of the dorsal fin and the reaction of
the robot displacement was determined via some tests. |
Keywords: |
Dorsal fin, bioinspired robot, underwater vehicles, robot stability. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2020 -- Vol. 98. No. 20 -- 2020 |
Full
Text |
|
Title: |
ANALYSIS OF RELATIONSHIP CLV WITH 8 CORE DRIVES USING CLUSTERING K-MEANS AND
OCTALYSIS GAMIFICATION FRAMEWORK |
Author: |
FITRI MARISA, SHARIFAH SAKINAH SYED AHMAD, ZERATUL IZZAH MOHD YUSOH, TUBAGUS
MOHAMMAD AKHRIZA, ANASTASIA L MAUKAR, ANANG ARIS WIDODO |
Abstract: |
The CLV model is an indicator used to measure and evaluate the future value of
customers to the company. But the CLV model is predictive where it will be more
accurate if there are many supporting variables, one of which is customer
motivation. Adopt the point of view of the Octalysis gamification framework,
that behavior occurs because of an individual's motivation or drive. Therefore,
it is important to explore what drives influence customer behavior, so that it
can affect the customer's future value (Customer Lifetime Value). By using the
K-Means clustering approach, CLV value weighting, and Octalysis framework, the
study analyzes the relationship between CLV and 8 core drives to customer
motivation to produce 3 contributions: (1) The results of K-Means analysis of
customers based on variables L, R, F, M and CLV value weights have produced the
best cluster k = 2 where segment-2 has a future value level (CLV) of the company
higher than segment-1, (2) Likert scale comparison analysis and the relationship
between the results of CLV segmentation on 8 core drives motivational resellers
to produce similarity of ranking patterns on each core drive and its average,
meaning that between the customer's future value (CLV) with 8 core drives the
customer motivation is not interplay. (3) Comparative Octalysis analysis of the
balance of 8 core drives resellers in the two segments results in a difference
in the total Octagon score (segment-2 = 368, segment-1 = 419), and this means
that the high or low future value of the customer against the company is
inversely proportional to the high and low of 8 core drives reseller of
companies. |
Keywords: |
Gamification, Octalysis, K-Means Clustering, CLV, SME |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2020 -- Vol. 98. No. 20 -- 2020 |
Full
Text |
|
Title: |
INVESTIGATING THE ROLE OF USER EXPERIENCE IN THE ONLINE SHOPPING SYSTEM:
AN EXTENSION OF THE TECHNOLOGY ACCEPTANCE MODEL |
Author: |
QUYNH NGOHAI, HOAI NGUYENTHANH, VANLOI NGUYEN |
Abstract: |
The Internet is increasingly being used around the world as an innovative tool
to conduct effective marketing policies of goods and services. Online retailers
in Vietnam are beginning to pay more attention to the importance of developing
online sales systems that engage customers as well as enables them to purchase
products online. However, online shopping in Vietnam is not widely applied yet.
This research develops an integrated theoretical model based on TAM to identify
the factors that determine user attitude and their engagement towards online
shopping. Gathering information from 365 respondents in Vietnam has been
conducted via a self-administered questionnaire. The research results manifest
that user experience and service quality have the power to predict users'
perceived usefulness and perceived ease of use, which in turn are crucial
drivers of attitude and intentions towards online purchasing. The findings
provide some important implications and add more certain insights about the
theoretical groundwork of TAM in the Vietnamese online shopping context. |
Keywords: |
TAM; Perceived Usefulness; Ease of Use; Behavioral Intentions; Online Shopping |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2020 -- Vol. 98. No. 20 -- 2020 |
Full
Text |
|
Title: |
IMPACT ANALYSIS OF EXPERIENCE ON GAMIFICATION MARKETING ACTIVITIES, SOCIAL MEDIA
MARKETING, AND OTHER FACTORS TOWARD BRAND LOYALTY IN ONLINE MARKETPLACE
APPLICATION |
Author: |
MARIA THERESA VIEGA, TOGAR ALAM NAPITUPULU |
Abstract: |
Gamified method or well known as gamification has been adapted to enhance the
primary process in many fields, such as improving lecturing processes in higher
education, improving information acceptance rates in health therapy, and
recently increasing consumer interaction with different brands in the e-commerce
market. Online marketplace application as a popular variety of e-commerce, also
following this trend to implement gamification elements in their application to
create a better buying experience for their users and to increase the brand
loyalty of their users towards various online marketplace applications. Aside
from gamification, social media is still one of the most chosen media to be a
marketing channel of an online marketplace brand by creating official account
and use them to interact intimately with their customers. In this research, we
assess the impact of experience on gamification marketing activities and social
media marketing, mediated brand attitude, consumer brand engagement, and
customer satisfaction towards brand loyalty in Indonesian online marketplace
using Structural Equations Modeling (SEM) type of analysis. The finding of the
study showed that the brand attitude and customer satisfaction fully mediated
the impact of gamification marketing practices on brand loyalty, while social
media marketing and consumer brand engagement has no significant effect on brand
loyalty. |
Keywords: |
Brand Attitude, Brand Loyalty, Consumer Brand Engagement, Gamification
Marketing Activities, Social Media Marketing, Online Marketplace |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2020 -- Vol. 98. No. 20 -- 2020 |
Full
Text |
|
Title: |
AUTHORSHIP VERIFICATION OF TWEETS CROSS TOPICS USING WEIGHTED WORD VECTORS
SIMILARITY |
Author: |
SHAIMAA AYMAN, MOHAMED EISA, FIFI FAROUK |
Abstract: |
Authorship Verification (AV) is one of the interesting topics that had developed
rapidly and distinctly since the middle of the 19th century. With the social
media era, there is always a problem in determining whether a given tweet, post,
or comment was written by a certain user or not. We are proposing a new approach
to verify if a tweet belongs to a claimed user. Our proposed method utilizes the
benefits of one-shot learning. It is based on vectors similarity which depends
on Term Frequency–Inverse Document Frequency (TF-IDF) and word embedding for
better verification accuracy. After comparisons, our proposed approach
outperforms existing methods in the case of cross topics. |
Keywords: |
Authorship Verification, Vectors Similarity, TF-IDF, Word Embedding, Cross
Topics. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2020 -- Vol. 98. No. 20 -- 2020 |
Full
Text |
|
Title: |
THE DESIGN AND DEVELOPMENT OF A BLOCKCHAIN-BASED EPRO SYSTEM FOR COLLECTING
CLINICAL DATA |
Author: |
KWANGSOO JANG , OOK LEE |
Abstract: |
Objectives: The present study discussed the design and development of an ePRO
system that records and manages clinical trial data on a blockchain network so
as to prevent any arbitrary modification, forgery, or falsification and improve
the reliability of the data. Methods: The overall system design and development
of ePRO consists of (1) advancement and development of blockchain technology,
(2) development of a blockchain clinical trial system model, (3) development of
a clinical trial data collecting tool using blockchain, and (4) technological
verification of the blockchain-based ePRO system. Results: The results of this
study suggest a potential to save human resources and costs for CDM operation by
increasing reliability through the implementation of an on-chain clinical trial
system. Additionally, the on-chain clinical trial system is predicted to help
prevent harm from serious abnormal reactions, including patients’ death,
subsequent side effects, and birth defects caused by clinical trial errors.
Conclusions: The ePRO system can serve as a platform for medical and clinical
services to cope with expanding clinical data fields. When the system developed
in this study is combined in the near future with state-of-the-art technologies
such as IoT and AI, a new paradigm for clinical data repositories and management
systems is predicted to develop. Based on the clinical data collected by this
ePRO system, when a clinical data warehouse is established and linked to medical
information systems, a servitization model that can accelerate innovation in the
medical service market is expected to emerge. |
Keywords: |
Blockchain; Clinical Trials as Topic; Electronic Health Records; Mobile
Applications; Pilot Projects |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2020 -- Vol. 98. No. 20 -- 2020 |
Full
Text |
|
Title: |
SKELETONIZATION-BASED PATH PLANNING ALGORITHM FOR AUTONOMOUS ROBOTS USING A
COMBINATION OF GEOMETRIC ALGORITHMS AND RECURSION |
Author: |
EDWAR JACINTO GÓMEZ, HOLMAN MONTIEL ARIZA, FERNANDO MARTÍNEZ SANTA |
Abstract: |
This article presents a strategy for the calculation of paths in indoor and
static labyrinth-type environments, using a camera on the stage as a sensor. An
algorithm is applied that uses the skeletonization of a binary image as the
basis for the calculation of the path, which, despite being a technique that
comes from image processing, is used in a satisfactory way to this problem in a
variety of scenarios with different degrees of difficulty, so that it can solve
any type of labyrinth with different geometry and number of branches in its
path. In this implementation a refined algorithm is used that applies two
techniques derived from the skeletonization of the image and that take different
paths to reach a possible solution; the algorithm determines the complexity of
the problem by evaluating the amount of branches that the binary skeleton has,
if the number of possible branches of the binary tree is less than a threshold,
then, a technique that measures the distance of each path is applied as a
strategy to calculate the shortest path, if the number of branches is greater
than the determined threshold, a technique that removes points at the end of
paths not connected to a possible path is applied, this is done by calling a
routine in a recursive way until the only two end points in the path are the
start and end points of the path. |
Keywords: |
Autonomous robot, Path planning, Skeleton Technique, Maze. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2020 -- Vol. 98. No. 20 -- 2020 |
Full
Text |
|
Title: |
OPTIMUM WLAN PROTOCOL AND NETWORK ARCHITECTURE IDENTIFICATION FOR VOIP
APPLICATION |
Author: |
ALI MOHD ALI, MAHMOUD DHIMISH, MALEK M. ALSMADI |
Abstract: |
This research developed a novel algorithm to evaluate Voice over Internet
Protocol (VoIP) metrics of different IEEE 802.11 technologies in order to
identify the optimum network architecture among Basic Service Set (BSS),
Extended Service Set (ESS), and the Independent Basic Service Set (IBSS). The
proposed algorithm will yield the rank order of different IEEE 802.11
technologies. By selecting the optimum network architecture and technology, the
best overall network performance that provides a good voice quality is
guaranteed. Furthermore, it meets the acceptance threshold values for the VoIP
quality metrics. This algorithm was applied to various room sizes ranging from
2x3m to 10x14m and the number of nodes ranged from one to forty. The spatial
distributions considered were circular, uniform, and random. The Quality of
Service (QoS) metrics used were delay, jitter, throughput and packet loss. |
Keywords: |
VoIP, QoS, Performance Analysis; IEEE technologies. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2020 -- Vol. 98. No. 20 -- 2020 |
Full
Text |
|
Title: |
DESIGN OF ACCUMULATOR DUMP FOR RFID READERS USING 0.35 µM CMOS TECHNOLOGY |
Author: |
DYAH NUR’AININGSIH, JOKO PURNOMO, ERI PRASETYO WIBOWO , ROBBY KURNIAWAN HARAHAP,
BUSONO SOEROWIRDJO |
Abstract: |
This research aims to design a dump accumulator being capable of producing bit
values in parallel from the sigma-delta ADC output signal that is serial in the
reader of the Radio Frequency Identification (RFID) system. RFID system consists
of two parts, namely a tag and a reader. The tag uses the delta-sigma ADC to
convert the input signals from the sensor which, then, become the digital serial
data that are transmitted to the reader. The reader uses the dump accumulator
method to convert digital bits serially into 8-bit parallel resolution. The
accumulator dump uses the counter and register latch circuits as output parallel
bits. The results are divided into 3 time- periods, namely period 1 (T0) during
the initialization and the synchronization, period 2 (T1) shows 8-bit binary
data equivalent to 127(10), and period 3 (T2) shows 8-bit binary data equivalent
to 128(10). By using 0.35 µm CMOS technology, the number of transistor hardware
resources needed is 1022 transistors with a power dissipation of 28.5 mW. These
results can save 77.42% using fewer transistors and are more efficient than the
comb decimator method. This method contributes and enriches knowledge on the
development of on-chip systems with serial to parallel signal processing for
RFID devices. |
Keywords: |
ADC Delta-Sigma, Dump Accumulator, Efficiency, RFID, serial to parallel |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2020 -- Vol. 98. No. 20 -- 2020 |
Full
Text |
|
Title: |
DESIGNING BUSINESS ARCHITECTURE OF THE SHARED SERVICE - MASS PAYMENT SYSTEM FOR
THE INDONESIA PUBLIC FINANCE MANAGEMENT USING TOGAF FRAMEWORK |
Author: |
SUDARTO, NILO LEGOWO |
Abstract: |
Integrated Financial Management Information System (IFMIS) has become best
practices for supporting the state financial management in every country. With
the advancement of mass digital payment, IFMIS must also be able to include this
practice to maintain the efficiency of state finance operation. In line with
demands for efficiency and transparency, shared service centers are also
increasingly becoming a common practice in government. Therefore, in an effort
to get the full benefits of IFMIS investment in Indonesia, this paper designs
one of business architectures for shared service-mass payment management of the
Indonesia state finance based on the TOGAF-ADM framework. With this design, it
is recommended that various mass payments such as payments for payrolls,
government credit cards, official travel costs, common expenses and social
assistances can be done more efficiently and transparently and consolidated in a
shared service center. Hence, millions of mass payments which are previously
carried out individually by thousands of working units across Indonesia could be
simplified into smaller number of consolidated payments executed by a shared
service center. It is also transforming millions of manual operation processes
into much more efficient digital operation processes, maximizing the benefit of
collaboration between state owned information systems with the availability of
private information systems which are becoming very advanced. This proposed
end-state business architectures obviously enhance the efficiency and
transparency of state financial operation. This is the contribution of this
paper, in addition to contributing to architectural enterprises of digital
government in state financial sector which are very complex and still progress
unevenly in many countries. |
Keywords: |
Enterprise Architecture, TOGAF, IFMIS, Shared Service, Mass Digital Payment |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2020 -- Vol. 98. No. 20 -- 2020 |
Full
Text |
|
Title: |
SOCIAL NETWORKS: GENERATOR OF PERFORMANCE TEST AND MEASUREMENT OF BIG DATA
PUBLICATIONS' INFLUENCE |
Author: |
MOHCINE KODAD |
Abstract: |
This contribution consists in proposing a system allowing generating the
performance tests on publications diffused in social networks by means of an
automatic extraction of engagement data through the KPI (Key Performance
Indicator) of social networks analysis. Our solution also collects all
information related to individual behavior and posts that are published on
social network sites, especially the number, nature and type of posts that are
shared daily. This proposed system has three functions: first, it allows the
extraction of data in an automatic way which will allow an ease of collecting a
large number of data which arrives to Big Data; secondly, it helps all user,
through indicators that will be generate, to analyze data and test the
performance and influence of publications; and thirdly, it presents in the
business intelligence aspect, all results and some comments with recommendations
for better dissemination of publications, at the right time and with the right
people. |
Keywords: |
Social Networks; KPI; SMA;SNA; Performance; Publication |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2020 -- Vol. 98. No. 20 -- 2020 |
Full
Text |
|
Title: |
E-VOTING READINESS MAPPING FOR GENERAL ELECTION IMPLEMENTATION |
Author: |
SLAMET RISNANTO , YAHAYA BIN ABD RAHIM , NANNA SURYANA HERMAN , ABDURROHMAN |
Abstract: |
General elections are a common thing in the world for democratic countries to
elect their leaders and deputies in parliament. Today's technology offers an
electronic-based electoral system called e-voting, a safer, faster and more
efficient system. Due to privacy, verification and confidentiality of
conventional elections, there are many countries, both developing countries and
developed countries around the world, that have implemented e-voting, such as:
India, Brazil, the Philippines, Argentina, United States, Belgium, Canada,
Japan, Mexico, France, Peru, Australia, Costa Rica, Finland, Guatemala, United
Kingdom, Ireland, Italy, Kazakhstan, Netherland, Germany, Paraguay, Norway,
Switzerland and others. Of those countries, there are countries which are
successful and sustainable, unsuccessful or canceled the program due to many
problems, only limited the program to trial and not continued, or only limited
the program to partial implementation. This research presents a mapping of the
elements needed to deal with the implementation of e-voting by referring to the
successful and unsuccessful countries in its implementation, as well as to the
previous e-voting research. There are two contributions produced in this
research. First, mapping the preparatory components in building the e-voting
ecosystem. Second, the mapping of these components can be used as the basis for
creating an e-voting framework. Hopefully the results of this research can give
contribution to countries or organizations that will carry out e-voting or
research of develop e-voting framework in the future. |
Keywords: |
E-Voting, Election, Technology, Mapping, Framework |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2020 -- Vol. 98. No. 20 -- 2020 |
Full
Text |
|
Title: |
CAN CUSTOMER EQUITY BE THE MEDIATING VARIABLE BETWEEN SOCIAL MEDIA MARKETING
ACTIVITIES AND PURCHASE INTENTION? |
Author: |
OKKY RIZKIA YUSTIAN |
Abstract: |
Technological advances have changed the traditional marketing. The increasing
number of social media users becomes an advantage for marketers to create new
marketing patterns. This study focuses on the relationship between social media
marketing, customer equity and purchase intention. The research was conducted in
the mobile phones market in Bandung, Indonesia. The data were collected from the
main electronics shopping district in the city of Bandung that has a high
purchasing power for branded mobile phones and gadgets. In order to test the
validity, reliability and hypothesis, the smartPLS 3.0 program was used. The
results show that the significant effect on the three drivers of customer equity
is due to social media marketing. In contrast to previous research indicating
that from the three customer equity drivers, only value equity has a mediating
role between purchase intention and social media marketing. From the three
customer equity drivers, only value equity has a significant influence on
purchase intention. This research provides theoretical and managerial
contributions to the literature. |
Keywords: |
Social Media Marketing, Customer Equity, Value Equity, Relationship Equity,
Brand Equity, Purchase Intention. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2020 -- Vol. 98. No. 20 -- 2020 |
Full
Text |
|
Title: |
EFFICIENT MUTUAL USER AUTHENTICATION PROTOCOL TO SHARE FILES USING ID IN CLOUD
STORAGE |
Author: |
K. SUJATHA , V.CERONMANI SHARMILA |
Abstract: |
Transpiring trends inq the world nowadays is cloud computing as a predominant
interactive archetype for data to ensure user’s data in an online cloud server
which is stored remotely. A cloud service provides tremendous conveniences to
the users to relish the on-demand cloud applications without any limitations
considered in the local infrastructure. In the process of data accessing,
different users may be in a collaborative relationship, and thus data sharing
becomes significant to achieve productive benefits. In recent days, with the
adaptation of cloud services, many users are involved in it. But they are afraid
about cloud environment due to security in cloud. In this paper, we proposed a
Mutual User Authentication Protocol (MUAP) in which the users can safely share
their data in a suspicious cloud servers. This MUAP provides assurance on data
over user security and focussed mainly on data sharing among the users by an
encrypted way. The data is encrypted and shared on public or private cloud
servers due to that the manipulation of information is prohibited to the server.
Users can easily spot the particular files from the cloud storage but the server
cannot realize the identity of the user which leads that users can connect
themselves to the cloud without endanger their privacy. Identity Issuer will
keep user’s privacy safely. The protocol encrypts all information to get rid of
MITM attack. Mutual Authentication is achieved by two level encryption using ID.
This protocol deals with individual activities and communications when the
legacy protocols deals with group activities. When compared to other protocols
the proposed system has higher security with minimal computational and
communicational overheads. |
Keywords: |
Cloud Computing, Sharing Files, Cloud Services, Mutual Authentication Protocol,
Insecure Cloud Servers. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2020 -- Vol. 98. No. 20 -- 2020 |
Full
Text |
|
|
|