At the present time, hundreds of millions of active users all around the world are using online s... more At the present time, hundreds of millions of active users all around the world are using online social network, such as Facebook, Twitter, Tumblr and LinkedIn. This service turned out to be one of the most well-liked and accepted services on the Internet. With the quick development of information technology and networking, the users became able to share many things on the web such as pictures, videos, their daily activities, attended events and even their location. Nonetheless, the majorities of social networks have weak user to user authentication method, which is based on some basic information like displayed name, photo. These weaknesses make it effortless to misuse user's information and do identity cloning attack to form fake profile. Currently, Facebook has 955 million active users. Of this whole, approximately 8.7 percent (which is equal to 83 million users) is fake accounts. Fakes can introduce spam, manipulate online rating, or exploit knowledge extracted from the netwo...
Cloud Computing is a relatively new computing approach which promises enhanced scalability, flexi... more Cloud Computing is a relatively new computing approach which promises enhanced scalability, flexibility and cost-efficiency. In practice, however, there are many uncertainties about the usage of this way of provisioning IT resources. Concerns about evolving dependencies and security issues have arisen. As online commerce is dependent on reliable, secure online stores, it is vital to take those concerns into account. Users of cloud computing systems always concern about their private data. Securing the cloud is a multidisciplinary challenge, as cloud computing can be thought of as a different way to deliver and use all of the same types of information technology people use today. Thus making user to trust in cloud computing is the great challenge of adopting cloud computing. Nowadays most of Ecommerce web sites intend to use cloud computing facilities to increase their functionality and their customer’s attraction. So identifying the factors that influence E-commerce customer’s trust...
At the present time, hundreds of millions of active users all around the world are using online s... more At the present time, hundreds of millions of active users all around the world are using online social network, such as Facebook, Twitter, Tumblr and LinkedIn. This service turned out to be one of the most well-liked and accepted services on the Internet. With the quick development of information technology and networking, the users became able to share many things on the web such as pictures, videos, their daily activities, attended events and even their location. Nonetheless, the majorities of social networks have weak user to user authentication method, which is based on some basic information like displayed name, photo. These weaknesses make it effortless to misuse user's information and do identity cloning attack to form fake profile. Currently, Facebook has 955 million active users. Of this whole, approximately 8.7 percent (which is equal to 83 million users) is fake accounts. Fakes can introduce spam, manipulate online rating, or exploit knowledge extracted from the netwo...
Information Technology is known as one of the most important elements in changes and development ... more Information Technology is known as one of the most important elements in changes and development of the current world and consequences from it will have a direct impact on people. These changes will carry words such as: Electronic commerce, Electronic Banking, Electronic city and even electronic government. It’s been many years that Electronic development is practically used in many countries yielding large capital returns and saving significant resources and capacities for those countries. Green ICT as one of the emerging concept born with the development of Information Technology. It would cover concepts such as Carbon Dioxide Emission from computer hardware, green transportation and so. The current situation of progress in green ICT in UTM has been investigated in this paper. There are various tools to gauge project progress aspects. We used “Stage of growth” as our strategic tool to investigate progress of green technology establishment in different area for UTM with concentrati...
Cloud Computing is a relatively new computing approach which promises enhanced scalability, flexi... more Cloud Computing is a relatively new computing approach which promises enhanced scalability, flexibility and cost-efficiency. In practice, however, there are many uncertainties about the usage of this way of provisioning IT resources. Concerns about evolving dependencies and security issues have arisen. As online commerce is dependent on reliable, secure online stores, it is vital to take those concerns into account. Users of cloud computing systems always concern about their private data. Securing the cloud is a multidisciplinary challenge, as cloud computing can be thought of as a different way to deliver and use all of the same types of information technology people use today. Thus making user to trust in cloud computing is the great challenge of adopting cloud computing. Nowadays most of Ecommerce web sites intend to use cloud computing facilities to increase their functionality and their customer’s attraction. So identifying the factors that influence E-commerce customer’s trust...
At the present time, hundreds of millions of active users all around the world are using online s... more At the present time, hundreds of millions of active users all around the world are using online social network, such as Facebook, Twitter, Tumblr and LinkedIn. This service turned out to be one of the most well-liked and accepted services on the Internet. With the quick development of information technology and networking, the users became able to share many things on the web such as pictures, videos, their daily activities, attended events and even their location. Nonetheless, the majorities of social networks have weak user to user authentication method, which is based on some basic information like displayed name, photo. These weaknesses make it effortless to misuse user's information and do identity cloning attack to form fake profile. Currently, Facebook has 955 million active users. Of this whole, approximately 8.7 percent (which is equal to 83 million users) is fake accounts. Fakes can introduce spam, manipulate online rating, or exploit knowledge extracted from the netwo...
Cloud Computing is a relatively new computing approach which promises enhanced scalability, flexi... more Cloud Computing is a relatively new computing approach which promises enhanced scalability, flexibility and cost-efficiency. In practice, however, there are many uncertainties about the usage of this way of provisioning IT resources. Concerns about evolving dependencies and security issues have arisen. As online commerce is dependent on reliable, secure online stores, it is vital to take those concerns into account. Users of cloud computing systems always concern about their private data. Securing the cloud is a multidisciplinary challenge, as cloud computing can be thought of as a different way to deliver and use all of the same types of information technology people use today. Thus making user to trust in cloud computing is the great challenge of adopting cloud computing. Nowadays most of Ecommerce web sites intend to use cloud computing facilities to increase their functionality and their customer’s attraction. So identifying the factors that influence E-commerce customer’s trust...
At the present time, hundreds of millions of active users all around the world are using online s... more At the present time, hundreds of millions of active users all around the world are using online social network, such as Facebook, Twitter, Tumblr and LinkedIn. This service turned out to be one of the most well-liked and accepted services on the Internet. With the quick development of information technology and networking, the users became able to share many things on the web such as pictures, videos, their daily activities, attended events and even their location. Nonetheless, the majorities of social networks have weak user to user authentication method, which is based on some basic information like displayed name, photo. These weaknesses make it effortless to misuse user's information and do identity cloning attack to form fake profile. Currently, Facebook has 955 million active users. Of this whole, approximately 8.7 percent (which is equal to 83 million users) is fake accounts. Fakes can introduce spam, manipulate online rating, or exploit knowledge extracted from the netwo...
Information Technology is known as one of the most important elements in changes and development ... more Information Technology is known as one of the most important elements in changes and development of the current world and consequences from it will have a direct impact on people. These changes will carry words such as: Electronic commerce, Electronic Banking, Electronic city and even electronic government. It’s been many years that Electronic development is practically used in many countries yielding large capital returns and saving significant resources and capacities for those countries. Green ICT as one of the emerging concept born with the development of Information Technology. It would cover concepts such as Carbon Dioxide Emission from computer hardware, green transportation and so. The current situation of progress in green ICT in UTM has been investigated in this paper. There are various tools to gauge project progress aspects. We used “Stage of growth” as our strategic tool to investigate progress of green technology establishment in different area for UTM with concentrati...
Cloud Computing is a relatively new computing approach which promises enhanced scalability, flexi... more Cloud Computing is a relatively new computing approach which promises enhanced scalability, flexibility and cost-efficiency. In practice, however, there are many uncertainties about the usage of this way of provisioning IT resources. Concerns about evolving dependencies and security issues have arisen. As online commerce is dependent on reliable, secure online stores, it is vital to take those concerns into account. Users of cloud computing systems always concern about their private data. Securing the cloud is a multidisciplinary challenge, as cloud computing can be thought of as a different way to deliver and use all of the same types of information technology people use today. Thus making user to trust in cloud computing is the great challenge of adopting cloud computing. Nowadays most of Ecommerce web sites intend to use cloud computing facilities to increase their functionality and their customer’s attraction. So identifying the factors that influence E-commerce customer’s trust...
Uploads
Papers by hossein pourtaheri