

An Interoperable Design for Internet of Things |
Pages: 49-60 (12) | [Full Text] PDF (2.55 MB) |
AJ Hussein, R Hassanpour, AA Tareq, K Oztoprak |
Department of Computer Engineering, Cankaya University, Ankara, Turkey University of Kebangsaan Malaysia (UKM)Department of Computer Engineering, Karatay University, Konya, Turkey |
Abstract - A vast number of things have been used to meet innumerable commitments in information nowadays. Most of these things are placed in different locations and regularly work to provide individual users or groups the ability to access them by using their own networking applications and/or individual databases. Integrating third party applications or ensuring the security and privacy of the collected data is a challenge. Moreover, end users face difficulties in accessing these data from anywhere in a unified form. In this research, a new design for the Internet of Things is proposed, which we call Web Internet of Things (Web Io-T). The new design can play a role between things and stakeholders by virtualizing the entities and making them available to end users from anywhere. It also offers a wide range of tools and options for stakeholders to host many types of entities in one place, to control and manage content, share this content in social networks, apply personalization, update dynamically, and much more. Our design was tested in terms of scalability, functionality and flexibility. Web I-oT will help to overcome the limitation of collected data in a secure and scalable manner. |
Index Terms - Internet of Things (Io-T), Internet of Everything (Io-E), Virtual Sensor, Cloud Sensor, Sensor Network, Cloud Computing |
C itation - AJ Hussein, R Hassanpour, AA Tareq, K Oztoprak. "An Interoperable Design for Internet of Things." International Journal of Computer Networks and Communications Security 6, no. 3 (2018): 49-60. |
The Effect of Modernization of Indonesias Tax Administration System on Tax Compliance: A Study of Small Medium Enterprises (SMEs) Taxpayers |
Pages: 61-65 (5) | [Full Text] PDF (180 KB) |
DI Purnamasari, RH DPS |
Faculty of Economics and Business, Universitas Pembangan Nasional “Veteran” Yogyakarta |
Abstract - Currently, the government continues to modernize the tax administration. By tax administration modernization we mean the process of modernizing the tax administration system to change the mindset and behavior of the tax apparatus and the value of their organization so that the Directorate General of Taxation (DGT) can improve its reputation as a professional institution. Tax administration modernization is expected to increase the level of compliance of taxpayers. In this study, modernization is represented by 4 independent variables: organizational structure, organizational procedure, organizational strategy, and organizational culture. Our results indicate that organizational structure does not affect the tax compliance level of taxpayers. However, the other three independent variables—organizational procedure, organizational strategy, and organizational culture—do affect the compliance level of taxpayers. This indicates that the modernization of tax administration directly relevant to taxpayers does affect the compliance level of the taxpayers. |
Index Terms - Modernization, Taxation, Compliance, Organization, Government |
C itation - DI Purnamasari, RH DPS. "The Effect of Modernization of Indonesias Tax Administration System on Tax Compliance: A Study of Small Medium Enterprises (SMEs) Taxpayers." International Journal of Computer Networks and Communications Security 6, no. 3 (2018): 61-65. |
Directional Based Graphical Authentication Method With Shoulder Sniffing Resistant |
Pages: 66-69 (4) | [Full Text] PDF (178 KB) |
NAbA Othman |
Faculty of Computer & Mathematical Sciences, UiTM Melaka |
Abstract - Authentication has been advanced by implying advancement in security such as cryptography to protect password against data leaking and sniffing; captcha to prevent robot system; Secure Sockets Layer designed to protect users against phishing website and many other solution invented for different types of vulnerabilities. Although there are method suggested for preventing shoulder surfing (i.e. exposure of password to nearby observing-person), the techniques are complicated for non-IT savvy. Some of the proposed techniques also required high computational process with high range of possible answer. This paper proposed a shoulder-surfing-proof graphical based authentication with direction scheme that combines technique adapted from Passfaces scheme and a selection of direction. User is required to choose four faces and one direction to serve as the secret authentication. Besides of shoulder surfing, the proposed method also caters security during data transmission and security of data storage as hashing is applied along the communication. This technique has been proven to demonstrate the robustness, security strength and the functionality advantages of the system. The result from the security testing shows that image based passwords is more secure because the possibility of the image to be guessed is very low. |
Index Terms - Graphical Password, Image password, Authentication, Shoulder Surfing, Passface Authentication |
C itation - NAbA Othman. "Directional Based Graphical Authentication Method With Shoulder Sniffing Resistant." International Journal of Computer Networks and Communications Security 6, no. 3 (2018): 66-69. |