Repository of University of Nova Gorica

Search the repository
A+ | A- | Help | SLO | ENG

Query: search in
search in
search in
search in
* old and bologna study programme

Options:
  Reset


1 - 7 / 7
First pagePrevious page1Next pageLast page
1.
Business-information system for smart homes based on Z-Wave technology : diploma thesis
David Manchevski, 2021, undergraduate thesis

Abstract: The goal of this thesis is to show how to create a system, that can be implemented in today’s market of smart home modules. This will be done by introducing how the Z-Wave technology works, how it can be implemented in the user’s home. Furthermore, the functionalities of the Z-Wave technology will be presented together with the Z-Wave modules and their everyday uses. In addition, the business-information system can put on display how a smart home company operates, how the data is distributed between the departments of said smart home company. The business-information system is shown with the help of a data flow diagrams, entity relationship diagrams and a database of the data that is stored inside the particular database. This system will be used by a user interested in the buying the smart home technology products, partners, Z-wave certifiers, reclamation department.
Keywords: Z-Waves, smart homes, business-information systems, entity-relationship, processes, data flows, data stores, modules, diploma thesis
Published in RUNG: 24.01.2022; Views: 1977; Downloads: 79
URL Link to full text
This document has many files! More...

2.
Analysing security checkpoints for an integrated utility-based information system
Sunil K. Muttoo, Rajan Gupta, Saibal K. Pal, 2016, published scientific conference contribution

Abstract: With the rising digital medium, the various digital applications are rising too. These applications can work in the private domain or public domain depending upon the environment and features. Of late, the public infrastructure in India is improving and thus digitisation of the services and processes are making it better for the government to function. Lots of new services and applications are planned through desktop-and mobile-based information systems. But any information system requires a good security cover for it to function correctly and efficiently. One such new system was proposed for integrating the various utility systems in Delhi, NCR, for which various security checkpoints are discussed in this paper. These are related to database security, network security, cryptography, and the user authentication process. These checkpoints will be helpful in making the newly proposed information system more secure and will also be helpful in analysing the need and scope of new security features in it. Security concerns are analysed at different levels of the information system and suggestions are made for the system which can be implemented in the currently proposed system. These suggestions can also be used in other similar systems as well as for improving and enhancing security at various levels.
Keywords: information systems, integrated utility system, database security, network security, data security, information system security, e-governance
Published in RUNG: 15.07.2021; Views: 1967; Downloads: 10
URL Link to full text
This document has many files! More...

3.
Proposed framework for information systems security for e-governance in developing nations : assessment and way ahead for key components
Rajan Gupta, Sunil K. Muttoo, Saibal K. Pal, 2017, published scientific conference contribution

Abstract: E-Governance is rising rapidly in various parts of the world. And with rising digitization of the resources, the threats to the infrastructure and digital data is also rising within the government departments. For developed nations, the security parameters and optimization process is well placed but for developing nations like India, the security parameter is yet to be addressed strongly. This study proposes a framework for security assessment amongst E-Governance departments based on Information System principles. The major areas of security to be covered up are towards Hardware, Network, Software, Server, & Data security, Physical Environment Security, and various policies for security of Information Systems at organizational level.
Keywords: e-governance, information systems security, developing nations, security framework
Published in RUNG: 02.04.2021; Views: 1793; Downloads: 60
URL Link to full text
This document has many files! More...

4.
Implementation & analysis of integrated utility system in developing nation like India
Rajan Gupta, Sunil K. Muttoo, Saibal K. Pal, 2016, original scientific article

Abstract: Public utility systems are prevalent around the world but are struggling in developing nations like India to work efficiently. Integration of different utilities can be a possible solution on the technology front, so that more requests can be handled with lesser problems. This study provides the implementation design and benefits of an already proposed integration system by the same authors. It is found that Data Storage, Access Time, Transaction Cost, security cost and server’s busy time can become more effective if the implementation of integration system can be put in place. The working prototype is based on three utilities (Gas, Power & Water) of Delhi-NCR, India.
Keywords: information systems, utility system, India, developing nation
Published in RUNG: 01.04.2021; Views: 1876; Downloads: 56
URL Link to full text
This document has many files! More...

5.
Data analytics for better branding of e-governance and e-business systems : case of "digital India" campaign
Rajan Gupta, Saibal K. Pal, Sunil K. Muttoo, 2020, independent scientific component part or a chapter in a monograph

Abstract: Efficient e-governance leads to stronger democracy which can be achieved through higher trust, visibility, and transparency in the system, which can be acquired through effective branding. Various techniques of data analytics can help in achieving trust and transparency in the system. The objective of the study is to resolve various issues in the public sector through analytics-based improvement of different parameters of branding, namely, communication, consistency, clarity, and competition. The research design of the study is a combination of both qualitative and quantitative techniques like descriptive statistics. The main techniques emerged for data analysis includes rating and ranking analysis of government apps, social media analytics, text and speech analytics, media analytics, statistical analytics and data mining, telecom analytics, and people demographics for government programs. It was found that the “Digital India” campaign under e-governance initiative was highly successful based on different kinds of analytical methods found in the study.
Keywords: e-governance, data analytics, e-business, business systems, information systems, government campaigns, branding
Published in RUNG: 31.03.2021; Views: 2040; Downloads: 13
URL Link to full text
This document has many files! More...

6.
Cyber security assessment education for e-governance systems
Rajan Gupta, Saibal K. Pal, Sunil K. Muttoo, 2020, independent scientific component part or a chapter in a monograph

Abstract: Electronic Governance is being rapidly adopted across the world for providing seamless services to citizens. With rising digitization of information resources, the threats to the infrastructure and digital data are also growing. For developed nations, the security parameters and optimization processes are well tested and placed, but for developing nations these are yet to be addressed strongly. There is also a need for imparting awareness and educating personnel involved in the development and operations of E-Governance Systems. This study proposes a framework for security assessment amongst the departments of E-Governance, based on Information Systems principles. The major areas of security covered in the framework are related to the Hardware, Network, Software, Server & Data security, Physical Environment Security, and various policies for security of Information Systems at the organizational level. The suggestive framework has also been tested for an organization in India. It was found that, given the functionality & magnitude of the organization, the assessment framework was able to analyze the strength and weakness of an organization in an exhaustive manner. The coverage of technological and organizational measure was found to be 69% and 53% respectively and the organization was placed in top two zones of the proposed grid. This study will be useful for security assessment of various organizations operating under E-Governance.
Keywords: e-governance, cyber security education, information systems security, developing nations, security framework
Published in RUNG: 31.03.2021; Views: 2023; Downloads: 12
URL Link to full text
This document has many files! More...

7.
Geographic information systems : exercises: quantum GIS (QGIS)
Donatella Gubiani, 2017, other educational material

Keywords: geographic information systems, qGIS, spatial data
Published in RUNG: 11.07.2017; Views: 4163; Downloads: 0
This document has many files! More...

Search done in 0.04 sec.
Back to top