Total security management-a paradigm for developing secure information systems

Download
2000
Rayis, Osama Abdelwahab

Suggestions

Anomaly-based cyber intrusion detection system with ensemble classifier
Sarıkaya, Alper; Günel Kılıç, Banu; Department of Information Systems (2018)
Nowadays, cyberattacks are occurring progressively. Along with this, diversity, size and density of the cyberattacks are increasing. When the logs of security devices are analyzed, massive amounts of attack signs are detained. Besides, it is also difficult for humans to evaluate the logs accurately. Therefore, the identification of key data, which can be used to distinguish an attack from this very large data set, is important for both rapid detection of attacks and rapid response of security devices. This ...
E-government adoption model based on theory of planned behavior: empirical investigation
Kanat, İrfan Emrah; Özkan Yıldırım, Sevgi; Department of Information Systems (2009)
The e-government phenomena has become more important with the ever increasing number of implementations world wide. A model explaining the e-government adoption and the related measurement instrument a survey had been developed and validated in this study. In a post technology acceptance model (TAM) approach, theory of planned behavior (TPB) was extended to t the requirements of e-government context. The adoption of student loans service of the higher education student loans and accommodation association...
Information system security
Yücel, Okan; Bilgen, Semih; Department of Information Systems (2001)
Multi-dimensional evaluation of e-learning systems in the higher education context: empirical investigations
Köseler, Refika; Özkan Yıldırım, Sevgi; Department of Information Systems (2009)
There has been little research on assessment of learning management systems (LMS) within educational organizations as both a web-based learning system for e-learning and as a supportive tool for blended learning environments. This study proposes a conceptual e-learning assessment model, HELAM (Hexagonal e-Learning Assessment Model) suggesting a multi-dimensional approach for LMS evaluation via six dimensions: (1) system quality, (2) service quality, (3) information (content) quality, (4) learner perspective...
Massive crowd simulation with parallel processing
Yılmaz, Erdal; İşler, Veysi; Department of Information Systems (2010)
This thesis analyzes how parallel processing with Graphics Processing Unit (GPU) could be used for massive crowd simulation, not only in terms of rendering but also the computational power that is required for realistic simulation. The extreme population in massive crowd simulation introduces an extra computational load, which is quite difficult to meet by using Central Processing Unit (CPU) resources only. The thesis shows the specific methods and approaches that maximize the throughput of GPU parallel com...
Citation Formats
O. A. Rayis, “Total security management-a paradigm for developing secure information systems,” Ph.D. - Doctoral Program, Middle East Technical University, 2000.