Protecting Legitimate Software Users Interest in Designing a Piracy Prevention Technique on Computer Network
|
|
|
- Joanna Daniels
- 10 years ago
- Views:
Transcription
1 Protecting Legitimate Software Users Interest in Designing a Piracy Prevention Technique on Computer Network Adu Michael K 1*. Alese, Boniface K. 2 Adewale, Olumide S. 2 Adetunmbi, Adebayo O Computer Science Department, Federal Polytechnic, Ado-Ekiti, Ekiti State, Nigeria 2. Computer Science Department, Federal University of Technology, Akure, Nigeria * [email protected] Abstract This paper is an attempt to substantiate the fact that socio economic issue has to be put into consideration in any effort at preventing software piracy. A legitimate software owner must be given certain period of grace to cater for unforeseen contingencies during which re-installation is allowed without being counted against him. A mathematical equation - TUSRUC EQUATION (Time Usage of Software in Respect of Unforeseen Contingencies) is developed as an algorithmic function, which shows the way the system handles cases of unforeseen contingencies during the first time period of using a software product. These unforeseen contingencies can include the following and not limited to; reformatting of a system, sudden virus attack, system hardware damage. Keywords: Software Piracy, Unforeseen contingencies, TUSRUC 1.1 Introduction Software piracy is the unauthorized duplication of computer software, installing and using software on the machine of an individual who is not a licensed user or over-installing software for use beyond the licensed number (Michael, 1986). Software Piracy on computer Network can be defined as unauthorized transfer of copyright products on a network (Lope, 1998). It also includes installing software on a Network for use by individuals who are not licensed users. To purchase software means to purchase a software license. A software license specifies specific regulations and terms of use by the copyright and software maker. In general, most software licenses allow for use on a single machine and for a single backup copy. Copying, distributing, and exchanging software with friends, coworkers, or on the internet violate the license, and is a violation of copyright law. Stealing intellectual property is a crime and so is software piracy. It is a crime regardless of the type, severity, or motivation. Not only is using or distributing pirated software a crime, but it increasingly violates many corporate policies and many professional organization's policies. Today corporations specify strict intellectual property policies for their employees. These policies are meant to protect the corporation from breaking copyright and property laws. The policies prevent users from installing personal software on corporate machines by securing copies of company software and licenses, and limiting access to employee workstations. Many of the corporate policies are adoptions from professional organizations laws and ethics. Proper credit should be given when using intellectual property. The professional community organizations are leaders in respecting and honoring intellectual property. When software is used illegally, a company is deprived of its earnings. Piracy undermines the software market, making it less lucrative for software developers to continue to offer innovative and high quality software. It also hurts the consumer. Frequently, pirated software does not include documentation or provide access to customer support, and or future software upgrades. Most importantly, pirated software is illegal and a crime in most countries. There are many agencies and organizations that have been created for the sole purpose of reducing and preventing acts of software piracy. Recently, legislature is empowering software developers to protect their assets. An increase in penalties for pirating software and a larger push for wider enforcement are attempts to curb the rising piracy rates worldwide. Also, new anti-piracy technologies are being incorporated to prevent and deter the counterfeiting of software. Software Piracy by users is generally believed to be of a great discomfort to the developer through lower profits and buying customers through higher prices (Bertrand et al, 2004). Solving software piracy requires a combination of education, technology, legislature, and enforcement. Anti-piracy methods must be effective in deterring piracy and not hinder the legal use of the software by the user. A successive and viable solution for piracy prevention is a solution that incorporates both hardware and software protection in conjunction with education about intellectual property rights. It is also important to provide choices for quality software at fair prices. The large growth in software application makes developing software a big business with potentially large profits. Software enables users and business to do more with their systems, and the need for software is growing. But many times, software is not free, and depending on the type of software, it can cost large amounts of money. Wherever there is potential for large profits and there exists a high demand, illegal methods for satisfying the demand at a lower cost also exist. But money is not the only motivation. Power satisfaction and lack of education are also factors for fueling the 11
2 software piracy industry. Only in the past few years, with the wide availability of large disc copying machines, the Internet, and large profit gains due to the increasing demand for pirated software, has larger, more professional groups began mass copying and distributing software. Large scale professional software counterfeiting throughout the world is largely dominated by organized crime groups. 1.2 Background of the work Considering the fact that software is a valued entity which is developed to enable users to carry out their basic tasks, preventing software piracy effectively requires all-round approach. An antipiracy method should go beyond preventing multiple installations and duplications but must provide effective means for a period of grace before usage count, providing at least a measure of considerations in protecting the interest of the users who are legitimate owner of the software (Julien, et al 1999). Most users are often concerned with the first installation which are considered as the most important period of measure of software benefit and as such any unforeseen contingency like virus attack, hardware failure et cetera, that may arise within certain period of first installation should be assumed as a period of grace for which another installation is permitted on the same computer without being counted against the user. However, usage count is assumed after the expiration of the period. There are three basic ways of preventing copying, they are: copy protection, copy identification and copy dissuasion (Zamparelli, 1998). One major way to dissuade end-users is to give some benefits to encourage him within certain period of first installation. Pointing out the ethical issues of software piracy to members of the piracy supply chain is another way to counter piracy. Pfleeger suggests that the right to fair compensation is a basic principle of universal ethics (Pfleeger, 1997). Inadequate protection of the user interest is one of the major factors that encourage software piracy especially in a third world country like Nigeria. The socio-economic factor in piracy prevention should be put into consideration in any meaningful measure of preventing software piracy. Applications that have a high production cost per unit attract crackers if they can crack the application, they can sell copies and make personal financial gain. Selling only a few units, crackers can make a substantial financial return. Applications that are touted as highly secure are immediate targets for hackers. Security is seen as a challenge by the hacker and he gets great personal satisfaction or recognition from cracking a secure application (Andre, A. et al 2002). 1.3 Notable Inventions in Software Piracy Prevention The Method of Preventing Software Piracy during Installation from a Read Only Storage Medium is an invention by Jefrey, et al (2008). This is a method and system for limiting the number of installations of computer software from a compact disk to a computer. More specifically it deters software piracy by detecting hardware during software installation, comparing the hardware to other hardware on which the software has been previously installed and either allowing or disallowing the installation based on predetermined factors. The CD comes with a floppy disk that keeps the detail of every computer on which installation is made. However, despite all the efforts intended to prevent software piracy by the application of this method, major flaws are still noted. In today s technological advancement, present computer systems has no floppy disk drives created with them, rather the CD drives are used and is viewed to be more acceptable by all users of the computers due to the fact that running software programs on floppy disk is slow. Also there is a creation of the term dependency between the two storage media, in the sense that without one medium the installation of the software to the computer system is not accomplished. A floppy disk referred to as license floppy will be required if the user initialized the installation of the software, and if such licensed floppy is not inserted the installation is disallowed. Another notable invention is the Prevention of Software piracy by Activation Code System. Based on this work, the software can be used by different users with different computer system since it does not take into consideration the computer hardware features/configurations on which the software is been activated. It only considers if the code matches what is stored in the Remote Server of the developer (Reuben, 2008). The Remote Server of the developer gives authority of installation to the user if data entered matches the stored information of the software on the database of the developer. With this view, one could possibly duplicate his activation code for a purchased software into multiple copies and decide to sell them in the market and put on the surface of each of the software his user data, by doing this, piracy is not prevented since the Remote server recognizes every user data provided in- as-much-as it tallies with the one in the database, even though it later detects and marks such user as using a pirated copy, but after the damage has been done. One major reason for increasing trend in piracy is non-availability of any means to dissuade end-users by provision of some benefits on the original product bought within certain period of first installation. Doing this is one of the ways of appealing to members of the piracy supply chain to counter piracy. 1.4 Analysis and Result The opinion of software users comprising of students, academic and non-academic staff members of the Federal 12
3 Polytechnic, Ado-Ekiti, Ekiti State, Nigeria were sought and subsequently analysed. Tables 1 to 3 show the degree of influence of not adequately protecting the users interest by not providing a period of grace to cater for unforeseen contingencies when he procures original/legitimate software products. Table 1: Percentage of students population in response to the negative influence of not adequately protecting the users interest by not providing a period of grace for unforeseen contingencies (2012/2013 ND II and HND II final year students of the department of Computer Science) CLASS Enrollment Agree % Partially % Disagree % No comment % Agree ND II % 2 2.3% 2 2.3% 0 0% HND II % 4 6.2% 3 4.6% 2 3.1% Table 2: Percentage of Non-academic staff members in response to the negative influence of not adequately protecting the users interest by not providing a period of grace for unforeseen contingencies. CATEGORY Enrollment Agree % Partially % Disagree % No comment % Agree JUNIOR % 8 15% 2 3.6% 0 0% STAFF SENIOR STAFF % 4 16% 3 12% 0 0% Table 3: Percentage of Academic staff members in response to the negative influence of not adequately protecting the users interest by not providing a period of grace for unforeseen contingencies. Enrollment Agree % Partially % Disagree % No comment % Agree ACADEMIC STAFF % 7 8% 2 2% 0 0% The data in table 1 shows that 95.2 % of the total students in National Diploma II and 86.2% Higher National Diploma II agreed to the negative influence arising from not protecting the interest of the software users by providing a period of grace for unforeseen contingencies. This implies that this negative measure can encourage piracy on the part of legitimate users who belief he has not benefitted much from the purchase of the software product. Also table 2 shows that 82% of the Junior staff members of the polytechnic as 72% for senior members (both non-academic) felt the same. In table 3, 150 copies of the instrument of data collection were administered among the academic staff, of which 91 copies could be accessed for this research work. However, analysis of the respondents indicates that 90% agree to the fact that if a period of grace is not provided for legitimate software users to cater for unforeseen contingencies during the first time of installation, it may encourage piracy. 2% disagreed and 0% passed no comment. 1.5 Application of Time Usage of Software in Respect of Unforeseen Contingencies (TUSRUC) feature The TUSRUC FEATURE states that for every first time of activation, a user might experience unforeseen contingencies which might be appalling to the user of such software (e.g VIRUS attack that requires reformatting the hard drive), and as such a test period of contingency (n) is placed and until n is reached, a proximity of contingency is true and can allow that same user to do further installation only on same system, which will be assumed as a first time installation within the period of (n). If (n) has reached the end of TUSRUC period, counting resumed forthwith, TUSRUC FEATURE is disabled and usage count = 1. n = software usage limit before marking activation code as used T i = Time of Installation T u = Used period of software T c = Current Time T u= T c -T i If T u = n then mark Software as used; usage count = 1 If T u < n then Update other fields on the Software User Identity Platform (SUIP) of the Remote Server (database) of the developer, except the USAGE COUNT. If User wants to install on another HDII, Serial number, etc. then Display message THIS SOFTWARE ACTIVATION CODE HAS BEEN ACTIVATED ON A SYSTEM AND IS UNDER A TUSRUC PERIOD. 13
4 CAN NOT INSTALL ON ANOTHER SYSTEM NOW Else if User tries to INSTALL ON HIS SYSTEM AGAIN DURING THE TIME OF TESTING THEN Allow the installation and assume proximity of contingency was true then usage count = 1 on SUIP and status of authenticity = used on Software Activation code Platform (SACP). 1.6 Detailed Description When the user begins the installation process, the activation code is entered and mobile agent is activated. The activation code might be coat-protected and would be scratched during prompt. When such code is entered, the mobile agent first locates a platform known as the Software Activation Code Platform (SACP) this platform contains the various software developed by the Software Developer and the unique activation codes for each. A quick match is done to check if the activation code provided by the user for that particular software matches the one in the SACP platform. If it matches, it then travels back to the user s PC and takes the Software Users Identity Information (All details that uniquely identify a computer system) which includes and not limited to Hard disk identification information, volume, file system type, PC name. It then moves to the software developers network and locates the platform known as the Software User Identity Platform (SUIP), stores the information in the record of the platform, at this stage the software remains in the user s pc and the TUSRUC feature is activated for that user if it is the first time of installing the software. As the TUSRUC is enabled, the user might try to install the software on another system, at trying this, the mobile agent takes the information identity of that PC and compares with the one already in the SUIP platform corresponding to the activation code entered, if it is not the same, it assumes the user is trying to pirate the software and do a multi system installation, it then prompts a message such as THE SOFTWARE WITH THE ACTIVATION CODE PROVIDED IS UNDER A TUSRUC PERIOD AND CANNOT BE INSTALLED ON THIRD-PARTY SYSTEM. But if the user tries to install the software again on his system, the mobile agent moves to the SUIP platform and sees that the identity information is the same for the user, then it will assume proximity of contingency was true for that system, but this assumption is conclusive if the TUSRUC EQUATION is true. If the user is out of the TUSRUC period, the SUIP platform records the software as used. Hence a count has started already for that system and the software will only be checked for limit of usage for any further installation(s). Tables 4 and 5 are Software Activation Code Platform (SACP) and Software Users Identity Platform (SUIP) respectively of implementing this research work on server/client network over the internet. The server station provides option for adding serial numbers or activation codes for all software products, view serial status, view users identifications, Edit Admin Functions, change password and to logout. Table 4: Software Activation Code Platform (SACP) SOFTWARE NAMES SERIAL NUMBER NUMBER OF TIME USED Software A Software A Software B Software B Table 5: Software Users Identity Platform (SUIP) SERIAL PC NAME HDD FILE SYSTE M CURMAST ER AKINWAL E-PC C-DRIVE S IZE NTFS NTFS PROCESSO R NAME Intel Atom CPU [email protected] HZ Intel Celeron CPU [email protected] Z PROCESSOR ID VALIDI TY BFE9FBFF CA AFEBFBFF A DATE & TIME VIOD :33: 39 TUSRUC :26: 39 14
5 1.7 Description of the Piracy Prevention System Figure 1: The flow chart description of Piracy Prevention with TUSRUC application. 1.8 Conclusion In this paper, a novel invention is presented to prevent software piracy. This invention takes into consideration the socio-economic issue in software piracy by adequately securing the software products, hence the developer can make commensurable returns on investment since every user has to buy the original copy. Also, the interest of the user is protected at least during the period of grace TUSRUC period at first installation. He is consequently discouraged on piracy. The more demand from prospective users will therefore enable the price to be affordable. In general, the procedure of our experiment is simple and implemented on the internet, which enables a wide range of information that is received by or made available to the server to be sorted, arranged and organized into retrievable data file. Acknowledgement This research was carried out in the Federal University of Technology, Akure, Nigeria as part of a Ph.D programme. Our sincere appreciations go to Mr. Iweama Chukwuma Patrick of Electronics and Computer Engineering Department, Nnamdi Azikiwe University, Awka, Nigeria for his technical support. We gratefully acknowledge the contributions of the referees. 15
6 References Andre, A. et al. (2002). Basic Considerations for Preventing Software Piracy. E-security for E-Business, Rainbow Technologies, Inc. Bertrand, A. (2004). Software Piracy Prevention through diversity. Proceeding of the 2004 ACM workshop on Digital Rights Management. Jeffrey, E.L.et al. (2001). Method of Preventing Software Piracy During Installation From a Read Only Storage Medium, USA. Julien, P.S. et al. (1999). Robust Object Watermarking Application code. Information Hiding, Springer-Verlag. Lope, P. (1998). Fundamental Principles of Computer Programming Environment. IEEE Transaction on Software Engineering, Pp Micheal, A. (1986). Attributes Grammars with Application to syntax- Directed Editors. Williamburg, Virginia. Pleeger, C. (1997). Is there a security problem in Computing? Security in Computing, Chapter 1, Reuben, B. (2008). Activation Code System and Method for Preventing Software Piracy. West Hills, USA. Zamparelli, R. (1998). Digital Distribution Models and copyright enforcement. Available:http// 16
7 This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE s homepage: CALL FOR PAPERS The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. There s no deadline for submission. Prospective authors of IISTE journals can find the submission instruction on the following page: The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library, NewJour, Google Scholar
Anale. Seria Informatică. Vol. XI fasc. 1 2013 Annals. Computer Science Series. 11 th Tome 1 st Fasc. 2013
105 DESIGN OF SOFTWARE PIRACY PREVENTION TECHNIQUE USING MOBILE AGENT MESSAGING CALL Adu Michael K. Federal Polytechnic, Ado-Ekiti, Ekiti State, Nigeria, Department of Computer Science Alese Boniface K,
Database Management System for a Digitized Medical Image
Database Management System for a Digitized Medical Image Ajala Funmilola A*, Opasola Tomilola R, Falohun Adeleye S, Fenwa Olusayo D Department of Computer Science and Engineering, LAUTECH Ogbomoso, Oyo
Impact of Computer Education on Students Interest and Performance in Automobile Trade, in Nigerian Secondary Schools and Colleges
Impact of Computer Education on Students Interest and Performance in Automobile Trade, in Nigerian Secondary Schools and Colleges Name: Ohwojero Chamberlain Address: Delta State University Secondary School,
Use and satisfaction with online public access catalogue in selected university libraries in Ogun State, Nigeria
Vol., No.11, 01 Use and satisfaction with online public access catalogue in selected university libraries in Ogun State, Nigeria ONUOHA, Uloma Doris Department of Information Resources Management Babcock
A Proposed Decision Support System/Expert System for Guiding. Fresh Students in Selecting a Faculty in Gomal University, Pakistan
A Proposed Decision Support System/Expert System for Guiding Fresh Students in Selecting a Faculty in Gomal University, Pakistan Muhammad Zaheer Aslam*, Nasimullah, Abdur Rashid Khan Gomal University DlKhan.Pakistan
Application of Variance Analysis for Performance Evaluation: A Cost/Benefit Approach.
Application of Variance Analysis for Performance Evaluation: A Cost/Benefit Approach. Jude Aruomoaghe Sunny Agbo Department of Accounting, Igbinedion University, Okada, Edo State. *E-mail of Corresponding
SLA Driven Load Balancing For Web Applications in Cloud Computing Environment
SLA Driven Load Balancing For Web Applications in Cloud Computing Environment More Amar [email protected] Kulkarni Anurag [email protected] Kolhe Rakesh [email protected] Kothari Rupesh
The role of business intelligence in knowledge sharing: a Case Study at Al-Hikma Pharmaceutical Manufacturing Company
The role of business intelligence in knowledge sharing: a Case Study at Al-Hikma Pharmaceutical Manufacturing Company Samer Barakat 1* Hasan Ali Al-Zu bi 2 Hanadi Al-Zegaier 3 1. Management Information
European Journal of Business and Management ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online) Vol.5, No.24, 2013
Factors Influencing Effective Talent Management Strategy in Organizations: A Case Study of Corrugated Iron Sheets Limited- Mombasa Kenya KHUDNICK MOCHORWA; CHARLES MWANGI Corresponding author [email protected]
Adoption of Point of Sale Terminals in Nigeria: Assessment of Consumers Level of Satisfaction Abstract Key words 1. INTRODUCTION
Adoption of Point of Sale Terminals in Nigeria: Assessment of Consumers Level of Satisfaction Olugbade Adeoti * Kehinde Osotimehin Department of management and accounting, Obafemi Awolowo University, Ile-Ife,
Developing an In-house Computerized Maintenance Management System for Hospitals
Developing an In-house Computerized Maintenance Management System for Hospitals David Mutia 1, 2* John Kihiu 1 Stephen Maranga 1 1. Department of Mechanical Engineering, Jomo Kenyatta University of Agriculture
The Impact of Operational Risk Management on the Financial Development and Economic Growth: A Case Study of Saudi SME Companies
The Impact of Operational Risk Management on the Financial Development and Economic Growth: A Case Study of Saudi SME Companies Abdulaziz Alrashidi 1 Omar Baakeel 2 1. Collage of Management and Public
Is the Cloud Educational Enterprise Resource Planning the Answer to Traditional Educational Enterprise Resource Planning Challenges in Universities?
Is the Cloud Educational Enterprise Resource Planning the Answer to Traditional Educational Enterprise Resource Planning Challenges in Universities? Hussain A.H Awad * Fadi M. Battah Faculty of Arts and
ISSN 2224-607X (Paper) ISSN 2225-0565 (Online) Vol.3, No.3, 2013. Abstract
Abstract Pattern of Spread of Medical Schools in Nigeria Dr Oladimeji Adebayo 1*, Dr Leslie Omoruyi, 1 Dr Adetunji Labiran 2, Dr Oguogho Ebhodaghe 3, Dr Okwudili Agu 4, Dr Hillary Emoekpere 5,Dr Efosa
Role of Academic Leadership in Change Management for Quality in Higher Education in Pakistan Ijaz Mehmood
194 Role of Academic Leadership in Change Management for Quality in Higher Education in Pakistan Ijaz Mehmood Abstract Lecturer (Education)Islamia University, Bahawal Pur (Bahawalnagar Campus) Shahinshah
Achieving Success through Effective Business Communication
Achieving Success through Effective Business Communication Farmeena Khan 1* Mohd. Ehmer Khan 2 1. Department of Management, Janardan Rai Nagar Rajasthan Vidyapeeth University, Rajasthan, India 2. Department
Types of Achievement Tests Which Are Preferred By Outstanding Students at Al-Hussein Bin Talal University
Types of Achievement Tests Which Are Preferred By Outstanding Students at Al-Hussein Bin Talal University Dr. Atif Eid Alrfooh* Al-Hussein Bin Talal University, Department of Special Education, Faculty
A Study of the Recruitment and Selection process: SMC Global
A Study of the Recruitment and Selection process: SMC Global Abstract Neeraj Kumari Manav Rachna International University, Faridabad, India. Email: [email protected] Better recruitment and selection
Effect of the learning support and the use of project management tools on project success: The case of Pakistan
Effect of the learning support and the use of project management tools on project success: The case of Pakistan Muhammad Javed 1 Atiq ur Rehman 2* M. Shahzad N.K. Lodhi 3 1. Student MSPM, SZABIST, Islamabad
Perception of Business Studies Teachers on the Infuence of Large Class Size in Public Secondary Schools in Yobe State, Nigeria
Perception of Business Studies Teachers on the Infuence of Large Class Size in Public Secondary Schools in Yobe State, Nigeria Mrs Jummai Mamman E-mail: [email protected] A. T. B. U, Bauchi Mrs Aishatu
Management Information System and Senior Staff Job Performance in Polytechnics, Kwara State, Nigeria
Management Information System and Senior Staff Job Performance in Polytechnics, Kwara State, Nigeria A.Y. Abdulkareem 1 *, A.T. Alabi 1, C. O. Fashiku 2 and O. P. Akinnubi 3 1 Department of Educational
Some Special Artex Spaces Over Bi-monoids
Some Special Artex Spaces Over Bi-monoids K.Muthukumaran (corresponding auther) Assistant Professor PG and Research Department Of Mathematics, Saraswathi Narayanan College, Perungudi Madurai-625022,Tamil
The Effectiveness of the Accounting Information System Under the Enterprise Resources Planning (ERP)
The Effectiveness of the Accounting Information System Under the Enterprise Resources Planning (ERP) A Study on Al Hassan Qualified Industrial Zone s (QIZ) Companies Ali Alzoubi Department of Accounting,
Modeling and Optimization of Performance of Four Stroke Spark Ignition Injector Engine
Modeling and Optimization of Performance of Four Stroke Spark Ignition Injector Engine Okafor A. A. Achebe C. H. Chukwuneke J. L. Ozoegwu C. G. Mechanical Engineering Department, Nnamdi Azikiwe University,
Issues and Challenges in the Nigerian Electricity Industry: Case of Benin Electricity Distribution Company
Issues and Challenges in the Nigerian Electricity Industry: Case of Benin Electricity Distribution Company Roland Uhunmwagho Kenneth E. Okedu * Department of Electrical Engineering, College of Engineering,
European Journal of Business and Management ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online) Vol.7, No.1, 2015
ISSN 2222-905 (Paper) ISSN 2222-2839 (Online) Vol.7, No., 205 Impact of Customer Relationship Marketing on Market Performance in Banking Sector A Study on Bank of Ceylon and Hatton National Bank Customers
Working Capital Management & Financial Performance of Manufacturing Sector in Sri Lanka
Working Capital Management & Financial Performance of Manufacturing Sector in Sri Lanka J. Aloy Niresh [email protected] Abstract Working capital management is considered to be a crucial element in determining
European Journal of Business and Management ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online) Vol.5, No.30, 2013
The Impact of Stock Market Liquidity on Economic Growth in Jordan Shatha Abdul-Khaliq Assistant Professor,AlBlqa Applied University, Jordan * E-mail of the corresponding author: [email protected] Abstract
Analysis of Building Performance Evaluation and Value Management as Tools in Building Facilities Management
Analysis of Building Performance Evaluation and Value Management as Tools in Building Facilities Management Kevin Chuks Okolie 1* and Charles Yemi Adedeji 2 1. Faculty of Environmental Sciences, Nnamdi
Segmentation in Manufacturing and Service Industry: a Key to Profitability
Segmentation in Manufacturing and Service Industry: a Key to Profitability Dr. Omboi Bernard Messah (PhD)(corresponding author) School of Business & Management Studies Kenya Methodist University P O box
Present and Desired Network Management to Cope with the Expected Expansion, NM-AIST Study Case.
Present and Desired Network Management to Cope with the Expected Expansion, NM-AIST Study Case. Shadrack Stephen Madila, George Sizya Germinous, Sarah Nyanjara Magoti ICT department, Moshi University College
Working Capital Investment and Financing Policies of Selected Pharmaceutical Companies in Bangladesh
Working Capital Investment and Financing Policies of Selected Pharmaceutical Companies in Bangladesh Abstract: Md. Nazrul Islam * Shamem Ara Mili Department of Accounting and Information Systems, Comilla
Consumers Perceptions on Privacy and Security in Ecommerce
Consumers Perceptions on Privacy and Security in Ecommerce Hadge A. Encio, DBA College of Administrative and Financial Sciences, AMA International University Bahrain, Salmabad, Issa Town, Kingdom of Bahrain
Student Motivation and Preference of Studying Hospitality and Tourism. Management Programmes in Polytechnics: A Study of Hospitality and Tourism
Student Motivation and Preference of Studying Hospitality and Tourism Management Programmes in Polytechnics: A Study of Hospitality and Tourism Management Students-Ho Polytechnic 1* Appaw-Agbola Esther
School ICT Policy, a Factor Influencing Implementation of Computer Studies Curriculum in Secondary Schools.
School ICT Policy, a Factor Influencing Implementation of Computer Studies Curriculum in Secondary Schools. Nathan Murithi 1* David Gitonga 2 Peter Kimanthi 3 1. Department of Education, Chuka University,
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
A Critical Analysis of School Principals Competence in Financial Management in Kenya: Accountability in Educational Planning and Management
A Critical Analysis of School Principals Competence in Financial Management in Kenya: Accountability in Educational Planning and Management Margaret N. Wagithunu, John Muthee, Dr. Ruth Thinguri School
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
Investigating the Performance of VOIP over WLAN in. Campus Network
Investigating the Performance of VOIP over WLAN in Campus Network 1 U. R. ALO and 2 NWEKE HENRY FRIDAY Department of Computer Science Ebonyi State University Abakaliki, Nigeria 1 Email:- [email protected]
The usage of human resource information systems in HR processes in select software companies in Bangalore City India.
The usage of human resource information systems in HR processes in select software companies in Bangalore City India. Dr M Nishad Nawaz MBA., MHRM., M.Phil.,Ph.D.(Corresponding Author) College of Business
Factors Affecting The Quick Completion Of Project Research By. Bachelor Of Education (B.Ed) Students Of Distance Learning In
Factors Affecting The Quick Completion Of Project Research By Bachelor Of Education (B.Ed) Students Of Distance Learning In Alvan Ikoku Federal College Of Education Owerri, Nigeria *C. O. Nwokocha, A.B
FAQ. Autodesk License Compliance. Version 3.0 01 03 2009. [email protected]
FAQ Autodesk License Compliance Version 3.0 01 03 2009 [email protected] FAQ on Autodesk License Compliance Contents End User License Agreement...2 Training...6 Product Activation Details...9
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
Chapter 15: Computer Security and Privacy
Understanding Computers Today and Tomorrow 12 th Edition Chapter 15: Computer Security and Privacy Learning Objectives Explain why all computer users should be concerned about computer security. List some
Management Information System Design on Human Resource Management of Kampala International University: Design and Implementation.
Management Information System Design on Human Resource Management of Kampala International University: Design and Implementation. Achola A.* Rose School postgraduate and Research Box 20000,Kampala, Uganda
Impact of Entrepreneurial Characteristics on the Organizational Development of the Small Business Entrepreneurs
Impact of Entrepreneurial Characteristics on the Organizational Development of the Small Business Entrepreneurs Kamalakumati Karunanithy 1 & Sathiyakala Jeyaraman 2 1. Senior Lecturer, Dept. of Business
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
Demographic Analysis of Factors Influencing Purchase of Life Insurance Products in India
Demographic Analysis of Factors Influencing Purchase of Life Insurance Products in India Dr. Divya Negi * Praveen Singh Dept. of Management Studies, Graphic Era University, Dehradun-248002, Uttarakhand,
Labor Relations Practices of Selected Companies
Labor Relations Practices of Selected Companies Manolo Logroño Anto, Ph.D College of Administrative and Financial Sciences, AMA International University - Bahrain Email: [email protected]; [email protected].
Software Asset Management Guide
Software Asset Management Guide WHY MANAGE SOFTWARE ASSETS Introduction IN TODAY'S ECONOMY, software is indispensable to every organization, large and small. Thanks to software, businesses are more efficient
Technology in the Classroom: a Tool or a Drag
Technology in the Classroom: a Tool or a Drag Pauline Ann Baba (Doctoral Student) University of Phoenix, Phoenix Arizona. United States of America E-mail: [email protected] Abstract Technology use
Network Traffic Analysis: A Case Study of ABU Network
Network Traffic Analysis: A Case Study of ABU Network SB.A. Mohammed Dr.S.M Sani Dr. D.D. DAJAB Department of Electrical and Senior Lecturer, Department of Director ICT, ABU Zaria Computer Engineering,
Nurses' Knowledge, Attitude and Practices of Nursing Informatics System in Outpatient Clinics of Children's Cancer Hospital (57357) at Cairo
Nurses' Knowledge, Attitude and Practices of Nursing Informatics System in Outpatient Clinics of Children's Cancer Hospital (57357) at Cairo Rania Ebrahem 1 * Soheir El-Din 2 Nagat Habib 2 Samerra Abou
Colour in Instructional Computer Graphics Design and Students Performance in Fine Arts in Private Secondary Schools in Akwa Ibom State of Nigeria
Colour in Instructional Computer Graphics Design and Students Performance in Fine Arts in Private Secondary Schools in Akwa Ibom State of Nigeria Anselem Nyah (Ph.D) Department of Fine and Industrial Arts,University
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
Efficient Cell Phone Keypad Designing for Bangla SMS Using English Alphabets
Efficient Cell Phone Keypad Designing for Bangla SMS Using English Alphabets Shamsun Nahar 1* Sultana Akter 2 M. R. Khatun 3 1. Department of Computer Science and Engineering, International Islamic University
RFID Based Automatic Shopping Cart
RFID Based Automatic Shopping Cart Ankit Anil Agarwal (Corresponding Author) Tel: +91-9881104860 E-mail: [email protected] Saurabh Kumar Sultania Tel: +91-8055367456 E-mail: [email protected]
ELECTRONIC INFORMATION SECURITY A.R.
A.R. Number: 2.6 Effective Date: 2/1/2009 Page: 1 of 7 I. PURPOSE In recognition of the critical role that electronic information systems play in City of Richmond (COR) business activities, this policy
CITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION
CITY OF WAUKESHA HUMAN RESOURCES POLICY/PROCEDURE POLICY B-20 SOFTWARE USAGE AND STANDARDIZATION 1.0 Purpose and Scope of Policy It is the policy of the City of Waukesha (City) to respect all computer
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
MyUSBOnly User Guide Menu
MyUSBOnly User Guide Menu Welcome - Lock the Bad Guys out of your USB ports!... 2 System Requirement... 4 Important Notes... 4 FAQ How to install a trial version MyUSBOnly?... 5 FAQ How to buy and install
Adoption of Mobile Money Transfer Technology: Structural. Equation Modeling Approach
Adoption of Mobile Money Transfer Technology: Structural Equation Modeling Approach Peter Tobbin Center for Communication, Media and Information Technologies, Aalborg University, Denmark Tel: +233202010808;
Parents Influences and the Entrepreneurship Occupational Aspirations of Wards in Technical Schools in Akwa Ibom State
126 Parents Influences and the Entrepreneurship Occupational Aspirations of Wards in Technical Schools in Akwa Ibom State Dr Nsikak-Abasi Udofia & Essien, Okoro Akpan Faculty Of Education University Of
Global Server Installation Guide
Global Server Installation Guide AVEVA Solutions Ltd Disclaimer Information of a technical nature, and particulars of the product and its use, is given by AVEVA Solutions Ltd and its subsidiaries without
MAXIMUM PROTECTION, MINIMUM DOWNTIME
MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is
The Impact of Mass Media Communication on Stock Trading Decisions: An Empirical Study
The Impact of Mass Media Communication on Stock Trading Decisions: An Empirical Study Prem Malhotra 1* Sunita Malhotra 2 1. Anand Engineering College, SGI, Keetham, Agra, India 2. Dayalbagh Educational
Business Drivers for CRM Adoption in the Software Services Sector: A Case Study Analysis
Business Drivers for CRM Adoption in the Software Services Sector: A Case Study Analysis Abstract Pradeep Kootelu Sundar 1*, H. N. Narasimha Murthy 1,2, P. S. Yadapadithaya 1 1. Department of Commerce,
Professional Development of Teachers in Higher Education
Professional Development of Teachers in Higher Education Anupama Gupta Selection Grade Lecturer in Mathematics,Govt. College for Women, Parade Ground Jammu, J&K, India Email of author [email protected]
Secure Data Transmission by using Steganography
Abstract Secure Data Transmission by using Steganography R.M. Goudar, Prashant N. Patil, Aniket G.. Meshram*, Sanyog M. Yewale, Abhay V. Fegade Computer Engineering Department, Pune University, MAE, Alandi
Management of Hardware Passwords in Think PCs.
Lenovo Corporation March 2009 security white paper Management of Hardware Passwords in Think PCs. Ideas from Lenovo Notebooks and Desktops Workstations and Servers Service and Support Accessories Introduction
Budget Preparation and Implementation in the Nigerian Public Sector
Budget Preparation and Implementation in the Nigerian Public Sector Lawyer, Chukwuma Obara (Ph.D) Senior Lecturer/Head Department of Accountancy, Rivers State University of Science and Technology Port
Cyber Essentials Questionnaire
Cyber Essentials Questionnaire Introduction The Cyber Essentials scheme is recommended for organisations looking for a base level Cyber security test where IT is a business enabler rather than a core deliverable.
Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.6, No.4, 2015
A Review of Impacts of Bring Your Own Device (BYOD) and Nomadic Computing on Enterprise Security Policies Compliance: The Case of Higher Learning Institutions in Kenya Peter Namisiko 1* Dr. William Sakataka
Supplier IT Security Guide
Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA
A PERSPECTIVE STUDY OF CLOUD COMPUTING IN LIBRARY SERVICES
A PERSPECTIVE STUDY OF CLOUD COMPUTING IN LIBRARY SERVICES Mrs. G. Mangai, Librarian, C.P. A. College, Bodinayakkanur. [email protected] Dr. P. Ganesan, Asst. Librarian Alagappa University Karaikudi
Land Vehicle Tracking System Using Java on Android Platform
Land Vehicle Tracking System Using Java on Android Platform Ramesh Chandra Gadri * Bhagyshree Alhat Ankita Chavan Sujata Kamble Reema Sonawane Computer Engineering Department, Pune University, MAE, Alandi
Technical Note: How to Move AccountMate for SQL/Express to a Different Server
Article # 1166 Technical Note: How to Move AccountMate for SQL/Express to a Different Server Difficulty Level: Intermediate Level AccountMate User and Beginner Level MSSQL Programmer Version(s) Affected:
A Study on Customer Retention Strategies in Consumer Durable Goods
Vol.5, No.18, 13 A Study on Customer Retention Strategies in Consumer Durable Goods Dr A R Krishnan * Mr.P.B. Govindarajan School of Management, SRM University, Kattankulathur-33, Tamilnadu, India. * E-mail
Contract For Virtual Servers With Canaca.com =============================================================== ================
Contract For Virtual Servers With Canaca.com =============================================================== ================ -Content Transmission, storage, or presentation of any information, data or
Valdosta State University. Information Resources Acceptable Use Policy
Valdosta State University Information Resources Acceptable Use Policy Date: December 10, 2010 1. OVERVIEW... 3 2. SCOPE... 3 3. DESIGNATION OF REPRESENTATIVES... 3 3.1 UNIVERSITY PRESIDENT... 3 3.2 VICE
Determinants of Customer Relationship Marketing of Mobile Services Providers in Sri Lanka: - An application of Exploratory Factor Analysis
Determinants of Customer Relationship Marketing of Mobile Services Providers in Sri Lanka: - An application of Exploratory Factor Analysis Velnampy 1* S.Sivesan 2 1. Prof and Dean, Faculty of Management
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
How to Turn the Promise of the Cloud into an Operational Reality
TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing
