فهرست مطالب

International Journal of Information Science and Management
Volume:5 Issue: 1, Jan-Jun 2007

  • تاریخ انتشار: 1385/05/11
  • تعداد عناوین: 8
|
  • M. Shirali Shahreza, M. H. Shirali Pages 1-9

    Virtual learning is a new idea that has gotten a new form with the emergence of new technologies such as the wireless networks. The mobile phone (cell phone) is a device that is used by most people nowadays. Therefore، one can use the mobile phone for virtual learning on a wide scale. One of the popular and at the same time simple and inexpensive services on the mobile phone is the SMS (Short Message Service). In this paper، we propose a method for taking multiple-choice quizzes by using the SMS on mobile phones. In the provision of these tests، after coding the questions with a key، some SMS messages were sent to the student along with the answers of the questions، which were steganography in an image. The student، after receiving and answering the questions، receives his grade at the client-side and then the grade and student answers are hidden in an SMS picture message and sent back to the instructor. Also، the location of student and the time that he took the exam are sent to the instructor by another SMS to prevent the possibility of any cheating. Moreover، the correct answers of the questions are destroyed within the image after they are extracted from image so as to eliminate the possibility of any cheating. The instructor also، after receiving the image and extracting the grade، records the student’s grade. Moreover، the instructor can find any cheating by comparing students locations، times they took the exam and their answers. Because of using the steganography method in sending the answers and grades، and also sending the student’s location and time of quiz، this method is highly secure and the possibility of cheating in the exam is reduced. This method was implemented with the J2ME language on a Nokia 3250 mobile phone.

  • A. Bahreininejad, Gh. A. Montazer Pages 11-27
    The subject under investigation has been Electronic Learning (e-learning) or Electronic Education (e-education), specifically concentrating on virtual university. Virtual university has been the subject of much debate in recent years. In short, the concept of virtual university denotes a learning/educational system/environment based on Internet where higher education is promoted using tools and techniques from information and communication technology domain. A number of virtual university projects have recently been launched in Iran. However, this subject area is currently under intense exploration at various governmental and academic levels in Iran. This paper presents a proposed adaptive and intelligent virtual university architectural system and places its emphasis on the national implementation of virtual education in Iran. Finally, comparative studies are presented and conclusions are drawn.
  • R. Fattahi Pages 29-40
    Information organization (i.e., cataloging, classification, abstracting and indexing) is a crucial service in libraries and information centers. Modern and standard practices in this regard started around 1960s in Iran. This paper outlines the development of modern practices in information organization in Iran. It illustrates how Iranian libraries and information centers implement standard practices and organize information for easy access. A number of international standard tools for information organization, such as AACR, ISBD, LCC, DDC, LCSH and MESH have been modified to fulfill the needs of different types of libraries. The CIP project is successfully implemented nationwide and the Iranian National Bibliography is now a standard source available online and on disc. Furthermore, indexing and abstracting services in Iran benefit from standard practices. So far many general and subject thesauri have been developed and used in Iran. A major step towards information organization is the design and development of a considerable number of online and on disc databases by Iranian libraries and information centers. Teaching, research and publishing in information organization are flourishing due to the establishment of many library departments and schools during the last two decades.
  • M. H. Dayani Pages 41-51
    This article aims at describing three points on Library and Information Science Journals of Iran: (1) how Farsi Library and Information articles are produced and published in Library and Information Science Journals? In this regard, six routes of producing journals were investigated: the route of native culture; the route of the current status of book and library in Iran; the route of the past and current status of book and library out of Iran; the route of making connections among dispersed works in works of Library and Information Science written in Farsi; the route of translating non-Farsi works into Farsi ones; and finally the route of the current works produced whithin Library and information science in Iran, (2) what criteria are used for ranking Farsi journals and what is the status of Farsi Journals of Library and Information Science in this ranking? And finally (3) a brief history of six journals of Library and Information Science with circulation and three that are no longer published is presented.
  • S. Koleini, J. Mehrad Pages 53-64
    With the increase of the volume of information and the progress in technology, the deficiency of traditional algorithms for fast information retrieval becomes more clear. When large volumes of data are to be handled, the use of neural network as an Artificial Intelligent technique is a suitable method to increase the information retrieval speed. Neural networks present a suitable representation of knowledge in retrieval applications. The nodes in neural network, present the items of information retrieval such as keywords, authors,… and links are used for data transfer between layers. Finally, it results in a network output that is a retrieval document. In this article, the use of SOM neural network for data clustering is shown. A model of SOM neural network for a sample information retrieval from INIS database is implemented.
  • A. Sanayei Pages 65-73
    Information security is one of the most important enterprise assets. For any organization, information is valuable and should be appropriately protected. Also, security is to combine systems, operations, and internal controls to ensure the integrity and confidentiality of data and operation procedures in an organization. Knowing the fact that with serious threat of unauthorized users on the Internet, information security is facing unprecedented challenges, and effective information security management is one of the major concerns. Moreover, the field of computer and information security focuses on designing measures that can enforce security policies, especially in the presence of malicious attack. On the other hand, security in E-commerce generally, employs procedures such as authentication, ensuring confidentiality, and use of cryptography to communicate over an open system. In this paper, we will discuss the security in cyberspace and recommend some suggestion for application of security in e-commerce.
  • M. O. Shereif Mahdi Pages 75-85
    This paper draws on empirical research conducted in Sudan to examine the process of management of IT and organizational change in Sudanese Banking Industry (SBI). The study used dual methodology which included quantitative and qualitative techniques and focused on presenting findings on the process of managing and implementing IT in the SBI. Deductive and inductive data present very strong evidence to support the hypotheses that the General Managers do not view IT change as a key element of their work and this limited involvement constrains the process of change. Decision-making process to implement IT in the SBI was a top down model, and the main reason for the adoption of IT in Sudanese banks was to provide better banking services.
  • H. Jahankhani Pages 87-98
    The menace of organized crime and terrorist activity grows ever more sophisticated as the ability to enter, control and destroy our electronic and security systems grows at an equivalent rate. Cyber-crime (organized criminal acts using microchip and software manipulation) is the world’s biggest growth industry and is now costing an estimated $220 billion loss to organizations and individuals every year. There are serious threats to nations, governments, corporations and the most vulnerable group of all, individuals. Cyber-crime combines the same methods of traditional crime identifying targets, using surveillance and psychological profiling but has added-in levels of duplicity in that the perpetrators need never actually be at the scene of the crime. Indeed, the traditional idea of a criminal gang is meaningless in that the unit may exist but each member resides on a different continent and never needs to physically meet. The types of attack individuals face include confidence-trick telephone calls or actual encounters calculated to extract bank or personal details, computer spyware that opens on accessing the Internet, enticing users with offers of non-existent free gifts while copying confidential files, and programmes that can infiltrate networks, operating within them undetected, ultimately causing them to crash. Information and services provided on the Internet which can be utilized by any person(s) with access bring to fore the concept of legislations. Thus, cyber laws and legislations refer to those guidelines and regulations put in place to ensure that information and services so displayed and acquired on the Internet meet a standard within the e-society. This paper aims to review these legislations and showcase their impact and relevance to the society for which they are formulated. Finally, the question whether the current Internet legislation is adequate to protect the society is also raised.