When designed, technologies and frameworks are not created to be as dynamic and flexible as to cater to the requirements of other domains, and so is the case with Blockchain technology. Specifically designed for cryptocurrency, Blockchain was not intended to be used in other domains. However, during the past few years, critics argued that Blockchain has the potential to deal with some unique requirements like confidentiality and immutability and can therefore be deployed in several areas other than cryptocurrency. The use of Blockchain to support Accounting Information Systems (AIS) through enterprise resource planning (ERP) is another motivating domain to investigate in this research. ERP is another promising technology that has gained significant attention across the globe. In this research, a hybrid solution is proposed to ensure AIS data integrity against any deliberate attempt or mala-fide intention for alteration or deletion from the database that can be verified at any later stage. Since Blockchain can be used to prevent any mutability in the stored data, the proposed solution presents a concept of Data Vaults backed by the Blockchain. To this end, we apply cryptographic primitives like SHA256 on the data inside the block and then chain that block to secure data vaults. So far, Blockchain has not yet proven itself as an alternative to any traditional database system. However, it can be applied in conjunction with the Relational Database Management Systems (RDBMS) to provide cost-effective yet robust solutions. This research demonstrates the application of a simple and lean version of Blockchain to assist enterprises in storing their financial and accounting data into data vaults, ensuring their data integrity against any alterations. The suggested cost-effective framework can be easily integrated into AIS and ERP systems to identify data breaches.
Information Technology or IT is a combination of technology itself and a collection of IT services that ensure the effective implementation of overall Information Technology in an organization. Like other services, Information Technology Service Management (ITSM) has become a global subject because managing IT is only possible through efficient and effective ITSM protocols. A well-implemented ITSM delivery system improves the quality of IT services, which eventually enhances the organization's overall capacity and output. Public service delivery is closely dependent on the quality IT services that can be acquired through ITSM. This research study reviews some of the established ITSM standards and frameworks like FitSM, ITIL, CobiT, and ISO/IEC 20000 and proposes a most suitable and sustainable tool and its implementation roadmap for the digital transformation of public sector governance. For this pilot study, a public sector organization (PSO) working under the Government of Punjab (GoPb) was selected. This study focuses on an important area that has not yet been adequately addressed, where ITSM delivery can produce tremendous results. This study contributes to academics and researchers since it discusses the selection and implementation of a service management system (SMS) for a PSO while focusing on its needs, requirements, and available resources. In general, the qualitative analysis methodology is used in this research study, and specifically, it can be identified as applied research. The data is collected through a questionnaire, and the results are shown and discussed in the later sections.
The evolving necessity of the Internet increases the demand on the bandwidth. Therefore, this demand opens the doors for the hackers' community to develop new methods and techniques to gain control over networking systems. Hence, the intrusion detection systems (IDS) are insufficient to prevent/detect unauthorized access the network. Network Intrusion Detection System (NIDS) is one example that still suffers from performance degradation due the increase of the link speed in today's networks. In This paper we proposed a novel algorithm to detect the intruders, who's trying to gain access to the network using the packets header parameters such as; source/destination address, source/destination port, and protocol without the need to inspect each packet content looking for signatures/patterns. However, the "Packet Header Matching" algorithm enhances the overall speed of the matching process between the incoming packet headers against the rule set. We ran the proposed algorithm to proof the proposed concept in coping with the traffic arrival speeds and the various bandwidth demands. The achieved results were of significant enhancement of the overall performance in terms of detection speed.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.