International Journal of Information Engineering and Electronic Business (IJIEEB)

IJIEEB Vol. 14, No. 5, Oct. 2022

Cover page and Table of Contents: PDF (size: 708KB)

Table Of Contents

REGULAR PAPERS

Technologies Ensuring the Sustainability of Information Security of the Formation of the Digital Economy and their Perspective Development Directions

By Alovsat Garaja Aliyev

DOI: https://doi.org/10.5815/ijieeb.2022.05.01, Pub. Date: 8 Oct. 2022

The article is devoted to the technologies to ensure the sustainability of information security in the formation of the digital economy and their prospects. It has been shown that the digital transformation of the economy and society is a priority for the advanced countries of the world. It was argued that the safe and sustainable formation of an intellectual society and economy based on new information, knowledge and technology is one of the main goals. The features of the transition from an industrial economy to a new ICT-based information economy were analyzed. The issues of digital transformation of real economic sectors were considered. It was noted that ensuring the development of the modern economy on the basis of digital technologies, the development of high-tech sectors is one of the main goals. Potential areas for digitization of the economy have been identified. The economic features of the main technologies that shape the digital economy have been studied. The stages of analysis of the secure development of the digital economy sectors have been developed. Many concepts of the digital economy are systematized and approaches to its features are explained. Forecast options for the impact of the digital economy on GDP in the countries of the world are given. Mechanisms to ensure economic security, investment forecasts made by different countries to ensure economic cybersecurity are given. Research on the level of economic security and the main threats to the economy was analyzed. The main directions of security of the national economy and the main factors affecting the economic security of the country have been identified. Current approaches to economic security are summarized. The main types of economic security are given and a system of indicators is defined. The structural elements of the system of indicators for the analysis of economic security are proposed. System indicators have been developed to analyze the sustainability of economic security. Criteria for assessing the sustainability of regional economic security have been proposed. The assessment of the cybercrime market in the world is one of the most important issues and the most common types of cyber attacks are shown. An analysis of the state of growth in the field of cyberattacks in different years and the main stages of the evolution of cybersecurity are described. Proposals and recommendations have been developed in accordance with the experience of advanced countries on intelligent cybersecurity technologies.

[...] Read more.
Sustainable E-waste Management at Higher Education Institutions’ Data Centres in Zimbabwe

By Vusumuzi Maphosa

DOI: https://doi.org/10.5815/ijieeb.2022.05.02, Pub. Date: 8 Oct. 2022

The study’s objective was to examine the management of data centre electronic waste (e-waste) by Zimbabwean universities to ensure environmental sustainability and reduce the epidemiological effect of indiscriminate disposal of e-waste. The 21st century has seen universities adopting Information and Communication Technology (ICT) to automate processes and support technology-based learning, raising demands for data centre infrastructure to run applications and store data. In developing countries, obsolete ICT equipment is indiscriminately discarded with municipal waste into landfills and often scavenged to extract valuable metals using rudimentary methods such as heating, burning, and leaching, causing environmental and epidemiological crises. E-waste is the fastest growing stream of solid waste that contains scarce rare earth minerals and toxic elements, presenting an opportunity and a crisis during disposal. The study utilised the descriptive study design through a quantitative questionnaire to collect data from ICT Directors and Managers from Zimbabwean universities. Results show that a fifth of the participants had operational procedures for handling e-waste. A tenth of the participants knew of the existence of national policies. Obsolete equipment was kept in storerooms, while some were discarded with municipal trash. Most respondents were aware of the effect of e-waste, which is attributed to responsible management. Most participants redeployed decommissioned data centre equipment to less intense processing environments; 28% had labelled bins and designated e-waste collection points. In reducing their carbon footprint, three-quarters of the participants virtualised servers and stored data on the cloud, and 10% of the institutions practised take-back schemes and located data centres onsite. Universities should legislate the management of data centres to control carbon emissions, energy and e-waste and contribute to green initiatives. Partnerships with developed countries for data centre design and high-end recycling should be encouraged, thus creating employment, generating income for institutions and reducing the epidemiological effects.

[...] Read more.
Modeling and Analysis of Disturbance on Three Phase Induction Motor at CFPP Tanjung Enim 3x10 MW Using Matlab/Simulink

By Destra Andika Pratama Masayu Anisah Andi Setiyadi

DOI: https://doi.org/10.5815/ijieeb.2022.05.03, Pub. Date: 8 Oct. 2022

Three phase induction motor are very used widely, especially in industries because they bring advantages, namely simple and sturdy motor construction, relatively cheap prices, easier maintenance compared to other types of motors. At CFPP Tanjung Enim 3x10 MW, for example, a three phase induction motor used to support operational activities of the generator is a coal feeder with a motor power of 7.5 kW and a volt of 380 V. Damage to the induction motor at CFPP Tanjung Enim 3x10 MW has an impact on the a decrease in the performance of the Power Plant and can cause a loss of electricity production. Induction motor damage simulation is carried out by providing temporary disturbances, namely inter-phase disturbances and phase-to-ground faults which assume a sudden disturbance when the motor is operating normally. The parameters observed in this simulation are voltage (V), current (A) and motor rotation (Rpm). simulation results that have been carried out, it is found that disturbances in a three phase induction motor greatly affect the performance of the motor, such as when getting a phase to phase and phase to ground short circuits, the voltage will drop, the current will rise rapidly and rotation the motor will stop. By using Matlab software the author hopes to provide the right modeling to analyze the damage to the induction motor.

[...] Read more.
Analysis of the New Generation source-to-source Compilers Using the Google Web Toolkit

By Kire Jakimoski Blagoja Chavkovski

DOI: https://doi.org/10.5815/ijieeb.2022.05.04, Pub. Date: 8 Oct. 2022

The role of source-to-source compilers nowadays increases faster since each high-level language is in a need to gain more recognition in each field of development. One of the fields that became very popular in the last ten years is web development, where the browsers became the “machines” of our everyday life. They are relevant and powerful, and the only drawback they have is that they only understand one language, that is JavaScript. The need of other languages to be included in the client side of the web development, created the steam for source-to-source compiling, sometimes referred as Transpiling, where one high level language as Java, C, C# and many others are translated mostly, but not solely, to JavaScript. A famous tool that is well recognized is Google Web Toolkit (GWT) which translates Java source code to JavaScript source code. The core of this tool is the compiler which is covered in great details in this paper. Main goal and benefit of this paper is to analyze and compare the difference of the process of translation to JavaScript by transpiler to the process of “normal” compiling and to highlight key aspects of this process.

[...] Read more.
Web Applications Login Authentication Scheme Using Hybrid Cryptography with User Anonymity

By Bello Alhaji Buhari Afolayan Ayodele Obiniyi

DOI: https://doi.org/10.5815/ijieeb.2022.05.05, Pub. Date: 8 Oct. 2022

It is a common requirement for modern web applications as many if not all services that need personalization and control of access move online. Due to increase in these services becoming online, login authentications become targets to attackers. Therefore, there is need for secure and efficient web application login authentication schemes to ensure users access control, security and privacy. Present schemes have limitations such as users spent a lot of time browsing to create image portfolios than to create passwords and PINs, subject to active impersonation attack, some will only suit well for financial transaction system due to the TIC involved, some may have hash collisions, some require addition BLE device to be install and available on the authentication systems and cannot be used for higher data rates and long distance unlike cellular and WiFi devices, some involves reuse of password at single or multiple service providers which may lead to a password reuse attack called domino effect and some work well in application that needs to share permission with other applications like social media applications inform of APIs and improvising of user anonymity. We propose an improved web application login authentication scheme using hybrid cryptography with user anonymity. The improved scheme used blowfish – the most efficient private key algorithm, Elgamal – very secure public key algorithm and SHA-2 hash function combined together to enable high performance and security. The methods are thoroughly discussed and its security evaluated to show that it provides password protection, user privacy, perfect forward secrecy, mutual authentication and security against impersonation attack.

[...] Read more.