Infonomics Society

United Kingdom

Infonomics Society

United Kingdom

Time filter

Source Type

Ayodele T.,Infonetmedia Research Laboratory | Shoniregun C.A.,Infonomics Society | Zhou S.,University of Portsmouth
International Conference on Information Society, i-Society 2011 | Year: 2011

The email urgency reply prediction (EURP) is a way of handling, and determining em ails that require imperative reply with respect to time. Over the past few years, email has become the preferred medium of communication for many businesses and individuals. As a growing portion of our lives is captured over email exchanges, the phenomenon of the overcrowded and unmanaged inbox is becoming an increasingly serious impediment to communications and productivity. This research work focuses on the broader goal of providing users with effective applications to determine mails that require urgent replies-the task of urgency reply prediction has a sustainable economic benefits to both private and public sectors. © 2011 IEEE.


Ayodele T.,Infonetmedia Research Laboratory | Shoniregun C.A.,Infonomics Society | Akmayeva G.,Infonomics Society
International Conference on Information Society, i-Society 2011 | Year: 2011

E-learning allows us to learn anywhere, any place and any time as long as there is access to a configured computer system. E-learning can be network-based, intranet-based, internet-based, cd/dvd-based. It can include audio, video, text, animation and virtual environments. However, the increase of elearning tools by allowing the creation learning environments does create loop holes for security bridges such as: inadequate authentication for online assessments, identity theft, and impersonation. We propose a new framework that can reduce the security risks, and provide an intelligent e-learning preventive mechanism (IEPM) to identify users' pattern of behaviour in order to determine the level of risks and recommend preventive measures. © 2011 IEEE.


Ayodele T.,Infonetmedia Research Laboratory | Shoniregun C.A.,Infonomics Society | Akmayeva G.A.,Infonomics Society
World Congress on Internet Security, WorldCIS-2011 | Year: 2011

There are hundreds of email summarization tools nowadays. One of the challenging issues of email summarization is to determine how to secure email summaries from spoofing and bombing and to provide preventive measures. Email is one of the most ubiquitous applications used on a daily basis by millions of people world-wide, traditionally accessed over a fixed terminal or laptop computer. In the past years, there has been an increasing demand for email access over mobile phones too. Our work focused on providing security review measures and preventing approaches that provide quality email summaries with secure transmissions over the network. © 2011 WorldCIS.


Ayodele T.,Infonetmedia Research Laboratory | Shoniregun C.A.,Infonomics Society | Akmayeva G.,Dublin Institute of Technology
World Congress on Internet Security, WorldCIS-2012 | Year: 2012

This paper presents machine learning anti-phishing technique (MLAPT) - a machine learning framework that applies knowledge intensive approach to detect and prevent phishing attacks on email systems. Preventions, detections and a higher level of prevention measure can be guaranteed. The system is evaluated against a database of human-judged phishing scenarios, reaching satisfactory level of performance. © 2012 Infonomics Society.


Savage N.,University of Portsmouth | El Assad S.,University of Nantes | Shoniregun C.A.,Infonomics Society
2012 International Conference for Internet Technology and Secured Transactions, ICITST 2012 | Year: 2012

Welcome to the International Conference for Internet Technology and Secured Transactions. The steering committee will like to thank Khalifa University (Abu Dhabi) for hosting ICITST in 2011. © 2012 Infonomics Society.


Caragata D.,Federico Santa María Technical University | El Assad S.,CNRS Institute of Electronics and Telecommunications, Rennes | Shoniregun C.,Infonomics Society | Akmayeva G.,Infonomics Society
Security and Communication Networks | Year: 2014

One of the most important Universal Mobile Telecommunications System security breaches that were identified was the identity catching vulnerability. Whenever the user turns his mobile device on or if the service network fails, the International Mobile Subscriber Identity will be sent in clear over the radio link. This allows the International Mobile Subscriber Identity to be intercepted by an attacker who can use it for different purposes. In this paper, we present a Confidential Initial Identification Protocol that protects user identity and also offers the support for further Universal Mobile Telecommunications System security improvement, especially in the authentication and key agreement protocol and the security algorithms negotiation protocol. We show that these new protocols solve the identity catching vulnerability, limit the secret key exposure to cryptographic attacks, and increase the level of confidence of the user and the home network put in the service network. © 2013 John Wiley & Sons, Ltd.


Shoniregun C.A.,Infonomics Society | Dube K.,Massey University | Mtenzi F.,Dublin Institute of Technology
Advances in Information Security | Year: 2010

Securing personal e-Healthcare information aims mainly at protecting the privacy and confidentiality of the individual who receives healthcare services that are delivered through e-Health. Advances in security technologies have so far not eliminated the challenge posed by the need to secure e-Healthcare information. The rate of privacy and confidentiality breaches continue to increase unabated. These breaches pose challenges to all domains that converge on the task of securing information and building trust in e-Healthcare information management. Only a holistic approach that positions itself at the point of convergence of the domains of law, organisational policy, professional ethics and IT security could offer the promise to mitigate, if not eliminate, the major challenges to securing e-Healthcare information. © Springer Science+Business Media, LLC 2010.


Shoniregun C.A.,Infonomics Society | Dube K.,Massey University | Mtenzi F.,Dublin Institute of Technology
Advances in Information Security | Year: 2010

The e-Healthcare information offers unique security, privacy and confidentiality challenges that require a fresh examination of the mainstream concepts and approaches to information security. The significance of security and privacy in e-Healthcare information raised the issues of individual consent, confidentiality and privacy, which are the main determinants in adopting and successful utilising the e-Healthcare information. Current trends in the domain of e-Healthcare information management point to the need for comprehensive incorporation of security, privacy and confidentiality safeguards within the review of e-Healthcare information management frameworks and approaches. This raises major challenges that demands holistic approaches spanning a wide variety of legal, ethical, psychological, information and security engineering. This introductory chapter explores information security and challenges facing e-Healthcare information management. © Springer Science+Business Media, LLC 2010.


Shoniregun C.A.,Infonomics Society | Dube K.,Massey University | Mtenzi F.,Dublin Institute of Technology
Advances in Information Security | Year: 2010

The domain of security engineering has developed some agreed core concepts but it lacks comprehensive framework. This could be seen to be particularly the case for e-Healthcare information systems. Evaluation deals with how other people can be convinced that security and privacy protection measures that have been put in place will work. Anderson has defined evaluation of systems as the process of assembling evidence that a system meets, or fails to meet, a prescribed assurance target and identifies two main purposes, which are: to convince one's superiors that work has been done and completed in compliance with standards and laws and to reassure people who will rely on a product or system. Evaluation is a function of the question of whether the system will actually work, which is termed assurance (Anderson and Cardell, 2008). Thus, the lower the likelihood, the higher the assurance there can be and the higher the likelihood, the less the assurance there can be. This chapter explores the solutions and technologies currently available for evaluating security and privacy problems in e-Healthcare information systems. © Springer Science+Business Media, LLC 2010.


Akmayeva G.,Infonomics Society | Shoniregun C.,Infonomics Society
2010 International Conference on Information Society, i-Society 2010 | Year: 2010

The ubiquitous nature of e-Learning applications in dealing with huge and diverse population of users creates the gap for errors and malicious attacks. The ability to quickly estimate security risks is particularly crucial for automated assessment of e-learning. What type of measures is taken to keep the privacy and integrity of the information stored? And whether there are mechanisms that can prevent cheating when performing online examinations? In most cases, the e-Learning applications are designed and implemented to combine distinct services into a coherent whole in order to fulfil sophisticated tasks that cannot be fulfilled by a single service. Therefore, an awareness of threats and their countermeasures are essential, as e-Learning does not operate in a vacuum. This paper focuses on the ontology of E-Learning security. © 2010 i-Society.

Loading Infonomics Society collaborators
Loading Infonomics Society collaborators