American Journal of Operations Management and Information Systems

Volume 2, Issue 1, February 2017

  • Wireless Network Security Threats, Vulnerabilities and Their Defences

    Alex Roney Mathew, Aayad Al Hajj

    Issue: Volume 2, Issue 1, February 2017
    Pages: 1-4
    Received: 30 October 2016
    Accepted: 22 November 2016
    Published: 3 January 2017
    DOI: 10.11648/j.ajomis.20170201.11
    Downloads:
    Views:
    Abstract: Interchanges through PCs, laptops, tablets, and mobiles nowadays triggered the spread of remote systems administration to reach high levels throughout the globe. Security issues have risen considerably in Wi-Fi systems due to the unapproved clients and Wi-Fi programmers. Thus to eliminate conceivable security issues, WEP (Wired Equivalent Privacy) ... Show More
  • Online Transaction Security Risk Management for E-commerce Web Applications

    Kuo-Sui Lin

    Issue: Volume 2, Issue 1, February 2017
    Pages: 5-14
    Received: 31 October 2016
    Accepted: 29 November 2016
    Published: 3 January 2017
    DOI: 10.11648/j.ajomis.20170201.12
    Downloads:
    Views:
    Abstract: Over the past decade, e-commerce creates exciting new opportunities for business but also brings new web application vulnerabilities and transaction security risks. A stream of news of phishing attacks, website spoofing, payment card skimming (credit /debit cards), fraud in online transactions, malware attack (malicious code attack of viruses, worm... Show More
  • Business Processes Modelling of the Karaganda Crisis Center Activity

    Olga Shikulskaya, Timur Esmagambetov

    Issue: Volume 2, Issue 1, February 2017
    Pages: 15-20
    Received: 31 October 2016
    Accepted: 24 November 2016
    Published: 5 January 2017
    DOI: 10.11648/j.ajomis.20170201.13
    Downloads:
    Views:
    Abstract: In this work the problems reducing effectiveness of activities of the situational center for liquidation of emergency situations in Kazakhstan have been revealed. For enhancement of the situational center activities the methods of the system analysis, business processes modeling, datalogical modeling, SADT technology, methodology of the balanced sc... Show More
  • Health Websites Evaluation in Saudi Arabia: A Case Study

    Sahar A. El_Rahman

    Issue: Volume 2, Issue 1, February 2017
    Pages: 21-31
    Received: 31 October 2016
    Accepted: 27 December 2016
    Published: 20 January 2017
    DOI: 10.11648/j.ajomis.20170201.14
    Downloads:
    Views:
    Abstract: Internet and web services are fast becoming critically important to business, industry and individuals. Where Creating online brand and community is the chief objective of web serving. They recognize that web-based systems can enhance their scale of communication as the Internet is capable of rendering large amounts of data in a speedy manner to th... Show More