International Journal of Information Systems and Change Management (4 papers in press)
Improved Secure RSA Cryptosystem (ISRSAC) for Data Confidentiality in Cloud
by THANGAVEL M, VARALAKSHMI P
Abstract: In today's business world, a huge amount of data has been generated every day, which cannot be stored or handled in a single premise. Technologies like cloud computing provide a generous storage service to outsource the business and personal data. The major research challenge of data outsourcing is ensuring data confidentiality. Data confidentiality resist the unauthorized access of the data through legislative procedures. One of the common and well known PKC is RSA cryptosystem. In this paper, an Improved Secure RSA Cryptosystem (ISRSAC) has been proposed to increase the complexity in factorizing the value of modulus 'n'. Existing integer factorization methods like number field sieve, Pollards (p-1), and Elliptic curve methods can be used to factorize the value of 'n' in RSA Cryptosystem. But, in ISRSAC, due to the complexity of computation in 'n', it is computationally difficult. A comparison is done with RSA, MREA  and ESRKGS  cryptosystems to show that ISRSAC is efficient. The experimental results prove that ISRSAC consumes more time for cryptanalysis compared to ESRKGS, MREA and RSA cryptosystems. Thus, ISRSAC is more secure for data outsourcing in the cloud.
Keywords: Cloud Computing; RSA; Cryptanalysis; Data Outsourcing; Confidentiality; Cryptography;.
The Effect of an Information Ethics Course on the Students\' Information Ethics Values: A Kohlberg\'s CMD Model\'s Perspective
by Christina Ling-hsing Chang
Abstract: Students\' information ethics values (IEVs) are critical and of radical importance in achieving the above title\'s goal. Based on the Mason four issues of information ethics which are privacy, accessibility, intellectual property, and accuracy, (PAPA), the present study utilizes Kohlberg\'s Cognitive Moral Development (CMD) model to measure the improvement in the students\' IEVs through an information ethics course (IEC). Therefore, this paper uses the ethical reasoning of 655 students, to recognize the power of a scenario-based survey. Meanwhile, this study employed non-parametric analytical methods to test the outcome of two groups of students that have/not have IEC training being two independent groups. This study finds that while the course improves students\' \"privacy,\" \"accuracy\" and \"intellectual property\" values, however, it decreases their \"respect rules\" and \"accessibility\" values. Moreover, these results are analyzed from learning theories (models) and from a Confucian ethics perspective (CEP). In light of these results, educators should take account of such improvements when designing effective teaching methods, and incentives, whilst considering the CEP.
Keywords: Information Ethics values; Kohlberg\'s CMD Model; Learning Theories; Information Ethics Course.
What determines work motivation of IT professionals: An integrated model
by Ling-Hsiu Chen, Xiaodan Zhou, Rung-Ching Chen, I-Hsueh Chen
Abstract: This study proposes an integrated model of the relationships among supervisory leadership style, employee achievement motivation, job characteristic perception, and work motivation of information technology (IT) professionals in China. LISREL is applied to test and analyze the proposed model. The results demonstrate that leadership style and employee personal achievement motivation positively influence job characteristic perception for IT professionals. However, leadership style only weakly influences job characteristic perception. Additionally, job characteristic perception positively influence work motivation. Thus employee personalities should be considered, specifically their achievement motivation before inspiring their positive perception on job characteristics when attempting to recruit IT professionals or improve the quality of existing IT staff.
Keywords: work motivation; job characteristics; achievement motivation; leadership style.
Heuristic based Time-Aware Multi-Criteria Test Case Prioritization Technique
by Uma Maheswari Rengarajan, Jeya Mala D
Abstract: Regression testing is a costly process used to validate the changed software code. Test case prioritization techniques enhance the cost-adequacy of regression testing by ordering the test cases such that more imperative test case runs earlier in the testing process. This paper proposes a Heuristic based technique for Time aware Multi-Criteria Test case Prioritization (HTMCTCP). It considers various targets simultaneously and chooses the best test cases within the stipulated time budget. This technique swaps between the neighborhood search and the global search in the huge search space of the problem to avoid getting stuck in local optima and also it guarantees fast convergence to the best solution. When the effectiveness of the technique is compared with the existing prioritization approach like Genetic Algorithm (GA) and Simulated Annealing Algorithm (SA), it is inferred that the proposed HTMCTCP technique indicates noteworthy change over those systems.
Keywords: Regression Testing; Test Case Prioritization; Heuristic Technique; Genetic Algorithm; Simulated Annealing Algorithm;.