Journal of
Systemics, Cybernetics and Informatics
HOME  |   CURRENT ISSUE   |   PAST ISSUES   |   RELATED PUBLICATIONS     IIIS   |   SEARCH     CONTACT US
 



ISSN: 1690-4524 (Online)


Indexed by
EBSCO, Cabell, DOAJ (Directory of Open Access Journals)Benefits of supplying DOAJ with metadata:
  • DOAJ's statistics show more than 900 000 page views and 300 000 unique visitors a month to DOAJ from all over the world.
  • Many aggregators, databases, libraries, publishers and search portals collect our free metadata and include it in their products. Examples are Scopus, Serial Solutions and EBSCO.
  • DOAJ is OAI compliant and once an article is in DOAJ, it is automatically harvestable.
  • DOAJ is OpenURL compliant and once an article is in DOAJ, it is automatically linkable.
  • Over 95% of the DOAJ Publisher community said that DOAJ is important for increasing their journal's visibility.
  • DOAJ is often cited as a source of quality, open access journals in research and scholarly publishing circles.
JSCI Supplies DOAJ with Meta Data
, Academic Journals Database, and Google Scholar


Listed in
Cabell Directory of Publishing Opportunities and in Ulrich’s Periodical Directory


Re-Published in
Academia.edu
(A Community of about 40.000.000 Academics)


Editorial Advisory Board's Chair
William Lesso

Editor-in-Chief
Nagib C. Callaos


Sponsored by
The International Institute of
Informatics and Systemics

www.iiis.org
 

Editorial Advisory Board

Editors

Journal's Reviewers
 

Description and Aims

Submission of Articles

Areas and Subareas

Information to Contributors

Editorial Peer Review Methodology

Integrating Reviewing Processes


Web X-Ray: Developing and Adopting Web Best Practices in Enterprises
Reinaldo Ferreira
(pages: 1-6)

The Use of MARIE CPU Simulator in Computer Architecture Course: A Case Study of Student's Perception of Learning and Performance
Jorge Fernando Maxnuck Soares, Luís Tadeu M. Raunheitte, Takato Kurihara
(pages: 7-13)

A Paradigm for Systems Thinking as a Real-Time Approach for Human Adaptation in the 21st Century
Melissa J. Mills
(pages: 14-21)

Exploring the Synergies between Teaching and Consulting: The Baldrige National Quality Award Experience
Ramachandran Natarajan
(pages: 22-25)

Now What? Think Fast: Using Healthcare Clinics as Universal Language to Maximize Learning for International Students in a Graduate Classroom
Sanda Katila
(pages: 26-37)

Quality Management in Education: A Comparative Case Study in Swedish Municipalities
Per-Olof Hansson, Elin Wihlborg
(pages: 38-42)

Introducing Problem-Solving Method in the Business School of a Brazilian University
Lilian A. P. Miguel, Adilson Caldeira
(pages: 43-48)

Academic Formation and Formative Research Integration Management for the Culmination of Studies Process in Higher Education
Lorna Cruz Rizo, Eneida Catalina Matos Hernández
(pages: 49-55)

Understanding the Process and Success Factors to Increase Synergies between Research and Teaching
Deborah Ballou, Brian Huguenard, Brian Nagy, Curtis Armstrong, Tor Guimaraes
(pages: 56-59)

Getting Smart: Need to Focus on Creating an Enabling Environment Structured Around the Objective of Realizing the True Potential of Our Next Generations
Hassan Sattar, Sadaf Nazir
(pages: 60-65)

How to Efficiently Conduct an IT Audit – In the Perspective of Research, Consulting and Teaching
Gabriel Felley, Rolf Dornberger
(pages: 66-70)

Breaking the Boundaries: Academic Applications of Multidisciplinary Research in Computer Science and Dentistry
Patricia Witt, José Ignacio Peláez, Gustavo Vaccaro
(pages: 71-75)


 

Abstracts

 


ABSTRACT


A User Authentication Based on Personal History- A User Authentication System Using E-mail History -

Masakatsu Nishigaki, Makoto Koike


This paper proposes a user authentication using personal history of each user. Here, authentication is done by giving answers to questions about the history of user’s daily life. Users do not have to memorize any password, since the passwords are what users already know by experience. In addition, everyday-life experience increases day by day, and thus the question could change on every authentication trial. In this paper, a user authentication system using user’s e-mail history is shown as a prototype of our proposal, and some basic experiments to evaluate the availability of the system are carried out.

Full Text