Manuscripts

Recent Papers

Research Paper

How UI/UX enhances e-commerce sales

This research paper explores the significance of user experience (UX) and user interface (UI) design in the context of e-commerce and its impact on driving sales. With the exponential growth of online shopping, businesses are facing intense competition, making it crucial to differentiate themselves through superior user experiences. This study aims to identify the key elements of UX design AND UI design that can enhance the e-commerce user journey and ultimately drive sales. The research involves an introduction , methodology and finding and analysis on how user experience and user interface design has an impact on sales. This fits into the context of the field of the user experience as the end-user is central to optimizing the online experience, so gauging it will help optimize features in an application or platform. This also fits into the context of information systems as all applications and businesses, many of which are in the e-commerce and fashion spaces, utilize the technologies and concepts of information systems. This is not the first time this question has been asked as to how user experience,user interface drives e commerce sales a survey was conducted using Qualtrics, since conducting( a survey is a common method used to answer questions concerning the user experience). Subjects were asked preliminary questions, and questions addressing the five variables of user intention in buying products, usability, ease of use, findability, and desirability. Survey data was collected, and two multiple regression analyses were performed. The statistical significance of the results is determined, and then the relevance is evaluated. It was found that if an application in the mobile e-commerce fashion space is useful to the user, then it is desirable to the user. It was also found that if an app is desirable to the user, users in turn have the intention to buy products using these apps. From this research, next steps include obtaining a larger sample size to get more statistically significant data. Future research includes testing other factors of the user experience, modifying the survey to further test existing variables, and exploring different niche industries in mobile e-commerce applications to explore the user experience in other areas of e-commerce. Regarding the user interface which makes it visually pleasing , it does not only include aesthetic, many people are confused thinking that user interface is just about aesthetic which is not the case User interface ust like user experience holds a lot of importance , a lot of focus , strategies , ideas goes into making a website user friendly as well as visually accurate and pleasing , and to make that accurate and pleasing and easy to use.

Published by: Rukmani Pareek

Author: Rukmani Pareek

Paper ID: V10I1-1245

Paper Status: published

Published: March 15, 2024

Full Details
Review Paper

Chrome extension to detect malicious URLs using support vector machine algorithm

There are a vast number of domains that leads the user to phishing websites for tricking the user to steal their sensitive information or inject malware into the system. In this paper, we will discuss about the support vector machine algorithm and how we have used the weights associated with each attribute of the trained SVM model in a chrome extension. This tool will identify the nature of the URL and avert the users from becoming a victim of phishing attack by notifying the user about the malicious URL on each page load via an alert box as safe or unsafe URL.

Published by: Dev Kumar, E.DeepanKumar, Aarya D Roy, Aftab Alam, Harsh Vardhan

Author: Dev Kumar

Paper ID: V10I1-1252

Paper Status: published

Published: March 14, 2024

Full Details
Research Paper

Cyber security and government: safeguarding the public sectors in the digital era

This publication emphasizes the critical importance of bolstering cybersecurity in the public sector due to the increasing reliance on digital technologies and the significant risks posed by cyber threats. It discusses the vulnerability of government agencies to cyberattacks, highlighting examples such as the OPM breach, the Colonial Pipeline ransomware attack, and the Solar Winds supply chain attack amongst others. The public sector's vulnerability to cyber threats is attributed to factors such as the wealth of sensitive data it holds, outdated technology and security measures, and the potential for public disclosure that can lead to widespread impact and public scrutiny. Moreover, geopolitical strategies and cyberwarfare play a significant role, with cyberattacks on government organizations having profound implications for national security and international relations. This publication also explores the strategies to safeguard the public sector in the digital era, including security awareness training, multi-factor authentication, endpoint security, network segmentation, regular patches, and updates, incident response planning, backup, disaster recovery, zero trust architecture, and continuous vulnerability assessments. Overall, it underscores the urgent need for robust cybersecurity measures to protect sensitive data and critical infrastructure from cyber threats.

Published by: Oluwasola Yunusa Smith

Author: Oluwasola Yunusa Smith

Paper ID: V10I1-1246

Paper Status: published

Published: March 13, 2024

Full Details
Research Paper

Plot pilot

The real estate industry is undergoing a significant transformation with the advent of digital technologies. Traditional real estate transactions often involve intermediaries, leading to high fees, lack of transparency, and inefficiencies. In response to these challenges, this paper proposes the development of a mobile application designed to revolutionize real estate transactions. The application aims to provide comprehensive information on available properties, eliminate the need for traditional brokers, and integrate seamlessly with government systems for land registration. By leveraging components such as database management systems, user interfaces, security measures, authentication and authorization systems, GIS integration, documentation management, and mobile accessibility, the proposed solution promises to enhance transparency, reduce costs, and improve efficiency in property dealings.

Published by: Himasai Munagala, Sumiran, Srija Chirutha, Karthik Nama

Author: Himasai Munagala

Paper ID: V10I1-1235

Paper Status: published

Published: March 12, 2024

Full Details
Research Paper

A Descriptive Exploratory Study To Assess The Risk Factors For the Development of bedsores among Lower Segment Fracture Patients Admitted In the Orthopedic Ward of JNM Hospital, Kalyani

The research study was conducted to assess the risk factors for the development of bedsore among lower-segment fracture patients admitted to the orthopedic ward, JNM Hospital, Kalyani. The aim of this study was to identify the risk factor for the development of bedsore among lower-segment fracture patients. A quantitative research approach was selected for the study. It was a methodological study conducted in one phase. In this study questionnaire method was followed to collect the data. The sample size for the study consisted of 60 samples who were admitted to the Orthopedic Word of JNM Hospital both male and female wards. The sampling technique was non-probability convenience sampling. Open questionnaires with 6 questions were used to assess the risk factors for the development of bedsore among lower-segment fracture patients. After analysis of the results and after reviewing the different literature from PubMed, Medline, nursing and health science, etc. The Study results showed that the higher risk of bedsore in the age group 51-60 years 23(38.33%) so adult age mainly acts as a risk factor for bedsores. And the other hand 48 (80%) persons are occasionally moisturized in moisture, and the incidence rate of bedsores is the highest in Orthopedic surgery ward it can be said that two aspects of demographic variables are family monthly income and nutritional status in our study. So from the association, we can say that the risk for bedsores is mostly present among the patient of orthopedic ward

Published by: Sarvendra Pratap, Anindita Tripathi, Manisha Maity, Susmita Sur, Tandra Bhattacharyya, Arpita Majhi, Puja Chongre, Rimpa Ghosh Roy, Sajjan Kumar

Author: Sarvendra Pratap

Paper ID: V10I1-1243

Paper Status: published

Published: March 12, 2024

Full Details
Research Paper

Enhancing Cybersecurity Resilience in a Multinational Semiconductor Organization: A Comprehensive Strategy for Threat Mitigation and Defense Strengthening

Tososu Semiconductors LLC, a multinational corporation specializing in semiconductor development for medical and automotive sectors, faced numerous cyber threats including ransomware, phishing, and DDOS attacks. This paper presents an in-depth analysis of the attacks experienced by the organization and proposes a comprehensive cybersecurity solution within the constraints of a $600,000 annual budget. The analysis reveals vulnerabilities in the company's network environment, including lack of security awareness among employees, absence of email security systems, and inadequate threat management infrastructure. Subsequently, a multi-faceted solution is proposed to address these vulnerabilities. The proposed solution encompasses the implementation of Unified Threat Management (UTM) systems, human awareness training, backup solutions, DDOS protection, DMZ implementation, password policy enhancement, multi-factor authentication, and phishing detection software. These solutions aim to fortify the organization's security posture, mitigate risks, and prevent future attacks. A detailed breakdown of costs and budget allocation is provided, ensuring adherence to financial constraints while maximizing security measures. Additionally, the paper discusses the implications of the proposed solutions, emphasizing the importance of employee vigilance and continuous security updates. Ultimately, this paper underscores the significance of proactive cybersecurity measures in safeguarding organizational assets and mitigating cyber threats in an evolving technological landscape.

Published by: Ugochukwu Eneh

Author: Ugochukwu Eneh

Paper ID: V10I1-1240

Paper Status: published

Published: March 12, 2024

Full Details