• List of Articles


      • Open Access Article

        1 - Information Security Maturity Assessment Model in the IT Departments of the Oil Industry Subsidiaries in Iran
        Reza Radfar Fatemeh akhavan
        The business approach and risk management framework of the company through the establishment and maintenance of the information security management system (ISMS) is a framework for identifying, assessing, controlling and managing the risks associated with information se More
        The business approach and risk management framework of the company through the establishment and maintenance of the information security management system (ISMS) is a framework for identifying, assessing, controlling and managing the risks associated with information security in the company. It is based on privacy standards, integrity and availability of information assets. In the present report, not only a model for evaluating the information security maturity in the headquarters of one of the oil industry companies is developed, but also the defect analysis and implementation of the existing organization are initially carried out in accordance with the requirements of ISO 27000. By defining the indicators of evaluation and measurement of these indicators in the organization, its maturity is estimated in this security standard. Different models are presented to identify the weaknesses and security powers of a particular organization. The goal is to identify a gap between theory and practice that can be approximated by the process-oriented approach. The puberty model introduced and used in this project, provides a starting point for implementing security, a public view of security, and a framework for prioritizing operations. This model of information security maturity has 5 phases. (The maturity model is information security as a tool for assessing the ability of organizations to meet security goals, that is, confidentiality, integrity and availability, and prevent attacks and access to the mission of the organization in spite of attacks and accidents)??. This model defines a process that has all aspects of security management, measurement, and control. The results of the evaluation show that the organizations which have security investments ahead of time have to understand the needs for high-level management of information security in the organization, and in addition to the actions taken in the field of physical environment, network and personal computers, controls access and encryption have been made to identify the necessary training and culture. Manuscript profile
      • Open Access Article

        2 - Effects of Technology Spillover and Internal Research & Development (R&D) on Growth of Total Factor Productivity (TFP) in Iran's Oil and Gas Sector
        tayyebeh pourmandbakhshayesh Behzad Salmani mohammadmehdi bargioskooi
        The economy consists of several sections, and the performance of each sector plays a private part in the progress of the economy. The oil and gas sector, as one of the economic sectors in Iran, plays an important and undeniable role due to the main source of government More
        The economy consists of several sections, and the performance of each sector plays a private part in the progress of the economy. The oil and gas sector, as one of the economic sectors in Iran, plays an important and undeniable role due to the main source of government revenue. Therefore, checking the performance of this sector can be important for the economic development of the country. The study of total factor productivity is one of the ways to examine the performance of sectors, which indicates the optimal growth of the economy of that sector. Therefore, this study investigates the effect of Technology Spillover and Research and Development (R&D) on growth of Total Factor Productivity (TFP) of the oil and gas sector in Iran for the period (1394-1394). Important factors of Technology Spillover include Foreign Direct Investment (FDI) and imports of capital goods and intermediates. Accumulation internal Research and Development (R&D) and human capital also are considered as internal impact factors. The results proved that foreign direct investment, and the imports of capital goods, and intermediates as important channels of technology spillover have a positive influence on growth of total factor productivity (TFP) of the oil and gas sector in Iran. The results also highlight a positive impact of human capital. By contrast, results of our estimation show a negative impact of R&D on growth of total factor productivity (TFP) of the oil and gas sector in Iran. Manuscript profile
      • Open Access Article

        3 - Dynamic Model for Evaluating Information Systems Security by System Dynamics Modeling
        Mohsen Shafiei Nikabadi Amir Hakaki Sara Gholamshahi
        In recent decades, information security has been a great importance for all organizations. However, to enhance information security in an organization, many projects have been failed due to lack of knowledge of risks and effective factors on information security. This p More
        In recent decades, information security has been a great importance for all organizations. However, to enhance information security in an organization, many projects have been failed due to lack of knowledge of risks and effective factors on information security. This paper aims to study effective factors on security of information systems. Data is collected through extensive literature review and open interview by 12 experts, which is chosen as the judgment of researchers purposefully. Causal model of studied risks was designed based on experts’ opinions, after identifying dimensions and risk factors. Subsequently, Dynamic model was plotted by VENSIM software using system dynamics approach. System dynamics modelling creates a better understanding of the system behavior and allows for the development of new structures and policies. In order to test the validation of research dynamic model, boundary condition was used. results indicate that presented model is validated. Moreover, to simulate by studied model, the data is collected from OFOGH consulting engineering company and run for a period of 12 months. As a result, among identified risks, the most important one relates to technical risk. Data risk, human risk and physical risk are in the next ranks respectively. In addition, environmental risk has the lowest importance. At the end, using security software, determining staff access levels, using uninterrupted Power Supply systems, Closed Camera Television (CCTV), and staff training courses are identified as four solutions to improve information systems security behavior. Manuscript profile
      • Open Access Article

        4 - Task Scheduling Algorithm Based on the Genetic Algorithm and Dynamic Adaptive Scheduling in a Cloud Computing Environment
        Mojdeh Rabbani Hoda Moradi Asadollah Alirezaei
        Cloud computing is a concept introducing in the world of information technology recently, and provides an environment for sharing sources. In this environment, an efficient and effective scheduling system plays a fundamental role. Hence, the problem of scheduling tasks More
        Cloud computing is a concept introducing in the world of information technology recently, and provides an environment for sharing sources. In this environment, an efficient and effective scheduling system plays a fundamental role. Hence, the problem of scheduling tasks in cloud computing is a very important issue, which tries to identify an optimal scheduling for performing tasks and allocating an optimal source. The purpose of this research is to provide a new hybrid model for optimization of scheduling tasks based on combination of dynamic adaptive and genetic algorithms in a cloud computing environment. The hybrid model aimed to cover the defects of these algorithms. Based on this model, an initial solution was presented for resolving the weakness of the genetic algorithm, the action of low speed as well as the weakness of the dynamic adaptive algorithm, trapping in local answers. In the proposed model, first, dynamic adaptive algorithm could find an appropriate solution for scheduling problem within a good time using the technique of searching required resources by KD tree and data retrieval in parallel. This solution, as an initial answer, was given to the genetic algorithm, and this algorithm performed the optimal research. As a consequence, the final algorithm, a combination of these two algorithms, provides a better load balancing for cloud resources in a relatively acceptable time. Manuscript profile
      • Open Access Article

        5 - Designing and Implementing of Technology Companies Performance Evaluation Model (Case Study of Technology Companies in Yazd Science and Technology Park)
        Ali  Haji Gholam Saryazdi
        Science and technology parks are institutions supporting technology companies. The performance evaluation of technology companies will help them to improve their performance and make the park supportive services more effective and helpful. Performance evaluation is one More
        Science and technology parks are institutions supporting technology companies. The performance evaluation of technology companies will help them to improve their performance and make the park supportive services more effective and helpful. Performance evaluation is one of the most important priorities of Yazd Science and Technology Park. Therefore, the purpose of this paper is to design and explain a performance evaluation model of technology companies in this Park and analyze the results of its implementation. The evaluation model of Park is based on various performance evaluation models and theories, as well as through brainstorming with park managers and technology companies. This model evaluates the technology companies in four areas: nature of the company, structure and human resources, main idea and technology, and market. The evaluation process is designed according to both quantitative (documents and non-confrontational??) and qualitative (face to - face interviews) indicators. Then, based on this model, information of technology companies are collected and analyzed by an evaluation system. The results of evaluation showed that although the status of companies is far from the park's expectations and goals, it is acceptable in comparison with the community (province and the average of country) in terms of the value-added of manpower and the cost of employment. Also, the analysis of the results represented the validity and comprehensiveness of the model in assessing technology companies. Manuscript profile
      • Open Access Article

        6 - The Effective Factors Model on Adoption of E-Learning System in Qazvin University of Medical Sciences
        Hasan Rashidi Marzie  Movahedin
        With the advent of the Internet and Coronavirus outbreak, e-learning environments and web-based learning, there has been a considerable growth and development in recent months and years, but this type of education faces many challenges. The most important of these chall More
        With the advent of the Internet and Coronavirus outbreak, e-learning environments and web-based learning, there has been a considerable growth and development in recent months and years, but this type of education faces many challenges. The most important of these challenges are the use of learning patterns, modeling student behavior, evaluating student support and feedback, curriculum planning, sequencing, and teacher support. One way to deal with these challenges is to find effective factors on accepting and improving the quality of education in learning systems, discovering rules and educational patterns, and using them to predict future outcomes. The aim of this study is to identify factors affecting the adoption of e-learning, based on the technology acceptance model. For this purpose, studies in this area were investigated. Variables such as computer self-efficacy, quality of content, system support, user interface design, technology tools and computer anxiety as factors affecting adoption of e-learning system were extracted. According to them, the conceptual model of this research was developed. In order to evaluate the model and relationships between variables, a questionnaire was provided to the users of e-learning system in Qazvin University of Medical Sciences. The results of data analysis by using structural equation modeling have approved authenticity of all hypotheses excluding the impact of technology tools on the acceptance of e-learning system. Findings of this research can help educational managers of university and related instructors with this system to encourage students making optimum use of the system by providing the necessary fields for the imposition of effective factors. Manuscript profile
      • Open Access Article

        7 - Identification of the Challenges of Technology Development of Network Contexts in University of Tehran Incubators
        Mahdi Rezvanitabar Siamak Eslami
        Technology development is one of the ways to develop countries and one of the categories of knowledge-based economy. It is one of the major topics in incubators. The dominant view of incubators is more related to the business growth and at a higher level, it is the acce More
        Technology development is one of the ways to develop countries and one of the categories of knowledge-based economy. It is one of the major topics in incubators. The dominant view of incubators is more related to the business growth and at a higher level, it is the acceleration of business for a permanent presence in the market. Fewer research can be found addressing incubators in technology development. This research identified the challenges of technology development of university incubators. This survey was applicable, and in terms of controlling variables, indirect, random and descriptive in matter exploration of library and filed in data collection, and in terms of nature, descriptive. In terms of data type, it was a qualitative type of exploration and in terms of how to collect data was field research and library research. Books, publications, internet resources, and valid databases using library studies, documentary studies, interviews and field research were used for collecting data. The result of this section was to identify the dimensions of the challenges of technology development in the university incubators. In this research, a semi-structured interview with experts is presented to identify the issues. Qualitative data analyzing has been done using (Atlas-ti®) software. All interviews are recorded, transcript-ed to word software and assigned in Atlas-ti® software. The result of coding and categorizing, including 4 categories and 16 main codes, states technology development challenges related to networking contexts. Manuscript profile