A Conceptual Diagram for Secure Virtual Office Services

Authors

  • Nor Azlina Abd Rahman Asia Pacific University of Technology & Innovation, Technology Park Malaysia, Bukit Jalil, Kuala Lumpur, Malaysia Author
  • Daniel Mago Vistro Asia Pacific University of Technology & Innovation, Technology Park Malaysia, Bukit Jalil, Kuala Lumpur, Malaysia Author
  • Tee Jia Le Asia Pacific University of Technology & Innovation, Technology Park Malaysia, Bukit Jalil, Kuala Lumpur, Malaysia Author
  • Cheok Jia Fuei Asia Pacific University of Technology & Innovation, Technology Park Malaysia, Bukit Jalil, Kuala Lumpur, Malaysia Author

DOI:

https://doi.org/10.61841/e84dp692

Keywords:

Virtual Office System, SME, Integrity Check, Secure Deletion, USB Block, Remote Monitoring

Abstract

 A virtual office is a business platform exists in cyberspace. A virtual office setup allows business owners and employees to work from any location by using technology such as laptop computers and cell phones with internet access. A virtual office can provide significant savings and flexibility compared to renting a traditional office space. This system enables the employer to monitor the employees remotely. Meetings can be conducted via teleconferencing and video conferencing, and documents can be transmitted electronically. Any file transferred will be encrypted to ensure the confidentiality of the data. Integrity check will be done by the system during downloading or receiving the files. The USB ports will be protected to ensure no files can be transferred to the external drive. Digital invoice will be generated instead of manual invoice that need to use digital signature to ensure nonrepudiation. This digital invoice will be more efficient to track any transaction history and at the same time will make stock monitoring will be more efficient as any invoice issued the product, stock will automatically deducted from central database. The user can set the system to notify the user when the available stock less than the amount set by the users. This research paper analyzing the user requirements towards the need of virtual office and conceptual diagram proposed as per overall virtual office services that required by the target users which are small and medium enterprise companies. 

Downloads

Download data is not yet available.

References

[1] Pirraglia, W., 2019. Organizational Problems in the Workplace. Retrieved Mar 25, 2019, from

http://smallbusiness.chron.com/organizational-problems-workplace-12570.html

[2] Hughes, C., 2017. 3 challenges to securing business data. Retrieved Mar 26, 2019, from

https://www.csoonline.com/article/3187305/data-breach/article.html

[3] Symantec, 2019. How to safely and securely use USB memory sticks. Retrieved Mar 26, 2018

fromhttps://us.norton.com/internetsecurity-emerging-threats-how-to-safely-and-securely-use-usb-memorysticks.html

[4] Trend Micro Forward-Looking Threat Research Team, 2018. Understanding Motivations and Methods of Web

Defacement. Retrieved Mar 25, 2019.

[5] FullQuota Editor, 2014. 3 Keys To Eliminating Common Warehouse Inventory Management Inefficiencies.

Retrieved Mar 27, 2019 from https://www.bspny.com/blog/3-keys-to-eliminating-common-warehouseinventory-management-inefficiencies

[6] Koshima, H. & Hoshen, J., 2000. Personal Locator Service Emerge. IEEE Spectrum, Issue Feb. 2000, pp. 41-

48.

[7] Lee, Y. W., Suh, Y. & Shibasaki, R., 2008. A GIS-based simulation to predict GPS availability. KSCE Journal

of Civil Engineering, 12(6), pp. 401-408.

[8] Peterson, Z. N. J. et al., 2005. Secure Deletion for a Versioning File System. s.l., USENIX Association.

[9] Gutmann, P., n.d, 1996. Secure Deletion of Data from Magnetic and Solid-State Memory. Retrieved Mar 27,

2019 fromhttps://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html.

[10] Lee, B., Son, K., Won, D. & Kim, S., 2011 . Secure Data Deletion for USB Flash Memory. Journal of

Information Science and Engineering, pp. 933-952.

[11] Heo, J. et al., 2008. Secure Deletion for NAND Flash File System. Fortaleza, Ceara, Brazil, ACM.

[12] Mahajan, D. P. & Sachdeva, A., 2013. A Study of Encryption Algorithms AES, DES and RSA for Security.

Global Journal of Computer Science and Technology Network, Web & Security , 13(15), p. 15.

[13] Kim, G. H. & Spafford, E. H., 1994. The Design and Implementation of Tripwire: A File System Integrity

Checker. West Lafayette, COAST Laboratory Department of Computer Sciences .

[14] Akamai Technologies, Inc, 2015. Strategies for Cyber-Attack Protection: Managed Web Security Services.

Retrieved Mar 4, 2019.

[15] Tahir, M. F., 2015. Global Positioning System (GPS) Based Location Finder on Android, s.l.: Blekinge

Institute of Technology.

[16] Singh, S. P. & Maini, R., 2011. Comparison of Data Encryption Algorithms. International Journal of

Computer Science and Communication , 2(1), pp. 125-127.

[17] P. Mary Jeyanthi, Santosh Shrivastava Kumar “The Determinant Parameters of Knowledge Transfer among

Academicians in Colleges of Chennai Region”, Theoretical Economics Letters, 2019, 9, 752-760.

[18] P. Mary Jeyanthi, “An Empirical Study of Fraudulent and Bankruptcy in Indian Banking Sectors”, The

Empirical Economics Letters, Vol.18; No. 3, March 2019, ISSN: 1681-8997, which is in C category of ABDC

List. http://www.eel.my100megs.com/volume-18-number-3.htm

[19] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Hybrid Metaheuristic techniques”, International

Journal of Business Intelligence Research, - Volume 5, Issue 1, April-2014.

[20] P. Mary Jeyanthi, “INDUSTRY 4.O: The combination of the Internet of Things (IoT)and the Internet of People

(IoP)”, Journal of Contemporary Research in Management, Vol.13; No. 4 Oct-Dec, 2018, ISSN: 0973-9785.

[21] P. Mary Jeyanthi, "The transformation of Social media information systems leads to Global business: An

Empirical Survey", International Journal of Technology and Science (IJTS), issue 3, volume 5, ISSN Online:

2350-1111 (Online). URL: http://www.i3cpublications.org/M-IJTS-061801.pdf

[22] P. Mary Jeyanthi,” An Empirical Study of Fraud Control Techniques using Business Intelligence in Financial

Institutions”, Vivekananda Journal of Research Vol. 7, Special Issue 1, May 2018, ISSN 2319-8702(Print),

ISSN 2456-7574(Online). URL: http://vips.edu/wp-content/uploads/2016/09/Special-Issue-VJR-conference-

2018.pdf Page no: 159-164.

[23] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Artificial bear Optimization Approach”,

International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013.

URL: https://www.ijser.org/onlineResearchPaperViewer.aspx?Business-Intelligence-Artificial-BearOptimization-Ap-proach.pdf

[24] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Optimization techniques for Decision Making”,

International Journal of Engineering Research and Technology, Volume 2, Issue 8, August-2013.

[25] Mary Jeyanthi, S and Karnan, M.: “A New Implementation of Mathematical Models with metaheuristic

Algorithms for Business Intelligence”, International Journal of Advanced Research in Computer and

Communication Engineering, Volume 3, Issue 3, March-2014.

[26] Dr. Mary Jeyanthi: “Partial Image Retrieval Systems in Luminance and Color Invariants: An Empirical Study”,

International Journal of Web Technology (ISSN: 2278-2389) – Volume-4, Issue-2.

URL: http://www.hindex.org/2015/p1258.pdf

[27] Dr. Mary Jeyanthi: “CipherText Policy attribute-based Encryption for Patients Health Information in Cloud

Platform”, Journal of Information Science and Engineering (ISSN: 1016-2364)

[28] Mary Jeyanthi, P, Adarsh Sharma, Purva Verma: “Sustainability of the business and employment generation in

the field of UPVC widows” (ICSMS2019).

[29] Mary Jeyanthi, P: “An Empirical Survey of Sustainability in Social Media and Information Systems across

emerging countries”, International Conference on Sustainability Management and Strategy” (ICSMS2018).

[30] Mary Jeyanthi, P: “Agile Analytics in Business Decision Making: An Empirical Study”, International

Conference on Business Management and Information Systems” (ICBMIS2015).

[31] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence – soft computing Techniques”, International

Conference on Mathematics in Engineering & Business Management (ICMEB 2012).

[32] Mary Jeyanthi, S and Karnan, M.: “A Comparative Study of Genetic algorithm and Artificial Bear

Optimization algorithm in Business Intelligence”, International Conference on Mathematics in Engineering &

Business Management (ICMEB 2012).

[33] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Data Mining and Optimization for Decision Making

”, 2011 IEEE International Conference on Computational Intelligence and Computing Research (2011 IEEE

ICCIC).

[34] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Data Mining and Decision making to overcome the

Financial Risk”, 2011 IEEE International Conference on Computational Intelligence and Computing Research

(2011 IEEE ICCIC).

[35] Dr. Mary Jeyanthi, S: “Pervasive Computing in Business Intelligence”, State level seminar on Computing and

Communication Technologies. (SCCT-2015)

[36] Dr.P.Mary Jeyanthi, “Artificial Bear Optimization (ABO) – A new approach of Metaheuristic algorithm for

Business Intelligence”, ISBN no: 978-93-87862-65-4, Bonfring Publication. Issue Date: 01-Apr-2019

[37] Dr.P.Mary Jeyanthi , “Customer Value Management (CVM) – Thinking Inside the box” – ISBN : 978-93-

87862-94-4, Bonfring Publication, Issue Date: 16-Oct-2019.

[38] Jeyanthi, P. M., & Shrivastava, S. K. (2019). The Determinant Parameters of Knowledge Transfer among

Academicians in Colleges of Chennai Region. Theoretical Economics Letters, 9(4), 752-760.

Downloads

Published

31.10.2019

How to Cite

Abd Rahman, N. A., Mago Vistro, D., Jia Le, T., & Jia Fuei, C. (2019). A Conceptual Diagram for Secure Virtual Office Services. International Journal of Psychosocial Rehabilitation, 23(4), 1251-1260. https://doi.org/10.61841/e84dp692