Search results for " security"
showing 10 items of 1419 documents
Review of detection, assessment and mitigation of security risk in smart grid
2017
The integration of Information and Communication Technology (ICT) into the existing power grid has created new problems to the grid. The grid network has become more vulnerable to security threats and risk which is a corollary to the modern data network. Smart Grid has strict latency requirement for data communication and the violation of this latency is very costly. This paper assesses the threats and vulnerabilities associated with the Smart Grid network and reviews the methods to mitigate these security risks.
Pedagogical approaches for e-assessment with authentication and authorship verification in Higher Education
2019
Checking the identity of students and authorship of their online submissions is a major concern in Higher Education due to the increasing amount of plagiarism and cheating using the Internet. The literature on the effects of e-authentication systems for teaching staff is very limited because it is a novel procedure for them. A considerable gap is to understand teaching staff' views regarding the use of e-authentication instruments and how they impact trust in e-assessment. This mixed-method study examines the concerns and practices of 108 teaching staff who used the TeSLA—Adaptive Trust-based e-Assessment System in six countries: the UK, Spain, the Netherlands, Bulgaria, Finland and Turkey.…
Stakeholders, contradictions and salience: An empirical study of a Norwegian G2G effort
2006
Author's version of a chapter in Proceedings of the 39th Annual Hawaii International Conference on Systems Sciences. Also available from the publisher at http://dx.doi.org/10.1109/HICSS.2006.436 Previous studies indicate that the expected effects of e-Government are slower to realize than initially expected. Several authors argue that e-Government involves particularly complex settings, consisting of a variety of stakeholders promoting different and often conflicting objectives. Yet, few studies have explicitly addressed the inherent challenges of this complexity. This study focuses on the extent to which contradictory stakeholder objectives can help explain the relatively slow progress of …
A Knowledge Interface System for Information and Cyber Security Using Semantic Wiki
2018
Resilience against information and cyber security threats has become an essential ability for organizations to maintain business continuity. As bulletproof security is an unattainable goal, organizations need to concentrate to select optimal countermeasures against information and cyber security threats. Implementation of cyber risk management actions require special knowledge and resources, which especially small and medium-size enterprises often lack. Information and cyber security risk management establish knowledge intensive business processes, which can be assisted with a proper knowledge management system. This paper analyzes how Semantic MediaWiki could be used as a platform to assis…
Watermarking for ontologies
2011
In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.
Developing Cybersecurity in an Industrial Environment by Using a Testbed Environment
2023
Critical infrastructure protection requires a testing environment that allows the testing of different kinds of equipment, software, networks, and tools to develop vital functions of the critical industrial environment. Used electrical equipment must be reliable, capable and maintain a stable critical industrial ecosystem. An industrial business needs to develop cybersecurity capabilities that detect and prevent IT/ICT and OT/ICS threats in an industrial environment. The emerging trend has been to create security operations center (SOC) services to detect ICS-related threats in enterprise networks. The energy supply sector must consist of crucial elements for safe business continuity and su…
A privacy enhanced device access protocol for an IoT context
2013
In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.
Access Security and Personal Privacy in Public Cellular Communication Systems: The Past, the Present and Beyond 2020
2010
In order to predict the future one needs to understand the past and then interpolate as best as possible. We expect this to work reasonably well for a “2020 Scenario”, but we do not expect this approach to be valid for a “Beyond 2020” scenario.
Sharing R&D investments in breakthrough technologies to control climate change
2017
This paper examines international cooperation on technological development as an alternative to international cooperation on GHG emission reductions. In order to analyze the scope of cooperation, a three-stage technology agreement formation game is solved. First, countries decide whether or not to sign up to the agreement. Then, in the second stage, the signatories (playing together) and the non-signatories (playing individually) select their investment in R&D. In this stage, it is assumed that the signatories not only coordinate their levels of R&D investment but also pool their R&D efforts to fully internalize the spillovers of their investment in innovation. Finally, in the third stage, …
The role of social networking services in eParticipation
2009
Published version of a chapter published in Lecture Notes in Computer Science, 5694, 46-55. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-03781-8_5 A serious problem in eParticipation projects is citizen engagement – citizens do not necessarily become more willing to participate simply because net-services are provided for them. Most forms of eParticipation in democratic contexts are, however, dependent on citizen engagement, interaction and social networking because democratic systems favour the interests of larger groups of citizens – the more voices behind a political proposition, the greater its chances of success. In this context of challenges the study of s…