Search results for "Computer security"
showing 10 items of 433 documents
Indicadores para la Evaluación de las Instituciones Universitarias: Validación a través del Método Delphi
2012
Artículo distribuido bajo una licencia de uso y distribución “Creative Commons Reconocimiento-No Comercial 3.0 España”.
A Knowledge Interface System for Information and Cyber Security Using Semantic Wiki
2018
Resilience against information and cyber security threats has become an essential ability for organizations to maintain business continuity. As bulletproof security is an unattainable goal, organizations need to concentrate to select optimal countermeasures against information and cyber security threats. Implementation of cyber risk management actions require special knowledge and resources, which especially small and medium-size enterprises often lack. Information and cyber security risk management establish knowledge intensive business processes, which can be assisted with a proper knowledge management system. This paper analyzes how Semantic MediaWiki could be used as a platform to assis…
Reporting in Conflict Zones in Pakistan: Risks and Challenges for Fixers
2020
As a backbone of reporting in war and conflicts, fixers offer essential assistance to the foreign correspondent in conflict zones, also in Pakistan. With valuable local knowledge and contacts, fixers can arrange travel to secure entry of foreign correspondents into conflict zones in addition to securing interviews with otherwise unattainable figures, while offering reliable translation services. Pakistani media, despite being one of the largest and most developed in South Asia, remains under the strict control of powerful military establishment and government, while seeming to mirror the overarching government sentiment with a distinct lack of research-based news. Challenging this state of …
Towards Practical Cybersecurity Mapping of STRIDE and CWE — a Multi-perspective Approach
2021
Software vulnerabilities are identified during their whole life-cycle; some vulnerabilities may be caused by flaws on the design while other appear due to advances on the technologies around the systems. Frameworks such as OWASP are well- known and are used for testing a systems security before or after implementation, and such testing is carried out against the existing system. Threat modeling however focuses on the early stages of the system design when it is feasible and easy to fix security-related flaws and prevent possible damage caused by them. For example, STRIDE is one very popular threat modeling framework. A STRIDE threat modelling specialist deals with abstract categorizations o…
Cyber deterrence and Russia’s active cyber defense
2020
Cartesian Psychology – Could There Be One?
2008
The chapter examines what it would mean to talk about “psychology” in Descartes’ terms and argues that within the Cartesian framework we cannot really formulate the questions that are posed by contemporary psychologists. This results from the fact that psychological topics can be found on all three levels of Cartesian science: in metaphysics, in physics and finally in the applied sciences, such as medicine and morals. The aim is to show that the sensory and vegetative functions are often taken together by Descartes. Therefore, the Cartesian system does not recognize any principal difference between sensory functions, such as vision, and vegetative functions, such as digestion. Humans can be…
Terrorism, homeland safety and event management
2014
As the last attacks on Boston showed terrorism is based not only on speculation but also on surprise. Terrorists do not want to destroy or to kill everybody, their goal is aimed to inflict and administrate fear to the witnesses. The fact is that tourism and mega-events represented a fertile source to perpetrate terrorist attacks, not only for the casualties but also by the psychological effects on citizenry. This paper explores the nature of terrorism in the context of leisure as well as proposing a valid model to understand the connection among tourism, event management and terrorism.
Artificial intelligence: the unstoppable revolution in ophthalmology.
2020
Artificial Intelligence (AI) is an unstoppable force that is starting to permeate all aspects of our society as part of the revolution being brought into our lives (and into medicine) by the digital era, and accelerated by the current COVID-19 pandemic. As the population ages and developing countries move forward, AI-based systems may be a key asset in streamlining the screening, staging, and treatment planning of sight-threatening eye conditions, offloading the most tedious tasks from the experts, allowing for a greater population coverage, and bringing the best possible care to every patient. This paper presents a review of the state of the art of AI in the field of ophthalmology, focusin…
Expectations and Experiences of Implementing a Mobile Secure Communication Application
2020
The privacy and security of communication in corporations and governmental organizations has increased enormously over the years. At the same time, a growing amount of technological solutions to support this have emerged. This study examines user expectations before and use experiences during the implementation phase of a mobile secure communication application. These are investigated from the expectation–confirmation perspective and its influence on continued adoption. The study has an exploratory approach for this investigation. To guide the investigation, the study draws from the expectation–confirmation theory (ECT) and the unified theory of acceptance and use of technology (UTAUT). Emp…
Cyber security exercise : Literature review to pedagogical methodology
2019
This paper is a literature review, where we try to find out pedagogical principles has used in different virtual or simulated industry learning environments. The purpose is to use these findings to create in the future a new model for teaching in cyber security exercises. Cyber security exercises are the major service at JYVSECTEC - Jyväskylä Security Technology, cyber security research, training and development center in Finland [1]. JYVSECTEC Cyber security exercises are executed in real life simulation environment, RGCE (Realistic Global Cyber Environment) [1]. It provides the same functionality as the real Internet, but it is isolated from the real Internet and fully controlled by JYVSE…