Search results for "ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS"

showing 10 items of 41 documents

Agent-Based Model to Study and Quantify the Evolution Dynamics of Android Malware Infection

2014

[EN] In the last years the number of malware Apps that the users download to their devices has risen. In this paper, we propose an agentbased model to quantify the Android malware infection evolution, modeling the behavior of the users and the different markets where the users may download Apps. The model predicts the number of infected smartphones depending on the type of malware. Additionally, we will estimate the cost that the users should afford when the malware is in their devices. We will be able to analyze which part is more critical: the users, giving indiscriminate permissions to the Apps or not protecting their devices with antivirus software, or the Android platform, due to the v…

Agent-based modelSoftware_OPERATINGSYSTEMSArticle SubjectApplied Mathematicslcsh:MathematicsComputer securitycomputer.software_genrelcsh:QA1-939ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSAndroid malwareMalwareAndroid (operating system)MATEMATICA APLICADAcomputerAnalysisMathematics
researchProduct

Hypervisor-assisted dynamic malware analysis

2021

AbstractMalware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis tools. Current dynamic analysis solutions either make modifications to the running malware or use a higher privilege component that does the actual analysis. The former can be easily detected by sophisticated malware while the latter often induces a significant performance overhead. We propose a method that performs malware analysis within the context of the OS itself. Furthermore, the analysis component is camouflaged by a hypervisor, which makes it completely transp…

Computer engineering. Computer hardwareSoftware_OPERATINGSYSTEMSvirtualisointiComputer Networks and CommunicationsComputer scienceContext (language use)Static program analysiscomputer.software_genreTK7885-7895Artificial IntelligenceComponent (UML)Overhead (computing)tietoturvaMalware analysiskyberturvallisuusbusiness.industryHypervisorQA75.5-76.95haittaohjelmatComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSTask (computing)Electronic computers. Computer scienceEmbedded systemMalwarebusinesscomputerSoftwareInformation SystemsCybersecurity
researchProduct

How Vulnerable is the Reaction Time Concealed Information Test to Faking?

2021

The reaction time-based Concealed Information Test (RT-CIT) can be used to detect information a suspect wishes to conceal. While it is often argued that it is easily faked, empirical research on its vulnerability to faking is scarce. In three experiments, we tested whether receiving faking instructions enables guilty participants to fake an innocent test outcome in an RT-CIT. In Experiment 1, when not using a response deadline, we found the RT-CIT to be vulnerable to faking (d = 1.06). Experiment 2 showed that when using a response deadline, faking was ineffective (d = −0.25). Critically, Experiment 3 replicated these findings within one between-subject design, showing again a faking effect…

ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciencesApplied psychologyVulnerabilityComputingMilieux_LEGALASPECTSOFCOMPUTING050109 social psychologyExperimental and Cognitive PsychologyOutcome (game theory)050105 experimental psychologyTest (assessment)ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSClinical PsychologyEmpirical researchComputingMilieux_COMPUTERSANDSOCIETY0501 psychology and cognitive sciencesSuspectPsychologyApplied PsychologyJournal of Applied Research in Memory and Cognition
researchProduct

DO WE NEED INTERNAL AUDIT, FINANCIAL AUDIT OR COACHING?

2014

ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSComputingMilieux_LEGALASPECTSOFCOMPUTINGRevista Economica
researchProduct

Additional file 3 of Low awareness and common misconceptions about schistosomiasis in endemic lowland areas in Western Ethiopia: a mixed-methods study

2021

Additional file 3: Supplementary file 3 Schistosoma infection risky behaviors observation guide.pdf

ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSData_FILESComputingMethodologies_DOCUMENTANDTEXTPROCESSINGComputingMilieux_COMPUTERSANDSOCIETYComputerApplications_COMPUTERSINOTHERSYSTEMS
researchProduct

An Enhanced Authentication System for the JADE-S Platform

2004

Multi-agent systems require a set of security mechanism threats such as confidentiality, privacy, authentication, data integrity, access control. Authentication is the process of deducing which user has made a specific request in a multi-agent system. The goal of authentication is to allow legitimate system entities to process while denying illegitimate ones. The JADE-S platform requires that users must be authenticated, providing a username and password, in order to be able to perform actions on the platform. In this paper an enhanced user authentication system for the JADE-S platform, requiring user fingerprint in addition to the standard items, is outlined. Due to their uniqueness and im…

ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSData_MISCELLANEOUSFingerprintsJADE-SSecurityAuthentication SystemsMulti-Agent Systems
researchProduct

The engagement of auditors in the reporting of corporate social responsibility disclosure

2018

In this research, we aim to examine how large auditing firms and audit/non‐audit fees affect corporate social responsibility (CSR) disclosure. We show that the big four auditing firms and the audit and non‐audit fees paid by audited firms encourage CSR reporting. Overall, our findings suggest that big auditing firms play a relevant role in CSR disclosure, which may help to mitigate informative asymmetries between managers and stakeholders. Furthermore, audit and non‐audit fees paid by audited companies promote voluntary non‐financial information disclosure. These findings should be of interest to policymakers given the relevant role that CSR disclosure may play in the decision‐making proces…

ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSEmpreses Financeshealth services administrationComputingMilieux_COMPUTERSANDSOCIETYComputingMilieux_LEGALASPECTSOFCOMPUTINGchemical and pharmacologic phenomena
researchProduct

Bases del Derecho Administrativo

2013

Presentación en powerpoint sobre las Bases del Derecho Administrativo

ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSInformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.HCI)InformationSystems_INFORMATIONSYSTEMSAPPLICATIONSComputingMilieux_COMPUTERSANDEDUCATIONComputingMilieux_PERSONALCOMPUTINGUNESCO::CIENCIAS JURÍDICAS Y DERECHOderecho administrativo
researchProduct

Too many passwords? : How understanding our memory can increase password memorability

2018

Passwords are the most common authentication mechanism, that are only increasing with time. Previous research suggests that users cannot remember multiple passwords. Therefore, users adopt insecure password practices, such as password reuse in response to their perceived memory limitations. The critical question not currently examined is whether users’ memory capabilities for password recall are actually related to having a poor memory. This issue is imperative: if insecure password practices result from having a poor memory, then future password research and practice should focus on increasing the memorability of passwords. If, on the other hand, the problem is not solely related to memory…

ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSSoftware_OPERATINGSYSTEMSpassword securitymemorabilitytodentamineninformation securitymetamemorysalasanattietoturvahuman memorymuisti (kognitio)
researchProduct

Improving Password Memorability, While Not Inconveniencing the User

2019

Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental groups). Ps…

ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSSoftware_OPERATINGSYSTEMSpassword securitypassword security behaviorturvallisuuspassword memorabilityuser conveniencemuistaminensalasanatkäyttäjäkokemuspassword verificationtoisto
researchProduct