Search results for "Information Security"

showing 10 items of 102 documents

Influence of Organizational Culture on Employees Information Security Policy Compliance in Ethiopian Companies

2021

Information security is one of the organizations' top agendas worldwide. Similarly, there is a growing trend in the kinds and rate of security breaches. Information security experts and scholars concentrate on outsiders' threats; conversely, insiders are responsible for most security breaches in organizations. Further, the majority of information security research findings are limited to solutions that are technically focused. However, it is now recognized that the technological approach alone does not carry the security level needed. So this led researchers to embark on socio-technical approaches. Thus, this study explores organizational culture's effect on employees' intention to comply w…

Rational Choice TheoryorganisaatiokulttuuriInformation SecuritytietoturvapolitiikkaInformation Security Policy CompliancetietoturvaOrganizational Culturerationaalisen valinnan teoria
researchProduct

Executives' Commitment to Information Security

2020

Two aspects of decision-making on information security spending, executives' varying preferences for how proposals should be presented and the framing of the proposals, are developed. The proposed model of executives' commitment to information security is an interaction model (in addition to the cost of a security solution, and the risk and the potential loss of a security threat) consisting of the interaction between an executive's preferred subordinate influence approach (PSIA), rational or inspirational, and the framing, positive or negative, of a security proposal. The interaction of these two constructs affects the executive's commitment to an information security proposal. The model i…

Security solutionComputer Networks and Communications05 social sciencesInformation securityCognitive biasManagement Information SystemsProspect theoryFraming (construction)0502 economics and businessResource allocationNormative050211 marketingBusinessMarketing050203 business & managementACM SIGMIS Database: the DATABASE for Advances in Information Systems
researchProduct

Mechanics and self-organization in tissue development

2021

Self-organization is an all-important feature of living systems that provides the means to achieve specialization and functionality at distinct spatio-temporal scales. Herein, we review this concept by addressing the packing organization of cells, the sorting/compartmentalization phenomenon of cell populations, and the propagation of organizing cues at the tissue level through traveling waves. We elaborate on how different theoretical models and tools from Topology, Physics, and Dynamical Systems have improved the understanding of self-organization by shedding light on the role played by mechanics as a driver of morphogenesis. Altogether, by providing a historical perspective, we show how i…

Self-organizationPhysicsSelf-organizationTraveling wavesDynamical systems theoryCell packingSortingCompartmentalization (information security)Cell BiologyMechanicsDevelopmental mechanismsLiving systemsCell sortingERKPhenomenonDevelopmental mechanicsSpecialization (functional)MorphogenesisHumansEpitheliaTopology (chemistry)Developmental BiologySignal Transduction
researchProduct

Monitoring wireless sensor networks through logical deductive processes

2006

This paper proposes a distributed multi-agent architecture for wireless sensor networks management, which exploits the dynamic reasoning capabilities of the Situation Calculus in order to emulate the reactive behavior of a human expert to fault situations. The information related to network events is generated by tunable agents installed on the network nodes and is collected by a logical entity for network managing where it is merged with general domain knowledge, with the aim of identifying the root causes of faults, and deciding on reparative actions. The logical inference system has being devised to carry out automated isolation, diagnosis, and, whenever possible, repair of network anoma…

Situation CalculuSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniEngineeringbusiness.industryMulti-agent systemDistributed computingReliability (computer networking)Network nodeInformation securityScalabilityWireless sensor networks managementDomain knowledgeSituation calculusbusinessLogical deductive processeWireless sensor networkWireless sensor networkNetwork management stationComputer networkMILCOM 2005 - 2005 IEEE Military Communications Conference
researchProduct

Learning temporal patterns for anomaly intrusion detection

2002

For the last decade an explosive spread of computer systems and computer networks has resulted in a society that is increasingly dependent on information stored on these systems. A computer system connected to the network is accessible from another computer in this network regardless of its geographical position. Along with providing many benefits for legitimate users this technology creates almost unlimited opportunities for malicious persons, which using software vulnerabilities may successfully penetrate the networked computer systems. In order to eliminate potential devastating consequences caused by breaches in computer systems, more and more attention is drawn to the information secur…

SoftwareOrder (exchange)Network securitybusiness.industryComputer scienceVulnerabilityPattern matchingIntrusion detection systemInformation securityComputer securitycomputer.software_genrebusinesscomputerProceedings of the 2002 ACM symposium on Applied computing
researchProduct

Too many passwords? How understanding our memory can increase password memorability

2018

Abstract Passwords are the most common authentication mechanism, that are only increasing with time. Previous research suggests that users cannot remember multiple passwords. Therefore, users adopt insecure password practices, such as password reuse in response to their perceived memory limitations. The critical question not currently examined is whether users’ memory capabilities for password recall are actually related to having a poor memory. This issue is imperative: if insecure password practices result from having a poor memory, then future password research and practice should focus on increasing the memorability of passwords. If, on the other hand, the problem is not solely related …

Software_OPERATINGSYSTEMSinformation securityComputer scienceInternet privacymetamemoryHuman Factors and ErgonomicsContext (language use)02 engineering and technologyEducationPassword strength020204 information systems0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencestietoturvaPassword psychology050107 human factorsmuisti (kognitio)human memoryta113PasswordAuthenticationmemorabilityCognitive passwordbusiness.industry05 social sciencesGeneral EngineeringsalasanatHuman-Computer InteractionComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSpassword securitytodentaminenHardware and ArchitectureauthenticationbusinessSoftwareInternational Journal of Human-Computer Studies
researchProduct

The Old Guard Under a New Order: K. O. Friedrichs Meets Felix Klein

2018

Constance Reid’s recent tribute to K. O. Friedrichs (Reid 1983) undoubtedly brought back fond memories to those who knew the man and his many achievements (see also Reid 1986). It was a great pleasure for me to interview Friedrichs in January 1982, only about a year before his death. He was already in very delicate health. His wife Nellie (see Biegel 2012) was kind enough to arrange the interview, but warned me beforehand that her husband tired rather easily and was somewhat hard of hearing. Nevertheless, he was extremely forthcoming in discussing his early career with me, and quick to dismiss some of my faulty misconceptions regarding Gottingen mathematics in the 1920s, which was the main …

Somewhat hardGuard (information security)Psychoanalysismedia_common.quotation_subjectWifeTributeConversationEarly careerOrder (virtue)media_commonPleasure
researchProduct

Bivariate analysis of taekwondo actions: The effectiveness of techniques and tactics in an Olympic taekwondo championship.

2020

This paper describes the effectiveness of technical-tactical actions performed during a tournament. A total of 14,145 actions of the 2012 London Olympic Games were analysed. Differences emerged in the use of tactics, techniques, zones, legs and guard to score. Regarding tactics, anticipatory counterattacks were the most effective for scoring one and three points. Circular techniques were the most effective for scoring one point, linear to score three points, and spin techniques to score two and four points. Actions to the chest results in a score of one to two points and actions to the head in a score of three to four points. The rear leg was more effective in scoring one, two and four poin…

Taekwondo athletesGuard (information security)taekwondo athletesbiologyAthletesEffective patternsApplied psychologyPerformance analysistaekwondo athletes.Physical Therapy Sports Therapy and RehabilitationBivariate analysisbiology.organism_classificationObservational methodologyEducación Física y Deportivaeffective patternsTournamentobservational methodologylcsh:Sports medicineChampionshipperformance analysislcsh:RC1200-1245PsychologyObservational methodology
researchProduct

Managing Emerging Information Security Risks during Transitions to Integrated Operations

2010

Paper presented at the 2010 43rd Hawaii International Conference on System Sciences (HICSS). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/HICSS.2010.260 The Norwegian Oil and Gas Industry is adopting new information communication technology to connect its offshore platforms, onshore control centers and the suppliers. Th…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424business.industryControl (management)Information securityIntegrated operationsComputer securitycomputer.software_genreInvestment (macroeconomics)System dynamicsRisk analysis (engineering)Information and Communications TechnologybusinesscomputerRisk managementVulnerability (computing)2010 43rd Hawaii International Conference on System Sciences
researchProduct

Honeypot utilization for analyzing cyber attacks

2016

Honeypot systems are an effective method for defending production systems from security breaches and to gain detailed information about attackers' motivation, tactics, software and infrastructure. In this paper we present how different types of honeypots can be employed to gain valuable information about attacks and attackers, and also outline new and innovative possibilities for future research.

World Wide WebEngineeringHoneypotSoftwarebusiness.industryPseudoserverEffective methodInformation securitybusinessComputer securitycomputer.software_genrecomputerHackerProccedings of the 10th European Conference on Software Architecture Workshops
researchProduct