Search results for "Information Security"
showing 10 items of 102 documents
Influence of Organizational Culture on Employees Information Security Policy Compliance in Ethiopian Companies
2021
Information security is one of the organizations' top agendas worldwide. Similarly, there is a growing trend in the kinds and rate of security breaches. Information security experts and scholars concentrate on outsiders' threats; conversely, insiders are responsible for most security breaches in organizations. Further, the majority of information security research findings are limited to solutions that are technically focused. However, it is now recognized that the technological approach alone does not carry the security level needed. So this led researchers to embark on socio-technical approaches. Thus, this study explores organizational culture's effect on employees' intention to comply w…
Executives' Commitment to Information Security
2020
Two aspects of decision-making on information security spending, executives' varying preferences for how proposals should be presented and the framing of the proposals, are developed. The proposed model of executives' commitment to information security is an interaction model (in addition to the cost of a security solution, and the risk and the potential loss of a security threat) consisting of the interaction between an executive's preferred subordinate influence approach (PSIA), rational or inspirational, and the framing, positive or negative, of a security proposal. The interaction of these two constructs affects the executive's commitment to an information security proposal. The model i…
Mechanics and self-organization in tissue development
2021
Self-organization is an all-important feature of living systems that provides the means to achieve specialization and functionality at distinct spatio-temporal scales. Herein, we review this concept by addressing the packing organization of cells, the sorting/compartmentalization phenomenon of cell populations, and the propagation of organizing cues at the tissue level through traveling waves. We elaborate on how different theoretical models and tools from Topology, Physics, and Dynamical Systems have improved the understanding of self-organization by shedding light on the role played by mechanics as a driver of morphogenesis. Altogether, by providing a historical perspective, we show how i…
Monitoring wireless sensor networks through logical deductive processes
2006
This paper proposes a distributed multi-agent architecture for wireless sensor networks management, which exploits the dynamic reasoning capabilities of the Situation Calculus in order to emulate the reactive behavior of a human expert to fault situations. The information related to network events is generated by tunable agents installed on the network nodes and is collected by a logical entity for network managing where it is merged with general domain knowledge, with the aim of identifying the root causes of faults, and deciding on reparative actions. The logical inference system has being devised to carry out automated isolation, diagnosis, and, whenever possible, repair of network anoma…
Learning temporal patterns for anomaly intrusion detection
2002
For the last decade an explosive spread of computer systems and computer networks has resulted in a society that is increasingly dependent on information stored on these systems. A computer system connected to the network is accessible from another computer in this network regardless of its geographical position. Along with providing many benefits for legitimate users this technology creates almost unlimited opportunities for malicious persons, which using software vulnerabilities may successfully penetrate the networked computer systems. In order to eliminate potential devastating consequences caused by breaches in computer systems, more and more attention is drawn to the information secur…
Too many passwords? How understanding our memory can increase password memorability
2018
Abstract Passwords are the most common authentication mechanism, that are only increasing with time. Previous research suggests that users cannot remember multiple passwords. Therefore, users adopt insecure password practices, such as password reuse in response to their perceived memory limitations. The critical question not currently examined is whether users’ memory capabilities for password recall are actually related to having a poor memory. This issue is imperative: if insecure password practices result from having a poor memory, then future password research and practice should focus on increasing the memorability of passwords. If, on the other hand, the problem is not solely related …
The Old Guard Under a New Order: K. O. Friedrichs Meets Felix Klein
2018
Constance Reid’s recent tribute to K. O. Friedrichs (Reid 1983) undoubtedly brought back fond memories to those who knew the man and his many achievements (see also Reid 1986). It was a great pleasure for me to interview Friedrichs in January 1982, only about a year before his death. He was already in very delicate health. His wife Nellie (see Biegel 2012) was kind enough to arrange the interview, but warned me beforehand that her husband tired rather easily and was somewhat hard of hearing. Nevertheless, he was extremely forthcoming in discussing his early career with me, and quick to dismiss some of my faulty misconceptions regarding Gottingen mathematics in the 1920s, which was the main …
Bivariate analysis of taekwondo actions: The effectiveness of techniques and tactics in an Olympic taekwondo championship.
2020
This paper describes the effectiveness of technical-tactical actions performed during a tournament. A total of 14,145 actions of the 2012 London Olympic Games were analysed. Differences emerged in the use of tactics, techniques, zones, legs and guard to score. Regarding tactics, anticipatory counterattacks were the most effective for scoring one and three points. Circular techniques were the most effective for scoring one point, linear to score three points, and spin techniques to score two and four points. Actions to the chest results in a score of one to two points and actions to the head in a score of three to four points. The rear leg was more effective in scoring one, two and four poin…
Managing Emerging Information Security Risks during Transitions to Integrated Operations
2010
Paper presented at the 2010 43rd Hawaii International Conference on System Sciences (HICSS). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/HICSS.2010.260 The Norwegian Oil and Gas Industry is adopting new information communication technology to connect its offshore platforms, onshore control centers and the suppliers. Th…
Honeypot utilization for analyzing cyber attacks
2016
Honeypot systems are an effective method for defending production systems from security breaches and to gain detailed information about attackers' motivation, tactics, software and infrastructure. In this paper we present how different types of honeypots can be employed to gain valuable information about attacks and attackers, and also outline new and innovative possibilities for future research.