Search results for "Information Security"

showing 10 items of 102 documents

Internet – Technical Development and Applications

2009

Internet technologies and systems are nowadays the key enablers of digital economy and modern world-wide connected society. This contributed book is a collection of cautiously chosen articles delivered by specialists with significant level of expertise in the domain of Internet technical foundations and its applications. The content of the book is divided into three parts: Internet - technical fundamentals and applications Information management systems Information security in distributed computer systems This book is a reference tool prepared for scientists and other persons involved in designing, implementation and evaluation of internet technologies. Its readers can be found among resear…

World Wide WebEngineeringManagement information systemsbusiness.industryKey (cryptography)The InternetDigital economyInformation securitybusinessDomain (software engineering)
researchProduct

Tailorable Representation of Security Control Catalog on Semantic Wiki

2018

Selection of security controls to be implemented is an essential part of the information security management process in an organization. There exist a number of readily available information security management system standards, including control catalogs, that could be tailored by the organizations to meet their security objectives. Still, it has been noted that many organizations tend to lack even the implementation of the fundamental security controls. At the same time, semantic wikis have become popular collaboration and information sharing platforms that have proven their strength as an effective way to distribute domain-specific information within an organization. This paper evaluates…

World Wide WebInformation security managementKnowledge basebusiness.industryProcess (engineering)Computer scienceInformation sharingControl (management)Information securitybusinessSecurity controlsInformation security management system
researchProduct

Sieci społecznościowe w ukraińskiej edukacji: blaski i cienie

2018

W artykule przedstawiono koncepcyjne podstawy bezpieczeństwa w zakresie korzystania z sieci społecznościowych w edukacji na Ukrainie. Potwierdzono stanowisko, że tylko z wystarczającym stopniem kształcenia w tym wymiarze, edukacja nabywa nieprzerwanej formy i może skutecznie pełnić funkcję rozwoju aktualnych wartości dla narodu ukraińskiego i innych nacji. Podkreślono ideę potencjalnego wpływu sieci społecznych jako innowacyjnego narzędzia edukacyjnego wpływającego bezpośrednio lub pośrednio na bezpieczeństwo humanitarne państwa ukraińskiego. Wykazano, że wpływ ten jest spowodowany szybkim i dyskretnym rozpowszechnianiem informacji za pośrednictwem sieci społecznościowych, realizowanym zaró…

bezpieczeństwo informacyjneinformation spheresocial networkseducationinformation securityvirtual realitysfera informacyjnaportale społecznościowerzeczywistość wirtualnaZeszyty Naukowe Politechniki Śląskiej. Organizacja i Zarządzanie
researchProduct

Review of web-based information security threats in smart grid

2017

The penetration of digital devices in Smart Grid has created a big security issue. OWASP is an online community of security professionals that identifies the most critical web application security risk in IT domain. Smart Grid also uses client-server based web-applications to collect and disseminate information. Therefore, Smart Grid network is analogous to IT network and similar kind of risk exists in the Smart Grid. This paper review the security risk in Smart Grid domain with reference to OWASP study. The Smart Grid security is more biased towards vulnerabilities associated with a machine to machine communication. Methodology to minimise the risk of attack is also discussed in this resea…

business.industryComputer scienceCross-site scriptingAccess controlInformation securityComputer securitycomputer.software_genreWeb application securityMachine to machineSmart gridWeb applicationbusinesscomputerDissemination2017 7th International Conference on Power Systems (ICPS)
researchProduct

Security of information in IT systems

2005

The aim of the paper is to increase human awareness of the dangers connected with social engineering methods of obtaining information. The article demonstrates psychological and sociological methods of influencing people used in the attacks on IT systems. Little known techniques are presented about one of the greater threats that is electromagnetic emission or corona effect. Moreover, the work shows methods of protecting against this type of dangers. Also, in the paper one can find information on devices made according to the TEMPEST technology. The article not only discusses the methods of gathering information, but also instructs how to protect against its out-of-control loss.

business.industrySocial engineering (security)Telecommunication securityInformation technologyEavesdroppingElectromagnetic emissionComputer securitycomputer.software_genreInformation protection policyInformation security managementSociologyTempestbusinesscomputerSPIE Proceedings
researchProduct

Impact of deterrence theory methods on employees' information security behavior

2017

Peloteteoria (Deterrence theory) on alun perin psykologiassa ja kriminologiassa käytetty termi, ja sen mukaan rangaistuksen pelko estää yksilöä toimimasta vastoin lakia ja sääntöjä. Digitalisoituvassa maailmassa on viimeisen kahdenkymmenen vuoden aikana tehty paljon tutkimusta, jossa peloteteoriaa on sovellettu tietojärjestelmien sekä tietoturvakäyttäytymisen kontekstiin. Tutkielma käsittelee käytössä olevia peloteteorian keinoja tässä kontekstissa sekä nii-den vaikutuksia työntekijöiden tietoturvakäyttäytymiseen. Tutkielma on toteutettu kirjallisuuskatsauksena ja sen tarkoitus on määritellä peloteteorian käsitettä tietojärjestelmien ja tietoturvakäyttäytymisen kontekstissa sekä tutkia olem…

deterrenceinformaatioturvallisuusohjeidenmukaisuusinformation securitybehaviorkäyttäytyminencompliancepeloteteoria
researchProduct

Effects of Sanctions, Moral Beliefs, and Neutralization on Information Security Policy Violations Across Cultures

2020

A principal concern of organizations is the failure of employees to comply with information security policies (ISPs). Deterrence theory is one of the most frequently used theories for examining ISP violations, yet studies using this theory have produced mixed results. Past research has indicated that cultural differences may be one reason for these inconsistent findings and have hence called for cross-cultural research on deterrence in information security. To address this gap, we formulated a model including deterrence, moral beliefs, shame, and neutralization techniques and tested it with the employees from 48 countries working for a large multinational company. peerReviewed

deterrencekansainväliset yrityksetinformation securityshameorganisaatiottietoturvapolitiikkaneutralizationrikkomuksetmoraalikulttuurienvälinen tutkimusnational culturekulttuurierotmoral beliefsinformation security policy violationstietoturvakansallinen kulttuuri
researchProduct

Modeling Vaccine Allocations in the COVID-19 Pandemic: A Case Study in Australia

2020

Timely allocation and distribution of COVID-19 vaccines on a large scale is a highly complex, dynamic, and context-specific task. The focus of this research on optimizing vaccine allocation is on the downstream part of a COVID-19 vaccine supply chain. Previous research on vaccine supply chains and pandemic supply chains has not fully incorporated the multitude of factors and underlying constraints affecting a vaccine supply chain which can be optimized to mitigate the risk of infection. An effective model is needed to conceptualize the process of the downstream vaccine supply chain to ensure efficient coordination and timely distribution of vaccines to the population. This paper develops a …

education.field_of_studyGovernmentTransshipment (information security)Computer sciencemedia_common.quotation_subjectSupply chainRisk of infectionPopulationRisk analysis (engineering)Scale (social sciences)PandemicConceptual modeleducationmedia_commonSSRN Electronic Journal
researchProduct

Agricultural Policy and the Struggle over the Destiny of Collective Farms in Estonia

1999

The principal goal of several Estonian governments has been the privatization of agriculture, replacing large collective farms with western family farms. This has happened despite a clear majority of kolkhoz and sovkhoz workers who favoured preserving the system of large-scale farms. The abstract restitutionalist and ultra-liberalist ideas became a fixed dogma, unconnected with resolving immediate pragmatic problems, because government policy was not articulated with the interests of the agricultural population. Nevertheless, the large-scale system has been partially preserved thanks to the resistance of the rural population. In many respects the outcome of decollectivization also depended …

education.field_of_studyGuard (information security)Sociology and Political Sciencebusiness.industryPopulationPublic policyNationalist MovementEstonianlanguage.human_languageKolkhozEconomyAgriculturelanguageAgricultural policySociologyeducationbusinessSociologia Ruralis
researchProduct

Scatter search for an uncapacitated p-hub median problem

2015

Scatter search is a population-based method that has been shown to yield high-quality outcomes for combinatorial optimization problems. It uses strategies for combining solution vectors that have proved effective in a variety of problem settings. In this paper, we present a scatter search implementation for an NP -hard variant of the classic p-hub median problem. Specifically, we tackle the uncapacitated r-allocation p-hub median problem, which consists of minimizing the cost of transporting the traffics between nodes of a network through special facilities that act as transshipment points. This problem has a significant number of applications in practice, such as the design of transportati…

education.field_of_studyMathematical optimizationGeneral Computer ScienceRelation (database)Transshipment (information security)PopulationCombinatorial optimization problemExtension (predicate logic)Management Science and Operations ResearchModeling and SimulationCombinatorial optimizationeducationMetaheuristicImplementationMathematicsComputers & Operations Research
researchProduct