Search results for "Information Security"
showing 10 items of 102 documents
Internet – Technical Development and Applications
2009
Internet technologies and systems are nowadays the key enablers of digital economy and modern world-wide connected society. This contributed book is a collection of cautiously chosen articles delivered by specialists with significant level of expertise in the domain of Internet technical foundations and its applications. The content of the book is divided into three parts: Internet - technical fundamentals and applications Information management systems Information security in distributed computer systems This book is a reference tool prepared for scientists and other persons involved in designing, implementation and evaluation of internet technologies. Its readers can be found among resear…
Tailorable Representation of Security Control Catalog on Semantic Wiki
2018
Selection of security controls to be implemented is an essential part of the information security management process in an organization. There exist a number of readily available information security management system standards, including control catalogs, that could be tailored by the organizations to meet their security objectives. Still, it has been noted that many organizations tend to lack even the implementation of the fundamental security controls. At the same time, semantic wikis have become popular collaboration and information sharing platforms that have proven their strength as an effective way to distribute domain-specific information within an organization. This paper evaluates…
Sieci społecznościowe w ukraińskiej edukacji: blaski i cienie
2018
W artykule przedstawiono koncepcyjne podstawy bezpieczeństwa w zakresie korzystania z sieci społecznościowych w edukacji na Ukrainie. Potwierdzono stanowisko, że tylko z wystarczającym stopniem kształcenia w tym wymiarze, edukacja nabywa nieprzerwanej formy i może skutecznie pełnić funkcję rozwoju aktualnych wartości dla narodu ukraińskiego i innych nacji. Podkreślono ideę potencjalnego wpływu sieci społecznych jako innowacyjnego narzędzia edukacyjnego wpływającego bezpośrednio lub pośrednio na bezpieczeństwo humanitarne państwa ukraińskiego. Wykazano, że wpływ ten jest spowodowany szybkim i dyskretnym rozpowszechnianiem informacji za pośrednictwem sieci społecznościowych, realizowanym zaró…
Review of web-based information security threats in smart grid
2017
The penetration of digital devices in Smart Grid has created a big security issue. OWASP is an online community of security professionals that identifies the most critical web application security risk in IT domain. Smart Grid also uses client-server based web-applications to collect and disseminate information. Therefore, Smart Grid network is analogous to IT network and similar kind of risk exists in the Smart Grid. This paper review the security risk in Smart Grid domain with reference to OWASP study. The Smart Grid security is more biased towards vulnerabilities associated with a machine to machine communication. Methodology to minimise the risk of attack is also discussed in this resea…
Security of information in IT systems
2005
The aim of the paper is to increase human awareness of the dangers connected with social engineering methods of obtaining information. The article demonstrates psychological and sociological methods of influencing people used in the attacks on IT systems. Little known techniques are presented about one of the greater threats that is electromagnetic emission or corona effect. Moreover, the work shows methods of protecting against this type of dangers. Also, in the paper one can find information on devices made according to the TEMPEST technology. The article not only discusses the methods of gathering information, but also instructs how to protect against its out-of-control loss.
Impact of deterrence theory methods on employees' information security behavior
2017
Peloteteoria (Deterrence theory) on alun perin psykologiassa ja kriminologiassa käytetty termi, ja sen mukaan rangaistuksen pelko estää yksilöä toimimasta vastoin lakia ja sääntöjä. Digitalisoituvassa maailmassa on viimeisen kahdenkymmenen vuoden aikana tehty paljon tutkimusta, jossa peloteteoriaa on sovellettu tietojärjestelmien sekä tietoturvakäyttäytymisen kontekstiin. Tutkielma käsittelee käytössä olevia peloteteorian keinoja tässä kontekstissa sekä nii-den vaikutuksia työntekijöiden tietoturvakäyttäytymiseen. Tutkielma on toteutettu kirjallisuuskatsauksena ja sen tarkoitus on määritellä peloteteorian käsitettä tietojärjestelmien ja tietoturvakäyttäytymisen kontekstissa sekä tutkia olem…
Effects of Sanctions, Moral Beliefs, and Neutralization on Information Security Policy Violations Across Cultures
2020
A principal concern of organizations is the failure of employees to comply with information security policies (ISPs). Deterrence theory is one of the most frequently used theories for examining ISP violations, yet studies using this theory have produced mixed results. Past research has indicated that cultural differences may be one reason for these inconsistent findings and have hence called for cross-cultural research on deterrence in information security. To address this gap, we formulated a model including deterrence, moral beliefs, shame, and neutralization techniques and tested it with the employees from 48 countries working for a large multinational company. peerReviewed
Modeling Vaccine Allocations in the COVID-19 Pandemic: A Case Study in Australia
2020
Timely allocation and distribution of COVID-19 vaccines on a large scale is a highly complex, dynamic, and context-specific task. The focus of this research on optimizing vaccine allocation is on the downstream part of a COVID-19 vaccine supply chain. Previous research on vaccine supply chains and pandemic supply chains has not fully incorporated the multitude of factors and underlying constraints affecting a vaccine supply chain which can be optimized to mitigate the risk of infection. An effective model is needed to conceptualize the process of the downstream vaccine supply chain to ensure efficient coordination and timely distribution of vaccines to the population. This paper develops a …
Agricultural Policy and the Struggle over the Destiny of Collective Farms in Estonia
1999
The principal goal of several Estonian governments has been the privatization of agriculture, replacing large collective farms with western family farms. This has happened despite a clear majority of kolkhoz and sovkhoz workers who favoured preserving the system of large-scale farms. The abstract restitutionalist and ultra-liberalist ideas became a fixed dogma, unconnected with resolving immediate pragmatic problems, because government policy was not articulated with the interests of the agricultural population. Nevertheless, the large-scale system has been partially preserved thanks to the resistance of the rural population. In many respects the outcome of decollectivization also depended …
Scatter search for an uncapacitated p-hub median problem
2015
Scatter search is a population-based method that has been shown to yield high-quality outcomes for combinatorial optimization problems. It uses strategies for combining solution vectors that have proved effective in a variety of problem settings. In this paper, we present a scatter search implementation for an NP -hard variant of the classic p-hub median problem. Specifically, we tackle the uncapacitated r-allocation p-hub median problem, which consists of minimizing the cost of transporting the traffics between nodes of a network through special facilities that act as transshipment points. This problem has a significant number of applications in practice, such as the design of transportati…