Search results for "Security"
showing 10 items of 1693 documents
Auxilum Medicine: A Cloud Based Platform for Real-Time Monitoring Medical Devices
2015
Nowadays, time is a very valuable resource and can make the difference between life and death. Having knowledge about this fact we decided to deal with one of the most important aspects of contemporary medicine, EMS (emergency medical services) response time. Modern systems that encourage intelligent communication methods between medical devices and doctors are a must in ubiquitous health care environments. Auxilum Medicine fosters a triple-win situation regarding the relationship between medical institutions, doctors and patients. Emergency patients should be treated with utmost care because their life is hanging by a thread if nobody is present to take immediate action. We are presenting …
ITIL Implementation: The Role of ITIL Software and Project Quality
2012
This research will investigate the implementation status of the Information Technology Infrastructure Library (ITIL) reference processes and the influence of ITIL software quality and ITIL project quality on implementation status. The paper analyzes data from a survey of 160 Nordic companies.
The United Nations and the European Union
2019
The European Union (EU) and the United Nations (UN) are expressions of a rules-based global order. The EU has enshrined support to the UN in its security strategies, and its priorities indicate an engagement in a wide range of UN programs and activities to maintain the rules-based order and adapt it to face internal and external challenges. The EU and its member states are the largest contributors to the UN budget. Following the adoption of the Lisbon treaty, the EU has increased its representation at the UN, gaining enhanced observer status in the General Assembly. However, because of the intergovernmental nature of the forum, only its member states have the right to vote. This has led sch…
Dynamic Modeling of the Cyber Security Threat Problem
2009
This chapter discusses the possible growth of black markets (BMs) for software vulnerabilities and factors affecting their spread. It is difficult to collect statistics about BMs for vulnerabilities and their associated transactions, as they are hidden from general view. We conduct a disguised observation of online BM trading sites to identify causal models of the ongoing viability of BMs. Our observation results are expressed as a system dynamic model. We implement simulations to observe the effects of possible actions to disrupt BMs. The results suggest that without interventions the number and size of BMs is likely to increase. A simulation scenario with a policy to halt BM operations re…
Ancel Keys (1904-2004)
2005
Trust-based framework for security enhancement of P2PSIP communication systems
2009
Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced trustworthiness and may cause security problems, e.g. privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a subjective based trust model that offers trust services during P2PSIP session establishment. The main issues considered in this model include opinion calculation, opinion maintenance, data confidentiality and integrity, message rou…
Cyber Security Strategy Implementation Architecture in a Value System
2018
In this chapter, we introduce an approach toward enhancing the quality of strategy implementation. As a framework, we use cybersecurity strategy implementation planning and execution. Justification for this work is the observed need to be able to perform strategy readjustment processes quickly and in an agile way, when needed. This requires processes and practices that are simple enough and executable with small resources in a relatively short timeframe. The problem statement can be formulated as follows: “We need to determine an utterly simplified, noncomplicated model to help us to tackle the complex problem of implementing a cybersecurity strategy of adequate efficiency in a changing ope…
Key drivers of internet banking services use
2009
PurposeThe purpose of this paper is to analyse the determinants of internet banking use, paying special attention to the role of product involvement, perceived risk and trust.Design/methodology/approachThe impact of trust, perceived risks, product involvement and TAM beliefs (ease of use and usefulness) on internet banking adoption is tested through structural equation modelling techniques. The sample consists of 511 Spanish internet banking services users and the data are collected through an internet survey. Risk is measured as a formative construct.FindingsData analysis shows that TAM beliefs and perceived risks (security, privacy, performance and social) have a direct influence on e‐ban…
Security of information in IT systems
2005
The aim of the paper is to increase human awareness of the dangers connected with social engineering methods of obtaining information. The article demonstrates psychological and sociological methods of influencing people used in the attacks on IT systems. Little known techniques are presented about one of the greater threats that is electromagnetic emission or corona effect. Moreover, the work shows methods of protecting against this type of dangers. Also, in the paper one can find information on devices made according to the TEMPEST technology. The article not only discusses the methods of gathering information, but also instructs how to protect against its out-of-control loss.
Corporate Governance and Company Law Reform: a German perspective
2005
Corporate crises and international trends in corporate governance have revealed the need for reform, and resulted in a great number of changes in corporate law. In spite of this, the existing legal framework for corporate governance in Germany presents itself reluctant to major changes. The German approach to reform has focused on the improvement of corporate monitoring by the supervisory board. It neither questions the two-tier structure, nor does it reconsider the existing representation of shareholders or other stakeholders under the current form of co-determination. The German Corporate Governance Code represents a new instrument of soft law and its recommendations are likely argued to …