Search results for "Security"

showing 10 items of 1693 documents

Dual-process Accounts of Reasoning in User's Information System Risky Behavior

2016

End user of information system (IS) is the weakest point in terms of IS security. A variety of approaches are developed to convince end users to avoid IS risky behaviors. However, they do not always work. We would like to argue that one of the reasons is that previous studies focused on System 2 thinking (analytic, deliberate, rule-governed and effortful process) and overlooked the factors that can influence people who are using System 1 thinking (automatic, effortless, associative and intuitive process). In this study, we propose a model that integrates influential factors for both modes of thinking together. Moderators of such relationships will be discussed as well. A laboratory experime…

IS securitysystem 1 thinkingdual-process theorysystem 2 thinking
researchProduct

Abductive innovations in information security policy development : an ethnographic study

2019

Developing organisational information security (InfoSec) policies that account for international best practices but are contextual is as much an opportunity for improving InfoSec as it is a challenge. Previous research indicates that organisations should create InfoSec policies based on best practices (top-down) and simultaneously encourages participatory development (bottom-up). These contradictory suggestions place managers in a dilemma: Should they follow a top-down or bottom-up approach? In this research, we build on an ethnographic approach to study how an innovative engineering company (MachineryCorp) managed the contradiction when the firm developed an InfoSec policy. Drawing on the …

ISS policyKnowledge managementetnografiabusiness.industryBest practice05 social sciencestietoturvapolitiikkaorganisaatiot02 engineering and technologyInformation securityLibrary and Information Sciencesyrityksetinnovaatiotabductive innovation020204 information systemsPolitical science0502 economics and businessEthnography0202 electrical engineering electronic engineering information engineeringInformation security policytietoturvabusiness050203 business & managementInformation Systemsinformation security policy development
researchProduct

Chaînage de bases de données anonymisées pour les études épidémiologiques multicentriques nationales et internationales : proposition d'un algorithme…

2009

Background: Compiling individual records coming from different sources is very important for multicenter epidemiological studies; however, European directives and other national legislation concerning nominal data processing must be respected. These legal aspects can be satisfied by implementing mechanisms that allow anonymization of patient data (such as hashing techniques). Moreover, for security reasons, official recommendations suggest using different cryptographic keys in combination with a cryptographic hash function for each study. Unfortunately, this type of anonymization procedure is in contradiction with common requirements in public health and biomedical research because it becom…

Identité du patient020205 medical informaticsEpidemiologyComputer scienceHash functionEncryptionCryptographyPatient identificationSécuritéDossier médical du patient02 engineering and technologyComputer securitycomputer.software_genreEncryptionPublic-key cryptography03 medical and health sciences[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0302 clinical medicineAnonymized dataHashingChainage de données0202 electrical engineering electronic engineering information engineeringCryptographic hash functionDonnées anonymisées[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]030212 general & internal medicineChiffrementMulticenter studies[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]Secure Hash Algorithm[INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]business.industryUniversal hashingLinkageHachagePublic Health Environmental and Occupational Health16. Peace & justice3. Good health[SDV.SPEE] Life Sciences [q-bio]/Santé publique et épidémiologieEtudes multicentriquesSecurity[SDV.SPEE]Life Sciences [q-bio]/Santé publique et épidémiologiebusinesscomputerPersonally identifiable information
researchProduct

Roadmap on 3D integral imaging: Sensing, processing, and display

2020

This Roadmap article on three-dimensional integral imaging provides an overview of some of the research activities in the field of integral imaging. The article discusses various aspects of the field including sensing of 3D scenes, processing of captured information, and 3D display and visualization of information. The paper consists of a series of 15 sections from the experts presenting various aspects of the field on sensing, processing, displays, augmented reality, microscopy, object recognition, and other applications. Each section represents the vision of its author to describe the progress, potential, vision, and challenging issues in this field.

Image qualityComputer scienceReconeixement òptic de formesComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage processing02 engineering and technologySeguretat informàticaStereo display01 natural sciencesXifratge (Informàtica)Field (computer science)010309 opticsOpticsHuman–computer interactionComputer security0103 physical sciencesMicroscopyComunicacions òptiquesData encryption (Computer science)Integral imagingOptical pattern recognitionbusiness.industryOptical communicationsCognitive neuroscience of visual object recognitionÒptica021001 nanoscience & nanotechnologyAtomic and Molecular Physics and OpticsProcessament òptic de dadesVisualizationHolographic displayAugmented realityOptical data processing0210 nano-technologybusinessImatges Processament Tècniques digitals
researchProduct

Multiplexing of encrypted data using fractal masks

2012

In this Letter, we present to the best of our knowledge a new all-optical technique for multiple-image encryption and multiplexing, based on fractal encrypting masks. The optical architecture is a joint transform correlator. The multiplexed encrypted data are stored in a photorefractive crystal. The fractal parameters of the key can be easily tuned to lead to a multiplexing operation without cross talk effects. Experimental results that support the potential of the method are presented.

ImaginationImage EncryptionSystemComputer sciencemedia_common.quotation_subjectComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONTransformPhysics::OpticsStorageEncryptionMultiplexingCrosstalkSearch engineOpticsFractalElectronic engineeringDomainComputer Science::Information TheoryComputer Science::Cryptography and Securitymedia_commonbusiness.industryAtomic and Molecular Physics and OpticsOptical encryptionFISICA APLICADAPhotorefractive crystalOptical EncryptionbusinessTelecommunications
researchProduct

Immigrati e diritti sociali: parità di trattamento e tutela multilivello

2017

Il saggio analizza la tutela antidiscriminatoria di cui godono i lavoratori immigrati all'insegna di una prospettiva multilivello: più in particolare viene descritto il complesso di strumenti normativi del diritto nazionale ed europeo a tutela delle situazioni giuridiche soggettive degli immigrati (ad es., in materia di sicurezza sociale), per come interpretato dalla Corte Costituzionale, dalla Corte di Giustizia e dalla Corte EDU. Da ultimo, vengono analizzati i recenti orientamenti giurisprudenziali, che oscillano tra l'affievolimento del principio paritario in ragione di sempre più stringenti vincoli di bilancio, e la tendenziale parificazione tra cives e non cives alla luce del principi…

Immigration social rights non-discrimination multilevel protection freedom of movement social security budgetary constraints equality.Settore IUS/07 - Diritto Del LavoroImmigrazione diritti sociali non discriminazione tutela multilivello libera circolazione sicurezza sociale vincoli di bilancio eguaglianza.
researchProduct

BlockSee: Blockchain for IoT video surveillance in smart cities

2018

The growing demand for safety in urban environments is supported by monitoring using video surveillance. The need to analyze multiple video-flows from different cameras deployed around the city by heterogeneous owners introduces vulnerabilities and privacy issues. Video frames, timestamps, and camera settings can be digitally manipulated by malicious users; the positions of cameras, their orientation and their mechanical settings can be physically manipulated. Digital and physical manipulations may have several effects, including the change of the observed scene and the potential violation of neighbors' privacy. To face these risks, we introduce BlockSee, a blockchain-based video surveillan…

Immutabilityblockchain video surveillance privacyBlockchainbusiness.industryPHYSICAL MANIPULATIONSComputer scienceOrientation (computer vision)Settore ING-INF/03 - TelecomunicazioniComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020207 software engineeringMonitoring system02 engineering and technologyComputer securitycomputer.software_genreFace (geometry)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingTimestampInternet of Thingsbusinesscomputer
researchProduct

"Table 8" of "Freeze-out radii extracted from three-pion cumulants in pp, p-Pb and Pb-Pb collisions at the LHC"

2014

Gaussian radii and intercept parameters in pp collisions versus Nch at low KT3.

InclusiveProton-Proton ScatteringR7000.0Astrophysics::Earth and Planetary AstrophysicsP P --> PI+ XNuclear ExperimentP P --> PI- XlambdaComputer Science::Cryptography and Security
researchProduct

Empirical Equations for the Direct Definition of Stress–Strain Laws for Fiber-Section-Based Macromodeling of Infilled Frames

2018

Equivalent strut macromodels are largely used to model the influence of infill walls in frame structures due to their simplicity and effectiveness from a computational point of view. Despite these advantages, which are fundamental to carrying out seismic simulation of complex structures, equivalent struts are phenomenological models and therefore have to conventionally account for the influence of really large amounts of geometrical and mechanical variables with a relatively simple inelastic response. Mechanical approaches, generally used to evaluate the force-displacement curve of a strut, are based on hypothesizing the damage mechanism that will occur for an infill-frame system subject to…

Infilled framesComputer science0211 other engineering and technologies020101 civil engineering02 engineering and technologyFiber section; Finite element modeling (FEM); Infilled frames; Masonry; OpenSees; Reinforced concrete; Mechanics of Materials; Mechanical Engineering0201 civil engineeringOpenSeesInfillPoint (geometry)MasonryOpenSee021110 strategic defence & security studiesbusiness.industryFiber (mathematics)OpenSeesMechanical EngineeringStress–strain curveFrame (networking)Structural engineeringFiber sectionFinite element modeling (FEM)MasonryStrength of materialsReinforced concreteSettore ICAR/09 - Tecnica Delle CostruzioniMechanics of MaterialsbusinessInfilled frameJournal of Engineering Mechanics
researchProduct

Ontology-based annotation and retrieval of services in the cloud

2014

Cloud computing is a technological paradigm that permits computing services to be offered over the Internet. This new service model is closely related to previous well-known distributed computing initiatives such as Web services and grid computing. In the current socio-economic climate, the affordability of cloud computing has made it one of the most popular recent innovations. This has led to the availability of more and more cloud services, as a consequence of which it is becoming increasingly difficult for service consumers to find and access those cloud services that fulfil their requirements. In this paper, we present a semantically-enhanced platform that will assist in the process of …

Information Systems and ManagementCloud computing securitybusiness.industryComputer scienceServices computingCloud computingcomputer.software_genreManagement Information SystemsWorld Wide WebSemantic gridUtility computingGrid computingArtificial IntelligenceInformation and Communications TechnologySemantic computingOntologyThe InternetSemantic Web StackWeb servicebusinesscomputerSemantic WebSoftwareKnowledge-Based Systems
researchProduct