Search results for "Security"
showing 10 items of 1693 documents
Dual-process Accounts of Reasoning in User's Information System Risky Behavior
2016
End user of information system (IS) is the weakest point in terms of IS security. A variety of approaches are developed to convince end users to avoid IS risky behaviors. However, they do not always work. We would like to argue that one of the reasons is that previous studies focused on System 2 thinking (analytic, deliberate, rule-governed and effortful process) and overlooked the factors that can influence people who are using System 1 thinking (automatic, effortless, associative and intuitive process). In this study, we propose a model that integrates influential factors for both modes of thinking together. Moderators of such relationships will be discussed as well. A laboratory experime…
Abductive innovations in information security policy development : an ethnographic study
2019
Developing organisational information security (InfoSec) policies that account for international best practices but are contextual is as much an opportunity for improving InfoSec as it is a challenge. Previous research indicates that organisations should create InfoSec policies based on best practices (top-down) and simultaneously encourages participatory development (bottom-up). These contradictory suggestions place managers in a dilemma: Should they follow a top-down or bottom-up approach? In this research, we build on an ethnographic approach to study how an innovative engineering company (MachineryCorp) managed the contradiction when the firm developed an InfoSec policy. Drawing on the …
Chaînage de bases de données anonymisées pour les études épidémiologiques multicentriques nationales et internationales : proposition d'un algorithme…
2009
Background: Compiling individual records coming from different sources is very important for multicenter epidemiological studies; however, European directives and other national legislation concerning nominal data processing must be respected. These legal aspects can be satisfied by implementing mechanisms that allow anonymization of patient data (such as hashing techniques). Moreover, for security reasons, official recommendations suggest using different cryptographic keys in combination with a cryptographic hash function for each study. Unfortunately, this type of anonymization procedure is in contradiction with common requirements in public health and biomedical research because it becom…
Roadmap on 3D integral imaging: Sensing, processing, and display
2020
This Roadmap article on three-dimensional integral imaging provides an overview of some of the research activities in the field of integral imaging. The article discusses various aspects of the field including sensing of 3D scenes, processing of captured information, and 3D display and visualization of information. The paper consists of a series of 15 sections from the experts presenting various aspects of the field on sensing, processing, displays, augmented reality, microscopy, object recognition, and other applications. Each section represents the vision of its author to describe the progress, potential, vision, and challenging issues in this field.
Multiplexing of encrypted data using fractal masks
2012
In this Letter, we present to the best of our knowledge a new all-optical technique for multiple-image encryption and multiplexing, based on fractal encrypting masks. The optical architecture is a joint transform correlator. The multiplexed encrypted data are stored in a photorefractive crystal. The fractal parameters of the key can be easily tuned to lead to a multiplexing operation without cross talk effects. Experimental results that support the potential of the method are presented.
Immigrati e diritti sociali: parità di trattamento e tutela multilivello
2017
Il saggio analizza la tutela antidiscriminatoria di cui godono i lavoratori immigrati all'insegna di una prospettiva multilivello: più in particolare viene descritto il complesso di strumenti normativi del diritto nazionale ed europeo a tutela delle situazioni giuridiche soggettive degli immigrati (ad es., in materia di sicurezza sociale), per come interpretato dalla Corte Costituzionale, dalla Corte di Giustizia e dalla Corte EDU. Da ultimo, vengono analizzati i recenti orientamenti giurisprudenziali, che oscillano tra l'affievolimento del principio paritario in ragione di sempre più stringenti vincoli di bilancio, e la tendenziale parificazione tra cives e non cives alla luce del principi…
BlockSee: Blockchain for IoT video surveillance in smart cities
2018
The growing demand for safety in urban environments is supported by monitoring using video surveillance. The need to analyze multiple video-flows from different cameras deployed around the city by heterogeneous owners introduces vulnerabilities and privacy issues. Video frames, timestamps, and camera settings can be digitally manipulated by malicious users; the positions of cameras, their orientation and their mechanical settings can be physically manipulated. Digital and physical manipulations may have several effects, including the change of the observed scene and the potential violation of neighbors' privacy. To face these risks, we introduce BlockSee, a blockchain-based video surveillan…
"Table 8" of "Freeze-out radii extracted from three-pion cumulants in pp, p-Pb and Pb-Pb collisions at the LHC"
2014
Gaussian radii and intercept parameters in pp collisions versus Nch at low KT3.
Empirical Equations for the Direct Definition of Stress–Strain Laws for Fiber-Section-Based Macromodeling of Infilled Frames
2018
Equivalent strut macromodels are largely used to model the influence of infill walls in frame structures due to their simplicity and effectiveness from a computational point of view. Despite these advantages, which are fundamental to carrying out seismic simulation of complex structures, equivalent struts are phenomenological models and therefore have to conventionally account for the influence of really large amounts of geometrical and mechanical variables with a relatively simple inelastic response. Mechanical approaches, generally used to evaluate the force-displacement curve of a strut, are based on hypothesizing the damage mechanism that will occur for an infill-frame system subject to…
Ontology-based annotation and retrieval of services in the cloud
2014
Cloud computing is a technological paradigm that permits computing services to be offered over the Internet. This new service model is closely related to previous well-known distributed computing initiatives such as Web services and grid computing. In the current socio-economic climate, the affordability of cloud computing has made it one of the most popular recent innovations. This has led to the availability of more and more cloud services, as a consequence of which it is becoming increasingly difficult for service consumers to find and access those cloud services that fulfil their requirements. In this paper, we present a semantically-enhanced platform that will assist in the process of …