8 resultados para Security and Defence

em Abertay Research Collections - Abertay University’s repository


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The human factor is often recognised as a major aspect of cyber-security research. Risk and situational perception are identified as key factors in the decision making process, often playing a lead role in the adoption of security mechanisms. However, risk awareness and perception have been poorly investigated in the field of eHealth wearables. Whilst end-users often have limited understanding of privacy and security of wearables, assessing the perceived risks and consequences will help shape the usability of future security mechanisms. This paper present a survey of the the risks and situational awareness in eHealth services. An analysis of the lack of security and privacy measures in connected health devices is described with recommendations to circumvent critical situations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This essay addresses the fundamental conceptual challenges which face the development of the Area of Freedom Security and Justice (AFSJ) in the post-Lisbon Treaty era. It argues that Onuf style constructivism is a valid lens with which to examine the development of the AFSJ to date, involving as it does the development of a shared understanding by practitioners, predominantly law enforcement and prosecution professionals, within the structures provided for them, in order to develop a completely new area of law and practice. While this approach will continue to need to be deployed in the development of further new operational areas, such as cybercrime, a new approach is now required, that of constitutionalism. A variety of forms of constitutionalism are then examined in order to establish their suitability as a mode of analysis for these developments.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Situational Awareness provides a user centric approach to security and privacy. The human factor is often recognised as the weakest link in security, therefore situational perception and risk awareness play a leading role in the adoption and implementation of security mechanisms. In this study we assess the understanding of security and privacy of users in possession of wearable devices. The findings demonstrate privacy complacency, as the majority of users trust the application and the wearable device manufacturer. Moreover the survey findings demonstrate a lack of understanding of security and privacy by the sample population. Finally the theoretical implications of the findings are discussed.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Studies on hacking have typically focused on motivational aspects and general personality traits of the individuals who engage in hacking; little systematic research has been conducted on predispositions that may be associated not only with the choice to pursue a hacking career but also with performance in either naïve or expert populations. Here, we test the hypotheses that two traits that are typically enhanced in autism spectrum disorders—attention to detail and systemizing—may be positively related to both the choice of pursuing a career in information security and skilled performance in a prototypical hacking task (i.e., crypto-analysis or code-breaking). A group of naïve participants and of ethical hackers completed the Autism Spectrum Quotient, including an attention to detail scale, and the Systemizing Quotient (Baron-Cohen et al., 2001, 2003). They were also tested with behavioral tasks involving code-breaking and a control task involving security X-ray image interpretation. Hackers reported significantly higher systemizing and attention to detail than non-hackers. We found a positive relation between self-reported systemizing (but not attention to detail) and code-breaking skills in both hackers and non-hackers, whereas attention to detail (but not systemizing) was related with performance in the X-ray screening task in both groups, as previously reported with naïve participants (Rusconi et al., 2015). We discuss the theoretical and translational implications of our findings.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Studies on hacking have typically focused on motivational aspects and general personality traits of the individuals who engage in hacking; little systematic research has been conducted on predispositions that may be associated not only with the choice to pursue a hacking career but also with performance in either naïve or expert populations. Here, we test the hypotheses that two traits that are typically enhanced in autism spectrum disorders—attention to detail and systemizing—may be positively related to both the choice of pursuing a career in information security and skilled performance in a prototypical hacking task (i.e., crypto-analysis or code-breaking). A group of naïve participants and of ethical hackers completed the Autism Spectrum Quotient, including an attention to detail scale, and the Systemizing Quotient (Baron-Cohen et al., 2001, 2003). They were also tested with behavioral tasks involving code-breaking and a control task involving security X-ray image interpretation. Hackers reported significantly higher systemizing and attention to detail than non-hackers. We found a positive relation between self-reported systemizing (but not attention to detail) and code-breaking skills in both hackers and non-hackers, whereas attention to detail (but not systemizing) was related with performance in the X-ray screening task in both groups, as previously reported with naïve participants (Rusconi et al., 2015). We discuss the theoretical and translational implications of our findings.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Over the last few decades, the debate about “Peak Oil” became increasingly common and frustrating to governments, oil companies, and individuals. Also in the last decade or so, some unusual events took place which have raised the concern about the future of energy resources. These events lead policy makers to consider what is known today as “Energy Security.” The UK is one of these countries that fears the unknown future should petroleum resources worldwide become scarce or vanish. After the dwindling of the North Sea production, the UK found itself on the brink of losing its energy self-sufficiency. This article asks the questions: Has the UK’s oil and gas production peaked yet? If so, does the UK have a serious energy security problem, and if so, how may this problem be solved and what are the possible short, medium, and long-term solutions for such a concern? In answering these questions, the article discusses the concerns and challenges to the UK energy security and brings about the government plans for tackling these concerns. It is found that the UK does not experience an energy security problem on the short to medium-term, but it may suffer energy insecurity on the longer-term.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In recent years, the EU and its member states have experienced a number of changes, as well as challenges, in the areas of politics, economics, security and law. As these areas are interconnected, changes and challenges to any of them have implications for the others, as well as implications for the populations and institutions of the EU or those coming into contact with its international power and influence. This edited collection focuses primarily on security and law, particularly the EU’s internal security strategy. The EU’s Internal Security Strategy, adopted by the Spanish presidency early in 2010, followed the Lisbon Treaty in 2009, building on previous developments within the EU in the Area of Freedom Security and Justice (AFSJ) policy. The focus of the EU Internal Security Strategy is to prevent and combat “serious and organised crime, terrorism and cybercrime, in strengthening the management of our external borders and in building resilience to natural and man-made disasters”. The Internal Security strategy intersects and overlaps with the European Union’s Counter-terrorism strategy, the Strategy for the External Dimension of JHA, and the EU’s Security Strategy. The role of and interaction between these strategies, their supplementing documents, and their implications for crime, victims, the law, political relations, democracy and human rights, form the backdrop against which the chapters in this collection are written. Building on original research by its contributors, this collection comprises work by authors from a wide variety of academic and professional areas and perspectives, as well as different countries, on a variety of areas and issues related to or raised by the EU’s Internal Security Strategy, from intelligence-led policing to human trafficking and port security. This book examines, from a wide variety of disciplinary perspectives including law, geography, politics and practice, both this further refinement of existing internal provisions on cross-border crime, and the increasing external relations of the EU in the AFSJ.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

18 months embargo on the thesis and check appendix for copy right materials