6 resultados para Internet Security
em QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast
Resumo:
The research examines the relationships between three common trust considerations (vendor, Internet and third parties) and attitudes towards online purchasing. The study incorporates privacy and security concerns as a moderating variable and finds that these relationships vary depending on the level of concerns a consumer has when purchasing online. The study suggests that "fears" surrounding the Internet as a place to do business still hinder the use of it for e-commerce purposes, but that the presence of a reputable agent might in some manner mitigate this risk. In the context of business to consumer relationships trust in the vendor is important for the consumer to accept any risk associated with a transaction. Theoretical implications for online customer behavior theory are also discussed. © 2009 Elsevier Inc.
Resumo:
‘Grooming’ and the Sexual Abuse of Children: Institutional, Internet and Familial Dimensions critically examines the official and popular discourses on grooming, predominantly framed within the context of on-line sexual exploitation and abuse committed by strangers, and institutional child abuse committed by those in positions of trust.
Set against the broader theoretical framework of risk, security and governance, this book argues that due to the difficulties of drawing clear boundaries between innocuous and harmful motivations towards children, pre-emptive risk-based criminal law and policy are inherently limited in preventing, targeting and criminalising ‘grooming’ behaviour prior to the manifestation of actual harm. Through examination of grooming against the complexities of the onset of sexual offending against children and its actual role in this process, the author broadens existing discourses by providing a fuller, more nuanced conceptualisation of grooming, including its role in intra-familial and extra-familial contexts. There is also timely discussion of new and emerging forms of grooming, such as ‘street’ or ‘localised’ grooming, as typified by recent cases in Rochdale and Oldham, and ‘peer-to-peer’ grooming.
The first inter-disciplinary, thematic, and empirical investigation of grooming in a multi-jurisdictional context, ‘Grooming’ and the Sexual Abuse of Children draws on extensive empirical research in the form of over fifty interviews with professionals, working in the fields of sex offender risk assessment, management or treatment, as well as child protection or victim support in the four jurisdictions of the United Kingdom and the Republic of Ireland. Impeccably presented and meticulously considered, this book will be of interest to criminologists and those working and studying in the field of policing and criminal justice studies, as well as policy makers and practitioners in the areas of child protection and sex offender management.
Resumo:
This paper considers the enhancement of loss-of-mains detection by use of a differential rate-of-change-of-frequency relay to reduce nuisance tripping and improve sensitivity to small excursions in frequency. The telecommunications media which might carry the differential ROCOF signal are reviewed with a focus on channel latency, bandwidth and security.
Resumo:
Software-as-a-service (SaaS) is a type of software service delivery model which encompasses a broad range of business opportunities and challenges. Users and service providers are reluctant to integrate their business into SaaS due to its security concerns while at the same time they are attracted by its benefits. This article highlights SaaS utility and applicability in different environments like cloud computing, mobile cloud computing, software defined networking and Internet of things. It then embarks on the analysis of SaaS security challenges spanning across data security, application security and SaaS deployment security. A detailed review of the existing mainstream solutions to tackle the respective security issues mapping into different SaaS security challenges is presented. Finally, possible solutions or techniques which can be applied in tandem are presented for a secure SaaS platform.
Resumo:
The myriad of technologies and protocols working at different layers pose significant security challenges in the upcoming Internet of Things (IoT) paradigm. Security features and needs vary from application to application and it is layer specific. In addition, security has to consider the constraints imposed by energy limited sensor nodes and consider the specific target application in order to provide security at different layers. This paper analyses current standardization efforts and protocols. It proposes a generic secured network topology for IoT and describes the relevant security challenges. Some exploitation examples are also provided.
Resumo:
Network security monitoring remains a challenge. As global networks scale up, in terms of traffic, volume and speed, effective attribution of cyber attacks is increasingly difficult. The problem is compounded by a combination of other factors, including the architecture of the Internet, multi-stage attacks and increasing volumes of nonproductive traffic. This paper proposes to shift the focus of security monitoring from the source to the target. Simply put, resources devoted to detection and attribution should be redeployed to efficiently monitor for targeting and prevention of attacks. The effort of detection should aim to determine whether a node is under attack, and if so, effectively prevent the attack. This paper contributes by systematically reviewing the structural, operational and legal reasons underlying this argument, and presents empirical evidence to support a shift away from attribution to favour of a target-centric monitoring approach. A carefully deployed set of experiments are presented and a detailed analysis of the results is achieved.