858 resultados para IT Security, Internet, Personal Firewall, Security Mechanism, Security System, Security Threat, Security Usability, Security Vulnerability


Relevância:

80.00% 80.00%

Publicador:

Resumo:

'Preventive detention' refers to detention by executive order as a&nbsp; precautionary measure based on predicted criminal conduct. Detention is without criminal charge or trial as detention is based on the prediction of a future offence. This paper examines Article 5 of the European Convention for the Protection of Human Rights and Fundamental Freedoms ('ECHR'), in particular Article 5(1)(c) and Article 5(3). To explore this issue, this paper conducts a textual analysis of Article 5 and examines both the travaux preacuteparatoires of the ECHR, as well as jurisprudence of the European Court of Human Rights. This article argues that preventive detention is specifically provided for under the second ground of detention in Article 5(1)(c). A person in preventive detention, however, must be brought promptly before judicial authority under Article 5(3). <br />

Relevância:

80.00% 80.00%

Publicador:

Relevância:

80.00% 80.00%

Publicador:

Resumo:

There have been many standards and guides written for the implementation of computer security and information security concentrating on appropriate implementation of procedures for effective information security management. Such guides are limited when dealing with e-business and its implementation by Small and Medium Business Enterprises (SMEs). In Australia the National Office for the Information Economy (NOIE) has released a small business guide for e-security for performing such services while fulfilling the necessary security requirements. This paper presents an overview of this current small business guide to e-security with special reference to deriving a common set of criteria for implementing security measures in the SME e-business environment.<br />

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The advancement in Internet and bandwidth has resulted in a number of new applications to be developed. An area of advancement has been in the development of virtual worlds, where people can interact together via virtual characters. Virtual World systems have been so complex that virtual lives can be lived, including all aspect of life such as education, commerce, social activities etc. Not surprisingly, the problems that exist in the real world such as theft, fraud, vandalism and terrorism, also exist in the virtual worlds. The more developed these virtual worlds become the greater the breaches of security will be in the virtual as well as the real world.This paper explores and categorises several security issues within the Virtual World of Second Life. It contributes to practice and research by emphasising the importance of security awareness for businesses and the general public in Virtual Worlds.<br />

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The process of buying, selling or interacting with customers via Internet, Tele-sale, Smart card or other computer network is referred to as Electronics Commerce. Whereas online trade has been touting its flexibility, convenience and cost savings, the newest entrant is wireless e-commerce. This form of business offers many attractions; including 24 hours seven days&rsquo; open shop&ndash;business, vastly reduced fixed cost, and increased profitability. Amazon.com is an example of a successful venture, in e-business. Internet Service providers (ISP/ASP) have a significant influence on the feasibility, security and cost competitiveness of an e-business venture. In the ISP model of services, multiple users and their databases are normally offered on a single hardware, platform sharing the same IP address and Domain name. Clients will require a mechanism, which allows them to update their Web contents and databases frequently even many times daily without intervention of local system Administrator (ISP Admin). The paper overviews few steps to enable corporate clients to update their web content more securely.<br />

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The advancement in Internet and bandwidth has resulted in a number of new applications to be developed; many of these newer applications are described as being Web 2. A web 2 application such as Facebook has allowed people around the world to interact together. One of the interesting aspects of Facebook is the use of third parties applications and the interactions that this allows.<br /><br />Not surprisingly, the problems that exist in the real world such as theft, fraud, vandalism also exist in online environment, and Web 2 applications are not exception to these issues. This paper explores and categorises several security issues within the Facebook environment. It contributes to practice and research by emphasising the importance of security awareness for businesses and the general public in the use of Web 2 applications such as Facebook.<br />

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Effective multiple clustering systems, or clusterers, have important applications in information security. The aim of the present article is to introduce a new method of designing multiple clusterers based on theMunn rings and describe a class of optimal clusterers which can be obtained in this construction.<br />

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The design of multiple classification and clustering systems for the detection of malware is an important problem in internet security. Grobner-Shirshov bases have been used recently by Dazeley et al. [15] to develop an algorithm for constructions with certain restrictions on the sandwich-matrices. We develop a new Grobner Shirshov algorithm which applies to a larger variety of constructions based on combinatorial Rees matrix semigroups without any restrictions on the sandwich matrices.<br />