963 resultados para cyber security, securitization, information technology, U.S CYBERCOM


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mobile agents have been implemented in e-commerce to search and filter information of interest from electronic markets. When the in format ion is very sensitive and critical, it is important to develop a novel security protocol that can efficiently protect the information from malicious tampering as well as unauthorized disclosure or at least detect any malicious act of intruders. In this chapter, we describe robust security techniques that ensure a sound security of information gathered throughout agent's itinerary against various security attacks, as well as truncation attacks. A sound security protocol is described , which implements the various security techniques that would jointly prevent or at least detect any malicious act of intruders. We reason about the soundness of the protocol using Symbolic Trace Analyzer (STA), a formal verification tool that is based on symbolic techniques. We analyze the protocol in key configurations and show that it is free of flaws. We also show that the protocol fulfils the various security requirements of exchanged information in MAS, including data-integrity, data-confidentiality, data authenticity, origin confidentiality and data non-repudiability.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper attempts to reduce the research gap in the alliance learning literature by reporting the results of a study based on a conceptual model on the Australian ICT industry, which is tested through Structural Equation Modelling (SEM). The conceptual model includes six constructs (alliance performance, learning orientation, market orientation, relational norms, trust and knowledge intensity). Suggestions for practitioners involved in alliances and directions for future research are espoused.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mobile computing devices such as personal digital assistants, smart mobile phones, and other handheld computing devices hold much promise in terms of their organizational application. Many existing models of the individual acceptance and implementation of information technology in organizational contexts have been developed in the era of “at the office” computing such as MIS, office automation, groupware, and so forth. We conducted two in-depth case studies of the implementation of mobile technology in healthcare organizations. The studies highlight interrelated individual use contexts due to the mobility of the technology: the individual as employee, as professional, as private user, and as member of society. The cases show that influences emanating from these use contexts impacted on the individual adoption of the technology within the organization. While broad extra-organizational influences are incorporated in some existing individual technology adoption models, we show that it becomes relevant to accommodate these influences more specifically in research models of mobile computing in organizations. Based on the extant literature and the case study data we pave the way toward more comprehensive models of the adoption and implementation of mobile technologies in organizations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Addressing the diversity in information requirements across the enterprise is a central challenge in enterprise content management. Enterprise information portals (EIPs) hold promise in this regard, offering each user a gateway to customized and personalized content. However, in large organizations EIP implementers face the complexity of tailoring portals for potentially thousands of users. A conceptual framework based on marketing fundamentals is developed to inform EIP implementation in this respect. It is argued that EIP implementers should view their user community as a number of distinct segments in order to address divergent needs more specifically (as opposed to a ‘one size fits all’ approach). For each identified segment, a ‘mix’ of content (product), distribution (place), promotion and price (cost) should be considered. The framework is applied to two cases of EIP implementation in large organizations. It is proposed that segmentation enables better planning of the overall EIP implementation effort. Considerations such as the number of user segments, customization, and personalization of content, and the funding of EIP development in large organizations are also discussed. The concepts elaborated here also hold theoretical relevance for other IS implementation contexts that involve very large usercommunities with diverse information

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An effective and efficient scheme along with a number of related algorithms were presented in this thesis for detecting stepping stones in real Internet environments, even when evasion techniques are used by attackers. A high quantitative comparative experimental analysis on stepping stone detection systems was conducted as well.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mobile agents are expected to run in partially unknown and untrustworthy environments. They transport from one host to another host through insecure channels and may execute on non-trusted hosts. Thus, they are vulnerable to direct security attacks of intruders and non-trusted hosts. The security of information the agents collect is a fundamental requirement for a trusted implementation of electronic business applications and trade negotiations. This chapter discusses the security protocols presented in the literature that aim to secure the data mobile agents gather while searching the Internet, and identifies the security flaws revealed in the protocols. The protocols are analyzed with respect to the security properties, and the security flaws are identified. Two recent promising protocols that fulfill the various security properties are described. The chapter also introduces common notations used in describing security protocols and describes the security properties of the data that mobile agents gather.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The thesis has covered a range of algorithms that help to improve the security of web services. The research focused on the problems of DDoS attack and traffic analysis attack against service availability and information privacy respectively. Finally, this research significantly advantaged DDoS attack detection and web access anonymity.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Information and communication technologies such as email, text messaging and video messaging are commonly used by the general population. However, international research has shown that they are not used routinely by GPs to communicate or consult with patients. Investigating Victorian GPs’ perceptions of doing so is timely given Australia’s new National Broadband Network, which may facilitate web-based modes of doctor-patient interaction. This study therefore aimed to explore Victorian GPs’ experiences of, and attitudes toward, using information and communication technologies to consult with patients. Qualitative telephone interviews were carried out with a maximum variation sample of 36 GPs from across Victoria. GPs reported a range of perspectives on using new consultation technologies within their practice. Common concerns included medico-legal and remuneration issues and perceived patient information technology literacy. Policy makers should incorporate GPs’ perspectives into primary care service delivery planning to promote the effective use of information and communication technologies in improving accessibility and quality of general practice care.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Worms are widely believed to be one of the most serious challenges in network security research. In order to prevent worms from propagating, we present a microcosmic model, which can benefit the security industry by allowing them to save significant money in the deployment of their security patching schemes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We are witnessing numerous cyber attacks every day, however, we do not see many cyber criminals are brought to justice. One reason is that it is technically hard to identify and trace cyber criminals. One reason for this passive situation is our limited or even inappropriate understanding of the cyber space. In this paper, we survey the challenges and opportunities in this research field for interested readers. We also list promising tools and directions based on our understanding.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Network technologies are very desirable for social action, allowing activists to achieve more with less, more quickly and with broader impact; on the other hand, the very advantages they bring are equally important to the world of contemporary capitalism that social action seeks to change. Thus, we must look beyond network technologies as the easy solution to every problem, and focus instead on the human relationships which might be enabled by them. This focus on relationships requires us to ‘de-tool’ information technology. Instead, for social action, it is more valuable to think of networked computing as part of the environment within which action can occur; an important purpose for such action; and as a medium that nurtures expression and engagement of self and belief.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we show the development and application of a sustainable assessment strategy as an implementation of effective learning for a computer crime and digital forensics unit. The unit is undertaken by undergraduate students as part of an Information Technology Security course at Deakin University. Over a five year period the teaching team has made continuous improvements to the delivery of material and content taking informal student feedback and Faculty review into careful consideration. In addition formal student evaluation of the unit has been extremely positive. As part of reflective teaching practice the teaching team derived a map of the relationship between learning objectives, learning activities, the assessment and the unit outcomes to verify what has led to the favorable student experience and its impact on learning process in order to repeat this strategy for other tertiary courses.