scholarly journals Development of a Method for Building a Trusted Environment by Using Hidden Software Agent Steganography

2021 ◽  
Vol 2096 (1) ◽  
pp. 012047
Author(s):  
V Kh Fedorov ◽  
E G Balenko ◽  
S I Shterenberg ◽  
A V Krasov

Abstract For more than a decade, the scientific community has been developing various models of insider actions in the trusted-zone information system and methods for identifying such. All those years, they have been facing the challenge of finding quality data samples for analysis and testing, and it is the availability of reliable data on the attack that is crucial for any research or detection of attempts to steal or compromise legal software. Unfortunately, collection of such samples remains nearly impossible despite some attempts to do so. Any data on incidents is either incomplete or inaccurate, or is not available at all. Software developers also face lack of resources, including time. Developers do not have enough time, funding, material resources, or qualifications to make a sturdy security system, which is why they need to use third-party automations that dock a security module to the compiled program. The strength of this approach is that such a system can be embedded in any software, whereas the weakness is that the method is "one-size-fits-all". Standard protections span across multiple programs, which results in a higher chance of being hacked.

2017 ◽  
Vol 47 (1) ◽  
pp. 46-55 ◽  
Author(s):  
S Aqif Mukhtar ◽  
Debbie A Smith ◽  
Maureen A Phillips ◽  
Maire C Kelly ◽  
Renate R Zilkens ◽  
...  

Background: The Sexual Assault Resource Center (SARC) in Perth, Western Australia provides free 24-hour medical, forensic, and counseling services to persons aged over 13 years following sexual assault. Objective: The aim of this research was to design a data management system that maintains accurate quality information on all sexual assault cases referred to SARC, facilitating audit and peer-reviewed research. Methods: The work to develop SARC Medical Services Clinical Information System (SARC-MSCIS) took place during 2007–2009 as a collaboration between SARC and Curtin University, Perth, Western Australia. Patient demographics, assault details, including injury documentation, and counseling sessions were identified as core data sections. A user authentication system was set up for data security. Data quality checks were incorporated to ensure high-quality data. Results: An SARC-MSCIS was developed containing three core data sections having 427 data elements to capture patient’s data. Development of the SARC-MSCIS has resulted in comprehensive capacity to support sexual assault research. Four additional projects are underway to explore both the public health and criminal justice considerations in responding to sexual violence. The data showed that 1,933 sexual assault episodes had occurred among 1881 patients between January 1, 2009 and December 31, 2015. Sexual assault patients knew the assailant as a friend, carer, acquaintance, relative, partner, or ex-partner in 70% of cases, with 16% assailants being a stranger to the patient. Conclusion: This project has resulted in the development of a high-quality data management system to maintain information for medical and forensic services offered by SARC. This system has also proven to be a reliable resource enabling research in the area of sexual violence.


2019 ◽  
Vol 101 (4) ◽  
pp. 658-666 ◽  
Author(s):  
Romain Gauriot ◽  
Lionel Page

We provide evidence of a violation of the informativeness principle whereby lucky successes are overly rewarded. We isolate a quasi-experimental situation where the success of an agent is as good as random. To do so, we use high-quality data on football (soccer) matches and select shots on goal that landed on the goal posts. Using nonscoring shots, taken from a similar location on the pitch, as counterfactuals to scoring shots, we estimate the causal effect of a lucky success (goal) on the evaluation of the player's performance. We find clear evidence that luck is overly influencing managers' decisions and evaluators' ratings. Our results suggest that this phenomenon is likely to be widespread in economic organizations.


2015 ◽  
Vol 109 (4) ◽  
pp. 735-749 ◽  
Author(s):  
LAURA VALENTINI

In late 2012, Hurricane Sandy hit the East Coast of the U.S., causing much suffering and devastation. Those who could have easily helped Sandy's victims had a duty to do so. But was this a rightfully enforceable duty of justice, or a nonenforceable duty of beneficence? The answer to this question is often thought to depend on the kind of help offered: the provision of immediate bodily services is not enforceable; the transfer of material resources is. I argue that this double standard is unjustified, and defend a version of what I call “social samaritanism.” On this view, within political communities, the duty to help the needy—whether via bodily services or resource transfers—is always an enforceable demand of justice, except when the needy are reckless; across independent political communities, it is always a matter of beneficence. I defend this alternative double standard, and consider its implications for the case of Sandy.


2019 ◽  
Author(s):  
Philip Garboden

The majority of rental properties in the U.S. today is owned by small- to medium-sized investors, many of whom enter the trade with little prior experience. This paper considers the cultural factors that motivate these amateurs to purchase real estate–an investment with high risks and relatively poor returns. Drawing on in-depth interviews with 93 investors in three heterogeneous real estate markets, Baltimore, MD, Dallas, TX, and Cleveland, OH, combined with participant observation of 22 real estate investment association meetings (REIAs), this paper finds that amateurs who decide to become investors often do so during periods when their professional identities are insecure or they perceive their retirement portfolios to be insufficient. Through participation in real estate investment associations and other investor networks, they quickly internalize “investor culture,” embracing ideologies of self-sufficiency and risk. “Investor culture”—perpetuated by REIAs--motivates and legitimizes strategies of action that lead to increasingly leveraged investments. Third-party actors, including real estate gurus, paid mentors, and private “hard money” lenders exploit the intersection of insecurity and the propagation of investor culture to profit off amateurs’ investment decisions.


Author(s):  
Adam Poulsen ◽  
Eduard Fosch-Villaronga ◽  
Oliver K Burmeister

Until now, each profession has developed their professional codes of conduct independently. However, the use of robots and artificial intelligence is blurring professional delineations: aged care nurses work with lifting robots, tablet computers, and intelligent diagnostic systems, and health information system designers work with clinical teams. While robots assist the medical staff in extending the professional service they provide, it is not clear how professions adhere and adapt to the new reality. In this article, we reflect on how the insertion of robots may shape codes of conduct, in particular with regards to cybersecurity. We do so by focusing on the use of social robots for helping LGBTIQ+ elderly cope with loneliness and depression. Using robots in such a delicate domain of application changes how care is delivered, as now alongside the caregiver, there is a cyber-physical health information system that can learn from experience and act autonomously. Our contribution stresses the importance of including cybersecurity considerations in codes of conduct for both robot developers and caregivers as it is the human and not the machine which is responsible for ensuring the system’s security and the user’s safety.


Author(s):  
Ayman Alarabiat ◽  
Isabel Ramos

After almost 30 years of being used in the information system (IS) discipline, only a few studies have focused on how IS scholars apply the method's guidelines to design Delphi studies. Thus, this paper focuses on the use of the Delphi method in IS research. To do so, articles published between 2004 and 2017 in the Senior IS Scholars' collection of journals of the Association of Information Systems (AIS), describing Delphi studies, were analised. Based on analysis of sixteen (16) retrieved IS studies, we concluded that IS researchers have applied the method’s most important phases and the procedural recommendations to promote rigor were considered in the majority of the analised studies. Nonetheless, IS researchers still need to include detailed information about (1) the steps taken to ensure the validity of the achieved results, (2) better describe the process of selecting and recruiting the experts, and (3) experiment with innovative techniques to keep participants involved in the Delphi process.


2015 ◽  
Vol 4 (1) ◽  
pp. 17-28
Author(s):  
Renée Ridgway

‘Cybercapitalism’, commonly termed ‘digital capitalism’, refers to the Internet, or ‘cyber- space’ and seeks to engage in business models within this territory in order to make financial profit. Cybercapitalism is structured by a highly intricate series of communication networks, which connect us through our participation on social platforms, but outside of these platforms how do we navigate and explore this information superhighway? We do so predominantly through search requests. Algorithms ostensibly know what we want before we even type them, as with Google’s ‘autocomplete’. Thus search is not merely an abstract logic but a lived practice that helps manage and sort the nature of information we seek as well as the direction of our queries. Nowadays it has become clear that users pay for such services with their data, which is increasingly the means to finance various corporations’ growth as they sell this data to third party advertisers. It is a transaction and in the exchange we get relevance. But is this really true? 


2021 ◽  
Author(s):  
Adisu Tafari Shama ◽  
Hirbo Shore Roba ◽  
Admas Abera ◽  
Negga Baraki

Abstract Background: Despite the improvements in the knowledge and understanding of the role of health information in the global health system, the quality of data generated by a routine health information system is still very poor in low and middle-income countries. There is a paucity of studies as to what determines data quality in health facilities in the study area. Therefore, this study was aimed to assess the quality of routine health information system data and associated factors in public health facilities of Harari region, Ethiopia.Methods: A cross-sectional study was conducted in all public health facilities in Harari region of Ethiopia. The department-level data were collected from respective department heads through document reviews, interviews, and observation check-lists. Descriptive statistics were used to data quality and multivariate logistic regression was run to identify factors influencing data quality. The level of significance was declared at P-value <0.05. Result: The study found a good quality data in 51.35% (95% CI, 44.6-58.1) of the departments in public health facilities in Harari Region. Departments found in the health centers were 2.5 times more likely to have good quality data as compared to departments found in the health posts. The presence of trained staffs able to fill reporting formats (AOR=2.474; 95%CI: 1.124-5.445) and provision of feedback (AOR=3.083; 95%CI: 1.549-6.135) were also significantly associated with data quality. Conclusion: The level of good data quality in the public health facilities was less than the expected national level. Training should be provided to increase the knowledge and skills of the health workers.


Sign in / Sign up

Export Citation Format

Share Document