scholarly journals Network Security and Its Implications on Program Management

2020 ◽  
Vol 10 (6) ◽  
pp. 739-746
Author(s):  
Bongs Lainjo

The Internet and related technologies have enabled companies to automate almost all of their operations resulting in enhanced efficiencies and cost-effectiveness. The technologies, however, have also introduced numerous security risks. Through security risks such as Electronic Hacking (EH), individuals and companies have lost a lot of valuable data and money. In this regard, there is a need to understand the extent of the threat of EH. A comprehensive thematic review and analysis of EH with a focus on developments, evolution, challenges, prognosis, and prevalence in select institutions was thus conducted. The research involved reviewing the literature on cybersecurity and its effect on organizations' operations. The result shows that cases of security breaches and associated costs continue to increase. Over five years, the healthcare and medical institutions were the most vulnerable. They were closely followed by corporations. The implications are that as institutions become more automated, their respective degrees of cybercrime vulnerability increase. The consequences of security breaches are normally dire for companies, as well as individuals. Millions, or possibly billions, of dollars worth of data, have been lost as a result of security breaches. This trend is expected to continue in the future, as computers and Internet technologies continue to advance. Through cybercrimes, numerous companies' operations have been sabotaged, and personal information from social media and email stolen. Long term, effective and sustainable strategies are therefore required. The paper is significant because it identifies the information security risks various organizations are exposed to and strategies that organizations can use to mitigate the risks.

2019 ◽  
pp. 25-28
Author(s):  
Marija Maslova ◽  
Kristina Ryzhaja

The paper analyzes the statistics of implementing known information threats, considers new types of Internet fraud and develops recommendations for protecting against unauthorized actions of Internet scammers. Internet fraud has long gone beyond mailing and has become widespread. Fraudsters operate in almost all spheres of human activity, and with the advent of various means of communication their activities have acquired new trends. The most common methods of online fraud are the following: fake shops with Internet sales, phishing, fundraising for charity, dating sites, viral content. The paper shows that the considered methods of Internet fraud are connected not so much with the Internet as directly with the user. Internet users should not only be aware of possible types and schemes of fraud, but also take care of software protection methods such as antivirus and timely updating all applications, browsers and systems. Only being up to date, constantly learning and being interested in both new threats and methods of their protection users can protect themselves and their loved ones from losses.


Author(s):  
Y. E. Mikhailova

The functioning of the digital economy determines the introduction of Internet technologies in almost all areas of business. In recent years, online banking systems have become widespread in Russia, which contribute to the appearance of new competitive factors in the banking services market. By providing services via the Internet, the banks can improve their financial performance and effectiveness by offering customers more services in a convenient format and on the most profitable conditions. Nowadays online banking as a tool for providing banking services is crucially important for the improvement of a commercial bank’ competitiveness. This work is a research of the modern Russian online banking market, which is devoted to the competitive analysis of its participants using marketing instruments and Internet resources. The purpose of the study is to develop practical recommendations for improving companies’ competitiveness in the Russian online banking market on a concrete example.


Author(s):  
Ashish Kumar ◽  
Rachna Jain ◽  
Sushila Madan

Mobile commerce (m-commerce) is evolving as an alternative to E-commerce services. M-commerce is a type of e-commerce which emphases on the use of services on handheld devices. It is becoming very popular among users because of ease of connectivity and its usage. With increase in the demand, it becomes essential to provide security to the services used on mobile. The user is using the mobile devices to make their secure payments and transactions. It becomes essential to increase security layers in the m-commerce to provide privacy to the user. The security risks in m-commerce are increasing exponentially. This chapter investigates the security breaches and the solutions associated with the m-commerce. It also focuses on the network services and problem related with device and user authentication. Many algorithms are proposed to make the device and the transaction safe. It is compulsory to make m-payment method very safe and secure, so that user can trust m-commerce to use their sensitive personal information.


Author(s):  
Robert S. Moore ◽  
Merrill Warkentin ◽  
Melissa Moore

In the past 20 years, an explosion in the ability of firms to acquire and integrate vast amounts of electronic customer information has occurred. For example, in the early 1990s, Lotus Development Corporation introduced, then withdrew a software product called MarketPlace: Households from the market after widespread public concern. The $695 product had a searchable database of 120 million Americans, containing their names, addresses, estimated incomes, consumer preferences, and other personal details. Fast forward to 2005, and companies like ChoicePoint Inc. hold personal information on virtually every single American and sell it over the Internet. Though the ability to technologically acquire and manage information has been possible since the mid 1960s, it was not until the 1990s that the Internet allowed even the smallest of firms to collect, purchase, and integrate information about potential customers. This “interactive information integration” capability is a process of consolidating and managing customer information from all available sources. The recent proliferation of affordable client devices such as desktop computing combined with advances in telecommunication (broadband, mobile devices, etc.) in the early part of the 21st century has enabled this trend to continue and grow. Optimally, marketplace information is used to develop need-based offerings generated from specific individual-level data. These customized solutions can lead to long-term profitable relationships for both customers and firms. However, the level of acceptance of the collection and use of personal information varies among consumers, and the human and technological ability of firms to properly secure information is not perfect. Miscues, such as ChoicePoint’s report that personal data for more than 140,000 people had been stolen and Time Warner’s report that data tapes containing information on more than 600,000 past and present employees was lost (Perez & Brooks 2005), affect attitudes toward the collection and use of personal information, particularly in marketing communications.


2017 ◽  
Vol 1 (2) ◽  
pp. 107
Author(s):  
Pekka Jäppinen ◽  
Mika Yrjölä ◽  
Jari Porras

Modern services request personal information from their customers. The personal information is not needed onlyfor identifying the customer but also for customising the service for each customer. In this paper we first analyse the existing approaches for personal information handling and point out their weaknesses. We desribe an architecture for the delivery of personal information from the customer to the HTTP based service in the Internet. For personal information storing our architecture relies on a mobile device, such as a customer’s mobile phone. The access of the service is conducted with a traditional desktop computer. The information is transmitted to the serviceon request via a desktop computer that fetches the information from a mobile device over a wireless link.The goal of our approach is to simplify the use of servicesby helping the customer to provide the required personal information. Furthermore our approach is designed so that existing services require only minor changes. We introduce methods for the customer to control his own privacy by providing notation to define the required security measures for automated data transfer. Finally we discuss the possible security risks of our architecture.


Author(s):  
Lindsey C Bohl

This paper examines a few of the numerous factors that may have led to increased youth turnout in 2008 Election. First, theories of voter behavior and turnout are related to courting the youth vote. Several variables that are perceived to affect youth turnout such as party polarization, perceived candidate difference, voter registration, effective campaigning and mobilization, and use of the Internet, are examined. Over the past 40 years, presidential elections have failed to engage the majority of young citizens (ages 18-29) to the point that they became inclined to participate. This trend began to reverse starting in 2000 Election and the youth turnout reached its peak in 2008. While both short and long-term factors played a significant role in recent elections, high turnout among youth voters in 2008 can be largely attributed to the Obama candidacy and campaign, which mobilized young citizens in unprecedented ways.


2020 ◽  
Vol 4 (3) ◽  
pp. 29-39
Author(s):  
Sulkhiya Gazieva ◽  

The future of labor market depends upon several factors, long-term innovation and the demographic developments. However, one of the main drivers of technological change in the future is digitalization and central to this development is the production and use of digital logic circuits and its derived technologies, including the computer,the smart phone and the Internet. Especially, smart automation will perhaps not cause e.g.regarding industries, occupations, skills, tasks and duties


2020 ◽  
Vol 133 (3) ◽  
pp. 758-764
Author(s):  
Eung Koo Yeon ◽  
Young Dae Cho ◽  
Dong Hyun Yoo ◽  
Su Hwan Lee ◽  
Hyun-Seung Kang ◽  
...  

OBJECTIVEThe authors conducted a study to ascertain the long-term durability of coiled aneurysms completely occluded at 36 months’ follow-up given the potential for delayed recanalization.METHODSIn this retrospective review, the authors examined 299 patients with 339 aneurysms, all shown to be completely occluded at 36 months on follow-up images obtained between 2011 and 2013. Medical records and radiological data acquired during the extended monitoring period (mean 74.3 ± 22.5 months) were retrieved, and the authors analyzed the incidence of (including mean annual risk) and risk factors for delayed recanalization.RESULTSA total of 5 coiled aneurysms (1.5%) occluded completely at 36 months showed recanalization (0.46% per aneurysm-year) during the long-term surveillance period (1081.9 aneurysm-years), 2 surfacing within 60 months and 3 developing thereafter. Four showed minor recanalization, with only one instance of major recanalization. The latter involved the posterior communicating artery as an apparent de novo lesion, arising at the neck of a firmly coiled sac, and was unrelated to coil compaction or growth. Additional embolization was undertaken. In a multivariate analysis, a second embolization for a recurrent aneurysm (HR = 22.088, p = 0.003) independently correlated with delayed recanalization.CONCLUSIONSAlmost all coiled aneurysms (98.5%) showing complete occlusion at 36 months postembolization proved to be stable during extended observation. However, recurrent aneurysms were predisposed to delayed recanalization. Given the low probability yet seriousness of delayed recanalization and the possibility of de novo aneurysm formation, careful monitoring may be still considered in this setting but at less frequent intervals beyond 36 months.


2017 ◽  
Vol 926 (8) ◽  
pp. 49-58
Author(s):  
O.S. Lazareva ◽  
M.V. Shalaeva ◽  
S.N. Shekotilova ◽  
V.G. Shekotilov

There was a discrepancy found between the practice of identification of the soldiers who went missing in action during the Great Patriotic War and also the reburied ones and the possibilities of automated processing of the war and post-war archive documents using modern information technology. Using the practical application of the mix of technologies of the databases, geographic information systems and the Internet as an example there is a possibility demonstrated to establish the destiny of a soldier who was considered missing in action. As far as the GIS technologies are concerned the methods of forming the atlas of rastre electronic maps and vector maps with the data from the archive sources have been the most significant. The atlas of raster electronic maps of the Great Patriotic War period for the Kalinin Battle Front and the 30th army which was formed in the process of research has been registered in Rospatent in the form of database. The functionality of the research was provided by applying various programming means


Author(s):  
Neta Roitenberg

The article extends the discussion on the challenges in gaining access to the field in medical ethnographic research, focusing on long-term care (LTC) facilities. Medical institutions have been documented to be difficult sites to access. The reference, however, is to the recruitment of patients as informants. The challenges of recruiting practitioners as informants have not been investigated at all. The article presents the key issues that emerged in the process of gaining social access at the sites of two LTC facilities as part of a study on care workers’ identities. The main obstacles encountered during the fieldwork were organizational constraints and negotiating control over the process of recruiting the lower occupational tier of care workers with gatekeepers. The article presents the coping strategies implemented to overcome the ethical and methodological obstacles: continually reassessing the consent and cooperation of participants and developing a rapport with nurse’s aides during interviews.


Sign in / Sign up

Export Citation Format

Share Document