scholarly journals A Protection Motivation Theory Approach to Home Wireless Network Security in New Zealand:  Establishing If Groups of Concerned Wireless Network Users Exist And Exploring Characteristics of Behavioral Intention

2021 ◽  
Author(s):  
◽  
Dennis Michael DiGiusto

<p>Threats arising from wireless hacking have been recently acknowledged both within academic literature and in the mainstream media. Additionally, it has been reported that many users of wireless networks make no attempt to activate security measures on their networks. This report replicates and expands upon research found in Woon, Tan and Low (2005) in order to ascertain characteristics of home wireless network users in New Zealand. The first research area asks the question: aside from the people who activate and those who do not, are there also people who are worried about wireless security and those who are not? This was proven to be true and that there is indeed a subgroup of wireless router users in New Zealand who are worried about wireless security. The second research area seeks to determine what factors affect a person's intention to enable or not enable security features on a home wireless network. The results showed that: The more people notice an increase in the degree of risk posed by wireless hacking, the more they feel like they could autonomously enable security features. The more people feel vulnerable to threats of wireless hacking, the more they feel that they would need help in setting up security features on their wireless network. The more people feel susceptible to wireless hacking, the more they feel that enabling security features would require extra efforts of time and money on their part. In order to get users to secure wireless networks, they must be convinced that enabling security features will deter hacker attacks. In order to get users to secure networks they need to feel that they could actually enable security features by themselves without some form of human assistance to help them do it.</p>

2021 ◽  
Author(s):  
◽  
Dennis Michael DiGiusto

<p>Threats arising from wireless hacking have been recently acknowledged both within academic literature and in the mainstream media. Additionally, it has been reported that many users of wireless networks make no attempt to activate security measures on their networks. This report replicates and expands upon research found in Woon, Tan and Low (2005) in order to ascertain characteristics of home wireless network users in New Zealand. The first research area asks the question: aside from the people who activate and those who do not, are there also people who are worried about wireless security and those who are not? This was proven to be true and that there is indeed a subgroup of wireless router users in New Zealand who are worried about wireless security. The second research area seeks to determine what factors affect a person's intention to enable or not enable security features on a home wireless network. The results showed that: The more people notice an increase in the degree of risk posed by wireless hacking, the more they feel like they could autonomously enable security features. The more people feel vulnerable to threats of wireless hacking, the more they feel that they would need help in setting up security features on their wireless network. The more people feel susceptible to wireless hacking, the more they feel that enabling security features would require extra efforts of time and money on their part. In order to get users to secure wireless networks, they must be convinced that enabling security features will deter hacker attacks. In order to get users to secure networks they need to feel that they could actually enable security features by themselves without some form of human assistance to help them do it.</p>


Author(s):  
Carlos F. Lerma ◽  
Armando Vega

Local networks have been, from the beginning, a controversial topic. The organizations that have implemented these types of networks have shown their concern about their levels of security. Ever since the discovery of vulnerabilities among first-generation wireless networks (Borisov, Goldberg, & Wagner, 2001), analysts and security companies have tried to understand and mitigate those risks. Some of those efforts have contributed towards the study of wireless security. Other efforts have failed, presented a different group of vulnerabilities, or require expensive proprietary software and hardware. Finally, other efforts try to mitigate the problem piling up a complex group of security technologies, like virtual private networks. Despite the benefits they bring, a great number of concerns related to security have limited the massive adoption of wireless networks, particularly in sectors that are highly aware of the existing security risks such as the financial and government sectors. Even though there are a significant number of risks inherent to the mass transmission of data to any individual within the boundaries of a wireless network, a good amount of these are installed without any security measure at all. However, the majority of businesses that have implemented some sort of wireless security measures have done so in the most rudimentary way, bringing a false sense of security to users. When the first IEEE 802.11 wireless standards were in the phase of development, security was not as important as it is today. The level of complexity of network threats was much lower and the adoption of wireless technologies was still in an introductory phase. It was under these circumstances that the first standard for wireless network security, known as wired equivalent privacy (WEP), was originated. WEP underestimated the necessary means to turn air security into an element equivalent to the security provided by a cable. In contrast, the security methods of modern wireless networks are designed to work in hostile environments where there is a lack of well-defined physical network perimeters.


2015 ◽  
Vol 14 (6) ◽  
pp. 5809-5813
Author(s):  
Abhishek Prabhakar ◽  
Amod Tiwari ◽  
Vinay Kumar Pathak

Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet. Wireless networks have reduced the human intervention for accessing data at various sites .It is achieved by replacing wired infrastructure with wireless infrastructure. Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters... The goal of this paper is to minimize challenges that are in way of our understanding of wireless network and wireless network performance.


2021 ◽  
Author(s):  
Premi.A ◽  
Rajakumar.S

The implementation and operation of a Fifth Generation (5G) network aims to achieve a maximum speed, low potential, improved flexibility, and a change in requirements and technologies from service-oriented to user-oriented. The users need resource allocation and management that is effective. Established networks’ closed infrastructure and ossified services result in particularly in wireless networks, inefficient resource allocation and underutilized network resources. On the basis the standard of a service provider’s utility benefit then customer gratification, various allocation strategies are suggested. Wireless system based 5G another research area aimed at supply distribution and 5G access links is network. In this project, radio resource allocation and mobility assessment of 5G wireless network LEACH routing protocol is implemented. In terms of wireless networks, various architectural integrations of other wireless technologies such as 5G, LTE, Wi-MAX, and so on are highlighted. Furthermore, the project focuses on resource allocation approaches and strategies for cellular networks, as well as comprehensive criteria for future 5G networks


Author(s):  
B. Indira Reddy ◽  
V. Srikanth

Wireless networks have posed a threat in Data Security that has stuck to the core of data communication between two points. Absence of inflexible security measures has made numerous organizations contribute millions to verify their systems. Development of different security conventions for Wireless LANs has been given in this paper. Also, vulnerabilities of WEP/WPA/WPA2/WPA3 have been discussed and how the wireless networks are attacked using the design flaws present in these Wireless Security Protocols. The use of different tools and programming languages used for testing the strength of the protocols. Tools like nmap, zenmap, aircrack-ng, etc., are used in the Linux environment to practically demonstrate the attacks against these networks using WEP/WPA/WPA2/WPA3 protocols. The solutions for the shortcomings in WEP has been applied in WPA, similarly WPA2 and WPA3.


Author(s):  
Hafiz Munsub Ali ◽  
Jiangchuan Liu ◽  
Waleed Ejaz

Abstract In densely populated urban centers, planning optimized capacity for the fifth-generation (5G) and beyond wireless networks is a challenging task. In this paper, we propose a mathematical framework for the planning capacity of a 5G and beyond wireless networks. We considered a single-hop wireless network consists of base stations (BSs), relay stations (RSs), and user equipment (UEs). Wireless network planning (WNP) should decide the placement of BSs and RSs to the candidate sites and decide the possible connections among them and their further connections to UEs. The objective of the planning is to minimize the hardware and operational cost while planning capacity of a 5G and beyond wireless networks. The formulated WNP is an integer programming problem. Finding an optimal solution by using exhaustive search is not practical due to the demand for high computing resources. As a practical approach, a new population-based meta-heuristic algorithm is proposed to find a high-quality solution. The proposed discrete fireworks algorithm (DFWA) uses an ensemble of local search methods: insert, swap, and interchange. The performance of the proposed DFWA is compared against the low-complexity biogeography-based optimization (LC-BBO), the discrete artificial bee colony (DABC), and the genetic algorithm (GA). Simulation results and statistical tests demonstrate that the proposed algorithm can comparatively find good-quality solutions with moderate computing resources.


Author(s):  
Nguyen Cong Luong ◽  
Thi Thanh Van Nguyen ◽  
Shaohan Feng ◽  
Huy T. Nguyen ◽  
Tao Dusit Niyato ◽  
...  

2021 ◽  
Author(s):  
◽  
Bryn Cal Hickson Rowden

<p>In recent years, there has been significant efforts to create frameworks in which Māori values are incorporated as part of environmental management processes in Aotearoa New Zealand(Forster, 2014; Harmsworth et al., 2016). This research explores the factors that influence the incorporation of Māori values at the local government level, and what barriers Māori values face to being incorporated in environmental management. This research focused on a case study of the Ruamāhanga Whaitua Committe Implementation Programme process in the Wellington region. Semi-structured interviews were used to collect information on the opinions of members of the Ruamāhanga Whaitua Committee. The interviews were analysed using a critical theory approach. The research found that there was a clear discrepancy between the values and behaviours expressed by some non-Māori members of the Committee. The result of such a discrepancy was that Māori values were not sufficiently part of environmental decision making. Such a discrepancy was a result of the political structures of the Regional Council’s Whaitua Implementation Programme process. The majority of the decision-making power was found to be situated ‘higher’ up in the organisation, outside of the Committee. Overall this research found that there are important opportunities to make sure iwi values are not only included, but form the basis of decisions.</p>


2021 ◽  
Author(s):  
◽  
Rebbecca Sweeney

<p>This thesis investigates the practices of participants in three “clusters” of New Zealand schools associated with the Extending High Standards Across Schools (EHSAS) project funded by the Ministry of Education from 2005 to 2009. The investigation addresses four questions: (i) What collaborative practices were used by the participants in the EHSAS clusters? (ii) Do the research participants perceive the collaborative practices that they used as making a difference to student achievement? (iii) What do the participants perceive as the benefits and limitations of collaborative practice? (iv) How consistent are participants’ perceptions with research findings in the field? The thesis begins by searching national and international research in order to define effective collaboration. It is argued that across certain relevant studies, the key purposes of collaboration are for teachers and students to learn and improve in order to reach the common goal set by the cluster. Associated practices can be used to build skills and knowledge in teachers, school leaders, and cluster members. Following this, a Grounded Theory approach was used to analyse and interpret data that emerged from the three clusters’ milestone reports and interviews with cluster members. The analysis found that the leaders of EHSAS clusters believed that shared leadership across principals is essential to cluster work, and that a hierarchical cluster structure is the best way to transmit knowledge from leaders to teachers. They also believed that if they shared resources, ideas, strengths and expertise with one another they would then have knowledge that would be useful to teachers wanting to change and improve their practices, and raise student achievement. Despite some of their beliefs being consistent with research literature on effective collaboration, according to the literature, many of the EHSAS leaders’ practices would not have enabled the learning and improvement that they espoused to be leading. The final chapter of this thesis identifies where EHSAS leaders’ beliefs and practices were inconsistent and what this means for future research and the implementation of similar projects aiming to promote collaboration across schools.</p>


2018 ◽  
Vol 6 (5) ◽  
pp. 369-376
Author(s):  
Pradeep ◽  
Manjunath

The wireless communication technology gaining importance in extreme conditions in a very effective way due to its benefits. Compared to wired networks, wireless networks have many benefits in terms of flexibility, cost, and mobility. Wireless networks can be easily hacked by the outsiders if there is no proper security. Because of its increasing popularity, wireless networks need proper security measures in addition to the normal protections such as firewalls, virus detectors, etc. Providing the required additional security to the wireless networks is a challenging task. Security can be maintained by providing data authenticity, integrity confidentiality, and authorization. A survey on the security of wireless networks is put forward that discusses various techniques which help in protecting the network and a cryptic secure scheme has been proposed which helps to enhance the security standards in the wireless medium.


Sign in / Sign up

Export Citation Format

Share Document