scholarly journals Taking Care of (E)-Business?: Australian IT Professionals’ Views of Wireless Network Vulnerability Assessments

2006 ◽  
Vol 1 (2) ◽  
pp. 79-89
Author(s):  
Keir Dyce ◽  
Mary Barrett

M-commerce, a growing sub-category of E-business, allows business to be done ‘anywhere, anytime’. However security of wireless devices remains problematic. It is unclear whether protocols to alleviate security problems, such as wireless vulnerability assessments (WNVAs), are being used or are effective. The paper reports on a survey-based study of Australian computer security professionals’ use of and opinions about two types of WNVA: wireless monitoring and penetration testing. An initially surprising finding was how little both types are used, despite the ease with which wireless networks can be attacked and the fact that penetration testing is fairly well understood. In the light of organizational culture the survey findings become more explicable. Senior management, and even IT staff, may still hold a traditional, ‘wired network’ view of their organization. Aspects of organizational culture also appear to limit the way WNVA users go about the assessment process. A cultural shift could help change users’ perceptions about the risks and rewards of WNVAs. This could threaten IT staff’s professional identity, however, and needs further research.

Author(s):  
T. Venkat Narayana Rao ◽  
Vemula Shravan

In the recent era as the technology is growing rapidly, the use of internet has grown at an exponential rate. The growth has started increasing in between the years 1995-2000.The success of internet has brought great change to the world as we know; however, the problems are common as an obstacle to every productive growth. As the thousands of sites are launching daily and lakhs of people using it ,with limited sources of internet available to monitor the security and credibility of these sites. The security issues are growing rapidly and the existence of vulnerabilities are inevitable. As a result exploits became rampant causing the usage of information security fields. Eventually, the need for vulnerability scanning for a particular network or a particular site has increased and the result was pre-emptive existence of penetration testers whose sole purpose is to execute an exploit using a payload for scanning a vulnerability far before others got the opportunity. Metasploit is a computer security tool that works like a penetration tester. The Metasploit Framework was developed with the intentions of making lives of security experts easier.


2019 ◽  
Vol 29 (1/2) ◽  
pp. 18-41 ◽  
Author(s):  
Ali Daneshmandnia

Purpose This paper aims to explore the impact of organizational culture on information governance (IG) effectiveness at higher education institutions (HEIs). IT professionals, such as chef information officers, chief technology officers, chief information security officers and IT directors at HEIs were surveyed and interviewed to learn about whether organizational culture influences IG effectiveness. Several IG activities (processes) were identified, including information security, the function of an IG council, the presence of a Record Information Management department, the role of a compliance officer and information stewards and the use of an automated system or software to identify and maintain information life-cycle management. Design/methodology/approach This study was conducted using Cameron and Quinn’s (Cameron and Quinn, 2011) competing value framework. To evaluate organizational culture, using the competing value framework, four types of organizational culture profiles were used: collaboration, creation/innovation, controlling/hierarchy, and competition/result-oriented. The methodology included quantitative and qualitative techniques through the use of content analysis of data collected from participants. IT professionals, such as chef information officers, chief technology officers, chief information security officers and IT directors at HEIs were surveyed and interviewed to learn about whether organizational culture influences IG effectiveness. Findings Findings revealed organizational culture may influence IG effectiveness positively, especially from cultures of competition/result-oriented and control/hierarchy. Qualitatively, it also emerged that competition/result-oriented and control characteristics of organizational culture were perceived by IG professionals to produce more accurate information. One of the characteristics of organizational culture that became evident in the current study, coming from more than one subject, was the challenge in IG due to the presence of information silos. Trust, on the other hand, has been highlighted as the glue which can enable and drive governance processes in an organization. Research limitations/implications The current study was conducted based on HEIs. While the current study serves as a baseline for studying IG in other institutions, its results cannot be generalized for other type of institutions. The results cannot be generalized for other types of not-for-profit or for-profit organizations. Many of the characteristics of the sample data were specific to HEIs. For instance, financial, manufacturing and health-care institutions present challenges inherent in those institutions. Originality/value Trust has been highlighted as the glue which can enable and drive governance processes in an organization. Respondents of current study have indicated that trust serving several different factors toward IG effectiveness, including freedom to speak freely in the meeting about impact of organizational culture on IG, wiliness of executives of administration, particularly the CIO, to communicate IG matters to institution, sharing information and being transparent, entrusting help desk staff and technical supervisors so users can communicate with them and share their concerns and perceiving “feeling of trust” in the organization, which would benefit the institution, allowing stakeholders to collaborate and work together to overcome issues when facing IG challenges.


Energies ◽  
2021 ◽  
Vol 14 (23) ◽  
pp. 8139
Author(s):  
Anna Pietruszka-Ortyl ◽  
Małgorzata Ćwiek ◽  
Bernard Ziębicki ◽  
Anna Wójcik-Karpacz

The energy sector is the epitome of Industry 4.0; therefore, it should be developed in line with the Industry 4.0 implementation framework and be managed according to the guidelines dedicated to knowledge-based enterprises. Under this model of evolution, the layers surrounding the technological aspects are first, knowledge management (in particular, its transfer), and then people, and culture. This study addresses two of the three identified levels by attempting to verify the organizational culture that supports professional knowledge transfer as the leading factor in effective specialist knowledge exchange in the energy sector. Recently, this sector has become highly dependent on IT solutions as the main factor for its development and security. A key role in this respect is played by IT professionals, whose attitudes and employee behavior are critical to the stability, efficiency, effectiveness, and security of IT systems in the energy companies. The purpose of this paper is to propose a theoretical construct, based on indicated norms and values as organizational culture foundation and cultural practices. This article also aims to analyze and diagnose the components that support the professional knowledge transfer in different groups of organizational stakeholders. Systematic analysis of the scientific literature, expert evaluation, and structured questionnaires were used to develop and verify the hypotheses. The research results supported the hypotheses that organizational culture tailored to the knowledge workers’ needs and expectations, influence the effective and efficient circulation of IT expert knowledge.


2019 ◽  
Vol 4 (2) ◽  
pp. 15-20
Author(s):  
Nur Khairani Kamarudin ◽  
Farah Shazwani Ismail ◽  
Mahfudzah Othman ◽  
Nurul Hidayah Ahmad Zukri ◽  
Mohd Faris Mohd Fuzi

Photography business become more popular and trending among the most of people who likes photography. Photography Service System was developed to help photography companies to deliver photos and videos to their customers. The use of the system have its advantages such as easiness of accessing data and also make users share the data faster. The purpose of the system was developed to ease the daily works and can be used frequently by photography companies as a method to send photos and videos to their customers. A penetration testing was conducted in order to test the security performance by conducting four security attacks which were Denial of Service (DoS), SQL injection, Cross Site Scripting, and sniffing password. The purpose of these attacks were conducted is to testing and finding the vulnerabilities of the system because the system deals with the customers’ privacy data which is the photos and the videos owned by the customers. This is crucial to secure a system where the first step taken as a prevention to introduce the system to the public, vulnerability assessments was performed to determine the weaknesses of the system. Scanning and vulnerability assessment are done using tools which is Vega Scanning Tool, Wireshark, and Low Orbit Ion Cannon (LOIC). All results are collected and have been analyze. As a summary of the result, it shows that the system are vulnerable to DoS attack, SQL injection attack, cross site scripting and also password sniffing.  


2017 ◽  
Vol 19 (1) ◽  
pp. 60-78 ◽  
Author(s):  
Supreet Kanwal ◽  
Gurparkash Singh ◽  
Harsh Vardhan Samalia

The presented study seeks to explore the factors impacting MI of select consumer durable organizations and to know the strength of their relationship. The intention is the development of a scale and to find the role of organizational culture and process-structure in generating MI. Survey method is used to collect the responses of IT professionals of select consumer durable companies. Data from IT professionals of consumer durable companies from Northern region of India has been collected. The principles of reliability, validity, sensitivity in the design of scale and linear regression technique have been applied to know the strength of the relationship between organizational culture and process-structure on MI. This study advances the understanding of intelligence generation in an organization that is further used in marketing applications by investigating relationships among elements of intelligence.


2020 ◽  
Vol 8 (6) ◽  
pp. 3003-3007

The WLAN devices are used nowadays in many universities, commercial buildings, and organisations which were developed by Wi-Fi alliance to provide interoperability, security and ease of use of wireless devices connected to everywhere, every time to the internet. The WPA2 standard (IEEE 802.11) defines security mechanisms for wireless networks. This paper describes possible attacks launched on Wireless LAN from pre-connection to gaining access to the system and it represents the effect of these attacks on the WLAN along with some mitigations to prevent the devices from the below-defined attacks.


2011 ◽  
Vol 2 (6) ◽  
pp. 266-274
Author(s):  
Zahid Mehmood Awan ◽  
Muhammad Khalil Shahid .

This study focuses on the factors like salary/incentives, interpersonal conflicts, employeesorganization interface, job satisfaction and organizational culture, in order to clarify the behavior of organizational commitment among information technology employees in public sector organizations. The study provides an insight of the culture of public sector organization, which managers may use for the improvement of organizational commitment. The study tested and analyzed the proposed model, which gave valuable results. The result of the study also claims that organizational commitment may be increased.


2019 ◽  
Vol 4 (1) ◽  
pp. 141
Author(s):  
El Chris Natalia

Cultural change and the emergence of identity in the individual can occur through interaction. Culture in an organization can form a new identity in individuals. The aim of this research is to know about the cultural shift experienced by the diffable employees who are deaf at Samakta Guest House in forming a new identity within them. The literature review used in this research includes intercultural communication, organizational culture, self-concept, and identity. This research is using a qualitative descriptive analysis. In collecting data, the researcher used an in-depth interview with four informants, ND, DD, JF, and PL. The result shows that deaf employees who work at Samakta Guest House have a special culture and identity or characteristic in themselves. Organizational culture and the process of interaction make the deaf employees become more developed and find new figures in themselves. Diffable employees adapt to new cultures. In forming this new identity, the interaction process that plays an important role in them is the interaction with the owners of Samakta Guest House and other diffable employees who work there. The substance of this research recommends that the organization, especially for the owner and manager of Samakta Guest House should develop a diffable-concerned organization.


2020 ◽  
Vol 10 (9) ◽  
pp. 2242-2246
Author(s):  
Tian Tang ◽  
Mu-Chuan Zhou ◽  
Yi Quan ◽  
Jun-Liang Guo ◽  
V. S. Balaji ◽  
...  

At present, computer security is the flourishing field in the IT industry. Nowadays, the usage of computers and the Internet grows drastically, and hence, computers become vehicles for the attackers to spread viruses and worms, to distribute spam and spyware, and to perform denial-of-service attacks, etc. The IT engineers (even users) should know about network security threats, and at the same time, to some extent, they should know techniques to overcome the issues. The reliability and privacy of healthcare records of the patients are the most critical issue in the healthcare business industry sector. The security safeguards, such as physical, technical, and administrative safeguards, are crucial in protecting the information in all aspects. This article deals with the forty popular hospital portals in India related to the professional and network security related issues such as operating system guesses, number of open/closed/filtered ports, the name of the Web server, etc. The Nmap (network mapper) tool is used to analyze the results belong to the security perspective.


Sign in / Sign up

Export Citation Format

Share Document