scholarly journals INTENSITAS ANCAMAN KEAMANAN SISTEM INFORMASI AKUNTANSI KOMPUTERISASIAN

2018 ◽  
Vol 10 (3) ◽  
pp. 113-126
Author(s):  
YULIUS KURNIA SUSANTO ◽  
RATIH HANDAYANI

The objective of the paper was (1) there are significant security threats of CAIS on the organization types, (2) there is difference among the organization types regarding the security threats of CAIS, (3) there are difference between integration-on line and integration-manual CAIS regarding the security threats of CAIS. Eighty four respondents from Jakarta organizations had participated in this research. The collecting data used a  questionnaire survey via electronicmail and post. Data were analyzed using a Kruskal-Wallis test. The resultsshowed that first there is significant security threats of CAIS in Jakarta Organizations, like that the accidental entry of bad data, accidental destruction of data, employees’ sharing of passwords and introduction of  computer viruses the to CAIS are the significant security threats of CAIS in Jakarta Organizations.  Second, there is no difference among the organization types regarding the security threats of CAIS. Third, there is no difference between integration-on line and integration-manual CAIS regarding the security threats of CAIS. But, there is difference between integration-on line and integration-manual CAIS regarding introduction of computer viruses to the CAIS.

2006 ◽  
Vol 20 (1) ◽  
pp. 187-203 ◽  
Author(s):  
Ahmad A. Abu-Musa

This paper investigates the perceived security threats to computerized accounting information systems (CAIS) in the Egyptian banking industry (EBI) by surveying the entire population of the EBI. Differences between the respondents' opinions regarding the perceived security threats have been identified and investigated in the context of the EBI. The results of the study reveal that accidental entry of bad data by employees, accidental destruction of data by employees, introduction of computer viruses to the system, natural and human-made disasters, employees' sharing of passwords, and misdirecting prints and distributing information to unauthorized people are the most significant perceived security threats to CAIS in the EBI. In all cases, the heads of internal audit departments reported higher occurrence frequencies of CAIS security threats compared to the heads of computer departments.


Today, many of devices are connected to internet through networks. Malware (such as computer viruses, trojans, ransomware, and bots) has becoming a critical concern and evolving security threats to the internet users nowadays. To make legitimate users safe from these attacks, many anti-malware software products has been developed. Which provide the major defensive methods against those malwares. Due to rapid spread and easiness of generating malicious code, the number of new malware samples has dramatically increased. There need to take an immediate action against these increase in malware samples which would result in an intelligent method for malware detection. Machine learning approaches are one of the efficient choices to deal with the problem which helps to distinguish malware from benign ones. In this paper we are considering xception model for malware detection. This experiment results shows the efficiency of our proposed method, which gives 98% accuracy with malimg dataset. This paper helps network security area for their efficient works.


2021 ◽  
Vol 4 (1) ◽  
pp. p1
Author(s):  
Liqin Wu ◽  
Yong Wu ◽  
Xiangyang Zhang

By conducting an on-line questionnaire survey, the article compared 97 international students’ views with 23 Chinese teachers’ practices on 8 issues in corrective feedback (CF) in teaching Chinese to speakers of other languages (TCSOL). Results revealed that students’ views and teachers’ practices conformed to each other in cognition of committing verbal errors, and in whether to correct; that they were mostly incongruent with each other in what to correct; that they were congruent with each other in peer correction, but not in teachers’ correction or self-correction; that they coincided with each other in indirect correction, but not in direct one, nor in immediate correction or the maximum correction frequency in one class; and that CF mainly generated positive psychological effects and better learning on students, but its pedagogical efficacy was not evidently approved by the teachers. This research aimed at gaining a deeper insight into the effectiveness of CF in TCSOL to improve the quality of TCSOL.


2021 ◽  
Vol 2137 (1) ◽  
pp. 012072
Author(s):  
Honghua Xu ◽  
Laibing Yi ◽  
Yong Li ◽  
Shoulong Chen ◽  
Lei Zhu ◽  
...  

Abstract In view of the on-line inspection mode of transformer voiceprint information during operation, an optimistic location method is proposed to assist the acoustic print diagnosis for fault identification, location and further evaluation work. Firstly, according to the directional location algorithm of antenna array (Beamforming), traditional directional location is extended to general spatial location. Then on the basis of TDOA(Time Difference Of Arrival) algorithm of time domain signal characteristic analysis, integrated weighted processing and data centralization, on the one hand, reduce the edge value, on the other hand, correct the trend of bad data, and improve the existing cross-correlation operation. The simulation results show that the optimized beam-based and weighted TDOA algorithm has excellent performance in 2D localization of transformer voiceprint. These research results can provide a basis for transformer online monitoring and voice print diagnosis.


Author(s):  
Xin Luo ◽  
Merrill Warkentin

The continuous evolution of information security threats, coupled with increasing sophistication of malicious codes and the greater flexibility in working practices demanded by organizations and individual users, have imposed further burdens on the development of effective anti-malware defenses. Despite the fact that the IT community is endeavoring to prevent and thwart security threats, the Internet is perceived as the medium that transmits not only legitimate information but also malicious codes. In this cat-and-mouse predicament, it is widely acknowledged that, as new security countermeasures arise, malware authors are always able to learn how to manipulate the loopholes or vulnerabilities of these technologies, and can thereby weaponize new streams of malicious attacks. From e-mail attachments embedded with Trojan horses to recent advanced malware attacks such as Gozi programs, which compromise and transmit users’ highly sensitive information in a clandestine way, malware continues to evolve to be increasingly surreptitious and deadly. This trend of malware development seems foreseeable, yet making it increasingly arduous for organizations and/or individuals to detect and remove malicious codes and to defend against profit-driven perpetrators in the cyber world. This article introduces new malware threats such as ransomware, spyware, and rootkits, discusses the trends of malware development, and provides analysis for malware defenses. Keywords: Ransomware, Spyware, Anti-Virus, Malware, Malicious Code, Background Various forms of malware have been a part of the computing environment since before the implementation of the public Internet. However, the Internet’s ubiquity has ushered in an explosion in the severity and complexity of various forms of malicious applications delivered via increasingly ingenious methods. The original malware attacks were perpetrated via e-mail attachments, but new vulnerabilities have been identified and exploited by a variety of perpetrators who range from merely curious hackers to sophisticated organized criminals and identify thieves. In an earlier manuscript (Luo & Warkentin, 2005), the authors established the basic taxonomy of malware that included various types of computer viruses (boot sector viruses, macro viruses, etc.), worms, and Trojan horses. Since that time, numerous new forms of malicious code have been found “in the wild.”


2017 ◽  
pp. 18-27
Author(s):  
Anna Mikhailovna GLAZUNOVA ◽  
◽  
Irina Nikolayevna KOLOSOK ◽  
Yevguenii Sergueyevich S"YEMSHCHIKOV ◽  
◽  
...  

Turyzm ◽  
2016 ◽  
Vol 26 (2) ◽  
pp. 49-56
Author(s):  
Andrzej Matczak ◽  
Przemysław Pawlicki

Based on an anonymous on-line questionnaire survey, conducted among 1000 respondents, the authors present their demographic, socio-economic and spatial profile, their attitude to cannabis and the tourist trips they went on (scale, directions, destinations), involving cannabis consumption. Tourist trips of this kind were attractive to quite a large number of young people, mostly inhabiting large Polish cities, who usually had used and continued to use this drug. Trips inspired by cannabis were most often made to the nearby Czech Republic and Netherlands, as well as (less frequently) to Spain.


BMJ Open ◽  
2018 ◽  
Vol 8 (2) ◽  
pp. e019752 ◽  
Author(s):  
Lan Zhu ◽  
Lei Li ◽  
Jinghe Lang

ObjectiveThe study aimed to determine prevalence, patterns and risk factors of defensive medicine by obstetricians and gynaecologists across China.DesignThis is a questionnaire survey by written and on-line interview for participants.ParticipantsAmong 1804 registered physicians participating at the 2017 Congress of Chinese Obstetricians and Gynecologists Association in Chengdu City, Sichuan Province, China, from 17 to 20 August 2017, 1486 participants (82.4%) responded the survey.Main outcome measuresParticipants’ strongly disagreed/disagreed and strongly agreed/agreed options were compared to determine specific factors contributing to their preferences towards defensive medicine.ResultsIn the whole cohort of 1486 participants, 903/1486 (60.8%), 283/1486 (19.0%) and 170/283 (60.1%) participants had experienced at least one medical dispute, lawsuit or loss of a lawsuit, respectively; and 1284 (86.4%) participants had witnessed their colleagues exposed to medical disputes, lawsuits or loss of a lawsuit. Generally, 62.9% of the participants strongly agreed or agreed with defensive medicine. Gender, administration duty, employment hospital, education status, subspecialty, exposure to any medical disputes, lawsuits or loss of a lawsuit, and colleagues’ experiences were independent risk factors relevant to participants’ preferences about defensive medicine in a multivariate model. Participants were more prone to accept or endorse defensive medicine if they were female physicians; without administrative duties; working in non-tertiary hospitals; with an undergraduate degree; with any exposure to medical disputes, lawsuits or loss of a lawsuit; or having witnessed colleagues’ similar experiences.ConclusionsAbout two-thirds of Chinese physicians practising obstetrics and gynaecology in our survey agreed with the practice of defensive medicine, but they had diverse preferences and understanding of specific practices, harms of defensive medicine and physician’s roles.


Author(s):  
William Krakow

In the past few years on-line digital television frame store devices coupled to computers have been employed to attempt to measure the microscope parameters of defocus and astigmatism. The ultimate goal of such tasks is to fully adjust the operating parameters of the microscope and obtain an optimum image for viewing in terms of its information content. The initial approach to this problem, for high resolution TEM imaging, was to obtain the power spectrum from the Fourier transform of an image, find the contrast transfer function oscillation maxima, and subsequently correct the image. This technique requires a fast computer, a direct memory access device and even an array processor to accomplish these tasks on limited size arrays in a few seconds per image. It is not clear that the power spectrum could be used for more than defocus correction since the correction of astigmatism is a formidable problem of pattern recognition.


Author(s):  
A.M.H. Schepman ◽  
J.A.P. van der Voort ◽  
J.E. Mellema

A Scanning Transmission Electron Microscope (STEM) was coupled to a small computer. The system (see Fig. 1) has been built using a Philips EM400, equipped with a scanning attachment and a DEC PDP11/34 computer with 34K memory. The gun (Fig. 2) consists of a continuously renewed tip of radius 0.2 to 0.4 μm of a tungsten wire heated just below its melting point by a focussed laser beam (1). On-line operation procedures were developped aiming at the reduction of the amount of radiation of the specimen area of interest, while selecting the various imaging parameters and upon registration of the information content. Whereas the theoretical limiting spot size is 0.75 nm (2), routine resolution checks showed minimum distances in the order 1.2 to 1.5 nm between corresponding intensity maxima in successive scans. This value is sufficient for structural studies of regular biological material to test the performance of STEM over high resolution CTEM.


Sign in / Sign up

Export Citation Format

Share Document