scholarly journals Attitudes towards Outsourcing Security Services on Service Delivery in Commercial State Owned Enterprises in Nairobi City County, Kenya

2019 ◽  
Vol 3 (III) ◽  
pp. 1-13
Author(s):  
Adan Moro Guracha ◽  
Felix Kiruthu

Security service delivery in public sector is crucial as it entails protecting government personnel as well as property. Therefore, security is increasingly viewed as a key condition for economic growth and development. Lack or ineffective security service delivery weakens the performance of any organization. This study sought to determine if service delivery improves as a result of outsourcing of security services to commercial state owned enterprises in Kenya. Specifically, this research aimed at determining the effects of outsourcing cash protection, body guarding, property protection and information/data protection services on security service delivery of selected commercial state owned enterprises in Nairobi City County in Kenya. The study was guided by two theories; the Functionalist model and securitization theory. A descriptive research design was adopted. The target population for this study was a census of all the 29 selected commercial state owned enterprises. The study targeted security managers, assistant security managers and security staff, hence total target population was 958 respondents. The sample size was selected through purposive and random sampling techniques. The research used questionnaires to collect data. Descriptive statistics including frequencies, percentages, means and standard deviations were used. Further, inferential statistics including correlation and regression analysis were used to illustrate the relationship between the independent and the dependent variables. The study used a multiple regression model. The regression results indicated that, there is a positive and significant relationship between outsourcing cash protection security services and security service delivery of commercial state owned enterprises in Kenya (β=0.247, p=0.001); a positive and significant relationship between outsourcing bodyguard security services and security service delivery of commercial state owned enterprises in Kenya (β=0.271, p=0.000); a positive and significant relationship between outsourcing property guarding security services and security service delivery of commercial state owned enterprises in Kenya (β=0.289, p=0.033); and a positive and significant relationship between outsourcing information security services and security service delivery of commercial state owned enterprises in Kenya(β=0.389, p=0.015). From the findings, the study concluded that outsourcing security services has a significant influence on security service delivery of commercial state owned enterprises in Nairobi City County, Kenya. In particular, the study concluded that outsourcing cash protection, body guarding services, property guarding and information security services, had a positive and significant effect on security service delivery of commercial state owned enterprises in Kenya. The study recommended that commercial state owned enterprises should strengthen their cash protection security services, security officers should be trained on how to protect human life especially, the personnel that they are supposed to protect, private security companies should keep data on any property that enters and leaves the company’s premises, and that private data security officers should have access to IT skills. This is an open-access article, access, citation and distribution of this article is allowed with full recognition of the authors and the source.  This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

2021 ◽  
Vol 6 (2) ◽  
pp. 94-102
Author(s):  
Muslih Muslih ◽  
Abdussalam Abdussalam ◽  
Elkaf Rahmawan Pramudya

The main purpose of using cryptography is to provide the following four basic information security services. One of the purposes of cryptography is secrecy. Confidentiality is the fundamental security service provided by cryptography. This is a security service that stores information from unauthorized persons. Confidentiality can be achieved through a variety of ways ranging from physical security to the use of mathematical algorithms for data encryption. Vernam cipher is a stream cipher where the original data or plain with 8x8 block operation. Experimental results prove that RC4 can perform encryption and decryption with a fast execution process. In this study used a processor with 8GB of RAM. The encryption result of the text used yields the average encryption time and decryption average of 2 second.


Author(s):  
Ilia Pavlovich Mikhnev ◽  
Svetlana Vladimirovna Mikhneva

The article discusses the competences and powers of the state authorities of the Russian Federation within their legal status in the field of ensuring the security of critical information infrastructure. Some functions and authorities in the field of information security have changed in a number of federal executive bodies. In particular, the Federal Security Service, on the basis of a presidential decree, is authorized to create a state system for detecting, preventing and eliminating the consequences of computer attacks on information resources of the Russian Federation. However, not all rights and obligations are enshrined; a number of powers cause the duality of the legal status of certain federal bodies of state power. The clarity and unambiguity of securing the rights and obligations of state bodies authorized in the field of information security are guarantees for effectively ensuring the security of important information infrastructure facilities.


Istoriya ◽  
2021 ◽  
Vol 12 (8 (106)) ◽  
pp. 0
Author(s):  
Tatiana Vagramenko

This article reconstructs the history of one KGB operation against the Jehovah’s Witnesses in Ukraine, launched by the Ukrainian security services in 1951. The operation aimed to infiltrate the Jehovah’s Witness underground organization in Ukraine and to organize a Witness country committee as a covert operation. The plan was designed such that the Soviet security service became the head of the Jehovah’s Witnesses organization, and the headquarters of the official Watch Tower Bible and Tract Society became a channel in their counter-intelligence operations. This article tells about the failures and unexpected side-effects of the secret operation caused by internal conflicts within the Soviet politics of religion. Paradoxically, in the context of a disintegrated Witness underground network, caused by the post-war deportations and mass arrests, severed communication channels with the Watch Tower Society and the absence of religious literature, the Soviet security service became an alternative communication channel between the faith communities and a source of religious reproduction (including the source of the production of Watch Tower literature). This study dwells upon historical materials from recently opened SBU (former KGB) archives in Ukraine.


2019 ◽  
Vol 35 (2) ◽  
Author(s):  
Sikandar Hayat Khan ◽  
Najmusaqib Khan Niazi ◽  
Farah Sobia ◽  
Nadeem Fazal ◽  
Syed Mohsin Manzoor ◽  
...  

Objectives: To measure correlation and concordance between measured LDL cholesterol (mLDLc) and Friedewald’s calculated LDL cholesterol (cLDLc). To compare the mLDLc and cLDLc values for various anthropometric measures and biochemical indices including insulin resistance, nephropathy, glycated hemoglobin and triglycerides. Methods: Two hundred thirty two subjects were included in this cross-sectional analysis from Jan-2016 to July-2017 from a target population visiting PNS HAFEEZ hospital. Mean age of the subjects was 46.56(±11.95) years (n=232). These subjects underwent clinical evaluation including measurement of anthropometric measurements, biochemical testing for fasting plasma glucose (FPG), glycated hemoglobin (HbA1c), lipid profile, urine albumin creatinine ratio (UACR), and insulin. Correlation and concordance between mLDLc and Friedewald’s cLDLc were measured. Finally, Comparison of risk evaluation for mLDLc and cLDLc between groups formulated based upon UACR (Based upon a cut off of 2.5 mg/g) and fasting triglycerides (Group-1 :< 1.0 mmol/L, Group-2: 1.0-1.99 mmol/L and Group-3 :> 1.99 mmol/) was carried out. Results: There was significant positive linear correlation between mLDLc and cLDLc [r=0.468, <0.001]. Kendall’s Coefficient of concordance between mLDLc and cLDLc was 0.055 (p<0.001). Differences evaluated by one way ANOVA analysis for mLDLc between various triglycerides groups were only significant between group-1 and group-2 [{Group-1:Mean=2.40, (2.19-2.61), n=43}, {Group-2:Mean=2.81, (2.69-2.92),n=136}, [{Group-3:Mean=2.59,(2.37-2.81), n=53}],(p=0.004) in comparison to cLDLc [{Group-1:Mean=2.63, (2.43-2.84), n=43}, {Group-2:Mean=2.85, (2.76-2.93), n=136}, [{Group-3:Mean=2.75, (2.60-2.90),n=53}]. Calculated method for LDLc showed higher UACR than mLDLc. (p=0.021) Conclusion: cLDLc over estimates LDL-cholesterol in comparison to mLDLc. The correlation between cLDLc and mLDLc was only moderate. However, cLDLc provided better degree of risk prediction for nephropathy and glycated hemoglobin than mLDLc. How to cite this:Khan SH, Niazi NK, Sobia F, Fazal N, Manzoor SM, Nadeem A. Friedewald’s equation for calculating LDL-cholesterol: Is it the time to say “Goodbye” and adopt direct LDL cholesterol methods? Pak J Med Sci. 2019;35(2):---------.   doi: https://doi.org/10.12669/pjms.35.2.679 This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Author(s):  
Bobomurod Juraevich Abdullaev ◽  

This article provides insights into the existing and politically important security system in the Central Asian khanates. The khanates of Bukhara, Khiva and Kokand had their own military power and were divided into different parts. The security departments of the khanates also played an important role in the development of the state and the security of the people. During the years of independence, as in any other field, significant changes have taken place in the field of security services. In particular, the President of the Republic of Uzbekistan Shavkat Mirziyoyev has improved the security service in the National Guard.


2018 ◽  
Vol 9 (1) ◽  
pp. 10 ◽  
Author(s):  
Freyti Mariyani Emanuela Tumanduk ◽  
Sanfia Tesabela Messakh ◽  
H Sukardi

Abstrak Latar belakang. Gangguan jiwa merupakan pola perilaku yang secara klinis berkaitan dengan gejala penderitaan atau disability di dalam satu atau lebih fungsi kehidupan manusia. Depresi merupakan salah satu gangguan jiwa yang memiliki prevalensi tertinggi hampir 17% dibandingkan gangguan jiwa yang lain. Gangguan yang timbul membuat kemampuan dalam melakukan aktivitas menurun, contohnya kemampuan dalam melakukan perawatan diri: mandi, berpakaian, makan, dan eliminasi. Tujuan. Penelitian ini bertujuan untuk mengetahui hubungan tingkat kemampuan perawatan diri dengan tingkat depresi pada pasien depresi di ruang rawat inap Rumah Sakit Jiwa Daerah Dr. Arif Zainudin Surakarta Jawa Tengah. Metode. Penelitian ini menggunakan metode kuantitatif dengan deskriptif korelasi dan teknik pengambilan sampel dengan purposive sampling. Teknik pengumpulan data dilakukan dengan kuisioner, wawancara dan observasi yang kemudian di analisa menggunakan uji Pearson. Hasil. Hasil yang diperoleh nilai koefisien korelasi pearson sebesar 0,617 yang artinya menunjukan bahwa arah korelasi positif dengan kekuatan kuat, kemudian nilai sig 0.000 maka yang H0 ditolak dan H1 diterima yang artinya bahwa ada hubungan yang signifikan antara tingkat kemampuan perawatan diri dengan tingkat depresi pada pasien depresi di bangsal Rumah Sakit Jiwa Daerah Surakarta. Kesimpulan. Terdapat hubungan yang signifikan antara tingkat kemampuan perawatan diri dengan tingkat depresi pada pasien depresi di bangsal Rumah Sakit Jiwa Daerah dimana semakin tinggi tingkat depresi yang dialami maka semakin tinggi tingkat ketergantungan dalam melakukan perawatan diri.Kata kunci : Depresi, perawatan diri, kemandirian Abstract Background. Mental disorder is a pattern of behavior clinically associated with distress or disability which may interfere with one or more functions of human life. Mental health is one of the most serious health issues. Depression is one of the mental disorders that have the highest prevalence of almost 17% compared to other mental disorders. Disorders that arise make the ability to perform activities decreased, one of which is the ability to perform self-care: bathing, dressing, eating, and elimination. Purpose. This study aims to determine the relationship level of self-care capabilities with depression levels of depressed patients in the inpatient room of Mental Hospital Surakarta Region. Method. The methodology used is quantitative with descriptive correlation and sampling technique is purposive sampling. Data is collected through questioner, interview and observation which then analyzed using pearson test. Results. Results obtained Pearson correlation coefficient value of 0.617 which show the direction of positive correlation with strong power, then sig value. (2-tailed) 0.000 (due to sig <0.05) therefore H0 is rejected and H1 is accepted which means that there is a significant relationship between the level of self-care ability with depression levels in depressed patients in the Surakarta Area Mental Hospital. Conclusion. There is a significant relationship between the level of self-care ability with depression levels in depressed patients in the Surakarta Area Mental Hospital which means that the higher level of depression experienced the higher the level of dependence in self-care. Title : Depression, self-care, independence


Author(s):  
Jan H. P. Eloff ◽  
Mariki M. Eloff ◽  
Madeleine A. Bihina Bella ◽  
Donovan Isherwood ◽  
Moses T. Dlamini ◽  
...  

The increasing demand for online and real-time interaction with IT infrastructures by end users is facilitated by the proliferation of user-centric devices such as laptops, iPods, iPads, and smartphones. This trend is furthermore propounded by the plethora of apps downloadable to end user devices mostly within mobile-cum-cloud environments. It is clear that there are many evidences of innovation with regard to end user devices and apps. Unfortunately, little, if any, information security innovation took place over the past number of years with regard to the consumption of security services by end users. This creates the need for innovative security solutions that are human-centric and flexible. This chapter presents a framework for consuming loosely coupled (but interoperable) cloud-based security services by a variety of end users in an efficient and flexible manner using their mobile devices.


2019 ◽  
pp. 264-277
Author(s):  
Jan H. P. Eloff ◽  
Mariki M. Eloff ◽  
Madeleine A. Bihina Bella ◽  
Donovan Isherwood ◽  
Moses T. Dlamini ◽  
...  

The increasing demand for online and real-time interaction with IT infrastructures by end users is facilitated by the proliferation of user-centric devices such as laptops, iPods, iPads, and smartphones. This trend is furthermore propounded by the plethora of apps downloadable to end user devices mostly within mobile-cum-cloud environments. It is clear that there are many evidences of innovation with regard to end user devices and apps. Unfortunately, little, if any, information security innovation took place over the past number of years with regard to the consumption of security services by end users. This creates the need for innovative security solutions that are human-centric and flexible. This chapter presents a framework for consuming loosely coupled (but interoperable) cloud-based security services by a variety of end users in an efficient and flexible manner using their mobile devices.


When designing a security protocol, it is important firstly to define its security goals. These goals are generally referred to as security services. It is also important to identify the mechanisms which can provide each security service. In this chapter, therefore, we first defined the security services of relevance to this chapter and after that the security mechanisms, which can be used to provide the security services are then examined. In next chapter gives the brief details about Attacks and Authentication for Mobile Banking.


Sign in / Sign up

Export Citation Format

Share Document