scholarly journals information behavior of Information Security and Cryptography professionals

Author(s):  
Paulo Hideo Ohtoshi ◽  
Cláudio Gottschalg Duque

This paper presents a user study of information security and cryptography professionals, focusing on the use of information behavior models. The methodological procedure proposed in this paper uses as a base model the information behavior model proposed by Choo et al. (2000), which divides human information behavior into three processes: information need, seek and use. The exploratory, descriptive and quali-quantitative study was carried out with 50 professionals from the Brazilian Community of Information Security and Cryptography (Comsic) through questionnaires, interviews and documentary analysis. Four subgroups were identified: cryptographic algorithms and protocols research group, cryptographic hardware and firmware development group, network security professionals group, and information security managers group.

2018 ◽  
Vol 12 (4) ◽  
pp. 22-31
Author(s):  
Paulo Hideo Ohtoshi ◽  
Cláudio Gottschalg Duque

In this paper, we propose a computer model of information behavior to study information security professionals and an architecture, which mimics the way our brain learns new concepts to simulate this behavior computationally. Used to represent and describe any domain of knowledge, we may use ontologies to study the human information behavior and show some of the concepts and relation-ships involved in this field of knowledge. A deep knowledge of the core concepts underpinning this field can provide us with a solid basis for constructing a model. We can also use computer-programming tools not only to capture the ideas that make up this field of knowledge, but can also simulate the human information behavior. The use of computers also allows us to crawl data over the Internet and process large amounts of them in order to find patterns with some specific characteristics. In the paper, we also present the current state of this research and challenges of the model.


2019 ◽  
Vol 13 (4) ◽  
pp. 325-333
Author(s):  
Xu Liu ◽  
Xiaoqiang Di ◽  
Jinqing Li ◽  
Huamin Yang ◽  
Ligang Cong ◽  
...  

Background: User behavior models have been widely used to simulate attack behaviors in the security domain. We revised all patents related to response to attack behavior models. How to decide the protected target against multiple models of attack behaviors is studied. Methods: We utilize one perfect rational and three bounded rational behavior models to simulate attack behaviors in cloud computing, and then investigate cloud provider’s response based on Stackelberg game. The cloud provider plays the role of defender and it is assumed to be intelligent enough to predict the attack behavior model. Based on the prediction accuracy, two schemes are built in two situations. Results: If the defender can predict the attack behavior model accurately, a single-objective game model is built to find the optimal protection strategy; otherwise, a multi-objective game model is built to find the optimal protection strategy. Conclusion: The numerical results prove that the game theoretic model performs better in the corresponding situation.


2018 ◽  
Vol 39 (3) ◽  
pp. 259-269 ◽  
Author(s):  
Matt Bird-Meyer ◽  
Sanda Erdelez

An interdisciplinary approach explores how journalists embrace the unexpected as part of their reporting routines using Erdelez’s framework of information encountering from the study of human information behavior and the concepts of news routines and story ideation from journalism studies. This paper provides a fresh perspective on the sociology of news in finding that the participating journalists embraced the unexpected by routinizing encountering of story leads and opening themselves to the opportunities they provide.


2017 ◽  
pp. 28-36
Author(s):  
О. Н. Osaulenko

The official statistics have importance role in the problems of national information security; being an integral part of the social information space, it faces security-specific risks immanent in any kind of information system. It is emphasized that information security in the official statistical has to encompass all the phases and all the participants of the statistical production process, from the producers at the phase of data processing and storage to user security at the phase of data dissemination. Issues of statistical data confidentiality are analyzed as a fundamental principle of international and European statistics. It is demonstrated that the documents sharing functions among those concerned with the national statistical system, their responsibilities for statistical confidentiality and procedures for access to various types of information need to be elaborated and approved at legislative level. Apart from this, the system of administrative, technical and organizational measures providing for physical and logical protection of confidential data, in order to prevent their disclosure, in parallel with organizing the controlled access to data for research purposes has to be built and introduced in the statistical practice The respective approaches used in the statistical system need to be harmonized and set in conformity with the global practice. Subject to detailed analysis is the issue of statistical secrecy, discussed as a broad concept dealing with the necessity to protect individual data of the population, individual data of companies and classified information, which access may undermine political and social interests. It is emphasized that the Law of Ukraine “On State Statistics” fails to provide a comprehensive response to the problems of defining classified information and its protection procedures. The relationship of internationally recognized principles of statistical activities and information security attributes is substantiated, especially from the global information quality perspective. The conclusion is made that the statistical service, when interacting with users, needs to orient on the commonly accepted criteria for statistical data quality assessment, formulated in official international documents that have to be adapted by the national official statistics through elaborating and introducing respective legal acts.


Author(s):  
Anees Banu

When it comes to preventing unauthorised access to, destruction of, or inspection of confidential data, information security has always been a major factor. Multimedia information is now used in every field throughout the world. The confidential information that is used in these areas must be kept secure. There are a variety of methods for keeping data secure. One of these is steganography, which is concealing information within other data into a format that the cover information remains unchanged. Cryptography, an encryption process that scrambles data into a written form that is sometimes referred to as a hash, is an auxiliary approach for securing information. Steganography and cryptography each have their own set of benefits and drawbacks. Even though both technologies give security, it is usually a good practise to combine Cryptographic algorithms to create additional layers of security. When cryptographic with steganography are combined, a multi-layer security paradigm is created. The proposed work's main goal is to add an additional layer of protection by using cryptography and steganography to encrypt and embed secret data conveyed across an insecure channel.


Author(s):  
Tomi Heimonen

One of the challenges with designing effective mobile search interfaces is how to present and explore the search results. Category-based result organization and presentation techniques have been suggested in literature as a complement to the traditional ranked result list. In the mobile context categories can facilitate information access by providing an overview of the result set, by reducing the need for keyword entry and by providing means to filter the results. This chapter includes a review of recent research on category-based interfaces for mobile search. The chapter also addresses the challenges of evaluating mobile search in situ and presents a longitudinal user study that investigated how a mobile clustering interface is used to search the Web. Results from the study show that category-based interaction can be situationally useful, for example when users have problems describing their information need or wish to retrieve a subset of results. In summary, the chapter proposes future research directions for category-based mobile search interfaces.


Sign in / Sign up

Export Citation Format

Share Document