scholarly journals Computer model of information behavior to study information security professionals

2018 ◽  
Vol 12 (4) ◽  
pp. 22-31
Author(s):  
Paulo Hideo Ohtoshi ◽  
Cláudio Gottschalg Duque

In this paper, we propose a computer model of information behavior to study information security professionals and an architecture, which mimics the way our brain learns new concepts to simulate this behavior computationally. Used to represent and describe any domain of knowledge, we may use ontologies to study the human information behavior and show some of the concepts and relation-ships involved in this field of knowledge. A deep knowledge of the core concepts underpinning this field can provide us with a solid basis for constructing a model. We can also use computer-programming tools not only to capture the ideas that make up this field of knowledge, but can also simulate the human information behavior. The use of computers also allows us to crawl data over the Internet and process large amounts of them in order to find patterns with some specific characteristics. In the paper, we also present the current state of this research and challenges of the model.

Author(s):  
Saad H. Haji ◽  
Subhi R. M. Zeebaree ◽  
Rezgar Hasan Saeed ◽  
Siddeeq Y. Ameen ◽  
Hanan M. Shukur ◽  
...  

The Internet has caused the advent of a digital society; wherein almost everything is connected and available from any place. Thus, regardless of their extensive adoption, traditional IP networks are yet complicated and arduous to operate. Therefore, there is difficulty in configuring the network in line with the predefined procedures and responding to the load modifications and faults through network reconfiguring. The current networks are likewise vertically incorporated to make matters far more complicated: the control and data planes are bundled collectively. Software-Defined Networking (SDN) is an emerging concept which aims to change this situation by breaking vertical incorporation, promoting the logical centralization of the network control, separating the network control logic from the basic switches and routers, and enabling the network programming. The segregation of concerns identified between the policies concept of network, their implementation in hardware switching and data forwarding is essential to the flexibility required: SDN makes it less complicated and facilitates to make and introduce new concepts in networking through breaking the issue of the network control into tractable parts, simplifies the network management and facilitate the development of the network. In this paper, the SDN is reviewed; it introduces SDN, explaining its core concepts, how it varies from traditional networking, and its architecture principles. Furthermore, we presented the crucial advantages and challenges of SDN, focusing on scalability, security, flexibility, and performance. Finally, a brief conclusion of SDN is revised.


Author(s):  
KHARCHENKO S.,

Стаття присвячена питанням визначення сучасного станунормативно-правове забезпечення інформаційної безпеки в діяльностіСлужби безпеки України та формування пропозицій з йогоудосконалення. Дослідження правових актів національногозаконодавства дозволило виділити такі ієрархічні рівні правовогорегулювання організації забезпечення інформаційної безпеки в діяльностіСБУ: конституційно-законодавчий, міжнародний, підзаконний тавідомчий. Зазначені правові норми являють собою певну сукупність, хоч іне мають об’єктивно наданої їм систематизованої форми. Між циминормами наявні внутрішні правові зв’язки, вони взаємозумовлені іхарактеризуються взаємовпливом. На сучасному етапі більшнормативно опрацьованими є питання забезпечення кібернетичноїбезпеки. Водночас, сьогодні необхідно забезпечити закріплення у відомчійнормативній базі таких заходів як здійснення контролю у інтернетпросторі (проблема блокування сайтів) та створення інтегрованогобанку даних про загрози і небезпеки у сфері інформаційної безпеки вдіяльності СБУ. The article is devoted to the issues of identifying the current state of thenormative and legal provision of information security in the activities of theSecurity Service of Ukraine and the formation of proposals for itsimprovement. The study of legal acts of the national legislation allowed tospecify the following hierarchical levels of legal regulation of the organizationof ensuring information security in the SSU activities: constitutional andlegislative, international, sub-legislative and departmental. These legal normsrepresent a certain set, although they do not have a systematized form providedto them objectively. Between these norms there are internal legal relations;they are mutually interconnected and characterized by mutual influence. At thepresent stage, the issues of ensuring cybernetic security are more normativelyelaborated. At the same time, today it is necessary to ensure the consolidationin the departmental regulatory framework of such measures as theimplementation of control in the Internet space (the problem of blocking sites)and the creation of an integrated database of threats and danger in the field ofinformation security in the activities of SSU.


2008 ◽  
Vol 27 (4) ◽  
pp. 9 ◽  
Author(s):  
Robin Sease

<p>Metaphors convey information, communicate abstractions, and help us understand new concepts. While the nascent field of information behavior (IB) has adopted common metaphors like “berry-picking” and “gap-bridging” for its models, the study of how people use metaphors is only now emerging in the subfield of human information organizing behavior (HIOB). Metaphors have been adopted in human–computer interaction (HCI) to facilitate the dialogue between user and system. Exploration of the literature on metaphors in the fields of linguistics and cognitive science as well as an examination of the history of use of metaphors in HCI as a case study of metaphor usage offers insight into the role of metaphor in human information behavior.</p><p>Editor’s note: This article is the winner of the LITA/Ex Libris Writing Award, 2008.</p>


Author(s):  
Agostino Poggi ◽  
Michele Tomaiuolo

Current technological advances and the increasing diffusion of its use for scientific, financial and social activities, make Internet the de facto platform for providing worldwide distributed data storage, distributed computing and communication. It creates new opportunities for the development of new kinds of applications, but it will also create several challenges in managing the information distributed on the Internet and in guaranteeing its “on-time” access through the network infrastructures that realize the Internet. Many researchers believed and still believe that the mobile agents could propose several attractive solutions to deal with such challenges and problems. This chapter presents the core concepts of mobile agents, and attempts to provide a clear idea of the possibility of their use by introducing the problems they cope with, the application areas where they provide advantages with respect to other technologies and the available mobile agent technologies.


Author(s):  
Paulo Hideo Ohtoshi ◽  
Cláudio Gottschalg Duque

This paper presents a user study of information security and cryptography professionals, focusing on the use of information behavior models. The methodological procedure proposed in this paper uses as a base model the information behavior model proposed by Choo et al. (2000), which divides human information behavior into three processes: information need, seek and use. The exploratory, descriptive and quali-quantitative study was carried out with 50 professionals from the Brazilian Community of Information Security and Cryptography (Comsic) through questionnaires, interviews and documentary analysis. Four subgroups were identified: cryptographic algorithms and protocols research group, cryptographic hardware and firmware development group, network security professionals group, and information security managers group.


2008 ◽  
Author(s):  
Christopher Layne ◽  
Abigail Gewirtz ◽  
Chandra Ghosh Ippen ◽  
Renee Dominguez ◽  
Robert Abramovitz ◽  
...  
Keyword(s):  
The Core ◽  

2019 ◽  
pp. 4-44 ◽  
Author(s):  
Peter Thorns

This paper discusses the organisations involved in the development of application standards, European regulations and best practice guides, their scope of work and internal structures. It considers their respective visions for the requirements for future standardisation work and considers in more detail those areas where these overlap, namely human centric or integrative lighting, connectivity and the Internet of Things, inclusivity and sustainability.


2019 ◽  
Vol 13 (2) ◽  
pp. 83-90 ◽  
Author(s):  
Hetal Patel ◽  
Mukesh Gohel

Enteric coated dosage form bypasses the stomach and releases the drug into the small intestine. Advantages of enteric coated pellets in comparison with enteric coated tablets are a) Pellets provide rapid onset of action and faster drug release due to the smaller size than tablets and b) Pellets exhibit less residence time of acid-labile drugs in the stomach compared to tablets. Dosage form coat can be damaged by longer resistance time in the stomach. The present review summarizes the current state of enteric coated pellets where core pellets are prepared by extrusion-spheronization technique and the enteric coating is applied in a fluidized bed processor. Two approaches are involved in the preparation of core pellets. In the first approach, a mixture of drug and excipient(s)/co-processed excipient is passed through extruders to prepare core pellets. In the second approach, excipient core pellets are prepared by extrusion technique and the drug is layered onto it before the enteric coating. The excipients present in the core pellets decide immediate or extended release of drug in the intestine. The coprocessed excipient pellets provide less batch variability and provide a platform for layering of many drugs before enteric coating. Some patents included enteric coating pellets [CN105456223 (A), CN105596310 (A), CN105616371 (A), CN105663095 (A), CN101611766B, CN106511862 (A), CN106668018 (A), CN106727381 (A), CN106924222 (A), TW200624127 (A), US 2017/0165248A1, US 2017/0224720A1] are discussed.


Jumping, climbing and suspensory locomotion are specialized locomotor mechanisms used on land and in the air. Jumping is used for rapid launches from substrates. Climbing and suspensory movements enable locomotion up, under and through vertically-structured habitats, such as forests. Elastic energy storage is particularly important for jumping and catapult systems and we address the core concepts of power amplification that are exemplified in nature’s extreme jumpers. We examine the diverse mechanisms of attachment that characterize animals that can grasp and adhere to a diversity of structures. We conclude the chapter by examining the integration of biological capabilities with engineering innovations in these systems.


Author(s):  
Patrícia Rossini ◽  
Jennifer Stromer-Galley

Political conversation is at the heart of democratic societies, and it is an important precursor of political engagement. As society has become intertwined with the communication infrastructure of the Internet, we need to understand its uses and the implications of those uses for democracy. This chapter provides an overview of the core topics of scholarly concern around online citizen deliberation, focusing on three key areas of research: the standards of quality of communication and the normative stance on citizen deliberation online; the impact and importance of digital platforms in structuring political talk; and the differences between formal and informal political talk spaces. After providing a critical review of these three major areas of research, we outline directions for future research on online citizen deliberation.


Sign in / Sign up

Export Citation Format

Share Document