Study of DEM Information Security in Geographic Information Service

2015 ◽  
Vol 713-715 ◽  
pp. 2147-2151
Author(s):  
Ling Yu Chen ◽  
Guo Min Song

Geographic Information Service is open service based on the network environment. DEM should be protected because of its significance. This paper gives three methods for DEM information protecting, they are DEM encrypting, DEM information hiding and DEM Information disguising, and researches their theories and techniques. Then, this paper analyses their differences and relation. This paper could provide theory support for DEM information security research in Geographic Information Service.

Author(s):  
Bright Brabin Winsley ◽  
Muthukannan M.

Scientometrics is the quantitative and qualitative evaluation of scientific literature. Information security is the art, science, and technique of securing the computer's systems, the data and information stored in computer systems, computer networks, and also the information security management. Information security is critical while designing an information system or an information service. Data related to information security research are downloaded from the Web of Science and analyzed for literature growth, top productive country, institution, and author, top funding agency, top contributing source title, and the area of research. This chapter reveals USA is the top contributing country while China is also making rapid strides in this field. Chinese funding agencies fund most of the research. However, English is the preferred language of communication.


2020 ◽  
Vol 35 (3) ◽  
pp. 214-231
Author(s):  
Daniel Pienta ◽  
Jason Bennett Thatcher ◽  
Allen Johnston

Whaling is one of the most financially damaging, well-known, effective cyberattacks employed by sophisticated cybercriminals. Although whaling largely consists of sending a simplistic email message to a whale (i.e. a high-value target in an organization), it can result in large payoffs for cybercriminals, in terms of money or data stolen from organizations. While a legitimate cybersecurity threat, little information security research has directed attention toward whaling. In this study, we begin to provide an initial understanding of what makes whaling such a pernicious problem for organizations, executives, or celebrities (e.g. whales), and those charged with protecting them. We do this by defining whaling, delineating it from general phishing and spear phishing, presenting real-world cases of whaling, and provide guidance on future information security research on whaling. We find that whaling is far more complex than general phishing and spear phishing, spans multiple domains (e.g. work and personal), and potentially results in spillover effects that ripple across the organization. We conclude with a discussion of promising future directions for whaling and information security research.


2013 ◽  
Vol 457-458 ◽  
pp. 1224-1227
Author(s):  
Jian Feng Hu ◽  
Zhen Dong Mu

Mobile equipment has now become a new platform for information exchange, spend a lot of information exchange, how to effectively protect the mobile platform information security? Research has shown that, EEG signal can be used as identification tool, the user's information protection and good, this paper to protect the information security of mobile devices to research how to use EEG; the EEG signal is feasible for mobile equipment identification.


Author(s):  
J. Zhang ◽  
H. Zhang ◽  
C. Wang

TIANDITU (Map World) is the public version of the National Platform for Common Geospatial Information Service, and the travelling channel is TIANDITU-based geographic information platform for travelling service. With the development of tourism, traditional ways for providing travelling information cannot meet the needs of travelers. As such, the travelling channel of TIANDITU focuses on providing travel information abundantly and precisely, which integrated the geographic information data of TIANDITU Version 2.0 and the authoritative information resources from China National Tourism Administration. Furthermore, spatial positioning, category and information query of various travelling information were offered for the public in the travelling channel. This research mainly involves three important parts: the system design, key technologies of the system design and application examples. Firstly, this paper introduced the design of TIANDITU-based geographic information system for travelling service, and the general and database design were described in detail. The designs for general, database and travelling service above should consider lots of factors which illustrated in the paper in order to guarantee the efficient service. The process of system construction, the content of geographic information for travelling and system functions of geographic information for travelling are also proposed via diagram in this part. Then several key technologies were discussed, including the travelling information integration for main node and among nodes, general architecture design and management system for travelling channel, web portals and system interface. From the perspective of main technologies, this part describes how TIANDITU travelling channel can realize various functions and reach the requirements from different users. Finally, three application examples about travelling information query were listed shortly. The functions and search results are shown clearly in this part. In all, TIANDITU-based geographic information system for travelling service aimed to integrate the travelling information resources from national, provincial and municipal levels, and finally realized to provide "one stop" travelling service for users in the end.


Author(s):  
Ch. Himabindu

The availability of realistic network data plays a significant role in fostering collaboration and ensuring U.S. technical leadership in network security research. Unfortunately, a host of technical, legal, policy, and privacy issues limit the ability of operators to produce datasets for information security testing. In an effort to help overcome these limitations, several data collection efforts (e.g., CRAWDAD[14], PREDICT [34]) have been established in the past few years. The key principle used in all of these efforts to assure low-risk, high-value data is that of trace anonymization—the process of sanitizing data before release so that potentially sensitive information cannot be extracted.


2018 ◽  
Vol 26 (3) ◽  
pp. 327-337 ◽  
Author(s):  
Debi Ashenden

Purpose The purpose of this study is to uncover employee attitudes towards information security and to address the issue of social acceptability bias in information security research. Design/methodology/approach The study used personal construct psychology and repertory grids as the foundation for the study in a mixed-methods design. Data collection consisted of 11 in-depth interviews followed by a survey with 115 employee responses. The data from the interviews informed the design of the survey. Findings The results of the interviews identified a number of themes around individual responsibility for information security and the ability of individuals to contribute to information security. The survey demonstrated that those employees who thought the that organisation was driven by the need to protect information also thought that the risks were overstated and that their colleagues were overly cautious. Conversely, employees who thought that the organisation was driven by the need to optimise its use of information felt that the security risks were justified and that colleagues took too many risks. Research limitations/implications The survey findings were not statistically significant, but by breaking the survey results down further across business areas, it was possible to see differences within groups of individuals within the organisation. Originality/value The literature review highlights the issue of social acceptability bias and the problem of uncovering weakly held attitudes. In this study, the use of repertory grids offers a way of addressing these issues.


Sign in / Sign up

Export Citation Format

Share Document