scholarly journals USERS BEHAVIOR MODEL IN TASKS OF COMPUTER SYSTEMS SECURITY ANALYSIS

2014 ◽  
pp. 151-156
Author(s):  
V. P. Shyrochin ◽  
V. E. Mukhin ◽  
Hu Zheng Bing

Security of computer systems of various purpose and the appropriate information technologies appreciably depends on tools of user identification and authentication, and also on tools of the analysis of their behavior and behavior of their programs during reception of access to those or other information resources. This article is devoted to a substantiation of a method of use of a known formalism - state machine for modeling users behavior and to testing of protection tools on detection of attempts of the non-authorized access to information resources, including at early stages of preparation for such actions.

2020 ◽  
Author(s):  
Justin Cargill

© 2013, IGI Global. The revolution in information technologies, in particular the growth of the Internet and greater access to computers, has given social workers unprecedented access to information resources. Researching such resources is crucial and it needs to be done efficiently. Planning an efficient search requires knowing which databases and other resources to use, knowing how to formulate an answerable question, identifying terms that inform the question, selecting the appropriate methodological filters, and being able to critically appraise evidence for its quality and relevance. This chapter, therefore, outlines some of the research sources available to social workers, it looks at some principles for finding information for practice in social work, and it outlines some criteria for evaluating the quality of that information.


Author(s):  
Justin Cargill

The revolution in information technologies, in particular the growth of the Internet and greater access to computers, has given social workers unprecedented access to information resources. Researching such resources is crucial and it needs to be done efficiently. Planning an efficient search requires knowing which databases and other resources to use, knowing how to formulate an answerable question, identifying terms that inform the question, selecting the appropriate methodological filters, and being able to critically appraise evidence for its quality and relevance. This chapter, therefore, outlines some of the research sources available to social workers, it looks at some principles for finding information for practice in social work, and it outlines some criteria for evaluating the quality of that information.


2020 ◽  
Author(s):  
Justin Cargill

© 2013, IGI Global. The revolution in information technologies, in particular the growth of the Internet and greater access to computers, has given social workers unprecedented access to information resources. Researching such resources is crucial and it needs to be done efficiently. Planning an efficient search requires knowing which databases and other resources to use, knowing how to formulate an answerable question, identifying terms that inform the question, selecting the appropriate methodological filters, and being able to critically appraise evidence for its quality and relevance. This chapter, therefore, outlines some of the research sources available to social workers, it looks at some principles for finding information for practice in social work, and it outlines some criteria for evaluating the quality of that information.


Author(s):  
S.C. Lenny Koh ◽  
Stuart Maguire

In information terms, security can be defined as the processes of ensuring that private information remains private and uncompromised in an atmosphere where all other information is free. Security techniques such as encryption, passwords, and firewalls are designed to prevent unauthorized access to information, to protect the integrity of computing resources, and to limit the potential damage that can be caused by attackers and intruders. The notion of a “secure computer” is relative though: the only truly secure computer is one powered down in a locked facility that no one has access to. Risk management is the ongoing process of assessing the risk to automated information resources. It is part of a risk-based approach used to determine adequate security for a system by analysing the threats and vulnerabilities and selecting appropriate cost-effective controls to achieve and maintain an acceptable level of risk (Maguire, 2002).


GIS Business ◽  
2019 ◽  
Vol 14 (6) ◽  
pp. 656-666
Author(s):  
Dr. Entisar Al-Obaidi

Media refers to the channels of communication through which we distribute news, education, movies, music, advertising messages and other information. It includes physical and online newspapers and magazines, television, radio, telephone, the Internet, fax and billboards, are a dominant force in lives of children. Although television is remaining the predominant medium for children and adolescents, the new technologies are become more popular. We have to concern about the potential harmful effects of media "messages and images"; however, the positive and negative effects of media should be recognized. Parents have to establish the plan for all media in family home. Media that are influences on children should be recognized by "schools, policymakers, product advertisers, and entertainment producers".


2021 ◽  
pp. 146144482110148
Author(s):  
Vojtěch Mýlek ◽  
Lenka Dedkova ◽  
David Smahel

Adolescents commonly make new social connections online that sometimes result in face-to-face meetings. Despite potential benefits, risk-focused discourse dominates public debates and shapes information shared by sources important for adolescents—news media, preventive programs, peers, parents, and teachers. Our study examines how information about face-to-face meetings from these sources relates to adolescents’ risk perception and engagement in such meetings. Using a sample of 707 Czech adolescents (aged 11–16 years, 46% male), we analyzed these effects for male and female adolescents to reflect the gendered nature of the risk-focused discourse. Male adolescents’ risk perception was not affected by information from any source. Female adolescents’ risk perception was negatively affected by information peers with prior experience with face-to-face meetings but not by other information sources. Female adolescents also perceived face-to-face meetings as riskier in general. We discuss gender differences and the limited impact of information sources on risk perception and provide practical recommendations.


2018 ◽  
Author(s):  
Stephen R. Shamblen ◽  
Katharine Atwood ◽  
William Scarbrough ◽  
David A. Collins ◽  
Adam Rindfleisch ◽  
...  

Author(s):  
José María Díaz Nafría ◽  
Basil M. Al Hadithi

At the beginning of his famous “Mathematical Theory of Communication” (MTC), Shannon removes the semantic questions from the technical task, and such exoneration seems to be commonly accepted, even for those who certainly care for ‘semantic questions’. However, the MTC communication model itself is built upon this fundamental assumption, which at the same time is used in other information theories and –even with wider practical consequences– as a design pattern for the Information Technologies. When the human communication is more and more dependant with respect to information technologies, the suitability of the communication model used to design the technological systems has to be put into scope. Non essential element needed to establish a proper human communication should be omitted; otherwise this technology could isolate people, betraying its hypothetical purpose. Comparing the technological model to other based on several pragmatic theories of communication (emerged in linguistics, semiotic, psychology and anthropology) is shown the insufficiency of the technological model, pointing out some elements that a new model should not forget.


Sign in / Sign up

Export Citation Format

Share Document