scholarly journals The Measurement of Popularity and Prevalence of Software Vulnerability

2021 ◽  
pp. 575-580
Author(s):  
Yuliia Tatarinova ◽  
Olha Sinelnikova

Prioritizing bug fixes becomes a daunting task due to the increasing number of vulnerability disclosure programs.  When making a decision, not only the Common Vulnerability Scoring System (CVSS) but also the probability of exploitation, the trend of particular security issues should be taken into account. This paper aims to discuss the sources and approaches for measuring degree of interest in a specific vulnerability at a particular point in real-time. This research presents а new metric and estimation model which is based on vulnerability assessment. We compared several techniques to determine the most suitable approach and relevant sources for improving vulnerability management and prioritization problems. We chose the Google Trend analytics tool to gather trend data, distinguish main features and build data set. The result of this study is the regression equation which helps efficiently prioritize vulnerabilities considering the public interest in the particular security issue. The proposed method provides the popularity estimation of Common Vulnerabilities and Exposures (CVE) using public resources.

Author(s):  
Julija Gavėnaitė-Sirvydienė ◽  
Algita Miečinskienė

Purpose – due to the constant increase of cyber-attacks not only the measures of identifying and controlling cyber risks are created, but also the methods of estimating possible cyber-attacks financial costs should be developed to increase business preparedness. The purpose of this research is to forecast potential costs of cyber-attacks in Baltic countries. Research methodology – to achieve the aim of the article and prepare a prognosis of possible cyber-attacks costs the Estimation the Global Costs of Cyber Risk Calculator V 1.2 tool was used. Findings – estimated costs of cyber-attacks in Lithuania, Latvia and Estonia are highest in the public business and ser-vices sector and also in the defense sector. According to conducted calculations the costs of cyber-attacks in Lithuania will reach 1% of GDP of Lithuania by 2026. Research limitations – in this research the costs of cyber-attacks are estimated regarding industries of business but not excluding specific cyber threats. Therefore, for the future research possibilities could be the analyses of specific cyber risks and their impact to various business sectors. Practical implications – the results of the research may be useful in practical approach for preparing the risk manage-ment tools, evaluating possible damage and effect of cyber-attacks to business, also increasing preparedness level and business resilience. Originality/Value – this estimation model has been not used to evaluate and discuss cyber-risks costs in Lithuania among previous researches, therefore the topic and conducted results are original and significantly relevant for further analyses of cyber security issues in Lithuania.


Author(s):  
Wendy J. Schiller ◽  
Charles Stewart III

From 1789 to 1913, U.S. senators were not directly elected by the people—instead the Constitution mandated that they be chosen by state legislators. This radically changed in 1913, when the Seventeenth Amendment to the Constitution was ratified, giving the public a direct vote. This book investigates the electoral connections among constituents, state legislators, political parties, and U.S. senators during the age of indirect elections. The book finds that even though parties controlled the partisan affiliation of the winning candidate for Senate, they had much less control over the universe of candidates who competed for votes in Senate elections and the parties did not always succeed in resolving internal conflict among their rank and file. Party politics, money, and personal ambition dominated the election process, in a system originally designed to insulate the Senate from public pressure. The book uses an original data set of all the roll call votes cast by state legislators for U.S. senators from 1871 to 1913 and all state legislators who served during this time. Newspaper and biographical accounts uncover vivid stories of the political maneuvering, corruption, and partisanship—played out by elite political actors, from elected officials, to party machine bosses, to wealthy business owners—that dominated the indirect Senate elections process. The book raises important questions about the effectiveness of Constitutional reforms, such as the Seventeenth Amendment, that promised to produce a more responsive and accountable government.


Author(s):  
Kartik Khurana ◽  
Harpreet Kaur ◽  
Ritu Chauhan ◽  
Shalu Chauhan ◽  
Shaveta Bhatia ◽  
...  

Now a day’s mobile communication has become a serious business tool for the users. Mobile devices are mainly used for the applications like banking, e-commerce, internet access, entertainment, etc. for communication. This has become common for the user to exchange and transfer the data. However people are still facing problems to use mobile devices because of its security issue. This paper deals with various security issues in mobile computing. It also covers all the basic points which are useful in mobile security issues such as categorisation of security issues, methods or tactics for success in security issues in mobile computing, security frameworks.


2021 ◽  
Author(s):  
Christian Thiele ◽  
Gerrit Hirschfeld ◽  
Ruth von Brachel

AbstractRegistries of clinical trials are a potential source for scientometric analysis of medical research and serve important functions for the research community and the public at large. Clinical trials that recruit patients in Germany are usually registered in the German Clinical Trials Register (DRKS) or in international registries such as ClinicalTrials.gov. Furthermore, the International Clinical Trials Registry Platform (ICTRP) aggregates trials from multiple primary registries. We queried the DRKS, ClinicalTrials.gov, and the ICTRP for trials with a recruiting location in Germany. Trials that were registered in multiple registries were linked using the primary and secondary identifiers and a Random Forest model based on various similarity metrics. We identified 35,912 trials that were conducted in Germany. The majority of the trials was registered in multiple databases. 32,106 trials were linked using primary IDs, 26 were linked using a Random Forest model, and 10,537 internal duplicates on ICTRP were identified using the Random Forest model after finding pairs with matching primary or secondary IDs. In cross-validation, the Random Forest increased the F1-score from 96.4% to 97.1% compared to a linkage based solely on secondary IDs on a manually labelled data set. 28% of all trials were registered in the German DRKS. 54% of the trials on ClinicalTrials.gov, 43% of the trials on the DRKS and 56% of the trials on the ICTRP were pre-registered. The ratio of pre-registered studies and the ratio of studies that are registered in the DRKS increased over time.


2013 ◽  
Vol 756-759 ◽  
pp. 3039-3042
Author(s):  
Chen Zhang ◽  
Shi Jie Jiang ◽  
Bin Huang

Online payment is apparently the key for the online transactions, so its security issue becomes the center of focus in the e-commerce development. In China, however, the information leakage, transaction fraud and other security issues have occurred so frequently that they have severely affected the customer confidence, and have become one of the major blockages in the e-commerce development. This article intends to have an in depth discussion of online payment security issues, examining current situations and problems in security technology, corporate social responsibility, and also propose appropriate strategic recommendations.


2018 ◽  
Vol 10 (12) ◽  
pp. 114 ◽  
Author(s):  
Shaukat Ali ◽  
Naveed Islam ◽  
Azhar Rauf ◽  
Ikram Din ◽  
Mohsen Guizani ◽  
...  

The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual communities to interact with other users of similar interests. However, OSN have turned the social sphere of users into the commercial sphere. This should create a privacy and security issue for OSN users. OSN service providers collect the private and sensitive data of their customers that can be misused by data collectors, third parties, or by unauthorized users. In this paper, common security and privacy issues are explained along with recommendations to OSN users to protect themselves from these issues whenever they use social media.


2019 ◽  
Vol 50 (4) ◽  
pp. 1146-1166
Author(s):  
Trish McCulloch ◽  
Stephen Webb

Abstract This article reports on findings of a government-funded research project which set out to understand what the public think about social services in Scotland. The authors were particularly keen to examine issues of legitimacy, trust and licence to operate for social services as they are framed in public perceptions. Drawing on a national online survey of 2,505 nationally representative adults, the findings provide the first and largest empirical data set on public perceptions of social services in Scotland. Data analysis occurred in two stages and employed descriptive statistical measurement and cross-tabulation analysis. The findings indicate that, overall, people in Scotland are positive about social services and the value of their impact on society. Furthermore, they believe that social services perform a valuable public role. These findings are significant for debates surrounding social services and suggest that the Scottish public has a more positive view of social services than social service workers and welfare institutions typically perceive. The findings demonstrate the need to develop a more theoretically rich understanding of the relationships between public perception, legitimacy and social licence in social services, including attention to co-productive models of engagement.


2019 ◽  
Vol 2 (4) ◽  
pp. 530
Author(s):  
Amr Hassan Yassin ◽  
Hany Hamdy Hussien

Due to the exponential growth of E-Business and computing capabilities over the web for a pay-for-use groundwork, the risk factors regarding security issues also increase rapidly. As the usage increases, it becomes very difficult to identify malicious attacks since the attack patterns change. Therefore, host machines in the network must continually be monitored for intrusions since they are the final endpoint of any network. The purpose of this work is to introduce a generalized neural network model that has the ability to detect network intrusions. Two recent heuristic algorithms inspired by the behavior of natural phenomena, namely, the particle swarm optimization (PSO) and gravitational search (GSA) algorithms are introduced. These algorithms are combined together to train a feed forward neural network (FNN) for the purpose of utilizing the effectiveness of these algorithms to reduce the problems of getting stuck in local minima and the time-consuming convergence rate. Dimension reduction focuses on using information obtained from NSL-KDD Cup 99 data set for the selection of some features to discover the type of attacks. Detecting the network attacks and the performance of the proposed model are evaluated under different patterns of network data.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Peter Nderitu Githaiga

PurposeThis paper aims to investigate whether revenue diversification affects the financial sustainability of microfinance institutions (MFIs).Design/methodology/approachThe study uses a worldwide panel data set of 443 MFIs in 108 countries for the period 2013–2018 and two-step system Generalized Method of Moments estimation model.FindingsThe study finds that revenue diversification has a significant and positive effect on the financial sustainability of MFIs.Practical implicationsThe findings of this study actually offer important managerial and policy lessons on MFIs’ financial sustainability. Microfinance managers and policymakers should consider revenue diversification as a strategy through which MFIs can attain financial sustainability instead of overreliance on donations and government subsidiesOriginality/valueUnlike previous studies that examined revenue diversification in the context of banking firms, this study contributes to literature by examining the impact of revenue diversification of the financial sustainability of MFIs.


2019 ◽  
Vol 8 (1) ◽  
pp. 29
Author(s):  
Nathaly Maria Martins Freire ◽  
Douglas Willyam Rodrigues Gomes ◽  
Oderlene Vieira de Oliveira

No mundo contemporâneo vem se tornando mencionado em maior frequência os controles nas contas públicas. O controle externo, torna-se uma ferramenta que auxilia o controle das despesas e que na Administração pública vem sendo efetivado pelos Tribunais de Contas. Justifica-se esse estudo pela importância do controle externo das contas públicas e o acesso às informações, afim de obter-se accountability fidedigna dos órgãos públicos. Assim, nota-se a utilidade de instituições que repassem as informações para os habitantes, que proporcionem transparência à gestão pública, que correspondam a reais agências de accountability, de transparência, que disponha respostas e realize prestação de contas dos recursos públicos. O presente artigo tem como objetivo geral identificar as contribuições que o Tribunal de Contas dos Municípios (TCM) traz para o processo de prestação de contas nos municípios objeto de pesquisa. No referencial foram abordados conceitos sobre accountability e sobre a Lei de Responsabilidade Fiscal (LRF). Metodologicamente é um trabalho de natureza bibliográfica, descritiva e qualitativa. Os resultados encontrados mostram que os TCM é um órgão que executa o processo de accountability nos municípios em que existe. Conclui-se que os TCM’s proporcionam fiscalização dos recursos patrimoniais, direcionados pelos administradores do poder público e controle do mesmo, a fim de facilitar o processo de prestação de contas entre a sociedade e a classe dos governantes municipais. PUBLIC ADMINISTRATION IN ACCOUNTABILITY: A STUDY WITH CITY HALLS FROM CEARÁ STATE ABSTRACT In contemporary world the control of public accounts is being mentioned more frequently. The external control becomes a tool that assists the control of expenses and it is what the public administration has been done by Courts of Accounts. This study is justified by the importance of external control of the public accounts and the access to information, in order to obtain reliable accountability of public institutions. Therefore, it is noticed the usefulness of institutions that share information to the citizens, providing transparency to the public administration, which correspond to real agencies of accountability, of transparency, giving answers and performing accountability of public resources. This paper aims to identify the contributions that the Municipal Courts of Accounts (TCM) brings to the process of accountability in the cities that are object of this research. In the referential were used concepts about accountability and about the Fiscal Responsibility Law (LRF). Methodologically it is a bibliographical, descriptive and qualitative work. The results indicate that the TCM is an institution that executes the accountability process in the cities where it is present. It is concluded that TCMs provide supervision of patrimonial resources, directed and controlled by the administrators of public power, in order to facilitate the process of accountability among society and the class of municipal governors.


Sign in / Sign up

Export Citation Format

Share Document