information safety
Recently Published Documents


TOTAL DOCUMENTS

121
(FIVE YEARS 53)

H-INDEX

4
(FIVE YEARS 2)

2022 ◽  
Vol 12 (1) ◽  
pp. 111-116
Author(s):  
Keerthana S ◽  
Mugdha Kamble ◽  
Neeraj Khare

Background: The coronavirus has become a global pandemic and to overcome the pandemic crisis vaccine were launched in India. COVID-19 mass immunisation has emerged as a crucial preventive technique. COVID-19 vaccine hesitancy may become a distinctive element of the pandemic's next stage. The loss of public trust in vaccines around the world is a source of concern and a serious problem for public health professionals. A study was therefore planned in Bhopal to determine whether hesitancy is present in a population and to distinguish hesitancy from other reasons why adults do not get vaccinated. The study was conducted with the objective as to assess the vaccine hesitancy in Bhopal. Methodology: This is a cross-sectional study conducted among the general population of Bhopal during the time period between 2oth Jan to Feb 2021. 381 participants were administered with a predesigned pretested questionnaire. Results: The mean age of the participants was 33.8 years. Majority was unskilled workers, Hindu by religion and most of them were married. 57.3 % showed hesitancy for COVID vaccination. Majority had the knowledge of vaccine. Television was the major source of information. Almost 80% responded as they would continue practicing personal protective measures even after vaccination. The major reasons for hesitancy were lack of information, safety about vaccination, and side effects from the same. The public demands the proper information about the vaccine and educate the general public and communicate the important information regarding vaccinations. Conclusion: Routine monitoring of vaccine hesitancy plays a valuable role in identifying early vaccine concerns. And adopt the strategies to address these concerns, through in-depth understanding of the nature of hesitancy, as well as who is hesitating. Given the dynamic and changing nature of vaccine hesitancy, the importance of ongoing monitoring cannot be overstated. Key words: COVID-19, COVID-19 Vaccine, SARS-COV2 vaccine, Vaccine hesitancy, Vaccine resistance, Vaccine opposition.


2021 ◽  
Author(s):  
Saud Mohamed Al Hammadi ◽  
Ramakrishna Akula

Abstract Organizational Multi layered documentation frameworks, complex document writing styles, cross referencing, poor document integration, end user language barriers and psychological factors for searching relevant information under pressure complicates the understanding of a technical document. Complex technical documents intimidate the end user and shrinks the user understanding. Document engineering or Usability mapping of documents is proven scientific method for writing technical documents in a simplified and user-friendly manner. The document engineering concepts are based on human psychology, that helps the user to navigate through document content rather searching for specific keyword or information. Safety intensive industrial sectors such as Aviation industry, Oil and Gas are already adopting the document engineering concepts in their technical documentation. It is proven in many organizations that the usage of document engineering concepts simplifies the document complexity and the end users feel much comfort in understanding the documents in their work. In this paper an attempt has been made suggest adoptable user engineering concepts to simplify technical HSE documents. Also, the paper discusses some of the in-built hidden readability features in Microsoft word for checking reading ease and reading grade levels to improve simplification of documents. The paper discusses the psychological aspects behind document reading, understanding, cognitive linking for reaching the required information. Also, the paper discusses some of the best practices to be considered for technical document writers.


Author(s):  
Zsolt Barna

The timeliness of the topic the domestic companies in more waves afflicting, the treatment of a situation took shape because of COVID gets it, which brought fundamental changes in the companies' daily function and the execution of his plans. I would like to detail the times before COVID in my lecture onto a typical corporate management situation, with a strange look onto the processes of the projects, and onto the informatics solutions being attached to this functionally, his role in the accomplishment of the daily tasks. Tightly here owing question, that in the consecutive epidemic waves the treatment of this area, how the insurance of the function occurred, in what changed, developed. In this determining element, it is, that the project to be examined with a how important classification in the given company's life, how much it felt lifted one in this situation. The other important part of the mentioned decision is that the resources insured till then, let it be the material, technical or human condition, onto acting in the future you are for a chin neither, you are in a measure reduced possibly, ergo this may mean the change of the tasks, adjourning the fulfillment of the given milestones. The epidemic took shape on the hook of his treatment The validation of various safety regulations poses a serious task to the companies, which one not only the protection of the human resources but reports the information safety. To this suitable and onto enough informatics toolbars and it operator onto staff they need, for who a heavier task waits likewise, some, that characteristically on the same one combination and size apparatus makes it the informatics systems attached to the company's daily, normal function, the operating of equipment. Additional strategic questions arise besides this with the company's function relatedly, which influence they have onto the fate of projects, the change of their content and their hierarchy. The characteristically portfolio management in a system treated, there are project tasks to be realized under realization in slipping on first stairs developed based on the justification already. The safe working and the IT because of the bars of supporting systems, they go through a natural deceleration, since the project staff himself amounts to the epidemic provided it to dangers. The summary can be related, that where the character of the organizational culture or the tasks demanded a more informatics base early already, those administrative project devices, the systems, clouds support the execution, well in the future there, mainly if the so-far site is not attached to by the character of realization inevitably. Where and in as much the on-line space not anymore enough, the corporate classification will decide it there because the personal presence, supervision or environment are necessary, that from the disadvantage following from this, what allows the the project task and where that border, where the fulfilment of this gets into fundamental.


Author(s):  
Joseph B. Eseyin ◽  
Kazeem A. Gbolagade

The mass dispersal of digital communication requires the special measures of safety. The need for safe communication is greater than ever before, with computer networks now managing almost all of our business and personal affairs. Information security has become a major concern in our digital lives. The creation of new transmission technologies forces a specific protection mechanisms strategy particularly in data communication state.  We proposed a steganography method in this paper, which reads the message, converting it into its Residue Number System equivalent using the Chinese Remainder Theorem (CRT), encrypting it using the Rivest Shamir Adleman (RSA) algorithm before embedding it in a digital image using the Least Significant Bit algorithm of steganography and then transmitting it through to the appropriate destination and from which the information required to reconstruct the original message is extracted. These techniques will enhance the ability to hide data and the hiding of ciphers in steganographic image and the implementation of CRT will make the device more efficient and stronger. It reduces complexity problems and improved execution speed and reduced the time taken for processing the encryption and embedding competencies.


2021 ◽  
Vol 1 (9 (109)) ◽  
pp. 43-49
Author(s):  
Alaa Noori Mazher ◽  
Jumana Waleed

Over the last few decades, tremendous and exponential expansion in digital contents together with their applications has emerged. The Internet represents the essential leading factor for this expansion, which provides low-cost communication tools worldwide. However, the main drawback of the Internet is related to security problems. In order to provide secure communication, enormous efforts have been spent in the cryptographic field. Recently, cryptographic algorithms have become essential for increasing information safety. However, these algorithms require random keys and can be regarded as compromised when the random keys are cracked via the attackers. Therefore, it is substantial that the generation of keys should be random and hard to crack. In this paper, this is guaranteed via one of the most efficient nature-inspired algorithms emerged by inspiring the movements of stars, galaxies, and galaxy superclusters in the cosmos that can be utilized with a mathematical model (magic cube) for generating hardly cracking random number keys. In the proposed cryptographic system, the Modified Galactic Swarm Optimization (GSO) algorithm has been utilized in which every row and column of magic cube faces are randomly rotated until reaching the optimal face, and the optimal random elements are selected as optimal key from the optimal face. The generated optimized magic cube keys are used with several versions of RC6 algorithms to encrypt various secret texts. Furthermore, these generated keys are also used for encrypting images using the logical XOR operation. The obtained results of NIST tests proved that the generated keys are random and uncorrelated. Moreover, the security of the proposed cryptographic system was proved


2021 ◽  
Vol 11 ◽  
Author(s):  
Emma L. Bradshaw ◽  
Richard M. Ryan ◽  
Michael Noetel ◽  
Alexander K. Saeri ◽  
Peter Slattery ◽  
...  

Promoting the use of contact tracing technology will be an important step in global recovery from the COVID-19 pandemic. Across two studies, we assessed two messaging strategies as motivators of intended contact tracing uptake. In one sample of 1117 Australian adults and one sample of 888 American adults, we examined autonomy-supportive and controlling message framing and the presence or absence of information safety as predictors of intended contact tracing application uptake, using an online randomized 2 × 2 experimental design. The results suggested that the provision of data safety assurances may be key in affecting people’s intentions to use contact tracing technology, an effect we found in both samples regardless of whether messages were framed as autonomy-supportive or controlling. Those in high information safety conditions consistently reported higher intended uptake and more positive perceptions of the application than those in low information safety conditions. In Study 2, we also found that perceptions of government legitimacy related positively to intended application uptake, as did political affiliation. In sum, individuals appeared more willing to assent to authority regarding contact tracing insofar as their data safety can be assured. Yet, public messaging strategies alone may be insufficient to initiate intentions to change behavior, even in these unprecedented circumstances.


Author(s):  
Shamil Khasanovich Gonov ◽  
Anton Vladimirovich Milovanov

The article considers the topical issue of a significant growth of crimes in the field of information technologies most of which are committed in the dark and hidden web. The research object is social relations in the sphere of Internet crime prevention. The research subject is the methods and mechanisms of crimes using information systems, and the technologies of information safety provision and deanonymization. The main task of the research is to develop the scientifically-grounded ideas aimed at the enhancement of the technique of analysis and assessment of crimes committed via information and telecommunication systems. The scientific novelty of the research consists in the fact that the authors systematize, generalize and analyze the standard mechanisms of committing crimes using information technologies. Based on this analysis, the authors formulate suggestions and recommendations. The article considers the main methods and mechanisms of information safety provision (anonymity on the Internet, and some promising technologies of deanonymization which can be used in the process of crime detection and investigation. The authors formulate a basic model of an offender which can be used for a primary profiling of a criminal. They also formulate an approach to the assessment of his potential which takes into account the peculiarities of using computer equipment in criminal activities in information and telecommunication networks.   


Sign in / Sign up

Export Citation Format

Share Document