critical information
Recently Published Documents


TOTAL DOCUMENTS

758
(FIVE YEARS 289)

H-INDEX

27
(FIVE YEARS 5)

2021 ◽  
Author(s):  
Georges El Hajal ◽  
Roy Abi Zeid Daou ◽  
Yves Ducq ◽  
Josef Boercsoek

Security in systems and networks has always been a major issue for IT administrators. When it comes to medical applications, this concern is much more important due to the sensitivity of data and the risks that may be caused due to alteration or falsification of such critical information. The proposed paper presents a solution to assure the best security possible in such an environment. Thus, based on an application that monitors a driver’s health while driving his car, a data diode will be implemented in order to assure security of the system by forcing unidirectional flow of network data to the healthcare provider side. Added to that, an AI-based program will be developed to verify the confidentiality, the integrity and the availability of the exchanged data and to check the patient health for abnormalities. Every sub-part of the system has been tested separately and results have shown that falsified data has been filtered out of the received end, e.g. the healthcare provider side.


2021 ◽  
Author(s):  
Akash Gajanan Prabhune ◽  
Aishwarya Mallawaram ◽  
Sachin S Bhat ◽  
Samridhi Pandey ◽  
Ashitha Reddy ◽  
...  

Abstract Background: The objective of this paper was to evaluate the COVID-19 vaccine registration website across UN-recognized member states for their portal quality, reliability, Ease Use and help to the general population in informed decision making.Methods: 12 UN member states (Countries) were selected based on the inclusion and exclusion criteria mentioned in the methodology section of this paper. PPS technique was used for sampling and selection of 12 countries from 193 UN member states. Post selection of UN member states the study used 2 step evaluation techniques, Step 1 The DISCERN checklist consists of 16 questions in three sections and is aimed to assess the reliability of information and quality of information; Step 2 The QUEST tool consists of 6 items with a subitem, Authorship, Attribution, Conflict of Interest, Complementarity, Currency, Tone. The authors developed a standard set of instructions for evaluating Vaccination Portals to bring uniformity in understanding and context setting.Results: DISCERN tool overall reliability score on the Likert scale of 0 to 5 was 4 (SD ± 1.28). On Quality of information regarding treatment choices, the average score was 3.4 (SD ± 1.67). The QUEST tool on ease of use, concision, and comprehensiveness demonstrated an average score of 18.1 (SD ± 8.3) out of 28.The vaccine registration portal of the Czech Republic was found to be most informative and was able to provide a piece of scientifically valid information on safety, efficacy, long-term short effects, choice of vaccine with attributable authors details. India, Bangladesh, Nigeria, South Africa scored relatively low to missing critical information on the website. The United Arab Emirates, Republic of South Korea, Indonesia, Australia, and Argentina had minor elements missing.Conclusions: COVID-19 vaccination portals vary in the quality of information, and many were found unable to provide critical information for decision making on getting vaccinated.


2021 ◽  
pp. 121-128
Author(s):  
S. CIAPA

The article considers the legal and organizational aspects of ensuring the protection of the critical information infrastructure from cyberattacks. Attention is drawn to the positive experience of the United States in ensuring the resilience of the objects of critical infrastructure. The provisions of the new Cyber Security Strategy of Ukraine are analyzed, one of the priorities of which is to improve the regulatory framework for cyber security of critical information infrastructure. The shortcomings of the previous Cyber Security Strategy of Ukraine (2016) are noted. Contains a detailed analysis of legislation and initiatives on providing cybersecurity. General requirements for cyber protection of critical infrastructure objects are considered. Based on the analysis of the current legislation on cyber security of Ukraine, ways to improve the legal and organizational support for the protection of the critical information infrastructure from cyber attacks are proposed.


Bosniaca ◽  
2021 ◽  
Vol 26 (26) ◽  
pp. 9-27
Author(s):  
Anita Katulić ◽  
Ana Barbarić

Cilj rada je prikazati ulogu pismenosti iz privatnosti kao relativno novog koncepta u prevladavanju digitalnog jaza, povezati prevladavanje digitalnog jaza s ulogom knjižnica u postizanju više razine kritičke informacijske pismenosti, te smjestiti digitalnu uključenost i pismenost iz privatnosti u širi teorijski okvir. U tu svrhu u radu se istražuju ishodišni pojmovi društvene isključenosti i društvene uključenosti, digitalne podjele i digitalne uključenosti. Zatim, razmatra se uloga kritičke informacijske pismenosti u informacijskom društvu i tzv. “društvu platformi” te se naznačuje uloga knjižnica u opismenjavanju iz područja privatnosti s ciljem smanjenja digitalnog jaza i povećanja digitalne uključenosti. Digitalni jaz jedna je od najvećih prepreka društvu znanja, a isključenost iz informacijskog društva predstavlja problem svjetskih razmjera. U radu se objasnilo kako su knjižnice prikladna mjesta za borbu protiv društvene izoliranosti te imaju važnu ulogu u jačanju društvene kohezije. Također se prikazalo kako su ljudi s nižim razinama obrazovanja, kao i oni s nižim primanjima, više izloženi riziku digitalne isključenosti, a pomoć u izlazu iz takvog problema može se naći u opismenjavanju iz područja privatnosti. = The aim of this paper is to present the role of privacy literacy as a relatively new concept in bridging the digital divide, to link the bridging of the digital divide with the role of libraries in achieving a higher level of critical information literacy, and to place digital inclusion and privacy literacy in a broader theoretical framework. For this purpose, the paper researches the basic concepts of social exclusion and social inclusion, digital divide and digital inclusion. Furthermore, the role of critical information literacy in the information society and the so-called platform society is taken into consideration; and the role of libraries in privacy literacy is indicated, with the aim of reducing the digital divide and increasing digital inclusion. The digital divide is one of the biggest obstacles to the knowledge society, and exclusion from the information society is a global problem. The paper explains that libraries are suitable places to combat social isolation and that they play an important role in strengthening social cohesion. It has also been shown that people with lower levels of education, as well as those with lower incomes, are more at risk of digital exclusion, while help in getting out of such a problem can be found in privacy literacy.


2021 ◽  
Vol 66 ◽  
pp. 129-134
Author(s):  
M.V. Baran

The article in the context of methodologies of systematic analysis of legal phenomena reveals the content of the principles of legal regulation of the institute of information security. It is noted that information security is defined as the impossibility of causing harm by means of a security object, due to information and information structure. Principles play an important role in the legal provision of information security. The basic principles of legal regulation of the information sphere are enshrined in the Laws "On Information", "On the Basic Principles of Cyber Security of Ukraine", most of which are key to the development of legal regulation of information security processes. In order to improve the information security system from various challenges and threats, it is proposed to enshrine in information legislation the principle of presumption of security of critical information infrastructure, which establishes that critical information infrastructure is considered protected as long as the organizational and legal security of these facilities requirements set forth in regulations in the field of information security. It is stated that a wide range of problems of information security of the individual, society and state, development of cybersecurity culture, ensuring privacy and protection of access rights, protection of information systems, resources and networks, expanding the use of information technology in public administration, other information problems security needs careful study. The principles of legal regulation in the field of information security are revealed through normative detail. It is emphasized that with the development of scientific and technological progress and the latest forms of processing and use of information, the principles of regulation in the field of information security need to be correlated at the level of regulatory support.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Paul Lyons ◽  
Randall Bandura ◽  
Kenneth J. Levitt

Purpose This essay is practitioner-focused and aims to provide the manager or supervisor with a summary of critical information regarding voluntary, employee helpful behavior or organizational citizenship behavior (OCB). The summary helps explain motivation and predispositions per OCB, as well as explicit advice regarding ways to encourage and, perhaps, recognize this desired behavior. Design/methodology/approach Methodology is grounded on two elements. First, a literature review of empirical and other research on OCB, pro-social behavior, extra-role behavior, and contextual performance. Second, based on review and brief analysis of features of the behavior to include: definitions, motivation/predispositions, and employee performance, explicit guidance is offered for managers. Findings Critical information is provided about OCB and voluntary helpful behavior. The objective is to identify important aspects of the behavior and place it in a format that is accessible to the typical manager or supervisor. This approach can assist the manager to create appropriate means to identify the desired behavior as well as to encourage it. Practical implications Virtually all of the empirical research on OCB and other forms of voluntary helpful behavior make the case that such behavior is most desirable for the organization, manager, and co-workers. The research also points out that not all employees who engage in the behavior have expectations of recognition or any form of reward for their actions. This essay gives the practitioner information regarding observation of the behavior and its motivation. In addition, advice is provided to assist in stimulating the desired behavior. Originality/value Currently, nearly all of the expressions of OCB and voluntary helpful employee behavior are found in academic journals and related literature. Typically, these sources of information are not readily available to practicing managers. This condition is what prompts an essay aimed at practitioners that captures the essential aspects of the voluntary, desirable employee behavior as well as practical advice.


Sign in / Sign up

Export Citation Format

Share Document