security research
Recently Published Documents


TOTAL DOCUMENTS

683
(FIVE YEARS 202)

H-INDEX

22
(FIVE YEARS 5)

2022 ◽  
Vol 29 (1) ◽  
pp. 1-39
Author(s):  
Jessica N. Rocheleau ◽  
Sonia Chiasson

Autistic teenagers are suspected to be more vulnerable to privacy and safety threats on social networking sites (SNS) than the general population. However, there are no studies comparing these users’ privacy and safety concerns and protective strategies online with those reported by non-autistic teenagers. Furthermore, researchers have yet to identify possible explanations for autistic teenagers’ increased risk of online harms. To address these research gaps, we conducted semi-structured interviews with 12 autistic and 16 non-autistic teenagers assessing their privacy- and safety-related attitudes and behaviors on SNS, and factors affecting them. We used videos demonstrating relevant SNS scenarios as prompts to engage participants in conversation. Through our thematic analyses, we found evidence that autistic teenagers may be more averse to taking risks on SNS than non-autistic teenagers. Yet, several personal, social, and SNS design factors may make autistic teenagers more vulnerable to cyberbullying and social exclusion online. We provide recommendations for making SNS safer for autistic teenagers. Our research highlights the need for more inclusive usable privacy and security research with this population.


2022 ◽  
Vol 147 ◽  
pp. 105617
Author(s):  
Xiaoqing Gou ◽  
Hui Liu ◽  
Yujie Qiang ◽  
Zhihui Lang ◽  
Haining Wang ◽  
...  

2022 ◽  
Vol 17 (1) ◽  
pp. 182-195
Author(s):  
Mangirdas Morkunas ◽  
◽  
Agnė Žičkienė ◽  
Tomas Baležentis ◽  
Artiom Volkov ◽  
...  

Research on economic resilience in agriculture is quite complicated due to the interdisciplinary nature of the notion. In agricultural, climate change, sustainability and food security research it appears as an endogenous phenomenon rather as the main one. This study aims to contribute to conceptualization of economic resilience in agriculture, revealing current and identifying future research directions. Bibliometric analysis supplemented with a literature overview serve this purpose. Results confirm the ambiguity and immaturity of economic resilience concept and its secondary position within overall agricultural resilience research framework.


2022 ◽  
Vol 19 (3) ◽  
pp. 2896-2912
Author(s):  
Jiang Zhao ◽  
◽  
Dan Wu ◽  
◽  

<abstract> <p>The industrial internet depends on the development of cloud computing, artificial intelligence, and big data analysis. Intelligent fusion is dependent on the architecture and security features of the industrial internet. Firstly, the paper studies the infrastructure mode that needs to be solved urgently in the industrial internet and provides a possible infrastructure mode and related security evaluation system. Secondly, it analyses the digital transformation process with the case of G.E.os industrial nternet development practice. It clarifies that G.E. is forming a new value closed-loop through digital and strategy mixed channels. Thirdly, industrial internet security research is described within multiple viewpoints based on industrial internet applications, the security service and security assurance defense systemos architecture, and the non-user entrance probability model. Finally, the paper illustrates the changes in knowledge workflow and social collaboration caused by the industrial internet under intelligent manufacture.</p> </abstract>


2021 ◽  
Vol 28 (6) ◽  
pp. 1-50
Author(s):  
Verena Distler ◽  
Matthias Fassl ◽  
Hana Habib ◽  
Katharina Krombholz ◽  
Gabriele Lenzini ◽  
...  

Usable privacy and security researchers have developed a variety of approaches to represent risk to research participants. To understand how these approaches are used and when each might be most appropriate, we conducted a systematic literature review of methods used in security and privacy studies with human participants. From a sample of 633 papers published at five top conferences between 2014 and 2018 that included keywords related to both security/privacy and usability, we systematically selected and analyzed 284 full-length papers that included human subjects studies. Our analysis focused on study methods; risk representation; the use of prototypes, scenarios, and educational intervention; the use of deception to simulate risk; and types of participants. We discuss benefits and shortcomings of the methods, and identify key methodological, ethical, and research challenges when representing and assessing security and privacy risk. We also provide guidelines for the reporting of user studies in security and privacy.


Author(s):  
Serhii Cherniavskyi ◽  
Oleksandr Dzhuzha ◽  
Viktoria Babanina ◽  
Yuriy Harust

The relevance of the study: The relevance of this article is due to the fact that ensuring economic security is a guarantee of stable growth of the state and improving the welfare of the population. The purpose of the study: The purpose of the article is to conduct research on the legal basis for the functioning of economic security of the state and the activities of law enforcement agencies in the field of economic security. Research methods: Leading research methods are general scientific and special research methods, including methods of logic, analysis, comparison, etc. The results of the study: The results of this study are a comparative legal analysis and determination of a proposal to implement the positive experience of EU countries in the field of ensuring the economic security of Ukraine. Practical significance of the study: The significance of the obtained results is reflected in the fact that this study can serve as a basis for outlining future changes to the current legislation of Ukraine on effective economic security of Ukraine


Mathematics ◽  
2021 ◽  
Vol 9 (24) ◽  
pp. 3258
Author(s):  
María del Carmen Valls Valls Martínez ◽  
José Manuel Santos-Jaén ◽  
Fahim-ul Amin ◽  
Pedro Antonio Martín-Cervantes

Pension systems are one of the fundamental pillars of the welfare state. The ageing of the population caused by longer life expectancy and low birth rates has led to a crisis in the public pension system in developed countries. Changes for the system’s sustainability are necessary, and the scientific literature on the subject is abundant, especially in recent years. This article aims to carry out a bibliometric analysis of the research carried out to date, highlighting, in turn, future lines of research. The study was carried out on a total of 1287 articles published from 1936 to 2021 and found in the Scopus database. The SciMAT, VOSviewer, and Datawrapper tools were used to analyse the most important articles, authors, countries, and institutions by volume of production and citations, as well as the relationships between them. Likewise, the most important keywords and their evolution over time were highlighted, obtaining the main focus of the research. In addition to the general analysis, a specific study was carried out in the area of Mathematics. The results show that the leading countries are the United Kingdom, the USA, and the Netherlands. On the other hand, the lead subject area in which these articles have been published is Economics, Econometrics, and Finance. The research trends are sustainability, pension reform related to ageing, and pension insurance.


Symmetry ◽  
2021 ◽  
Vol 13 (12) ◽  
pp. 2355
Author(s):  
Juan Lin ◽  
Chin-Chen Chang ◽  
Ji-Hwei Horng

Hiding secret data in digital images is an attractive topic in the information security research area. Because the data-embedded stego image looks exactly the same as a regular image, transmitting secret data with stego images does not draw the attention of eavesdroppers, thus fulfilling the goal of information security. Many reversible data hiding (RDH) methods for absolute moment block truncation coding (AMBTC) compressed images have been proposed. These methods hide secret data in an AMBTC-compressed image to produce a stego image and transmit it to the recipient. Upon receiving the stego image, the recipient can extract the secret data and recover the AMBTC-compressed image. In this paper, we propose an RDH scheme for AMBTC-compressed images with an asymmetric embedding rule. Using the AMBTC-compressed version as the basis, the proposed embedding scheme always modifies a pixel value toward its original value with a step size (bitrate) proportional to the gap width. Therefore, the visual quality of the stego image is better than the referred AMBTC version. Additionally, as a result of the adaptive bitrate strategy, the data embedding capacity of the proposed scheme outperforms that of state-of-the-art methods. The security of the resulting stego images was also tested by RS-steganalysis. Experimental results show that the overall performance of the proposed scheme is satisfactory. We revised it, please confirm.


Sign in / Sign up

Export Citation Format

Share Document