secure environment
Recently Published Documents


TOTAL DOCUMENTS

261
(FIVE YEARS 121)

H-INDEX

10
(FIVE YEARS 2)

Author(s):  
Paola Cardinali ◽  
Joseph R. Ferrari ◽  
Vittoria Romoli ◽  
Andrew Camilleri ◽  
Laura Migliorini

AbstractWe assessed the sense of psychological home among adult men (n = 17; M age = 29.7 years old) who had experienced migration to Italy, focusing on the relationship between psychological home and the process of integration into the new country. Psychological home is a dynamic process in which people sense a safe and secure environment that ranges beyond the confines of a structured dwelling, a process which is reflective and which communicates one’s self-identity. Participants engaged in a semistructured interview with the aim of establishing a generic concept of psychological home and identifying the issues that arise at the intersection of psychological home and migration. The results highlighted certain themes about the meaning that psychological home assumes in the lives of migrants and about the way in which the migration experience acts to support or hinder the process of building this sense of home. Of special interest is the idea that individuals might develop multiple psychological homes related to the different places and relationships that they experience. In this sense, establishment of a psychological home might be considered the ideal affective state for psychological adaptation to a new country.


2022 ◽  
pp. 587-610
Author(s):  
Kathick Raj Elangovan

In recent times, cyber-attacks have been a significant problem in any organization. It can damage the brand name if confidential data is compromised. A robust cybersecurity framework should be an essential aspect of any organization. This chapter talks about the security framework for cyber threats in supply chain management and discusses in detail the implementation of a secure environment through various controls. Today, a systematic method is used for handling sensitive information in an organization. It includes processes, people, and IT systems by implementing a risk management method. Distinct controls dedicated to different levels of domains, namely human resources, access control, asset management, cryptography, physical security, operations security, supplier relations, acquisition, incident management, and security governance are provided. Companies, contractors, and any others who are part of the supply chain organization must follow this security framework to defend from any cyber-attacks.


2022 ◽  
pp. 81-100
Keyword(s):  

The most popular justification for surveillance has been providing security to the ones being watched. Most institutions and people who are involved in the process of surveillance have argued that having the information about the narratives allows the watcher to create a more secure environment. This argument allows the watcher to institute different methods of watching for the different contexts of surveillance showing that all the watching eventually makes the ecosystem more secure.


Author(s):  
Satishkumar Chittaliya

Abstract: The car's chassis is also called a structure that locates and mounts all the vehicle's components. It also creates a secure environment for the occupants. The chassis will provide torsional and flexural rigidity to the vehicle that makes the chassis one of the most crucial elements of the vehicle. Therefore, the front impact, rear impact, side impact, front torsional, rear torsional, vertical bending, lateral bending analyses were performed. The contribution of chassis is not limited to supporting the vehicle’s component, but it extends to providing better performance and aesthetics. Therefore, the design of the car chassis must be done accordingly. The current paper deals with the study of the design and analysis of the race car. The deformation, stress, and Factor of safety were considered as the evaluation parameters which were obtained by Finite Element Analysis (FEA) in Ansys software. To design the chassis, the SolidWorks software was utilized. Keywords: Car Chassis, Design, FEA, Material Comparison.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Farah Tawfiq Abdul Hussien ◽  
Abdul Monem S. Rahma ◽  
Hala Bahjat Abdul Wahab

Providing security for transmitted data through the e-commerce environment requires using a fast and high secure encryption algorithm. Balancing between the speed and the security degree is a problem that many of the encryption algorithms suffer from. Increasing the security degree requires increasing the level of complexity which results in increasing encryption time. On the other hand, increasing the algorithm speed may reduce the complexity degree which affects the security level. This paper aims to design an encryption algorithm that balances time and complexity (speed and security). This is done by suggesting a security environment that depends on creating and providing an agent software to be settled into each customer device that manages the purchase and security process without customer interference. The suggested encryption algorithm is applied within this environment. Several modifications are performed on the AES encryption algorithm. The AES was chosen due to its performance (security and speed), which makes it suitable for encrypting transmitted data over the Internet. These modifications involve adding preprocessing steps (padding and zigzag), eliminating Sub Byte step, and reducing the number of rounds. The experimental results showed that the suggested algorithm provides more security and speed in the encryption and decryption process. The randomness degree has increased by 29.5%. The efficiency is increased because the encryption and decryption times are reduced, as is the CPU usage. The throughput for the suggested algorithm is increased by 10% for the encryption process and is increased by 9.3% for the decryption process.


2021 ◽  
Author(s):  
Te-Shun Chou ◽  
Nicholas Hempenius ◽  
Lee Toderick ◽  
Briwu Yang
Keyword(s):  

2021 ◽  
Vol 31 (1) ◽  
pp. 55-69
Author(s):  
Dimah H. Alahmadi ◽  
Fatmah Abdulrahman Baothman ◽  
Mona M. Alrajhi ◽  
Fatimah S. Alshahrani ◽  
Hawazin Z. Albalawi

Abstract Blockchain is one of the technologies that can support digital transformation in industries in many aspects. This sophisticated technology can provide a decentralized, transparent, and secure environment for organizations and businesses. This review article discusses the adoption of blockchain in the ports and shipping industry to support digital transformation. It also explores the integration of this technology into the current ports and shipping ecosystem. Besides, the study highlighted the situation of the supply chains management in ports and shipping domain as a case study in this field. The investigated studies show that blockchain can be integrated into processes such as financial and document workflow. This review contributes to research by focusing on the adoption of blockchain in the ports and shipping industry to support digital transformation. It also aims to understand the existing port practice and map it with current tendencies based on blockchain. This study gives insight analysis to incorporate blockchain technology into ports and shipping processes globally.


Viruses ◽  
2021 ◽  
Vol 13 (11) ◽  
pp. 2329
Author(s):  
Constant Gillot ◽  
Julien Favresse ◽  
Vincent Maloteau ◽  
Jean-Michel Dogné ◽  
Jonathan Douxfils

Neutralising antibodies (NAbs) represent the real source of protection against SARS-CoV-2 infections by preventing the virus from entering target cells. The gold standard in the detection of these antibodies is the plaque reduction neutralization test (PRNT). As these experiments must be done in a very secure environment, other techniques based on pseudoviruses: pseudovirus neutralization test (pVNT) or surrogate virus neutralization test (sVNT) have been developed. Binding assays, on the other hand, measure total antibodies or IgG, IgM, and IgA directed against one epitope of the SARS-CoV-2, independently of their neutralizing capacity. The aim of this study is to compare the performance of six commercial binding assays to the pVNT and sVNT. In this study, we used blood samples from a cohort of 62 RT-PCR confirmed COVID-19 patients. Based on the results of the neutralizing assays, adapted cut-offs for the binding assays were calculated. The use of these adapted cut-offs does not permit to improve the accuracy of the serological assays and we did not find an adapted cut-off able to improve the capacity of these tests to detect NAbs. For a part of the population, a longitudinal follow-up with at least two samples for the same patient was performed. From day 14 to day 291, more than 75% of the samples were positive for NAbs (n = 87/110, 79.1%). Interestingly, 6 months post symptoms onset, the majority of the samples (N = 44/52, 84.6%) were still positive for NAbs. This is in sharp contrast with the results we obtained 6 months post-vaccination in our cohort of healthcare workers who have received the two-dose regimens of BNT162b2. In this cohort of vaccinated subjects, 43% (n = 25/58) of the participants no longer exhibit NAbs activity 180 days after the administration of the first dose of BNT162b2.


Sensors ◽  
2021 ◽  
Vol 21 (21) ◽  
pp. 7363
Author(s):  
Kamran Ahmad Awan ◽  
Ikram Ud Din ◽  
Ahmad Almogren ◽  
Byung-Seo Kim ◽  
Ayman Altameem

Vehicular Ad hoc Network (VANET) is a modern concept that enables network nodes to communicate and disseminate information. VANET is a heterogeneous network, due to which the VANET environment exposes to have various security and privacy challenges. In the future, the automobile industry will progress towards assembling electric vehicles containing energy storage batteries employing these resources to travel as an alternative to gasoline/petroleum. These vehicles may have the capability to share their energy resources upon the request of vehicles having limited energy resources. In this article, we have proposed a trust management-based secure energy sharing mechanism, named vTrust, which computes the trust degree of nodes to authenticate nodes. The proposed mechanism is a multi-leveled centralized approach utilizing both the infrastructure and vehicles to sustain a secure environment. The proposed vTrust can aggregate and propagate the degree of trust to enhance scalability. The node that requests to obtain the energy resources may have to maintain a specified level of trust threshold for earning resources. We have also evaluated the performance of the proposed mechanism against several existing approaches and determine that the proposed mechanism can efficiently manage a secure environment during resource sharing by maintaining average malicious nodes detection of 91.3% and average successful energy sharing rate of 89.5%, which is significantly higher in comparison to the existing approaches.


Healthcare ◽  
2021 ◽  
Vol 9 (11) ◽  
pp. 1491
Author(s):  
Ahmed S. Alanazi ◽  
Heather Wharrad ◽  
Fiona Moffatt ◽  
Michael Taylor ◽  
Muhammad Ladan

All face-to-face studies were affected by the COVID-19 pandemic, as they could not be run in person due to rules and guidance linked to social distancing which were in force during the outbreak. Finding and testing an available COVID-secure approach for both participants and researchers was important as was the need to continue conducting such studies during this critical time. At present, the extant literature indicates a clear gap in research that elucidates how to carry out a Q methodology study online, step by step. This paper describes an option for online Q methodology using an approach that simulates all of the steps performed in a face-to-face setting using an open-source software known as Easy-HtmlQ. Using a case study in telemedicine adoption as illustration, this paper also considers the perspective of both research participants and Q methodology researchers via semi-structured interviews. Using Easy-HtmlQ V1.1 in online Q methodology studies appears to be an affordable, practical and user-friendly solution. Some of the benefits associated with running Q methodology studies online were the decreased costs, enabling the recruitment of wider number of participants, providing a COVID-19-secure environment and offering convenience to both participants and researchers during the research process. The findings of this study may contribute to increasing the number of online Q methodology studies in the future, as it has succeeded in offering a feasible approach for Q methodology researchers.


Sign in / Sign up

Export Citation Format

Share Document