security information
Recently Published Documents


TOTAL DOCUMENTS

621
(FIVE YEARS 152)

H-INDEX

16
(FIVE YEARS 2)

2021 ◽  
Vol 26 (4) ◽  
pp. 261-268
Author(s):  
Ion Oprişor

Abstract Emerging and disruptive technologies have mostly beneficial effects, determining the progress of society and rising the standard of living. Their integration in the subsequent strategies in the fields of economy, financial, energy, defence and security, information etc. can generate positive effects for the society as a whole. On the other hand, the malicious use of new technologies will amplify the risks and threats that a technological advanced state can project on other states or an alliance. As a result, new technologies bring human development opportunities as well as challenges and security risks. Therefore, the role of the state becomes essential not only from the perspective of supporting technological innovation, but also from that of managing security risks arising from emerging areas. With regard to Romania, our country is aware of the importance of developing emerging and disruptive technologies in all domains of social life, in particular in the sectors of economy and security and defence. To address the malicious use of emerging and disruptive technologies, Romania aims at adopting complex measures based on an inter-institutional approach to enhance national resilience in domains that new technologies can affect the human activity.


2021 ◽  
Vol 2 (11) ◽  
pp. 2158-2169
Author(s):  
Selfi Dayanti ◽  
Ida Bagus Nyoman Udayana ◽  
Bernadetta Diansepti Maharani

Shopee merupakan salah satu marketplace yang sudah familiar di Indonesia. Berdasarkan data persaingan toko online di Indonesia tahun 2019-2020, Shopee berhasil menempati posisi pertama dalam hal jumlah pengunjung. Hal ini disebabkan karena keamanan, kualitas informasi dan kepercayaan pada umumnya dapat menambah ataupun mengurangi niat beli konsumen terhadap suatu produk di aplikasi Shopee. Tujuan dari penelitian ini yaitu untuk mengetahui pengaruh perceived security, information quality, terhadap trust serta dampaknya terhadap online purchase intention, kemudian pengaruh mediasi trust dalam hubungan antara perceived security dan information quality terhadap online purchase intention. Teknik pengambilan sampel yang digunakan dalam penelitian ini adalah dengan teknik accidental purposive sampling. Jumlah sampel yang digunakan yaitu sebanyak 100 responden yang merupakan mahasiswa Universitas Sarjawiyata Tamansiswa. Data yang diperoleh dianalisis menggunakan software SPSS18. Pengujian hipotesis untuk mengetahui pengaruh variabel mediasi menggunakan Sobel test. Hasil penelitian menunjukkan bahwa Variabel Perceived security dan Information quality, berpengaruh signifikan terhadap variabel Trust. Variabel trust mampu menjadi variabel mediasi antara Variabel Perceived security dan Information Quality terhadap variabel Online Purchase Intention.


2021 ◽  
Vol 53 (2) ◽  
Author(s):  
Maria dos Santos Lonsdale ◽  
David J Lonsdale ◽  
Matthew Baxter ◽  
Ryan Graham ◽  
Aya Kanafani ◽  
...  

Terrorism represents one of the most pressing contemporary security threats. As a consequence, governments provide information to the public on threat levels and on how to respond to terror incidents. To effectively reassure the public, and to increase their vigilance, it is essential that the information communicated is accessible, clear, actionable and engaging. This is the first empirical study in the world to explore the impact of information design principles and visualization of information on the communication of security information related to terrorism. Two different but complementary strands were devised: Strand 1 - compared whether more visualized information was more effective than text dense information at communicating to the public; Strand 2 - compared whether a motion graphics was more effective than an infographic at communicating to the public. An initial usability test was conducted to identify existing problems and needs. Several other usability tests and iterations were then conducted to develop new design solutions. Empirical testing was then conducted for final evaluation and validation, collecting quantitative and qualitative data. Results show significant differences between pre- and post-knowledge of the Terror Threat Levels. Results also show significant differences between text dense information and more visualized information. Results further show no significant difference between communicating information via an infographic or motion graphics in situations where information needs to be assimilated as a crescendo (i.e. levels of severity) or as a series of steps to be followed (action in an emergency). This study provides important guidelines on how to effectively communicate security information to the public, with practical implications for security agencies.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Zhihui Wang ◽  
Jinyu Wang

The data mining and big data technologies could be of utmost importance to investigate outbound and case datasets in the police records. New findings and useful information may potentially be obtained through data preprocessing and multidimensional modeling. Public security data is a kind of “big data,” having characteristics like large volume, rapid growth, various structures, large-scale storage, low density, and time sensitiveness. In this paper, a police data warehouse is constructed and a public security information analysis system is proposed. The proposed system comprises two modules: (i) case management and (ii) public security information mining. The former is responsible for the collection and processing of case information. The latter preprocesses the data of major cases that have occurred in the past ten years to create a data warehouse. Then, we use the model to create a data warehouse based on needs. By dividing the measurement values and dimensions, the analysis and prediction of criminals’ characteristics and the case environment realize relationships between them. In the process of mining and processing crime data, data mining algorithms can quickly find out the relevant information in the data. Furthermore, the system can find out relevant trends and laws to detect criminal cases faster than other methods. This can reduce the emergence of new crimes and provide a basis for decision-making in the public security department that has practical significance.


2021 ◽  
Vol 12 ◽  
Author(s):  
Esther Cubo ◽  
Adrian Arnaiz-Rodriguez ◽  
Álvar Arnaiz-González ◽  
José Francisco Díez-Pastor ◽  
Meredith Spindler ◽  
...  

Background: The use of telemedicine has increased to address the ongoing healthcare needs of patients with movement disorders.Objective: We aimed to describe the technical and basic security features of the most popular telemedicine videoconferencing software.Methods: We conducted a systematic review of articles/websites about “Telemedicine,” “Cybersecurity,” and “Videoconferencing software.” Technical capabilities and basic security features were determined for each videoconferencing software.Results: Twenty-six videoconferencing software programs were reviewed, 13 (50.0%) were specifically designed for general healthcare, and 6/26 (23.0%) were compliant with European and US regulations. Overall technical and security information were found in 5/26 software (19.2%), including Microsoft Teams, Google Hangout, Coviu, Doxy.me, and Thera platforms.Conclusions: Detailed information about technical capabilities and data security of videoconferencing tools is not easily and openly retrievable. Our data serves as a guide for practitioners seeking to understand what features should be examined when choosing software and what options are available.


Author(s):  
V. O. BOLILYI ◽  
◽  
L. P. SUKHOVIRSKA ◽  
O. M. LUNHOL ◽  
◽  
...  

This study examines the Security Operations Center, which provides detection and analysis of cybersecurity, rapid response, and prevention of cyber attacks. Security Operations Center technologies are used to provide visibility and enable analysts to protect against attacks. The algorithm of presenting the topic «Security Center» during the teaching of the discipline «Security of programs and data» at the Volodymyr Vynnychenko Central Ukrainian State Pedagogical University is shown, namely the problems of implementation of event monitoring systems «Security information and event management», types of operational centers, methods of building internal operational security centers. Subject competencies are formed in students: to classify, identify and protect information processing facilities from unauthorized access and computer viruses, to develop individual access control and information protection systems. The process of implementing Security information and event management systems at the enterprise is shown, the main mechanisms of this system using a hierarchical model, the main tasks of the security operational center, the key parameters of the Security Operations Center (organizational model, performance of functions that go beyond the tasks, level of authority), basic rules of correlation. The commercial security operations center SOC as a Service is considered, which is designed to help work with a huge amount of information, real-time monitoring and response to attacks. During the laboratory classes, the students analyzed the companies that provide security operations center services (Information Systems Security Partners, Octave Cybersecurity, Infopulse, Omega Security Service) and studied the factors that affect companies when choosing the type Security Operations Center. Key words: Security Operations Center, SEIM-systems, cybersecurity, SOC as a Service.


Author(s):  
Wurod Qasim Mohamed ◽  
Marwa Al–Sultani ◽  
Haraa Raheem Hatem

The modern technologies of the image transmission look for ultra-reducing of the error transmission in addition to enhancing the security over a wireless communication channel. This paper is applied and discussed two different techniques to achieve these requirements, which are linear block code (LBC) and two-dimensions (2-D) interleaving approach. We investigate a new approach of 2-D interleaving that increases the security of the image transmission and helps to diminution the bit error probability (BER). Using an investigated 2-D interleaving grouping LBC approach on image transmission, the system achieves a higher-security information and a better BER comparing with the other systems. It was done by means of peak signal to noise ratio (PSNR) and histogram analysis tests. Simulation results state these enhancements.


Sign in / Sign up

Export Citation Format

Share Document