47,091 Hits in 6.3 sec

Application Level Security in a Public Library: A Case Study

Richard Thomchick, Tonia San Nicolas-Rocca
2018 Information Technology and Libraries  
Libraries have historically made great efforts to ensure the confidentiality of patron personally identifiable information (PII), but the rapid, widespread adoption of information technology and the internet  ...  Hypertext Transport Protocol Secure (HTTPS) is a form of Hypertext Transport Protocol (HTTP) that enables secure communication over the public internet and provides a deterministic way to guarantee data  ...  the application, and assess the potential privacy risks to the library's patrons.  ... 
doi:10.6017/ital.v37i4.10405 fatcat:ppfcwpcymfapzdgmqbsyklh64m

Bluetooth Hacking: A Case Study

Dennis Browning, Gary Kessler
2009 Journal of Digital Forensics, Security and Law  
Unfortunately, this has brought along some critical security vulnerabilities that put digital documents at risk.  ...  Journal of Digital Security, Forensics & Law.  ...  Subscription Information The Proceedings of the Conference on Digital Forensics, Security and Law is a publication of the Association of Digital Forensics, Security and Law (ADFSL).  ... 
doi:10.15394/jdfsl.2009.1058 fatcat:cm7mvnadpzdthhitft5boixn5i

Smart Factory Security: A Case Study on a Modular Smart Manufacturing System

Federico Maggi, Marco Balduzzi, Rainer Vosseler, Martin Rösler, Walter Quadrini, Giacomo Tavola, Marcello Pogliani, Davide Quarta, Stefano Zanero
2021 Procedia Computer Science  
With the goal of raising cybersecurity awareness, in this paper we describe a practical case study showing attack scenarios that we have validated on a real modular smart manufacturing system, and suggest  ...  With the goal of raising cybersecurity awareness, in this paper we describe a practical case study showing attack scenarios that we have validated on a real modular smart manufacturing system, and suggest  ...  Figure 3 shows a high-level overview of the possible attacks that we considered in our case study.  ... 
doi:10.1016/j.procs.2021.01.289 fatcat:yzd6rtha5vdc3naojuyyttw4tm

Information security risk management for computerized health information systems in hospitals: a case study of Iran

Javad Zarei, Farahnaz Sadoughi
2016 Risk Management and Healthcare Policy  
But, the major challenge of CHIS use is information security. This study attempts to evaluate CHIS information security risk management at hospitals of Iran.  ...  This problem can cause a large number of challenges for their CHIS security in future.  ...  Acknowledgments This study was part of a PhD dissertation supported by the Iran University of Medical Sciences (grant number IUMS/ SHMIS-1391/489).  ... 
doi:10.2147/rmhp.s99908 pmid:27313481 pmcid:PMC4890691 fatcat:g5jk7eecdbh3lnkmdgtsxdorrq

Examining the relationship between security metrics and user ratings of mobile apps: a case study

Daniel E. Krutz, Nuthan Munaiah, Andrew Meneely, Samuel A. Malachowsky
2016 Proceedings of the International Workshop on App Market Analytics - WAMA 2016  
At the same time apps must also be secure, but is there a historical trade-off between security and ratings? Or are app store ratings a more all-encompassing measure of product maturity?  ...  This result supports the conventional wisdom that users are not factoring security risks into their ratings in a meaningful way.  ...  We statically analyzed 38,466 Android apps using APKParser for permission usage information, Stowaway for under-and overpermission information, and Androrisk for a generic security risk assessment.  ... 
doi:10.1145/2993259.2993260 dblp:conf/sigsoft/KrutzMMM16 fatcat:cjgtwkxyirb7lmig75l7yebope

Developing a Risk Analysis Strategy Framework for Impact Assessment in Information Security Management Systems: A Case Study in IT Consulting Industry

Fotis Kitsios, Elpiniki Chatzidimitriou, Maria Kamariotou
2022 Sustainability  
The purpose of this paper was to develop a risk assessment framework that a company followed in the information technology sector to conduct the risk assessment process to comply with International Organization  ...  It explains the risk assessment process and the management of the necessary configurations so that its functions are acceptable and in line with information security standards.  ...  Informed Consent Statement: Not applicable.  ... 
doi:10.3390/su14031269 fatcat:3xhvsl2dlves5ktoapp2xnb36m

Side-Channel Analysis of SM2

Nicola Tuveri, Sohaib ul Hassan, Cesar Pereida Garcia, Billy Bob Brumley
2018 Proceedings of the 34th Annual Computer Security Applications Conference on - ACSAC '18  
We perform a security review of this implementation, uncovering various deficiencies ranging from traditional software quality issues to side-channel risks.  ...  To assess the latter, we carry out a side-channel security evaluation and discover that the implementation hits every pitfall seen for OpenSSL's ECDSA code in the past decade.  ...  The third author was supported in part by a Nokia Foundation Scholarship and by the Pekka Ahonen Fund through the Industrial Research Fund of Tampere University of Technology.  ... 
doi:10.1145/3274694.3274725 dblp:conf/acsac/TuveriHGB18 fatcat:vztueekdx5ctjiqtfvcoyikcji

Analysis of Security Criteria for IoT-Based Supply Chain: A Case Study of FMCG Industries

Hamed Nozari, Mohammad Fallah, Agnieszka Szmelter-Jarosz, Maciej Krzemiński
2021 Central European Management Journal  
Research limitations: Limitations of this study are the purposive sampling method and the limited scope of studied companies and sectors.  ...  Purpose: In supply chains, creating a secure space for data production, sending, storing, and analysis has always been a critical issue.  ...  The Internet of Things The term "Internet of Things" (IoT) was coined in the late 1990s by Kevin Ashton, the cofounder of Auto-ID Center at the Massachusetts Institute of Technology in order to examine  ... 
doi:10.7206/cemj.2658-0845.63 fatcat:dtaztyoxxvbppm3wob52tovrt4

Embedded RFID and Everyday Things: A Case Study of the Security and Privacy Risks of the U.S. e-Passport

Marci Meingast, Jennifer King, Deirdre Mulligan
2007 2007 IEEE International Conference on RFID  
Government's adoption process for the electronic passport as a case study for identifying the privacy and security risks that arise by embedding RFID technology in "everyday things."  ...  We discuss the reasons why the Department of State did not adequately identify and address these privacy and security risks, even after the government's process mandated a privacy impact assessment.  ...  Department of State as a case study to illustrate how to address the privacy and security risks to users stemming from the inclusion of embedded RF transponders.  ... 
doi:10.1109/rfid.2007.346143 fatcat:igevwtntffcrlhyaajlfbxdqqm

Factors affecting user experience with security features: A case study of an academic institution in Namibia

Fungai Bhunu Shava, Darelle Van Greunen
2013 2013 Information Security for South Africa  
In order to effectively secure information, the fields of Usable security and User experience should be integrated in the design and use of security features.  ...  Human behaviour and attitudes towards security features determine the user experience during the implementation of Information Security.  ...  Based on the findings it is necessary to develop a framework for secure user experiences.  ... 
doi:10.1109/issa.2013.6641061 dblp:conf/issa/ShavaG13 fatcat:5j7isn2a4zg67cnmh4yr2qhdnu

A Survey on the Management of Electronic Records: A Case Study of Djibouti National Social Security Fund Main Branch

Nimaleh Abdi Kabel, Zhou Jin Yuan
2021 Zenodo  
The effect of information and communication technology (ICT) adoption on the service management performance (SMP) of the National Social Security Fund of Djibouti (NSSF) was studied.  ...  The potential role of electronic records management adoption (ERMA) as a mediator was also investigated.  ...  Acknowledgements This work was supported by new technical Information consultation of hospital (No. 20200057).  ... 
doi:10.5281/zenodo.5266532 fatcat:yyqvvivkpfgh3fcnuhwtgj2ucm

Model-Based Real-Time Evaluation of Security Patterns: A SCADA System Case Study [chapter]

Anas Motii, Agnès Lanusse, Brahim Hamid, Jean-Michel Bruel
2016 Lecture Notes in Computer Science  
In this paper, the approach is illustrated on a SCADA (Supervisory Control and Data Acquisition) system case study and a tool chain based on Papyrus UML supports the approach.  ...  It exploits two views of security countermeasures patterns: abstract and concrete. The abstract view is used to select relevant solutions to security requirements on a logical point of view.  ...  This work is conducted in the context of a Ph.D. thesis funded by CEA LIST and co-leaded by CEA (LISE) and IRIT (MACAO).  ... 
doi:10.1007/978-3-319-45480-1_30 fatcat:oafwi5t2efedtfej76rreb3egy

Conceptualizing a New Domain Using Topic Modeling and Concept Mapping: A Case Study of Managed Security Services for Small Businesses

Michael Weiss, Steven Muegge
2019 Technology Innovation Management Review  
A body of formally represented knowledge is based on a conceptualization: the objects, concepts, and other entities that are assumed to exist in some area of interest and the relationships that hold among  ...  ., Setiawan, A., & Mintarsih, F. 2017. IT Security governance evaluation with use of COBIT 5 framework: A case study on UIN Syarif Hidayatullah Library Information System.  ...  As a case study, the paper reviews the recent literature in the intersection of managed security services and small businesses.  ... 
doi:10.22215/timreview/1261 fatcat:4oappvqnivdq7lac2tay2g2hxu

Confidante: Usable Encrypted Email: A Case Study with Lawyers and Journalists

Ada Lerner, Eric Zeng, Franziska Roesner
2017 2017 IEEE European Symposium on Security and Privacy (EuroS&P)  
We conduct a user study with 15 people (8 U.S. lawyers and 7 U.S. journalists) to evaluate Confidante's design decisions.  ...  We reflect on our findings -both specifically about Confidante and more generally about the needs and constraints of lawyers and journalists -to identify lessons and remaining security and usability challenges  ...  We thank all members of the UW CSE Security & Privacy Research Lab for feedback on the study, the tool, and earlier versions of the paper, particularly Camille Cobb, Gennie Gebhart, Yoshi Kohno, Kiron  ... 
doi:10.1109/eurosp.2017.41 dblp:conf/eurosp/LernerZR17 fatcat:zpjtvens2fbqddgtsa7ksftece

Digitalization peculiarities of organizations: a case study

Vladimir Lvovich Vasilev, Almaz Rafisovich Gapsalamov, Elvir Munirovich Akhmetshin, Tatyana Nikolaevna Bochkareva, Alexei Valerievich Yumashev, Tatyana Ivanovna Anisimova
2020 Entrepreneurship and Sustainability Issues  
L., Gapsalamov, A. R., Akhmetshin, E. M., Bochkareva, T. N., Yumashev, A. V., Anisimova, T. I. 2020. Digitalization peculiarities of organizations: a case study.  ...  The study revealed a discrepancy in the level of development of the necessary digital competencies between universities and the real sector of the economy.  ...  Acknowledgments The reported study was funded by RFBR,  ... 
doi:10.9770/jesi.2020.7.4(39) fatcat:bo2izhg4yfb4xg7op5vysclxk4
« Previous Showing results 1 — 15 out of 47,091 results