A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Application Level Security in a Public Library: A Case Study
2018
Information Technology and Libraries
Libraries have historically made great efforts to ensure the confidentiality of patron personally identifiable information (PII), but the rapid, widespread adoption of information technology and the internet ...
Hypertext Transport Protocol Secure (HTTPS) is a form of Hypertext Transport Protocol (HTTP) that enables secure communication over the public internet and provides a deterministic way to guarantee data ...
the application, and assess the potential privacy risks to the library's patrons. ...
doi:10.6017/ital.v37i4.10405
fatcat:ppfcwpcymfapzdgmqbsyklh64m
Bluetooth Hacking: A Case Study
2009
Journal of Digital Forensics, Security and Law
Unfortunately, this has brought along some critical security vulnerabilities that put digital documents at risk. ...
Journal of Digital Security, Forensics & Law. ...
Subscription Information The Proceedings of the Conference on Digital Forensics, Security and Law is a publication of the Association of Digital Forensics, Security and Law (ADFSL). ...
doi:10.15394/jdfsl.2009.1058
fatcat:cm7mvnadpzdthhitft5boixn5i
Smart Factory Security: A Case Study on a Modular Smart Manufacturing System
2021
Procedia Computer Science
With the goal of raising cybersecurity awareness, in this paper we describe a practical case study showing attack scenarios that we have validated on a real modular smart manufacturing system, and suggest ...
With the goal of raising cybersecurity awareness, in this paper we describe a practical case study showing attack scenarios that we have validated on a real modular smart manufacturing system, and suggest ...
Figure 3 shows a high-level overview of the possible attacks that we considered in our case study. ...
doi:10.1016/j.procs.2021.01.289
fatcat:yzd6rtha5vdc3naojuyyttw4tm
Information security risk management for computerized health information systems in hospitals: a case study of Iran
2016
Risk Management and Healthcare Policy
But, the major challenge of CHIS use is information security. This study attempts to evaluate CHIS information security risk management at hospitals of Iran. ...
This problem can cause a large number of challenges for their CHIS security in future. ...
Acknowledgments This study was part of a PhD dissertation supported by the Iran University of Medical Sciences (grant number IUMS/ SHMIS-1391/489). ...
doi:10.2147/rmhp.s99908
pmid:27313481
pmcid:PMC4890691
fatcat:g5jk7eecdbh3lnkmdgtsxdorrq
Examining the relationship between security metrics and user ratings of mobile apps: a case study
2016
Proceedings of the International Workshop on App Market Analytics - WAMA 2016
At the same time apps must also be secure, but is there a historical trade-off between security and ratings? Or are app store ratings a more all-encompassing measure of product maturity? ...
This result supports the conventional wisdom that users are not factoring security risks into their ratings in a meaningful way. ...
We statically analyzed 38,466 Android apps using APKParser for permission usage information, Stowaway for under-and overpermission information, and Androrisk for a generic security risk assessment. ...
doi:10.1145/2993259.2993260
dblp:conf/sigsoft/KrutzMMM16
fatcat:cjgtwkxyirb7lmig75l7yebope
Developing a Risk Analysis Strategy Framework for Impact Assessment in Information Security Management Systems: A Case Study in IT Consulting Industry
2022
Sustainability
The purpose of this paper was to develop a risk assessment framework that a company followed in the information technology sector to conduct the risk assessment process to comply with International Organization ...
It explains the risk assessment process and the management of the necessary configurations so that its functions are acceptable and in line with information security standards. ...
Informed Consent Statement: Not applicable. ...
doi:10.3390/su14031269
fatcat:3xhvsl2dlves5ktoapp2xnb36m
Side-Channel Analysis of SM2
2018
Proceedings of the 34th Annual Computer Security Applications Conference on - ACSAC '18
We perform a security review of this implementation, uncovering various deficiencies ranging from traditional software quality issues to side-channel risks. ...
To assess the latter, we carry out a side-channel security evaluation and discover that the implementation hits every pitfall seen for OpenSSL's ECDSA code in the past decade. ...
The third author was supported in part by a Nokia Foundation Scholarship and by the Pekka Ahonen Fund through the Industrial Research Fund of Tampere University of Technology. ...
doi:10.1145/3274694.3274725
dblp:conf/acsac/TuveriHGB18
fatcat:vztueekdx5ctjiqtfvcoyikcji
Analysis of Security Criteria for IoT-Based Supply Chain: A Case Study of FMCG Industries
2021
Central European Management Journal
Research limitations: Limitations of this study are the purposive sampling method and the limited scope of studied companies and sectors. ...
Purpose: In supply chains, creating a secure space for data production, sending, storing, and analysis has always been a critical issue. ...
The Internet of Things The term "Internet of Things" (IoT) was coined in the late 1990s by Kevin Ashton, the cofounder of Auto-ID Center at the Massachusetts Institute of Technology in order to examine ...
doi:10.7206/cemj.2658-0845.63
fatcat:dtaztyoxxvbppm3wob52tovrt4
Embedded RFID and Everyday Things: A Case Study of the Security and Privacy Risks of the U.S. e-Passport
2007
2007 IEEE International Conference on RFID
Government's adoption process for the electronic passport as a case study for identifying the privacy and security risks that arise by embedding RFID technology in "everyday things." ...
We discuss the reasons why the Department of State did not adequately identify and address these privacy and security risks, even after the government's process mandated a privacy impact assessment. ...
Department of State as a case study to illustrate how to address the privacy and security risks to users stemming from the inclusion of embedded RF transponders. ...
doi:10.1109/rfid.2007.346143
fatcat:igevwtntffcrlhyaajlfbxdqqm
Factors affecting user experience with security features: A case study of an academic institution in Namibia
2013
2013 Information Security for South Africa
In order to effectively secure information, the fields of Usable security and User experience should be integrated in the design and use of security features. ...
Human behaviour and attitudes towards security features determine the user experience during the implementation of Information Security. ...
Based on the findings it is necessary to develop a framework for secure user experiences. ...
doi:10.1109/issa.2013.6641061
dblp:conf/issa/ShavaG13
fatcat:5j7isn2a4zg67cnmh4yr2qhdnu
A Survey on the Management of Electronic Records: A Case Study of Djibouti National Social Security Fund Main Branch
2021
Zenodo
The effect of information and communication technology (ICT) adoption on the service management performance (SMP) of the National Social Security Fund of Djibouti (NSSF) was studied. ...
The potential role of electronic records management adoption (ERMA) as a mediator was also investigated. ...
Acknowledgements This work was supported by new technical Information consultation of hospital (No. 20200057). ...
doi:10.5281/zenodo.5266532
fatcat:yyqvvivkpfgh3fcnuhwtgj2ucm
Model-Based Real-Time Evaluation of Security Patterns: A SCADA System Case Study
[chapter]
2016
Lecture Notes in Computer Science
In this paper, the approach is illustrated on a SCADA (Supervisory Control and Data Acquisition) system case study and a tool chain based on Papyrus UML supports the approach. ...
It exploits two views of security countermeasures patterns: abstract and concrete. The abstract view is used to select relevant solutions to security requirements on a logical point of view. ...
This work is conducted in the context of a Ph.D. thesis funded by CEA LIST and co-leaded by CEA (LISE) and IRIT (MACAO). ...
doi:10.1007/978-3-319-45480-1_30
fatcat:oafwi5t2efedtfej76rreb3egy
Conceptualizing a New Domain Using Topic Modeling and Concept Mapping: A Case Study of Managed Security Services for Small Businesses
2019
Technology Innovation Management Review
A body of formally represented knowledge is based on a conceptualization: the objects, concepts, and other entities that are assumed to exist in some area of interest and the relationships that hold among ...
., Setiawan,
A., & Mintarsih, F. 2017. IT Security governance
evaluation with use of COBIT 5 framework: A case
study on UIN Syarif Hidayatullah Library Information
System. ...
As a case study, the paper reviews the recent literature in the intersection of managed security services and small businesses. ...
doi:10.22215/timreview/1261
fatcat:4oappvqnivdq7lac2tay2g2hxu
Confidante: Usable Encrypted Email: A Case Study with Lawyers and Journalists
2017
2017 IEEE European Symposium on Security and Privacy (EuroS&P)
We conduct a user study with 15 people (8 U.S. lawyers and 7 U.S. journalists) to evaluate Confidante's design decisions. ...
We reflect on our findings -both specifically about Confidante and more generally about the needs and constraints of lawyers and journalists -to identify lessons and remaining security and usability challenges ...
We thank all members of the UW CSE Security & Privacy Research Lab for feedback on the study, the tool, and earlier versions of the paper, particularly Camille Cobb, Gennie Gebhart, Yoshi Kohno, Kiron ...
doi:10.1109/eurosp.2017.41
dblp:conf/eurosp/LernerZR17
fatcat:zpjtvens2fbqddgtsa7ksftece
Digitalization peculiarities of organizations: a case study
2020
Entrepreneurship and Sustainability Issues
L., Gapsalamov, A. R., Akhmetshin, E. M., Bochkareva, T. N., Yumashev, A. V., Anisimova, T. I. 2020. Digitalization peculiarities of organizations: a case study. ...
The study revealed a discrepancy in the level of development of the necessary digital competencies between universities and the real sector of the economy. ...
Acknowledgments The reported study was funded by RFBR, ...
doi:10.9770/jesi.2020.7.4(39)
fatcat:bo2izhg4yfb4xg7op5vysclxk4
« Previous
Showing results 1 — 15 out of 47,091 results