A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
SlopPy: Slope One with Privacy
[chapter]
2013
Lecture Notes in Computer Science
More precisely, we describe SlopPy (for Slope One with Privacy), a privacy-preserving version of Slope One in which a user never releases directly his personal information (i.e, his ratings). ...
While there is a trade-off to set between the desired privacy level and the utility of the resulting recommendation, our preliminary experiments clearly demonstrate that SlopPy is able to provide a high ...
This research has been funded by the Quaero program and the Inria large scale project CAPPRIS (Collaborative Action on the Protection of Privacy Rights). ...
doi:10.1007/978-3-642-35890-6_8
fatcat:nwph2aug45h4dlyginwfldtgp4
Policies in Activity-based Flexible Offices -'I am sloppy with clean-desking. We don't really know the rules.'
2019
Ergonomics
Policies in Activity-based Flexible Offices -'I am sloppy with clean-desking. We don't really know the rules.' ...
Offices -'I am sloppy with clean-desking. ...
The authors also thank J€ orgen Eklund and Anna-Lisa Osvalder for their invaluable feedback on the manuscript. ...
doi:10.1080/00140139.2018.1516805
pmid:30246624
fatcat:eufyizoa5nfdrhgm2xb2cnvyum
Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers
2013
2013 IEEE International Conference on Cloud Engineering (IC2E)
for others, could/should have known (sloppy) stepping stone (unknowingly contribute to an attack): increases risk for others, but could not have known (sloppy) Sebastian Pape (TU Dortmund) 17/34 Introduction ...
not intend to increase risk for others, but fails to take action upon being informed about this (lazy) charlatan (failing to acquire essential knowledge about contributing to an attack): increases risk ...
risk for others,
could/should have known (sloppy)
stepping stone (unknowingly contribute to an attack): increases
risk for others, but could not have known (sloppy)
malicious and ostrich archetypes ...
doi:10.1109/ic2e.2013.31
dblp:conf/ic2e/BleikertzMPPD13
fatcat:ny4naedfzbe5flaasyihlrmlpq
The PEI framework for application-centric security
2009
Proceedings of the 5th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing
It then gives an overview of the PEI framework for application-centric security and outlines some of the lessons learned in applying this framework. ...
This paper motivates the fundamental importance of application context for security. ...
Acknowledgement I thank the conference organizers for the opportunity to present this invited paper. ...
doi:10.4108/icst.collaboratecom2009.8382
dblp:conf/colcom/Sandhu09
fatcat:x3xivnbhi5d4bcjt23cjrbsgju
Model-based security analysis in seven steps — a guided tour to the CORAS method
2007
BT technology journal
The paper focuses in particular on the use of the CORAS security risk modelling language as a means for communication and interaction during the seven steps. ...
We follow two analysts in their interaction with an organisation by which they have been hired to carry out a security risk analysis. ...
The authors have also benefited considerably from teaching this material at the University of Oslo and receiving the students' responses. ...
doi:10.1007/s10550-007-0013-9
fatcat:5rumoqsdfzbzrilokvet5mcx7e
The socio-political dimensions of critical information infrastructure protection (CIIP)
2005
International Journal of Critical Infrastructures
At present, the topic of critical information infrastructure protection (CIIP) is mainly discussed in the domain of engineers, consultants, and IT security experts. ...
In the process, it particularly targets the extensive problem of 'conceptual sloppiness' that the community is culpable of. ...
The main actors come from the security establishment. • CIIP is an issue of economics. ...
doi:10.1504/ijcis.2005.006122
fatcat:qnauvyt7tzeaxgsltznqbblxq4
Fraud Risk Modelling: Requirements Elicitation in the Case of Telecom Services
[chapter]
2017
Lecture Notes in Business Information Processing
Fraud risk modelling is a fraud prevention approach aims at identifying the potential fraud risks, estimating the damage and setting up preventive mechanisms before the fraud risks lead to actual losses ...
In this paper, we highlight the important requirements for a usable and context-aware fraud risk modelling approach for Telecom services. ...
[20] presented a requirement model not for the security domain but for a solution domain in the Telecom field such as an SDP (Service Delivery Platform). ...
doi:10.1007/978-3-319-56925-3_26
fatcat:xok6jr46orhzdp735um7ltnepm
The CORAS Language – why it is designed the way it is
[chapter]
2014
Safety, Reliability, Risk and Life-Cycle Performance of Structures and Infrastructures
(FP7/2007-2013) via the NESSoS network of excellence (256980) and the RASEN project (316853). ...
ACKNOWLEDGMENTS The research leading to these results has received funding from the Research Council of Norway via the DIAMONDS project (201579/S10), and from the European Union's Seventh Framework Programme ...
SMALL EXAMPLE In this section we illustrate the CORAS language with two diagrams from an example of an information security risk analysis. ...
doi:10.1201/b16387-456
fatcat:zmfxdtyhcfdtzesthcgzixy6oe
The Effect of Perceived Risk on Intention to Use Online Banking
2022
Universal Journal of Accounting and Finance
The research model is envisaged on the basis of different theories of information technology acceptance. ...
Thus, the detailed and distinctive risk job in risk awareness for the banking industry is an important and useful task. ...
Risk to security and privacy is classified as a potential default owing to fraud or a hacker that negotiates security for a user of an online bank. ...
doi:10.13189/ujaf.2022.100107
fatcat:jttpbzph4ffmxcvfgv3yjyrh5u
Psychology and the Financial Crisis of 2007-2008
2011
Social Science Research Network
I focus on three aspects of the crisis: the surge in house prices in the years leading up to 2006; the large positions in subprime-linked securities that many banks had accumulated by 2007; and the dramatic ...
decline in value of many risky asset classes during the crisis period. ...
How could they allow sloppy reasoning to mislead them about the risks they were taking? In other words, how plausible is the "bad models" view? ...
doi:10.2139/ssrn.1742463
fatcat:7b4tagcsvfgqvjkffchqtjqmky
Page 22 of Management & Marketing Abstracts Vol. 24, Issue 1
[page]
1999
Management & Marketing Abstracts
Examples are provided from different companies, emphasising the troubles caused by inconsistent information security practices, and the sloppy use of passwords and procedures. ...
Security is seen as based on the tone set within an organisation. ...
Using model-based security analysis in component-oriented system development
2006
Proceedings of the 2nd ACM workshop on Quality of protection - QoP '06
We specify the risk behaviour and functional behaviour of components using the same kinds of description techniques. ...
We propose an integrated process for component-based system development and security risk analysis. ...
Acknowledgements The research on which this paper reports has been funded by the Research Council of Norway via the two research projects COMA 160317 (Component-oriented model-based security analysis) ...
doi:10.1145/1179494.1179498
dblp:conf/ccs/BraendelandS06
fatcat:hehii7prfvbgjlnw7pn3rr2yju
The Fuzzy Experiment Approach for Detection and Prevention of Phishing attacks in online Domain
2020
East African Scholars Journal of Engineering and Computer Sciences
Phishing is an aspect of identity theft that uses engineering and social paradigms to steal personal information from unsuspecting users for their selfish gain. ...
The proposed model uses fuzzy logic to define rules and assign linguistic indicators in the form of if-then rules to each phishing criteria. ...
Criminals are aware of the security risks associated with this situation; they are taking advantage of this situation by attacking security weaknesses, posing as valid customers and stealing money from ...
doi:10.36349/easjecs.2020.v03i10.001
fatcat:lacvr6aoxjg4xp474uez2nd6bu
How Bad is it? – A Branching Activity Model to Estimate the Impact of Information Security Breaches
2013
Social Science Research Network
This paper proposes an analysis framework and model for estimating the impact of information security breach episodes. ...
Even in informal settings, perception and communication about risk often involves some estimate or mental model of the severity of breach episodes. ...
We also gratefully acknowledge the members of Society of Information Risk Analysts (https://www.societyinforisk.org/) and Securitymetrics.org and its METRICON workshops (http://www.securitymetrics.org/ ...
doi:10.2139/ssrn.2233075
fatcat:ecnk3vh6j5gubg6twhhimwsmzu
The Development of a Cyber Safety Culture
2021
Zenodo
However, the increase in connected systems within the sector (e.g. satellite communications etc.) means these safety cultures must now consider the risks posed by digital systems. ...
A rise in catastrophic events as a result of poor safety management (e.g. the capsizing of the Herald of Free Enterprise and Costa Concordia), has driven the maritime sector to seek improvements in its ...
Content reflects only the authors' view and European Commission is not responsible for any use that may be made of the information it contains. ...
doi:10.5281/zenodo.5499819
fatcat:clgnoo3n3vcb3cbyaxybtvdexm
« Previous
Showing results 1 — 15 out of 5,083 results