Filters








5,083 Hits in 4.3 sec

SlopPy: Slope One with Privacy [chapter]

Sébastien Gambs, Julien Lolive
2013 Lecture Notes in Computer Science  
More precisely, we describe SlopPy (for Slope One with Privacy), a privacy-preserving version of Slope One in which a user never releases directly his personal information (i.e, his ratings).  ...  While there is a trade-off to set between the desired privacy level and the utility of the resulting recommendation, our preliminary experiments clearly demonstrate that SlopPy is able to provide a high  ...  This research has been funded by the Quaero program and the Inria large scale project CAPPRIS (Collaborative Action on the Protection of Privacy Rights).  ... 
doi:10.1007/978-3-642-35890-6_8 fatcat:nwph2aug45h4dlyginwfldtgp4

Policies in Activity-based Flexible Offices -'I am sloppy with clean-desking. We don't really know the rules.'

Maral Babapour Chafi, Linda Rolfö
2019 Ergonomics  
Policies in Activity-based Flexible Offices -'I am sloppy with clean-desking. We don't really know the rules.'  ...  Offices -'I am sloppy with clean-desking.  ...  The authors also thank J€ orgen Eklund and Anna-Lisa Osvalder for their invaluable feedback on the manuscript.  ... 
doi:10.1080/00140139.2018.1516805 pmid:30246624 fatcat:eufyizoa5nfdrhgm2xb2cnvyum

Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers

S. Bleikertz, T. Mastelic, S. Pape, W. Pieters, T. Dimkov
2013 2013 IEEE International Conference on Cloud Engineering (IC2E)  
for others, could/should have known (sloppy) stepping stone (unknowingly contribute to an attack): increases risk for others, but could not have known (sloppy) Sebastian Pape (TU Dortmund) 17/34 Introduction  ...  not intend to increase risk for others, but fails to take action upon being informed about this (lazy) charlatan (failing to acquire essential knowledge about contributing to an attack): increases risk  ...  risk for others, could/should have known (sloppy) stepping stone (unknowingly contribute to an attack): increases risk for others, but could not have known (sloppy) malicious and ostrich archetypes  ... 
doi:10.1109/ic2e.2013.31 dblp:conf/ic2e/BleikertzMPPD13 fatcat:ny4naedfzbe5flaasyihlrmlpq

The PEI framework for application-centric security

Ravi Sandhu
2009 Proceedings of the 5th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing  
It then gives an overview of the PEI framework for application-centric security and outlines some of the lessons learned in applying this framework.  ...  This paper motivates the fundamental importance of application context for security.  ...  Acknowledgement I thank the conference organizers for the opportunity to present this invited paper.  ... 
doi:10.4108/icst.collaboratecom2009.8382 dblp:conf/colcom/Sandhu09 fatcat:x3xivnbhi5d4bcjt23cjrbsgju

Model-based security analysis in seven steps — a guided tour to the CORAS method

F. den Braber, I. Hogganvik, M. S. Lund, K. Stølen, F. Vraalsen
2007 BT technology journal  
The paper focuses in particular on the use of the CORAS security risk modelling language as a means for communication and interaction during the seven steps.  ...  We follow two analysts in their interaction with an organisation by which they have been hired to carry out a security risk analysis.  ...  The authors have also benefited considerably from teaching this material at the University of Oslo and receiving the students' responses.  ... 
doi:10.1007/s10550-007-0013-9 fatcat:5rumoqsdfzbzrilokvet5mcx7e

The socio-political dimensions of critical information infrastructure protection (CIIP)

Myriam Dunn
2005 International Journal of Critical Infrastructures  
At present, the topic of critical information infrastructure protection (CIIP) is mainly discussed in the domain of engineers, consultants, and IT security experts.  ...  In the process, it particularly targets the extensive problem of 'conceptual sloppiness' that the community is culpable of.  ...  The main actors come from the security establishment. • CIIP is an issue of economics.  ... 
doi:10.1504/ijcis.2005.006122 fatcat:qnauvyt7tzeaxgsltznqbblxq4

Fraud Risk Modelling: Requirements Elicitation in the Case of Telecom Services [chapter]

Ahmed Seid Yesuf, Lars Wolos, Kai Rannenberg
2017 Lecture Notes in Business Information Processing  
Fraud risk modelling is a fraud prevention approach aims at identifying the potential fraud risks, estimating the damage and setting up preventive mechanisms before the fraud risks lead to actual losses  ...  In this paper, we highlight the important requirements for a usable and context-aware fraud risk modelling approach for Telecom services.  ...  [20] presented a requirement model not for the security domain but for a solution domain in the Telecom field such as an SDP (Service Delivery Platform).  ... 
doi:10.1007/978-3-319-56925-3_26 fatcat:xok6jr46orhzdp735um7ltnepm

The CORAS Language – why it is designed the way it is [chapter]

Bjørnar Solhaug, Ketil Stølen
2014 Safety, Reliability, Risk and Life-Cycle Performance of Structures and Infrastructures  
(FP7/2007-2013) via the NESSoS network of excellence (256980) and the RASEN project (316853).  ...  ACKNOWLEDGMENTS The research leading to these results has received funding from the Research Council of Norway via the DIAMONDS project (201579/S10), and from the European Union's Seventh Framework Programme  ...  SMALL EXAMPLE In this section we illustrate the CORAS language with two diagrams from an example of an information security risk analysis.  ... 
doi:10.1201/b16387-456 fatcat:zmfxdtyhcfdtzesthcgzixy6oe

The Effect of Perceived Risk on Intention to Use Online Banking

Reepu Reepu, Rakhi Arora
2022 Universal Journal of Accounting and Finance  
The research model is envisaged on the basis of different theories of information technology acceptance.  ...  Thus, the detailed and distinctive risk job in risk awareness for the banking industry is an important and useful task.  ...  Risk to security and privacy is classified as a potential default owing to fraud or a hacker that negotiates security for a user of an online bank.  ... 
doi:10.13189/ujaf.2022.100107 fatcat:jttpbzph4ffmxcvfgv3yjyrh5u

Psychology and the Financial Crisis of 2007-2008

Nicholas Barberis
2011 Social Science Research Network  
I focus on three aspects of the crisis: the surge in house prices in the years leading up to 2006; the large positions in subprime-linked securities that many banks had accumulated by 2007; and the dramatic  ...  decline in value of many risky asset classes during the crisis period.  ...  How could they allow sloppy reasoning to mislead them about the risks they were taking? In other words, how plausible is the "bad models" view?  ... 
doi:10.2139/ssrn.1742463 fatcat:7b4tagcsvfgqvjkffchqtjqmky

Page 22 of Management & Marketing Abstracts Vol. 24, Issue 1 [page]

1999 Management & Marketing Abstracts  
Examples are provided from different companies, emphasising the troubles caused by inconsistent information security practices, and the sloppy use of passwords and procedures.  ...  Security is seen as based on the tone set within an organisation.  ... 

Using model-based security analysis in component-oriented system development

Gyrd Brændeland, Ketil Stølen
2006 Proceedings of the 2nd ACM workshop on Quality of protection - QoP '06  
We specify the risk behaviour and functional behaviour of components using the same kinds of description techniques.  ...  We propose an integrated process for component-based system development and security risk analysis.  ...  Acknowledgements The research on which this paper reports has been funded by the Research Council of Norway via the two research projects COMA 160317 (Component-oriented model-based security analysis)  ... 
doi:10.1145/1179494.1179498 dblp:conf/ccs/BraendelandS06 fatcat:hehii7prfvbgjlnw7pn3rr2yju

The Fuzzy Experiment Approach for Detection and Prevention of Phishing attacks in online Domain

Bashir ., Tenuche Agbata B.C, Emmanuel Ogala, William Obeng-Denteh
2020 East African Scholars Journal of Engineering and Computer Sciences  
Phishing is an aspect of identity theft that uses engineering and social paradigms to steal personal information from unsuspecting users for their selfish gain.  ...  The proposed model uses fuzzy logic to define rules and assign linguistic indicators in the form of if-then rules to each phishing criteria.  ...  Criminals are aware of the security risks associated with this situation; they are taking advantage of this situation by attacking security weaknesses, posing as valid customers and stealing money from  ... 
doi:10.36349/easjecs.2020.v03i10.001 fatcat:lacvr6aoxjg4xp474uez2nd6bu

How Bad is it? – A Branching Activity Model to Estimate the Impact of Information Security Breaches

Russell Cameron Thomas, Marcin Antkiewicz, Patrick Florer, Suzanne Widup, Matthew Woodyard
2013 Social Science Research Network  
This paper proposes an analysis framework and model for estimating the impact of information security breach episodes.  ...  Even in informal settings, perception and communication about risk often involves some estimate or mental model of the severity of breach episodes.  ...  We also gratefully acknowledge the members of Society of Information Risk Analysts (https://www.societyinforisk.org/) and Securitymetrics.org and its METRICON workshops (http://www.securitymetrics.org/  ... 
doi:10.2139/ssrn.2233075 fatcat:ecnk3vh6j5gubg6twhhimwsmzu

The Development of a Cyber Safety Culture

R. Hopcraft, K. Tam, K. Moara-Nkwe, K. Jones
2021 Zenodo  
However, the increase in connected systems within the sector (e.g. satellite communications etc.) means these safety cultures must now consider the risks posed by digital systems.  ...  A rise in catastrophic events as a result of poor safety management (e.g. the capsizing of the Herald of Free Enterprise and Costa Concordia), has driven the maritime sector to seek improvements in its  ...  Content reflects only the authors' view and European Commission is not responsible for any use that may be made of the information it contains.  ... 
doi:10.5281/zenodo.5499819 fatcat:clgnoo3n3vcb3cbyaxybtvdexm
« Previous Showing results 1 — 15 out of 5,083 results