The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent studies have shown that dynamic removal of transmission lines from operation ("Transmission Switching") can reduce costs associated with power system operation. Smart Grid systems introduce flexibility into the transmission network topology and enable co-optimization of generation and network topology. The optimal transmission switching (OTS) problem has been posed in on small test...
One of the challenges facing information technology (IT) security professionals is the laborious task of sifting through numerous log files in an attempt to identify malicious traffic and conduct a forensics analysis to determine an appropriate course of action. This process is complicated significantly by the volume of traffic that can be associated with a production device environment. A honey net...
This paper investigates the complications of designing effective governance for IT risk management (IT-RM). Literature on formal governance suggests that either a coercive (i.e., to force employees' effort and compliance) or an enabling (i.e., to help employees better to master their tasks) design of procedures help to avoid what literature calls 'mock bureaucracy' (i.e., rules are promulgated for...
The objective of this paper is to demonstrate 1) how adding storage capacity to a network can mitigate the variability of wind generation and increase the system benefits, and 2) how the stochastic characteristics of the wind generation affect the system benefits of storage capacity. Two types of storage are considered. One represents utility-scale storage that is collocated at the wind sites, and...
This study investigated how external influences motivate senior management to commit to information system security (ISS) by examining the mediating role of senior management between external influences and organizational change. Neo-institutional theory was used to examine normative, mimetic, and coercive mechanisms that affect ISS assimilation in organizations. Findings show senior management beliefs...
The increasing frequency and total cost of security incidents require organizations to apply proper IS risk management in order to assess the economically reasonable usage of security measures. In this paper, we contribute a model that supports risk-related investment decisions in service-based information systems. The model supports decision makers in analyzing the cost-benefit trade off related...
Web application vulnerabilities are widely considered a serious concern. However, there are as of yet scarce data comparing the effectiveness of different security countermeasures or detailing the magnitude of the security issues associated with web applications. This paper studies the effort that is required by a professional penetration tester to find an input validation vulnerability in an enterprise...
The security of industrial control systems in critical infrastructure is a concern for the Australian government and other nations. There is a need to provide local Australian training and education for both control system engineers and information technology professionals. This paper proposes a postgraduate curriculum of four courses to provide knowledge and skills to protect critical infrastructure...
Earlier work describes computational models of critical infrastructure that allow an analyst to estimate the security of a system in terms of the impact of loss per stakeholder resulting from security breakdowns. Here, we consider how to identify, monitor and estimate risk impact and probability for different smart grid stakeholders. Our constructive method leverages currently available standards...
Currently, there is no community-accepted standard for an insider threat mitigation program. While these programs have developed organically or ad hoc over time, no agency has developed and made available a model program that other agencies can use to determine which best practices to implement and which components to prioritize, depending upon their environment, budget, and other such inherent constraints...
As cloud and virtualized environments become more widely used to solve challenges faced by companies of all sizes, it is increasingly likely that this infrastructure will be a common focus of attacks in the years to come. Successful attacks against this infrastructure could allow an attacker to "break out" of the virtual environment and gain control of the physical infrastructure effectively...
This minitrack focuses on topics related to the monitoring and control of complex systems such as power systems to ensure that disturbances have a minimal impact on performance. Specific topics include: Steady-State and Dynamic Security Assessment, Available Transfer Capability (ATC), State Estimation, Security-Constrained Optimal Power Flow, Sensor Applications, Large-Scale Real-Time Control, and...
Workflow management systems are becoming increasingly flexible and thus open up new areas of application, such as the coordination of activities in disaster response management. However, for managing disaster events effectively, flexibility is seen as a necessary but not sufficient condition. Moreover, effective disaster management processes require comprehensive access to and the processing of public...
This paper studies the effects of information transmission on wisdom of the crowd. We provide a game-theoretic framework to resolve the question: Do social networks promote the forecast efficiency in prediction markets? Our study shows that a social network is not a panacea in terms of improving forecast accuracy. The use of social networks could be detrimental to the forecast performance when the...
This paper presents the findings of an exploratory qualitative research study in which the authors sought to examine why two public libraries have implemented video security systems and why one of these libraries has reversed course and recently removed a previously installed surveillance system. We found that one library initially installed the system in various branches as an ad hoc response to...
Hardware-based security tagging schemes are promising mechanisms for enhancing the security of computer systems. The idea behind security tagging schemes is to attach labels to memory locations and/or registers to carry security information about the tagged data throughout the system. These tags are then used to protect system and user software from attacks and invalid information access. Researchers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.