The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The synthesis of technology and the medical industry has partly contributed to the increasing interest in Medical Cyber-Physical Systems (MCPS). While these systems provide benefits to patients and professionals, they also introduce new attack vectors for malicious actors (e.g. financially-and/or criminally-motivated actors). A successful breach involving a MCPS can impact patient data and system...
Critical infrastructure, which used in energy, industry, and financial area, is one of essential components for modern society. Thus, critical infrastructures and its availability must be kept secure. Inspecting cyber threat is needed to prevent cyber-attack on critical infrastructure. By using OSINT (Open Source INTelligence) process, it is possible to gather meaningful intelligence related to security...
BYOD (Bring Your Own Device) has emerged as the fastest growing phenomenon that IT divisions have had to deal. Today there are a variety of tools used to communicate with stakeholder (supplier, customer, distributor, etc) in boundless place, so organizations' data will be kept in the various devices. The changing of this era drives the current trend of employees using their own laptop computers, cellular...
APT (Advanced Persistent Threat) attacks are developing rapidly and become severe threats nowadays. In this paper, homologous malware mean that they are developed and programmed by the same author or organization. To identify the homology of malware adopted by different APT attacks is conducive to constructing attack scenario, tracking attackers and even defending against new APT attacks. Currently,...
Information security-related policies are important for organizations to safeguard against threats and plan for adverse events. However, adoption of policies (devised to insure security, privacy and acceptable use in organization, as well as to outline audit processes, disaster recovery and business continuance planning) are equally important for organizations to insure legitimacy in the eyes of stakeholders...
Abusive supervision is not scares in Chinese service industries. In this paper, we considered supervisor's personal values play a key role in predicting perceptions of abusive supervision. We tested our model consisting of 171 supervisor - subordinate dyads from Chinese retail organizations. Specifically, we found that in the retail industry: (1) supervisor's self-enhancement values were positively...
This paper examines the responsibilities and the required skills for Information Technology (IT) security professionals. Content analysis of relevant jobs postings helped identify four types of positions and the associated responsibilities and requisite skills. The identified skills were further analyzed to assess their consistency with the identified responsibilities. Finally, the Body of Knowledge...
The present is a report of an exploratory case study about using an Enterprise Architecture method for addressing the business transformation challenges of embedded mobile provisioning in the telecommunications industry. The study focused on the analysis of the provisioning process for gathering transformation requirements, translating them into business objectives and deriving a set of strategic...
The U.S. healthcare industry has been given anew mandate to expand the use of health information technology to provide better care and to help reduce costs. Equally, cloud computing is poised to become the fifth utility delivering economies of scale and cost benefits that are difficult for businesses to ignore. The utilization of cloud services for the storage and exchange of personal health information...
Autonomic computing and policy based systems are closely related concepts that can be strong enablers for managing the next wave of information and network technologies. Lessons learned in these areas are therefore important not only for present day applications, but also for the future developments. In this paper we present some lessons learned in the deployment experiences with these technologies...
This study aims to investigate the relationship between organizational citizenship behavior (OCB) and other work related factors; job status, job insecurity and work values. Job status refers to the mode of appointment of employees; either on permanent basis or contractual. The sample of the study consists of 200 academicians from local universities. OCB is being measured using Organizational Citizenship...
Generally, Customer Relationship Management (CRM) is essential and vital function of customer oriented marketing. Its function includes gathering and accumulating customer -related information in order to provide effective services. E-CRM concerns all forms of managing relationships with customers making use of Information Technology (IT). Aim of e-CRM system is to improve customer service, develop...
With the upgrading of technology importance in social-economic development, technology threat has become an important part of an organization's exterior threat. How to effectively identify and assess the threat and its possible impact is directly related to the interests and security of an organization. Up to date, there is little research about technology threat between different organizations. In...
This study aims to probe into the influences of market orientation and knowledge integration on operational performance of securities firms, and determines if knowledge integration reveals mediated effects between customer orientation and performance. The data are collected by questionnaire survey. The results suggest that customer orientation significantly and positively influences knowledge integration;...
This paper explores the relationships between contextual factors i.e. transparency and regulatory (legal) environments and security concerns (threats, risk, and vulnerabilities) in the financial services industry. The industry is chosen for illustration purposes and for its relevance in global economic development. The research uses a secondary data source, i.e. the 2009 Deloitte Touche Tohmatsu (DTT)...
The use of enterprise architecture frameworks has become more common in the past five years within corporations as well as higher education. Only in the past two years has enterprise information security architecture been introduced as a subset of enterprise architecture aligning IT security with business strategy. This paper will review industry accepted enterprise information security architecture...
The credibility of Website is a sort of psychological feeling, in other words, a sense of trust and its intensity towards the enterprise??s Website produced by the customers from individual or collective perspective. According to the Website??s structure and function modules, the credibility of enterprise??s Website can be divided into three parts, respectively, the credibility of Website structure,...
This paper argues that since many modern networked industries have begun to exhibit the attributes of complex adaptive systems, and therefore they must learn to operate under conditions of high uncertainty. In environments with high uncertainty strategies for resilience allow for recovery from ??surprises.?? The attributes of resilient systems are helpful in planning for the security of these critical...
Financial services institutions (FSIs) around the globe know they must proactively work toward protecting customer data and thwarting emerging security threats. Deloitte Touche Tohmatsu (DTT), an international firm that provides audit, consulting, and financial advisory services has used its networks and reach to investigate security and privacy issues in FSIs around the world. DTTpsilas first survey...
The article presents a survey undertaken from medium-large scale organizations and focuses on specific concerns of the top level executives working for modern organizations in Greece and Cyprus. Through the survey we explore what decision makers think, when they consider security policies, methodologies and countermeasures. Through the process of analyzing the survey results, some very important aspects...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.