The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The expansion of internet technology has made convenience. On the one hand various malicious code is produced. The number of malicious codes occurrence has dramatically increasing, and new or variant malicious code circulation very serious, So it is time to require analysis about malicious code. The being so malicious code pattern extract for malicious code properties of anti-virus company. Visualization...
Electronic protected health information is a priority among politicians and healthcare providers alike. Under the current circumstances with increased data breaches and their associated costs ensuring information security is essential for the success of healthcare providers. This paper presents a detailed case study of a major hospital in the NY/NJ metropolitan area demonstrating the complexity of...
The emergence of the Internet has changed the nature of face-to-face towards online interactions. This leads to the concept of virtual interoperation such as Web Services, Grid, and Cloud Computing. Since existing security mechanisms are insufficient to cover the diversity of workflow application domains, trust is considered as an adaptive, high-level abstraction, and platform-independent solution...
This paper presents an empirical analysis of security and user experience issues in cloud computing. The study is based on the assumption that superior user experience and user-centric security are the two crucial issues that help to build an overall experience for the cloud service user. Qualitative research analysis is used to collect perspectives of eleven experts from Finnish Cloud Software Program...
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced various parts of their IT systems to other companies, which potentially threatens the control they have of their IT assets. To provide proof of being in control of outsourced IT systems, the outsourcing client and outsourcing...
The ELLEIEC ERASMUS thematic network runs from October 2008, and it will finish in to September 2011. This project deals with several aspects linked to LifeLong Learning (LLL) in Electrical and Information Engineering in Europe. One of the actions of the project is to set some ICN (International Curricula Networks) in some disciplines (specialties in EIE) and levels (Bachelor or Master) aiming at...
Evolution of Web 2.0 applications has changed the outlook of business models and companies. Organizations need to rethink their communication, marketing and sale channels and how their employees and customers interact together internally and externally. Following this new trend, they also need to adopt their IT infrastructure and enhance their online presence and services in order to stay competitive...
Collaborative networks represent a promising paradigm for companies to counter actual challenges in a globalized world. However, such networks bring along additional risks regarding information security and privacy which may lead to compliance violations. In this paper stakeholders and respective information security management requirements regarding collaborative networks are identified and analyzed...
The rise of the social web has brought a series of privacy concerns and threats. In particular, data leakage is a risk that affects the privacy of not only companies but individuals. Although there are tools that can prevent data losses, they require a prior step that involves the sensitive data to be properly identified. In this paper, we propose a new automatic approach that applies Named Entity...
In an effort to enhance enterprise security, three standard management systems have been established as applications of the Deming cycle: the Information Security Management System (ISMS) in accordance with the ISO 27001 standard, the Business Continuity Management System (BCM) in accordance with the BS 25999 standard and the Information Technology Service Management System (ITSM) in accordance with...
This paper discusses two main ideas, Electronic Business Technology and its Security Problems. E-Business relies upon a wide range of technologies. Here we examine the more vital technologies for electronic Business. Included Networks, E-mail, The Word Wide Web etc. On the Internet many electronic Business applications can be used today, but most of them provide only weak security or even none whatsoever...
Quantitative models for security risk management in organizations are recently receiving an increased attention in the research community. This paper investigates the possibility of cooperation among autonomous divisions of an organization with dependent security assets and/or vulnerabilities for reducing overall security risks. A coalitional game is formulated for modeling cooperation possibilities...
There is a recognized need in both the US and Europe to develop an interoperability infrastructure which will allow a better interchange of ATM (Air Traffic Management) information between ground systems and equally between ground systems and the aircraft. The increasing complexity of the ATM functions required by traffic, which has grown significantly this past decade, presents a demand for additional...
As Information Security Professionals we are often thought of as the individuals who implement the necessary technologies to protect the organization. Sometime as InfoSec professionals we are too paranoid about security that we tend to bend over backwards to protect information at ANY cost. Cost is a delineating factor in the protecting the confidentially, integrity and availability of information...
Sharing, comparing and negotiating security-related actions and requirements across businesses has always been a complicated matter. Issues arise due to semantic gaps, disparity in security documentation and formats, and incomplete security-related information during negotiations, to say the least. As collaborations amongst e-businesses in particular increase, there is a growing, implicit need to...
Privacy and security are major concerns for partners in B2B and B2C applications. Service providers want on the one hand isolate their private process in order to protect their business logic and improve their privacy and on the other hand they have to expose (at least some parts of) their private process to other partners in order to enable communication, interaction and data exchange. Process Views...
This paper established a two-stage logic trust model for consumers with online shopping experience and without, and on this base, put forward the corresponding calculation formula and assessment method of trust degree, which provide reference and experience for the e-business companies to make correct decision and reasonably schedule their network marketing activities due to different stages of consumers.
Smart cards have been proliferated into many aspects of modern life. Historically, the ownership of smart cards has remained with the smart card issuers. Although this ownership model is favored by a wide range of industries and service providers, it does not provide optimum convenience and flexibility to cardholders. One potential solution could be to shift the control of smart cards from the smart...
ISyRAmI (Intelligent Systems Research for Ambient Intelligence) proposed by IST is an Artificial Intelligence oriented methodology and architecture for the development of Ambient Intelligence (AmI) systems. The ISyRAmI architecture considers the following four modules: Data/Information/Knowledge acquisition; Data/Information/Knowledge storage, conversion, and handling; Intelligent Reasoning; and Decision...
The rush-to market attitude of B2C e-commerce Web sites development affects their quality. Thus, big number of these Web sites includes many vulnerabilities are shipped to end users. Many researchers attempted to build models to evaluate the quality of B2C Web sites. However, the majority of these models used big number of quality factors and need a big amount of data for testing. This study attempts...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.