The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Detecting insider attacks continues to prove to be one of the most difficult challenges in securing sensitive data. Decoy information and documents represent a promising approach to detecting malicious masqueraders, however, false positives can interfere with legitimate work and take up user time. We propose generating foreign language decoy documents that are sprinkled with untranslatable enticing...
We review a postal voting system used in spring 2011 by the French research institute CNRS and designed by a French company (Tagg Informatique). We explain how the structure of the material can be easily understood out of a few samples of voting material (distributed to the voters), without any prior knowledge of the system. Taking advantage of some flaws in the design of the system, we show how to...
In a world plagued with improvised explosive devices, drugs and dangerous people, the desire to field technology to protect our police and military is providing a fertile market for the proliferation of protection technologies that range from the unproven to the disproven. The market place is currently being flooded with detection equipment making inflated and inaccurate marketing claims of high reliably,...
Summary form only given. The rod-pinch diode is a co-axial relativistic electron-beam-driven diode, where the cathode is a hollow disk and the anode a rod protruding through the cathode. The diode operates at currents in excess of the critical current such that electrons emitted from the cathode are magnetically insulated from crossing the A-K gap and are forced to attach at the tip of the anode rod,...
A basic part of the logistics management in companies is the purchasing function, and the appropriate selection of vendors is one of the prime responsibilities of this function. Many conceptual and analytical models have been developed for addressing the vendor selection problem. While it has been recognized that vendor selection is multiobjective in nature, litle has been done to develop techniques...
A series of extra large financial frauds and audit failure cases, represented by Enron and WorldCom, has attracted close attention of legislation on the effectiveness of internal control over financial reporting. After the enactment of Sarbanes-Oxley Act of 2002 (US-SOX) in the United States, similar law and regulations are also published in Japan (J-SOX). This paper will compare and contrast J-SOX...
Dissipation is a system. Dissipative system is a change process of material, energy and information with outside. This paper uses dissipative structure in stock option excitation mechanisms. And it shows that according to the theory of dissipative structure, in the research of stock option excitation mechanisms, the first thing is to assure it is open, and only improve the disadvantage; the system...
Prior laboratory studies have shown that PhishGuru, an embedded training system, is an effective way to teach users to identify phishing scams. PhishGuru users are sent simulated phishing attacks and trained after they fall for the attacks. In this current study, we extend the PhishGuru methodology to train users about spear phishing and test it in a real world setting with employees of a Portuguese...
By analyzing the current E-commerce pattern of China's travel industry, the paper make researches in the application of E-commerce pattern based on value-chain and probe into the advantages and foreground of new value-chain based on BSP for further step. Finally, the paper provides some advices to the current development situation of travel industry E-commerce in China.
This paper discusses the effects of Sarbanes-Oxley (SOX) Act on corporate information security governance practices. The resultant regulatory intervention forces a company to revisit its internal control structures and asses the nature and scope of its compliance with the law. This paper reviews the implications emerging from the mandatory compliance with Sarbanes-Oxley (SOX) Act. Issues related to...
In this paper we discuss the use cases for monitoring of Web services for compliance with policies and service level agreements. In particular, the quality of service associated with Web service interactions and its monitoring rely on the proper use by both parties of related Web service protocols. This monitoring is best served by an event-centric model and an extensible scripting language, such...
Energy is the bedrock of our daily lives and industry. Now is the time that industry, government and academia must join together and examine highly independent, fully environmentally considerate and rational energy systems. In this presentation, recent Japanese policy will be introduced focusing on new national energy strategy. Looking at future technology trends, it is probable that, in the case...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.