The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the increasingly widespread application of cloud computing, it has become a critical task for researchers to study techniques on cloud safety and standardization. In this paper, hybrid cloud security and fair Resource Allocation related problems are investigated. A security model based on trust negotiation is presented to fit the hybrid cloud environment. Furthermore, fair resource model and...
Analyzing the role of target-related information in a security attack is an understudied topic in the behavioral information security research field. This paper presents an empirical investigation of the effect of adding information about the target in phishing attacks. Data was collected by conducting two phishing experiments using a sample of 158 employees at five Swedish organizations. The first...
Users of technology services try to evaluate the risks of disclosing personal information in light of the benefits they believe they will receive. However, because of cognitive, time or other constraints, users concentrate on minimizing the uncertainties of disclosure - reducing their level of privacy concern - by using a limited set of information cues. We suggest an individual's information-seeking...
Identity Proofing - providing a digital identifier bound to a real-world entity - is effective against identity theft, which is a serious problem for cyber security. In-person interaction with an applicant is the basis of identity proofing, but that is only effective when all applicants are located near a registration authority (RA) which is responsible for verifying some or all of the applicant's...
Educational resource center is a digital content management and service system with all kinds of educational information resources collected. By analyzing the current development of educational resource center, this paper proposes that ecological development is the strategic goal of educational resource center, and presents a use efficiency model of educational resource center. The use efficiency...
The problem of insider threat is receiving increasing attention both within the computer science community as well as government and industry. This paper starts by presenting a broad, multidisciplinary survey of insider threat capturing contributions from computer scientists, psychologists, criminologists, and security practitioners. Subsequently, we present the behavioral analysis of insider threat...
The advent of the Internet has provided people around the world with access to information and services from across the globe that is published without any mediation by governments or other agencies. However, access to this information and services may be restricted within the viewer's own country by their Government, Internet Service Providers, employers and families among others. The motivations...
Organizations often suffer harm from individuals who bear no malice against them but whose actions unintentionally expose the organizations to risk-the unintentional insider threat (UIT). In this paper we examine UIT cases that derive from social engineering exploits. We report on our efforts to collect and analyze data from UIT social engineering incidents to identify possible behavioral and technical...
The Communities vary from country to country. There are civil societies and rural communities, which also differ in terms of geography climate and economy. This shows that the use of social networks vary from region to region depending on the demographics of the communities. So, in this paper, we researched the most important problems of the Social Network, as well as the risk which is based on the...
This paper describes results of a study seeking to identify observable events related to insider sabotage. We collected information from actual insider threat cases, created chronological timelines of the incidents, identified key points in each timeline such as when attack planning began, measured the time between key events, and looked for specific observable events or patterns that insiders held...
Knowledge sharing is very important to knowledge transfer and innovation in universities. A knowledge sharing platform, with university teachers, students and multidiscipline knowledge, has become the new innovative teaching mode in universities, and knowledge sharing plays a key role in the development of information technology teaching and independent learning. This paper has designed the knowledge...
This study extends research on factors that contribute to abusive supervision, one form of nonphysical aggression, and the results of such abuse on subordinates' performance. We utilize research on personal values theory and general aggression model to formulate our hypotheses. Results from 206 matched leader-subordinate dyads support the idea that leader's self-transcendence values were positively...
Abusive supervision is not scares in Chinese service industries. In this paper, we considered supervisor's personal values play a key role in predicting perceptions of abusive supervision. We tested our model consisting of 171 supervisor - subordinate dyads from Chinese retail organizations. Specifically, we found that in the retail industry: (1) supervisor's self-enhancement values were positively...
In this study, we surveyed 505 employees and their immediate supervisor, and try to investigate the relations between work value, work stress, job performance and perceived organizational support. Through statistical analysis, we find that work stress has a mediating effect between work values and employee performance; perceived organizational support is a moderator between growth value and work stress,...
The literature study indicates that the number of empirical studies on the relationship between work values and job performance of employees are very low, and the results are not complimentary. Although many scholars provide a considerable amount of research regarding the relationship between the work values of an employee and his job performance, few studies take the influence an enterprise environment...
Nowadays there is a high demand for security assurance within Cloud Computing world. To meet this demand, security practitioners attempt to assess security vulnerabilities that any given cloud system may have, however this task present some challenges when exposed to a complex cloud system. Different security tools have been developed to facilitate the vulnerabilities discovery process. In this paper...
The purpose of this study is to assess and measure Bushehr Customs electronic readiness. Bushehr customs is one of the biggest customs in the southern Iran whose electronic readiness reflects Iran customs electronic readiness. The study initially was validated based on an e-readiness model experienced by 9 countries. The model was studied through a primary research methodology including questionnaire...
Databases are the repositories of the most important and expensive information in the enterprise. With the increase in access to data stored in databases, the frequency of attacks against those databases has also increased. A database threat refers to an object, person or other entity that represents a risk of loss or corruption of sensitive data to an asset. Today, in many business organizations,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.