The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The tendency of the management that focuses on facets of strategies and business risks without comprehending the procurement, the implementation, the availability of services, and information technology governance supports leads to not centralised online cosmetics business management and an increasing level of the customer turnover. The aims of this research are to cognise the gap value of each process...
This paper discusses determination of transmission connection capacities based on distribution regions. In a deregulated environment in which generation and distribution parts of power system are deregulated, planning of transmission system investments is a cumbersome task. In addition, transmission system operators (TSO) have no direct control over plant investments. Instead, several mechanisms introduced...
Defining proper measures for evaluating the effectiveness of an assurance model, which we have developed to ensure cloud security, is vital to ensure the successful implementation and continued running of the model. We need to understand that with security being such an essential component of business processes, responsibility must lie with the board. The board must be responsible for defining their...
Since the inception of cloud computing, security researchers have been active in addressing the question of cloud information security, which has seen the development of a wide range of technical solutions. The same can be said for non-cloud information security research which has been active for a far longer period of time. Yet, year on year, security breaches continue to increase, both in volume...
This paper reports on a case study that was conducted in a cloud High Performance Computing (HPC) project one that used very sensitive and confidential data. The study aimed to explore the security challenges and practicalities that occur within a cloud HPC project and to develop a method for making critical security decisions. Action research was used to examine the nuances throughout the project...
Color plays a fundamental role in sporting activities, not only as an esthetic element but also for the physiological and psychological effects that it produces on our five senses. Wearing noticeable and identifiable colors when performing sports is important. The visibility of color provides a sense of identity for both the players and their audience, and it may also become a form of security.
The advent of social networks and Internet-of-Things has resulted in unprecedented capability of collecting, sharing and analyzing massive amounts of data. From a security perspective, Big Data may seriously weaken confidentiality, as techniques for improving Big Data analytics performance-including early fusion of heterogeneous data sources — increase the hidden redundancy of data representation,...
A Business Cloud is defined to be a collection of company datasets that are stored on the "Cloud". For simplicity, we have assumed: Each company only has one dataset. There are information flows among these datasets. Within such an environment Chinese Wall Security Policy (CWSP) is revisited. Based on the "physical" view of Brewer and Nash, the Chinese Wall policy that regulates...
The paper considers the market of software products. Regularly this markets are suffering from dealing with a problem of countefeit or pirate products that are sold. Taking this into account the paper is solving the problem of price equilibrium on this market. The software company set the price and the quality of the software product while the countefeit or pirate company suggest the consumers the...
Many companies have recently introduced the concept of BYOD (Bring Your Own Device) for private mobile devices used at work. Accordingly, they are also introducing NAC and MDM systems to prevent the leak of business information, control access and manage users efficiently. As the access control policy of NAC and MDM is uniformly applied to the users, however, security threats remain due to the frequent...
Cloud services are widely used across the globe to store and analyze Big Data. These days it seems the news is full of stories about security breaches to these services, resulting in the exposure of huge amounts of private data. This paper studies the current security threats to Cloud Services, Big Data, and Hadoop. The paper analyzes a newly proposed Big Data security system based on the EnCoRe system...
In this paper, we discuss how using Secondary Non-Admin Privileged (SNAP) accounts can mitigate a variety of attacks targeting privileged accounts. We present our methodology for implementing this approach and discuss how this can prevent a variety of attack-types. We note that other studies have shown that over 92 % of critical vulnerabilities require administrative access and present multiple case-studies...
In today's world, almost every individual uses computational machines for their day to day activities. Contribution of Cloud Computing in our day to day life is commendable. Even a common man has the privilege to use cloud services in the form of email, games, storage and etc., because of Cloud Computing. Cloud services tend to be cheaper and affordable with pay as you use policy. Scalability and...
Cloud computing is applauded as a promising IT solution for SMEs which are generally constrained by limited time, expertise and resources. However cloud implementation is a complex and evolutionary process. It is further complicated by the cloud technological characteristics, organizational contexts and concerns outside an organizational boundary. How can SMEs approach their cloud implementation in...
the development of internet comes with the other domain that is cyber-crime. The record and intelligently can be exposed to a user of illegal activity so that it has become important to make the technology reliable. Phishing techniques include domain of email messages. Phishing emails have hosted such a phishing website, where a click on the URL or the malware code as executing some actions to perform...
The novel theory of investment portfolio optimization under uncertainty is presented based on fuzzy set theory and efficient forecasing methods. The direct problem of fuzzy portfolio optimization and dual problem are considered. In the direct problem structure of a portfolio is determined which provides the maximum profitableness at the given risk level. In dual problem the portfolio structure is...
Over the years, different development waves have shaped the Web. Introduced as a tool to browse Web sites, the Web now is a dynamic and robust platform upon which enterprises conduct e-Business. One of these waves known as Web 2.0 (or social Web) is putting pressure on how enterprises should ensure a productive use of Web 2.0 applications such as Facebook and Twitter. Misuse cases of these applications...
Security related monitoring in high speed backbone networks is still a challenging task, since the amounts of data to process increases continuously. Thus, new approaches need to be investigated to detect and handle attacks in high-speed environments to protect the underlying access lines. Therefore, we introduce a new approach for redirecting suspicious traffic taking advantage of properties of OpenFlow...
The threat of cyber-attacks grows up, as one can see by several negative security-news from companies and private persons. [7] Especially small-and-medium-sized enterprises (SME) are in focus of external attackers because they have not implemented sufficient security strategies and components for their networks yet. Additionally, tablets, smartphones, and netbooks changed the requirements of IT security...
This paper suggests a model to measure e-visibility — the e-Visibility Maturity Model (e-VM model) that is used to assess the visibility of a company or set of companies in the global e-business market. The visibility is measured using company's involvement in electronic interactions with customers that is externalized by the integration of the Social Software (SoS) in its other means of online presence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.