Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
73,829 result(s) for "Electronic security systems."
Sort by:
Electronic Security Systems
Electronic Security Systems is a book written to help the security professional understand the various electronic security functional components and the ways these components interconnect. Providing a holistic approach to solving security issues, this book discusses such topics as integrating electronic functions, developing a system, component philosophy, possible long-term issues, and the culture within a corporation. The book uses a corporate environment as its example; however, the basic issues can be applied to virtually any environment.For a security professional to be effective, he or she needs to understand the electronics as they are integrated into a total security system. Electronic Security Systems allows the professional to do just that, and is an invaluable addition to any security library. * Provides a well-written and concise overview of electronic security systems and their functions* Takes a holistic approach by focusing on the integration of different aspects of electronic security systems* Includes a collection of practical experiences, solutions, and an approach to solving technical problems
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significant threat to organizations. For example, industry statistics suggest that between 50%–75% of security incidents originate from within an organization. Because of the large number of misuse incidents, it has become important to understand how to reduce such behavior. General deterrence theory suggests that certain controls can serve as deterrent mechanisms by increasing the perceived threat of punishment for IS misuse. This paper presents an extended deterrence theory model that combines work from criminology, social psychology, and information systems. The model posits that user awareness of security countermeasures directly influences the perceived certainty and severity of organizational sanctions associated with IS misuse, which leads to reduced IS misuse intention. The model is then tested on 269 computer users from eight different companies. The results suggest that three practices deter IS misuse: user awareness of security policies; security education, training, and awareness (SETA) programs; and computer monitoring. The results also suggest that perceived severity of sanctions is more effective in reducing IS misuse than certainty of sanctions. Further, there is evidence that the impact of sanction perceptions vary based on one's level of morality. Implications for the research and practice of IS security are discussed.
Intent to purchase IoT home security devices: Fear vs privacy
The Internet of Things (IoT) is a widely hyped concept, with its focus on the connection of smart devices to the Internet rather than on people. IoT for consumers is often called the smart home market, and a large part of that market consists of home security devices. Consumers are often motivated to purchase smart home security devices to prevent burglaries, which they fear may lead to damage to their property or threats to their families. However, they also understand that IoT home security devices may be a threat to the privacy of their personal information. To determine the relative roles of fear and privacy concerns in the decision to purchase IoT home security devices, we conducted a survey of American consumers. We used the Theory of Reasoned Action as the theoretical basis for the study. We found that fear positively affected consumer attitudes toward purchasing smart home security devices, while concerns about privacy negatively affected attitudes. We found that attitudes toward purchase, the opinions of important others, and experience with burglaries all affected intent to purchase. We also found that the relationship between privacy concerns and intent to purchase is completely mediated by attitudes, while fear has both direct and indirect effects on intent.
A hybrid security system for drones based on ICMetric technology
Recently, the number of drones has increased, and drones’ illegal and malicious use has become prevalent. The dangerous and wasteful effects are substantial, and the probability of attacks is very high. Therefore, an anomaly detection and protection system are needed. This paper aims to design and implement an intelligent anomaly detection system for the security of unmanned aerial vehicles (UAVs)/drones. The proposed system is heavily based on utilizing ICMetric technology to exploit low-level device features for detection. This technology extracts the accelerometer and gyroscope sensors’ bias to create a unique number known as the ICMetric number. Hence, ICMetric numbers represent additional features integrated into the dataset used to detect drones. This study performs the classification using a deep neural network (DNN). The experimental results prove that the proposed system achieves high levels of detection and performance metrics.
Pegasus : how a spy in your pocket threatens the end of privacy, dignity, and democracy
\"Pegasus is widely regarded as the most effective and sought-after cyber-surveillance system on the market. The system's creator, the NSO Group, a private corporation headquartered in Israel, is not shy about proclaiming its ability to thwart terrorists and criminals. \"Thousands of people in Europe owe their lives to hundreds of our company employees,\" NSO's cofounder declared in 2019. This bold assertion may be true, at least in part, but it's by no means the whole story. NSO's Pegasus system has not been limited to catching bad guys. It's also been used to spy on hundreds, and maybe thousands, of innocent people around the world: heads of state, diplomats, human rights defenders, political opponents, and journalists. This spyware is as insidious as it is invasive, capable of infecting a private cell phone without alerting the owner, and of doing its work in the background, in silence, virtually undetectable. Pegasus can track a person's daily movement in real time, gain control of the device's microphones and cameras at will, and capture all videos, photos, emails, texts, and passwords-encrypted or not. This data can be exfiltrated, stored on outside servers, and then leveraged to blackmail, intimidate, and silence the victims. Its full reach is not yet known. \"If they've found a way to hack one iPhone,\" says Edward Snowden, \"they've found a way to hack all iPhones.\" Pegasus is a look inside the monthslong worldwide investigation, triggered by a single spectacular leak of data, and a look at how an international consortium of reporters and editors revealed that cyber intrusion and cyber surveillance are happening with exponentially increasing frequency across the globe, at a scale that astounds. Meticulously reported and masterfully written, Pegasus shines a light on the lives that have been turned upside down by this unprecedented threat and exposes the chilling new ways authoritarian regimes are eroding key pillars of democracy: privacy, freedom of the press, and freedom of speech\"-- Provided by publisher.
Security load frequency control model of interconnected power system based on deception attack
The interconnected power system connects the power grids of different regions through transmission lines, achieving power interconnection and resource sharing. However, data is transmitted through open power networks and is more susceptible to network attacks. To improve the stability of interconnected power systems under deception attacks, three scenarios of system security load frequency control were studied. Based on the construction of a dynamic model of load frequency control, an event-triggered strategy was used to reduce the communication frequency between nodes, resulting in a reduction in the amount of network transmission data. A sliding mode controller was constructed to solve the problem of event-triggered sliding mode security load frequency control. Elastic event-triggered sliding mode load frequency control for interconnected power systems under mixed attacks. The simulation results showed that using the load frequency control model triggered by events, the load frequency deviation of the interconnected power system can be stabilized at around 12 seconds, effectively saving the cost of network resources. Under the regulation of the load frequency control model based on sliding mode control, the interconnected power system stabilized in 10 seconds, reducing the load of network transmission. The elastic event-triggered sliding mode load frequency control model can ensure stable transmission of power data under various attacks and has good anti-interference performance. The results of this study have played an important role in achieving the stability of power resource supply. Compared with previous studies on individual power systems, this study solves the attack problem of interconnected power systems and considers the frequency control problem of system security loads under mixed attacks, enabling the system to recover stability faster.