Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
73,829
result(s) for
"Electronic security systems."
Sort by:
Electronic Security Systems
by
Pearson, Robert
in
Business enterprises
,
Business enterprises - Security measures
,
Electronic security systems
2007,2011
Electronic Security Systems is a book written to help the security professional understand the various electronic security functional components and the ways these components interconnect. Providing a holistic approach to solving security issues, this book discusses such topics as integrating electronic functions, developing a system, component philosophy, possible long-term issues, and the culture within a corporation. The book uses a corporate environment as its example; however, the basic issues can be applied to virtually any environment.For a security professional to be effective, he or she needs to understand the electronics as they are integrated into a total security system. Electronic Security Systems allows the professional to do just that, and is an invaluable addition to any security library. * Provides a well-written and concise overview of electronic security systems and their functions* Takes a holistic approach by focusing on the integration of different aspects of electronic security systems* Includes a collection of practical experiences, solutions, and an approach to solving technical problems
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
2009
Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significant threat to organizations. For example, industry statistics suggest that between 50%–75% of security incidents originate from within an organization. Because of the large number of misuse incidents, it has become important to understand how to reduce such behavior. General deterrence theory suggests that certain controls can serve as deterrent mechanisms by increasing the perceived threat of punishment for IS misuse. This paper presents an extended deterrence theory model that combines work from criminology, social psychology, and information systems. The model posits that user awareness of security countermeasures directly influences the perceived certainty and severity of organizational sanctions associated with IS misuse, which leads to reduced IS misuse intention. The model is then tested on 269 computer users from eight different companies. The results suggest that three practices deter IS misuse: user awareness of security policies; security education, training, and awareness (SETA) programs; and computer monitoring. The results also suggest that perceived severity of sanctions is more effective in reducing IS misuse than certainty of sanctions. Further, there is evidence that the impact of sanction perceptions vary based on one's level of morality. Implications for the research and practice of IS security are discussed.
Journal Article
Intent to purchase IoT home security devices: Fear vs privacy
2021
The Internet of Things (IoT) is a widely hyped concept, with its focus on the connection of smart devices to the Internet rather than on people. IoT for consumers is often called the smart home market, and a large part of that market consists of home security devices. Consumers are often motivated to purchase smart home security devices to prevent burglaries, which they fear may lead to damage to their property or threats to their families. However, they also understand that IoT home security devices may be a threat to the privacy of their personal information. To determine the relative roles of fear and privacy concerns in the decision to purchase IoT home security devices, we conducted a survey of American consumers. We used the Theory of Reasoned Action as the theoretical basis for the study. We found that fear positively affected consumer attitudes toward purchasing smart home security devices, while concerns about privacy negatively affected attitudes. We found that attitudes toward purchase, the opinions of important others, and experience with burglaries all affected intent to purchase. We also found that the relationship between privacy concerns and intent to purchase is completely mediated by attitudes, while fear has both direct and indirect effects on intent.
Journal Article
A hybrid security system for drones based on ICMetric technology
by
Alheeti, Khattab M. Ali
,
Khaled Alarfaj, Fawaz
,
Alreshoodi, Mohammed
in
Accelerometers
,
Aircraft
,
Analysis
2023
Recently, the number of drones has increased, and drones’ illegal and malicious use has become prevalent. The dangerous and wasteful effects are substantial, and the probability of attacks is very high. Therefore, an anomaly detection and protection system are needed. This paper aims to design and implement an intelligent anomaly detection system for the security of unmanned aerial vehicles (UAVs)/drones. The proposed system is heavily based on utilizing ICMetric technology to exploit low-level device features for detection. This technology extracts the accelerometer and gyroscope sensors’ bias to create a unique number known as the ICMetric number. Hence, ICMetric numbers represent additional features integrated into the dataset used to detect drones. This study performs the classification using a deep neural network (DNN). The experimental results prove that the proposed system achieves high levels of detection and performance metrics.
Journal Article
Pegasus : how a spy in your pocket threatens the end of privacy, dignity, and democracy
\"Pegasus is widely regarded as the most effective and sought-after cyber-surveillance system on the market. The system's creator, the NSO Group, a private corporation headquartered in Israel, is not shy about proclaiming its ability to thwart terrorists and criminals. \"Thousands of people in Europe owe their lives to hundreds of our company employees,\" NSO's cofounder declared in 2019. This bold assertion may be true, at least in part, but it's by no means the whole story. NSO's Pegasus system has not been limited to catching bad guys. It's also been used to spy on hundreds, and maybe thousands, of innocent people around the world: heads of state, diplomats, human rights defenders, political opponents, and journalists. This spyware is as insidious as it is invasive, capable of infecting a private cell phone without alerting the owner, and of doing its work in the background, in silence, virtually undetectable. Pegasus can track a person's daily movement in real time, gain control of the device's microphones and cameras at will, and capture all videos, photos, emails, texts, and passwords-encrypted or not. This data can be exfiltrated, stored on outside servers, and then leveraged to blackmail, intimidate, and silence the victims. Its full reach is not yet known. \"If they've found a way to hack one iPhone,\" says Edward Snowden, \"they've found a way to hack all iPhones.\" Pegasus is a look inside the monthslong worldwide investigation, triggered by a single spectacular leak of data, and a look at how an international consortium of reporters and editors revealed that cyber intrusion and cyber surveillance are happening with exponentially increasing frequency across the globe, at a scale that astounds. Meticulously reported and masterfully written, Pegasus shines a light on the lives that have been turned upside down by this unprecedented threat and exposes the chilling new ways authoritarian regimes are eroding key pillars of democracy: privacy, freedom of the press, and freedom of speech\"-- Provided by publisher.
Security load frequency control model of interconnected power system based on deception attack
by
Sun, Xin
,
Tang, Qiuhang
,
Lu, Qianyi
in
Biology and Life Sciences
,
Computer and Information Sciences
,
Computer crimes
2024
The interconnected power system connects the power grids of different regions through transmission lines, achieving power interconnection and resource sharing. However, data is transmitted through open power networks and is more susceptible to network attacks. To improve the stability of interconnected power systems under deception attacks, three scenarios of system security load frequency control were studied. Based on the construction of a dynamic model of load frequency control, an event-triggered strategy was used to reduce the communication frequency between nodes, resulting in a reduction in the amount of network transmission data. A sliding mode controller was constructed to solve the problem of event-triggered sliding mode security load frequency control. Elastic event-triggered sliding mode load frequency control for interconnected power systems under mixed attacks. The simulation results showed that using the load frequency control model triggered by events, the load frequency deviation of the interconnected power system can be stabilized at around 12 seconds, effectively saving the cost of network resources. Under the regulation of the load frequency control model based on sliding mode control, the interconnected power system stabilized in 10 seconds, reducing the load of network transmission. The elastic event-triggered sliding mode load frequency control model can ensure stable transmission of power data under various attacks and has good anti-interference performance. The results of this study have played an important role in achieving the stability of power resource supply. Compared with previous studies on individual power systems, this study solves the attack problem of interconnected power systems and considers the frequency control problem of system security loads under mixed attacks, enabling the system to recover stability faster.
Journal Article