Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
27,266 result(s) for "Security clearances"
Sort by:
Screening the system : exposing security clearance dangers
\"Screening the System shows how security clearance practices, including everything from background checks and fingerprinting to urinalysis and the polygraph, provide insight into the way we think about privacy, national security, patriotism, and the state\"-- Provided by publisher.
Bridging the Security Gap in SDLC: Challenges and Solutions for Local IT Firms in Bangladesh
Local IT companies in Bangladesh struggle to incorporate security measures throughout their software development processes. We surveyed 15 tech professionals from 14 different Bangladeshi firms—ranging from top executives to entry-level programmers—to understand their security challenges. Their responses revealed ongoing problems with SQL attacks, authentication weaknesses, and risks from external code libraries. Looking deeper it was found that many professionals know about security best practices; however, they rarely implement them effectively. Many companies seem to be merely checking compliance boxes rather than building genuinely secure systems. Current approaches rely heavily on traditional methods like code reviews and penetration testing, with newer techniques largely absent. To address these shortcomings, we suggest several budget-friendly approaches: using free automated testing tools, building security checks into development workflows, implementing no-cost multi-factor authentication, creating in-house security training programs, working with government agencies to develop better policies, and leveraging affordable cloud security options. Our findings offer practical guidance for Bangladeshi software companies looking to enhance security without breaking the bank.
So far, so good
There are many ways to categorize work-related stressors, and in recent years, a common distinction in occupational health psychology is between stressors viewed as challenges versus hindrances. Is this a useful conceptualization that provides practical and theoretical implications for IO psychologists? As Kurt Lewin famously prescribed, “there is nothing so practical as a good theory,” and we discuss the challenge–hindrance framework as a developing theory that can be useful for researchers and practitioners. We note that some of the early thinking and development of the challenge–hindrance distinction relied on both resource and appraisal theories of stress. Overall, we find that the challenge–hindrance distinction can be viewed as a framework that is useful by producing interesting, valuable, and innovative research. Simply striving to find meaningful and useful categorizations of stressors can lead us to discover new insights into the occupational stress domain, and the challenge–hindrance categories have already spurred a great deal of research.
Augmented Reality (AR) and Cyber-Security for Smart Cities—A Systematic Literature Review
Augmented Reality (AR) and cyber-security technologies have existed for several decades, but their growth and progress in recent years have increased exponentially. The areas of application for these technologies are clearly heterogeneous, most especially in purchase and sales, production, tourism, education, as well as social interaction (games, entertainment, communication). Essentially, these technologies are recognized worldwide as some of the pillars of the new industrial revolution envisaged by the industry 4.0 international program, and are some of the leading technologies of the 21st century. The ability to provide users with required information about processes or procedures directly into the virtual environment is archetypally the fundamental factor in considering AR as an effective tool for different fields. However, the advancement in ICT has also brought about a variety of cybersecurity challenges, with a depth of evidence anticipating policy, architectural, design, and technical solutions in this very domain. The specific applications of AR and cybersecurity technologies have been described in detail in a variety of papers, which demonstrate their potential in diverse fields. In the context of smart cities, however, there is a dearth of sources describing their varied uses. Notably, a scholarly paper that consolidates research on AR and cybersecurity application in this context is markedly lacking. Therefore, this systematic review was designed to identify, describe, and synthesize research findings on the application of AR and cybersecurity for smart cities. The review study involves filtering information of their application in this setting from three key databases to answer the predefined research question. The keynote part of this paper provides an in-depth review of some of the most recent AR and cybersecurity applications for smart cities, emphasizing potential benefits, limitations, as well as open issues which could represent new challenges for the future. The main finding that we found is that there are five main categories of these applications for smart cities, which can be classified according to the main articles, such as tourism, monitoring, system management, education, and mobility. Compared with the general literature on smart cities, tourism, monitoring, and maintenance AR applications appear to attract more scholarly attention.
Screening the System
pThe Personnel Security Clearance System-the process by which the federal government incorporates individuals into secret national-security work-is flawed. After twenty-three years of federal service, Martha Louise Deutscher explores the current system and the amount of power afforded to the state in contrast to that afforded to those who serve it. Deutscher's timely examination of the U.S. screening system shows how security clearance practices, including everything from background checks and fingerprinting to urinalysis and the polygraph, shape and transform those individuals who are subject to them. By bringing participants' testimonies to light, Deutscher looks at the efficacy of various practices while extracting revealing cultural insights into the way we think about privacy, national security, patriotism, and the state. In addition to exposing the stark realities of a system that is in critical need of rethinking, emScreening the System/em provides recommendations for a more effective method that will be of interest to military and government professionals as well as policymakers and planners who work in support of U.S. national security. /p
Model for assessing personnel security of enterprises in the agro-industrial complex
The article briefly examines the models and methods for assessing personnel security, highlighting their shortcomings. For enterprises of the agro-industrial complex, an additive-multiplicative assessment model has been developed. The factors influencing the personnel security of the agro-industrial complex enterprises, as well as the indicators of their assessment, are revealed. Distribution of factors is carried out according to two components of the model - additive and multiplicative.
The future is yesterday: Use of AI-driven facial recognition to enhance value in the travel and tourism industry
This study aims to investigate the role of artificial intelligence (AI) driven facial recognition to enhance a value proposition by influencing different areas of services in the travel and tourism industry. We adopted semi-structured interviews to derive insights from 26 respondents. Thematic analysis reveals the development of four main themes (personalization, data-driven service offering, security and safety, and seamless payments). Further, we mapped the impact of AI- driven facial recognition to enhance value and experience for corporate guests. Findings indicate that AI-based facial recognition can facilitate the travel and tourism industry in understanding travelers’ needs, optimization of service offers, and value-based services, whereas data-driven services can be realized in the form of customized trip planning, email, and calendar integration, and quick bill summarization. This contributes to strengthening the tourism literature through the lens of organizational information processing theory.
Crowdsourcing Framework for Security Testing and Verification of Industrial Cyber-Physical Systems
With the widespread deployment of Industrial Cyber-Physical Systems (ICPS), their inherent vulnerabilities have increasingly exposed them to sophisticated cybersecurity threats. Although existing protective mechanisms can block attacks at runtime, the risk of defense failure remains. To proactively evaluate and harden ICPS security, we design a distributed crowdsourced testing platform tailored to the four-layer cloud ICPS architecture—spanning the workshop, factory, enterprise, and external network layers. Building on this architecture, we develop a Distributed Input–Output Testing and Verification Framework (DIOTVF) that models ICPS as systems with spatially separated injection and observation points, and supports controllable communication delays and multithreaded parallel execution. The framework incorporates a dynamic test–task management model, an asynchronous concurrent testing mechanism, and an optional LLM-assisted thread controller, enabling efficient scheduling of large testing workloads under asynchronous network conditions. We implement the proposed framework in a prototype platform and deploy it on a virtualized ICPS testbed with configurable delay characteristics. Through a series of experimental validations, we demonstrate that the proposed framework can improve testing and verification speed by approximately 2.6 times compared to Apache JMeter.
Authenticated Timing Protocol Based on Galileo ACAS
Global navigation satellite systems (GNSSs) provide accurate positioning and timing services in a large gamut of sectors, including financial institutions, Industry 4.0, and Internet of things (IoT). Any industrial system involving multiple devices interacting and/or coordinating their functionalities needs accurate, dependable, and trustworthy time synchronization, which can be obtained by using authenticated GNSS signals. However, GNSS vulnerabilities to time-spoofing attacks may cause security issues for their applications. Galileo is currently developing new services aimed at providing increased security and robustness against attacks, such as the open service navigation message authentication (OS-NMA) and commercial authentication service (CAS). In this paper, we propose a robust and secure timing protocol that is independent of external time sources, and solely relies on assisted commercial authentication service (ACAS) and OS-NMA features. We analyze the performance of the proposed timing protocol and discuss its security level in relation to malicious attacks. Lastly, experimental tests were conducted to validate the proposed protocol.
Decision-making in the recommendation system of personnel security of the company
The paper provides an assessment of personal’s reliability in the personnel security system of a company. The analysis of existing solutions in various industries is carried out. The stages of assessment and levels of reliability are shown.