Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
135,490 result(s) for "security issues"
Sort by:
Home at last
\"After Lester is adopted from his foster home by Daddy Albert and Daddy Rich, he can't fall asleep in his new bed. What will it take to make Lester feel home at last?\" -- Provided by publisher.
Cloud-connected flying edge computing for smart agriculture
Due to recent advancements and the success of versatile mobile applications, more and more services around the globe are being moved to the cloud. As a result, its limitations have become more evident. The major issues that cloud-based applications face include large latency, bottlenecks because of central processing, compromised security, and lack of offline processing. The drawbacks of cloud computing are reduced by fog and edge computing, where data are processed near the places where it is generated—at network edges or fog nodes—most importantly in a distributed way. Smart agriculture is an approach based on the Internet of Things (IoT) where cloud computing is not an option as the internet is usually not available at remote sites. In addition, pure edge computing also is not practical, as most sensor nodes are very small and they do not have enough computing power. Intermediate fog computing also is not a good choice, as fixed fog nodes (getaway nodes) do not work well with high node fluctuation caused by bad weather or harsh conditions. Considering these issues and limitations, we have proposed the idea of flying edge computing where an unmanned aerial vehicle (UAV) acts as an edge-computing machine. This can be an ideal solution for smart agriculture, given the size and remoteness of many agricultural areas. This technique can be called “wind or breeze computing” because the data are “blown” or moved by the current of computing. The Flying-Edge offers fast deployment of edge facilities in challenging locations and it can be a major step to accomplish the goal of IoT-based smart agriculture.
Deluxe Jim Crow : civil rights and American health policy, 1935-1954
\"Plagued by geographic isolation, poverty, and acute shortages of health professionals and hospital beds, the South was dubbed by Surgeon General Thomas Parran \"the nation's number one health problem.\" The improvement of southern, rural, and black health would become a top priority of the U.S. Public Health Service during the Roosevelt and Truman administrations.Karen Kruse Thomas details how NAACP lawsuits pushed southern states to equalize public services and facilities for blacks just as wartime shortages of health personnel and high rates of draft rejections generated broad support for health reform. Southern Democrats leveraged their power in Congress and used the war effort to call for federal aid to uplift the South. The language of regional uplift, Thomas contends, allowed southern liberals to aid blacks while remaining silent on race. Reformers embraced, at least initially, the notion of \"deluxe Jim Crow\"--support for health care that maintained segregation. Thomas argues that this strategy was, in certain respects, a success, building much-needed hospitals and training more black doctors.By the 1950s, deluxe Jim Crow policy had helped to weaken the legal basis for segregation. Thomas traces this transformation at the national level and in North Carolina, where \"deluxe Jim Crow reached its fullest potential.\" This dual focus allows her to examine the shifting alliances--between blacks and liberal whites, southerners and northerners, activists and doctors--that drove policy. Deluxe Jim Crow provides insight into a variety of historical debates, including the racial dimensions of state building, the nature of white southern liberalism, and the role of black professionals during the long civil rights movement\"-- Provided by publisher.
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
Many organizations recognize that their employees, who are often considered the weakest link in information security, can also be great assets in the effort to reduce risk related to information security. Since employees who comply with the information security rules and regulations of the organization are the key to strengthening information security, understanding compliance behavior is crucial for organizations that want to leverage their human capital. This research identifies the antecedents of employee compliance with the information security policy (ISP) of an organization. Specifically, we investigate the rationality-based factors that drive an employee to comply with requirements of the ISP with regard to protecting the organization's information and technology resources. Drawing on the theory of planned behavior, we posit that, along with normative belief and self-efficacy, an employee's attitude toward compliance determines intention to comply with the ISP. As a key contribution, we posit that an employee's attitude is influenced by benefit of compliance, cost of compliance, and cost of noncompliance, which are beliefs about the overall assessment of consequences of compliance or noncompliance. We then postulate that these beliefs are shaped by the employee's outcome beliefs concerning the events that follow compliance or noncompliance: benefit of compliance is shaped by intrinsic benefit, safety of resources, and rewards, while cost of compliance is shaped by work impediment; and cost of noncompliance is shaped by intrinsic cost, vulnerability of resources, and sanctions. We also investigate the impact of information security awareness (ISA) on outcome beliefs and an employee's attitude toward compliance with the ISP. Our results show that an employee's intention to comply with the ISP is significantly influenced by attitude, normative beliefs, and self-efficacy to comply. Outcome beliefs significantly affect beliefs about overall assessment of consequences, and they, in turn, significantly affect an employee's attitude. Furthermore, ISA positively affects both attitude and outcome beliefs. As the importance of employees' following their organizations' information security rules and regulations increases, our study sheds light on the role of ISA and compliance-related beliefs in an organization's efforts to encourage compliance.
Security and Privacy Issues in Cloud Computing
The idea of Cloud Computing (CC) provides dynamically scalable services that are delivered over the Internet as a service. The key driver of the cloud is economic benefits, as it aims to minimize capital expenditure as well as operating expenditure. There are still some problems to be overcome in order for this to become reality. One of the important issue is security and privacy concerns, which has been addressed by many researchers but still the problem persist. Security assurance is an important driver for cloud adoption and for increasing cloud deployment. To provide a detailed overview of existing cloud security challenges and mitigation strategies, this paper provides a comprehensive survey of underlying cloud security and privacy issues and concerns along with countermeasures. Further; as a contribution in research, we have provided a framework to address the security and privacy concerns in CC. Proposed framework uses hybrid authentication mechanism for the security of CC. The study provides a deeper insight to the researchers and practitioners about CC and underlying security and privacy concerns along with countermeasures and a novel solution.
A comprehensive and systematic literature review on intrusion detection systems in the internet of medical things: current status, challenges, and opportunities
The increasing number of medical devices in the Internet of Medical Things (IoMT) environment has raised significant cybersecurity concerns. These devices often have weak security features, poor design, and insufficient authentication protocols, making them vulnerable to cyberattacks and intrusions. To mitigate these threats, robust security measures are essential. This includes implementing strong security protocols, ensuring continuous security monitoring, enforcing regular updates, and maintaining a constant response plan. Additionally, designing an effective Intrusion Detection System (IDS) is crucial to safeguard patient data and devices. This paper systematically studies the current state of the literature and the essential methods for intrusion detection in the IoMT. Employing a selection process, the paper identifies 28 critical studies published between 2018 and April 2024. The intrusion detection mechanisms in the IoMT are divided into five categories: IDS based on artificial intelligence models, datasets used in IoMT for IDS, fundamental security requirements, intrusion detection processes, and evaluation metrics. This paper dissects the various mechanisms within each category in a meticulous and comprehensive analysis. Finally, the paper examines the challenges and open issues in developing IDSs in IoMT. By offering a roadmap for researchers to enhance IDSs in the IoMT, this paper has the potential to significantly impact the fields of computer engineering, cybersecurity, and healthcare, thereby contributing to the advancement of these crucial fields.
THE IMPLICATIONS OF SECURITISING HEALTH CRISES: THE CASE OF SOUTHEAST ASIA
This article examined the consequences of linking health as a regional security issue. Securitisation Theory (hereinafter ST) is an innovative approach to understand how Non-Traditional Security (from now on NTS) is deemed as a posing threat to a referent object. Prioritising NTS issue as a security threat enables the issue to receive a higher degree of importance from policymakers, thereby gathering the resources needed in dealing with the threat. However, addressing NTS issues also bring negative implications; it can divert attention from more concerning issues. This article, therefore, investigated the consequences of securitising health issues at the Southeast Asian level. This was done through triangulating academic materials, ASEAN’s official statements, and semi-structured elite interviews on Southeast Asian health policy discourses between 1967 and 2010. This study argues that while there are some disadvantages to regional efforts in constructing pandemic disease as a regional security threat, the advantages of such a move outweighs the drawbacks, particularly in terms of establishing regional health mechanisms.
Information security and technical issues of cloud storage services: a qualitative study on university students in Hong Kong
PurposeAlthough cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of academic users regarding cloud security and technical issues and how such problems may influence their continuous use in daily life.Design/methodology/approachThis qualitative study used a semi-structured interview approach comprising six main open-ended questions to explore the information security and technical issues for the continuous use of cloud storage services by 20 undergraduate students in Hong Kong.FindingsThe analysis revealed cloud storage service users' major security and technical concerns, particularly synchronization and backup issues, were the most significant technical barrier to the continuing personal use of cloud storage services.Originality/valueExisting literature has focused on how cloud computing services could bring benefits and security and privacy-related risks to organizations rather than security and technical issues of personal use, especially in the Asian academic context.
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
End users are said to be \"the weakest link\" in information systems (IS) security management in the workplace. They often knowingly engage in certain insecure uses of IS and violate security policies without malicious intentions. Few studies, however, have examined end user motivation to engage in such behavior. To fill this research gap, in the present study we propose and test empirically a nonmalicious security violation (NMSV) model with data from a survey of end users at work. The results suggest that utilitarian outcomes (relative advantage for job performance, perceived security risk), normative outcomes (workgroup norms), and self-identity outcomes (perceived identity match) are key determinants of end user intentions to engage in NMSVs. In contrast, the influences of attitudes toward security policy and perceived sanctions are not significant. This study makes several significant contributions to research on security-related behavior by (1) highlighting the importance of job performance goals and security risk perceptions on shaping user attitudes, (2) demonstrating the effect of workgroup norms on both user attitudes and behavioral intentions, (3) introducing and testing the effect of perceived identity match on user attitudes and behavioral intentions, and (4) identifying nonlinear relationships between constructs. This study also informs security management practices on the importance of linking security and business objectives, obtaining user buy-in of security measures, and cultivating a culture of secure behavior at local workgroup levels in organizations.
Sizing Up Repo
To understand which short-term debt markets experienced \"runs\" during the financial crisis, we analyze a novel data set of repurchase agreements (repo), that is, loans between nonbank cash lenders and dealer banks collateralized with securities. Consistent with a run, repo volume backed by private asset-backed securities falls to near zero in the crisis. However, the reduction is only $182 billion, which is small relative to the stock of private asset-backed securities as well as the contraction in asset-backed commercial paper. While the repo contraction is small in aggregate, it disproportionately affected a few dealer banks.