84,670 research outputs found

    Toward optimal multi-objective models of network security: Survey

    Get PDF
    Information security is an important aspect of a successful business today. However, financial difficulties and budget cuts create a problem of selecting appropriate security measures and keeping networked systems up and running. Economic models proposed in the literature do not address the challenging problem of security countermeasure selection. We have made a classification of security models, which can be used to harden a system in a cost effective manner based on the methodologies used. In addition, we have specified the challenges of the simplified risk assessment approaches used in the economic models and have made recommendations how the challenges can be addressed in order to support decision makers

    Towards optimal multi-objective models of network security: survey

    Get PDF
    Information security is an important aspect of a successful business today. However, financial difficulties and budget cuts create a problem of selecting appropriate security measures and keeping networked systems up and running. Economic models proposed in the literature do not address the challenging problem of security countermeasure selection. We have made a classification of security models, which can be used to harden a system in a cost effective manner based on the methodologies used. In addition, we have specified the challenges of the simplified risk assessment approaches used in the economic models and have made recommendations how the challenges can be addressed in order to support decision makers

    Flexible Trade Policies in Agriculture Sectors of Developing Countries: Proposing a Technical Approach for Sri Lanka

    Get PDF
    After two decades of liberalized economic policies together with early accession to WTO, Sri Lanka could not achieve the exp ected fast economic growth. Agriculture growth in particular fell sharply. WTO Doha round expects a deeper liberalization. Instead, we will benefit more from being a friend of the "Development Box" and securing flexibility in tariff revisions. In asserting this, the paper analyzes impacts of liberalized policies on agriculture, stress the need for flexible trade policies and formulate a design for self designating Special Products (SP) and Special Safeguard Mechanisms (SSM). The past economic growth favoured mostly urbanised population. Sluggish rural agricultural growth, hurt with increased food imports, was the main cause of this unbalance development. Therefore the sustainable growth of the agriculture sector, facilitated by some protection, is necessary for equitable economic development. As the country budget restricts domestic support, the SP and SSM modalities would be the most suitable protective tools. WTO Hong Kong meeting allows flexibility in tariff schedules to address rural development (RD), food security (FS) and livelihood security (LS) needs through protection. The study identified appropriate criteria to designate agriculture products contributing to RD, FS, and LS for protection from dumping and import surges. The study recommends SP and also Volume and Price triggers for products as appropriate to invoke SSM for Sri Lanka.Sri Lanka, trade liberalization, market access, special products, special safeguard mechanisms, International Relations/Trade,

    Consumer attitudes and preference exploration towards fresh-cut salads using best–worst scaling and latent class analysis

    Get PDF
    This research explored the preferences and buying habits of a sample of 620 consumers of fresh-cut, ready-to-eat salads. A best–worst scaling approach was used to measure the level of preference stated by individuals regarding 12 attributes for quality (intrinsic, extrinsic and credence) of fresh-cut salads. The experiment was carried out through direct interviews at several large-scale retail outlets in the Turin metropolitan area (north-west of Italy). Out of the total number of questioned consumers, 35% said they did not consume fresh-cut salads. On the contrary, the rest of the involved sample expressed the highest degree of preference towards the freshness/appearance attribute, followed by the expiration date and the brand. On the contrary, attributes such as price, organic certification and food safety did not emerge as discriminating factors in consumer choices. Additionally, five clusters of consumers were identified, whose preferences are related both to purchasing styles and socio-demographic variables. In conclusion, this research has highlighted the positive attitude of consumers towards quality products backed by a brand, providing ideas for companies to improve within this sector and implement strategies to answer the needs of a new segment of consumers, by determining market opportunities that aim to strengthen local brands

    Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users

    Get PDF
    Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension. As a definable cohort, the elderly generally lack awareness of current security threats, and remain under-educated in terms of applying appropriate controls and safeguards to their computers and networking devices. This paper identifies that web-based computer security information sources do not adequately provide helpful information to senior citizen end-users in terms of both design and content

    Public Welfare Administration Under the Social Security Act

    Get PDF

    A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem

    Get PDF
    Budget cuts and the high demand in strengthening the security of computer systems and services constitute a challenge. Poor system knowledge and inappropriate selection of security measures may lead to unexpected financial and data losses. This paper proposes a novel Risk Assessment and Optimisation Model (RAOM) to solve a security countermeasure selection problem, where variables such as financial cost and risk may affect a final decision. A Multi-Objective Tabu Search (MOTS) algorithm has been developed to construct an efficient frontier of non-dominated solutions, which can satisfy organisational security needs in a cost-effective manner
    • …
    corecore