75 research outputs found

    A New Fuzzy MCDM Framework to Evaluate E-Government Security Strategy

    Full text link
    Ensuring security of e-government applications and infrastructures is crucial to maintain trust among stakeholders to store, process and exchange information over the e-government systems. Due to dynamic and continuous threats on e-government information security, policy makers need to perform evaluation on existing information security strategy as to deliver trusted e-government services. This paper presents an information security evaluation framework based on new fuzzy multi criteria decision making (MCDM) to help policy makers conduct comprehensive assessment of e-government security strategy.Comment: IEEE 4th International Conference on Application of Information and Communication Technologies AICT201

    Multi-Agent Based Security Framework for E-Government in Recently technology Developed Countries

    Get PDF
    E-Government is an environment where government produces services to citizens electronically, this is beside services to other e-Governments, and one crucial factor regarding the reliability of accepting services provided by e-Government is the security factor. This work is targeting Countries in their developing process that need to develop configurable management model, that capable of adapting security technologies to other factors revealed from the society.  The configuration of this management model will be autonomously built up through the association of three domains presented by this proposal: policies, measures and infrastructure. Along this work; ontology will be built up to accommodate these domains and eventually to grant Agent software the ability to perceive the environment and configure the management model for deploying security technologies. Keywords: Socio-Techno, Java Agent, Security policy, eGovernment, JADE, Ontology, knowledge development

    A Comprehensive Framework for Comparing System Security Assessment Methods

    Get PDF

    Performance Impacts of Information Assurance Alignment

    Get PDF
    Information assurance, as an emerging organizational function, has come to play a strategic role by providing, enterprise-wide, a reliable, safe, and efficient access to information. Aligning information assurance strategy and business strategy has, therefore, become a strategic imperative. This study empirically addressed this alignment concern by exploring ways of measuring the concept of fit between business and information assurance strategies and by investigating the effects of this alignment on business performance. Both research hypotheses were empirically supported by the study’s data, thereby verifying the theoretical proposition of performance impacts of information assurance strategic alignment and testing the concept of fit in favor of the moderation approach

    A Review of Information Systems Security Management: An Integrated Framework

    Get PDF
    As information has been a basic commodity and strategic asset, information systems (IS) security has become increasingly important to organizations. This paper conducts a review on the prior literature that has studied non-technical factors of IS security issues from organizational perspective rather than individual level. Five key concepts are studied: IS security management, organizational factors, human factors, strategic planning, and IS security policies. By integrating the main concepts that are reflected in the literature, this paper proposes an integrated framework which provides a comprehensive look at effective IS security management. Four propositions are developed. This framework is intended to provide guidance for organizations and security practitioners that need to implement their IS security management effectively

    Preserve Imperceptibility and Robustness Performance on Steganography Technique based on StegaSVM-Shifted LBS Model

    Get PDF
    In image steganography, the most popular and widely used techniques is the least significant bit (LSB) that hide data into a cover-image in a spatial and discrete cosine transform (DCT) domain as well.Beside the LSB technique, there is other technique that is also influential i.e support vector machine (SVM) normally used to strengthen the embedding algorithm.Whatever techniques used in the image steganography field,the main purpose is to keep the existence of the secret-message secret.This paper designing the new model is proposed called StegaSVM-Shifted LSB model in DCT domain to preserve the imperceptibility and increase the robustness of stego-images.The StegaSVM-Shifted LSB model that has been proposed that utilize HVS and embedding technique through Shifted LSB showed a good performance

    Improved method for image security based on chaotic-shuffle and chaotic-diffusion algorithms

    Get PDF
    In this paper, we propose to enhance the security performance of the color image encryption algorithm which depends on multi-chaotic systems. The current cryptosystem utilized a pixel-chaotic-shuffle system to encode images, in which the time of shuffling is autonomous to the plain-image. Thus, it neglects to the picked plaintext and known-plaintext attacks. Also, the statistical features of the cryptosystem are not up to the standard. Along these lines, the security changes are encircled to make the above attacks infeasible and upgrade the statistical features also. It is accomplished by altering the pixel-chaotic-shuffle component and including another pixel-chaotic-diffusion system to it. The keys for diffusion of pixels are extracted from the same chaotic arrangements created in the past stage. The renovation investigations and studies are performed to exhibit that the refreshed version of cryptosystem has better statistical features and invulnerable to the picked plaintext and known plaintext attacks than the current algorithm

    Managing Information Risks and Protecting Information Assets in a Web 2.0 Era

    Get PDF
    The growth in volume of digital information arising from business activities presents organisations with the increasingly difficult challenge of protecting their information assets. Failure to protect such information opens up a range of new business risks. The increase in externally hosted services and social networking tools also adds a new layer of complication to achieving information protection. Prior research has recognised the need for a socio-organisational view of information protection, shifting the emphasis from a narrowly defined technical concern to an enterprise-wide, business-led responsibility encompassing strategic and governance issues. We argue that this shift is important but not enough and that greater attention should be given to understanding the nature and complexities of digital business information. In this paper we examine the extent to which existing frameworks for information protection are structured to account for changes in the information environment. Our findings indicate that whilst these frameworks address the need to adopt a broader social and organisational perspective there remain a number of significant limitations in terms of the way the information is treated. To address these limitations we propose a more co-ordinated and information-centric approach to information protection

    Using Business Process Model Awareness to improve Stakeholder Participation in Information Systems Security Risk Management Processes

    Get PDF
    The present paper examines stakeholders\u27 business process model awareness to measure and improve stakeholder participation in information systems security risk management (ISRM) via a multi-method research study at the organizational level. Organizational stakeholders were interviewed to gain an understanding of their awareness of business processes and related security requirements in the context of an ongoing ISRM process. The research model was evaluated in four case studies. The findings indicate that stakeholders\u27 awareness of business process models contributed to an improved ISRM process, better alignment to the business environment and improved elicitation of security requirements. Following current research that considers users as the most important resource in ISRM, this study highlights the importance of involving appropriate stakeholders at the right time during the ISRM process and provides risk managers with decision support for the prioritization of stakeholder participation during ISRM processes to improve results and reduce overhead
    • …
    corecore