324,497 research outputs found

    How explicit are the barriers to failure in safety arguments?

    Get PDF
    Safety cases embody arguments that demonstrate how safety properties of a system are upheld. Such cases implicitly document the barriers that must exist between hazards and vulnerable components of a system. For safety certification, it is the analysis of these barriers that provide confidence in the safety of the system. The explicit representation of hazard barriers can provide additional insight for the design and evaluation of system safety. They can be identified in a hazard analysis to allow analysts to reflect on particular design choices. Barrier existence in a live system can be mapped to abstract barrier representations to provide both verification of barrier existence and a basis for quantitative measures between the predicted barrier behaviour and performance of the actual barrier. This paper explores the first stage of this process, the binding between explicit mitigation arguments in hazard analysis and the barrier concept. Examples from the domains of computer-assisted detection in mammography and free route airspace feasibility are examined and the implications for system certification are considered

    UK’s Implementation of the Anti-Circumvention Provisions of the EU Copyright Directive: An Analysis

    Get PDF
    The debate surrounding utilization of technological protection measures to secure copyrighted works in the digital arena has raised many an eyebrow in the past few years. Technological protection measures are broadly bifurcated into two categories: access control measures such as cryptography, passwords and digital signatures that secure the access to information and protected content, and copy control measures such as the serial copy management system for audio digital taping devices and content scrambling systems for DVDs that prevent third parties from exploiting the exclusive rights of the copyright owners. Copyright owners have been wary of the digital environment to exploit and distribute their works and therefore employ technological protection measures, whereas consumers and proponents of free speech favor the free and unrestricted access, use and dissemination of copyrighted works digitally

    A descriptive review and classification of organizational information security awareness research

    Get PDF
    Information security awareness (ISA) is a vital component of information security in organizations. The purpose of this research is to descriptively review and classify the current body of knowledge on ISA. A sample of 59 peer-reviewed academic journal articles, which were published over the last decade from 2008 to 2018, were analyzed. Articles were classified using coding techniques from the grounded theory literature-review method. The results show that ISA research is evolving with behavioral research studies still being explored. Quantitative empirical research is the dominant methodology and the top three theories used are general deterrence theory, theory of planned behavior, and protection motivation theory. Future research could focus on qualitative approaches to provide greater depth of ISA understanding
    • …
    corecore