140,390 research outputs found

    Dynamics of Data Breaches in Online Social Networks: Understanding Threats to Organizational Information Security Reputation

    Get PDF
    The consequences of data breaches can be severe for the Information Security Reputation (ISR) of organizations. Using social media analytical techniques, this study examines Twitter postings to identify (1) ISR dimensions attributed as being responsible for data breaches and (2) social media sentiments in the aftermath of data breaches. By analyzing tweets related to the data breaches at Home Depot and JPMorgan Chase in 2014, the results suggest that five dimensions of organizational ISR are put into question: Risk and Resilience Structure; Security Ethics and Practices; Structures of Governance and Responsibility; Response Readiness; Social and Moral Benevolence. The attributions and sentiments vary for the five ISR dimensions. Moreover, tweets that attribute data breach responsibility carry more negative sentiments. This study makes an important theoretical contribution by identifying threats to ISR of organizations in social networks. The findings could benefit organizational strategies for social media reputation management and post-data breach intervention

    BcBIM: A Blockchain-Based Big Data Model for BIM Modification Audit and Provenance in Mobile Cloud

    Get PDF
    Building Information Modeling (BIM) is envisioned as an indispensable opportunity in the architecture, engineering, and construction (AEC) industries as a revolutionary technology and process. Smart construction relies on BIM for manipulating information flow, data flow, and management flow. Currently, BIM model has been explored mainly for information construction and utilization, but rare works pay efforts to information security, e.g., critical model audit and sensitive model exposure. Moreover, few BIM systems are proposed to chase after upcoming computing paradigms, such as mobile cloud computing, big data, blockchain, and Internet of Things. In this paper, we make the first attempt to propose a novel BIM system model called bcBIM to tackle information security in mobile cloud architectures. More specifically, bcBIM is proposed to facilitate BIM data audit for historical modifications by blockchain in mobile cloud with big data sharing. The proposed bcBIM model can guide the architecture design for further BIM information management system, especially for integrating BIM cloud as a service for further big data sharing. We propose a method of BIM data organization based on blockchains and discuss it based on private and public blockchain. It guarantees to trace, authenticate, and prevent tampering with BIM historical data. At the same time, it can generate a unified format to support future open sharing, data audit, and data provenance

    The Paper Chase: Securitization, Foreclosure, and the Uncertainty of Mortgage Title

    Get PDF
    The mortgage foreclosure crisis raises legal questions as important as its economic impact. Questions that were straightforward and uncontroversial a generation ago today threaten the stability of a $13 trillion mortgage market: Who has standing to foreclose? If a foreclosure was done improperly, what is the effect? And what is the proper legal method for transferring mortgages? These questions implicate the clarity of title for property nationwide and pose a too-big-to-fail problem for the courts. The legal confusion stems from the existence of competing systems for establishing title to mortgages and transferring those rights. Historically, mortgage title was established and transferred through the public demonstration regimes of UCC Article 3 and land recordation systems. This arrangement worked satisfactorily when mortgages were rarely transferred. Mortgage finance, however, shifted to securitization, which involves repeated bulk transfers of mortgages. To facilitate securitization, deal architects developed alternative contracting regimes for mortgage title: UCC Article 9 and MERS, a private mortgage registry. These new regimes reduced the cost of securitization by dispensing with demonstrative formalities, but at the expense of reduced clarity of title, which raised the costs of mortgage enforcement. This trade-off benefitted the securitization industry at the expense of securitization investors because it became apparent only subsequently with the rise in mortgage foreclosures. The harm, however, has not been limited to securitization investors. Clouded mortgage title has significant negative externalities on the economy as a whole. This Article proposes reconciling the competing title systems through an integrated system of note registration and mortgage recordation, with compliance as a prerequisite to foreclosure. Such a system would resolve questions about standing, remove the potential cloud to real-estate title, and facilitate mortgage financing by clarifying property rights

    AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption

    Full text link
    Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. However, those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned by different users are stored in some cloud servers instead of under their own control. To deal with security problems, various schemes based on the Attribute- Based Encryption (ABE) have been proposed recently. However, the privacy problem of cloud computing is yet to be solved. This paper presents an anonymous privilege control scheme AnonyControl to address the user and data privacy problem in a cloud. By using multiple authorities in cloud computing system, our proposed scheme achieves anonymous cloud data access, finegrained privilege control, and more importantly, tolerance to up to (N -2) authority compromise. Our security and performance analysis show that AnonyControl is both secure and efficient for cloud computing environment.Comment: 9 pages, 6 figures, 3 tables, conference, IEEE INFOCOM 201

    The Paperless Letter of Credit and Related Documents of Title

    Get PDF
    A normative analysis of paperless letters of credit that will categorize the various transactions and delineate the boundaries and relative standing of the competing sets of rules is now appropriate. The analysis will suggest when an official rule is needed and what its character should be

    Harbor Security System

    Get PDF
    Harbors and ports provide the infrastructure for commercial trade and naval facilities. It is vital to ensure the safety of these locations. The Harbor Security System provides an optical ‘gate’ using underwater lasers and photodetectors. This system allows monitoring of both surface and submarine vessels traveling into and out of the harbor. Also, the system provides real time alerts when unauthorized vessels enter the harbor. This project provides a proof of concept for a Harbor Security System to be implemented in Portsmouth Harbor. A scaled model of the detection system was constructed and tested. This detection system is capable of detecting surface and submarine vessels along with their velocity and length. Results of the study showed that the average error of the size estimate was 15% and the average error of the velocity estimation ratio(slope) was 9%
    • …
    corecore