266,566 research outputs found

    Dynamics of Data Breaches in Online Social Networks: Understanding Threats to Organizational Information Security Reputation

    Get PDF
    The consequences of data breaches can be severe for the Information Security Reputation (ISR) of organizations. Using social media analytical techniques, this study examines Twitter postings to identify (1) ISR dimensions attributed as being responsible for data breaches and (2) social media sentiments in the aftermath of data breaches. By analyzing tweets related to the data breaches at Home Depot and JPMorgan Chase in 2014, the results suggest that five dimensions of organizational ISR are put into question: Risk and Resilience Structure; Security Ethics and Practices; Structures of Governance and Responsibility; Response Readiness; Social and Moral Benevolence. The attributions and sentiments vary for the five ISR dimensions. Moreover, tweets that attribute data breach responsibility carry more negative sentiments. This study makes an important theoretical contribution by identifying threats to ISR of organizations in social networks. The findings could benefit organizational strategies for social media reputation management and post-data breach intervention

    The Effect of Network Structure on the Provision of Security

    Get PDF
    The term “security” has many more dimensions in the post-9/11 world than it had during the Cold War. Threats may come from different sources, at different speeds, and have different targets. All the actors involved in the provision of security from a specific type of threat create a network—not just states or states in intergovernmental organizations, but all the actors in the “ecosystem. If we look at the relationships among these actors using network analysis, we should be able to map the structure of the entire network. Contrary to the assumptions in most International Relations literature, networks can be centralized (as in hierarchical states) or not, as in markets. The networks transnational actors have created to meet different threats exhibit different structures, from dense and highly centralized to diffuse and dispersed. The network’s structure may thus have a positive or negative effect on the provision of security, depending on the type of threat that is to be met

    Security governance and networks: New theoretical perspectives in transatlantic security

    Get PDF
    The end of the Cold War has not only witnessed the rise of new transnational threats such as terrorism, crime, proliferation and civil war; it has also seen the growing role of non-state actors in the provision of security in Europe and North America. Two concepts in particular have been used to describe these transformations: security governance and networks. However, the differences and potential theoretical utility of these two concepts for the study of contemporary security have so far been under-examined. This article seeks to address this gap. It proposes that security governance can help to explain the transformation of Cold War security structures, whereas network analysis is particularly useful for understanding the relations and interactions between public and private actors in the making and implementation of national and international security policies

    Sparse Signal Processing Concepts for Efficient 5G System Design

    Full text link
    As it becomes increasingly apparent that 4G will not be able to meet the emerging demands of future mobile communication systems, the question what could make up a 5G system, what are the crucial challenges and what are the key drivers is part of intensive, ongoing discussions. Partly due to the advent of compressive sensing, methods that can optimally exploit sparsity in signals have received tremendous attention in recent years. In this paper we will describe a variety of scenarios in which signal sparsity arises naturally in 5G wireless systems. Signal sparsity and the associated rich collection of tools and algorithms will thus be a viable source for innovation in 5G wireless system design. We will discribe applications of this sparse signal processing paradigm in MIMO random access, cloud radio access networks, compressive channel-source network coding, and embedded security. We will also emphasize important open problem that may arise in 5G system design, for which sparsity will potentially play a key role in their solution.Comment: 18 pages, 5 figures, accepted for publication in IEEE Acces

    How does militant violence diffuse in regions? Regional conflict systems in international relations and peace and conflict studies

    Get PDF
    Regional conflict systems are characterised by their complexity of actors, causes, structural conditions and dynamics. Such complexity poses difficulties to those looking to undertake scientific analysis of the regional dynamics of violence. It is still quite unclear how militant violence diffuses in regions and under which conditions a regional conflict system can emerge. This review of existing approaches to regional conflict dynamics in international studies and peace and conflict studies focuses on how the regional conflict dynamics and the causal mechanisms behind the development of regional conflict systems are dealt with, considering process dynamics in space and time as well as in the interactions between possible causal factors. The primary gaps in existing research are identified and possible new research directions sketched out.Regional conflict systems are characterised by their complexity of actors, causes, structural conditions and dynamics. Such complexity, however, poses difficulties to those looking to undertake scientific analysis of these processes. In the present paper existing approaches to regional conflict dynamics in international studies and peace and conflict studies are reviewed. Of particular interest is the question how these approaches dealt with regional violence in areas with limited or no statehood as this is one of the striking conditions for the emergence and diffusion of regional conflict systems. Starting from this question, the main research gaps that exist in the current literature on regional conflicts will be detected. Furthermore, new research directions will be pointed out

    Development of an integrated remote monitoring technique and its application to para-stressing bridge system

    Get PDF
    Bridge monitoring system via information technology is capable of providing more accurate knowledge of bridge performance characteristics than traditional strategies. This paper describes not only an integrated Internet monitoring system that consists of a stand-alone monitoring system (SMS) and a Web-based Internet monitoring system (IMS) for bridge maintenance but also its application to para-stressing bridge system as an intelligent structure. IMS, as a Web-based system, is capable of addressing the remote monitoring by introducing measuring information derived from SMS into the system through Internet or intranet connected by either PHS or LAN. Moreover, the key functions of IMS such as data management system, condition assessment, and decision making with the proposed system are also introduced in this paper. Another goal of this study is to establish the framework of a para-stressing bridge system which is an intelligent bridge by integrating the bridge monitoring information into the system to control the bridge performance automatically.Peer ReviewedPostprint (published version
    • 

    corecore