285,552 research outputs found
Adolescent beliefs about antisocial behavior : mediators and moderators of links with parental monitoring and attachment
The current study examined whether parental monitoring and attachment were related to
adolescent beliefs about antisocial acts, with temperament, gender, and age considered as
potential moderators. A total of 7135 adolescents, aged 14-18 years, completed selfreport
measures of antisocial beliefs, parental monitoring, attachment security, and
temperament. Results indicate that both attachment security and parental monitoring are
associated with adolescent beliefs about antisocial behaviour. It also appears that the two aspects of parenting are complementary, in that a secure attachment relationship is
associated with greater parental monitoring knowledge, which in turn is linked with a
lower tolerance for antisocial behaviour. However, the relations between these aspects of
parenting and beliefs about antisocial acts depended on the young people’s
characteristics, with some results varying by age, gender and temperament. Implications
for future research and parent-focused interventions to prevent antisocial beliefs and
behaviour are discussed.peer-reviewe
S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard
Nowadays, mobile banking becomes a popular tool which consumers can conduct
financial transactions such as shopping, monitoring accounts balance,
transferring funds and other payments. Consumers dependency on mobile needs,
make people take a little bit more interest in mobile banking. The use of the
one-time password which is sent to the user mobile phone by short message
service (SMS) is a vulnerability which we want to solve with proposing a new
scheme called S-Mbank. We replace the authentication using the one-time
password with the contactless smart card to prevent attackers to use the
unencrypted message which is sent to the user's mobile phone. Moreover, it
deals vulnerability of spoofer to send an SMS pretending as a bank's server.
The contactless smart card is proposed because of its flexibility and security
which easier to bring in our wallet than the common passcode generators. The
replacement of SMS-based authentication with contactless smart card removes the
vulnerability of unauthorized users to act as a legitimate user to exploit the
mobile banking user's account. Besides that, we use public-private key pair and
PIN to provide two factors authentication and mutual authentication. We use
signcryption scheme to provide the efficiency of the computation. Pair based
text authentication is also proposed for the login process as a solution to
shoulder-surfing attack. We use Scyther tool to analyze the security of
authentication protocol in S-Mbank scheme. From the proposed scheme, we are
able to provide more security protection for mobile banking service.Comment: 6 page
Success of Implementation of Computer Crime Act (UU Ite No.11 2008) (a Case Study in the Higher Education Institution in Indonesia)
Computer crime rate grow rapidly along with the development of the digital world that has touched almost all aspects of human life. Institutions of higher education cannot be separated from the problem of computer crime activities. The paper analyses the implementation of Indonesia Computer Crime Act (UU ITE NO.11 2008) in the Higher Education Institution in Indonesia. It aims to investigate the level of computer crimes that occurred in the higher education institution environment and the act (UU ITE 11, 2008) successfully applied to prevent the crime that would arise. In this research, the analysis using Descriptive Statistics, Binary logistic regression. This paper also describes the success implementation of the Information System Security Policy (ISSP) as a computer crime prevention policy in higher education institution in Indonesia. In factor of act, clarity of objectives and purpose of the UU ITE 11, 2008 was low, the communication and socialization activities are still low to the society especially to the higher education institution, moreover the control process has been running on UU ITE 11, 2008, but at a low level
Tracking Chart 2010 adidas Group, Knights Apparel, Honduras
This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.FLA_2010TrackingChart_AdidasGroup_KnightsApparel.pdf: 411 downloads, before Oct. 1, 2020
Secure Communication using Identity Based Encryption
Secured communication has been widely deployed to guarantee confidentiality and\ud
integrity of connections over untrusted networks, e.g., the Internet. Although\ud
secure connections are designed to prevent attacks on the connection, they hide\ud
attacks inside the channel from being analyzed by Intrusion Detection Systems\ud
(IDS). Furthermore, secure connections require a certain key exchange at the\ud
initialization phase, which is prone to Man-In-The-Middle (MITM) attacks. In this paper, we present a new method to secure connection which enables Intrusion Detection and overcomes the problem of MITM attacks. We propose to apply Identity Based Encryption (IBE) to secure a communication channel. The key escrow property of IBE is used to recover the decryption key, decrypt network traffic on the fly, and scan for malicious content. As the public key can be generated based on the identity of the connected server and its exchange is not necessary, MITM attacks are not easy to be carried out any more. A prototype of a modified TLS scheme is implemented and proved with a simple client-server application. Based on this prototype, a new IDS sensor is developed to be capable of identifying IBE encrypted secure traffic on the fly. A deployment architecture of the IBE sensor in a company network is proposed. Finally, we show the applicability by a practical experiment and some preliminary performance measurements
Recommended from our members
Hostile gatekeeping: The strategy of engaging with journalists in extremism reporting
This article broadly examines the relationship between strategic communications and journalism with specific reference to the issue of violent extremism. Using a case study of reporting on the Boko Haram conflict in Nigeria, it analyses the nature and consequences of engagement among the various communicators involved. The primary data were drawn from focus groups and individual interviews with thirty-two journalists and strategic communicators, and from analysis of Boko Haram videos and Nigerian security forces’ press releases. The findings suggest that journalists have a tense but interdependent relationship with strategic communicators that is characterised by conflict and cooperation, harassment and intimidation. Strategic communicators’ control of the conflict theatre and use of the Internet to reach audiences directly give them leverage in the relationship. They, however, rely on journalists to help enhance the reach and credibility of their narratives, while journalists depend significantly on their media releases
- …