74,689 research outputs found

    National security: A propositional study to develop resilience indicators as an aid to personnel vetting

    Get PDF
    Within the National Security domain there is a convergence of security responsibility across the national security agencies, law enforcement and private security sectors. The sensitivity of this environment requires individuals operating in the domain to be honest, trustworthy and loyal. Personnel vetting is a formal process used to determine an individual’s suitability for access to this domain. Notwithstanding this process, significant breaches of trust, security, and corruption still occur. In psychology, resilience is a well researched phenomenon that is considered a multidimensional construct where individual attributes, family aspects and social environment interact in aiding individuals to deal with vulnerability. There are many understandings and definitions of resilience based on theorists’ different perspectives; however, most agree that resilience is represented by a minimum of two aspects. The first is adversity and second, how the individual deals with adversity that demonstrates situational adaptation in a positive manner. The study is a work in progress and proposes the use of a recently developed Lifespan Resilience Scale. This scale will use resilience markers as an aid to National Security by providing vetting agencies with an additional tool for proactive intervention. The Lifespan Resilience Scale is currently undergoing reliability and validity testing within a student population. Once validated within this population, the scale will be adjusted and tested within the vetting environment using cross validated cohorts and expert opinion. Such a tool will assist National Security through better personnel risk management

    Cloud based testing of business applications and web services

    Get PDF
    This paper deals with testing of applications based on the principles of cloud computing. It is aimed to describe options of testing business software in clouds (cloud testing). It identifies the needs for cloud testing tools including multi-layer testing; service level agreement (SLA) based testing, large scale simulation, and on-demand test environment. In a cloud-based model, ICT services are distributed and accessed over networks such as intranet or internet, which offer large data centers deliver on demand, resources as a service, eliminating the need for investments in specific hardware, software, or on data center infrastructure. Businesses can apply those new technologies in the contest of intellectual capital management to lower the cost and increase competitiveness and also earnings. Based on comparison of the testing tools and techniques, the paper further investigates future trend of cloud based testing tools research and development. It is also important to say that this comparison and classification of testing tools describes a new area and it has not yet been done

    Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD

    Get PDF
    Modern railways feature increasingly complex embedded computing systems for surveillance, that are moving towards fully wireless smart-sensors. Those systems are aimed at monitoring system status from a physical-security viewpoint, in order to detect intrusions and other environmental anomalies. However, the same systems used for physical-security surveillance are vulnerable to cyber-security threats, since they feature distributed hardware and software architectures often interconnected by ‘open networks’, like wireless channels and the Internet. In this paper, we show how the integrated approach to Security, Privacy and Dependability (SPD) in embedded systems provided by the SHIELD framework (developed within the EU funded pSHIELD and nSHIELD research projects) can be applied to railway surveillance systems in order to measure and improve their SPD level. SHIELD implements a layered architecture (node, network, middleware and overlay) and orchestrates SPD mechanisms based on ontology models, appropriate metrics and composability. The results of prototypical application to a real-world demonstrator show the effectiveness of SHIELD and justify its practical applicability in industrial settings

    Web development evolution: the assimilation of web engineering security

    Get PDF
    In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues. Analyzing the underlying causes of these security breaches shows that a significant proportion of them are caused by straightforward design errors in systems and not by failures in security mechanisms. There is significant research into security mechanisms but there is little research into the integration of these into software design processes, even those processes specifically designed for Web Engineering. Security should be designed into the application development process upfront through an independent flexible methodology that contains customizable components

    Web development evolution: the assimilation of web engineering security

    Get PDF
    In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues. Analyzing the underlying causes of these security breaches shows that a significant proportion of them are caused by straightforward design errors in systems and not by failures in security mechanisms. There is significant research into security mechanisms but there is little research into the integration of these into software design processes, even those processes specifically designed for Web Engineering. Security should be designed into the application development process upfront through an independent flexible methodology that contains customizable components

    Web engineering security: essential elements

    Get PDF
    Security is an elusive target in today’s high-speed and extremely complex, Web enabled, information rich business environment. This paper presents the idea that there are essential, basic organizational elements that need to be identified, defined and addressed before examining security aspects of a Web Engineering Development process. These elements are derived from empirical evidence based on a Web survey and supporting literature. This paper makes two contributions. The first contribution is the identification of the Web Engineering specific elements that need to be acknowledged and resolved prior to the assessment of a Web Engineering process from a security perspective. The second contribution is that these elements can be used to help guide Security Improvement Initiatives in Web Engineering

    Corruption in Australian sport

    Get PDF
    Examines some of the events that have affected the integrity of Australian sport between 2009–13 to describe the way in which corruption has manifested, the environment that has engendered the corrupt behaviour and the extent to which these incidents were primarily local events involving local actors. Forward Corruption in Australian sport is not a new phenomenon. A series of high-profile cases in Australia, combined with an increasing international focus, has seen a reassessment of Australian sport’s vulnerability to illegal activities such as match-fixing, use of inside information for betting purposes and the use of performance and image-enhancing drugs. This has led to the development and endorsement of national policies on match-fixing and doping, the establishment of sport integrity units, inclusion of specialist intelligence units in law enforcement and the creation of new match-fixing offences. Yet the actual extent of corruption in Australian sport remains unclear. In particular, does it exist more in the form of a threat rather than an intrinsic or widespread problem? This paper examines some of the events that have affected the integrity of Australian sport between 2009–13 to describe the way in which corruption has manifested, the environment that has engendered the corrupt behaviour and the extent to which these incidents were primarily local events involving local actors. It also proposes situational crime prevention techniques that may assist in framing and responding to corruption in Australian sport. Adam Tomison Directo
    • …
    corecore