687,543 research outputs found

    Editorial Preface

    Get PDF
    It is with great pleasure that we present the 6th regular issue of Volume 10 of the International Journal of Integrated Engineering (IJIE). The special issue of Data Information Engineering contains 30 papers contributed by 124 authors from various institutions. There topics covered in this issue including augmented reality, system testing, wireless area network, information security, data science and search engine optimization. There is also review on in silico-metabolic engineering, intrusion detection system and service-oriented architecture.The authors comprise researchers from four countries which are Malaysia, Indonesia, Pakistan and Iraq. Hopefully with all the strict reviewing process and selection, the knowledge presented will be helpful to the research community by providing breakthrough discoveries and future insight on where the research should be going

    Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues

    Full text link
    Improved interoperability between public and private organizations is of key significance to make digital government newest triumphant. Digital Government interoperability, information sharing protocol and security are measured the key issue for achieving a refined stage of digital government. Flawless interoperability is essential to share the information between diverse and merely dispersed organisations in several network environments by using computer based tools. Digital government must ensure security for its information systems, including computers and networks for providing better service to the citizens. Governments around the world are increasingly revolving to information sharing and integration for solving problems in programs and policy areas. Evils of global worry such as syndrome discovery and manage, terror campaign, immigration and border control, prohibited drug trafficking, and more demand information sharing, harmonization and cooperation amid government agencies within a country and across national borders. A number of daunting challenges survive to the progress of an efficient information sharing protocol. A secure and trusted information-sharing protocol is required to enable users to interact and share information easily and perfectly across many diverse networks and databases globally.Comment: 20 page

    The effect of cyber-attacks on stock returns

    Get PDF
    A widely debated issue in recent years is cybercrime. Breaches in the security of accessibility, integrity and confidentiality of information involve potentially high explicit and implicit costs for firms. This paper investigates the impact of information security breaches on stock returns. Using event-study methodology, the study provides empirical evidence on the effect of announcements of cyber-attacks on the market value of firms from 1995 to 2015. Results show that substantial negative market returns occur following announcements of cyber-attacks. Financial entities often suffer greater negative effects than other companies and non-confidential cyber-attacks are the most dangerous, especially for the financial sector. Overall findings seem to show a link between cybercrime and insider trading

    Lightweight Mutual Authentication Protocol for Low Cost RFID Tags

    Full text link
    Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode technology. Although it offers many advantages over other identification systems, there are also associated security risks that are not easy to be addressed. When designing a real lightweight authentication protocol for low cost RFID tags, a number of challenges arise due to the extremely limited computational, storage and communication abilities of Low-cost RFID tags. This paper proposes a real mutual authentication protocol for low cost RFID tags. The proposed protocol prevents passive attacks as active attacks are discounted when designing a protocol to meet the requirements of low cost RFID tags. However the implementation of the protocol meets the limited abilities of low cost RFID tags.Comment: 11 Pages, IJNS

    Constructing a global counterterrorist legislation database: dilemmas, procedures, and preliminary analyses

    Get PDF
    Counterterrorist legislation is one of the main ways in which countries, particularly democracies, respond to terror attacks. Yet, there is to date no comprehensive cross-national database of counterterrorist legislation. This article introduces an overarching global counterterrorist legislation database (GCLD), covering more than 1,000 laws in 219 countries and territories over the years 1850-2009. I present the dilemmas and difficulties involved in constructing a global terrorism database and explain how these difficulties were addressed when assembling the current database. The article also brings descriptive statistics and analyses of the data, focusing on the historical development of global counterterrorist legislation and on the regional distribution of this legislation. It concludes with some recommendations for future researchers who may want to use the database.Publisher PD
    corecore