656,626 research outputs found
Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues
Improved interoperability between public and private organizations is of key
significance to make digital government newest triumphant. Digital Government
interoperability, information sharing protocol and security are measured the
key issue for achieving a refined stage of digital government. Flawless
interoperability is essential to share the information between diverse and
merely dispersed organisations in several network environments by using
computer based tools. Digital government must ensure security for its
information systems, including computers and networks for providing better
service to the citizens. Governments around the world are increasingly
revolving to information sharing and integration for solving problems in
programs and policy areas. Evils of global worry such as syndrome discovery and
manage, terror campaign, immigration and border control, prohibited drug
trafficking, and more demand information sharing, harmonization and cooperation
amid government agencies within a country and across national borders. A number
of daunting challenges survive to the progress of an efficient information
sharing protocol. A secure and trusted information-sharing protocol is required
to enable users to interact and share information easily and perfectly across
many diverse networks and databases globally.Comment: 20 page
The effect of cyber-attacks on stock returns
A widely debated issue in recent years is cybercrime. Breaches in the security of accessibility, integrity and confidentiality of information involve potentially high explicit and implicit costs for firms. This paper investigates the impact of information security breaches on stock returns. Using event-study methodology, the study provides empirical evidence on the effect of announcements of cyber-attacks on the market value of firms from 1995 to 2015. Results show that substantial negative market returns occur following announcements of cyber-attacks. Financial entities often suffer greater negative effects than other companies and non-confidential cyber-attacks are the most dangerous, especially for the financial sector. Overall findings seem to show a link between cybercrime and insider trading
Towards an integrated model for citizen adoption of E-government services in developing countries: A Saudi Arabia case study
This paper considers the challenges that face the widespread adoption of E-government in developing countries, using Saudi Arabian our case study. E-government can be defined based on an existing set of requirements. In this paper we define E-government as a matrix of stakeholders; governments to governments, governments to business and governments to citizens using information and communications technology to deliver and consume services. E-government has been implemented for a considerable time in developed countries. However E-government services still faces many challenges their implemented and general adoption in developing countries. Therefore, this paper presents an integrated model for ascertaining the intention to adopt E-government services and thereby aid governments in accessing what is required to increase adoption
Scan to BIM for 3D reconstruction of the papal basilica of saint Francis in Assisi In Italy
The historical building heritage, present in the most of Italian cities centres, is, as part of the construction sector, a working potential,
but unfortunately it requires planning of more complex and problematic interventions. However, policies to support on the existing
interventions, together with a growing sensitivity for the recovery of assets, determine the need to implement specific studies and to
analyse the specific problems of each site. The purpose of this paper is to illustrate the methodology and the results obtained from
integrated laser scanning activity in order to have precious architectural information useful not only from the cultural heritage point
of view but also to construct more operative and powerful tools, such as BIM (Building Information Modelling) aimed to the
management of this cultural heritage. The Papal Basilica and the Sacred Convent of Saint Francis in Assisi in Italy are, in fact,
characterized by unique and complex peculiarities, which require a detailed knowledge of the sites themselves to ensure visitor’s
security and safety. For such a project, we have to take in account all the people and personnel normally present in the site, visitors
with disabilities and finally the needs for cultural heritage preservation and protection. This aim can be reached using integrated
systems and new technologies, such as Internet of Everything (IoE), capable of connecting people, things (smart sensors, devices and
actuators; mobile terminals; wearable devices; etc.), data/information/knowledge and processes to reach the desired goals. The IoE
system must implement and support an Integrated Multidisciplinary Model for Security and Safety Management (IMMSSM) for the
specific context, using a multidisciplinary approach
Recommended from our members
Analysing the EAP-TLS handshake and the 4-way handshake of the 802.11i standard
The IEEE 802.11i standard has been designed to enhance security in wireless networks. The EAP-TLS handshake aims to provide mutual authentication between supplicant and authentication server, and then derive the Pairwise Master Key (PMK). In the 4 -way handshake the supplicant and the authenticator use PMK to derive a fresh pairwise transient key (PTK). The PMK is not used directly for security while assuming the supplicant and authenticator have the same PMK before running 4- way handshake. In this paper, the EAP-TLS handshake and the 4-way handshake phases have been analysed with a proposed framework using Isabelle tool. In the analysis, we have found a new Denial-of-Service (DoS) attack in the 4-way handshake. The attack prevents the authenticator from receiving message 4 after the supplicant sends it out. This attack forces the authenticator to re-send the message 3 until time out and subsequently to de-authenticate supplicant. This paper has proposed improvements to the 4-way handshake to avoid the Denial-of-Service attack
- …