81,719 research outputs found

    Situational Awareness based Risk-Adapatable Access Control in Enterprise Networks

    Full text link
    As the computing landscape evolves towards distributed architectures such as Internet of Things (IoT),enterprises are moving away from traditional perimeter based security models toward so called zero trust networking (ZTN) models that treat both the intranet and Internet as equally untrustworthy. Such security models incorporate risk arising from dynamic and situational factors, such as device location and security risk level risk, into the access control decision. Researchers have developed a number of risk models such as RAdAC (Risk Adaptable Access Control) to handle dynamic contexts and these have been applied to medical and other scenarios. In this position paper we describe our ongoing work to apply RAdAC to ZTN. We develop a policy management framework, FURZE, to facilitate fuzzy risk evaluation that also defines how to adapt to dynamically changing contexts. We also consider how enterprise security situational awareness (SSA) - which describes the potential impact to an organisations mission based on the current threats and the relative importance of the information asset under threat - can be incorporated into a RAdAC schemeComment: 6 page

    Coordinating heterogeneous IoT devices by means of the centralized vision of the SDN controller

    Get PDF
    The IoT (Internet of Things) has become a reality during recent years. The desire of having everything connected to the Internet results in clearly identified benefits that will impact on socio economic development. However, the exponential growth in the number of IoT devices and their heterogeneity open new challenges that must be carefully studied. Coordination among devices to adapt them to their users' context usually requires high volumes of data to be exchanged with the cloud. In order to reduce unnecessary communications and network overhead, this paper proposes a novel network architecture based on the Software-Defined Networking paradigm that allows IoT devices coordinate and adapt them within the scope of a particular context.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech

    Internet Gambling: An Overview of Psychosocial Impacts

    Full text link
    Technological innovation has always played a role in the development of gambling behaviour, primarily through providing new market opportunities. Early prevalence studies of Internet gambling in the UK, Canada and the US have shown that Internet gambling is not a cause for concern at present However, this seems likely to change as more people start to use the Internet for leisure activities. After a brief overview of gambling technologies and deregulation issues, this paper examines the impact of technology on gambling by highlighting salient factors in the rise of Internet gambling (i.e., accessibility, affordability, anonymity, convenience, escape immersion/dissociation, disinhibition, event frequency, asociability, interactivity, and simulation). The paper also overviews some of the main social impacts surrounding Internet gambling, such as protection of the vulnerable, Internet gambling in the workplace, electronic cash, and unscrupulous operators. Recommendations for Internet gambling operators are also provided

    Internet gambling: an overview of psychosocial impacts

    Get PDF
    Technological innovation has always played a role in the development of gambling behaviour, primarily through providing new market opportunities. Early prevalence studies of Intemet gambling in the UK, Canada and the US have shown that Intemet gambling is not a eause for concern at present. However, this seems likely to change as more people start to use the Internet for leisure activities. After a brief overview of gambling technologies and deregulation issues, this paper examines the impact of technology on gambling by highlighting salient factors in the rise of Intemet gambling (i.e., accessibility, affordability, anonymity, convenience, escape immersion/dissociation, disinhibition, event frequency, asociability, interactivity, and simulation). The paper also overviews some of the main social impacts surrounding Intemet gambling, such as protection of the vulnerable, Intemet gambling in the workplace, electronic cash, and unscrupulous operators. Recommendations for Internet gambling operators are also provided

    Mapping the information-coping trajectory of young people coping with long term illness: An evidence based approach

    Get PDF
    Purpose - Purpose: We explore the relationship between information and coping information from the experiences of young people coping with long term illness. Design/methodology/approach - Methodology: Situational Analysis was used as a methodological approach. It has roots in the Chicago Symbolic Interactionism School. Cartographic approaches enabled the analysis, mapping the complexities emerging from the data. Findings - Findings: As the young people became more informed about their health conditions, and gained knowledge and understanding both about their illnesses, their own bodies and boundaries, their confidence and capacity to cope increased. Gaining confidence, the young people often wanted to share their knowledge becoming information providers themselves. From the data we identified five positions on an information-coping trajectory (1) Information deficiency (2) Feeling ill-informed (3) Needing an injection of information (4) Having information health and (5) Becoming an information donor. Research limitations/implications - Research limitations/implications: The research was limited to an analysis of thirty narratives. The research contributes to information theory by mapping clearly the relationship between information and coping. Originality/value - Originality/value: The information theories in this study have originality and multi-disciplinary value in the management of health and illness, and information studies

    A taxonomy of malicious traffic for intrusion detection systems

    Get PDF
    With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems. In this paper we propose a taxonomy for classifying network attacks in a consistent way, allowing security researchers to focus their efforts on creating accurate intrusion detection systems and targeted datasets

    Mirrors of the World - Supporting Situational Awareness with Computer Screens

    Get PDF
    In this paper we develop a notion of support for social and situational awareness. Our initial ideas are based on the metaphor of using a mirror to see what you are not looking at. We provide two studies that, for different contexts, apply the metaphor to develop design ideas that fit the context of use
    • …
    corecore