358,553 research outputs found

    Security and Privacy for Big Data: A Systematic Literature Review

    Get PDF
    Big data is currently a hot research topic, with four million hits on Google scholar in October 2016. One reason for the popularity of big data research is the knowledge that can be extracted from analyzing these large data sets. However, data can contain sensitive information, and data must therefore be sufficiently protected as it is stored and processed. Furthermore, it might also be required to provide meaningful, proven, privacy guarantees if the data can be linked to individuals. To the best of our knowledge, there exists no systematic overview of the overlap between big data and the area of security and privacy. Consequently, this review aims to explore security and privacy research within big data, by outlining and providing structure to what research currently exists. Moreover, we investigate which papers connect security and privacy with big data, and which categories these papers cover. Ultimately, is security and privacy research for big data different from the rest of the research within the security and privacy domain? To answer these questions, we perform a systematic literature review (SLR), where we collect recent papers from top conferences, and categorize them in order to provide an overview of the security and privacy topics present within the context of big data. Within each category we also present a qualitative analysis of papers representative for that specific area. Furthermore, we explore and visualize the relationship between the categories. Thus, the objective of this review is to provide a snapshot of the current state of security and privacy research for big data, and to discover where further research is required

    A comparative analysis of good enterprise data management practices:insights from literature and artificial intelligence perspectives for business efficiency and effectiveness

    Get PDF
    Abstract. This thesis presents a comparative analysis of enterprise data management practices based on literature and artificial intelligence (AI) perspectives, focusing on their impact on data quality, business efficiency, and effectiveness. It employs a systematic research methodology comprising of a literature review, an AI-based examination of current practices using ChatGPT, and a comparative analysis of findings. The study highlights the importance of robust data governance, high data quality, data integration, and security, alongside the transformative potential of AI. The limitations revolve around the primarily qualitative nature of the study and potential restrictions in the generalizability of the findings. However, the thesis offers valuable insights and recommendations for enterprises to optimize their data management strategies, underscoring the enhancement potential of AI in traditional practices. The research contributes to scientific discourse in information systems, data science, and business management

    Cloud adoption and cyber security in public organizations: an empirical investigation on Norwegian municipalities

    Get PDF
    The public sector in Norway, particularly municipalities, is currently transforming through the adoption of cloud solutions. This multiple case study investigates cloud adoption and is security challenges that come along with it. The objective is to identify the security challenges that cloud solutions present and techniques or strategies that can be used to mitigate these security challenges. The Systematic Literature Review (SLR) provided valuable insights into the prevalent challenges and associated mitigation techniques in cloud adoption. The thesis also uses a qualitative approach using Semi-Structured Interviews (SSI) to gather insight into informants’ experiences regarding cloud adoption and its security challenges. The study’s empirical data is based on interviews with six different Norwegian municipalities, providing a unique and broad perspective. The analysis of the empirical findings, combined with the literature, reveals several security challenges and mitigation techniques in adopting cloud solutions. The security challenges encompass organizational, environmental, legal, and technical aspects of cloud adoption in the municipality. Based on the findings, it is recommended that Norwegian municipalities act on these issues to ensure a more secure transition to cloud solutions

    Border Security Management and State Security: a Case Study of Kenya and Somalia Border Relations (1991-2017)

    Get PDF
    The porous border of Kenya-Somalia has always been problematic to the Kenyan government, ever since the Somali government’s fall in 1991. This study was based along the Kenya-Somalia boundary in Mandera County. The study examined border security management and state security between Kenya-Somalia from 1991-2017. One specific objective guided it: To, identified cross-border security threats along with the Kenya-Somalia border. The study applied theories of structural realism and border security theory/ psychoanalytic theory.The study was guided by descriptive survey research design and experimental research designs. This research used several sampling strategies: convenience, systematic, snowball, random sampling, and purposive techniques. The researcher selected a sample size of 398 that comprised heads of families.Further, 85 critical informants of private and public responders were chosen from the two case studies. Primary information was gathered using FGDs, survey tools such as questionnaires and observations and interviews. On the other hand, secondary data is retrieved through relevant articles and publication content analysis. Descriptive and inferential statistics proved vital in analyzing preliminary information, while content analysis was utilized when analyzing qualitative data. Tables and figures presented the data analyzed. The study established that 70% of the respondents stated that terrorism was a critical security threat along the Kenya-Somalia border. The researcher was informed of a newly emerging strategy employed in terrorism, through which the beasts of burden( donkey) has made the war against terror more complex. The donkey, a domesticated animal, is used by man as a helper; however, the latest creative (mis) use of the beast of burden for terrorism has emerged as a critical concern to the security apparatus

    Analyzing, Implementing and Monitoring Critical Security Controls: A Case Implemented in J & B Group

    Get PDF
    The increasing sophistication of information security threats and the ever-growing body of regulation has made information security a critical function in organizations. Software companies and application vendors are unable to keep up with rapidly growing attacks and changing threat patters. The need for information security should be apparent and require substantial research, knowledge, and ability to design and implement an effective security program. Also, requires a great investment of time and resources. Many small and medium businesses may understand the importance of risk, but lack in grasping the severity of the problem and resources to identify it. A well analyzed and implemented information security program can reduce the damage caused by an attack by reducing the mean time to detect, contain and restore. The purpose of this paper is to present a systematic approach to conduct analysis by gathering data, implementing and monitoring the critical security controls. An effective information security process ensuring strong security posture to defend against cyber-attacks with minimum resources and open source software is the key to this research as it reduces the cost to implement and maintain the security operations center. The literature focuses on increasing cyber-attacks on organizations and how to prevent these attacks using technical countermeasures and non-technological side of information security. This research refers to CIS critical security controls (CSC) to classify data, systems and analyze risk using Qualitative and Quantitative data. Research data is collected from J & B Group Information technology team. Importance of security program is not only adopting best security processes and tools but also must be reviewed, updated and maintained on a regular basis. Continuous monitoring of security controls is driven with open source SIEM tool with minimum license and by establishing custom rules for generating offenses and alerts

    The Roles of Community Policing for Community Security and Peace Building: The Case of Asella Town Administration

    Get PDF
    Community policing is the most means of reacting to incidents and insecurity before it happens and improving social environment as well as reducing fear of crime. Despite its vital roles in maintaining peace and security for the local community, there is no adequate literature on the roles of community policing for community security and peace building. This implies that there is little known about the roles of community policing in Asella Town administration and as a result this study aimed to assess the roles of community policing for community security and peace building in Asella Town Administration. To conduct this research qualitative research approach was used. For this purpose, data collected through different data collection mechanism including key informants, focus group discussion and participant observation. were analyzed through thematic data analysis approach.  The findings of this research indicate that, community policing brings the police officers and the community of Asella town together to deter crime and promote community security. It also increased the perceptions of safety and reduced anti-social behavior. It also empowered the community of the town to take charge of their security needs. It also increased the satisfaction of police officers towards their work in community. The collective security action of community policing in the Asella town involved various community members such as elders, youth and religious organization. Community policing needs to be practiced in a systematic way to demonstrate better results in maintaining peace and security issues.  Community meetings on community policing must be take place regularly in order to involve more community members in community policing activities. Keywords: Community Policing, Community Security and Stability, Asella Town DOI: 10.7176/PPAR/10-10-06 Publication date:October 31st 202

    Local conflict in Indonesia : Measuring incidence and identifying patterns

    Get PDF
    The widespread presence of local conflict characterizes many developing countries such as Indonesia. Outbreaks of violent conflict not only have direct costs for lives, livelihoods, and material property, but may also have the potential to escalate further. Recent studies on large-scale"headline"conflicts have tended to exclude the systematic consideration of local conflict, in large part due to the absence of representative data at low levels of geographic specification. This paper is a first attempt to correct for that. We evaluate a unique dataset compiled by the Indonesian government, the periodic Village Potential Statistics (PODES), which seeks to map conflict across all of Indonesia's 69,000 villages/neighborhoods. The data confirm that conflict is prevalent beyond well publicized"conflict regions,"and that it can be observed across the archipelago. The data report largely violent conflict in 7.1 percent of Indonesia's lowest administrative tier (rural desa and urban kelurahan). Integrating examples from qualitative fieldwork, we assess issues in the measurement of local conflict for quantitative analysis, and adopt an empirical framework to examine potential associations with poverty, inequality, shocks, ethnic and religious diversity/inequality, and community-level associational and security arrangements. The quantitative analysis shows positive correlations between local conflict and unemployment, inequality, natural disasters, changes in sources of incomes, and clustering of ethnic groups within villages. The institutional variables indicate that the presence of places of worship is associated with less conflict, while the presence of religious groups and traditional culture (adat) institutions are associated with conflict. We conclude by suggesting future areas of research, notably on the role of group inequality and inference, and suggest ways to improve the measurement of conflict in the village census.Services&Transfers to Poor,Post Conflict Reconstruction,Public Health Promotion,Education and Society,Peace&Peacekeeping,Post Conflict Reconstruction,Education and Society,Social Conflict and Violence,Rural Poverty Reduction,Services&Transfers to Poor
    • …
    corecore