18 research outputs found
Cyber Security of Critical Infrastructures
Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods
Legal and policy aspects to consider when providing information security in the corporate environment
E-commerce is growing rapidly due to the massive usage of the Internet to conduct commercial transactions. This growth has presented both customers and merchants with many advantages. However, one of the challenges in E-commerce is information security. In order to mitigate e-crime, the South African government promulgated laws that contain information security legal aspects that should be integrated into the establishment of information security. Although several authors have written about legal and policy aspects regarding information security in the South African context, it has not yet been explained how these aspects are used in the provision of information security in the South African corporate environment.
This is the premise upon which the study was undertaken. Forty-five South African organisations participated in this research. Data gathering methods included individual interviews, website analysis, and document analysis.
The findings of this study indicate that most organisations in South Africa are not integrating legal aspects into their information security policies. One of the most important outcomes of this study is the proposed Concept Model of Legal Compliance in the Corporate Environment. This Concept Model embodies the contribution of this study and demonstrates how legal requirements can be incorporated into information security endeavours. The fact that the proposed Concept Model is technology-independent and that it can be implemented in a real corporate environment, regardless of the organisation’s governance and management structure, holds great promise for the future of information security in South Africa and abroad.
Furthermore, this thesis has generated a topology for linking legislation to the provision of information security which can be used by any academic or practitioner who intends to implement information security measures in line with the provisions of the law. It is on the basis of this premise that practitioners can, to some extent, construe that the integration of legislation into information security policies can be done in other South African organisations that did not participate in this study. Although this study has yielded theoretical, methodological and practical contributions, there is, in reality, more research work to be done in this area.School of ComputingD. Phil. (Information Systems
Volume I: Acquisition Research: The Foundation for Innovation
Proceedings Paper (for Acquisition Research Program)Accordingly, the year 2006 was especially significant for the NPS Acquisition Research Program in taking major strides toward expanding the program''s reach in important ways to other institutions.'' The number of research institutions participating as collaborators grew to 35 with the formation of a Virtual University Consortium.'' Most noteworthy was, as mentioned above, our securing sponsorship from USD(AT&L) to fund research proposals selected from a nationwide call, or Broad Agency Announcement (BAA) (copy available at www.acquisitionresearch.org).'' We''re truly excited at the prospects of receiving innovative and cutting edge proposals from the top minds around the country.'' We trust that this new sponsorship will act like good seeds sown in fertile soil, yielding rich fruits of profitable acquisition research for many years to come.Naval Postgraduate School Acquisition Research ProgramApproved for public release; distribution is unlimited
Factors Influencing Customer Satisfaction towards E-shopping in Malaysia
Online shopping or e-shopping has changed the world of business and quite a few people have
decided to work with these features. What their primary concerns precisely and the responses from
the globalisation are the competency of incorporation while doing their businesses. E-shopping has
also increased substantially in Malaysia in recent years. The rapid increase in the e-commerce
industry in Malaysia has created the demand to emphasize on how to increase customer satisfaction
while operating in the e-retailing environment. It is very important that customers are satisfied with
the website, or else, they would not return. Therefore, a crucial fact to look into is that companies
must ensure that their customers are satisfied with their purchases that are really essential from the ecommerce’s
point of view. With is in mind, this study aimed at investigating customer satisfaction
towards e-shopping in Malaysia. A total of 400 questionnaires were distributed among students
randomly selected from various public and private universities located within Klang valley area.
Total 369 questionnaires were returned, out of which 341 questionnaires were found usable for
further analysis. Finally, SEM was employed to test the hypotheses. This study found that customer
satisfaction towards e-shopping in Malaysia is to a great extent influenced by ease of use, trust,
design of the website, online security and e-service quality. Finally, recommendations and future
study direction is provided.
Keywords: E-shopping, Customer satisfaction, Trust, Online security, E-service quality, Malaysia
Robotics, AI, and Humanity
This open access book examines recent advances in how artificial intelligence (AI) and robotics have elicited widespread debate over their benefits and drawbacks for humanity. The emergent technologies have for instance implications within medicine and health care, employment, transport, manufacturing, agriculture, and armed conflict. While there has been considerable attention devoted to robotics/AI applications in each of these domains, a fuller picture of their connections and the possible consequences for our shared humanity seems needed. This volume covers multidisciplinary research, examines current research frontiers in AI/robotics and likely impacts on societal well-being, human – robot relationships, as well as the opportunities and risks for sustainable development and peace. The attendant ethical and religious dimensions of these technologies are addressed and implications for regulatory policies on the use and future development of AI/robotics technologies are elaborated
Recommended from our members
Isomorphic effects of managerial and directoral career paths
The extensive array of interlocking directorate research remains near-exclusively cross-sectional or comparative cross-sectional in nature. While this has been fruitful in identifying persistent structures of inter-organisational relationships evidence of the impact of these structures on organisational performance or activity has been more limited. This should not be surprising because, by their nature, relationships have strong longitudinal and dynamic qualities that are likely to be difficult to isolate through cross-sectional approaches. Clearly, managerial practice is inevitably strongly conditioned by the specific contingencies of the time and the information available through networks of colleagues and advisers (particularly at board level) at the time. But managerial and directoral capabilities and mental sets are also developed over time, particularly through previous experiences in these roles and the formation of long-lasting 'strong' and 'weak' relationships. This paper tests the influence of three longitudinal dimensions of managers and directors' relationships on a set of indicators of financial performance, drawing from a large dataset of detailing historic board membership of UK firms. It finds evidence of isomorphic processes through these channels and establishes that the longitudinal design considerably enhances the detection of performance effects from directorate interlocks. More broadly, the research has implications for the conception of collective action and the constitution of 'community'