1,658 research outputs found

    Decision Support for Holistic IT Risk Feature Selection

    Get PDF
    The failure or misuse of IT has the potential to negatively impact business objectives. The risk resulting from the failure of IT/IS artifacts can be categorized as IT risk, with holistic IT risk representing the overarching composite of all types of IT/IS failures that can prevent an enterprise from realizing one or more business objectives. The likelihood of holistic IT risk having a significant impact on the global business community is growing, with the Internet of Things capable of spreading IT risk far more widely than the Internet has to date. Feature selection for holistic IT risk can be more difficult than feature selection for non-IT business risk, and can vary from one organization to the next. This research explores the use of decision support and fuzzy logic to design a better method for performing holistic IT risk feature selection

    Effects of a Comprehensive Computer Security Policy on Computer Security Culture

    Get PDF
    It is well known that humans are the weakest link in computer security, and that developing and maintaining a culture of computer security is essential for managing the human aspect of computer security. It is less well known how a comprehensive computer security policy incorporating both information technology computer security, and operational technology computer security, impacts a culture of computer security. While a literature review of this domain includes research on the impact of various aspects of a computer security policy on computer security culture, no peer reviewed research was found that explained the impact of a comprehensive computer security policy on computer security culture through an understanding of its direct or indirect effects. Thus, it is the thesis of this study that a comprehensive computer security policy has a direct effect on computer security culture, which can be further explained through indirect effects

    Effects of a Comprehensive Computer Security Policy on Human Computer Security Policy Compliance

    Get PDF
    It is well known that humans are the weakest link in computer security, and that developing and maintaining a culture of computer security is essential for managing the human aspect of computer security. It is less well known how a comprehensive computer security policy incorporating both information technology computer security, and operational technology computer security, impacts a culture of computer security. While a literature review of this domain includes research on the impact of various aspects of a computer security policy on computer security culture, no peer reviewed research was found that explained the impact of a comprehensive computer security policy on computer security culture through an understanding of its direct or indirect effects. Thus, it is the thesis of this study that a comprehensive computer security policy has a direct effect on computer security culture, which can be further explained through indirect effects

    A novel programmable lysozyme-based lysis system in Pseudomonas putida for biopolymer production

    Get PDF
    IndexaciĂłn: Scopus; Web of Science.Cell lysis is crucial for the microbial production of industrial fatty acids, proteins, biofuels, and biopolymers. In this work, we developed a novel programmable lysis system based on the heterologous expression of lysozyme. The inducible lytic system was tested in two Gram-negative bacterial strains, namely Escherichia coli and Pseudomonas putida KT2440. Before induction, the lytic system did not significantly arrest essential physiological parameters in the recombinant E. coli (ECPi) and P. putida (JBOi) strain such as specific growth rate and biomass yield under standard growth conditions. A different scenario was observed in the recombinant JBOi strain when subjected to PHA-producing conditions, where biomass production was reduced by 25% but the mcl-PHA content was maintained at about 30% of the cell dry weight. Importantly, the genetic construct worked well under PHA-producing conditions (nitrogen-limiting phase), where more than 95% of the cell population presented membrane disruption 16 h post induction, with 75% of the total synthesized biopolymer recovered at the end of the fermentation period. In conclusion, this new lysis system circumvents traditional, costly mechanical and enzymatic cell-disrupting procedures.https://www.nature.com/articles/s41598-017-04741-2.pd

    Search for the Heliospheric Termination Shock (TS) and Heliosheath (HS)

    Get PDF
    Voyager 1 continues to measure the very distant Heliospheric Magnetic Field (HMF) beyond 95 AU at ~35 North latitude. The MAG instrument data covers more than a full 22 years solar magnetic cycle. The magnitude of the observed HMF is well described, on average, by Parker's Archimedean spiral structure if due account is made for time variations of the source field strength and solar wind velocity. The V1 magnetic field observations do not provide any evidence for a field increase associated with entry into a subsonic solar wind region, such as the heliosheath is expected to be, nor an exit from this regime. We see no evidence for crossing of the Termination Shock (TS) as has been reported at ~85 AU by the LECP instrument. Merged Interaction Regions are identified by an increased HMF and associated decreases in the flux of >70 MeV/nuc cosmic rays which are then followed by a flux recovery. This CR-B relationship has been identified in V1 data and studied since 1982 when V1 was at 11 AU. The variance of HMF, a direct measure of the energy**1/2 in the HMF fluctuations, shows no significant changes associated with the alleged TS crossings in 2002–2003. Thus, the absence of any HMF increase at the entry into the heliosheath appears not to be due to the onset of mesoscale turbulence as proposed by Fisk. The TS has yet to be directly observed in-situ by the V1 MAG experiment in data through 2003
    • …
    corecore