4 research outputs found

    Employees' Information Security Awareness and Behavioural Intentions in Higher Education Institutions in Oman

    Get PDF
    Organisations throughout the world face threats to the security of their information. In most organisations these threats are thought to be a consequence of employees’ lack of knowledge of information security, security behaviours and/or understanding of the possible detriments to their organisation of not complying with their organisation’s information security policy (ISP). Therefore, empirical research is needed to explore the main threats to information security and the factors that influence how employees intend to behave in relation to information security policies. The main aims of this research were to investigate employees’ ISP compliance behaviour intentions and to explore the organisational and human factors that influence this. Consequently, this research conducted four studies to explore the views of both those responsible for information security (IT staff and system administrators) and non-security employees from a range of higher education institutions in the Sultanate of Oman. First, interviews were conducted with eight IT staff and system administrators from Omani universities and colleges to explore the common, current information security threats, organisational information security processes and their perceptions of employee information security behaviour in general, and their compliance with ISPs in particular. The findings of this study showed the weaknesses in information security in different organisations and IT staff suggested that employees may not be aware of information security and do not comply with their organisation’s ISP. The reported perceptions of IT and staff system administrators were used to design a survey of employee knowledge, awareness and behaviour intentions which was used in the second study. The second study used a questionnaire-based survey which was designed from the knowledge gained form the first study, a review of the relevant literature and actual ISPs in use at the organisations involved in the study. Data from 503 employees from multiple higher education institutions was analysed. The survey comprised three parts: (i) demographic questions, (ii) 14 information security scenario questions designed to elicit employee behaviour intentions and (iii) some of the factors influencing their behaviour (underpinned by current theories in psychology). The results show that employees’ behaviour intentions vary according to the information security scenario they experience and that the biggest influences on their behaviour are perceived to be trust and authority. The third study involved 17 IT staff and system administrators from six higher education institutions. Using the same questionnaire from the second study plus qualitative questions, the aim of this third study was to understand what behaviours were seen by IT staff and system administrators as most important and what non-ISP-compliant behaviours they would, nevertheless, also deem to be acceptable. The results highlight the relationship between the behaviours that IT staff rate as important, and whether or not staff intend to adopt that behaviour. The fourth study used four focus groups (n= 21) from one higher education institution to further explore why employees may not intend to comply with the organisation’s ISP and to explore the factors that influence these non-compliance intentions. The focus groups also explored the employees’ recommendations for improving organisational information security management. The finding of this study revealed some recommendations for developing information security organisation management and the motivators and barriers that influence employees’ security behaviours. Finally, the results of the four studies were analysed together and it was found that staff consider that communicating the information security policy, ongoing information security risk assessment, ongoing awareness and training, management support and commitment and good communication are important factors in information security compliance intentions. Secondly, it was found that the way organisations manage information security, and human factors in particular (mostly to do with trust and authority), is most important in maximising compliance intentions. Recommendations were provided to improve organisational information security management and to encourage employees to comply with ISPs

    IoT-based Smart Traffic Cone System to Avoid Traffic Congestion and Improve Road Safety

    Get PDF
    Chain-reaction automobile accidents are a common occurrence, especially on freeways. Several reasons can lead to these collisions, such as speed, failing to see stop signs for oncoming traffic, and unforeseen road conditions. The Internet of Things (IoT)-Based Smart Traffic Cone System is created as a solution to these problems. It makes use of a variety of sensors and IoT technologies that are elegantly incorporated into the traffic cone's design. It is a solar-powered smart portable device in the shape of a traffic cone. Particularly on two-way roads, the traffic cones are positioned strategically in the median of the road. In addition, a traffic display panel is placed near the signal to make necessary adjustments before encountering traffic jams. A Bluetooth system is used to alert the drivers inside their vehicles about the road conditions. This initiative is aimed at the VISION 2040 of Oman, which emphasizes the creation of smart and sustainable cities with advanced IT infrastructure. The smart traffic cone represents an innovative solution developed after long research and with the recommendations and guidance of the Royal Oman Police (RoP) for the advancement of smart city development. Through continued research and development efforts, the functional prototype of the Traffic cone system has been successfully developed

    Differences in the Bacteriome of Smokeless Tobacco Products with Different Oral Carcinogenicity: Compositional and Predicted Functional Analysis

    No full text
    Smokeless tobacco (ST) products vary significantly in their oral carcinogenicity. Much is known about the differences in the chemical, but not the bacterial, constituents of these products. In this study, we explored the composition and function of the bacteriome in ST products from four countries using quantitative polymerase chain reaction (qPCR) and 16S rRNA-based next generation sequencing. The bacterial load (16S rRNA copies/gram) was lowest in Swedish snus (3.4 × 106) and highest in Yemeni shammah (6.6 × 1011). A total of 491 species-level taxa, many of which are potentially novel, belonging to 178 genera and 11 phyla were identified. Species richness and diversity were highest for Swedish snus and lowest for Yemeni shammah. Bacillus, Paenibacillus, and Oceanobacillus spp. were the most abundant in American snuff; species of Pseudomonas, Massilia, Propionibacterium, Puniceispirillum, and Gloeothece predominated in Swedish snus. In Sudanese toombak, Facklamia, Desemzia, Atopostipes, and Lysinibacillus spp. accounted for the majority of the bacteriome. Yemeni shammah exclusively contained Bacillus spp. Functional prediction by phylogenetic investigation of communities by reconstruction of unobserved states (PICRUSt) showed that genes encoding cadmium/zinc and nickel transport systems were enriched in the presumptively “high carcinogenicity” products. The bacteriome of ST products thus differed qualitatively, quantitatively, and functionally. The relevance of these differences, particularly with respect to nickel and cadmium, to oral carcinogenesis warrants further investigation

    Regenerative Effect of Platelet Concentrates in Oral and Craniofacial Regeneration

    No full text
    International audiencePlatelet concentrates (PCs) are biological autologous products derived from the patient's whole blood and consist mainly of supraphysiologic concentration of platelets and growth factors (GFs). These GFs have anti-inflammatory and healing enhancing properties. Overall, PCs seem to enhance bone and soft tissue healing in alveolar ridge augmentation, periodontal surgery, socket preservation, implant surgery, endodontic regeneration, sinus augmentation, bisphosphonate related osteonecrosis of the jaw (BRONJ), osteoradionecrosis, closure of oroantral communication (OAC), and oral ulcers. On the other hand, no effect was reported for gingival recession and guided tissue regeneration (GTR) procedures. Also, PCs could reduce pain and inflammatory complications in temporomandibular disorders (TMDs), oral ulcers, and extraction sockets. However, these effects have been clinically inconsistent across the literature. Differences in study designs and types of PCs used with variable concentration of platelets, GFs, and leucocytes, as well as different application forms and techniques could explain these contradictory results. This study aims to review the clinical applications of PCs in oral and craniofacial tissue regeneration and the role of their molecular components in tissue healing
    corecore