1,071 research outputs found

    CHSH violation and entropy - concurrence plane

    Full text link
    We characterize violation of CHSH inequalities for mixed two-qubit states by their mixedness and entanglement. The class of states that have maximum degree of CHSH violation for a given linear entropy is also constructed

    ICT education: bridging with the Industry

    Get PDF
    This paper presents the practical forms of university/industry co-operation which we have developed over the years at the Department of Information Systems and Operations Management (ISOM) at the University of Auckland, New Zealand. Most of these practices are well known but we think that the ISOM Department set up a comprehensive policy in this area

    Privacy Issues of Electronic Medical Records from the Patient’s Perspective

    Get PDF
    This research was aimed on addressing patients’ perspective in medical field. A self-selection questionnaire was developed and distributed among patients at selected healthcare providers. Specifically we wanted to evaluate patients’ opinions in big cities. From the results we have found that participants in both environments (big cities v rural regions) exhibit similar attitudes towards the security of their medical records. Habitants of big cities demonstrated higher trust in the Electronic Medical Records (EMR) which was presumably related to being more electronically adept

    Exploring Incentives and Challenges for Cybersecurity Intelligence Sharing (CIS) across Organizations: A Systematic Review

    Get PDF
    Cybersecurity intelligence sharing (CIS) has gained significance as an organizational function to protect critical information assets, manage cybersecurity risks, and improve cybersecurity operations. However, few studies have synthesized accumulated scholarly knowledge on CIS practices across disciplines. Synthesizing the pertinent literature through a structured literature review, we investigated the incentives and challenges that influence organizations around adopting CIS practices. We used the overarching TOE framework to categorize these factors and propose a theoretical framework to establish common ground for future studies. We also developed a holistic and inclusive definition for cybersecurity intelligence that we present in the paper. We found 46 papers on CIS in different disciplines and analyzed them to answer our research questions. We identified 35 factors that we classified according to the TOE framework. With this paper, we facilitate further theory development by overviewing theories that researchers can use as a basis for CIS studies, suggesting future directions, providing a reference source, and developing a reference CIS framework for IS scholars

    Review of the PKI status in New Zealand

    Get PDF
    The research presented in this report was an attempt to answer the question: What is the situation with regard to the deployment of the PKI in New Zealand and are there attractive business models that can be successful in New Zealand? This work also provided an answer to the question of acceptance issues we face when deploying PKI in New Zealand. It attempted to find a workable model that could be appealing to New Zealand businesses and other organisations that need to use the Internet for conducting their affairs

    IOT: Challenges in Information Security Training

    Get PDF
    Both consumers and businesses are rapidly adopting IoT premised on convenience and control. Industry and academic literature talk about billions of embedded IoT devices being implemented with use-cases ranging from smart speakers in the home, to autonomous trucks, and trains operating in remote industrial sites. Historically information systems supporting these disparate use-cases have been categorised as Information Technology (IT) or Operational Technology (OT), but IoT represents a fusion between these traditionally distinct information security models. This paper presents a review of IEEE and Elsevier peer reviewed papers that identifies the direction in IoT education and training around information security. It concludes that the education/training still is largely distinct and is not addressing the needs of this hybrid IT and OT model. IoT is complex as it melds embedded systems and software in support of interaction with physical systems. While literature contains implementation specific research, papers that address appropriate methodologies and content around secure design are piecemeal in nature. We conclude that in the rush to find implementation specific strategies the overarching strategy around education and training of secure IoT design is not being adequately addressed. Consequently, we propose a novel approach to how IoT education training can better incorporate the topic of secure design at a foundational level
    corecore