358 research outputs found
Anonymity vs. Security: The Right Balance for the Smart Grid
This paper examines the conflict between anonymity and security in the context of new innovations that leverage the Internet. Anonymity affords an opportunity for the marginalized to express opinions without fear of persecution or discrimination; however, anonymity also facilitates crime and fraud. Its antithesis, traceability, is meant to deter malicious behavior, but can also be used by governments to control and persecute their populations. The debate between anonymity and security on the Internet is intricately intertwined with threats to domestic and international security. As we launch into the implementation of the Smart Grid, arguably the largest engineering project of modern times, it is time to reexamine the fundamental premises on which the Internet was constructed. A single Internet may no longer be able to handle the conflicting demands of different applications. A new Internet with rules that balance security and anonymity may be appropriate for Smart Grid and other similar critical infrastructure projects. I present the rationale of rethinking the design of the Internet that simplifies its architecture, reduces its complexity, and removes vulnerabilities that have been exploited persistently. I also discuss some of the current trends, especially those related to standards and guidelines on Smart Grid privacy and security
Handbook of Research on Family Business
During the previous decade, the multi-disciplinary field of family business has advanced significantly in terms of advances in theory, development of sophisticated empirical instruments, systematic measurement of family business activity, use of alternative research methodologies and deployment of robust tools of analysis. This second edition of the Handbook of Research on Family Business presents important research and conceptual developments across a broad range of topics. The contributors – notable researchers in the field – explore the frontiers of knowledge in family business entrepreneurship and stimulate critical thinking, enriching the repository of theoretical frameworks and methodologies
Are we predisposed to behave securely? Influence of risk disposition on individual security behaviors
Employees continue to be the weak link in organizational security management and efforts to improve the security of employee behaviors have not been as effective as hoped. Researchers contend that security-related decision making is primarily based on risk perception. There is also a belief that, if changed, this could improve security-related compliance. The extant research has primarily focused on applying theories that assume rational decision making e.g. protection motivation and deterrence theories. This work presumes we can influence employees towards compliance with information security policies and by means of fear appeals and threatened sanctions. However, it is now becoming clear that security-related decision making is complex and nuanced, not a simple carrot- and stick-related situation. Dispositional and situational factors interact and interplay to influence security decisions. In this paper, we present a model that positions psychological disposition of individuals in terms of risk tolerance vs. risk aversion and proposes research to explore how this factor influences security behaviors. We propose a model that acknowledges the impact of employees' individual dispositional risk propensity as well as their situational risk perceptions on security-related decisions. It is crucial to understand this decision-making phenomenon as a foundation for designing effective interventions to reduce such risk taking. We conclude by offering suggestions for further research.</p
Recent Advancement in Proportioning of No-fine Concrete - Review
The paper highlight characteristics of no fine concrete (NFC) by evaluating and interpreting the research work undertaken by research scholars around world in past. It explains the approach for better performances. It helps to understand and identify the difference between knowledge and actual performance on ground which stops it from wide and acceptable application throughout the globe. A comprehensive investigation of proportioning of no fine Concrete has been discussed. Identification of relationship between mechanical properties with its design and pore structure of NFC will help us in studying ways of its better utilization. The specific reference has been made for India to understand level of research & development in laboratories and status of different applications at different levels
Can Privacy and Security Be Friends? A Cultural Framework to Differentiate Security and Privacy Behaviors on Online Social Networks
The boundaries between online privacy and security behaviors in the literature seem blurred. Although these two behaviors are conceptually related, we argue that one does not necessarily imply the other. In this study we aimed to (1) explore the subtle differences between online privacy and security behaviors, and (2) examine how users’ cultural characteristics and a group of multi-level factors exert different effects on the two behaviors. To achieve these two goals, we created a framework by coupling the grid-group theory and INDCOL scale to segment individuals into four categories based on autonomy (individualist vs. collectivist) and acceptance of control (hierarchy vs. equality). The results of one-way ANOVA and path analysis partially confirmed that the underlying mechanisms of online privacy and security behaviors were inherently different. This study provides a basis for creating contextualized security trainings and warnings based on individual differences to promote better privacy and security behaviors
An SEC 10-K XML Schema Extension to Extract Cyber Security Risks
The text sections of the SEC mandated annual reports abound with important corporate operational information but they are hard to manipulate in bulk because of the varying formats used by the submitting companies. Researchers and private entities have demonstrated the difficulties inherent in extracting and accumulating certain textual portions of these reports. This paper proposes an XML schema that will follow a specific DTD for the 10-K (and 10-Q) reports. Using simple computer commands, the ease of manipulation of the reports text sections is demonstrated
CEO overconfidence and dividend policy
We develop a model of the effect of CEO overconfidence on dividend policy and empirically examine many of its predictions. Consistent with our main prediction, we find that the level of dividend payout is lower in firms managed by overconfident CEOs. We document that this reduction in dividends associated with CEO overconfidence is greater in firms with lower growth opportunities, lower cash flow, and greater information asymmetry. We also show that the magnitude of the positive market reaction to a dividend-increase announcement is lower for firms managed by overconfident CEOs. Our overall results are consistent with the predictions of our model.Chief executive officers ; Dividends
- …