835 research outputs found

    Security in Modern Business: Security Assessment Model for Information Security Practices

    Get PDF

    Competing protein-protein interactions regulate binding of Hsp27 to its client protein tau.

    Get PDF
    Small heat shock proteins (sHSPs) are a class of oligomeric molecular chaperones that limit protein aggregation. However, it is often not clear where sHSPs bind on their client proteins or how these protein-protein interactions (PPIs) are regulated. Here, we map the PPIs between human Hsp27 and the microtubule-associated protein tau (MAPT/tau). We find that Hsp27 selectively recognizes two aggregation-prone regions of tau, using the conserved β4-β8 cleft of its alpha-crystallin domain. The β4-β8 region is also the site of Hsp27-Hsp27 interactions, suggesting that competitive PPIs may be an important regulatory paradigm. Indeed, we find that each of the individual PPIs are relatively weak and that competition for shared sites seems to control both client binding and Hsp27 oligomerization. These findings highlight the importance of multiple, competitive PPIs in the function of Hsp27 and suggest that the β4-β8 groove acts as a tunable sensor for clients

    PRIVACY ISSUES IN ONLINE SOCIAL NETWORKS: USER BEHAVIORS AND THIRD-PARTY APPLICATIONS

    Get PDF
    In contemporary society, social networking websites has developed dramatically and became an indispensable component in our daily life. Since it can help create a more feature-rich online social community, third-party service has been widely adopted in online social networks (OSNs). Integrating these third-party sites and applications has not only extended business of both social network server and third party and but also promises to break down the garden walls of social-networking sites. While at the same time it dramatically raises concerns on privacy leakage. This article mainly focuses on the privacy disclosure issues caused by user’s behavior and third-party applications and websites. On the one hand, because of the diversity of usage behaviors, the revelation of personal information varies significantly. A survey is conducted to present empirical and quantitative result. On the other hand, the access mechanism between OSN and third party is not perfect enough. Besides, it could be a potential source of privacy leak that third-party services sometimes act as advertisers and information aggregators of a user\u27s traversals. The relevant reasons and internal and external threats are presented. Finally, possible solutions to reduce the increasing information disclosure are provided. Actions should be taken along three fronts: the government, the users themselves as well as the third parties

    Education in IT Security: A Case Study in Banking Industry

    Get PDF
    The banking industry has been changing incessantlyand facing new combination of risks. Data protection andcorporate security is now one of the major issues in bankingindustry. As the rapid changing on technologies from time totime, the industry should be aware on new technologies in orderto protect information assets and prevent fraud activities. Thispaper begins with literature study of information security issuesand followed by focused-group interviews with five participantswithin the industry and survey analysis of “The global state ofInformation Security survey 2013” which published byPriceWaterhouseCoopers (PWC). Trends and questions werediscussed as well as possible solution. The study suggests that ITsecurity education should be made to different level of staffs suchas executives, professional and general staffs. Besides, thebanking industry should increase company-wide securityawareness and the importance of corporate security which keepthe information and physical assets secure and in a proper way

    CROSS-SECTIONAL EXAMINATION ON ANDROID SECURITY

    Get PDF
    corecore