SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning ""information security" ;lar1:(uu)"

Utökad sökning > "information security" > Uppsala universitet

  • Resultat 1-10 av 16
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Kajtazi, Miranda, 1983-, et al. (författare)
  • Escalation of commitment as an antecedent to noncompliance with information security policy
  • 2018
  • Ingår i: Information and Computer Security. - : Emerald Group Publishing Limited. - 2056-4961. ; 26:2, s. 171-193
  • Tidskriftsartikel (refereegranskat)abstract
    • Purpose: This study aims to identify antecedents to noncompliance behavior influenced by decision contexts where investments in time, effort and resources are devoted to a task - referred to as a task unlikely to be completed without violating the organization's information security policy (ISP).Design/methodology/approach: An empirical test of the suggested relationships in the proposed model was conducted through a field study using the survey method for data collection. Pre-tests, pre-study, main study and a follow-up study compose the frame of our methodology where more than 500 respondents are involved across different organizations.Findings: The results confirm that the antecedents that explain the escalation of commitment behavior in terms of the effect of lost assets, such as time, effort and other resources, give us a new lens to understand noncompliance behavior; employees seem to escalate their commitments to the completion of their tasks at the expense of becoming noncompliant with ISP.Research limitations/implications: One of the key areas that requires further attention from this study is to better understand the role of risk perceptions on employee behavior when dealing with value conflicts. Depending on how risk-averse or risk seeking an employee is, the model showed no significant support in either case to influence their noncompliance behavior. The authors therefore argue that employees' noncompliance may be influenced by more powerful beliefs, such as self-justification and sunk costs.Practical implications: The results show that when employees are caught in tasks undergoing difficulties, they are more likely to increase noncompliance behavior. By understanding better how project obstacles result in such tasks, security managers can define new mechanisms to counter employees' shift from compliance to noncompliance.Social implications: Apart from encouraging compliance with enforcement mechanisms (using direct behavioral controls like sanctions or rewards), indirect behavior controls may also encourage compliance. The authors suggest that the ISPs should state that the organization would take positive actions toward task completion and help their employees to resolve their problems quickly.Originality/value: This study is the first to tackle escalation of commitment theories and use antecedents that explain the effect of lost assets, such as time, effort and other resources can also explain noncompliance with ISP in terms of the value conflicts, where employees would often choose to forego compliance at the expense of finishing their tasks.
  •  
2.
  • Åhlfeldt, Rose-Mharie, et al. (författare)
  • Patient Safety and Patient Privacy when Patient Reading their Medical Records
  • 2014
  • Ingår i: Safe and Secure Cities. - Cham : Springer. - 9783319102108 - 9783319102115 ; , s. 230-239
  • Konferensbidrag (refereegranskat)abstract
    • When patients get access to their personal health information new security demands arise. This paper presents results from a study aiming to improve the understanding of how the patients’ different perceptions of their own personal health and health information preferences can be linked to anticipated positive and negative security concerns. The analysis and discussion focuses on investigating how the security issues and patients’ perception on the benefits and threats of accessing their medical records relate to each other. The results show that a more holistic systemic perspective to information security is needed to support the effective use of medical records in the healthcare in information and data driven society in order to improve both patient safety and patient privacy.
  •  
3.
  • Karlsson, Fredrik, 1974-, et al. (författare)
  • Inter-organisational information sharing : Between a rock and a hard place
  • 2015
  • Ingår i: Proceedings of the Ninth International Symposium on Human Aspects of Information  Security & Assurance (HAISA 2015). - Plymouth UK : Plymouth University. - 9781841023885 ; , s. 71-81
  • Konferensbidrag (refereegranskat)abstract
    • Although inter-organisational collaboration is common, most information security (IS) research has focused on IS issues within organisations. Confidentiality, integrity of data and availability (CIA) and responsibility, integrity of role, trust, and ethicality (RITE) are two sets of principles for managing IS that have been developed from an intra-organisational, rather static, perspective. The aim of this paper is thus to investigate the relation between the CIA and RITE principles in the context of an inter-organisational collaboration, i.e., collaboration between organisations. To this end we investigated inter-organisational collaboration and information sharing concerning Swedish cooper corrosion research in the field a long-term nuclear waste disposal. We found that in an inter-organisational context, responsibility, integrity of role and ethicality affected the CIA-principles, which in turn affected the collaborating actors’ trust in each other over time.
  •  
4.
  • Wang, J., et al. (författare)
  • Fake News in Virtual Community, Virtual Society, and Metaverse : A Survey
  • 2023
  • Ingår i: IEEE Transactions on Computational Social Systems. - : Institute of Electrical and Electronics Engineers Inc.. - 2329-924X. ; , s. 1-15
  • Tidskriftsartikel (refereegranskat)abstract
    • In the trend of the accelerated progression of communication network technology, the emergence of virtual communities (VCs), virtual societies (VSs), metaverse, and other technologies not only makes data access and sharing easier but also leads to the proliferation of fake news (FN). To effectively monitor and identify FN in VC, VS, and metaverse, and to create a safer virtual space, this work takes FN in VC, VS, and metaverse as objects. First, the content and display methods of FN are reviewed and explained, and it is understood that FN is mainly displayed by single-modal and multimodal representations. Second, the application scenarios in many important fields such as transportation are reviewed and analyzed, so as to further understand the impact and detection effect of FN in different scenarios. Finally, an intelligent outlook and summary analysis are carried out on the detection and information security of FN, which provides theoretical reference and new opportunities for the detection and identification of FN in the virtual cyberspace. IEEE
  •  
5.
  • Chen, D., et al. (författare)
  • Artificial intelligence enabled Digital Twins for training autonomous cars
  • 2022
  • Ingår i: Internet of Things and Cyber-Physical Systems. - : KeAi Communications Co.. - 2667-3452. ; 2, s. 31-41
  • Tidskriftsartikel (refereegranskat)abstract
    • This exploration is aimed at the system prediction and safety performance of the Digital Twins (DTs) of autonomous cars based on artificial intelligence technology, and the intelligent development of transportation in the smart city. On the one hand, considering the problem of safe driving of autonomous cars in intelligent transportation systems, it is essential to ensure the transmission safety of vehicle data and realize the load balancing scheduling of data transmission resources. On the other hand, convolution neural network (CNN) of the deep learning algorithm is adopted and improved, and then, the DTs technology is introduced. Finally, an autonomous cars DTs prediction model based on network load balancing and spatial-temporal graph convolution network is constructed. Moreover, through simulation, the performance of this model is analyzed from perspectives of Accuracy, Precision, Recall, and F1-score. The experimental results demonstrate that in comparative analysis, the accuracy of road network prediction of the model reported here is 92.70%, which is at least 2.92% higher than that of the models proposed by other scholars. Through the analysis of the security performance of network data transmission, it is found that this model achieves a lower average delay time than other comparative models. Besides, the message delivery rate is basically stable at 80%, and the message leakage rate is basically stable at about 10%. Therefore, the prediction model for autonomous cars constructed here not only ensures low delay but also has excellent network security performance, so that information can interact more efficiently. The research outcome can provide an experimental basis for intelligent development and safety performance improvement in the transportation field of smart cities. © 2022 The Authors
  •  
6.
  • Chockalingam, Sabarathinam, et al. (författare)
  • Bayesian Network Models in Cyber Security : A Systematic Review
  • 2017
  • Ingår i: Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics). - Cham : Springer, Cham. ; , s. 105-122
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • © 2017, Springer International Publishing AG. Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially due to their capability to overcome data limitations. This is also exemplified by the growth of BN models development in cyber security. However, a comprehensive comparison and analysis of these models is missing. In this paper, we conduct a systematic review of the scientific literature and identify 17 standard BN models in cyber security. We analyse these models based on 8 different criteria and identify important patterns in the use of these models. A key outcome is that standard BNs are noticeably used for problems especially associated with malicious insiders. This study points out the core range of problems that were tackled using standard BN models in cyber security, and illuminates key research gaps.
  •  
7.
  • Kish, Laszlo B., et al. (författare)
  • Comments On "A New Transient Attack On The Kish Key Distribution System"
  • 2016
  • Ingår i: METROLOGY AND MEASUREMENT SYSTEMS. - : Walter de Gruyter GmbH. - 0860-8229 .- 2300-1941. ; 23:3, s. 321-331
  • Tidskriftsartikel (refereegranskat)abstract
    • A recent IEEE Access Paper by Gunn, Allison and Abbott (GAA) proposed a new transient attack against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system. The attack is valid, but it is easy to build a defense for the KLJN system. Here we note that GAA's paper contains several invalid statements regarding security measures and the continuity of functions in classical physics. These deficiencies are clarified in our present paper, wherein we also emphasize that a new version of the KLJN system is immune against all existing attacks, including the one by GAA.
  •  
8.
  • Kanté, Mahamadou, et al. (författare)
  • Use of partial least squares structural equation modelling (PLS-SEM) in privacy and disclosure research on social network sites : A systematic review
  • 2023
  • Ingår i: Computers in Human Behavior Reports. - : Elsevier. - 2451-9588. ; 10
  • Tidskriftsartikel (refereegranskat)abstract
    • Structural equation modelling (SEM) is a statistical technique used in the field of Information Systems amongst others. The technique has been paid attention thanks to its flexibility and predictive power. However, there is a paucity of guidelines in the application of the technique in the field of Behavioural Information Security. Hence, this paper aims to provide a comprehensive guide of using PLS-SEM in disclosure and privacy studies on Social Network Sites (SNSs). Data has been gathered using papers (n=21) published between 2006 and 2022 from scholarly databases such as Google Scholar, Association for Information Systems eLibrary (AISeL), IEEE Xplore and Science Direct. The Preferred Reporting Items for Systematic reviews and Meta-Analyses (PRISMA 2020) was used to analyse and synthesize the status of the field. Our systematic review covers data characteristics, reasons for using PLS-SEM, the evaluation of measurement models, the evaluation of the structural model and reporting best practices. The review proposed guidelines for the use of PLS-SEM in the discipline of Behavioural Information Security with a focus on disclosure and privacy on SNSs studies and other fields as well.
  •  
9.
  • Lv, Zhihan, Dr. 1984-, et al. (författare)
  • Behavioral Modeling and Prediction in Social Perception and Computing : A Survey
  • 2023
  • Ingår i: IEEE Transactions on Computational Social Systems. - : Institute of Electrical and Electronics Engineers (IEEE). - 2329-924X. ; 10:4, s. 2008-2021
  • Tidskriftsartikel (refereegranskat)abstract
    • More data are generated through interaction between cyber space, physical space, and social space thanks to mobile network technology, giving birth to the so-called cyber–physical social intelligent ecosystem (C&P-SIE). This survey studies the development of physical social intelligence. First, it classifies and discusses the behavior modeling, learning, and adaptation applications of C&P-SIE from intelligent transportation, healthcare, public service, economy, and social networking. Then, it prospects the application of behavior modeling in the C&P-SIE from the perspectives of information security, data-driven techniques, and modeling learning under cooperative artificial intelligence technologies. The research provides a theoretical basis and new opportunities for the digital and intelligent development of smart cities and social systems. IEEE
  •  
10.
  • Kebande, Victor R., 1985-, et al. (författare)
  • Towards a Learning-enabled Virtual Sensor Forensic Architecture Compliant with Edge Intelligence
  • 2021
  • Ingår i: 2021 2nd International Conference on Intelligent Data Science Technologies and Applications, IDSTA 2021. - : Institute of Electrical and Electronics Engineers Inc.. - 9781665421805 - 9781665421812 ; , s. 154-161
  • Konferensbidrag (refereegranskat)abstract
    • While the Internet of Things (IoT), Wireless Sensor Networks (WSNs), and the techniques for extracting digital data have seen continuous advancements, so does the cyber-Threat landscape. Virtual sensors which normally use abstraction layers that operate over a physical infrastructure to achieve their objectives, have seen rapid adoption, for example, it has aided in achieving manufacturing 4.0. This abstract layer has in the recent past seen tremendous proliferation within the sensor-based platform. Coupled with data pre-processing and key compliance with the guidelines for information security, incident investigation principles, and processes. This paper discusses a step towards a Learning-enabled (LE) Virtual Sensor Forensic (VSF) architecture that is compliant with edge intelligence technology, which is based on an initially proposed generic VSF architecture. Furthermore, apart from the learning capabilities, the LE-VSF architecture considers proactive and reactive investigation techniques by assuming an Internet of Vehicle (IoV) attack scenario, enhancing the reliability of a forensically sound data source. This proposition is essential in any sensor-based abstraction where the forensic analysis would otherwise be cumbersome and susceptible to noise. © 2021 IEEE.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 16
Typ av publikation
tidskriftsartikel (11)
konferensbidrag (4)
bokkapitel (1)
Typ av innehåll
refereegranskat (15)
övrigt vetenskapligt/konstnärligt (1)
Författare/redaktör
Lv, Z. (3)
Alawadi, Sadi, 1983- (2)
Lv, Zhihan, Dr. 1984 ... (2)
Awaysheh, Feras M. (2)
Li, Y. (1)
Wang, J. (1)
visa fler...
Zhang, H. (1)
Liu, S. (1)
Chen, D (1)
Hernandez, Adrian F. (1)
Ikuesan, Richard Ade ... (1)
Andersson, Tomas (1)
Granqvist, Claes-Gör ... (1)
Persson, Jan A. (1)
Kebande, Victor R., ... (1)
Ezekowitz, Justin (1)
Cheng, C (1)
Peterson, Eric D. (1)
Åhlfeldt, Rose-Mhari ... (1)
James, Stefan K., 19 ... (1)
Teixeira, André (1)
Hedström, Karin, 196 ... (1)
Karlsson, Fredrik, 1 ... (1)
Huvila, Isto, 1976- (1)
Frostenson, Magnus, ... (1)
Kish, Laszlo B. (1)
Haftor, Darek, 1969- (1)
Ford, Ian (1)
Bucknall, Benjamin S ... (1)
Dori-Hacohen, Shiri (1)
Stockbridge, Norman (1)
Kolkowska, Ella, 197 ... (1)
Wasserman, Scott M. (1)
Temple, Robert (1)
Chockalingam, Sabara ... (1)
Pieters, Wolter (1)
van Gelder, Pieter (1)
Fortino, G. (1)
Guerrieri, A. (1)
Kajtazi, Miranda, 19 ... (1)
Li, Yuxi (1)
Cavusoglu, Hasan (1)
Benbasat, Izak (1)
Kanté, Mahamadou (1)
Michel, Babri (1)
Kebande, Victor R., ... (1)
Lv, H (1)
Krylova-Grek, Yuliya (1)
Korniyaka, Olga (1)
Min, Y (1)
visa färre...
Lärosäte
Örebro universitet (2)
Luleå tekniska universitet (1)
Lunds universitet (1)
Malmö universitet (1)
Högskolan i Skövde (1)
visa fler...
Blekinge Tekniska Högskola (1)
visa färre...
Språk
Engelska (16)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (12)
Teknik (5)
Samhällsvetenskap (5)
Medicin och hälsovetenskap (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy