SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning ""information security" ;lar1:(uu)"

Utökad sökning > "information security" > Uppsala universitet

  • Resultat 1-10 av 15
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Kajtazi, Miranda, 1983-, et al. (författare)
  • Escalation of commitment as an antecedent to noncompliance with information security policy
  • 2018
  • Ingår i: Information and Computer Security. - : Emerald Group Publishing Limited. - 2056-4961. ; 26:2, s. 171-193
  • Tidskriftsartikel (refereegranskat)abstract
    • Purpose: This study aims to identify antecedents to noncompliance behavior influenced by decision contexts where investments in time, effort and resources are devoted to a task - referred to as a task unlikely to be completed without violating the organization's information security policy (ISP).Design/methodology/approach: An empirical test of the suggested relationships in the proposed model was conducted through a field study using the survey method for data collection. Pre-tests, pre-study, main study and a follow-up study compose the frame of our methodology where more than 500 respondents are involved across different organizations.Findings: The results confirm that the antecedents that explain the escalation of commitment behavior in terms of the effect of lost assets, such as time, effort and other resources, give us a new lens to understand noncompliance behavior; employees seem to escalate their commitments to the completion of their tasks at the expense of becoming noncompliant with ISP.Research limitations/implications: One of the key areas that requires further attention from this study is to better understand the role of risk perceptions on employee behavior when dealing with value conflicts. Depending on how risk-averse or risk seeking an employee is, the model showed no significant support in either case to influence their noncompliance behavior. The authors therefore argue that employees' noncompliance may be influenced by more powerful beliefs, such as self-justification and sunk costs.Practical implications: The results show that when employees are caught in tasks undergoing difficulties, they are more likely to increase noncompliance behavior. By understanding better how project obstacles result in such tasks, security managers can define new mechanisms to counter employees' shift from compliance to noncompliance.Social implications: Apart from encouraging compliance with enforcement mechanisms (using direct behavioral controls like sanctions or rewards), indirect behavior controls may also encourage compliance. The authors suggest that the ISPs should state that the organization would take positive actions toward task completion and help their employees to resolve their problems quickly.Originality/value: This study is the first to tackle escalation of commitment theories and use antecedents that explain the effect of lost assets, such as time, effort and other resources can also explain noncompliance with ISP in terms of the value conflicts, where employees would often choose to forego compliance at the expense of finishing their tasks.
  •  
2.
  • Åhlfeldt, Rose-Mharie, et al. (författare)
  • Patient Safety and Patient Privacy when Patient Reading their Medical Records
  • 2014
  • Ingår i: Safe and Secure Cities. - Cham : Springer. - 9783319102108 - 9783319102115 ; , s. 230-239
  • Konferensbidrag (refereegranskat)abstract
    • When patients get access to their personal health information new security demands arise. This paper presents results from a study aiming to improve the understanding of how the patients’ different perceptions of their own personal health and health information preferences can be linked to anticipated positive and negative security concerns. The analysis and discussion focuses on investigating how the security issues and patients’ perception on the benefits and threats of accessing their medical records relate to each other. The results show that a more holistic systemic perspective to information security is needed to support the effective use of medical records in the healthcare in information and data driven society in order to improve both patient safety and patient privacy.
  •  
3.
  • Karlsson, Fredrik, 1974-, et al. (författare)
  • Inter-organisational information sharing : Between a rock and a hard place
  • 2015
  • Ingår i: Proceedings of the Ninth International Symposium on Human Aspects of Information  Security & Assurance (HAISA 2015). - Plymouth UK : Plymouth University. - 9781841023885 ; , s. 71-81
  • Konferensbidrag (refereegranskat)abstract
    • Although inter-organisational collaboration is common, most information security (IS) research has focused on IS issues within organisations. Confidentiality, integrity of data and availability (CIA) and responsibility, integrity of role, trust, and ethicality (RITE) are two sets of principles for managing IS that have been developed from an intra-organisational, rather static, perspective. The aim of this paper is thus to investigate the relation between the CIA and RITE principles in the context of an inter-organisational collaboration, i.e., collaboration between organisations. To this end we investigated inter-organisational collaboration and information sharing concerning Swedish cooper corrosion research in the field a long-term nuclear waste disposal. We found that in an inter-organisational context, responsibility, integrity of role and ethicality affected the CIA-principles, which in turn affected the collaborating actors’ trust in each other over time.
  •  
4.
  • Wang, J., et al. (författare)
  • Fake News in Virtual Community, Virtual Society, and Metaverse : A Survey
  • 2023
  • Ingår i: IEEE Transactions on Computational Social Systems. - : Institute of Electrical and Electronics Engineers Inc.. - 2329-924X. ; , s. 1-15
  • Tidskriftsartikel (refereegranskat)abstract
    • In the trend of the accelerated progression of communication network technology, the emergence of virtual communities (VCs), virtual societies (VSs), metaverse, and other technologies not only makes data access and sharing easier but also leads to the proliferation of fake news (FN). To effectively monitor and identify FN in VC, VS, and metaverse, and to create a safer virtual space, this work takes FN in VC, VS, and metaverse as objects. First, the content and display methods of FN are reviewed and explained, and it is understood that FN is mainly displayed by single-modal and multimodal representations. Second, the application scenarios in many important fields such as transportation are reviewed and analyzed, so as to further understand the impact and detection effect of FN in different scenarios. Finally, an intelligent outlook and summary analysis are carried out on the detection and information security of FN, which provides theoretical reference and new opportunities for the detection and identification of FN in the virtual cyberspace. IEEE
  •  
5.
  • Chen, D., et al. (författare)
  • Artificial intelligence enabled Digital Twins for training autonomous cars
  • 2022
  • Ingår i: Internet of Things and Cyber-Physical Systems. - : KeAi Communications Co.. - 2667-3452. ; 2, s. 31-41
  • Tidskriftsartikel (refereegranskat)abstract
    • This exploration is aimed at the system prediction and safety performance of the Digital Twins (DTs) of autonomous cars based on artificial intelligence technology, and the intelligent development of transportation in the smart city. On the one hand, considering the problem of safe driving of autonomous cars in intelligent transportation systems, it is essential to ensure the transmission safety of vehicle data and realize the load balancing scheduling of data transmission resources. On the other hand, convolution neural network (CNN) of the deep learning algorithm is adopted and improved, and then, the DTs technology is introduced. Finally, an autonomous cars DTs prediction model based on network load balancing and spatial-temporal graph convolution network is constructed. Moreover, through simulation, the performance of this model is analyzed from perspectives of Accuracy, Precision, Recall, and F1-score. The experimental results demonstrate that in comparative analysis, the accuracy of road network prediction of the model reported here is 92.70%, which is at least 2.92% higher than that of the models proposed by other scholars. Through the analysis of the security performance of network data transmission, it is found that this model achieves a lower average delay time than other comparative models. Besides, the message delivery rate is basically stable at 80%, and the message leakage rate is basically stable at about 10%. Therefore, the prediction model for autonomous cars constructed here not only ensures low delay but also has excellent network security performance, so that information can interact more efficiently. The research outcome can provide an experimental basis for intelligent development and safety performance improvement in the transportation field of smart cities. © 2022 The Authors
  •  
6.
  • Chockalingam, Sabarathinam, et al. (författare)
  • Bayesian Network Models in Cyber Security : A Systematic Review
  • 2017
  • Ingår i: Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics). - Cham : Springer, Cham. ; , s. 105-122
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • © 2017, Springer International Publishing AG. Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially due to their capability to overcome data limitations. This is also exemplified by the growth of BN models development in cyber security. However, a comprehensive comparison and analysis of these models is missing. In this paper, we conduct a systematic review of the scientific literature and identify 17 standard BN models in cyber security. We analyse these models based on 8 different criteria and identify important patterns in the use of these models. A key outcome is that standard BNs are noticeably used for problems especially associated with malicious insiders. This study points out the core range of problems that were tackled using standard BN models in cyber security, and illuminates key research gaps.
  •  
7.
  • Kish, Laszlo B., et al. (författare)
  • Comments On "A New Transient Attack On The Kish Key Distribution System"
  • 2016
  • Ingår i: METROLOGY AND MEASUREMENT SYSTEMS. - : Walter de Gruyter GmbH. - 0860-8229 .- 2300-1941. ; 23:3, s. 321-331
  • Tidskriftsartikel (refereegranskat)abstract
    • A recent IEEE Access Paper by Gunn, Allison and Abbott (GAA) proposed a new transient attack against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system. The attack is valid, but it is easy to build a defense for the KLJN system. Here we note that GAA's paper contains several invalid statements regarding security measures and the continuity of functions in classical physics. These deficiencies are clarified in our present paper, wherein we also emphasize that a new version of the KLJN system is immune against all existing attacks, including the one by GAA.
  •  
8.
  • Lv, Zhihan, Dr. 1984-, et al. (författare)
  • Behavioral Modeling and Prediction in Social Perception and Computing : A Survey
  • 2023
  • Ingår i: IEEE Transactions on Computational Social Systems. - : Institute of Electrical and Electronics Engineers (IEEE). - 2329-924X. ; 10:4, s. 2008-2021
  • Tidskriftsartikel (refereegranskat)abstract
    • More data are generated through interaction between cyber space, physical space, and social space thanks to mobile network technology, giving birth to the so-called cyber–physical social intelligent ecosystem (C&P-SIE). This survey studies the development of physical social intelligence. First, it classifies and discusses the behavior modeling, learning, and adaptation applications of C&P-SIE from intelligent transportation, healthcare, public service, economy, and social networking. Then, it prospects the application of behavior modeling in the C&P-SIE from the perspectives of information security, data-driven techniques, and modeling learning under cooperative artificial intelligence technologies. The research provides a theoretical basis and new opportunities for the digital and intelligent development of smart cities and social systems. IEEE
  •  
9.
  • Kebande, Victor R., 1985-, et al. (författare)
  • Towards a Learning-enabled Virtual Sensor Forensic Architecture Compliant with Edge Intelligence
  • 2021
  • Ingår i: 2021 2nd International Conference on Intelligent Data Science Technologies and Applications, IDSTA 2021. - : Institute of Electrical and Electronics Engineers Inc.. - 9781665421805 - 9781665421812 ; , s. 154-161
  • Konferensbidrag (refereegranskat)abstract
    • While the Internet of Things (IoT), Wireless Sensor Networks (WSNs), and the techniques for extracting digital data have seen continuous advancements, so does the cyber-Threat landscape. Virtual sensors which normally use abstraction layers that operate over a physical infrastructure to achieve their objectives, have seen rapid adoption, for example, it has aided in achieving manufacturing 4.0. This abstract layer has in the recent past seen tremendous proliferation within the sensor-based platform. Coupled with data pre-processing and key compliance with the guidelines for information security, incident investigation principles, and processes. This paper discusses a step towards a Learning-enabled (LE) Virtual Sensor Forensic (VSF) architecture that is compliant with edge intelligence technology, which is based on an initially proposed generic VSF architecture. Furthermore, apart from the learning capabilities, the LE-VSF architecture considers proactive and reactive investigation techniques by assuming an Internet of Vehicle (IoV) attack scenario, enhancing the reliability of a forensically sound data source. This proposition is essential in any sensor-based abstraction where the forensic analysis would otherwise be cumbersome and susceptible to noise. © 2021 IEEE.
  •  
10.
  • Bucknall, Benjamin S., et al. (författare)
  • Current and Near-Term AI as a Potential Existential Risk Factor
  • 2022
  • Ingår i: Proceedings of the 2022 AAAI/ACM Conference on AI, Ethics, And Society, AIES 2022. - New York, NY, USA : Association for Computing Machinery (ACM). - 9781450392471 ; , s. 119-129
  • Konferensbidrag (refereegranskat)abstract
    • There is a substantial and ever-growing corpus of evidence and literature exploring the impacts of Artificial intelligence (AI) technologies on society, politics, and humanity as a whole. A separate, parallel body of work has explored existential risks to humanity, including but not limited to that stemming from unaligned Artificial General Intelligence (AGI). In this paper, we problematise the notion that current and near-term artificial intelligence technologies have the potential to contribute to existential risk by acting as intermediate risk factors, and that this potential is not limited to the unaligned AGI scenario. We propose the hypothesis that certain already-documented effects of AI can act as existential risk factors, magnifying the likelihood of previously identified sources of existential risk. Moreover, future developments in the coming decade hold the potential to significantly exacerbate these risk factors, even in the absence of artificial general intelligence. Our main contribution is a (non-exhaustive) exposition of potential AI risk factors and the causal relationships between them, focusing on how AI can affect power dynamics and information security. This exposition demonstrates that there exist causal pathways from AI systems to existential risks that do not presuppose hypothetical future AI capabilities.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 15
Typ av publikation
tidskriftsartikel (10)
konferensbidrag (4)
bokkapitel (1)
Typ av innehåll
refereegranskat (14)
övrigt vetenskapligt/konstnärligt (1)
Författare/redaktör
Lv, Z. (3)
Alawadi, Sadi, 1983- (2)
Lv, Zhihan, Dr. 1984 ... (2)
Awaysheh, Feras M. (2)
Li, Y. (1)
Wang, J. (1)
visa fler...
Zhang, H. (1)
Liu, S. (1)
Chen, D (1)
Ikuesan, Richard Ade ... (1)
Andersson, Tomas (1)
Granqvist, Claes-Gör ... (1)
Kebande, Victor R., ... (1)
Ezekowitz, Justin (1)
Persson, Jan A. (1)
Cheng, C (1)
Peterson, Eric D. (1)
Åhlfeldt, Rose-Mhari ... (1)
James, Stefan K., 19 ... (1)
Teixeira, André (1)
Hedström, Karin, 196 ... (1)
Karlsson, Fredrik, 1 ... (1)
Huvila, Isto, 1976- (1)
Frostenson, Magnus, ... (1)
Hernandez, Adrian F (1)
Kish, Laszlo B. (1)
Haftor, Darek, 1969- (1)
Ford, Ian (1)
Bucknall, Benjamin S ... (1)
Dori-Hacohen, Shiri (1)
Stockbridge, Norman (1)
Kolkowska, Ella, 197 ... (1)
Wasserman, Scott M. (1)
Temple, Robert (1)
Chockalingam, Sabara ... (1)
Pieters, Wolter (1)
van Gelder, Pieter (1)
Fortino, G. (1)
Guerrieri, A. (1)
Kajtazi, Miranda, 19 ... (1)
Li, Yuxi (1)
Cavusoglu, Hasan (1)
Benbasat, Izak (1)
Kebande, Victor R., ... (1)
Lv, H (1)
Krylova-Grek, Yuliya (1)
Korniyaka, Olga (1)
Min, Y (1)
Raman, Sudha R. (1)
Curtis, Lesley H. (1)
visa färre...
Lärosäte
Örebro universitet (2)
Malmö universitet (1)
Högskolan i Skövde (1)
Blekinge Tekniska Högskola (1)
Språk
Engelska (15)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (11)
Teknik (5)
Samhällsvetenskap (5)
Medicin och hälsovetenskap (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy