This article looks at corporate agility from indicators such as sensing agility, decision making agility, acting agility or practice. It went on to review what cyber security awareness entails by stating some of the most possible threat that people encountered on a daily bases. The article identify poor management of cyber security solutions provided by modern internet security experts in the form of difficulty of tracing the cyber crime attackers, limited cybercrime laws, and limited IT security knowledge among internet users as the problems that the study addresses. Theory of protection motivation was used primarily to explain cyber security awareness, and how and when a user adopts adaptive behaviors. The article conclude that cyber security awareness is more important now than it has ever been before and that threats to personal and corporate information are increasing and identities are getting stolen every day. The article recommend that government, deposit money banks, users, mass media and manager should introduce and enforce cybercrime laws, train ,offers advices and create more awareness among their staff and clients of the organization on the need to be aware of internet threat and be careful in their dealings on a daily bases. Dr. Agbeche Aaron "Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47613.pdf Paper URL : https://www.ijtsrd.com/management/other/47613/cyber-security-awareness-and-corporate-agility-of-deposit-money-banks-in-nigeria/dr-agbeche-aaron
Transformation from Identity Stone Age to Digital IdentityIJNSA Journal
Technological conversion, political interests and Business drivers has triggered a means, to establish individual characterization and personalization. People started raising concerns on multiple identities managed across various zones and hence various solutions were designed. Technological advancement has brought various issues and concerns around Identity assurance, privacy and policy enabled common Authentication framework. A compressive framework is needed to established common identity model to address national needs like standards, regulation and laws, minimum risk, interoperability and to provide user with a consistent context or user experience.
This document focuses on Transformation path of identity stone age to Identity as in state. It defines a digital identity zone model (DIZM) to showcase the Global Identity defined across the ecosystem. Also, provide insight of emerging Technology trend to enable Identity assurance, privacy and policy enabled common Authentication framework.
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
Increasingly, all kinds of organizations and institutions are adopting the E-business model to conduct their
activities and provide E-Services for their customers. In the process, whether they know it or not, those
organizations are also opening themselves up to the risk of information security breaches. Therefore
protecting an organization’s ICT infrastructure, IT systems, and Data is a vital issue that is often
underestimated. Research has shown that one of the most significant threats to information security comes
not from external attack but rather from the system's users, because they are familiar with the
infrastructure and have access to its resources, but may be unaware of the risks. Moreover, using only
technological solutions to protect an organization’s assets is not enough; there is a need to consider the
human factor by raising users’ security awareness. Our contribution to this problem is to propose an
Information Security Awareness Program that aims at raising and maintaining the level of users’ security
awareness. This paper puts forward a general model for an information security awareness program and
describes how it could be incorporated into an organization’s website through the process of development
life cycle.
Online security – an assessment of the newsunnyjoshi88
The document discusses e-business and online security. It defines key terms and reviews literature finding that lack of trust and privacy concerns are major barriers to e-commerce. The literature review finds that online security risks come from state-sponsored cyber warfare, criminal hacking, identity theft and more. It concludes that current security levels are inadequate given growing threats and calls for more strategic priority and action on online security issues.
This document provides an overview and guidance on developing digital identity programs in Africa. It discusses how identification is important for development and how digital identity can accelerate service delivery through electronic means. The document outlines key considerations for digital identity programs, including developing policy and regulations, institutional frameworks, appropriate technology choices, protecting privacy, and addressing costs. It emphasizes that digital identity programs require balancing opportunities and risks regarding privacy, inclusion, and long-term sustainability.
Article 1 currently, smartphone, web, and social networking technohoney690131
The document discusses several articles and papers related to ethics and privacy issues with new technologies. It covers concerns around obtaining private patient data online and vulnerabilities of electronic health records. It also discusses increased government surveillance impacting human rights and national security. Additional topics covered include privacy of patient information shared with healthcare providers and ethical challenges of data security, anonymity, and intellectual property with information technology.
A research paper published by the International Bar Association draws attention to the fact that law firms have particular data security vulnerabilities and are attractive targets for hackers due to the sensitive information they possess on clients and third parties. The authors of the paper observe that lawyers need greater engagement with data security issues to protect client and firm interests and comply with ethical obligations, as law firms currently have weaker security than clients.
The document discusses e-business and online security, defining key terms and reviewing literature on the topics. It finds that lack of trust and concerns over privacy and security are major barriers to e-commerce adoption. Recent cyber attacks targeting governments and corporations demonstrate the strategic importance of online security. Effective security requires a multi-layered approach and cooperation across technical, legal and social dimensions.
Transformation from Identity Stone Age to Digital IdentityIJNSA Journal
Technological conversion, political interests and Business drivers has triggered a means, to establish individual characterization and personalization. People started raising concerns on multiple identities managed across various zones and hence various solutions were designed. Technological advancement has brought various issues and concerns around Identity assurance, privacy and policy enabled common Authentication framework. A compressive framework is needed to established common identity model to address national needs like standards, regulation and laws, minimum risk, interoperability and to provide user with a consistent context or user experience.
This document focuses on Transformation path of identity stone age to Identity as in state. It defines a digital identity zone model (DIZM) to showcase the Global Identity defined across the ecosystem. Also, provide insight of emerging Technology trend to enable Identity assurance, privacy and policy enabled common Authentication framework.
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
Increasingly, all kinds of organizations and institutions are adopting the E-business model to conduct their
activities and provide E-Services for their customers. In the process, whether they know it or not, those
organizations are also opening themselves up to the risk of information security breaches. Therefore
protecting an organization’s ICT infrastructure, IT systems, and Data is a vital issue that is often
underestimated. Research has shown that one of the most significant threats to information security comes
not from external attack but rather from the system's users, because they are familiar with the
infrastructure and have access to its resources, but may be unaware of the risks. Moreover, using only
technological solutions to protect an organization’s assets is not enough; there is a need to consider the
human factor by raising users’ security awareness. Our contribution to this problem is to propose an
Information Security Awareness Program that aims at raising and maintaining the level of users’ security
awareness. This paper puts forward a general model for an information security awareness program and
describes how it could be incorporated into an organization’s website through the process of development
life cycle.
Online security – an assessment of the newsunnyjoshi88
The document discusses e-business and online security. It defines key terms and reviews literature finding that lack of trust and privacy concerns are major barriers to e-commerce. The literature review finds that online security risks come from state-sponsored cyber warfare, criminal hacking, identity theft and more. It concludes that current security levels are inadequate given growing threats and calls for more strategic priority and action on online security issues.
This document provides an overview and guidance on developing digital identity programs in Africa. It discusses how identification is important for development and how digital identity can accelerate service delivery through electronic means. The document outlines key considerations for digital identity programs, including developing policy and regulations, institutional frameworks, appropriate technology choices, protecting privacy, and addressing costs. It emphasizes that digital identity programs require balancing opportunities and risks regarding privacy, inclusion, and long-term sustainability.
Article 1 currently, smartphone, web, and social networking technohoney690131
The document discusses several articles and papers related to ethics and privacy issues with new technologies. It covers concerns around obtaining private patient data online and vulnerabilities of electronic health records. It also discusses increased government surveillance impacting human rights and national security. Additional topics covered include privacy of patient information shared with healthcare providers and ethical challenges of data security, anonymity, and intellectual property with information technology.
A research paper published by the International Bar Association draws attention to the fact that law firms have particular data security vulnerabilities and are attractive targets for hackers due to the sensitive information they possess on clients and third parties. The authors of the paper observe that lawyers need greater engagement with data security issues to protect client and firm interests and comply with ethical obligations, as law firms currently have weaker security than clients.
The document discusses e-business and online security, defining key terms and reviewing literature on the topics. It finds that lack of trust and concerns over privacy and security are major barriers to e-commerce adoption. Recent cyber attacks targeting governments and corporations demonstrate the strategic importance of online security. Effective security requires a multi-layered approach and cooperation across technical, legal and social dimensions.
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...CSCJournals
The growing usage of smart speakers raises many privacy and trust concerns compared to other technologies such as smart phones and computers. In this study, a proxy measure of trust is used to gauge users’ opinions on three different technologies based on an empirical study, and to understand which technology most people are most likely to trust. The collected data were analyzed using the Kruskal-Wallis H test to determine the statistical differences between the users’ trust level of the three technologies: smart speaker, computer and smart phone. The findings of the study revealed that despite the wide acceptance, ease of use and reputation of smart speakers, people find it difficult to trust smart speakers with their sensitive information via the Direct Voice Input (DVI) and would prefer to use a keyboard or touchscreen offered by computers and smart phones. Findings from this study can inform future work on users’ trust in technology based on perceived ease of use, reputation, perceived credibility and risk of using technologies via DVI.
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...Tania Mushtaq
This document is the February 2015 issue of the Australian banking and finance newsletter. It contains several articles related to banking and finance law. The main article discusses three tips for banking lawyers to securely use cloud technology and mobile devices: 1) change passwords regularly using complex passwords, 2) protect mobile devices with security solutions like mobile device management, and 3) create secure workflows when using unauthorized cloud services. Banking lawyers handle sensitive client information and data security is important to avoid breaches. While cloud technology increases productivity, it also increases security risks that lawyers must mitigate.
India Top5 Information Security Concerns 2013Dinesh O Bareja
Indian Information Security scenario, and the global one too, leaves much to be desired - this report covers concerns about InfoSec in this year. A straightforward document with lots of practical insights about what ails Information and Data Security in Government, Business and Users.
Preparing today for tomorrow’s threats.
When companies hear the word “security,” what concepts come to mind
— safety, protection or perhaps comfort? To the average IT administrator,
security conjures up images of locked-down networks and virus-free devices.
An attacker, state-sponsored agent or hactivist, meanwhile, may view security
as a way to demonstrate expertise by infiltrating and bringing down corporate
or government networks for profit, military goals, political gain — or even fun.
We live in a world in which cybercrime is on the rise. A quick scan of the
timeline of major incidents (See Figure 1, Page 9) shows the increasing
frequency and severity of security breaches — a pattern that is likely
to continue for years to come. Few if any organizations are safe from
cybercriminals, to say nothing of national security. In fact, experts even
exposed authentication and encryption vulnerabilities in the U.S. Federal
Aviation Administration’s new state-of-the-art multibillion-dollar air
traffic control system
Buying a car entails a cost, not counting the day to day high price tag of gasoline. People are looking for
viable means of transportation that is cost-effective and can move its way through traffic faster. In the
Philippines, motorcycle was the answer to most people transportation needs. With the increasing number of
a motorcycle rider in the Philippines safety is the utmost concern. Today technology plays a huge role on
how this safety can be assured. We now see advances in connected devices. Devices can sense its
surrounding through sensor attach to it. With this in mind, this study focuses on the development of a
wearable device named Smart Motorcycle Helmet or simply Smart Helmet, whose main objective is to help
motorcycle rider in times of emergency. Utilizing sensors such as alcohol level detector, crash/impact
sensor, Internet connection thru 3G, accelerometer, Short Message Service (SMS) and cloud computing
infrastructure connected to a Raspberry Pi Zero-W and integrating a separate Arduino board for the antitheft tracking module is used to develop the propose Internet-of Things (IoT) device.
This document outlines challenges and proposed actions related to improving web application security. It begins with a disclaimer and introduces the topic of treating software and application security with greater care and respect. It then proposes five focuses, including viewing application security as a business advantage and competitive differentiator. Twelve proposed actions for government and industry are listed, such as allowing ethical hacking and improving liability for security issues. Potential scenarios that could result from application vulnerabilities are presented to increase awareness of security risks. The document concludes by acknowledging some positive progress but notes that not enough developers and clients prioritize security.
This document summarizes the results of a survey of federal Chief Information Security Officers (CISOs) on the state of cybersecurity from their perspective. Key findings include:
1) CISOs see greater national awareness of cybersecurity issues but still lack sufficient resources to fully address threats.
2) While security tools and training are improving, threats and attacks are also increasing.
3) CISOs face evolving responsibilities beyond technical issues to include management, policy, and political roles.
4) CISOs rely on well-trained staff but need more funding, clear mandates, and operational support from agencies.
Biometric Security Poses Huge Privacy Risks in KenyaPauline Wamere
1. This paper investigates the personal and informational privacy concerns regarding biometric technology in Kenya. It examines legal reviews and identifies potential risks with biometric data storage and use.
2. Biometrics are increasingly used for authentication in Kenya without fully considering privacy risks. Key risks include spoofing biometric data, intercepting biometric data transmitted over networks, system errors from power outages, and residual biometric traces allowing unauthorized access.
3. The paper analyzes Kenya's legal framework for privacy and guidelines for implementing biometric systems. While biometric technology promises better security and convenience, its widespread use also risks privacy violations that must be mitigated through legal reforms and technical controls.
This Frost & Sullivan analyst report reveals how the legal and threat environment, combined with BYOD and cost factors, make multi-factor, risk-based authentication the logical approach to solving the security challenges posed by threat actors.
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009Frocomm Australia
Malcolm Crompton presented at the Web 2.0 in Government conference in 2009. He discussed the inherent challenge for governments in balancing their roles as service providers and regulators. His presentation addressed the key issue of privacy and building trust between governments and citizens in the digital age. Crompton examined past failures like Australia's Access Card and strategies for a "layered defense" approach using education, law, technology, governance and safety nets to reduce the trust deficit between governments and those they serve.
The study provides valuable insight into the change in agency investment, awareness, and support for cybersecurity – as well as the challenges and barriers faced in achieving these goals.
Notable Takeaways:
• Financial Risks: According to a 2016 BetaNews article, “the total average cost of a data breach is now put at $6.53M, which includes $3.72M in lost business. Forensic investigations can cost up to $2,000 an hour, and the average annual salary of a security engineer is $92,000. With these high costs, proper preventative attack measures and cybersecurity insurance are crucial for the financial safety of organizations
• Employee Risks: A sizeable percentage of local agencies responded to never having taken cybersecurity awareness training for citizens (71.4%), contractors (61.9%), and local elected officials (50.1%). Given that human error creates vulnerabilities for breaches through targeted attacks like spear-phishing – employee education, RBAC measures, and RMS are of critical importance for agencies.
• What Agencies Want: The top three actions that were recommended by the respondents of the study were (1) Higher funding for cybersecurity; (2) Better cybersecurity polices; and (3) Greater cybersecurity awareness among employees in their local governments.
The Essential Ingredient for Today's EnterpriseReadWrite
The innovation that comes with the mobile enterprise are immense but problems come with this new world of devices. Namely the huge security concerns that arise. Devices can carry so much important information. How do you control it?
This paper from CIO Custom Solutions Group examines the mobile security landscape, including myths surrounding the risks and threats, and how organizations can establish a solid mobile security strategy.
User privacy and data trustworthiness in mobile crowd sensingLeMeniz Infotech
User privacy and data trustworthiness in mobile crowd sensing
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Web : http://www.lemenizinfotech.com
Web : http://www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Blog : http://ieeeprojectspondicherry.weebly.com
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
Youtube:https://www.youtube.com/watch?v=eesBNUnKvws
Outsourcing business processes raises risks that companies can mitigate. Recent security breaches at third-party contractors show these risks, from identity theft to disrupted operations. Companies are addressing risks by having service providers incorporate tighter security checks and audits, and by monitoring outsourced work more closely in real-time. Risks include operational failures, strategic threats like intellectual property theft, and loss of in-house skills. Companies must understand interdependencies and focus on weakest links, while service providers must work closely with clients to implement best practices across extended organizations. Countries that rely on outsourcing can also help by strengthening legal protections.
Panel Cyber Security and Privacy without Carrie Waggonermihinpr
The panel discussed security and privacy in healthcare. Some key points:
- 43% of all 2011 security breaches began in healthcare according to Symantec.
- Medical records are valued at $50 each on the black market, much more than credit cards.
- Top threats to healthcare security are malware, automatic log-off not being used, and removable media.
- HIPAA compliance does not ensure security. Access must be controlled and critical data identified.
- Presenters provided overviews of trust frameworks, Direct secure messaging between providers, and the role of digital certificates in authentication. Ensuring security requires addressing both technical and human factors.
David Doret (2019) IDM Conference, London, IAM - Getting the basics right - R...David Doret
This document provides an overview of role-based access control (RBAC) and discusses some of its key concepts and challenges. It begins by defining what a role is, noting that a role primarily has business meaning and refers to a job or function with associated authority and responsibility. The document then covers several important RBAC topics, including role engineering, separation of duties, permission drift over time, and metrics for evaluating an RBAC system's efficiency and ability to detect unauthorized access. It emphasizes that RBAC implementation requires an iterative process and references many additional aspects and standards related to RBAC.
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Ted Myerson
Read our NTIA comment letter on ''Big Data'' Developments and How They Impact the Consumer Privacy Bill of Rights. Filed with the NTIA on August 5, 2014.
Anonos has been working for over two years on technology that transforms data at the data element level enabling de-identification and functional obscurity that preserves the value of underlying data. Specifically, Anonos de-identification and functional obscurity risk management tools help to enable data subjects to share information in a controlled manner, enabling them to receive information and offerings truly personalized for them, while protecting misuse of their data; and to facilitate improved healthcare, medical research and personalized medicine by enabling aggregation of patient level data without revealing the identity of patients.
1
2
Cyber Research Proposal
Cybersecurity in business
Introduction
Because of today's international economy, securing a company's intellectual property, financial information, and good name is critical for the company's long-term survival and growth. However, with the rise in risks and cyber vulnerability, most businesses find it difficult to keep up with the competition. Since their inception, most companies have reported 16% fraud, 37.7% financial losses, and an average of over 11% share value loss, according to data compiled by the US security. Most corporations and governments are working hard to keep their customers and residents safe from harm. There are both physical and cybersecurity risks involved with these threats. According to a recent study, many company owners aren't aware of the full scope of cybersecurity. People who own their businesses must deal with various issues daily.
Nevertheless, steps are being taken to address these issues. Customers and the company are likely to be protected by the measures adopted. Cybersecurity is one of the most pressing issues facing organizations today. Leaks of a company's intellectual property and other secrets may have devastating effects on its operations, as competitors and rivals will do all in their power to stop them. is an excellent illustration of this. This is perhaps the most talked-about security compromise of the year [footnoteRef:3]. The firm was severely damaged because of this. [1: "Database security attacks and control methods."] [2:q "Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns."] [3: "The Equifax data breach: What cpas and firms need to know now." ]
Some individuals take advantage of clients by stealing highly important information to profit financially from their actions. For example, if the wrong individuals get their hands on your credit card information, you're in serious trouble since you might lose money. Some families lose all their resources, while others are forced to declare bankruptcy after being financially stable for a long period. Many of the findings of this study will be focused on cybersecurity and the sources of cybersecurity risks. The paper outlines a few of the issues and solutions that organizations may use to keep their operations and consumers safe from exploiting dishonest individuals.
Research question
According to the most recent study, more than 1500 companies have been exposed to some cybersecurity assault[footnoteRef:4]. This research details the specific types of attacks that have occurred. Organizational operations are affected, as is corporate governance, and the internal management of financial status is rendered ineffective due to these assaults. The question that will be investigated during the study is: [4: "Towards blockchain-based identity and access management for internet of things in enterprises."]
How doe ...
1
2
Cyber Research Proposal
Cybersecurity in business
Introduction
Because of today's international economy, securing a company's intellectual property, financial information, and good name is critical for the company's long-term survival and growth. However, with the rise in risks and cyber vulnerability, most businesses find it difficult to keep up with the competition. Since their inception, most companies have reported 16% fraud, 37.7% financial losses, and an average of over 11% share value loss, according to data compiled by the US security. Most corporations and governments are working hard to keep their customers and residents safe from harm. There are both physical and cybersecurity risks involved with these threats. According to a recent study, many company owners aren't aware of the full scope of cybersecurity. People who own their businesses must deal with various issues daily.
Nevertheless, steps are being taken to address these issues. Customers and the company are likely to be protected by the measures adopted. Cybersecurity is one of the most pressing issues facing organizations today. Leaks of a company's intellectual property and other secrets may have devastating effects on its operations, as competitors and rivals will do all in their power to stop them. is an excellent illustration of this. This is perhaps the most talked-about security compromise of the year [footnoteRef:3]. The firm was severely damaged because of this. [1: "Database security attacks and control methods."] [2:q "Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns."] [3: "The Equifax data breach: What cpas and firms need to know now." ]
Some individuals take advantage of clients by stealing highly important information to profit financially from their actions. For example, if the wrong individuals get their hands on your credit card information, you're in serious trouble since you might lose money. Some families lose all their resources, while others are forced to declare bankruptcy after being financially stable for a long period. Many of the findings of this study will be focused on cybersecurity and the sources of cybersecurity risks. The paper outlines a few of the issues and solutions that organizations may use to keep their operations and consumers safe from exploiting dishonest individuals.
Research question
According to the most recent study, more than 1500 companies have been exposed to some cybersecurity assault[footnoteRef:4]. This research details the specific types of attacks that have occurred. Organizational operations are affected, as is corporate governance, and the internal management of financial status is rendered ineffective due to these assaults. The question that will be investigated during the study is: [4: "Towards blockchain-based identity and access management for internet of things in enterprises."]
How doe ...
Analysis of personal information security behavior and awareness.docxdaniahendric
Analysis of personal information security behavior and awareness
It's a developing portion of human security that aims at raising awareness concerning the dangers of fast-evolving information forms and emerging threats to the info which focuses on human character. Since threats have developed and information is developing value, attackers have upgraded their abilities and extended to broader intentions. Also, more means of making the attacks have as well developed (Öğütçü, Testik & Chouseinoglou, 2016). The attacks have evolved to circumvent processes and controls. Aggressors have focused and effectively exploited the character of humans to breach relevant infrastructure schemes and corporate networks. Individual who are unaware about the threats may circumvent traditional processes and security controls and cause organization breach. In reply, information security awareness is growing.
The main aim of the concept in the discussion is to enhance awareness to everyone and inform that they can be a victim of the threats and risk any time. Information security consciousness responds to developing cyber-attacks. Most of the time, people assume that security it's all about technical controls (Ki-Aries & Faily, 2017). But the fact is that people are the targets and the character they possess can cause risk or offer countermeasures in response to threats and risks. Awareness metrics are increasing at a high rate to know and amount people threat landscape. The increase also aims at reducing risks associated with organizations and weigh the effectiveness and expense of awareness as the countermeasure.
Most of the organizations don't invest a lot in information security. Few organizations pay attention to security issues. They tend to assume all is well so long as they have a password in their systems. However, this not trust because if an attack occurs, such kind of organization is likely to suffer a lot. Security is an essential plan any organization can adopt to minimize security threats resulting from workers. Awareness plan assists associates to understand that security it's not personal responsibility but everyone's' responsibility. Everyone should be careful when it comes to security because nobody can choose to be a victim, but they only find themselves (Ki-Aries & Faily, 2017). Employees should be accountable for the actions done under their empathies. Security awareness enforces effective means of how business computers can be handled.
A policy developed should give awareness about social media and other types of virus. Workers should be aware of necessary to be followed when using computers. Alternatively, Companies can plan to form interactive sessions for every worker to get to understand more about their security. Such kind of interactive sessions entails consciousness about new risks and measure to overcome them. The program of awareness won't be gainful if no punishment for those who violate rules. Employees who don't adhere to the pr ...
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...CSCJournals
The growing usage of smart speakers raises many privacy and trust concerns compared to other technologies such as smart phones and computers. In this study, a proxy measure of trust is used to gauge users’ opinions on three different technologies based on an empirical study, and to understand which technology most people are most likely to trust. The collected data were analyzed using the Kruskal-Wallis H test to determine the statistical differences between the users’ trust level of the three technologies: smart speaker, computer and smart phone. The findings of the study revealed that despite the wide acceptance, ease of use and reputation of smart speakers, people find it difficult to trust smart speakers with their sensitive information via the Direct Voice Input (DVI) and would prefer to use a keyboard or touchscreen offered by computers and smart phones. Findings from this study can inform future work on users’ trust in technology based on perceived ease of use, reputation, perceived credibility and risk of using technologies via DVI.
Banking Law Bulletin - 3 tips for banking lawyers to avoid the stormy cloud (...Tania Mushtaq
This document is the February 2015 issue of the Australian banking and finance newsletter. It contains several articles related to banking and finance law. The main article discusses three tips for banking lawyers to securely use cloud technology and mobile devices: 1) change passwords regularly using complex passwords, 2) protect mobile devices with security solutions like mobile device management, and 3) create secure workflows when using unauthorized cloud services. Banking lawyers handle sensitive client information and data security is important to avoid breaches. While cloud technology increases productivity, it also increases security risks that lawyers must mitigate.
India Top5 Information Security Concerns 2013Dinesh O Bareja
Indian Information Security scenario, and the global one too, leaves much to be desired - this report covers concerns about InfoSec in this year. A straightforward document with lots of practical insights about what ails Information and Data Security in Government, Business and Users.
Preparing today for tomorrow’s threats.
When companies hear the word “security,” what concepts come to mind
— safety, protection or perhaps comfort? To the average IT administrator,
security conjures up images of locked-down networks and virus-free devices.
An attacker, state-sponsored agent or hactivist, meanwhile, may view security
as a way to demonstrate expertise by infiltrating and bringing down corporate
or government networks for profit, military goals, political gain — or even fun.
We live in a world in which cybercrime is on the rise. A quick scan of the
timeline of major incidents (See Figure 1, Page 9) shows the increasing
frequency and severity of security breaches — a pattern that is likely
to continue for years to come. Few if any organizations are safe from
cybercriminals, to say nothing of national security. In fact, experts even
exposed authentication and encryption vulnerabilities in the U.S. Federal
Aviation Administration’s new state-of-the-art multibillion-dollar air
traffic control system
Buying a car entails a cost, not counting the day to day high price tag of gasoline. People are looking for
viable means of transportation that is cost-effective and can move its way through traffic faster. In the
Philippines, motorcycle was the answer to most people transportation needs. With the increasing number of
a motorcycle rider in the Philippines safety is the utmost concern. Today technology plays a huge role on
how this safety can be assured. We now see advances in connected devices. Devices can sense its
surrounding through sensor attach to it. With this in mind, this study focuses on the development of a
wearable device named Smart Motorcycle Helmet or simply Smart Helmet, whose main objective is to help
motorcycle rider in times of emergency. Utilizing sensors such as alcohol level detector, crash/impact
sensor, Internet connection thru 3G, accelerometer, Short Message Service (SMS) and cloud computing
infrastructure connected to a Raspberry Pi Zero-W and integrating a separate Arduino board for the antitheft tracking module is used to develop the propose Internet-of Things (IoT) device.
This document outlines challenges and proposed actions related to improving web application security. It begins with a disclaimer and introduces the topic of treating software and application security with greater care and respect. It then proposes five focuses, including viewing application security as a business advantage and competitive differentiator. Twelve proposed actions for government and industry are listed, such as allowing ethical hacking and improving liability for security issues. Potential scenarios that could result from application vulnerabilities are presented to increase awareness of security risks. The document concludes by acknowledging some positive progress but notes that not enough developers and clients prioritize security.
This document summarizes the results of a survey of federal Chief Information Security Officers (CISOs) on the state of cybersecurity from their perspective. Key findings include:
1) CISOs see greater national awareness of cybersecurity issues but still lack sufficient resources to fully address threats.
2) While security tools and training are improving, threats and attacks are also increasing.
3) CISOs face evolving responsibilities beyond technical issues to include management, policy, and political roles.
4) CISOs rely on well-trained staff but need more funding, clear mandates, and operational support from agencies.
Biometric Security Poses Huge Privacy Risks in KenyaPauline Wamere
1. This paper investigates the personal and informational privacy concerns regarding biometric technology in Kenya. It examines legal reviews and identifies potential risks with biometric data storage and use.
2. Biometrics are increasingly used for authentication in Kenya without fully considering privacy risks. Key risks include spoofing biometric data, intercepting biometric data transmitted over networks, system errors from power outages, and residual biometric traces allowing unauthorized access.
3. The paper analyzes Kenya's legal framework for privacy and guidelines for implementing biometric systems. While biometric technology promises better security and convenience, its widespread use also risks privacy violations that must be mitigated through legal reforms and technical controls.
This Frost & Sullivan analyst report reveals how the legal and threat environment, combined with BYOD and cost factors, make multi-factor, risk-based authentication the logical approach to solving the security challenges posed by threat actors.
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009Frocomm Australia
Malcolm Crompton presented at the Web 2.0 in Government conference in 2009. He discussed the inherent challenge for governments in balancing their roles as service providers and regulators. His presentation addressed the key issue of privacy and building trust between governments and citizens in the digital age. Crompton examined past failures like Australia's Access Card and strategies for a "layered defense" approach using education, law, technology, governance and safety nets to reduce the trust deficit between governments and those they serve.
The study provides valuable insight into the change in agency investment, awareness, and support for cybersecurity – as well as the challenges and barriers faced in achieving these goals.
Notable Takeaways:
• Financial Risks: According to a 2016 BetaNews article, “the total average cost of a data breach is now put at $6.53M, which includes $3.72M in lost business. Forensic investigations can cost up to $2,000 an hour, and the average annual salary of a security engineer is $92,000. With these high costs, proper preventative attack measures and cybersecurity insurance are crucial for the financial safety of organizations
• Employee Risks: A sizeable percentage of local agencies responded to never having taken cybersecurity awareness training for citizens (71.4%), contractors (61.9%), and local elected officials (50.1%). Given that human error creates vulnerabilities for breaches through targeted attacks like spear-phishing – employee education, RBAC measures, and RMS are of critical importance for agencies.
• What Agencies Want: The top three actions that were recommended by the respondents of the study were (1) Higher funding for cybersecurity; (2) Better cybersecurity polices; and (3) Greater cybersecurity awareness among employees in their local governments.
The Essential Ingredient for Today's EnterpriseReadWrite
The innovation that comes with the mobile enterprise are immense but problems come with this new world of devices. Namely the huge security concerns that arise. Devices can carry so much important information. How do you control it?
This paper from CIO Custom Solutions Group examines the mobile security landscape, including myths surrounding the risks and threats, and how organizations can establish a solid mobile security strategy.
User privacy and data trustworthiness in mobile crowd sensingLeMeniz Infotech
User privacy and data trustworthiness in mobile crowd sensing
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Web : http://www.lemenizinfotech.com
Web : http://www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Blog : http://ieeeprojectspondicherry.weebly.com
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
Youtube:https://www.youtube.com/watch?v=eesBNUnKvws
Outsourcing business processes raises risks that companies can mitigate. Recent security breaches at third-party contractors show these risks, from identity theft to disrupted operations. Companies are addressing risks by having service providers incorporate tighter security checks and audits, and by monitoring outsourced work more closely in real-time. Risks include operational failures, strategic threats like intellectual property theft, and loss of in-house skills. Companies must understand interdependencies and focus on weakest links, while service providers must work closely with clients to implement best practices across extended organizations. Countries that rely on outsourcing can also help by strengthening legal protections.
Panel Cyber Security and Privacy without Carrie Waggonermihinpr
The panel discussed security and privacy in healthcare. Some key points:
- 43% of all 2011 security breaches began in healthcare according to Symantec.
- Medical records are valued at $50 each on the black market, much more than credit cards.
- Top threats to healthcare security are malware, automatic log-off not being used, and removable media.
- HIPAA compliance does not ensure security. Access must be controlled and critical data identified.
- Presenters provided overviews of trust frameworks, Direct secure messaging between providers, and the role of digital certificates in authentication. Ensuring security requires addressing both technical and human factors.
David Doret (2019) IDM Conference, London, IAM - Getting the basics right - R...David Doret
This document provides an overview of role-based access control (RBAC) and discusses some of its key concepts and challenges. It begins by defining what a role is, noting that a role primarily has business meaning and refers to a job or function with associated authority and responsibility. The document then covers several important RBAC topics, including role engineering, separation of duties, permission drift over time, and metrics for evaluating an RBAC system's efficiency and ability to detect unauthorized access. It emphasizes that RBAC implementation requires an iterative process and references many additional aspects and standards related to RBAC.
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Ted Myerson
Read our NTIA comment letter on ''Big Data'' Developments and How They Impact the Consumer Privacy Bill of Rights. Filed with the NTIA on August 5, 2014.
Anonos has been working for over two years on technology that transforms data at the data element level enabling de-identification and functional obscurity that preserves the value of underlying data. Specifically, Anonos de-identification and functional obscurity risk management tools help to enable data subjects to share information in a controlled manner, enabling them to receive information and offerings truly personalized for them, while protecting misuse of their data; and to facilitate improved healthcare, medical research and personalized medicine by enabling aggregation of patient level data without revealing the identity of patients.
1
2
Cyber Research Proposal
Cybersecurity in business
Introduction
Because of today's international economy, securing a company's intellectual property, financial information, and good name is critical for the company's long-term survival and growth. However, with the rise in risks and cyber vulnerability, most businesses find it difficult to keep up with the competition. Since their inception, most companies have reported 16% fraud, 37.7% financial losses, and an average of over 11% share value loss, according to data compiled by the US security. Most corporations and governments are working hard to keep their customers and residents safe from harm. There are both physical and cybersecurity risks involved with these threats. According to a recent study, many company owners aren't aware of the full scope of cybersecurity. People who own their businesses must deal with various issues daily.
Nevertheless, steps are being taken to address these issues. Customers and the company are likely to be protected by the measures adopted. Cybersecurity is one of the most pressing issues facing organizations today. Leaks of a company's intellectual property and other secrets may have devastating effects on its operations, as competitors and rivals will do all in their power to stop them. is an excellent illustration of this. This is perhaps the most talked-about security compromise of the year [footnoteRef:3]. The firm was severely damaged because of this. [1: "Database security attacks and control methods."] [2:q "Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns."] [3: "The Equifax data breach: What cpas and firms need to know now." ]
Some individuals take advantage of clients by stealing highly important information to profit financially from their actions. For example, if the wrong individuals get their hands on your credit card information, you're in serious trouble since you might lose money. Some families lose all their resources, while others are forced to declare bankruptcy after being financially stable for a long period. Many of the findings of this study will be focused on cybersecurity and the sources of cybersecurity risks. The paper outlines a few of the issues and solutions that organizations may use to keep their operations and consumers safe from exploiting dishonest individuals.
Research question
According to the most recent study, more than 1500 companies have been exposed to some cybersecurity assault[footnoteRef:4]. This research details the specific types of attacks that have occurred. Organizational operations are affected, as is corporate governance, and the internal management of financial status is rendered ineffective due to these assaults. The question that will be investigated during the study is: [4: "Towards blockchain-based identity and access management for internet of things in enterprises."]
How doe ...
1
2
Cyber Research Proposal
Cybersecurity in business
Introduction
Because of today's international economy, securing a company's intellectual property, financial information, and good name is critical for the company's long-term survival and growth. However, with the rise in risks and cyber vulnerability, most businesses find it difficult to keep up with the competition. Since their inception, most companies have reported 16% fraud, 37.7% financial losses, and an average of over 11% share value loss, according to data compiled by the US security. Most corporations and governments are working hard to keep their customers and residents safe from harm. There are both physical and cybersecurity risks involved with these threats. According to a recent study, many company owners aren't aware of the full scope of cybersecurity. People who own their businesses must deal with various issues daily.
Nevertheless, steps are being taken to address these issues. Customers and the company are likely to be protected by the measures adopted. Cybersecurity is one of the most pressing issues facing organizations today. Leaks of a company's intellectual property and other secrets may have devastating effects on its operations, as competitors and rivals will do all in their power to stop them. is an excellent illustration of this. This is perhaps the most talked-about security compromise of the year [footnoteRef:3]. The firm was severely damaged because of this. [1: "Database security attacks and control methods."] [2:q "Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns."] [3: "The Equifax data breach: What cpas and firms need to know now." ]
Some individuals take advantage of clients by stealing highly important information to profit financially from their actions. For example, if the wrong individuals get their hands on your credit card information, you're in serious trouble since you might lose money. Some families lose all their resources, while others are forced to declare bankruptcy after being financially stable for a long period. Many of the findings of this study will be focused on cybersecurity and the sources of cybersecurity risks. The paper outlines a few of the issues and solutions that organizations may use to keep their operations and consumers safe from exploiting dishonest individuals.
Research question
According to the most recent study, more than 1500 companies have been exposed to some cybersecurity assault[footnoteRef:4]. This research details the specific types of attacks that have occurred. Organizational operations are affected, as is corporate governance, and the internal management of financial status is rendered ineffective due to these assaults. The question that will be investigated during the study is: [4: "Towards blockchain-based identity and access management for internet of things in enterprises."]
How doe ...
Analysis of personal information security behavior and awareness.docxdaniahendric
Analysis of personal information security behavior and awareness
It's a developing portion of human security that aims at raising awareness concerning the dangers of fast-evolving information forms and emerging threats to the info which focuses on human character. Since threats have developed and information is developing value, attackers have upgraded their abilities and extended to broader intentions. Also, more means of making the attacks have as well developed (Öğütçü, Testik & Chouseinoglou, 2016). The attacks have evolved to circumvent processes and controls. Aggressors have focused and effectively exploited the character of humans to breach relevant infrastructure schemes and corporate networks. Individual who are unaware about the threats may circumvent traditional processes and security controls and cause organization breach. In reply, information security awareness is growing.
The main aim of the concept in the discussion is to enhance awareness to everyone and inform that they can be a victim of the threats and risk any time. Information security consciousness responds to developing cyber-attacks. Most of the time, people assume that security it's all about technical controls (Ki-Aries & Faily, 2017). But the fact is that people are the targets and the character they possess can cause risk or offer countermeasures in response to threats and risks. Awareness metrics are increasing at a high rate to know and amount people threat landscape. The increase also aims at reducing risks associated with organizations and weigh the effectiveness and expense of awareness as the countermeasure.
Most of the organizations don't invest a lot in information security. Few organizations pay attention to security issues. They tend to assume all is well so long as they have a password in their systems. However, this not trust because if an attack occurs, such kind of organization is likely to suffer a lot. Security is an essential plan any organization can adopt to minimize security threats resulting from workers. Awareness plan assists associates to understand that security it's not personal responsibility but everyone's' responsibility. Everyone should be careful when it comes to security because nobody can choose to be a victim, but they only find themselves (Ki-Aries & Faily, 2017). Employees should be accountable for the actions done under their empathies. Security awareness enforces effective means of how business computers can be handled.
A policy developed should give awareness about social media and other types of virus. Workers should be aware of necessary to be followed when using computers. Alternatively, Companies can plan to form interactive sessions for every worker to get to understand more about their security. Such kind of interactive sessions entails consciousness about new risks and measure to overcome them. The program of awareness won't be gainful if no punishment for those who violate rules. Employees who don't adhere to the pr ...
Information Risk Insurance Concept and Basic Aspectsijtsrd
This document discusses the concept of information risk insurance. It provides context on the growing importance of information in business and society, and the corresponding risks that have emerged from increased digitalization and cyber threats. The document then reviews different perspectives on defining "information risk" and the role of cyber insurance. It analyzes the development of information risk insurance internationally and some of the key insurance products and risks covered, such as theft of data, computer network failures, and cyber attacks. The conclusion summarizes that information risk insurance aims to compensate organizations financially for losses from issues like data loss, fraud, and unauthorized access in order to help manage these emerging risks.
Strategic Database Security Management and Cybercrime Reduction among Youths ...ijtsrd
The purpose of this study is to investigate the relationship between strategic database security management and cybercrime reduction among youth in Information Technology sector in Nigeria. Cross sectional survey design was used for this study. The population of the study comprises 32 information and technology companies in Rivers state. The method of data collection was questionnaire. Data from the distributed questionnaire was further analyzed, using the spearman rank order Correlation Coefficient. The hypotheses of the study were tested through the help of Statistical Package for Social Science SPSS , version 20. Findings revealed that strategic database security management have a significant relationship between the measures cybercrime reduction among youth in information technology companies in Nigeria. Therefore, we recommend that Management of information technology companies should ensure that proper computer security measures are put in place in order to fortify their database from unauthorized persons. Agbeche, Aaron | Elechi, Bobby Chime | Okechukwu, Prince Jumbo "Strategic Database Security Management and Cybercrime Reduction among Youths in Information Technology Companies in Nigeria" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47643.pdf Paper URL : https://www.ijtsrd.com/management/strategic-management/47643/strategic-database-security-management-and-cybercrime-reduction-among-youths-in-information-technology-companies-in-nigeria/agbeche-aaron
Cyber attack awareness and prevention in network securityIJICTJOURNAL
This article aims to provide an overview of cyber attack awareness and prevention in network security. This article discussed the different types of cyber attacks, current trends of cyber attacks, how to prevent cyber attacks and uum students' awareness of cyber attacks. First, we will go over the different types of cyber attack, current trend, impact of cyber attack and the prevention. The approach entailed comparing and observing the outcomes of 13 different papers. The survey's findings would demonstrate the results obtained after analyzing the data collection which are the questionnaire filled out by respondents after watching the cyber attack awareness video to improve awareness of students through the cyber attack. Depending on the outcome of this survey, we will have a better understanding of current students' knowledge and awareness of cyber attacks, allowing us to improve students' understanding of cyber threats and the necessity of cyber security.
Cybersecurity Business Risk, Literature ReviewEnow Eyong
Cybersecurity poses a significant business risk to social media corporations. These companies generate revenue through targeted advertising based on analyzing user information and engagement. However, cybersecurity threats could diminish the customer experience and engagement, reducing companies' ability to generate revenue. Social media sites must implement best practices from fields like the military to strengthen cyber defense, including developing reliable information systems, collecting intelligence on cyber criminals, and understanding potential cyber attack threats. Failure to address cybersecurity risks could jeopardize the success and sustainability of social media businesses.
The document discusses a study on cybersecurity among FSU college students. It examines how students manage their cybersecurity on mobile apps, websites, and devices. The study found that most students do not fully trust these platforms to protect their information, so they limit what they share or use other resources to combat threats. Hackers are seen as more dangerous now, so students are looking for ways to reduce their risks online. The document outlines some common cybersecurity threats like phishing and discusses countermeasures taken by individuals and companies.
The document discusses internet security in India. It summarizes that while the internet provides many benefits, it also enables many security threats. The Open Security Alliance (OSA) conducted research on internet security issues facing individual users, organizations, and the government in India. OSA categorized internet users and identified security issues for each group. Their analysis found that India faces unique technology risk issues with a growing internet user population in both urban and rural areas. Proactive strategies are needed to establish security standards and practices through research, education and policy changes.
Cyber security: challenges for society- literature reviewIOSR Journals
This document summarizes challenges related to cyber security for society based on a literature review. It discusses how cyber security plays an important role in technology development and internet services. Key challenges include a lack of coordination between security agencies and critical IT infrastructure, as well as widespread computer illiteracy in some countries like India that has led to increased cybercrime. The document also reviews common approaches to IT security risk analysis and discusses threats to cyber security such as cyber attacks aimed at damaging systems and cyber exploitation for unlawful purposes.
Discussion Questions The difficulty in predicting the future is .docxduketjoy27252
Discussion Questions
: “The difficulty in predicting the future is that the outcomes are unreliable, due to the occurrence of wild-card events that distort the relatively well-understand trends for the near to mid-future.” Offer an example of such a “wild-card” event and some ways in which the security professional might address it in an effective manner. Regarding the need for the security industry as a whole to maintain the professionalism and competencies needed to address emerging threats and hazards, what do you feel are its primary areas of weakness and what proposals could you offer to address them?
The Future of the Security
When considering what awaits the security profession in the years to come and those that will operate within it, developments and forecasts related to security science will in large part be impacted by what has occurred in the past and in present day. What
might
occur, what is most
plausible
and
feasible
given current and expected occurrences, and what has proven to be effective (or not) will all need to be considered in determining those issues that will remain relevant or change. So predicting the future (not in the form of Nostradamus or similar prophets) as it relates to security is a technique that considers probable or desirable outcomes in the face of known or anticipated risks. So given this backdrop, where is security heading?
Physical Security
As long as there are structures that people operate within and house various assets, there will continue to be a need to offer needed protection related to them. All of the topics discussed in this course related to walls, fencing, sensors, alarm systems, guards, locks, and other such issues will be needed in some form or fashion. Whether through manual or technological means, these will remain a constant for the security administrator in providing appropriate defensive measures for the material, tangible assets they oversee. Concerning technology, the same trend will continue in serving as a needed aid in providing security moving forward. Mobile devices of various types, functions, capabilities, and their ability to access data, the ever-increasing use of robotics and the functions they can carry out, sensors that will be able to gain more intelligence regarding detection, and high frequency security cameras that will have the capability to verify the chemical compound of an object at a distance are just some of the many technical innovations on the horizon. Yet, just as technology has taken on a greater role in providing these efforts, so too does technology represent ever-increasing concerns to the security manager.
Cyber Security
As society becomes connected on an ever-increasing basis, attention must be directed towards what implications this environment has related to not only security, but related privacy concerns as well. In
Future Scenarios and Challenges for Security and Privacy
(2016, Williams, Axon, Nurse, & Creese), the researchers took a ver.
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Booz Allen Hamilton
The document discusses the evolving cybersecurity landscape and how it is forcing chief information security officers (CISOs) and chief risk officers (CROs) to reevaluate their strategies and take on new roles. Interviews with security executives found that advanced persistent threats are increasing in frequency and sophistication. This complex threat landscape requires a predictive approach focused on prevention over reaction. It also requires CISOs and CROs to communicate cybersecurity risks to executives in business terms. Many organizations are considering partnering with external cybersecurity firms to access skills and technologies beyond their internal capabilities and manage risks more effectively.
Classmate 1Cybersecurity risk can be characterized as the ris.docxbartholomeocoombs
Classmate 1:
Cybersecurity risk can be characterized as the risk emerging from pernicious electronic or Non-electronic occasions influencing information innovation assets of firms, regularly bringing about the disturbance of business and budgetary misfortune. The significance of cybersecurity has become in the course of the most recent couple of decades with the fast development of electronic gadgets and the web (Biener, Eling, and Wirfs, 2015). Physical items where information and information were utilized to be put away, for example, records, floppy plates, and tapes are not, at this point utilized and practically all individuals store their own and work information electronically now.
Information is put away in a confined private system at work while at home individuals store their private information, for example, photographs, messages, and so on in their messages or even or cloud administrations, for instance, the Apple cloud where Apple iPhone clients will have their information continually upheld. This individual information may contain by and by recognizable information too, for example, the information that can be contained in an individual driver's permit, for example, date of birth, address (Fazlida, and Said, 2015). For the assailants, PII information is truly significant and thus they target global organizations where they could get this PII information effectively which can be connected with the client's record and their installment information.
We see a great deal of cyber-assault happening to global organizations, for example, Target and Home-stop along these lines. From a mechanical standpoint, firms regularly share associated risks and vulnerabilities of being penetrated together because of the use of normal security advances and the availability of PC systems. In the above articulation, we can see that all organizations have risks and vulnerabilities in their system which should be appropriately redesigned and checked to be made sure about. We additionally observe government databases being hacked from remote nationals to pick up the necessary information or PII of assets they are quick to acquire (Biener, Eling, and Wirfs, 2015). In this manner, we can say that cybersecurity isn't only a business danger yet, in addition, a matter of national security.
As an IT administrator, there are a few different ways I would attempt to deal with the IT risks inside my organization (Pei-Yu, Kataria, and Krishnan, 2011):
1. I would initially do a constant risk evaluation and distinguish the risks which are generally essential and touchy to the organization and make a rundown of basic resources, recognized risks, and future potential risks that would be tended to. The prioritizations of these risks are significant and likewise to include the administration about this.
2. The risk proprietors can possess the organized risks and work with the group to relieve these risks and record it. The most noteworthy risks are to be killed first.
CONTRIBUTION TO SECURING BYOD SYSTEMS IN FINANCIAL AUTHORITIES AND PUBLIC ADM...ijmvsc
The growth of digital tools, such as mobile phones, computers, and tablets, and the advent of new
information and communication technologies have generated new phenomena in terms of communication
capacity and data processing. This phenomenon is called BYOD, which stands for Bring Your Own Device,
meaning employees use their own devices to access company resources within the company's IT network,
whether internally or externally. On the one hand, it has brought many benefits and opportunities, but on
the other hand, it carries many cybersecurity risks. Incidents of cybercrime, embezzlement, espionage, and
cyberattacks. These are recorded every day in ZELECAF countries in general and in Congo Brazzaville in
particular. In this article, a contribution and optimization to the security of BYOD systems in the financial
authorities of the countries of the African Continental Free Trade Area are presented. Congo Brazzaville
was chosen for the field study, and a few Central African countries were chosen for an online study. The
results obtained are encouraging to the extent that the survey carried out revealed the use of digital tools
in financial management by workers. Also, the lack of solid security in the existing computer networks
within these structures was noted. The principles of raising public awareness of cybersecurity culture,
protecting information, authenticating passwords by the IT manager or network administrator, hiding the
wireless network, and enabling the firewall are part of the attempted solutions proposed. Compared to
studies in the literature, the methodology is adapted, so that in the literature [14], [15], the majority of
surveys were carried out in the field, with a very limited number.
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
For years, security researchers and leaders have warned: “The mobile threat is coming.” Well, in 2016 it arrived in full force. Attackers are finding new, creative means of stealing user credentials and penetrating critical systems via the mobile channel. And healthcare entities—with an increasingly mobile workforce and patient population—are square in the middle of this expanding mobile threatscape, as attackers seek to capture and monetize critical healthcare data.
What are the most prevalent new threats, and what are leading organizations doing to bolster mobile security as we head into 2017?
This interview with BlackBerry VP Government Solutions Sinisha Patkovic, on Mobile Security: Preparing for the 2017 Threat Landscape, was produced for of a recent ISMG Security Executive Roundtable sponsored By BlackBerry.
A Systematic Literature Review On The Cyber SecurityAmy Cernava
This document summarizes a literature review on cyber security. It begins by introducing the topic and defining cyber security as the methods used to protect networks, computers, programs and data from unauthorized access and attacks. It then discusses the growth of internet usage and connected devices, and how this has led to increased cyber threats. The review covers various topics related to cyber security including its history and importance, different types of threats, frameworks and tools used, and ongoing challenges. The goal is to provide a comprehensive overview of current research on cyber security issues and solutions.
OverseeCyberSecurityAsHackersSeekToInfiltrateKashif Ali
This document discusses cyber security threats and their impact. It provides an overview of some growing cyber risks and how they can threaten the development of the information society. It argues that increased cooperation and information sharing between cyber security groups is needed to effectively address these challenges. Senior executives and governments must play a leading role in overseeing cyber security and minimizing risks through effective IT governance and strategic alignment of security systems. Overall cyber threats are increasing and declining trust in internet users, so concerted efforts are needed from all stakeholders to promote a more secure information environment.
Accenture re-organizing-todays-cyber-threatsLapman Lee ✔
Banks are facing an urgent need to bring fraud risk management and IT security—two historic silos—more closely together to combat mounting data security and cyber threats.
Similar to Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria (20)
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
The manufacturing industries all over the world are facing tough challenges for growth, development and sustainability in today’s competitive environment. They have to achieve apex position by adapting with the global competitive environment by delivering goods and services at low cost, prime quality and better price to increase wealth and consumer satisfaction. Cost Management ensures profit, growth and sustainability of the business with implementation of Continuous Improvement Technique like Six Sigma. This leads to optimize Business performance. The method drives for customer satisfaction, low variation, reduction in waste and cycle time resulting into a competitive advantage over other industries which did not implement it. The main objective of this paper ‘Six Sigma Technique A Journey Through Its Implementation’ is to conceptualize the effectiveness of Six Sigma Technique through the journey of its implementation. Aditi Sunilkumar Ghosalkar "‘Six Sigma Technique’: A Journey Through its Implementation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64546.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64546/‘six-sigma-technique’-a-journey-through-its-implementation/aditi-sunilkumar-ghosalkar
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
Edge computing, a paradigm that involves processing data closer to its source, has gained significant attention for its potential to revolutionize data processing and communication in space missions. With the increasing complexity and data volume generated by modern space missions, traditional centralized computing approaches face challenges related to latency, bandwidth, and security. Edge computing in space, involving on board processing and analysis of data, offers promising solutions to these challenges. This paper explores the concept of edge computing in space, its benefits, applications, and future prospects in enhancing space missions. Manish Verma "Edge Computing in Space: Enhancing Data Processing and Communication for Space Missions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64541.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/64541/edge-computing-in-space-enhancing-data-processing-and-communication-for-space-missions/manish-verma
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
Communal politics in India has evolved through centuries, weaving a complex tapestry shaped by historical legacies, colonial influences, and contemporary socio political transformations. This research comprehensively examines the dynamics of communal politics in 21st century India, emphasizing its historical roots, socio political dynamics, economic implications, challenges, and prospects for mitigation. The historical perspective unravels the intricate interplay of religious identities and power dynamics from ancient civilizations to the impact of colonial rule, providing insights into the evolution of communalism. The socio political dynamics section delves into the contemporary manifestations, exploring the roles of identity politics, socio economic disparities, and globalization. The economic implications section highlights how communal politics intersects with economic issues, perpetuating disparities and influencing resource allocation. Challenges posed by communal politics are scrutinized, revealing multifaceted issues ranging from social fragmentation to threats against democratic values. The prospects for mitigation present a multifaceted approach, incorporating policy interventions, community engagement, and educational initiatives. The paper conducts a comparative analysis with international examples, identifying common patterns such as identity politics and economic disparities. It also examines unique challenges, emphasizing Indias diverse religious landscape, historical legacy, and secular framework. Lessons for effective strategies are drawn from international experiences, offering insights into inclusive policies, interfaith dialogue, media regulation, and global cooperation. By scrutinizing historical epochs, contemporary dynamics, economic implications, and international comparisons, this research provides a comprehensive understanding of communal politics in India. The proposed strategies for mitigation underscore the importance of a holistic approach to foster social harmony, inclusivity, and democratic values. Rose Hossain "Dynamics of Communal Politics in 21st Century India: Challenges and Prospects" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64528.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/history/64528/dynamics-of-communal-politics-in-21st-century-india-challenges-and-prospects/rose-hossain
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
Background and Objective Telehealth has become a well known tool for the delivery of health care in Saudi Arabia, and the perspective and knowledge of healthcare providers are influential in the implementation, adoption and advancement of the method. This systematic review was conducted to examine the current literature base regarding telehealth and the related healthcare professional perspective and knowledge in the Kingdom of Saudi Arabia. Materials and Methods This systematic review was conducted by searching 7 databases including, MEDLINE, CINHAL, Web of Science, Scopus, PubMed, PsycINFO, and ProQuest Central. Studies on healthcare practitioners telehealth knowledge and perspectives published in English in Saudi Arabia from 2000 to 2023 were included. Boland directed this comprehensive review. The researchers examined each connected study using the AXIS tool, which evaluates cross sectional systematic reviews. Narrative synthesis was used to summarise and convey the data. Results Out of 1840 search results, 10 studies were included. Positive outlook and limited knowledge among providers were seen across trials. Healthcare professionals like telehealth for its ability to improve quality, access, and delivery, save time and money, and be successful. Age, gender, occupation, and work experience also affect health workers knowledge. In Saudi Arabia, healthcare professionals face inadequate expert assistance, patient privacy, internet connection concerns, lack of training courses, lack of telehealth understanding, and high costs while performing telemedicine. Conclusions Healthcare practitioners telehealth perceptions and knowledge were examined in this systematic study. Its collection of concerned experts different personal attitudes and expertise would help enhance telehealths implementation in Saudi Arabia, develop its healthcare delivery alternative, and eliminate frequent problems. Badriah Mousa I Mulayhi | Dr. Jomin George | Judy Jenkins "Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in Saudi Arabia: A Systematic Review" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64535.pdf Paper Url: https://www.ijtsrd.com/medicine/other/64535/assess-perspective-and-knowledge-of-healthcare-providers-towards-elehealth-in-saudi-arabia-a-systematic-review/badriah-mousa-i-mulayhi
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
The impact of digital media on the distribution of power and the weakening of traditional gatekeepers has gained considerable attention in recent years. The adoption of digital technologies and the internet has resulted in declining influence and power for traditional gatekeepers such as publishing houses and news organizations. Simultaneously, digital media has facilitated the emergence of new voices and players in the media industry. Digital medias impact on power decentralization and gatekeeper erosion is visible in several ways. One significant aspect is the democratization of information, which enables anyone with an internet connection to publish and share content globally, leading to citizen journalism and bypassing traditional gatekeepers. Another aspect is the disruption of conventional media industry business models, as traditional organizations struggle to adjust to the decrease in advertising revenue and the rise of digital platforms. Alternative business models, such as subscription models and crowdfunding, have become more prevalent, leading to the emergence of new players. Overall, the impact of digital media on the distribution of power and the weakening of traditional gatekeepers has brought about significant changes in the media landscape and the way information is shared. Further research is required to fully comprehend the implications of these changes and their impact on society. Dr. Kusum Lata "The Impact of Digital Media on the Decentralization of Power and the Erosion of Traditional Gatekeepers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64544.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64544/the-impact-of-digital-media-on-the-decentralization-of-power-and-the-erosion-of-traditional-gatekeepers/dr-kusum-lata
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
This research investigates the nexus between online discussions on Dr. B.R. Ambedkars ideals and their impact on social inclusion among college students in Gurugram, Haryana. Surveying 240 students from 12 government colleges, findings indicate that 65 actively engage in online discussions, with 80 demonstrating moderate to high awareness of Ambedkars ideals. Statistically significant correlations reveal that higher online engagement correlates with increased awareness p 0.05 and perceived social inclusion. Variations across colleges and a notable effect of college type on perceived social inclusion highlight the influence of contextual factors. Furthermore, the intersectional analysis underscores nuanced differences based on gender, caste, and socio economic status. Dr. Kusum Lata "Online Voices, Offline Impact: Ambedkar's Ideals and Socio-Political Inclusion - A Study of Gurugram District" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64543.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64543/online-voices-offline-impact-ambedkars-ideals-and-sociopolitical-inclusion--a-study-of-gurugram-district/dr-kusum-lata
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
Noting calls for contextualizing Agro entrepreneurs problems and challenges of the agro entrepreneurs and for greater attention to the Role of entrepreneurs in agro entrepreneurship research, we conduct a systematic literature review of extent research in agriculture entrepreneurship to overcome the study objectives of complications of agro entrepreneurs through various factors, Development of agriculture products is a key factor for the overall economic growth of agro entrepreneurs Agro Entrepreneurs produces firsthand large scale employment, utilizes the labor and natural resources, This research outlines the problems of Weather and Soil Erosions, Market price fluctuation, stimulates labor cost problems, reduces concentration of Price volatility, Dependency on Intermediaries, induces Limited Bargaining Power, and Storage and Transportation Costs. This paper mainly devoted to highlight Problems and challenges faced for the sustainable of Agro Entrepreneurs in India. Vinay Prasad B "Problems and Challenges of Agro Entreprenurship - A Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64540.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64540/problems-and-challenges-of-agro-entreprenurship--a-study/vinay-prasad-b
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
Disclosure is a process through which a business enterprise communicates with external parties. A corporate disclosure is communication of financial and non financial information of the activities of a business enterprise to the interested entities. Corporate disclosure is done through publishing annual reports. So corporate disclosure through annual reports plays a vital role in the life of all the companies and provides valuable information to investors. The basic objectives of corporate disclosure is to give a true and fair view of companies to the parties related either directly or indirectly like owner, government, creditors, shareholders etc. in the companies act, provisions have been made about mandatory and voluntary disclosure. The IT sector in India is rapidly growing, the trend to invest in the IT sector is rising and employment opportunities in IT sectors are also increasing. Therefore the IT sector is expected to have fair, full and adequate disclosure of all information. Unfair and incomplete disclosure may adversely affect the entire economy. A research study on disclosure practices of IT companies could play an important role in this regard. Hence, the present research study has been done to study and review comparative analysis of total corporate disclosure of selected IT companies of India and to put forward overall findings and suggestions with a view to increase disclosure score of these companies. The researcher hopes that the present research study will be helpful to all selected Companies for improving level of corporate disclosure through annual reports as well as the government, creditors, investors, all business organizations and upcoming researcher for comparative analyses of level of corporate disclosure with special reference to selected IT companies. Dr. Vaibhavi D. Thaker "Comparative Analysis of Total Corporate Disclosure of Selected IT Companies of India" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64539.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64539/comparative-analysis-of-total-corporate-disclosure-of-selected-it-companies-of-india/dr-vaibhavi-d-thaker
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
This study investigated the impact of educational background and professional training on human rights awareness among secondary school teachers in the Marathwada region of Maharashtra, India. The key findings reveal that higher levels of education, particularly a master’s degree, and fields of study related to education, humanities, or social sciences are associated with greater human rights awareness among teachers. Additionally, both pre service teacher training and in service professional development programs focused on human rights education significantly enhance teacher’s knowledge, skills, and competencies in promoting human rights principles in their classrooms. Baig Ameer Bee Mirza Abdul Aziz | Dr. Syed Azaz Ali Amjad Ali "The Impact of Educational Background and Professional Training on Human Rights Awareness among Secondary School Teachers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64529.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64529/the-impact-of-educational-background-and-professional-training-on-human-rights-awareness-among-secondary-school-teachers/baig-ameer-bee-mirza-abdul-aziz
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
“One Language sets you in a corridor for life. Two languages open every door along the way” Frank Smith English as a foreign language or as a second language has been ruling in India since the period of Lord Macaulay. But the question is how much we teach or learn English properly in our culture. Is there any scope to use English as a language rather than a subject How much we learn or teach English without any interference of mother language specially in the classroom teaching learning scenario in West Bengal By considering all these issues the researcher has attempted in this article to focus on the effective teaching learning process comparing to other traditional strategies in the field of English curriculum at the secondary level to investigate whether they fulfill the present teaching learning requirements or not by examining the validity of the present curriculum of English. The purpose of this study is to focus on the effectiveness of the systematic, scientific, sequential and logical transaction of the course between the teachers and the learners in the perspective of the 5Es programme that is engage, explore, explain, extend and evaluate. Sanchali Mondal | Santinath Sarkar "A Study on the Effective Teaching Learning Process in English Curriculum at the Secondary Level of West Bengal" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd62412.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/62412/a-study-on-the-effective-teaching-learning-process-in-english-curriculum-at-the-secondary-level-of-west-bengal/sanchali-mondal
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
This paper reports on a study which was conducted to investigate the role of mentoring and its influence on the effectiveness of the teaching of Physics in secondary schools in the South West Region of Cameroon. The study adopted the convergent parallel mixed methods design, focusing on respondents in secondary schools in the South West Region of Cameroon. Both quantitative and qualitative data were collected, analysed separately, and the results were compared to see if the findings confirm or disconfirm each other. The quantitative analysis found that majority of the respondents 72 of Physics teachers affirmed that they had more experienced colleagues as mentors to help build their confidence, improve their teaching, and help them improve their effectiveness and efficiency in guiding learners’ achievements. Only 28 of the respondents disagreed with these statements. With majority respondents 72 agreeing with the statements, it implies that in most secondary schools, experienced Physics teachers act as mentors to build teachers’ confidence in teaching and improving students’ learning. The interview qualitative data analysis summarized how secondary school Principals use meetings with mentors and mentees to promote mentorship in the school milieu. This has helped strengthen teachers’ classroom practices in secondary schools in the South West Region of Cameroon. With the results confirming each other, the study recommends that mentoring should focus on helping teachers employ social interactions and instructional practices feedback and clarity in teaching that have direct measurable impact on students’ learning achievements. Andrew Ngeim Sumba | Frederick Ebot Ashu | Peter Agborbechem Tambi "The Role of Mentoring and Its Influence on the Effectiveness of the Teaching of Physics in Secondary Schools in the South West Region of Cameroon" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64524.pdf Paper Url: https://www.ijtsrd.com/management/management-development/64524/the-role-of-mentoring-and-its-influence-on-the-effectiveness-of-the-teaching-of-physics-in-secondary-schools-in-the-south-west-region-of-cameroon/andrew-ngeim-sumba
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
This study primarily focuses on the design of a high side buck converter using an Arduino microcontroller. The converter is specifically intended for use in DC DC applications, particularly in standalone solar PV systems where the PV output voltage exceeds the load or battery voltage. To evaluate the performance of the converter, simulation experiments are conducted using Proteus Software. These simulations provide insights into the input and output voltages, currents, powers, and efficiency under different state of charge SoC conditions of a 12V,70Ah rechargeable lead acid battery. Additionally, the hardware design of the converter is implemented, and practical data is collected through operation, monitoring, and recording. By comparing the simulation results with the practical results, the efficiency and performance of the designed converter are assessed. The findings indicate that while the buck converter is suitable for practical use in standalone PV systems, its efficiency is compromised due to a lower output current. Chan Myae Aung | Dr. Ei Mon "Design Simulation and Hardware Construction of an Arduino-Microcontroller Based DC-DC High-Side Buck Converter for Standalone PV System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64518.pdf Paper Url: https://www.ijtsrd.com/engineering/mechanical-engineering/64518/design-simulation-and-hardware-construction-of-an-arduinomicrocontroller-based-dcdc-highside-buck-converter-for-standalone-pv-system/chan-myae-aung
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
Energy becomes sustainable if it meets the needs of the present without compromising the ability of future generations to meet their own needs. Some of the definitions of sustainable energy include the considerations of environmental aspects such as greenhouse gas emissions, social, and economic aspects such as energy poverty. Generally far more sustainable than fossil fuel are renewable energy sources such as wind, hydroelectric power, solar, and geothermal energy sources. Worthy of note is that some renewable energy projects, like the clearing of forests to produce biofuels, can cause severe environmental damage. The sustainability of nuclear power which is a low carbon source is highly debated because of concerns about radioactive waste, nuclear proliferation, and accidents. The switching from coal to natural gas has environmental benefits, including a lower climate impact, but could lead to delay in switching to more sustainable options. “Carbon capture and storage” can be built into power plants to remove the carbon dioxide CO2 emissions, but this technology is expensive and has rarely been implemented. Leading non renewable energy sources around the world is fossil fuels, coal, petroleum, and natural gas. Nuclear energy is usually considered another non renewable energy source, although nuclear energy itself is a renewable energy source, but the material used in nuclear power plants is not. The paper addresses the issue of sustainable energy, its attendant benefits to the future generation, and humanity in general. Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku "Sustainable Energy" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64534.pdf Paper Url: https://www.ijtsrd.com/engineering/electrical-engineering/64534/sustainable-energy/paul-a-adekunte
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
This paper aims to outline the executive regulations, survey standards, and specifications required for the implementation of the Sudan Survey Act, and for regulating and organizing all surveying work activities in Sudan. The act has been discussed for more than 5 years. The Land Survey Act was initiated by the Sudan Survey Authority and all official legislations were headed by the Sudan Ministry of Justice till it was issued in 2022. The paper presents conceptual guidelines to be used for the Survey Act implementation and to regulate the survey work practice, standardizing the field surveys, processing, quality control, procedures, and the processes related to survey work carried out by the stakeholders and relevant authorities in Sudan. The conceptual guidelines are meant to improve the quality and harmonization of geospatial data and to aid decision making processes as well as geospatial information systems. The established comprehensive executive regulations will govern and regulate the implementation of the Sudan Survey Geomatics Act in all surveying and mapping practices undertaken by the Sudan Survey Authority SSA and state local survey departments for public or private sector organizations. The targeted standards and specifications include the reference frame, projection, coordinate systems, and the guidelines and specifications that must be followed in the field of survey work, processes, and mapping products. In the last few decades, there has been a growing awareness of the importance of geomatics activities and measurements on the Earths surface in space and time, together with observing and mapping the changes. In such cases, data must be captured promptly, standardized, and obtained with more accuracy and specified in much detail. The paper will also highlight the current situation in Sudan, the degree to which survey standards are used, the problems encountered, and the errors that arise from not using the standards and survey specifications. Kamal A. A. Sami "Concepts for Sudan Survey Act Implementations - Executive Regulations and Standards" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63484.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63484/concepts-for-sudan-survey-act-implementations--executive-regulations-and-standards/kamal-a-a-sami
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
The discussions between ellipsoid and geoid have invoked many researchers during the recent decades, especially during the GNSS technology era, which had witnessed a great deal of development but still geoid undulation requires more investigations. To figure out a solution for Sudans local geoid, this research has tried to intake the possibility of determining the geoid model by following two approaches, gravimetric and geometrical geoid model determination, by making use of GNSS leveling benchmarks at Khartoum state. The Benchmarks are well distributed in the study area, in which, the horizontal coordinates and the height above the ellipsoid have been observed by GNSS while orthometric heights were carried out using precise leveling. The Global Geopotential Model GGM represented in EGM2008 has been exploited to figure out the geoid undulation at the benchmarks in the study area. This is followed by a fitting process, that has been done to suit the geoid undulation data which has been computed using GNSS leveling data and geoid undulation inspired by the EGM2008. Two geoid surfaces were created after the fitting process to ensure that they are identical and both of them could be counted for getting the same geoid undulation with an acceptable accuracy. In this respect, statistical operation played an important role in ensuring the consistency and integrity of the model by applying cross validation techniques splitting the data into training and testing datasets for building the geoid model and testing its eligibility. The geometrical solution for geoid undulation computation has been utilized by applying straightforward equations that facilitate the calculation of the geoid undulation directly through applying statistical techniques for the GNSS leveling data of the study area to get the common equation parameters values that could be utilized to calculate geoid undulation of any position in the study area within the claimed accuracy. Both systems were checked and proved eligible to be used within the study area with acceptable accuracy which may contribute to solving the geoid undulation problem in the Khartoum area, and be further generalized to determine the geoid model over the entire country, and this could be considered in the future, for regional and continental geoid model. Ahmed M. A. Mohammed. | Kamal A. A. Sami "Towards the Implementation of the Sudan Interpolated Geoid Model (Khartoum State Case Study)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63483.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63483/towards-the-implementation-of-the-sudan-interpolated-geoid-model-khartoum-state-case-study/ahmed-m-a-mohammed
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
Sudan is witnessing an acceleration in the processes of development and transformation in the performance of government institutions to raise the productivity and investment efficiency of the government sector. The development plans and investment opportunities have focused on achieving national goals in various sectors. This paper aims to illuminate the path to the future and provide geospatial data and information to develop the investment climate and environment for all sized businesses, and to bridge the development gap between the Sudan states. The Sudan Survey Authority SSA is the main advisor to the Sudan Government in conducting surveying, mappings, designing, and developing systems related to geospatial data and information. In recent years, SSA made a strategic partnership with the Ministry of Investment to activate Geospatial Information for Sudans Sustainable Investment and in particular, for the preparation and implementation of the Sudan investment map, based on the directives and objectives of the Ministry of Investment MI in Sudan. This paper comes within the framework of activating the efforts of the Ministry of Investment to develop technical investment services by applying techniques adopted by the Ministry and its strategic partners for advancing investment processes in the country. Kamal A. A. Sami "Activating Geospatial Information for Sudan's Sustainable Investment Map" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63482.pdf Paper Url: https://www.ijtsrd.com/engineering/information-technology/63482/activating-geospatial-information-for-sudans-sustainable-investment-map/kamal-a-a-sami
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
In a rapidly changing global landscape, the importance of education as a unifying force cannot be overstated. This paper explores the crucial role of educational unity in fostering a stronger and more inclusive society through the embrace of diversity. By examining the benefits of diverse learning environments, the paper aims to highlight the positive impact on societal strength. The discussion encompasses various dimensions, from curriculum design to classroom dynamics, and emphasizes the need for educational institutions to become catalysts for unity in diversity. It highlights the need for a paradigm shift in educational policies, curricula, and pedagogical approaches to ensure that they are reflective of the diverse fabric of society. This paper also addresses the challenges associated with implementing inclusive educational practices and offers practical strategies for overcoming barriers. It advocates for collaborative efforts between educational institutions, policymakers, and communities to create a supportive ecosystem that promotes diversity and unity. Mr. Amit Adhikari | Madhumita Teli | Gopal Adhikari "Educational Unity: Embracing Diversity for a Stronger Society" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64525.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64525/educational-unity-embracing-diversity-for-a-stronger-society/mr-amit-adhikari
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
The diversity of indigenous knowledge systems in India is vast and can vary significantly between different communities and regions. Preserving and respecting these knowledge systems is crucial for maintaining cultural heritage, promoting sustainable practices, and fostering cross cultural understanding. In this paper, an overview of the prospects and challenges associated with incorporating Indian indigenous knowledge into management is explored. It is found that IIKS helps in management in many areas like sustainable development, tourism, food security, natural resource management, cultural preservation and innovation, etc. However, IIKS integration with management faces some challenges in the form of a lack of documentation, cultural sensitivity, language barriers legal framework, etc. Savita Lathwal "Integration of Indian Indigenous Knowledge System in Management: Prospects and Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63500.pdf Paper Url: https://www.ijtsrd.com/management/accounting-and-finance/63500/integration-of-indian-indigenous-knowledge-system-in-management-prospects-and-challenges/savita-lathwal
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
The COVID 19 pandemic has highlighted the crucial need of preventive measures, with widespread use of face masks being a key method for slowing the viruss spread. This research investigates face mask identification using deep learning as a technological solution to be reducing the risk of coronavirus transmission. The proposed method uses state of the art convolutional neural networks CNNs and transfer learning to automatically recognize persons who are not wearing masks in a variety of circumstances. We discuss how this strategy improves public health and safety by providing an efficient manner of enforcing mask wearing standards. The report also discusses the obstacles, ethical concerns, and prospective applications of face mask detection systems in the ongoing fight against the pandemic. Dilip Kumar Sharma | Aaditya Yadav "DeepMask: Transforming Face Mask Identification for Better Pandemic Control in the COVID-19 Era" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64522.pdf Paper Url: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/64522/deepmask-transforming-face-mask-identification-for-better-pandemic-control-in-the-covid19-era/dilip-kumar-sharma
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
Efficient and accurate data collection is paramount in clinical trials, and the design of Electronic Case Report Forms eCRFs plays a pivotal role in streamlining this process. This paper explores the integration of machine learning techniques in the design and implementation of eCRFs to enhance data collection efficiency. We delve into the synergies between eCRF design principles and machine learning algorithms, aiming to optimize data quality, reduce errors, and expedite the overall data collection process. The application of machine learning in eCRF design brings forth innovative approaches to data validation, anomaly detection, and real time adaptability. This paper discusses the benefits, challenges, and future prospects of leveraging machine learning in eCRF design for streamlined and advanced data collection in clinical trials. Dhanalakshmi D | Vijaya Lakshmi Kannareddy "Streamlining Data Collection: eCRF Design and Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63515.pdf Paper Url: https://www.ijtsrd.com/biological-science/biotechnology/63515/streamlining-data-collection-ecrf-design-and-machine-learning/dhanalakshmi-d
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
2. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD47613 | Volume – 5 | Issue – 6 | Sep-Oct 2021 Page 1340
(Zwillinget al., 2020). Notwithstanding the lots of
benefits that are associated with the adoption of such
device in banking transactions and other services
rendered by the deposit money banks, many
organizations, individuals and institutions of business
has suffered greatly from all manner of internet threat
that has come as a result of lack of awareness of the
various antics of dubious elements in the society
(Choi & Yi, 2009). In fact, they often fail to possess
the minimum required knowledge to protect their
computing devices. In worst case scenarios, deposit
money banks, its customers and individuals suffer
from total lack cyber hazard awareness. Hence, their
readiness to utilize protective cyber security measures
is non-existent.
Cyber hazards are the work of “bad hackers”
(otherwise known as “black hats”), who act on their
own or within an organized criminal group to commit
cyber-crime. In both cases, their intention is to engage
in cyber-crime in any of its various forms, ranging
from violation of individual privacy to identity theft
and credit card fraud(Zwillinget al., 2020). Cyber-
criminals use malicious software and hacking tools to
sabotage computers, mobile devices, and
communication network infrastructure, including
cyber security protection tool disruption (Abawajy,
2014). While protective tools are generally installed
on computers and in infrastructure, studies show that
they do not completely mitigate cyber security
breaches (Funnel, Jusoh&Katsabas, 2006; Parsons,
McCormac, Butavicius, Pattinson, &Jerram, 2014;
Schultz, 2005). This is because the weakest link in the
cyber security chain remains human error (Anwar,
He, Ash, Yuan, Li &Xu, 2017; Vance,
Siponen&Pahnila, 2012; Schneier, 2004).
Organizations have come to recognize that behaviors
deriving from the human factor are responsible for
cyber security flaws and may pose a liability for
information security (Sasse and Flechais, 2005).
In view of these threats and weaknesses in terms of
human errors, deposit money banks have embraced
and have continue to emphases the need for
individuals within and outside the banks to develop
resistance to the criminal intents of cyber-crime
organizations and individuals; as these organizations
and individuals makes use of their human weaknesses
to perpetuate their crime on a daily bases. Also, Since
human mind capabilities are limited in terms of
grasping important changes that take place in the
environment surrounding it, so has the current
business environment for any organization in the
world become complicated and highly dynamic for
them to comprehend (Zain et al., 2005). Therefore, it
has become necessary that organizations in dire need
to secure it current and future goals of customer
satisfaction, has stressed the need for individuals
within and outside of the deposit money banks to
develop a sensing agility, decision-making, and
agility in carrying out work properly
(Markos&Sridevi, 2010; Warr&Inceoglu, 2012); by
being conscious of cyber-crime alert or any other
devices that is being used to defraud them.
Apart from being able to resist these criminal
elements tactics, the issue of agility or corporate
agility should become the watch words of the modern
organization. Corporate agility is one of the methods
for responding to changes and revolutionary factors
that affects the smooth running of business. Agility
provides the organization with the possibilityof quick
response and compatibility with environment and
allows the organization to improve its efficiency
(Yeganegi&Azar, 2012). Corporate agility has great
impacts in the life of the organization as it provides
personnel with knowledge, high skills, restructuring
and organizational processes, employing new
technology (Sherehiy, 2008). Corporate agility refers
to organizations’ ability to thrive by sensing and
responding to environmental changes which has
become critically important nowadays when the
business environment is getting highly competitive
and turbulent. It is regarded as a key business factor
and a potential enabler to organization’s
competitiveness (Mathiassen& Pries-Heje, 2006)
Regardless of the different scholarly works that has
been done on the issue of firm agility; research on
cyber security awareness and corporate agility in
deposit money banks are few. Rather research on
organizational agility is emerging more in the
information systems field (Izzaet al., 2008) due to the
extensive reliance of contemporary organizations on
information in general and information system in
particular. As such, the problem that this article
addresses is the poor management of cyber security
solutions provided by modern internet security
experts which exhibits itself in the form of difficulty
of tracing the attackers, limited cybercrime laws, and
limited IT security knowledge among internet users.
For example, in May 2017 the WannaCry ransom
ware attack—a type ofmalware that blocks access to
computer systems until a ransom is paid—affected
companies worldwide, even though a patch for the
exploited Windows vulnerabilities had been made
available by Microsoft months earlier in March 2017
(Microsoft, 2017).
2. Literature Review
2.1. Corporate Agility
The concept of agility has been discussed by so many
researchers differently. Agility was coined in a
3. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD47613 | Volume – 5 | Issue – 6 | Sep-Oct 2021 Page 1341
manufacturing context-particularly in relation to
flexible manufacturing systems (Christopher
&Towill, 2001). Agility refers to the proactive
responses to changes (Bessantet al., 2001). Agility
can also be referred to the use of changes as inherent
opportunities in turbulent environment (Sharifi&
Zhang, 2001). Furthermore, agility is the ability to
survive and progress in the variable and unpredictable
environment (Dove, 2001). Sherehiy, (2008) defined
the process of agility in terms of the capabilities
necessary to achieve light movement in the
organization. Agility is the ability to respond to
unpredictable changes with quick response and
profitability (Erande&Verma, 2008). Agility is an
organizational ability to react quickly and effectively
to an environment which can change radically
(Janssen, 2010). Agility refers to the ability of rapid
and easy movement and rapid thinking with a
thoughtful method. Agility can be defined as
swiftness and quick response of a harmonious group
to the changes made by the environment surrounding
them in order to reach a goal (Yeganegi&Azar, 2012).
Corporate agility is the organization’s ability to work
comfortably in a quickly and consistently changing
and fragmented global market environment, through
producing high quality and effective performance
(Tsourveloudis&Valavanis, 2002). Corporate agility
enables the organization to carry out a series of
specific tasks successfully, in addition to managing
the opportunities and risks in the business activities
effectively (Ardichvileet al., 2003). Corporate agility
is not only “flexible” to cater for predictable changes
but also is able to respond and adapt to unpredictable
changes quickly and efficiently (Oosterhoutet al.,
2006). From the process-based perspective, corporate
agility is a set of processes that allow an organization
to sense changes and respond efficiently and
effectively in timely and cost-effective manner in the
internal and external environments. Sensing refers to
an organization’s ability to detect, capture and
interpret organizational opportunities (Seo& Paz
2008). Responding represents an organizational
ability to mobilize and transform resources to react to
the opportunities that it senses (Gattikeret al., 2005;
Oosterhoutet al., 2006). These two capabilities must
be aligned to optimally obtain corporate agility
(Overbyet al., 2006). Corporate agility is a proactive
management strategy that aims at maintaining the
organization’s resources and achieving the desires of
customers in a timely manner (Hittet al., 2007).
Corporate agility is the organizational capacity to
sensor response successfully to the opportunities and
threats in the market in a timely manner (Overbyet
al., 2006). Corporate agility is a proactive
management strategy that aims at maintaining the
organization’s resources and achieving the desires of
customers in a timely manner (Hittet al., 2007). The
three indicators popularized by Park (2011) were
adopted for this article. These indicators are sensing
agility, decision making agility and acting agility/
practice.
Sensing Agility
Sensing agility is the organizational capacity to
inspect and monitor events and changes in the
surrounding environment (customer preferences
changes, the movements of the new competitors, new
technology) in a timelymanner (Park, 2011). The task
of sensing means the strategic monitoring of
environmental events that could have an impact on
organizational strategy, competitive work, and future
performance, including several activities such as
access to information related to the events which
show environmental change, on the one hand, and
getting rid of the trivial information, on the other
hand, in light of predetermined foundations and rules.
Decision-Making Agility
Decision-making agility process is the ability to
collect, accumulate, restructure and evaluate relevant
information according to a variety of sources to
explain the implications of the business without
delay, and to identify opportunities and threats based
on the interpretation of events, along with the
development of action plans, which direct the
reconfiguration of resources and the development of
new competitive procedures. The decision-making
task consists of several interrelated activities, which
explain many events and identify opportunities and
threats in the surrounding environment. The task of
decision-making focuses on collecting information
from multiple and diverse sources in order to
understand the implications of their work. The task of
decision-making seeks to capture the utmost
opportunities and minimize the impact of threats on
the life of the organization (Houghton et al., 2004).
Acting Agility/Practicing
The acting task consists of a set of activities for re-
assembling organizational resources and modifying
business processes on the basis of the principles of
work resulting from the task of decision-making in
order to address the change that occurs in the
surrounding environment (Eisenhardt& Martin,
2000). Organizations can change the business
processes by various procedures and resources,
redesigning the organizational structure of the
organization.
2.2. Cyber Security Awareness
The information security community has come to
realize that the weakest link in a cyber-security chain
is human (Sasse, 2005). To develop effective cyber-
4. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD47613 | Volume – 5 | Issue – 6 | Sep-Oct 2021 Page 1342
security training programs for employees in the
workplace, it is necessary to understand the security
behavior of both men and women, and the similarities
and differences of their security behaviors. As
Hackers are continuously identifying new means of
stealing information. Unfortunately, the presence of
“uneducated” users in an organization makes them an
easy target for hackers and vulnerable to privacy
attacks (Khattak, Manan, and Sulaiman, 2011). User
education and training is a must to combat IT security
threats. Users should not only learn the material but
they should also apply it in their daily life. This is not
a simple task to achieve and not the sole
responsibility of the user or the organization. Many
groups have to be involved to produce an IT security-
aware resident.
There are multiple different schemes that have been
happening recently that are associated with Internet
usage. Some of these scams involve hackers cracking
passwords to get access to personal information and
criminals using phishing techniques to gather
information that they can use to steal individual’s
identities (Jansson& von Solms, 2013).The internet is
not a secured space. It is an area where there currently
are not many regulations. It is where anyone can put
up, take down, or gather as much information as they
want (Hall, 2012).
Cyber security is becoming an increasingly talked
about topic. With more and more people making their
personal information available online than ever
before, it is becoming a hacker’s paradise. However,
most individuals do not know about all of these scams
and are unaware when they are happening to them.
Because of this, people do not know how to protect
themselves and how to stop being a target. Cyber
security needs to be more common knowledge and
education needs to be more readily available. It is
important for us to help educate individuals on what
they can do to stop and prevent potential cyber
security attacks. It is also especially important that
our customers and staff to be able to recognize
potential threats. Majority of people are not only
unaware that cyber threats are real, but are also
unaware of what to do about them. Most people just
hope or assume that identity theft and phishing
attacks are not going to happen to them. But, making
society aware that even the smallest tasks can pose
potential threats is crucial for their safety.
Awareness is the first step in reducing the number of
identity thefts and personal information threats.
Individuals believe that if they have a unique
password then they are protecting themselves enough
that they do not have to worry about cyber security
threats (McCrohan, Engel, & Harvey, 2010). While
this is a good first step, and it is strongly
recommended to create unique passwords, it is not
enough to keep information private. Most hackers
have the technology and knowledge to know how to
decrypt these passwords or bypass them completely.
Each day that our technology is improving is another
day that hackers are figuring out how to crack that
technology.
Likewise, much of the population believes that
installing virus protection or spy software onto their
computers is enough. They think that this software is
going to save them from ever being hacked or having
their information stolen (McCrohan, Engel, &
Harvey, 2010). This is also simply not true. We need
to change this way of thinking by helping society
recognize the signs of the potential threats and risks.
We then need to hand them the information that they
need to keep themselves safe and protected. Some of
the signs that users need to be aware of that usually
indicate a phishing attempt are: words being
misspelled, a certain degree of urgency or
“deadlines”, fake names and web links, and a request
for personal information (Lungu&Tӑbuşcӑ, 2010).
3. Cyber Security Awareness and Corporate
Agility
Hearth and Rao (2009) secure management of
information systems is crucially important in
information intensive organizations. Although most
organizations have long been using security
technologies, it is well known that technology tools
alone are not sufficient. Thus, the area of end-user
security behaviors in organizations has gained an
increased attention. In information security observing
end-user security behaviors is challenging. Moreover,
recent studies have shown that the end users have
divergent security views. The inability to monitor
employee IT security behaviors and divergent views
regarding security policies, in our view, provide a
setting where the principal agent paradigm applies. In
this paper, we develop and test a theoretical model of
the incentive effects of penalties, pressures and
perceived effectiveness of employee actions that
enhances our understanding of employee compliance
to information security policies. Based on 312
employee responses from 77 organizations, we
empirically validate and test the model. Our findings
suggest that security behaviors can be influenced by
both intrinsic and extrinsic motivators. Pressures
exerted by subjective norms and peer behaviors
influence employee information security behaviors.
Intrinsic motivation of employee perceived
effectiveness of their actions was also found to play
an important role in security policy compliance
intentions. In analyzing the penalties, certainty of
5. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD47613 | Volume – 5 | Issue – 6 | Sep-Oct 2021 Page 1343
detection was found to be significant while
surprisingly, severity of punishment was found to
have a negative effect on securitybehavior intentions.
We discuss the implications of our findings for theory
and practice.
According to Vance, Siponen and Pahnila (2012)
employees’ failure to comply with IS security
procedures is a key concern for organizations today.
A number of socio-cognitive theories have been used
to explain this. However, prior studies have not
examined the influence of past and automatic
behavior on employee decisions to comply. This is an
important omission because past behavior has been
assumed to strongly affect decision-making. To
address this gap, we integrated habit (a routinized
form of past behavior) with Protection Motivation
Theory (PMT), to explain compliance. An empirical
test showed that habitual IS security compliance
strongly reinforced the cognitive processes theorized
by PMT, as well as employee intention for future
compliance. We also found that nearly all
components of PMT significantly impacted employee
intention to comply with IS security policies.
Together, these results highlighted the importance of
addressing employees’ past and automatic behavior in
order to improve compliance.
Mohamed and Ahmad (2012) in their study on
information privacy concern, antecedents and privacy
use in social network sites: evidence from Malaysia,
the research aims at gaining insights into information
privacy concerns, its antecedents and privacymeasure
use in social networking sites. The Social Cognitive,
Protection Motivation theories and gender factor were
used as a basis to develop and confirm a research
model. Using a cross-sectional survey design and
cluster sampling technique, four-hundred thirteen
questionnaires were distributed to undergraduates at a
public Malaysian university; three-hundred forty were
included in analyses. Data was analyzed using
structural equation modeling technique. Results
suggest that in order of importance only perceived
severity, self-efficacy, perceived vulnerability, and
gender are antecedents of information privacy
concerns with social networking sites; response
efficacy and rewards were not significant antecedents
contrary to many past findings in the literature that
used Social Cognitive and Protection Motivation
Theory as a theoretical basis. Information privacy
concerns explain privacy measure use in social
networking sites. The implications of these results
and study limitations are discussed.
Ng, Kankanhalli and Xu (2009) studying user’s
computer security, a health belief perspective. The
damage due to computer security incidents is
motivating organizations to adopt protective
mechanisms. While technological controls are
necessary, computer security also depends on
individual's security behavior. It is thus important to
investigate what influences a user to practice
computer security. This study uses the Health Belief
Model, adapted from the healthcare literature, to
study users' computer security behavior. The model
was validated using survey data from 134 employees.
Results show that perceived susceptibility, perceived
benefits, and self-efficacy are determinants of email
related security behavior. Perceived severity
moderates the effects of perceived benefits, general
security orientation, cues to action, and self-efficacy
on security behavior.
4. Conclusions and Recommendations
Cyber security awareness is more important now than
it has ever been before. Threats to personal and
corporate information are increasing and identities are
getting stolen every day. Making individuals and
corporation aware of this is the first step. The second
step is giving individuals and the corporate entity the
tools and knowledge that they need to protect
themselves. Based on these conclusions, the article
recommends that:
A. Governments should produce cybercrime laws
and enforce them. They should also work closely
with other governments since many attacks can be
conducted from abroad.
B. Deposit money banks should have trained
computer emergency response teams (CERT) that
are dedicated to the detection, prevention, and
response of cyber security incidents.
C. Media houses should continuously post IT
security advices, report IT security incidents, and
the penalty that the attackers got this will put fear
in the mind of those thinking of such an act.
D. Users (staff and customers of these deposit money
banks Apps and other software) should train
themselves by constantly reading magazines,
books and online articles on IT security threats
and what to do to protect themselves from such
threats.
E. Telecommunication companies (ISPs) should
offer advices on how to use the internet safely or
configure any internet device securely.
F. Managers of deposit money banks should offer
security training to its employees and clients. This
could be online or onsite training or a
combination of both.
6. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD47613 | Volume – 5 | Issue – 6 | Sep-Oct 2021 Page 1344
REFERENCE
[1] Abawajy, J. (2014). User preference of cyber
security awareness delivery methods.
Behaviour & Information Technology, 33(3),
237-248.
[2] Aloul, F. A. (2012). The need for effective
information security awareness. Journal of
advances in information technology, 3(3), 176-
183.
[3] ance, A., Siponen, M., &Pahnila, S. (2012).
Motivating IS security compliance: Insights
from habit and protection motivation theory.
Information & Management, 49(3-4), 190-198.
[4] Anwar, M., He, W., Ash, I., Yuan, X., Li, L.,
&Xu, L. (2017). Gender difference and
employees' cybersecurity behaviors. Computers
in Human Behavior, 69, 437-443.
[5] Ardichvili, A., Cardozob, R., &Rayc, S. (2003).
A theory of entrepreneurial opportunity
identification and development. Journal of
Business Venturing, 18(1), 105-117.
[6] Bessant, J., Knowles, D., Francis, D., &
Meredith, S. (2001). Developing the agile
enterprise, agile manufacturing: The 21st
century competitive strategy. New York: Wiley
[7] Choi, C., & Yi, M. H. (2009). The effect of the
internet on economic growth: Evidence from
cross-country panel data. Economics Letters,
105(1), 39-41.
[8] Christopher, M., &Towill, D. (2001). An
integrated model for the design of agile supply
chains. International Journal of Physical
Distribution & Logistics Management, 31(4),
235-246.
[9] Dove, R. (2001). Responsibility: The language,
structure, and culture of the agile enterprise.
New York: Wiley
[10] Eisenhardt, M., & Martin, J. (2000). Dynamic
capabilities: What are they? Strategic
Management Journal, 21(1), 1105-1121.
[11] Erande, A., &Verma, A. (2008). Measuring
agility of organizations: A comprehensive
agility measurement Tool (CAMT). Old
dominion university, proceedings of the 2008
IAJC-IJME International Conference.
[12] Funnel, S. M., Jusoh, A., &Katsabas, D. (2006).
The challenges of understanding and using
security: A survey of end-users. Computers &
Security, 25(1), 27-35.
[13] Gattiker, T., Chen, D., & Goodhue, D. (2005).
Agility through standardization: A Crm/ Erp
application. In F. R. Jacobs & B. E. (Eds. ),
Strategic erp extension and use (pp. 87-96. ).
Stanford Business Books.
[14] Hall, C. (2012). Security of the internet and the
known unknowns. Communications of the
ACM, 55(6), 35-37.
[15] Herath, T., &Rao, H. R. (2009). Encouraging
information security behaviors in organizations:
Role of penalties, pressures and perceived
effectiveness. Decision Support Systems, 47(2),
154-165.
[16] Hitt, M. A., Hoskisson, E. R., & Ireland, R. D.
(2007). Management of strategy: Concepts and
cases. New York: South-Western.
[17] Houghton, R., El Sawy, O. A., Gray, P.,
Donegan, C., & Joshi, A. (2004). Vigilant
information systems for managing enterprises
in dynamic supply chains: Real-time
dashboards at western digital. MIS Quarterly
Executive, 3(1), 19-35.
[18] Izza, S., Imache, R., Vincent, L., &Lounis, Y.
(2008). An approach for the evaluation of the
agility in the context of enterprise
interoperability. Enterprise Interoperability,
3(1), 3-14.
[19] Jalali, M. S., Siegel, M., &Madnick, S. (2019).
Decision-making and biases in cybersecurity
capability development: Evidence from a
simulation game experiment. The Journal of
Strategic Information Systems, 28(1), 66-82.
[20] Jansson, K., & von Solms, R. (2013). Phishing
for phishing awareness. Behaviour &
Information Technology, 32(6), 584-593.
[21] Khattak, Z., Manan, J and Sulaiman, . S (2011)
Analysis of open environment sign-in schemes-
privacy enhanced & trustworthy approach,
Journal of Advances in Information
Technology, 2(2), 109-121.
[22] Lee, K. G., Chong, C. W., &Ramayah, T.
(2017). Website characteristics and web users'
satisfaction in a higher learning institution.
International Journal of Management in
Education, 11(3), 266-283.
[23] Lungu, I., &Tӑbuşcӑ, A. (2010). Optimizing
anti-phishing solutions based on user
awareness, education and the use of the latest
web security solutions. Informatica Economica,
14(2), 27-36.
7. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD47613 | Volume – 5 | Issue – 6 | Sep-Oct 2021 Page 1345
[24] Markos, S., &Sridevi, M. (2010). Employee
engagement: The key to improving
performance. International Journal of Business
and Management, 5(12), 1-15.
[25] Mathiassen, L., & Pries-Heje, J. (2006).
Business agility and diffusion of information
technology. European Journal of Information
Systems, (15), 116-119.
[26] McCrohan, K. F., Engel, K., & Harvey, J. W.
(2010). Influence of awareness and training on
cyber security. Journal Of Internet Commerce,
9(1), 23-41.
[27] Microsoft, (2017). Microsoft security bulletin
MS17-010: Critical, Microsoft, TechNet
[28] Mohamed, N., & Ahmad, I. H. (2012).
Information privacy concerns, antecedents and
privacy measure use in social networking sites:
Evidence from Malaysia. Computers in Human
Behavior, 28(6), 2366-2375.
[29] Ng, B. Y., Kankanhalli, A., &Xu, Y. C. (2009).
Studying users' computer security behavior: A
health belief perspective. Decision Support
Systems, 46(4), 815-825.
[30] Oosterhout, M. V., Waarts, E., & Van
Hillegersberg, J. (2006). Change factors
requiring agility and implications for it.
European Journal of Information Systems,
15(2), 132-145.
[31] Overby, E., Bharadwaj, A., &Sambamurthy, V.
(2006). Enterprise agility and the enabling role
of information technology. European Journal
of Information Systems, 15(2), 120-131.
[32] Park, Y. (2011). The dynamics of opportunity
and threat management in turbulent
environments: The role information
technologies. Doctor Dissertation.
[33] Parsons, K., McCormac, A., Butavicius, M.,
Pattinson, M., &Jerram, C. (2014). Determining
employee awareness using the human aspects
of information security questionnaire (HAIS-
Q). Computers & security, 42, 165-176.
[34] Sasse, M. A., &Flechais, I. (2005). Usable
security: Why do we need it? How do we get
it? In: Cranor, LF and Garfinkel, S, (eds. )
Security and usability: Designing secure
systems that people can use. (pp. 13 - 30).
O'Reilly: Sebastopol.
[35] Sasse, M. A., &Flechais, I. (2005). Usable
security: Why do we need it? How do we get
it?. O'Reilly.
[36] Schneier, B. (2004). Customers, passwords, and
Web sites. IEEE Security & Privacy, 2(4), 88-
99.
[37] Schultz, E. (2005). From the Editor-in-Chief:
the human factor in security. Computers and
security, 24(6), 425-426.
[38] Seo, D., & Paz, A. (2008). Exploring the dark
side of is in achieving organizational agility.
Communication of the ACM, 51(11), 136-139
[39] Sharifi, H., & Zhang, Z. (2001). Agile
manufacturing in practice: Application of a
methodology. International Journal of
Operations & Production Management, 21(5),
772-794.
[40] Sherehiy, B. (2008). Relatioships between
agility strategy, work organization and
workforce agility. Doctor Dissertation,
University of Louisville
[41] Tsourveloudis, N., &Valavanis, K. (2002). On
the measurement of enterprise agility. Journal
of Intelligent & Robotic Systems, 33(3), 329-
342.
[42] Vance, A., Siponen, M., &Pahnila, S. (2012).
Motivating IS security compliance: Insights
from habit and protection motivation theory.
Information & Management, 49(3-4), 190-198.
[43] Warr, P., &Inceoglu, I. (2012). Job
engagement, job satisfaction, and contrasting
associations with person–job fit. Journal of
Occupational Health Psychology, 17(2), 129-
138.
[44] Yeganegi, K., &Azar, M. (2012). The effect of
IT on organizational agility: Proceedings of the
2012 international conference on industrial
engineering and operations management,
Istanbul, Turkey.
[45] Zain, M., Rose. R., Abdullah, I., &Masrom, M.
(2005). The relationship between information
technology acceptance and organizational
agility in Malaysia. Information &
Management, 42(1), 829-839
[46] Zwilling, M., Klien, G., Lesjak, D., Wiechetek,
Ł., Cetin, F., &Basim, H. N. (2020). Cyber
security awareness, knowledge and behavior: A
comparative study. Journal of Computer
Information Systems, 1(1), 1-16.