Abstract: Most current information security systems performance vary with the nature of the filed its being
operating. With an increased emphasizes on the adoption of security tools and technologies, the anomalies and
intrusion are mostly said defined to be detected on system's algorithm, when most systems have well defined
mechanism for rapid reaction and identification of intrusions. However, despite this support for anomaly
detection, this is usually limited and often require a full recompilation of the system to deploy a comprehensive
framework of security governance, strategies and practices employing the policies in implementation.
As a result, the absence of a robust security framework securing both the education and corporate
resources has heightened the tension for a strategic information security solutions which might ends with cost,
complexities and cumbersome to develop. This paper thereby presents an alternative comprehensive system
namely RITS-B which accommodates both the nature of education and organizations without a need to for a
further modification. Implication of the proposed approach at real time depicts its suitability in the arena of
concern.
Keywords: Information Security, Governance, Strategies, Practices, Regional Cultures and Believes.
Issues on Management and Governance of Data Security In HEIsijtsrd
"In higher education, Governance of data security is the data management mechanism that has to be practiced. This is an appropriate management model for the employees in the higher education institution that will understand the role to be played to secure more highly confidential data. This paper aims at issues on management and governance of data security in Higher education institutions HEIs . This will conclude on identifying the factors affecting governance of data security in private higher education system. It also enables to discover the issues in the management and provide appropriate solution for the governance of data security in the HEIs. A research model with factors was proposed for data security governance practice in HEIs. From the research findings, a governance model was derived and proposed for the all new HEIs. Janet Gabriel | Sheik Mohideen Abdul Latheef | Veluswamy Jayavardhanavelu ""Issues on Management and Governance of Data Security In HEIs"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | International Conference on Advanced Engineering and Information Technology , November 2018, URL: https://www.ijtsrd.com/papers/ijtsrd19151.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/19151/issues-on-management-and-governance-of-data-security-in-heis/janet-gabriel"
Towards a Structured Information Security Awareness Programmetulipbiru64
Paper presented by Mohd Nabil Zulhemay, Rohama Mohamad Rashid and Omar Zakaria at the 4th PERPUN International Conference 2015: Information Revolution, 11-12th August 2015 at Avillion Legacy Hotel, Melaka.
Security in Learning Management Systems: Designing Collaborative Learning Act...eLearning Papers
Authors: Jorge Miguel Moneo, Santi Caballé, Josep Prieto-Blázquez
The field of research on information technology applications in the design of computer supported collaborative learning (CSCL) activities generates very complex scenarios which must be studied from different approaches. One approach is to consider information security, but not only from a technological point of view.
System Dynamics Based Insider Threats ModelingIJNSA Journal
Insider threat has been recognized as one of the most dangerous security threats and become a much more complex issue. Insider threat is resulted from the legitimate users abusing their privileges and cause tremendous damage or losses. Not always being friends, insiders can be main threats to the organization. Currently, there is no equivalent prevention solution for insider threat to an intrution prevention system or vulnerability scanner. From the survey of literature of insider threat studies, we conclude that the system dynamics (SD) is an effective tool to analyze the root causes of insider threat incidents and evaluate mitigation strategies from people, process, and technology perspectives. A generized case based SD model can be tailored and applied to analyze and evaluate specific insider threat incidents. We
present a well known insider threat incident of Taiwan and tailor the generized case based SD model to analyze it. The simulation results indicate that the risk of insider threats can be reduced and the probability of detecting insider threats can be increased.
Issues on Management and Governance of Data Security In HEIsijtsrd
"In higher education, Governance of data security is the data management mechanism that has to be practiced. This is an appropriate management model for the employees in the higher education institution that will understand the role to be played to secure more highly confidential data. This paper aims at issues on management and governance of data security in Higher education institutions HEIs . This will conclude on identifying the factors affecting governance of data security in private higher education system. It also enables to discover the issues in the management and provide appropriate solution for the governance of data security in the HEIs. A research model with factors was proposed for data security governance practice in HEIs. From the research findings, a governance model was derived and proposed for the all new HEIs. Janet Gabriel | Sheik Mohideen Abdul Latheef | Veluswamy Jayavardhanavelu ""Issues on Management and Governance of Data Security In HEIs"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | International Conference on Advanced Engineering and Information Technology , November 2018, URL: https://www.ijtsrd.com/papers/ijtsrd19151.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/19151/issues-on-management-and-governance-of-data-security-in-heis/janet-gabriel"
Towards a Structured Information Security Awareness Programmetulipbiru64
Paper presented by Mohd Nabil Zulhemay, Rohama Mohamad Rashid and Omar Zakaria at the 4th PERPUN International Conference 2015: Information Revolution, 11-12th August 2015 at Avillion Legacy Hotel, Melaka.
Security in Learning Management Systems: Designing Collaborative Learning Act...eLearning Papers
Authors: Jorge Miguel Moneo, Santi Caballé, Josep Prieto-Blázquez
The field of research on information technology applications in the design of computer supported collaborative learning (CSCL) activities generates very complex scenarios which must be studied from different approaches. One approach is to consider information security, but not only from a technological point of view.
System Dynamics Based Insider Threats ModelingIJNSA Journal
Insider threat has been recognized as one of the most dangerous security threats and become a much more complex issue. Insider threat is resulted from the legitimate users abusing their privileges and cause tremendous damage or losses. Not always being friends, insiders can be main threats to the organization. Currently, there is no equivalent prevention solution for insider threat to an intrution prevention system or vulnerability scanner. From the survey of literature of insider threat studies, we conclude that the system dynamics (SD) is an effective tool to analyze the root causes of insider threat incidents and evaluate mitigation strategies from people, process, and technology perspectives. A generized case based SD model can be tailored and applied to analyze and evaluate specific insider threat incidents. We
present a well known insider threat incident of Taiwan and tailor the generized case based SD model to analyze it. The simulation results indicate that the risk of insider threats can be reduced and the probability of detecting insider threats can be increased.
Information Security Management in University Campus Using Cognitive SecurityCSCJournals
Nowadays, most universities offer free Internet connections, access to scientific databases, and advanced computer networks for the members of their community, which generates dynamic and complex scenarios. In this context, it is necessary to define proactive security strategies, as well as the integration of technology and research. This work presents a general vision of the experience adopted by the universities in the field of information security management using cognitive security.
Information Security Governance: Concepts, Security Management & MetricsMarius FAILLOT DEVARRE
The goal of information security governance is to establish and maintain a framework to provide assurance that information security strategies are aligned with the business objectives and consistent with applicable laws and regulations.
The mobile device is one of the fasted growing technologies that is widely used in a diversifying sector.
Mobile devices are used for everyday life, such as personal information exchange – chatting, email,
shopping, and mobile banking, contributing to information security threats. Users' behavior can influence
information security threats. More research is needed to understand users' threat avoidance behavior and
motivation. Using Technology threat avoidance theory (TTAT), this study assessed factors that influenced
mobile device users' threat avoidance motivations and behaviors as it relates to phishing attacks.
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEXIJNSA Journal
Nowadays, use of wireless technology in organizations is a regular act, and we can see this technology erupted in all possible different areas. Related to employing wireless technology those organizations need to apply properly security level, depend on security policy which already defined. If security system applied but not required, or security system required but not provided, leads to improper security system. In this paper we have shown the way to evaluate the data significant and their appropriate security level. Here a model to evaluate the cost of data on security point of view by consideration of some parameters like sensitivity, volume, life, frequency, etc…, this research makes organizations to predict and implement or understand the cost involved for security of their data by measuring the data value. We used questionnaire and survey methodologies to collect the data; and then used SPSS and SAS program to calculate and design a model. In this way regression and BOOTSTARP help us to find accurate result.
Fundamental Areas of Cyber Security on Latest Technologyijtsrd
Cyber Security has developed one of the biggest challenges of information technology in the present day. Cyber security consists of controlling physical access of the hardware, application, networks and protecting against harm that may come via networks. It is a mixture of processes, technologies and practices. The objective of cyber Security is to protect programs, application, networks, computers and data from attack. Moreover, various measures of cyber security is quite a very huge concern to many. This paper mainly focuses on challenges faced by cyber security on the latest technologies. It also focuses on the latest about cyber security techniques, ethics and the trends changing the face of cyber security. This paper mainly focuses on cyber Security and its fundamental elements on latest technologies. Aye Mya Sandar | Ya Min | Khin Myat Nwe Win "Fundamental Areas of Cyber Security on Latest Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26550.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26550/fundamental-areas-of-cyber-security-on-latest-technology/aye-mya-sandar
Information security approach in open distributed multi agent virtual learnin...ijcsit
This paper presented the main information, security problems and threats in open multi-agent distributed
e-learning information systems and Proposed various approaches to solve information security attacks in
virtual learning environment using service oriented architecture which based on multi-agent information
systems architecture, the solution on the multi-agent learning information system implementation based on
the implementation of two types of systems the first system with the centralized mobile agent information
security management and the second system with decentralized mobile agents security management, and
proposed the migration behavior simulation for their active software components (software agents) .
Information Security Governance: Concepts, Security Management & MetricsOxfordCambridge
The goal of information security governance is to establish and maintain a framework to provide assurance that information security strategies are aligned with the business objectives and consistent with applicable laws and regulations.
Information Sharing of Cyber Threat Intelligence with their Issue and Challengesijtsrd
Today threat landscape growing at the rapid rate with much organization continuously face complex and malicious cyber threats. In today's Internet connected world where technologies support almost every feature of our society, cyber security and forensic specialists are increasingly distributing with wide ranging cyber threats in almost. real time conditions. The capability to detect, analyze, and defend against such threats in near real time conditions is not possible without the employment of threat intelligence, big data, and machine learning techniques. Cyber Threat Intelligence CTI has become a hot topic and being under consideration for many organizations to counter the rise of cyber attacks. The vast majority of information security challenges we face today are the result of serendipitous and naive decisions made in the early stages of the Internet. Khin Myat Nwe Win | Yin Myo Kay Khine Thaw "Information Sharing of Cyber Threat Intelligence with their Issue and Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26504.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26504/information-sharing-of-cyber-threat-intelligence-with-their-issue-and-challenges/khin-myat-nwe-win
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...IJNSA Journal
Social engineering attacks can be severe and hard to detect. Therefore, to prevent such attacks, organizations should be aware of social engineering defense mechanisms and security policies. To that end, the authors developed a taxonomy of social engineering defense mechanisms, designed a survey to measure employee awareness of these mechanisms, proposed a model of Social Engineering InfoSec Policies (SE-IPs), and designed a survey to measure the incorporation level of these SE-IPs. After analyzing the data from the first survey, the authors found that more than half of employees are not aware of social engineering attacks. The paper also analyzed a second set of survey data, which found that on average, organizations incorporated just over fifty percent of the identified formal SE-IPs. Such worrisome results show that organizations are vulnerable to social engineering attacks, and serious steps need to be taken to elevate awareness against these emerging security threats.
Towards Web 3.0: An Application Oriented ApproachIOSR Journals
Abstract: The World Wide Web (WWW) is global information medium, where users can read and write using
computers over internet. Web is one of the services available on internet. The Web was created in 1989 by Sir
Tim Berners-Lee. Since then a great refinement has done in the web usage and development of its applications.
In this paper we would like to present different stages of web growth starting from its inception to the present
web in terms of its technologies and applications.
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
Abstract :The field of Signal Processing has witnessed the strong emergence of a new technique, the Blind Signal Processing (BSP) which is based on sound theoretical foundation. An offshoot of the BSP is known as Blind Source Separation (BSS). This digital signal processing techniques have a wide and varied potential applications. The term blind is indicative of the fact that both the source signal and the mixing procedures are unknown. One of the more interesting applications of BSS is in field of image data security/authentication where digital watermarking is proposed. Watermarking is a promising technique to help protect data security and intellectual property rights. The plethora digital image watermarking methods are surveyed and discussed here with their features and limitations. Thus literature survey is presented in two major categories-Digital image watermarking methods and BSS based techniques in digital image watermarking and extraction. Keywords – BSP, BSS, Mixing Coefficient, Digital Image Watermarking, Watermark Extraction.
Design of Ball Screw Mechanism for Retro Fit of External Grinding MachineIOSR Journals
Abstract: To convert the existing grinding machine into a good working machine, a ball screw mechanism is
designed and incorporated in the existing grinding machine by retrofitting process. Grinding machine removes
material from the work piece by abrasion, which can generate substantial amount of heat. Therefore a coolant
System is incorporated to cool the work piece, so that it does not overheat and go out of its tolerance. Grinding
practice is a large and diverse area of manufacturing and tool making. It can also rough out large volume of
metal quite rapidly. It is usually better suited to the machining of hard materials. Cylindrical grinding is also
called center type grinding. It is used in the removing the cylindrical surface and shoulders of the work piece.
The five type of cylindrical grinding are outside diameter (OD) grinding. Inside diameter (ID) grinding, plunge
grinding, creep feed grinding and center less grinding.It is used in the industries for grinding the nozzle body.
The grinding machine can be changed to automatic machine according to one of the latest technologies called
PLC’s controller. The manually operated grinding machine has some of the in-accuracies and disadvantages
compared to new modern CNC grinding machines.Based on the case study of both manual and CNC grinding
machine, the manual machine is converted into automatic machine for the better accuracy and efficiency. The
main replacement of the machine parts are hydraulic cylinder and stepper motor by ball screw mechanisms and
servo motor.
Information Security Management in University Campus Using Cognitive SecurityCSCJournals
Nowadays, most universities offer free Internet connections, access to scientific databases, and advanced computer networks for the members of their community, which generates dynamic and complex scenarios. In this context, it is necessary to define proactive security strategies, as well as the integration of technology and research. This work presents a general vision of the experience adopted by the universities in the field of information security management using cognitive security.
Information Security Governance: Concepts, Security Management & MetricsMarius FAILLOT DEVARRE
The goal of information security governance is to establish and maintain a framework to provide assurance that information security strategies are aligned with the business objectives and consistent with applicable laws and regulations.
The mobile device is one of the fasted growing technologies that is widely used in a diversifying sector.
Mobile devices are used for everyday life, such as personal information exchange – chatting, email,
shopping, and mobile banking, contributing to information security threats. Users' behavior can influence
information security threats. More research is needed to understand users' threat avoidance behavior and
motivation. Using Technology threat avoidance theory (TTAT), this study assessed factors that influenced
mobile device users' threat avoidance motivations and behaviors as it relates to phishing attacks.
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEXIJNSA Journal
Nowadays, use of wireless technology in organizations is a regular act, and we can see this technology erupted in all possible different areas. Related to employing wireless technology those organizations need to apply properly security level, depend on security policy which already defined. If security system applied but not required, or security system required but not provided, leads to improper security system. In this paper we have shown the way to evaluate the data significant and their appropriate security level. Here a model to evaluate the cost of data on security point of view by consideration of some parameters like sensitivity, volume, life, frequency, etc…, this research makes organizations to predict and implement or understand the cost involved for security of their data by measuring the data value. We used questionnaire and survey methodologies to collect the data; and then used SPSS and SAS program to calculate and design a model. In this way regression and BOOTSTARP help us to find accurate result.
Fundamental Areas of Cyber Security on Latest Technologyijtsrd
Cyber Security has developed one of the biggest challenges of information technology in the present day. Cyber security consists of controlling physical access of the hardware, application, networks and protecting against harm that may come via networks. It is a mixture of processes, technologies and practices. The objective of cyber Security is to protect programs, application, networks, computers and data from attack. Moreover, various measures of cyber security is quite a very huge concern to many. This paper mainly focuses on challenges faced by cyber security on the latest technologies. It also focuses on the latest about cyber security techniques, ethics and the trends changing the face of cyber security. This paper mainly focuses on cyber Security and its fundamental elements on latest technologies. Aye Mya Sandar | Ya Min | Khin Myat Nwe Win "Fundamental Areas of Cyber Security on Latest Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26550.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26550/fundamental-areas-of-cyber-security-on-latest-technology/aye-mya-sandar
Information security approach in open distributed multi agent virtual learnin...ijcsit
This paper presented the main information, security problems and threats in open multi-agent distributed
e-learning information systems and Proposed various approaches to solve information security attacks in
virtual learning environment using service oriented architecture which based on multi-agent information
systems architecture, the solution on the multi-agent learning information system implementation based on
the implementation of two types of systems the first system with the centralized mobile agent information
security management and the second system with decentralized mobile agents security management, and
proposed the migration behavior simulation for their active software components (software agents) .
Information Security Governance: Concepts, Security Management & MetricsOxfordCambridge
The goal of information security governance is to establish and maintain a framework to provide assurance that information security strategies are aligned with the business objectives and consistent with applicable laws and regulations.
Information Sharing of Cyber Threat Intelligence with their Issue and Challengesijtsrd
Today threat landscape growing at the rapid rate with much organization continuously face complex and malicious cyber threats. In today's Internet connected world where technologies support almost every feature of our society, cyber security and forensic specialists are increasingly distributing with wide ranging cyber threats in almost. real time conditions. The capability to detect, analyze, and defend against such threats in near real time conditions is not possible without the employment of threat intelligence, big data, and machine learning techniques. Cyber Threat Intelligence CTI has become a hot topic and being under consideration for many organizations to counter the rise of cyber attacks. The vast majority of information security challenges we face today are the result of serendipitous and naive decisions made in the early stages of the Internet. Khin Myat Nwe Win | Yin Myo Kay Khine Thaw "Information Sharing of Cyber Threat Intelligence with their Issue and Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26504.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26504/information-sharing-of-cyber-threat-intelligence-with-their-issue-and-challenges/khin-myat-nwe-win
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...IJNSA Journal
Social engineering attacks can be severe and hard to detect. Therefore, to prevent such attacks, organizations should be aware of social engineering defense mechanisms and security policies. To that end, the authors developed a taxonomy of social engineering defense mechanisms, designed a survey to measure employee awareness of these mechanisms, proposed a model of Social Engineering InfoSec Policies (SE-IPs), and designed a survey to measure the incorporation level of these SE-IPs. After analyzing the data from the first survey, the authors found that more than half of employees are not aware of social engineering attacks. The paper also analyzed a second set of survey data, which found that on average, organizations incorporated just over fifty percent of the identified formal SE-IPs. Such worrisome results show that organizations are vulnerable to social engineering attacks, and serious steps need to be taken to elevate awareness against these emerging security threats.
Towards Web 3.0: An Application Oriented ApproachIOSR Journals
Abstract: The World Wide Web (WWW) is global information medium, where users can read and write using
computers over internet. Web is one of the services available on internet. The Web was created in 1989 by Sir
Tim Berners-Lee. Since then a great refinement has done in the web usage and development of its applications.
In this paper we would like to present different stages of web growth starting from its inception to the present
web in terms of its technologies and applications.
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
Abstract :The field of Signal Processing has witnessed the strong emergence of a new technique, the Blind Signal Processing (BSP) which is based on sound theoretical foundation. An offshoot of the BSP is known as Blind Source Separation (BSS). This digital signal processing techniques have a wide and varied potential applications. The term blind is indicative of the fact that both the source signal and the mixing procedures are unknown. One of the more interesting applications of BSS is in field of image data security/authentication where digital watermarking is proposed. Watermarking is a promising technique to help protect data security and intellectual property rights. The plethora digital image watermarking methods are surveyed and discussed here with their features and limitations. Thus literature survey is presented in two major categories-Digital image watermarking methods and BSS based techniques in digital image watermarking and extraction. Keywords – BSP, BSS, Mixing Coefficient, Digital Image Watermarking, Watermark Extraction.
Design of Ball Screw Mechanism for Retro Fit of External Grinding MachineIOSR Journals
Abstract: To convert the existing grinding machine into a good working machine, a ball screw mechanism is
designed and incorporated in the existing grinding machine by retrofitting process. Grinding machine removes
material from the work piece by abrasion, which can generate substantial amount of heat. Therefore a coolant
System is incorporated to cool the work piece, so that it does not overheat and go out of its tolerance. Grinding
practice is a large and diverse area of manufacturing and tool making. It can also rough out large volume of
metal quite rapidly. It is usually better suited to the machining of hard materials. Cylindrical grinding is also
called center type grinding. It is used in the removing the cylindrical surface and shoulders of the work piece.
The five type of cylindrical grinding are outside diameter (OD) grinding. Inside diameter (ID) grinding, plunge
grinding, creep feed grinding and center less grinding.It is used in the industries for grinding the nozzle body.
The grinding machine can be changed to automatic machine according to one of the latest technologies called
PLC’s controller. The manually operated grinding machine has some of the in-accuracies and disadvantages
compared to new modern CNC grinding machines.Based on the case study of both manual and CNC grinding
machine, the manual machine is converted into automatic machine for the better accuracy and efficiency. The
main replacement of the machine parts are hydraulic cylinder and stepper motor by ball screw mechanisms and
servo motor.
Project Managers Vs Operations Managers: A comparison based on the style of l...IOSR Journals
Within a century after the emergence of the initial theories in leadership area, several theories have tried to explain the different styles of leadership and the extent to which leaders’ styles can affect the overall success of the teams or the organizations being led by them. Regardless of the different ways in which these theories explain and address the styles of leadership, two concepts of ‘task’ and ‘individual’ are focused by most of them. Leaders, depending on their personal traits, attitudes, and situational considerations may show different levels of concern for tasks and individuals. Also, the environment in which a leader operates may affect the leader’s concern for tasks or individuals. Project environments, regarding the temporary nature of project-based activities, basically differ from operational environments in several aspects. Consequently, leadership in project environments may require a different style in comparison with operational environments. The current study has applied ‘concern for tasks’ and ‘concern for individuals’ as two dependent variables to make a comparison between project managers and operations managers based on the style of leadership. An online survey in a global context helped us to collect data from 159 project managers and 171 operations managers. The respondents were from different countries and various disciplines. The collected data were analyzed in SPSS using ‘independent sample t-test’. The results of the analysis revealed that project managers in general show a balanced concern for tasks and individuals, whereas operations managers have a high concern for tasks and a lower concern for individuals.
A Survey of Image Segmentation based on Artificial Intelligence and Evolution...IOSR Journals
Abstract : In image analysis, segmentation is the partitioning of a digital image into multiple regions (sets of
pixels), according to some homogeneity criterion. The problem of segmentation is a well-studied one in
literature and there are a wide variety of approaches that are used. Different approaches are suited to different
types of images and the quality of output of a particular algorithm is difficult to measure quantitatively due to
the fact that there may be much correct segmentation for a single image. Image segmentation denotes a process
by which a raw input image is partitioned into nonoverlapping regions such that each region is homogeneous
and the union of any two adjacent regions is heterogeneous. A segmented image is considered to be the highest
domain-independent abstraction of an input image. Image segmentation is an important processing step in many
image, video and computer vision applications. Extensive research has been done in creating many different
approaches and algorithms for image segmentation, but it is still difficult to assess whether one algorithm
produces more accurate segmentations than another, whether it be for a particular image or set of images, or
more generally, for a whole class of images.
In this paper, The Survey of Image Segmentation using Artificial Intelligence and Evolutionary Approach
methods that have been proposed in the literature. The rest of the paper is organized as follows. 1.
Introduction, 2.Literature review, 3.Noteworthy contributions in the field of proposed work, 4.Proposed
Methodology, 5.Expected outcome of the proposed research work, 6.Conclusion.
Keywords: Image Segmentation, Segmentation Algorithm, Artificial Intelligence, Evolutionary Algorithm,
Neural Network, Fuzzy Set, Clustering.
A Utility Interactive Electricity Generation Schemes with Renewable ResourcesIOSR Journals
Abstract: In the recent year’s power utility of coastal areas are experiencing relatively large quantum of solar and wind energy. If the wind is heavy it might produce larger sea waves of high energy contents. The electricity needs of a township or a village situated in a coastal area can be partially fulfilled by installing a modular mini electricity generating unit and an intensified solar heat extractor in buildings. Also, installation of medium sized windmill plant, solar heated steam turbine electricity generator and sea wave energy extracting plants could fulfill the rest of the electricity needs of the township. Here we discuss the regulation of the voltage and frequency of a stand-alone fixed-pitch wind energy conversion system (WECS) based on a self-excited squirrel-cage induction machine. The characteristics of the wind turbine, self-excited generator, and the ratings of the VSI are considered in order to determine the load range for which voltageand frequency can be regulated for a given wind speed range. Keywords: Solar panel, solar tracker, solar water heater,renewable energy, wind mills, induction generator, load management.
Particulate Sintering of Iron Ore and Empirical Analysis of Sintering Time Ba...IOSR Journals
Particulate sintering of iron ore has been carried out using the necessary ingredients. Empirical
analysis of the sintering time based on the coke breeze input concentration and ignition temperature were also
successfully obtained through first principle application of a derived model which functioned as a evaluative
tool. The derived model;
S = (√T)0.95 + 0.0012α
indicates that amongst ignition temperature and coke breeze input, sintering time is more significantly affected
by the coke breeze input concentration. This is based on the higher correlation it makes with sintering time
compared to applied ignition temperature, all other process parameters being constant. The validity of the
model was rooted in the core expression S – Kα ≈ (√T )N where both sides of the expression are correspondingly
approximately almost equal. Sintering time per unit rise in the operated ignition temperature as obtained from
experiment, derived model and regression model were evaluated as 0.0169, 0.0128 and 0.0159 mins. / 0C
respectively. Similarly, sintering time per unit coke breeze input concentration as obtained from experiment,
derived model and regression model were evaluated as 4.0, 3.0183 and 3.7537 mins./ % respectively indicating a
significant proximate agreement and validity of the model. The standard error (STEYX) incurred in predicting
sintering time for each value of the ignition temperature and coke breeze input concentration considered, as
obtained from the experiment, derived model and regression model are 1.6646, 0.7678 and 2.98 x10-5 % as well
as 2.2128, 1.0264 and 1.2379% respectively. The maximum deviation of mode-predicted results from the
corresponding experimental values was less than 11%.
A Novel Flipflop Topology for High Speed and Area Efficient Logic Structure D...IOSR Journals
In high speed data path network flop is one of the major functional elements to store intermediate
results and data at different stages. But the most important problem is huge power utilization due to switching
activity and increase in clock period that is Timing Latency; causes the performance of data path in digital
design is decreased. The existing works implement various Flipflop topology in data path structure design such
as conventional Transmission Gate Based Master Slave Filpflop (TGMS FF), Write Port Master Slave Flip-flop
(WPMS) and Clocked Complementary Metal Oxide Semiconductor (C2MOS). In WPMS method, area is
minimized but delay is increased. In C2MOS technique Power consumption and delay is reduced, but there is a
definite scope to reduce Power, area and delay. In this paper a Modified Clocked Complementary Metal Oxide
Semiconductor Latch (mC2MOS Latch) is proposed and delay, power is again reduced up to 60% and the area
of the circuit is also reduced while comparing with previous methods.
Design of Adjustable Reconfigurable Wireless Single Core CORDIC based Rake Re...IOSR Journals
In wireless communication system transmitted signals are subjected to multiple reflections,
diffractions and attenuation caused by obstacles such as buildings and hills, etc. At the receiver end, multiple
copies of the transmitted signal are received that arrive at clearly distinguishable time instants and are faded by
signal cancellation. Rake receiver is a technique to combine these so called multi-paths [2] by utilizing multiple
correlation receivers allocated to those delay positions on which the significant energy arrives which achieves a
significant improvement in the SNR of the output signal. This paper shows how the rake, including dispreading
and descrambling could be replaced by a receiver that can be implemented on a CORDIC based hardware
architecture. The performance in conjunction with the computational requirements of the receiver is widely
adjustable which is significantly better than that of the conventional rake receiver
Fraud Prevention, Mitigation and Management Practices In Nigerian FirmsIOSR Journals
This paper examined fraud prevention, mitigation and management practices. The respondents were 294 persons drawn from business owners, accountants, investors, bankers, and managers in Port Harcourt. The spearman’s rank order correlation coefficient statistical tool of the statistical package for social sciences (SPSS) was used to test the hypotheses. Results indicated that there is a significant relationship between internal control system and reduction in the manipulation of records; and there is a significant relationship between internal auditing and the prevention of assets defalcations.It was concluded that businesses operate in a risky environment where errors and irregularities which may result into fraud can occur. Fraud is an act of deception which is perpetrated by someone in authority for the illegal acquisition of the assets of an organization that he or she is entrusted to take care of. Thus, efficient and effective internal control system with adequate internal auditing should be provided to prevent, mitigate and manage all forms of fraudulent activities in organizations. In the lightof our findings from the study, we recommendedthat the management of firms should have mechanisms for theproper documentations of their assets, and that the management of organizations should provide mechanisms to safeguard all their physical assets.
Changes During Passive Recovery In Lower Limbs Tiredness After Strenuous WorkoutIOSR Journals
Abstract: Lower limbs tiredness is a widely accepted indicator for recovery state prediction. The study was
designed and purposed to know the rate and trend of lower limbs tiredness recovery after strenuous workout in
passive state. Ten athletes from LNIPE, Gwalior having almost similar anthropometric measurements,
physiological capacity, chronological age(18-19 year), training age(5-6 year), event(sprinters) etc. residing in
same campus having similar daily routine were selected as participant in this experiment. The experiment was
conducted in a highly controlled environment using sophisticate equipments. Target Heart Rate Zone of the
workout lasting for 20 minutes was 80%-90% of their Maximum Heart Rate. Three readings including pre, post
and 30 minutes post workout was considered for both the two tests (Isometric Leg Strength Test and Sergeant
Jump Test) selected for the purpose. rANOVA was employed separately to derive out meaningful information
from the raw data. In both the tests well controlled workout for 20 minutes resulted in significant increase state
of post workout readings. With passage of time after 30 minutes post passive recovery there was no
improvement in state of tiredness. Thus scope of future research is there in planning out means and methods to
promote lower limbs tiredness recovery during this post recovery period.
Keyword: Isometric Leg Strength Test, Sergeant Jump Test, Recovery, rANOVA
Optimization of Complete Monopole Antennato Exhibit Wideband Capabilities.IOSR Journals
Antennas used for early portable wireless handheld devices were the so-called whip antennas. The
quarter-wavelength whip antenna was very popular, mostly because it is simple and convenient. It has an Omnidirectional
pattern in the plane of the earth when held upright and a gain satisfying the device’s specifications.
New antenna designs have appeared on radios with lower profile than the whip antenna and without
significantly reducing performance. These include the quarter-wavelength helical antenna and the “stubby”
helical antenna, which is the shortest antenna available. In recent years, the demand for compact handheld
communication devices has grown significantly. Devices smaller than palm size have appeared in the market.
Antenna size is a major factor that limits device miniaturization. In the past few years, new designs based on the
Planar Inverted-F Antenna (PIFA) and Microstrip Antennas (MSA) have been popular for handheld wireless
devices because these antennas have a low profile geometry instead of protruding as most antennas do on
handheld radios. Conventional PIFAs and MSAs are compact, with a length that is approximately a quarter to a
half of the wavelength. These antennas can be further optimized by adding new parameters in the design, such
as strategically shaping the conductive plate, or judiciously locating loads.
Establishment of A Small Scale Non-Woven Tissue Processing IndustryIOSR Journals
Abstract: A study was made to establish a site for the tissue manufacturing industry. The industry is proposed to
be located in the Northern part of Nigeria. It will be situated on a 615,204 square meters area, which is to
be acquired prior to erection of building and other infrastructure. The major raw materials include
obsolete/waste paper, carton and chipboards. The types, of machines to be used are pulper machines,
chester machine, tissue recycling machine, culling machine and slicing machine. The in i t i a l capital outlay
for the plant is N75 million for a start. The product will generate a total revenue over a period of three years
of N97 mill io n with a net fixed asset of N54.S million. Thus, the project is feasible even at an annual discount
of 10%.
An Efficient implementation of PKI architecture based Digital Signature using...IOSR Journals
Abstract: Digital Signature technique is widely being used to detect unauthorized modification to data and to
authenticate the identity of the signatory. It is essential for secure transaction over unsecure/ open networks.
Digital Signature schemes are mostly used in cryptographic protocols to provide services like entity
authentication, authenticated key transport and key agreement. The PKI (Public Key Infrastructure) based
digital signature architecture is related with RSA algorithm and secure Hash functions (MD5 &, SHA variants).
RSA digital signature algorithm is an asymmetric cryptographic method whose security is associated with
difficulty of factorization and hash function is applied to the message to yields a fixed-size message digest. This
paper explores the PKI architecture based digital signature and presents an efficient way of its implementation
and discusses various issues associated with signature schemes based upon RSA and hash functions. The results
show that signing and verification are much faster in the developed application.
Keywords: Digital Signature, MD5, RSA, SHA1, SHA2
“Influence of Behavioral Biases on Cognitive Abilities”IOSR Journals
The study aimed toanalyzethe role of individual’s level of cognitive abilities in making financial decisions and whether these abilities are affected by their behavioral biases. Cognitive reflection test (Fredrick, 2005) was used to investigate that whether behavioral biases that play major role in financial decisions are relatedwith cognitive abilities. The research found that individuals who scored high on CRT are less likely to overconfidence, conjunction fallacy and conservatism biases. The research also related CRT with subjects such as time preferences and risk preferences and found that high score group are more patient and more risk seeker in domain of gain and less risk seeker in domain of losses. However behavioral biases are lower for people having higher cognitive abilities but they are still present in financial decisions
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...IOSR Journals
Abstract: Due to higher processing power to cost ratio, it is now possible to replace the manual detection methods used in the IC (Integrated Circuit) industry by Image-processing based automated methods, to detect a broken pin of an IC connected on a PCB during manufacturing, which will make the process faster, easier and cheaper. In this paper an accurate and fast automatic detection method is used where the top view camera shots of PCBs are processed using advanced methods of 2-dimensional discrete wavelet pre-processing before applying edge-detection. Comparison with conventional edge detection methods such as Sobel, Prewitt and Canny edge detection without 2-D DWT is also performed. Keywords :2-dimensional wavelets, Edge detection, Machine vision, Image processing, Canny.
Determination of nonlinear absorption (β) and refraction (n2)by the Z-scan me...IOSR Journals
Potassium Pentaborate nonlinear optical (NLO) material was synthesized by the solution growth method. The grown crystals were subjected to structural, optical and mechanical property studies. Crystal with excellent transparency were grown with maximum size of 9mm×8mm×5mm and the grown crystals were characterized by single crystal Single crystal XRD, FT-IR, TGA-DTA&DSC, and UV–vis-NIR studies. The crystal belongs to orthorhombic with a space group of mm2 having unit-cell dimensions a = 11.068Åb= 11.175Å c = 9.058Åand α = 90°; β = 90°; and γ =90°; Z=4, at 298(2) K. The second-order nonlinear optical property of the polycrystalline sample has been confirmed by Kurtz-Perry powder SHG analysis. Third order nonlinear optical properties were also studied by Z-scan techniques. Nonlinear absorption and nonlinear refractive index were found out and the third order bulk susceptibility of compound was also calculated.
A Survey of Agent Based Pre-Processing and Knowledge RetrievalIOSR Journals
Abstract: Information retrieval is the major task in present scenario as quantum of data is increasing with a
tremendous speed. So, to manage & mine knowledge for different users as per their interest, is the goal of every
organization whether it is related to grid computing, business intelligence, distributed databases or any other.
To achieve this goal of extracting quality information from large databases, software agents have proved to be
a strong pillar. Over the decades, researchers have implemented the concept of multi agents to get the process
of data mining done by focusing on its various steps. Among which data pre-processing is found to be the most
sensitive and crucial step as the quality of knowledge to be retrieved is totally dependent on the quality of raw
data. Many methods or tools are available to pre-process the data in an automated fashion using intelligent
(self learning) mobile agents effectively in distributed as well as centralized databases but various quality
factors are still to get attention to improve the retrieved knowledge quality. This article will provide a review of
the integration of these two emerging fields of software agents and knowledge retrieval process with the focus
on data pre-processing step.
Keywords: Data Mining, Multi Agents, Mobile Agents, Preprocessing, Software Agents
A Study on Mid-Career Blues with refers to Hyundai Motor India Limited, Irung...IOSR Journals
This research paper was attempted to determine the human resource management which focused on
all issues related to „people‟ in the organization. They are undoubtedly the most important assets. Therefore the
special care must be exercised for managing them. Human resource management is concerned with activities
involved in acquisition, development, motivation and maintenance of people. These are the important to achieve
the organizational goals. The aim of this research was to examine the blue formation in HMIL. The significance
of this research intended to help HMIL to know about the employee career prospects & also analyze this factor
which influence the organization productivity.100 samples were collected from employees (Middle level
employee) of different departments [such as “HR – Recruitment, Industrial & Employee Relation, Training &
Development”, “Body Shop”, “Paint Shop” & “Press”] in HMIL.
“An analytical study on medal tally of top ten countries in 2012 Olympic Game...IOSR Journals
The origin of the ancient Olympic Games is lost the midst of pre-history, but for many centuries they
were only a festival of the Greek people. The Games were first held in honour of the Greek God, Zeus in 776
BC in the plain of kingdom of Elis, nestled in lush valley between the Alpheus River and Mount Kronion, 15
km from the Ionian Sea. The Olympiad celebrated that year was considered as the first and was used to date
subsequent historic events.
12022, 929 AM Originality Reporthttpsucumberlands.blBenitoSumpter862
1/20/22, 9:29 AM Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=a17e712f-fe4f-437d-b00e-ba5879e7983f&course_id=_… 1/3
%51
%11
SafeAssign Originality Report
Spring 2022 - Operations Security (ISOL-631-A01) - First Bi-Term •
%62Total Score: High risk
Total Number of Reports
1
Highest Match
62 %
DepartmentOfDeforcef.docx
Average Match
62 %
Submitted on
01/19/22
02:05 PM CST
Average Word Count
500
Highest: DepartmentOfDeforcef.docx
%62Attachment 1
Institutional database (6)
Student paper Student paper Student paper
Student paper Student paper Student paper
Internet (2)
jissec rand
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 500
DepartmentOfDeforcef.docx
2 3 7
6 4 1
5 8
2 Student paper 3 Student paper 7 Student paper
4
S
Introduction
The business considerations to the security policy frameworks include data integrity, data availability, and physical security (Drezner et al.,2020). Data integrity
enhances the protection of sensitive data whose purpose is to avoid unauthorized access by people who violate compliance with data security laws and hinder the
firm's productivity. The active directory and the group's policy can be implemented and arranged in a manner that only the users who are mandated with the execu-
tion of duties in the system are allowed to access the system (Anton et al., 2019). Secondly is the data availability, which ensures that the data is made available to an
authorized individual with minor obstacles. This can be enhanced through the availability of backup servers, backup routers, battery power backups, regular data
backup, and update of the regular system (Anton et al., 2019). The update of the regular system is meant to limit the downtimes and swiftness of the data networks.
Thirdly, physical security deals with enhancing the safety of the assets to avoid the loss of personal devices that store sensitive information of the organization.
Physical security can be implemented by creating a secured room that will offer protection to the information technology devices that carry sensitive information
(Herath et al., 2009). DOD frameworks Business considerations.
Network segmentation The network should be designed so that only weapon-related activities are allowed.
Continuous monitoring framework A framework of 24/7 monitoring and a protocol of swift notification of unusual activities should be created.
Visibility framework Establish a high level of visibility that will extend to weapon systems, thus restricting the hacking of the unguarded weapon.
Rationale Due to the sophistication of the modern cyber-attacks, which have been growing on a daily basis, there has been no feasibility of past responses to the cyber
threat. The department of defense experienced a great number of appealing target, and thus enforcement of standards above the threats needs to be considere ...
12022, 929 AM Originality Reporthttpsucumberlands.blCicelyBourqueju
1/20/22, 9:29 AM Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=a17e712f-fe4f-437d-b00e-ba5879e7983f&course_id=_… 1/3
%51
%11
SafeAssign Originality Report
Spring 2022 - Operations Security (ISOL-631-A01) - First Bi-Term •
%62Total Score: High risk
Total Number of Reports
1
Highest Match
62 %
DepartmentOfDeforcef.docx
Average Match
62 %
Submitted on
01/19/22
02:05 PM CST
Average Word Count
500
Highest: DepartmentOfDeforcef.docx
%62Attachment 1
Institutional database (6)
Student paper Student paper Student paper
Student paper Student paper Student paper
Internet (2)
jissec rand
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 500
DepartmentOfDeforcef.docx
2 3 7
6 4 1
5 8
2 Student paper 3 Student paper 7 Student paper
4
S
Introduction
The business considerations to the security policy frameworks include data integrity, data availability, and physical security (Drezner et al.,2020). Data integrity
enhances the protection of sensitive data whose purpose is to avoid unauthorized access by people who violate compliance with data security laws and hinder the
firm's productivity. The active directory and the group's policy can be implemented and arranged in a manner that only the users who are mandated with the execu-
tion of duties in the system are allowed to access the system (Anton et al., 2019). Secondly is the data availability, which ensures that the data is made available to an
authorized individual with minor obstacles. This can be enhanced through the availability of backup servers, backup routers, battery power backups, regular data
backup, and update of the regular system (Anton et al., 2019). The update of the regular system is meant to limit the downtimes and swiftness of the data networks.
Thirdly, physical security deals with enhancing the safety of the assets to avoid the loss of personal devices that store sensitive information of the organization.
Physical security can be implemented by creating a secured room that will offer protection to the information technology devices that carry sensitive information
(Herath et al., 2009). DOD frameworks Business considerations.
Network segmentation The network should be designed so that only weapon-related activities are allowed.
Continuous monitoring framework A framework of 24/7 monitoring and a protocol of swift notification of unusual activities should be created.
Visibility framework Establish a high level of visibility that will extend to weapon systems, thus restricting the hacking of the unguarded weapon.
Rationale Due to the sophistication of the modern cyber-attacks, which have been growing on a daily basis, there has been no feasibility of past responses to the cyber
threat. The department of defense experienced a great number of appealing target, and thus enforcement of standards above the threats needs to be considere ...
Electronic Healthcare Record Security and Management in Healthcare Organizationsijtsrd
"This study aim sat identifying the current countermeasures used in protecting the Electronic Healthcare Record and how employees share their knowledge about the existence Electronic Healthcare Record security as well as countermeasures used in mitigating the threats and data breaches in healthcare organizations. A case study of Aminu Kano Teaching Hospital, Nigeria was used and qualitative research method was adopted where purposive and stratified random sampling was used. This led to construction of eleven relevant questions to four categories of staff. A conceptual frame work was proposed to quid the study and the findings we reevaluated using the proposed frame work. There sults revealed that there is lack of knowledge sharing among employees and some factors were found to be the resistance factors, this include educational background, behavior, low security awareness, personality differences and lack of management commitment. On the other hand, deterrent, preventive and organizational actions were partially practiced as countermeasures used to mitigate the threats and vulnerability of data breaches of Electronic Healthcare Records in Aminu Kano Teaching Hospital in Nigeria. Attahiru Saminu, CLN ""Electronic Healthcare Record Security and Management in Healthcare Organizations"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | International Conference on Advanced Engineering and Information Technology , November 2018, URL: https://www.ijtsrd.com/papers/ijtsrd19124.pdf
Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/19124/electronic-healthcare-record-security-and-management-in-healthcare-organizations/attahiru-saminu-cln"
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...AI Publications
In the current digital landscape, cybercriminals continually evolve their techniques to execute successful attacks on businesses, thus posing a great challenge to information technology (IT) professionals. While traditional cybersecurity approaches like layered defense and reactive security have helped IT professionals cope with traditional threats, they are ineffective in dealing with evolving cyberattacks. This paper focuses on the need for a proactive cybersecurity culture among IT professionals to enable them combat evolving threats. The paper emphasis that building a proactive security approach and culture can help among IT professionals anticipate, identify, and mitigate latent threats prior to them exploiting existing vulnerabilities. This paper also points out that as IT professionals use reactive security when dealing with traditional attacks, they can use it collaboratively with proactive security to effectively protect their networks, data, and systems and avoid heavy costs of dealing with cyberattack’s aftermaths and business recovery.
Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2 GreensProduct 37 Red4 GreenProduct 45 Red5 GreenProduct 54 Red4.5 Green
8/2/2019 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?course_id=_109247_1&includeDeleted=true&attem… 1/2
SafeAssign Originality Report
Summer 2019 - Cloud Computing (ITS-532-06) - Second Bi-Term • Week 5 - Assignment • Submitted on Fri, Aug 02, 2019, 8:55 AM
Sai Kumar Baruri View Report Summary
View Originality Report - Old Design
INCLUDED SOURCES
Sources
Institutional database (8) %92
Student paper
Student paper
Student paper
Student paper
Student paper
Student paper
Student paper
Student paper
Top sources
Attachment 1
Week_5_Assignment_Microseg…
%92
4
8
1
5
7
6
2
3
Running head: MICROSEGMENTATION AND ZERO TRUST SECURITY 1
MICROSEGMENTATION AND ZERO TRUST SECURITY 2
Microsegmentation and Zero Trust Security
Week 5 - Assignment
by Sai Kumar Baruri
Professor D. Barrett
University of Cumberland’s
ITS 532 - 06
08/02/2019
Microsegmentation and Zero Trust Security
Introduction
The 21st century is much characterized by increased technology, access to the internet and the adoption of
information systems. Due to the adoption of technologies, there is an increase in the realization of the
benefits that come with IT value. However, technological advancements have negatively affected society
and brought about security threats. This has resulted in the implementation of security mechanisms
that enhance the security of IT assets. Such mechanisms include physical network segmentation, micro-
segmentation and zero-trust security. Physical network segmentation
The physical network segmentation in the cloud includes the segmentation of IT components that are
based on the logic outlines the endpoints to be on each network. The physical network segmentation seeks
to group some of the logical components into specific groups according to their functions and in turn,
access, the privileges assigned (Mammela et al., 2016). The physical network segmentation concerning
cloud computing implies the logical division of the network into minor segments that share the same
access permissions and characteristics. For instance, the cloud computing network is physically segmented
as a private cloud computing. Micro-segmentation
The micro-segmentation comprises of security-enhancing technology that is used in breaking down a given
data Centre which is a cloud-based into logical elements. This facilitates s the implementation of high-level
information technology security policies on the logical elements to aid in their control (Baum & Chang,
2014). The micro-segmentation in cloud computing seeks to break down the applications and the
various network segments into workloads. This implies that the communication and access of applications
are restricted according to the IT policies definition to build on security. Moreover.
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesJohn Macasio
The schools recognize the importance of computer and Internet to support 21st century skills building. We find the Department of Education in the Philippines investing on computer and Internet in the elementary schools. But at the side we find educators commenting on the downside of technology use on the child safety and morals. The education leaders and teachers need not re-invent the wheel to define competency standards on cyber safety, ethics and security.
A Bring Your Own Device Risk Assessment ModelCSCJournals
Bring Your Own Device (BYOD), a technology where individuals or employees use their own devices on the organization’s network to perform tasks assigned to them by the organization has been widely embraced. The reasons for adoption are diverse in every organization. In spite of the security control strategies implemented by these organizations to safeguard their information resources, there has been an upsurge in information security breaches as a result of existing vulnerabilities in these systems and the legacy systems in use. Various approaches have been employed to deal with security challenges in BYOD, but according to literature, risk assessment has proved to be the first key step towards improving security of the BYOD environment in an enterprise. Risk assessment models have been proposed by various researchers, although, most are largely influenced by the degree of technological advancement and utilization as well as the working cultures within institutions. The existing models were largely developed in technologically advanced countries and thus do not fit well in developing countries. This study sought to develop flexible BYOD risk assessment model that can be adopted by varied institutions to secure their information resources. The study was carried out in Five (5) purposively selected state universities in Kenya. The research adopted a mixed research design approach with mixed sampling technique utilized to select the participants. Reliability and validity of data collection tools were evaluated and recommended by IT security and network experts. The qualitative and quantitative data was collected by interviewing experts and administering a questionnaire to sampled participants. The developed model was validated both statistically and by experts. The findings revealed that threats and vulnerabilities contributed to 39.9% and 69.2% respectively to the risk of the BYOD environment while Data Encryption (DE) and Software Updates (SU) came out strongly as intervening variables which have a major impact on the relationship between the dependent and independent variables.
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
Increasingly, all kinds of organizations and institutions are adopting the E-business model to conduct their
activities and provide E-Services for their customers. In the process, whether they know it or not, those
organizations are also opening themselves up to the risk of information security breaches. Therefore
protecting an organization’s ICT infrastructure, IT systems, and Data is a vital issue that is often
underestimated. Research has shown that one of the most significant threats to information security comes
not from external attack but rather from the system's users, because they are familiar with the
infrastructure and have access to its resources, but may be unaware of the risks. Moreover, using only
technological solutions to protect an organization’s assets is not enough; there is a need to consider the
human factor by raising users’ security awareness. Our contribution to this problem is to propose an
Information Security Awareness Program that aims at raising and maintaining the level of users’ security
awareness. This paper puts forward a general model for an information security awareness program and
describes how it could be incorporated into an organization’s website through the process of development
life cycle.
In the era of data-driven warfare, the integration of big data and machine learning (ML) techniques has
become paramount for enhancing defence capabilities. This research report delves into the applications of
big data and ML in the defence sector, exploring their potential to revolutionize intelligence gathering,
strategic decision-making, and operational efficiency. By leveraging vast amounts of data and advanced
algorithms, these technologies offer unprecedented opportunities for threat detection, predictive analysis,
and optimized resource allocation. However, their adoption also raises critical concerns regarding data
privacy, ethical implications, and the potential for misuse. This report aims to provide a comprehensive
understanding of the current state of big data and ML in defence, while examining the challenges and
ethical considerations that must be addressed to ensure responsible and effective implementation.
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
This is the most essential programme of the year around the dangers of cybercrime and how to manage safety within the most indispensable digital sphere & technology system. The reason is that, “Looking beyond Internet of Things (IoT) to Internet of Everything there is a potential market that is approximately $14.4 trillion and over 99% of physical devices are still unconnected.” ~Mo Dawson. Your participation give you golden access to a transcending Cyberspace picture, enhanced solution oriented capabilities as an ICT expert or practitioner, Telecommunications Corporates & Companies
Personnel, Aviation ICT Officials, Other Transportation controls network hubs, Business dealer in Cyberspace services provider or supplier, Academicians and researchers, Government Departments & Public service ICT systems Officials & staff, Students, general ICT security involvement and on top of that your enhanced multidimensional scope & prosperity out of this untapped gold mine is guaranteed.
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...CSCJournals
Most of the Jordanian universities’ inquiries systems, i.e. educational, financial, administrative, and research systems are accessible through their campus networks. As such, they are vulnerable to security breaches that may compromise confidential information and expose the universities to losses and other risks. At Jordanian universities, security is critical to the physical network, computer operating systems, and application programs and each area has its own set of security issues and risks. This paper presents a comparative study on the security systems at the Jordanian universities from the viewpoint of prevention and intrusion detection. Robustness testing techniques are used to assess the security and robustness of the universities’ online services. In this paper, the analysis concentrates on the distribution of vulnerability categories and identifies the mistakes that lead to a severe type of vulnerability. The distribution of vulnerabilities can be used to avoid security flaws and mistakes.
Multi-Dimensional Privacy Protection for Digital Collaborations.CSCJournals
In order to sustain privacy in digital collaborative environments a comprehensive multidimensional privacy protecting framework is required. Such information privacy solutions for collaborations must incorporate environmental factors and influences in order to provide a holistic information privacy solution. Our Technical, Legal, and Community Privacy Protecting (TLC-PP) framework addresses the problems associated with the multi-facetted notion of privacy. The three key components of the TLC-PP framework are merged together to provide complete solutions for collaborative environment stakeholders and users alike. The application of the TLC-PP framework provides a significant contribution to the delivery of a Privacy Augmented Collaborative Environment (PACE).
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Secured cloud support for global softwareijseajournal
This paper presents core problem solution to security of Global Software Development Requirement
Information. Currently the major issue deals with hacking of sensitive client information which may lead to
major financial as well as social loss. To avoid this system provides cloud security by encryption of data as
well as deployment of tool over the cloud will provide significant security to whole global content
management system. The core findings are presented in terms of how hacker hacks such systems and what
counter steps need to follow. Our algorithmic development provide random information storage at various
cloud nodes to secure our client requirement data files.
Similar to Recapitulating the development initiatives of a robust information security safeguard: RITSB-the proposed solution (20)
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Recapitulating the development initiatives of a robust information security safeguard: RITSB-the proposed solution
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 2 (Nov. - Dec. 2013), PP 30-34
www.iosrjournals.org
www.iosrjournals.org 30 | Page
Recapitulating the development initiatives of a robust information
security safeguard: RITSB-the proposed solution
Jahidul Arafat1
and Md. Ahsan Habib2
1
Researcher, HT Research and Consultancy, UK.
2
Department of Information and Communication Technology, Mawlana Bhashani Science and Technology
University, Bangladesh
Abstract: Most current information security systems performance vary with the nature of the filed its being
operating. With an increased emphasizes on the adoption of security tools and technologies, the anomalies and
intrusion are mostly said defined to be detected on system's algorithm, when most systems have well defined
mechanism for rapid reaction and identification of intrusions. However, despite this support for anomaly
detection, this is usually limited and often require a full recompilation of the system to deploy a comprehensive
framework of security governance, strategies and practices employing the policies in implementation.
As a result, the absence of a robust security framework securing both the education and corporate
resources has heightened the tension for a strategic information security solutions which might ends with cost,
complexities and cumbersome to develop. This paper thereby presents an alternative comprehensive system
namely RITS-B which accommodates both the nature of education and organizations without a need to for a
further modification. Implication of the proposed approach at real time depicts its suitability in the arena of
concern.
Keywords: Information Security, Governance, Strategies, Practices, Regional Cultures and Believes.
I. Introduction
Information technology security in higher education is the process of securing the higher education
environment without disrupting the openness, accessibility, academic and intellectual freedom which is at the
very heart of the higher education environment. It is one of the fundamental process towards the broader
security because the further processing steps depends of what types of security breaches has been occurred and
what strategies are in place to cope up with these. Despite the numerous functionality of security, IT security in
Higher education is still a subject of on-going investment and it cannot be conclusively stated that education
field is highly secured because of the application, technological and intrusion’s diversity. As a consequence, the
task of choosing the best method which will not only ensure mission critical level security to each bit of higher
education information but also not compromise with its core missions is still a difficult challenge.
1.1 Structure of the study
This paper is organized as follows: the literature review related to the basic idea on higher education
and corporate level IT security needs and various hard and soft aspects of security to secure their arena including
their advantages and disadvantages is detailed in section 2. The RITS-B approach is presented in section 3. The
quantitative survey results are provided in section 4 and finally section 5 shows some concluding remarks.
II. Literature Review
2.1 What if information security?
By far the most commonly used meaning for information security is the preservation of (Dark et al,
2006; Voloudakis & King, 2003; Ward & Hawkins, 2003):
a) Confidentiality or protection from unauthorized use or disclosure of information.
b) Integrity, ensuring data accuracy and completeness through protection from unauthorized, unanticipated, or
unintentional modification, and including authenticity.
c) Availability, making data available to the authorized users on a timely basis and when needed and
d) Scalability, scaling the belief of educational culture of one region from that of other regions and stimulate
institution’s interest to contribute in the field of information security concerns while preserving oaths and
mandates of learning and knowledge sharing.
Thus the study can, in turn, characterize each of these seven protection categories: confidentiality,
integrity, authenticity, scalability, non-repudiation, accountability, and availability-by levels of sensitivity: high
(serious injury to an institution), medium (serious injury), and low (minor injury).
2. Recapitulating the development initiatives of a robust information security safeguard: RITSB-the
www.iosrjournals.org 31 | Page
2.2 Hard and Soft Information security solutions
Several survey papers (Arabasz & Pirani, 2002; Kvavik & Voloudakis, 2003; Yanosky & Salaway, 2006)
cover the major Information Technology Security Approaches available in the literature. Most of the security
schemes can be roughly categorized into two approaches:
The Hard i.e. Technical Method
The Soft i.e. Non-Technical Method
Basically, the first approach explores the information security technologies used by the higher education
institutions. What tools have they chosen to install, to prevent harm to their information assets? The security
levels are then deduced from the boundary of these installed high functional tools. The usual tools that are
employed in hard methods include antivirus software, SSL for web transactions, centralized data backup,
network firewall, enterprise directory, VPN for remote access, intrusion detection and prevention tools,
encryption, content monitoring/filtering, electronic signature and shibboleth. The first approach fails to gain
total effectiveness in the higher education information security process due to the following reasons: (a) Money
matters when developing IT security strategies but much depends on how, when and where it is used, by whom
and with what level of effort and skill. (b) Integrating adopted technologies with current and future practices is
the lion’s share then just that of selecting it. (c) And peoples’ troubles in understanding the adopted technologies
(Yanosky & Salaway, 2006).
The strategies for the second approach exploit the importance of soft IT interventions (e.g.
organization, Cultural aspects, awareness program, training programs, policies, executive attention etc.) to
produce a secured campus environment around the educational institution and having the advantages such as: (a)
It is very simple in nature (b) It evaluates all the spatial properties of Information security. (c) Representation of
security pattern is much more effective and well structured than only technology based security processing. (d)
It gives dynamic and formalized solution to security concerns. (e) It is based on the belief that openness and
accessibility of higher education environment will not only be preserved but also be secured. The features of this
approach provide well organized security solution with some limitations on concerns and generalization because
of academic and departmental diversities.
2.3 Robust information security solution: rational to have
These hints are significant for higher education, where much information used for teaching and
research requires the highest level of integrity and availability but low level of confidentiality and for Muslim
nation flexible sense of scalability also need to be defined. And to ensure such level an institution have two
choices: either to follow the security approach (a) or (b) as mentioned in section I or go for the use of a blended
approach- balancing the features of (a) and (b) according to its academia’s believes, needs and constrains to
foster the institution’s security goal. Where this balancing scheme requires the exploration of the following
issues (Bellovin et al, 2006; Albrecht & Caruso, 2003; Pirani, Sheep Pond Associates, Voloudakis, Ernst &
Young, 2003):
1. Make IT security a priority.
2. Selecting security controls and products.
3. Defining and empowering acceptable behavior [by students, faculty, and staff].
4. Preserve the academia’s religion, regional and cultural believes.
5. Revise instructional security policy and improve the use of existing security tools.
6. Making consistent, timely, and cost-effective management decisions.
7. Improve security for further research and education networks.
8. Integrate work in higher education with national effort to strengthen critical infrastructure and
9. Empowering [members of the institution’s community to do their work] securely.
All these are the pledge of the education and organization to gain success in openness and privacy in the field of
information security.
III. Development initiatives of robust information security solution
To improve the security scheme, a strategy consists in combining these approaches in order to obtain a
robust security by exploiting the advantages of one method to overcome the limitations of the other one called
Robust IT Security Balancing (RITS-B) Approach is presented in this paper. This is an attempt to unify different
methods of higher education information security approaches under a common topology based on the both hard
and soft interventions with that of Muslim culture and believes. This RITS-B Approach considers all the soft
aspects of information security i.e. information security Policies, Awareness, Leadership and Practices for the
3. Recapitulating the development initiatives of a robust information security safeguard: RITSB-the
www.iosrjournals.org 32 | Page
user community on the acceptable use of technological tools to develop such strategic framework of security
environment where facts, national and religion perspectives will be merged up to lead to a proactive leadership
and information security system without violating the freedom and openness that is at the very heart of the
academia. In the RITS-B approach, soft security aspects are used not to describe which contents should they have
rather what should be the status of these in place security aspects and what characteristics should they bare for the
acceptable use of the existing security tools and technologies to the campus community and thereby to secure
their information arena.
3.1 The RITS-B : The Proposed Approach
The proposed RITS-B approach is detailed in Roadmap 1. It consists of nine (09) steps those were
grouped into three basic modules as discussed in section A, B and C to achieve the sustainability in the process
of higher education secrecy and security for Muslim nations. An institution is defined by its value criterion as
discussed above where its security challenges lies on its scope and scale- to assess the security concerns. The
heterogeneous and diverse nature of institution and academia fuel the further processing needs of security in the
domain of technology and generic soft interventions that is presented in section B and section C respectively. If
the institutions are in the need of security then put the above mentioned nine steps under the same umbrella of
secrecy where the institution’s cultures, believes and values shows the further light towards the journey on
robust security and sustainability in this complicated and insecure world environment.
Roadmap 01: Robust IT Security Balancing (RITS-B) Approach
Precondition: Institutions to be secured
Post condition: A more secured higher education environment
1. Define the institution’s information security scope
a. Develop a framework on fact and national perspective for campus security
b. Identify security policies, tools, procedure and practices
2. Defining IT Security Strategic Assessment Scale
a. Reactive
b. Technology Centric
c. Cultural
d. Fortified
3. Document the institution’s technological needs
a. Technology/Tools vary
i. with that of application and intrusions
ii. with that of institutions wants, needs and abilities
b. Main purpose: is to fulfill the requirements of (1) to (9) of section II
4. Model the Management System Information Security on campus
a. Based on: DI-AI methodology
b. Should follow the standards of NBR ISO/IEC-27001:2005
5. Model Information Security Organizational Structure
a. Formulate a centralized office
b. Decentralize it into ITPO and ITSO
c. Have some dedicated staffs
6. Development of security plans and policies
7. Communication and awareness
8. Model the pattern of institutional IT Security Practices
9. Implementation of security Easy to Use Scheme
IV. RITS-B implication at education and corporate level
In analyzing the security performance of the RITS-B approach, the responses of 6 senior university
administrators- the majority of whom were Chief IT Officer and other director of CICT (Centre of Information
and Communication Technology) /academic/administrative computing along with 66 academic personnel at 6
engineering institutions of Bangladesh were synthesized, from a June 2010 survey as reported in Information
Technology Security Management in Engineering Universities in Bangladesh by Jahidul Arafat, Lecturer,
Research Associate, HTRC, UK. The existing security trends of these institutions were queried by the respective
researcher and in the light of the findings the RITS-B approach is developed and later the surveyed institutions
were asked to implement this newly developed security scheme in their arena. The impact of the implementation
status of this RITS-B approach at those institutions were further analyzed against three survey questions to
4. Recapitulating the development initiatives of a robust information security safeguard: RITSB-the
www.iosrjournals.org 33 | Page
assess respondents’ opinions on the success of their IT security outcomes (Likert scale ranging from: 1=
strongly agree, 2= agree, 3= Disagree, and 4= Strongly Disagree):
How would you characterize your program success?
Are data, network, and applications that are your responsibility secure?
Is your institution more secure today than it was two years ago?
Table1. Impact of RITS-B’S implementation status over institution’s (both education and corporate
organization) IT security outcomes
Implementation
Status of RITS-B
Approach
IT Security Outcomes
Program is Successful Systems are
Secure
More Secure than 2 years ago
Fully Implemented WA - - -
S.Div. - - -
Partially
Implemented
WA 2.25 1.75 1.25
S.Div. 0.500 0.500 0.500
Didn’t Implement WA 3.50 3.00 2.50
S.Div. 0.707 0.000 0.707
Scale: 1(Strongly Agree) = SA, 2(Agree) = A, 3(Disagree) = D and 4(Strongly Disagree)= SD. N=6 (Institutions), WA=
Weighted Average. S.Div.= Standard Deviation.
Table 1 shows that institutions which implemented the proposed RITS-B approach in their arena either fully or
partially rate their IT security outcomes higher than those which didn’t. This thereby dictates the significance of
having this newly developed security model in the campus arena to gain robustness in the process of secrecy and
security without violating the freedom and openness.
V. Conclusion
The Soft IT Security (SITS) approach is a useful and important technique in higher education
information security. In spite of its excellent persona such as simplicity, effectiveness and incident supervision,
it is unable to achieve global optimum because of academic and departmental diversities. On the other hand, the
proposed Robust IT Security Balancing (RITSB) Approach considers the stages of Identification-Prioritization-
Revision-Dynamicity for an acceptable use of soft security issues over the hard interventions and on the end
user community while considering the academia’s diversities, believes and constraints. In the RITS-B approach,
the degree used for merging the hard and soft security concerns with that of the institution’s belief, culture and
constraints are derived dynamically based on similarity and value criterions of the regions and institutions. For
these reasons, the RITS-B Approach is able to present the institution’s security concerns from a holistic
position. The quantitative survey results show that the institutions which had implemented this proposed
security solution in their arena feeling more secure than two years ago. They also rated their system’s security
and program’s success much higher than that of others. This increases the application area of the SITS approach
where the robustness and dynamisms are needed.
References
[1]. Arabasz, P., & Pirani, J. (2002). Wireless networking in higher education, EDUCAUSE Center for Applied Research, Vol. 2,
Available from: http://www.educause.edu/ecar/> [accessed 11 June 2010].
[2]. Albrecht, B. & Caruso, J.B. (2003). Information Technology Security at Indiana University, Case Study, ECAR, No. 8.
[3]. Bellovin, S., Blaze, M., Brickell, E., Brooks, C., Cerf, V., Diffie, W., Landau, S., Peterson, J., & Treichler, J. (2006). Security
implications of applying the Communications Assistance to Law Enforcement Act to voice over IP.
[4]. Dark, M., Epstein, R., Morales, L., Countermine, T., Yuan, Q., Muhammed, Ali., Rose, M., & Harter, N. (2006). A Framework for
Information Security Ethics Education. 10th Colloquium for Information Systems Security Education- University of Maryland, 4, pp.
109-115.
[5]. Ellen E.C., & Luker M.A. (2000). Finding the Will and the Way: Preparing Your Campus for a Networked Future, EDUCAUSE
Leadership Strategies Series- San Francisco: Jossey-Bass Inc. Publishers, Vol. 1, pp. 85.
[6]. EDUCAUSE. (2006). CALEA (Communications Assistance for Law Enforcement Act), [online], Available
from:<http://www.educause.edu/Browse /645?PARENT_ID=698> [accessed 21 August 2010].
[7]. Fender, J. (2006, June 13). LSU beefs up computer security. Capitol News Bureau [online], Available
from:<http://www.2theadvocate.com/news/3040126.html> [accessed 21 June 2010].
[8]. Gray, T. (2005). Network Security Credo, [online], EDUCAUSE Quarterly Publication, 14(2), 12-14,
http://staff.washington.edu/gray
[9]. Executive Guide (1998). Information Security Management: Learning From Leading Organizations, GAO/AIMD-98-68, May.
[10]. Kvavik, R. B., & Voloudakis, J. (with Caruso, J. B., Katz, R. N., King, P., & Pirani, J. A.). (2003). Information technology security:
Governance, strategy, and practice in higher education, EDUCAUSE Center for Applied Research, Vol. 5, Available from:
<http://www.educause.edu/ecar>
[11]. Pirani, J.A., Sheep Pond Associates, Voloudakis, J., Ernst, C.G. & Young. (2003). Information Technology Security at MIT, Case
Study, ECAR, No. 9.
5. Recapitulating the development initiatives of a robust information security safeguard: RITSB-the
www.iosrjournals.org 34 | Page
[12]. Pirani, J.A., Sheep Pond Associates & ECAR. (2003). Incident response: Lesson Learned from Georgia Tech, the university of
Montana & University of Texan at Austin, Case Study, ECAR, No. 7.
[13]. Rivlin, A. (1995). Circular No. A-123. Washington, DC: U.S. Office of Management and Budget, [online], Available:
http://www.whitehouse.gov /OMB /circulars/a123/a123.html [21 August 2010].
[14]. Rezmierski, V. E., Rothschild, D. M., Kazanis, A. S., & Rivas, R. D. (2005). Final report of the computer incident factor analysis
and categorization (CIFAC) project, Vol. 2, Available from: <http://www.educause.edu/ ir/library/pdf/CSD4455.pdf> [accessed 21
August 2010].
[15]. Sieberg, D. (2005, September 26). Hackers shift focus to financial gain [online], Available from:
<http://www.cnn.com/2005/TECH/internet /09/26/identity.hacker/index.html> [accessed 21 August 2010].
[16]. Voloudakis, J. & King, P. (2003). Information Technology Security at the University of Washington, Case Study, ECAR, No. 10.
[17]. Visa Inc. (2004, December 15). Payment card industry data security standard [online], Available:
http://usa.visa.com/business/accepting_visa/ops_risk_management /cisp_merchants.html [21 August 2010].
[18]. Ward D., & Hawkins B.L. (2003). Presidential Leadership for Information Technology. EDUCASE Review, 38(3), 45.
[19]. Yanosky, R. & Salaway, G. (2006). Identity management in higher education: A baseline study, EDUCAUSE Center for Applied
Research, Vol. 2, Available from: http://www.educause.edu/ecar/