Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (3)
- Data Storage Systems (3)
- Digital Communications and Networking (3)
- Business (2)
- Business Intelligence (2)
-
- Communication (2)
- Communication Technology and New Media (2)
- Computer and Systems Architecture (2)
- E-Commerce (2)
- Information Literacy (2)
- Library and Information Science (2)
- Management Information Systems (2)
- Management Sciences and Quantitative Methods (2)
- Operational Research (2)
- Operations Research, Systems Engineering and Industrial Engineering (2)
- Science and Technology Studies (2)
- Social Media (2)
- Social and Behavioral Sciences (2)
- Technology and Innovation (2)
- Hardware Systems (1)
- Other Computer Engineering (1)
- Systems Science (1)
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Engineering
Bridging The Gap Between Public Organizaions And Cybersecurity, Christopher Boutros
Bridging The Gap Between Public Organizaions And Cybersecurity, Christopher Boutros
Electronic Theses, Projects, and Dissertations
Cyberattacks are a major problem for public organizations across the nation, and unfortunately for them, the frequency of these attacks is constantly growing. This project used a case study approach to explore the types of cybersecurity public organization agencies face and how those crimes can be mitigated. The goal of this paper is to understand how public organization agencies have prepared for cyberattacks and discuss additional suggestions to improve their current systems with the current research available This research provides an analysis of current cyber security systems, new technologies that can be implemented, roadblocks public agencies face before and during …
The Observation Of Smart Camera Security, Shun-Hsin Wang
The Observation Of Smart Camera Security, Shun-Hsin Wang
Electronic Theses, Projects, and Dissertations
At present, as the Internet of Thing (IoT) is increasingly widely used in human life, how to protect IoT devices from Malware attack has become an inevitable problem. This project is an analysis of two malwares and how they impact the Internet of Thing (IoT), especially the smart cameras common in people’s life and used in the enterprise. The analysis looks at the vulnerabilities of smart cameras and how Mirai malware and Persirai malware take advantage to these vulnerabilities to attack smart cameras within the network through the simulation process. Through the simulation, although both malwares were implemented using different …
The Soft Skills Business Demands Of The Chief Information Security Officer, Richard Smit, Jeroen Van Yperen Hagedoorn, Patric Versteeg, Pascal Ravesteijn
The Soft Skills Business Demands Of The Chief Information Security Officer, Richard Smit, Jeroen Van Yperen Hagedoorn, Patric Versteeg, Pascal Ravesteijn
Journal of International Technology and Information Management
While many researchers have investigated soft skills for different roles related to business, engineering, healthcare and others, the soft skills needed by the chief information security officer (CISO) in a leadership position are not studied in-depth. This paper describes a first study aimed at filling this gap.
In this multimethod research, both the business leaders perspective as well as an analysis of CISO job ads is studied. The methodology used to capture the business leaders perspective is via a Delphi study and the jobs adds are studied using a quantitative content analysis.
With an increasing threat to information security for …
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Journal of International Technology and Information Management
Information and Communications technologies (ICT) pervade society. The Internet, wireless communication, and social media are ubiquitous in and indispensable in society today. As they continue to grow and mushroom, there are new and increased calls from various segments of the society such as technologists, activists, sociologists, and legal experts, who issue warnings on the more nefarious and undesirable uses of ICTs, especially by governments. In fact, government control and surveillance using ICTs is not a new phenomenon. By looking at history, we are able to see several instances when ICTs have been used by governments to control, surveil, and infringe …