Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

Justification Of Investment In It Systems, Aidan Farrell Jun 2017

Justification Of Investment In It Systems, Aidan Farrell

The ITB Journal

For a company, capital investment of any sort is weighed up before a decision is made to invest. It is. true that the vast majority of investments for companies can be quantified financially. Investment in Iriformation Technology (IT) and Information Systems (IS) however has proved more complex than other investments as there are ·a large amount of intangible and non-financial benefits associated with this area of expenditure. Investments are traditionally rationalised by outweighing the costs and the benefits. The indirect costs associated with the deployment of IT/IS are equally difficult to put a measure on and hence the traditional methods …


Right Now Is The Wrong Time: And Other Considerations When Presenting Security Warnings, Brock Johanson, Bonnie Anderson Mar 2017

Right Now Is The Wrong Time: And Other Considerations When Presenting Security Warnings, Brock Johanson, Bonnie Anderson

Journal of Undergraduate Research

Neuro Information Security (NeuroIS) focuses on the use of neurological measurements to improve the security of information systems. The BYU NeuroIS lab uses neurological tools and measurements to examine factors that affect security outcomes. Previous work has focused on various factors such as dual task interference (DTI), threat assessment, as well as factors such as habituation and generalization, which have become focus streams of research. The primary point of failure in most security related incidents tends to be users themselves. As such, anything that can be used to overcome neurobiological phenomenon such as those listed above can ultimately lead in …


Mobile Hands: What Your Phone Use Says About You, Parker Williams, Jeff Jenkins Mar 2017

Mobile Hands: What Your Phone Use Says About You, Parker Williams, Jeff Jenkins

Journal of Undergraduate Research

The percentage of individuals using mobile phones to respond to online applications, forms, and surveys is predicted to rapidly increase in the future. As of June 2, 2015, there were an estimated 2.6 billion smartphones in use in the world; by 2020 there will be 6.1 billion smartphones in use. Smartphones will account for roughly 80% of all mobile driven data traffic by 2020 (Lunden, 2015). With the proliferation of smartphones, measuring the fidelity of information gathered from and about the user becomes extremely important. Smartphones are a rich source of behavioral and biometric information, gathering data about how the …


Implementation Of A Web-Based Service For Mobile Application Risk Assessment, Asim Si̇nan Yüksel, Mehmet Erkan Yüksel, Ahmet Sertbaş, Abdül Hali̇m Zai̇m Jan 2017

Implementation Of A Web-Based Service For Mobile Application Risk Assessment, Asim Si̇nan Yüksel, Mehmet Erkan Yüksel, Ahmet Sertbaş, Abdül Hali̇m Zai̇m

Turkish Journal of Electrical Engineering and Computer Sciences

The Android operating system has increased in popularity and has been increasing its shares in the smart phone market. Users can carry out their daily work such as paying bills, being social, and sharing photos through mobile applications. These applications have access to sensitive information about the user, such as location, contacts, call logs, and SMS messages. However, the users have no knowledge of the applications or the personal information these applications have access to. Even if an application is not malware or does not have malicious behavior, it can compromise the security and privacy of the user by accessing …