Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Information security (4)
- Computing (3)
- Research relevance (2)
- Academic research (1)
- Acquisition (1)
-
- Action research (1)
- Adaptive NF inference system (ANFIS) (1)
- Analytical Hierarchy Process (AHP) (1)
- And ad-hoc networks (1)
- Artificial neural network (1)
- Available Transfer Capacity (ATC) (1)
- California Security Breach Information Act (CSBIA) (1)
- Campus information security (1)
- Capability curve (1)
- Carrier-to-interference ratio (1)
- Classification (1)
- College students (1)
- Common body of knowledge (1)
- Compliance Toolkit (1)
- Computational learning theory (1)
- Computer Crime Act 1997 (1)
- Computer Memory (1)
- Computer crime (1)
- Computer ethics (1)
- Computer forensics (1)
- Computer hacking (1)
- Computer science students (1)
- Computer security (1)
- Confidential information (1)
- Counterexamples (1)
Articles 1 - 30 of 66
Full-Text Articles in Physical Sciences and Mathematics
Learning Languages From Positive Data And A Limited Number Of Short Counterexamples, Sanjay Jain, Efim Kinber
Learning Languages From Positive Data And A Limited Number Of Short Counterexamples, Sanjay Jain, Efim Kinber
School of Computer Science & Engineering Faculty Publications
We consider two variants of a model for learning languages in the limit from positive data and a limited number of short negative counterexamples (counterexamples are considered to be short if they are smaller than the largest element of input seen so far). Negative counterexamples to a conjecture are examples which belong to the conjectured language but do not belong to the input language. Within this framework, we explore how/when learners using n short (arbitrary) negative counterexamples can be simulated (or simulate) using least short counterexamples or just ‘no’ answers from a teacher. We also study how a limited number …
Learning Multiple Languages In Groups, Sanjay Jain, Efim Kinber
Learning Multiple Languages In Groups, Sanjay Jain, Efim Kinber
School of Computer Science & Engineering Faculty Publications
We consider a variant of Gold’s learning paradigm where a learner receives as input different languages (in the form of one text where all input languages are interleaved). Our goal is to explore the situation when a more “coarse” classification of input languages is possible, whereas more refined classification is not. More specifically, we answer the following question: under which conditions, a learner, being fed different languages, can produce grammars covering all input languages, but cannot produce grammars covering input languages for any . We also consider a variant of this task, where each of the output grammars may not …
Entrepreneurial Opportunities And Market Analysis Of The Information Technology And Software Development Sector Of Pakistan, Toshio Fujita, Hassan Tajuddin
Entrepreneurial Opportunities And Market Analysis Of The Information Technology And Software Development Sector Of Pakistan, Toshio Fujita, Hassan Tajuddin
Business Review
This study investigates the Information Technology and the Software Development sector of Pakistan. It discusses the reasons for the lack of trust in Pakistani IT companies and different problems faced by an entrepreneur starting an IT company in Pakistan. The data was analyzed by qualitative content analysis. The findings are discussed with reference to previous research, and implications for entrepreneurial setups are noted.
Developing On-Line Collaborative Research Across International Boundaries: Exploring The Potential Of New Technologies, Pat Jefferies, Frances Grodzinsky
Developing On-Line Collaborative Research Across International Boundaries: Exploring The Potential Of New Technologies, Pat Jefferies, Frances Grodzinsky
School of Computer Science & Engineering Faculty Publications
The development of on-line research practice across international boundaries is now a viable proposition using available asynchronous technologies such as computer conferencing. As has been reported in previous papers (Grodzinsky, et al, 2002; Griffin, et al, 2002) such use has proved to be extremely valuable for supporting the teaching of computing and ethics. However, asynchronous computer conferencing not only offers new opportunities for teaching and for supporting students, it also offers a valuable resource to researchers. Taking advantage of such opportunity must, of course, address a number of issues. Prime amongst these are concerns as to how to overcome the …
Book Review: No Place To Hide, Gary C. Kessler
Book Review: No Place To Hide, Gary C. Kessler
Journal of Digital Forensics, Security and Law
This issue presents the second Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).
Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki J. Lee, Il-Yeol Song
Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki J. Lee, Il-Yeol Song
Journal of Digital Forensics, Security and Law
Current approaches of phishing filters depend on classifying messages based on textually discernable features such as IP-based URLs or domain names as those features that can be easily extracted from a given phishing message. However, in the same sense, those easily perceptible features can be easily manipulated by sophisticated phishers. Therefore, it is important that universal patterns of phishing messages should be identified for feature extraction to serve as a basis for text classification. In this paper, we demonstrate that user perception regarding phishing message can be identified in central and peripheral routes of information processing. We also present a …
Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth
Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth
Journal of Digital Forensics, Security and Law
When considering the legal implications of monitoring and surveillance in the workplace, the question may be asked why companies deploy computer surveillance and monitoring in the first place. Several reasons may be put forward to justify why more than 80% of all major American firms monitor employee e-mails and Internet usage. However, what most companies forget is the fact that the absence or presence of monitoring and surveillance activities in a company holds serious legal consequences for companies. From the discussion in this paper it will become apparent that there is a vast difference in how most countries approach this …
The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney
The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney
Journal of Digital Forensics, Security and Law
Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which …
Information Technology Act 2000 In India - Authentication Of E-Documents, R. G. Pawar, B. S. Sawant, A. Kaiwade
Information Technology Act 2000 In India - Authentication Of E-Documents, R. G. Pawar, B. S. Sawant, A. Kaiwade
Journal of Digital Forensics, Security and Law
The Information Technology Act 2000 has enacted in India on 9th June 2000. This Act has mentioned provision of authentication of electronic document. It is the need of hour at that time that such provision is needed in the Indian Law system, especially for electronic commerce and electronic governance. Electronic commerce”, which involve the use of alternatives to paper based methods of communication and storage information. To do electronic commerce there should be authentication of particular document. The working of internet is the documents are traveling in terms of bits from one destination to other destination, through various media like …
The Common Body Of Knowledge: A Framework To Promote Relevant Information Security Research, Kenneth J. Knapp, F. N. Ford, Thomas E. Marshall, R. K. Rainer
The Common Body Of Knowledge: A Framework To Promote Relevant Information Security Research, Kenneth J. Knapp, F. N. Ford, Thomas E. Marshall, R. K. Rainer
Journal of Digital Forensics, Security and Law
This study proposes using an established common body of knowledge (CBK) as one means of organizing information security literature. Consistent with calls for more relevant information systems (IS) research, this industrydeveloped framework can motivate future research towards topics that are important to the security practitioner. In this review, forty-eight articles from ten IS journals from 1995 to 2004 are selected and cross-referenced to the ten domains of the information security CBK. Further, we distinguish articles as empirical research, frameworks, or tutorials. Generally, this study identified a need for additional empirical research in every CBK domain including topics related to legal …
An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros
An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros
Journal of Digital Forensics, Security and Law
The interaction between disjunctive interpersonal relationships, those where the parties to the relationship disagree on the goals of the relationship, and the use of computer mediated communications channels is a relatively unexplored domain. Bargh (2002) suggests that CMC channels can amplify the development of interpersonal relationships, and notes that the effect is not constant across communications activities. This proposal suggests a line of research that explores the interaction between computer mediated communications (CMC) and stalking, which is a common form of disjunctive relationships. Field data from cyberstalking cases will be used to look at the effects of CMC channels on …
Making Molehills Out Of Mountains: Bringing Security Research To The Classroom, Richard G. Taylor
Making Molehills Out Of Mountains: Bringing Security Research To The Classroom, Richard G. Taylor
Journal of Digital Forensics, Security and Law
Security research published in academic journals rarely finds its way to the business community or into the classroom. Even though the research is of high quality, it is written in a manner that is difficult to read and to understand. This paper argues that one way to get this academic research into the business community is to incorporate it into security classrooms. To do so, however, academic articles need to be adapted into a classroom-friendly format. This paper suggests ways to do this and provides an example of an academic article that was adapted for use in a security management …
Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam
Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam
Journal of Digital Forensics, Security and Law
Rapid development of information technology (IT) has brought with it many new applications such as e-commerce and global business. The past few years have seen activities in the legislative arena covering issues such as digital signatures, the international recognition of electronic documents and privacy and data protection. Both the developed and developing countries have exhibited keenness to embrace the IT environment. Securing this electronic environment from intrusion, however, continues to be problematic. A particular favorite form of computer crime would be ‘hacking’. As more computer systems move on to on-line processing and improved telecommunications, computer hackers are now a real …
Providing A Foundation For Analysis Of Volatile Data Stores, Timothy Vidas
Providing A Foundation For Analysis Of Volatile Data Stores, Timothy Vidas
Journal of Digital Forensics, Security and Law
Current threats against typical computer systems demonstrate a need for forensic analysis of memory-resident data in addition to the conventional static analysis common today. Certain attacks and types of malware exist solely in memory and leave little or no evidentiary information on nonvolatile stores such as a hard disk drive. The desire to preserve system state at the time of response may even warrant memory acquisition independent of perceived threats and the ability to analyze the acquired duplicate.
Tools capable of duplicating various types of volatile data stores are becoming widely available. Once the data store has been duplicated, current …
Education Organization Baseline Control Protection And Trusted Level Security, Wasim A. Al-Hamdani
Education Organization Baseline Control Protection And Trusted Level Security, Wasim A. Al-Hamdani
Journal of Digital Forensics, Security and Law
Many education organizations have adopted for security the enterprise best practices for implementation on their campuses, while others focus on ISO Standard (or/and) the National Institution of Standards and Technology.
All these adoptions are dependent on IT personal and their experiences or knowledge of the standard. On top of this is the size of the education organizations. The larger the population in an education organization, the more the problem of information and security become very clear. Thus, they have been obliged to comply with information security issues and adopt the national or international standard. The case is quite different when …
Securitycom: A Multi-Player Game For Researching And Teaching Information Security Teams, Douglas P. Twitchell
Securitycom: A Multi-Player Game For Researching And Teaching Information Security Teams, Douglas P. Twitchell
Journal of Digital Forensics, Security and Law
A major portion of government and business organizations’ attempts to counteract information security threats is teams of security personnel. These teams often consist of personnel of diverse backgrounds in specific specialties such as network administration, application development, and business administration, resulting in possible conflicts between security, functionality, and availability. This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game. It will be used to study how information security teams work together to defend against attacks using a multi-player game, and to study …
Information Governance: A Model For Security In Medical Practice, Patricia A. Williams
Information Governance: A Model For Security In Medical Practice, Patricia A. Williams
Journal of Digital Forensics, Security and Law
Information governance is becoming an important aspect of organisational accountability. In consideration that information is an integral asset of most organisations, the protection of this asset will increasingly rely on organisational capabilities in security. In the medical arena this information is primarily sensitive patient-based information. Previous research has shown that application of security measures is a low priority for primary care medical practice and that awareness of the risks are seriously underestimated. Consequently, information security governance will be a key issue for medical practice in the future. Information security governance is a relatively new term and there is little existing …
The Design And Implementation Of An Automated Security Compliance Toolkit: A Pedagogical Exercise, Guillermo Francia, Brian Estes, Rahjima Francia, Vu Nguyen, Alex Scroggins
The Design And Implementation Of An Automated Security Compliance Toolkit: A Pedagogical Exercise, Guillermo Francia, Brian Estes, Rahjima Francia, Vu Nguyen, Alex Scroggins
Journal of Digital Forensics, Security and Law
The demand, through government regulations, for the preservation of the security, integrity, and privacy of corporate and customer information is increasing at an unprecedented pace. Government and private entities struggle to comply with these regulations through various means—both automated and manual controls. This paper presents an automated security compliance toolkit that is designed and developed using mostly open source tools to demonstrate that 1) meeting regulatory compliance does not need to be a very expensive proposition and 2) an undertaking of this magnitude could be served as a pedagogical exercise for students in the areas of collaboration, project management, software …