• Title/Summary/Keyword: Comprehensive Security

Search Result 441, Processing Time 0.022 seconds

Network Traffic Classification Based on Deep Learning

  • Li, Junwei;Pan, Zhisong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4246-4267
    • /
    • 2020
  • As the network goes deep into all aspects of people's lives, the number and the complexity of network traffic is increasing, and traffic classification becomes more and more important. How to classify them effectively is an important prerequisite for network management and planning, and ensuring network security. With the continuous development of deep learning, more and more traffic classification begins to use it as the main method, which achieves better results than traditional classification methods. In this paper, we provide a comprehensive review of network traffic classification based on deep learning. Firstly, we introduce the research background and progress of network traffic classification. Then, we summarize and compare traffic classification based on deep learning such as stack autoencoder, one-dimensional convolution neural network, two-dimensional convolution neural network, three-dimensional convolution neural network, long short-term memory network and Deep Belief Networks. In addition, we compare traffic classification based on deep learning with other methods such as based on port number, deep packets detection and machine learning. Finally, the future research directions of network traffic classification based on deep learning are prospected.

Safe clinical photography: best practice guidelines for risk management and mitigation

  • Chandawarkar, Rajiv;Nadkarni, Prakash
    • Archives of Plastic Surgery
    • /
    • v.48 no.3
    • /
    • pp.295-304
    • /
    • 2021
  • Clinical photography is an essential component of patient care in plastic surgery. The use of unsecured smartphone cameras, digital cameras, social media, instant messaging, and commercially available cloud-based storage devices threatens patients' data safety. This paper Identifies potential risks of clinical photography and heightens awareness of safe clinical photography. Specifically, we evaluated existing risk-mitigation strategies globally, comparing them to industry standards in similar settings, and formulated a framework for developing a risk-mitigation plan for avoiding data breaches by identifying the safest methods of picture taking, transfer to storage, retrieval, and use, both within and outside the organization. Since threats evolve constantly, the framework must evolve too. Based on a literature search of both PubMed and the web (via Google) with key phrases and child terms (for PubMed), the risks and consequences of data breaches in individual processes in clinical photography are identified. Current clinical-photography practices are described. Lastly, we evaluate current risk mitigation strategies for clinical photography by examining guidelines from professional organizations, governmental agencies, and non-healthcare industries. Combining lessons learned from the steps above into a comprehensive framework that could contribute to national/international guidelines on safe clinical photography, we provide recommendations for best practice guidelines. It is imperative that best practice guidelines for the simple, safe, and secure capture, transfer, storage, and retrieval of clinical photographs be co-developed through cooperative efforts between providers, hospital administrators, clinical informaticians, IT governance structures, and national professional organizations. This would significantly safeguard patient data security and provide the privacy that patients deserve and expect.

The Exploratory Study on the Impact of the Professional Contingent Workers on Team Members' Acceptance and Creative Team Performance (전문직 비정규직이 팀 내 수용 및 창의적 팀 성과에 미치는 영향에 관한 탐색적 연구: 경계 없는 비정규직과 과도기적 비정규직을 중심으로)

  • Chae, Hee-Sun;Park, Ji-Sung
    • Asia-Pacific Journal of Business
    • /
    • v.11 no.2
    • /
    • pp.145-158
    • /
    • 2020
  • Purpose - To understand the growing interests in the professional temporary workforce, this study aimed to examine the different types of professional temporary workers and their different effects on creative performance. Design/methodology/approach - By sub-classifying professional temporary workers as boundaryless workers and transitional workers, this study developed propositions to provide comprehensive framework for directing meaningful topics for future research on professional temporary workers. Findings - This study suggested that two types of professional temporary workers may differ significantly in terms of their work efforts for getting approval or acceptance from the team members and for achieving creative contributions in teams. Specifically, drawing on expectance theory, social identity theory and resource-based theory, this study discussed the relationship between acceptance(task-oriented vs. relational-oriented acceptance), employment duration(short-term status vs. long-term status), contract security(volition being temporary worker) and creative performance for boundaryless workers versus transitional workers. Research implications or Originality - This study have implications for increasing our understanding of professional temporary workers by showing that creative performance may vary by employment types.

Development of Customer Satisfaction Index (CSI) Model for Pakistan

  • HAMAYUN, Khadija;HAFEEZ, Shakir
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.7
    • /
    • pp.153-171
    • /
    • 2022
  • To measure economic performance, customer satisfaction indices are constructed. This study proposes an index for banking and telecom, a significant evaluative system for comparing and enhancing customer satisfaction across the industries. The study suggests and examines amendments and improvements to the prior indices and incorporates ignored indicators to propose a punier index for Pakistan. The study is a pioneer in integrating online and offline indices into a single comprehensive model. The study is enriched by the Theory of Reasoned Action and Technological Acceptance Model. A sample of 320 respondents was used. The sample was divided based on gender and marital status. To authenticate the theoretical model, PLS-SEM was applied. We discovered nine latent variables that define customer satisfaction and conclude that a single model can be utilized for e-commerce enterprises as well. The index scores are comparable to the American index for banking and the Turkish index for telecom. Multi-group analysis (MGA) was used to comprehend the differences among the groups. This reveals that customization, design, reliability, and responsiveness induce satisfaction in telecom male and married customers. For the banking industry, the difference exists in complaint handling, customization, corporate image, perceived price, reliability, responsiveness, sentiments, convenience, and security to satisfaction links, image and complaint handling to loyalty links.

IoT Makes Life Simpler: How to Improve the Chinese Consumer's Intention to Use of LG HomNet Smart Home

  • Xiangdong Shen;Xi Chen;Yuting Jiang;Haixin Ji
    • Journal of Korea Trade
    • /
    • v.26 no.8
    • /
    • pp.1-20
    • /
    • 2022
  • Purpose - The paper aims to develop the theory of TAM and perceived risk through a more comprehensive and rigorous understanding of the influencing factors of the consumer's adoption of LG HomNet smart home from the perspective of trade-offs. Design/methodology - Based on the TAM and perceived risk theory, combined with the individual characteristics of consumers in the context of information technology as the external factors of the technology acceptance model, this paper constructs a theoretical model of the factors affecting the use intention of the consumer. It was empirically tested by using SEM, and survey data was collected from 458 respondents. Findings - The research results show that 9 hypotheses of the research model are supported and have reliable prediction accuracy. Consumers' perceived interest, perceived connectivity and perceived controllability have a significant positive impact on their intention to use. In addition, this paper also confirmed the mediating effect of perceived usefulness and perceived ease of use. Originality/value - Consumers are very concerned about gains and losses. Low-level performance risks, security risks, and financial risks will drive the consumer to have a stronger intention to use, and financial risks have the strongest impact. This research provides a useful implication and guidance for smart home equipment manufacturers and service providers in product and service innovation and marketing and promotion strategies.

Efficient Privacy Preserving Anonymous Authentication Announcement Protocol for Secure Vehicular Cloud Network

  • Nur Afiqah Suzelan Amir;Wan Ainun Mior Othman;Kok Bin Wong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1450-1470
    • /
    • 2023
  • In a Vehicular Cloud (VC) network, an announcement protocol plays a critical role in promoting safety and efficiency by enabling vehicles to disseminate safety-related messages. The reliability of message exchange is essential for improving traffic safety and road conditions. However, verifying the message authenticity could lead to the potential compromise of vehicle privacy, presenting a significant security challenge in the VC network. In contrast, if any misbehavior occurs, the accountable vehicle must be identifiable and removed from the network to ensure public safety. Addressing this conflict between message reliability and privacy requires a secure protocol that satisfies accountability properties while preserving user privacy. This paper presents a novel announcement protocol for secure communication in VC networks that utilizes group signature to achieve seemingly contradictory goals of reliability, privacy, and accountability. We have developed the first comprehensive announcement protocol for VC using group signature, which has been shown to improve the performance efficiency and feasibility of the VC network through performance analysis and simulation results.

Fraudulent Financial Reporting Practices: Case Study of Satyam Computer Limited

  • Bhasin, Madan Lal
    • The Journal of Economics, Marketing and Management
    • /
    • v.4 no.3
    • /
    • pp.12-24
    • /
    • 2016
  • Fraudulent financial reporting practices can have significant consequences for organizations and all stakeholders, as well as, for public confidence in the capital and security markets. In fact, comprehensive, accurate and reliable financial reporting is the bedrock upon which our markets are based. Keen to project a rosy picture of the Satyam to investors, employees and analysts, Mr. Raju (CEO and Chairman) fudged the account books so that it appeared to be a far bigger enterprise, with high profits and fast growth rate, than it actually was. The Satyam fraud has shattered the dreams of different categories of investors, shocked the government and regulators alike, and led to questioning of the accounting practices of statutory auditors and corporate governance norms in India. This is an exploratory study based on secondary sources of information. An attempt has been made to provide an explanation for various intriguing questions about Satyam scam. After thorough investigations by the CBI and SEBI, they have unveiled the methodology by which Satyam fraud was engineered. Finally, we recommend "Fraudulent reporting practices should be considered as a serious crime, and accounting bodies, courts and other regulatory authorities in India need to adopt very strict punitive measures to stop such unethical practices."

A Cyber-Physical Information System for Smart Buildings with Collaborative Information Fusion

  • Liu, Qing;Li, Lanlan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1516-1539
    • /
    • 2022
  • This article shows a set of physical information fusion IoT systems that we designed for smart buildings. Its essence is a computer system that combines physical quantities in buildings with quantitative analysis and control. In the part of the Internet of Things, its mechanism is controlled by a monitoring system based on sensor networks and computer-based algorithms. Based on the design idea of the agent, we have realized human-machine interaction (HMI) and machine-machine interaction (MMI). Among them, HMI is realized through human-machine interaction, while MMI is realized through embedded computing, sensors, controllers, and execution. Device and wireless communication network. This article mainly focuses on the function of wireless sensor networks and MMI in environmental monitoring. This function plays a fundamental role in building security, environmental control, HVAC, and other smart building control systems. The article not only discusses various network applications and their implementation based on agent design but also demonstrates our collaborative information fusion strategy. This strategy can provide a stable incentive method for the system through collaborative information fusion when the sensor system is unstable in the physical measurements, thereby preventing system jitter and unstable response caused by uncertain disturbances and environmental factors. This article also gives the results of the system test. The results show that through the CPS interaction of HMI and MMI, the intelligent building IoT system can achieve comprehensive monitoring, thereby providing support and expansion for advanced automation management.

Integrated Social Networking Service Management: Comprehensive Approach for Efficient Multi-Platform Management and Enhanced User Experience (SNS 통합 관리 서비스:다중 플랫폼 효율적인 관리와 사용자 경험 강화를 위한 종합적 접근 방식)

  • Sung Jin Kim;Hyun Chul Kwon;Ji Hyun Park;Jae Min OH;Jin Seok Yang;Yun Ho jung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.251-253
    • /
    • 2023
  • 본 연구는 spring framework와 각 SNS들의 API를 활용한 각 플랫폼들을 한 사이트에 연동하여 사용자들이 손쉽게 관리하기 위하여 진행하였다. SNS 통합 플랫폼에서의 중요한 요소는 사용자들의 SNS 관리 시간을 단축시키는 것인데 이를 위해 플랫폼들의 게시물들을 한 곳에서 게시, 수정, 삭제 그리고 여러 플랫폼에 게시물을 동시에 업로드하는 기능과 게시물들을 필터링하는 기능을 제공하였다. 이를 통해 사용자의 편의성은 올라가며 더 효율적으로 게시물들을 관리하여 시간을 단축시킬 수 있다.

  • PDF

Preliminary Selection of Safety-Relevant Radionuclides for Long-Term Safety Assessment of Deep Geological Disposal of Spent Nuclear Fuel in South Korea

  • Kyu Jung Choi;Shin Sung Oh;Ser Gi Hong
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.21 no.4
    • /
    • pp.451-463
    • /
    • 2023
  • With South Korea increasingly focusing on nuclear energy, the management of spent nuclear fuel has attracted considerable attention in South Korea. This study established a novel procedure for selecting safety-relevant radionuclides for long-term safety assessments of a deep geological repository in South Korea. Statistical evaluations were performed to identify the design basis reference spent nuclear fuels and evaluate the source term for up to one million years. Safety-relevant radionuclides were determined based on the half-life criteria, the projected activities for the design basis reference spent nuclear fuel, and the annual limit of ingestion set by the Nuclear Safety and Security Commission Notification No. 2019-10 without considering their chemical and hydrogeological properties. The proposed process was used to select 56 radionuclides, comprising 27 fission and activation products and 29 actinide nuclides. This study explains first the determination of the design basis reference spent nuclear fuels, followed by a comprehensive discussion on the selection criteria and methodology for safety-relevant radionuclides.