• 제목/요약/키워드: Comprehensive Security

검색결과 454건 처리시간 0.026초

Organizational Change Readiness, Service Innovation, and Corporate Image in Improving Competitiveness: A Case Study in Indonesia

  • HUTAPEA, John Gunung;NIMRAN, Umar;IQBAL, Mohammad;HIDAYAT, Kadarisman
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제8권3호
    • /
    • pp.683-693
    • /
    • 2021
  • Shipping has become an important sector in supporting social, economic, government, defense, security, cultural and other sectors to unite separate islands and broad seas. Thus, ports automatically become an important facility in Indonesia. The purpose of this research is to test and explain the effect of Organizational readiness for change, Service Innovation, and Corporate Image on Perceived opportunity and challenge. The research model with inferential analysis uses Structural Equation Modeling (SEM) analysis with the WarpPLS approach, expected to answer the statements of problem and be able to test the desired hypothesis. The model development in this research was based on the background, statements of problem, conceptual framework and research hypotheses. The model referred to is "Complete and Comprehensive Port." Its development was carried out through studying and synthesizing various sources. The most important source is the results of literature review in the form of theoretical developments and research results, then continued with compilation. The use of Organizational Change Readiness, Service Innovation, and Corporate Image in improving Port Competitiveness is seen as one of the novelties of this research, specifically the use of the Organizational Change Readiness variable which is often used in high-flexibility companies but now used in port companies as well.

Securing Anonymous Authenticated Announcement Protocol for Group Signature in Internet of Vehicles

  • Amir, Nur Afiqah Suzelan;Malip, Amizah;Othman, Wan Ainun Mior
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권11호
    • /
    • pp.4573-4594
    • /
    • 2020
  • Announcement protocol in Internet of Vehicles (IoV) is an intelligent application to enhance public safety, alleviate traffic jams and improve transportation quality. It requires communication between vehicles, roadside units and pedestrian to disseminate safety-related messages. However, as vehicles connected to internet, it makes them accessible globally to a potential adversary. Safety-related application requires a message to be reliable, however it may intrude the privacy of a vehicle. Contrarily, if some misbehaviour emerges, the malicious vehicles must be able to traceable and revoke from the network. This is a contradiction between privacy and accountability since the privacy of a user should be preserved. For a secure communication among intelligent entities, we propose a novel announcement protocol in IoV using group signature. To the best of our knowledge, our work is the first comprehensive construction of an announcement protocol in IoV that deploys group signature. We show that our protocol efficiently solves these conflicting security requirements of message reliability, privacy and accountability using 5G communication channel. The performance analysis and simulation results signify our work achieves performance efficiency in IoV communication.

Network Traffic Classification Based on Deep Learning

  • Li, Junwei;Pan, Zhisong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권11호
    • /
    • pp.4246-4267
    • /
    • 2020
  • As the network goes deep into all aspects of people's lives, the number and the complexity of network traffic is increasing, and traffic classification becomes more and more important. How to classify them effectively is an important prerequisite for network management and planning, and ensuring network security. With the continuous development of deep learning, more and more traffic classification begins to use it as the main method, which achieves better results than traditional classification methods. In this paper, we provide a comprehensive review of network traffic classification based on deep learning. Firstly, we introduce the research background and progress of network traffic classification. Then, we summarize and compare traffic classification based on deep learning such as stack autoencoder, one-dimensional convolution neural network, two-dimensional convolution neural network, three-dimensional convolution neural network, long short-term memory network and Deep Belief Networks. In addition, we compare traffic classification based on deep learning with other methods such as based on port number, deep packets detection and machine learning. Finally, the future research directions of network traffic classification based on deep learning are prospected.

Safe clinical photography: best practice guidelines for risk management and mitigation

  • Chandawarkar, Rajiv;Nadkarni, Prakash
    • Archives of Plastic Surgery
    • /
    • 제48권3호
    • /
    • pp.295-304
    • /
    • 2021
  • Clinical photography is an essential component of patient care in plastic surgery. The use of unsecured smartphone cameras, digital cameras, social media, instant messaging, and commercially available cloud-based storage devices threatens patients' data safety. This paper Identifies potential risks of clinical photography and heightens awareness of safe clinical photography. Specifically, we evaluated existing risk-mitigation strategies globally, comparing them to industry standards in similar settings, and formulated a framework for developing a risk-mitigation plan for avoiding data breaches by identifying the safest methods of picture taking, transfer to storage, retrieval, and use, both within and outside the organization. Since threats evolve constantly, the framework must evolve too. Based on a literature search of both PubMed and the web (via Google) with key phrases and child terms (for PubMed), the risks and consequences of data breaches in individual processes in clinical photography are identified. Current clinical-photography practices are described. Lastly, we evaluate current risk mitigation strategies for clinical photography by examining guidelines from professional organizations, governmental agencies, and non-healthcare industries. Combining lessons learned from the steps above into a comprehensive framework that could contribute to national/international guidelines on safe clinical photography, we provide recommendations for best practice guidelines. It is imperative that best practice guidelines for the simple, safe, and secure capture, transfer, storage, and retrieval of clinical photographs be co-developed through cooperative efforts between providers, hospital administrators, clinical informaticians, IT governance structures, and national professional organizations. This would significantly safeguard patient data security and provide the privacy that patients deserve and expect.

전문직 비정규직이 팀 내 수용 및 창의적 팀 성과에 미치는 영향에 관한 탐색적 연구: 경계 없는 비정규직과 과도기적 비정규직을 중심으로 (The Exploratory Study on the Impact of the Professional Contingent Workers on Team Members' Acceptance and Creative Team Performance)

  • 채희선;박지성
    • 아태비즈니스연구
    • /
    • 제11권2호
    • /
    • pp.145-158
    • /
    • 2020
  • Purpose - To understand the growing interests in the professional temporary workforce, this study aimed to examine the different types of professional temporary workers and their different effects on creative performance. Design/methodology/approach - By sub-classifying professional temporary workers as boundaryless workers and transitional workers, this study developed propositions to provide comprehensive framework for directing meaningful topics for future research on professional temporary workers. Findings - This study suggested that two types of professional temporary workers may differ significantly in terms of their work efforts for getting approval or acceptance from the team members and for achieving creative contributions in teams. Specifically, drawing on expectance theory, social identity theory and resource-based theory, this study discussed the relationship between acceptance(task-oriented vs. relational-oriented acceptance), employment duration(short-term status vs. long-term status), contract security(volition being temporary worker) and creative performance for boundaryless workers versus transitional workers. Research implications or Originality - This study have implications for increasing our understanding of professional temporary workers by showing that creative performance may vary by employment types.

Development of Customer Satisfaction Index (CSI) Model for Pakistan

  • HAMAYUN, Khadija;HAFEEZ, Shakir
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제9권7호
    • /
    • pp.153-171
    • /
    • 2022
  • To measure economic performance, customer satisfaction indices are constructed. This study proposes an index for banking and telecom, a significant evaluative system for comparing and enhancing customer satisfaction across the industries. The study suggests and examines amendments and improvements to the prior indices and incorporates ignored indicators to propose a punier index for Pakistan. The study is a pioneer in integrating online and offline indices into a single comprehensive model. The study is enriched by the Theory of Reasoned Action and Technological Acceptance Model. A sample of 320 respondents was used. The sample was divided based on gender and marital status. To authenticate the theoretical model, PLS-SEM was applied. We discovered nine latent variables that define customer satisfaction and conclude that a single model can be utilized for e-commerce enterprises as well. The index scores are comparable to the American index for banking and the Turkish index for telecom. Multi-group analysis (MGA) was used to comprehend the differences among the groups. This reveals that customization, design, reliability, and responsiveness induce satisfaction in telecom male and married customers. For the banking industry, the difference exists in complaint handling, customization, corporate image, perceived price, reliability, responsiveness, sentiments, convenience, and security to satisfaction links, image and complaint handling to loyalty links.

IoT Makes Life Simpler: How to Improve the Chinese Consumer's Intention to Use of LG HomNet Smart Home

  • Xiangdong Shen;Xi Chen;Yuting Jiang;Haixin Ji
    • Journal of Korea Trade
    • /
    • 제26권8호
    • /
    • pp.1-20
    • /
    • 2022
  • Purpose - The paper aims to develop the theory of TAM and perceived risk through a more comprehensive and rigorous understanding of the influencing factors of the consumer's adoption of LG HomNet smart home from the perspective of trade-offs. Design/methodology - Based on the TAM and perceived risk theory, combined with the individual characteristics of consumers in the context of information technology as the external factors of the technology acceptance model, this paper constructs a theoretical model of the factors affecting the use intention of the consumer. It was empirically tested by using SEM, and survey data was collected from 458 respondents. Findings - The research results show that 9 hypotheses of the research model are supported and have reliable prediction accuracy. Consumers' perceived interest, perceived connectivity and perceived controllability have a significant positive impact on their intention to use. In addition, this paper also confirmed the mediating effect of perceived usefulness and perceived ease of use. Originality/value - Consumers are very concerned about gains and losses. Low-level performance risks, security risks, and financial risks will drive the consumer to have a stronger intention to use, and financial risks have the strongest impact. This research provides a useful implication and guidance for smart home equipment manufacturers and service providers in product and service innovation and marketing and promotion strategies.

Efficient Privacy Preserving Anonymous Authentication Announcement Protocol for Secure Vehicular Cloud Network

  • Nur Afiqah Suzelan Amir;Wan Ainun Mior Othman;Kok Bin Wong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권5호
    • /
    • pp.1450-1470
    • /
    • 2023
  • In a Vehicular Cloud (VC) network, an announcement protocol plays a critical role in promoting safety and efficiency by enabling vehicles to disseminate safety-related messages. The reliability of message exchange is essential for improving traffic safety and road conditions. However, verifying the message authenticity could lead to the potential compromise of vehicle privacy, presenting a significant security challenge in the VC network. In contrast, if any misbehavior occurs, the accountable vehicle must be identifiable and removed from the network to ensure public safety. Addressing this conflict between message reliability and privacy requires a secure protocol that satisfies accountability properties while preserving user privacy. This paper presents a novel announcement protocol for secure communication in VC networks that utilizes group signature to achieve seemingly contradictory goals of reliability, privacy, and accountability. We have developed the first comprehensive announcement protocol for VC using group signature, which has been shown to improve the performance efficiency and feasibility of the VC network through performance analysis and simulation results.

Fraudulent Financial Reporting Practices: Case Study of Satyam Computer Limited

  • Bhasin, Madan Lal
    • 융합경영연구
    • /
    • 제4권3호
    • /
    • pp.12-24
    • /
    • 2016
  • Fraudulent financial reporting practices can have significant consequences for organizations and all stakeholders, as well as, for public confidence in the capital and security markets. In fact, comprehensive, accurate and reliable financial reporting is the bedrock upon which our markets are based. Keen to project a rosy picture of the Satyam to investors, employees and analysts, Mr. Raju (CEO and Chairman) fudged the account books so that it appeared to be a far bigger enterprise, with high profits and fast growth rate, than it actually was. The Satyam fraud has shattered the dreams of different categories of investors, shocked the government and regulators alike, and led to questioning of the accounting practices of statutory auditors and corporate governance norms in India. This is an exploratory study based on secondary sources of information. An attempt has been made to provide an explanation for various intriguing questions about Satyam scam. After thorough investigations by the CBI and SEBI, they have unveiled the methodology by which Satyam fraud was engineered. Finally, we recommend "Fraudulent reporting practices should be considered as a serious crime, and accounting bodies, courts and other regulatory authorities in India need to adopt very strict punitive measures to stop such unethical practices."

A Cyber-Physical Information System for Smart Buildings with Collaborative Information Fusion

  • Liu, Qing;Li, Lanlan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권5호
    • /
    • pp.1516-1539
    • /
    • 2022
  • This article shows a set of physical information fusion IoT systems that we designed for smart buildings. Its essence is a computer system that combines physical quantities in buildings with quantitative analysis and control. In the part of the Internet of Things, its mechanism is controlled by a monitoring system based on sensor networks and computer-based algorithms. Based on the design idea of the agent, we have realized human-machine interaction (HMI) and machine-machine interaction (MMI). Among them, HMI is realized through human-machine interaction, while MMI is realized through embedded computing, sensors, controllers, and execution. Device and wireless communication network. This article mainly focuses on the function of wireless sensor networks and MMI in environmental monitoring. This function plays a fundamental role in building security, environmental control, HVAC, and other smart building control systems. The article not only discusses various network applications and their implementation based on agent design but also demonstrates our collaborative information fusion strategy. This strategy can provide a stable incentive method for the system through collaborative information fusion when the sensor system is unstable in the physical measurements, thereby preventing system jitter and unstable response caused by uncertain disturbances and environmental factors. This article also gives the results of the system test. The results show that through the CPS interaction of HMI and MMI, the intelligent building IoT system can achieve comprehensive monitoring, thereby providing support and expansion for advanced automation management.