Asokan, N; Dmitrienko, Alexandra
Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat
... DEPARTMENT OF LABOR Employee Benefits Security Administration Hearing on Definition of ``Fiduciary'' AGENCY: Employee Benefits Security Administration, Labor. ACTION: Notice of hearing and extension of comment period. SUMMARY: Notice is hereby given that the Employee Benefits Security Administration will...
Broek, F.M.J. van den
Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an
Tuquerres, G.; Salvador, M.R.; Sprenkels, Ron
As required in the TGS Mobile IP Advanced Module, this paper presents a survey of common security threats which mobile IP networks are exposed to as well as some proposed solutions to deal with such threats.
Nielson, Hanne Riis; Nielson, Flemming; Buchholtz, Mikael
We show how to use static analysis to provide information about security issues related to mobility. First the syntax and semantics of Mobile Ambients is reviewed and we show how to obtain a so-called 0CFA analysis that can be implemented in polynomial time. Next we consider discretionary access...
Nielson, Hanne Riis; Nielson, Flemming; Buchholtz, Mikael
We show how to use static analysis to provide information about security issues related to mobility. First the syntax and semantics of Mobile Ambients is reviewed and we show how to obtain a so-called 0CFA analysis that can be implemented in polynomial time. Next we consider discretionary access...
Panettieri, Joseph C.
Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…
A highly secure mobile agent system is very important for a mobile computing environment. The security issues in mobile agent system comprise protecting mobile hosts from malicious agents, protecting agents from other malicious agents, protecting hosts from other malicious hosts and protecting agents from malicious hosts. Using traditional security mechanisms the first three security problems can be solved. Apart from using trusted hardware, very few approaches exist to protect mobile code from malicious hosts. Some of the approaches to solve this problem are the use of trusted computing, computing with encrypted function, steganography, cryptographic traces, Seal Calculas, etc. This paper focuses on the simulation of some of these existing techniques in the designed mobile language. Some new approaches to solve malicious network problem and agent tampering problem are developed using public key encryption system and steganographic concepts. The approaches are based on encrypting and hiding the partial solutions of the mobile agents. The partial results are stored and the address of the storage is destroyed as the agent moves from one host to another host. This allows only the originator to make use of the partial results. Through these approaches some of the existing problems are solved.
Sanayei, Ali; Mirzaei, Abas
The purpose of this study is twofold. First, in order to guarantee a coherent discussion about mobile customer relationship management (mCRM), this paper presents a conceptualization of mCRM delineating its unique characteristics because of Among the variety of mobile services, considerable attention has been devoted to mobile marketing and in particular to mobile customer relationship management services. Second, the authors discusses the security risks in mobile computing in different level(user, mobile device, wireless network,...) and finally we focus on enterprise mobile security and it's subgroups with a series of suggestion and solution for improve mobile computing security.
Full Text Available Rapidly increasing numbers of sophisticated mobile devices (smart phones, tab computers, etc. all over the world mean that ensuring information security will only become a more pronounced problem for individuals and organizations. It’s important to effectively protect data stored on or accessed by mobile devices, and also during transmission of data between devices and between device and information system. Technological and other trends show, that the cyber threats are also rapidly developing and spreading. It's crucial to educate users about safe usage and to increase their awareness of security issues. Ideally, users should keep-up with technological trends and be well equipped with knowledge otherwise mobile technology will significantly increase security risks. Most important is that we start educating youth so that our next generations of employees will be part of a culture of data and information security awareness.
Debbabi, Mourad; Talhi, Chamseddine
Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.
Campagna, Rich; Krishnan, Ashwin
The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate informati
The paper presents security issues and architectures for mobile applications and GSM infrastructure. The article also introduces the idea of a new secure architecture for an inter-sector electronic wallet used in payments - STP4EW (Secure Transmission Protocol for Electronic Wallet)
Full Text Available The paper presents security issues and architectures for mobile applications and GSM infrastructure. The article also introduces the idea of a new secure architecture for an inter-sector electronic wallet used in payments - STP4EW (Secure Transmission Protocol for Electronic Wallet
Rhee, Man Young
The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr
... 29 Labor 1 2010-07-01 2010-07-01 true Employee Benefits Security Administration. 70.54 Section 70... Records and Filings § 70.54 Employee Benefits Security Administration. (a) The annual financial reports (Form 5500) and attachments/schedules as filed by employee benefit plans under the Employee Retirement...
A. G. Beltov
Full Text Available The article provides an overview of security problems which exist in the mobile devices. The main technologies aimed to protect the phones from various types of attacks are considered. The authors justify the necessity of developing new improved tools and methods to ensure the safety of such devices.
Mousa T AL-Akhras
Full Text Available Due to the widespread use of computer technologies in almost all aspects of life, organisations that are connected to the Internet started extending their services to their customers to include new applications and services that satisfy their customers’ desires to make better businesses. One of these emerging applications is mobile banking. The term mobile banking (or m-banking describes the banking services that the user can perform via a mobile device ubiquitously at anytime and from anywhere. In order for users to access their accounts, they need a mobile device and network connectivity. Therefore, sitting in front of a computer is not a requirement anymore; accessing accounts can occur while users are waiting their turn at the dentist clinic or relaxing at the beach! This paper explores the opportunities of using mobile technology in the electronic banking (e-banking sector to enhance existing banking services by moving toward m-banking using mobile devices and wireless media that can provide opportunities for ubiquitous access to the banking services as mobile technologies can be used at anytime and from anywhere. The technical problems encountered while using the mobile devices presents some technical difficulties and challenges for the m-banking. In this paper we introduce a mobile system that demonstrates the flexibility gained out of this technology and covers the major aspects of such kind of applications. The proposed system covers two parts: the customer services (user interface and the security aspects. In the user interface part, banking facility is provided to the user through the mobile device to implement banking transactions. The model provides customers with the services: billing payments, transferring of funds, viewing of customer’s accounts and transactions, allowing the user to change his/her password and request a cheque book. The application takes into consideration security aspects, it satisfies the following
Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan
Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.
First published in The Chemical Engineer and reproduced by Crest - Centre for Research and Evidence on Security Threats, 26/01/2016 (https://crestresearch.ac.uk/comment/employees-front-line-cyber-security/)
Purcell, James; McGill, Robin; Brodeur, Philip; Hall, Erin
The relationship between employer and employee has changed significantly over the past 40 years. One of the greatest changes in this relationship is in the nature of employee retirement. While pension reform at public and private colleges has helped ensure institutional financial viability, retirement security for employees has declined. With the…
This brief presents the challenges and solutions for VANETs' security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO). The authors give an overview of the concept of the vehicular IP-address configurations as the prerequisite step to achieve mobility management for VANETs, and review the current security and privacy schemes applied in the three mobility management protocols. Throughout the brief, the authors propose new schemes and protocols to increase the security of IP addresses within VANETs in
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Port of Mobile, Mobile Ship Channel, Mobile, AL. 165.835 Section 165.835 Navigation and Navigable Waters COAST GUARD... § 165.835 Security Zone; Port of Mobile, Mobile Ship Channel, Mobile, AL. (a) Definition. As used in...
Although virtualization is a widely accepted technology, there are few books dedicated to virtualization and security. Filling this need, Securing Cloud and Mobility: A Practitioner's Guide explains how to secure the multifaceted layers of private and public cloud deployments as well as mobility infrastructures. With comprehensive coverage that includes network, server, and endpoint security, it provides a strategic view of the security implications of virtualization and cloud computing. The book begins by deconstructing the terminology of cloud computing. It explains how to establish a secure
Research areas of this dissertation are security for mobile agents, for applications based on mobile agents, and for distributed network environments in which mobile agents execute. Mobile agents paradigm has captured researchers’ and industry’s interests long time ago because of its innovative capabilities and attractive applications. The ability of mobile agents to autonomously migrate from host to host, transferring their code and internal state, enables them to accomplish tasks in network...
Capkun, Srdjan; Hubaux, Jean-Pierre; Buttyan, Levente
We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show that far from being a hurdle, mobility can be exploited to set up security associations among users. We leverage on the temporary vicinity of users, during which appropriate cryptographic protocols...
Full Text Available Background: Mobile device adoption is on the rise and people are increasingly using mobile devices as a part of their lives. Studies have shown that people can use mobile devices to perform their work duties from anywhere. Organisations are now exploring ways of enabling and supporting mobility for employees’ mobile devices, including BYOD (Bring-Your-Own-Device policies. Objective: The objective of this study is to identify the main capabilities required for enterprise mobility. Methods/Approach: This qualitative research study presents empirical results based on interviews with selected senior IS managers of large organizations. Results: The main findings of this study suggest that information security and mobile device management are among the main capabilities required for enterprise mobility. Conclusions: Enterprise mobility is an emerging field which has received very little research attention. More research in the field will help organisations make informed decisions on how to increase productivity, sales and efficiency while achieving employee satisfaction through enterprise mobility.
Mishra, Saurabh; Snehlata, Snehlata; Srivastava, Anjali
Information Security has become a significant concern for today's organizations. The internal security threats acts as the most curtail type of security threat within an organization. These internal security threats are a result of poor conduct of security behavior by the employees within an organization. If not deal properly, it may hamper the auditing of organization. Auditing plays an important role in the business environment. Before conducting auditing it is essential to examine the beha...
Connolly , Lena; Lang , Michael; Tygar , J. ,
Part 5: Security Management and Human Aspects of Security; International audience; At a time of rapid business globalisation, it is necessary to understand employee security behaviour within diverse cultural settings. While general deterrence theory has been extensively used in Behavioural Information Security research with the aim to explain the effect of deterrent factors on employees’ security actions, these studies provide inconsistent and even contradictory findings. Therefore, a further...
... DEPARTMENT OF LABOR Office of the Secretary Employee Benefits Security Administration; Submission...--Employee Benefits Security Administration (EBSA), Office of Management and Budget, Room 10235, Washington...: Employee Benefits Security Administration. Type of Review: Extension without change of a currently approved...
Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh
The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.
Full Text Available This work precisely evaluates whether browser security warnings are as ineffective as proposed by popular sentiments and past writings. This research used different kinds of Android mobile browsers as well as desktop browsers to evaluate security warnings. Security experts and developers should give emphasis on making a user aware of security warnings and should not neglect aim of communicating this to users. Security experts and system architects should emphasis the goal of communicating security information to end users. In most of the browsers, security warnings are not emphasized, and browsers simply do not show warnings, or there are a number of ways to hide those warnings of malicious sites. This work precisely finds that how inconsistent browsers really are in prompting security warnings. In particular, majority of the modern mobile web browsers are vulnerable to these security threats. We find inconsistency in SSL warnings among web browsers. Based on this work, we make recommendations for warning designers and researchers.
Fang, Dongfeng; Qian, Yi; Qingyang Hu, Rose
The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks. The paper starts with a review on 5G wireless networks particularities as well as on the new requirements and motivations of 5G wireless security. The potential attacks and security services with the consideration of new service requirements and new use ca...
Pontes Soares Rocha, B.; Costa, D.N.O.; Moreira, R.A.; Rezende, C.G.; Loureiro, A.A.F.; Boukerche, A.
The mobile computing paradigm has introduced new problems for application developers. Challenges include heterogeneity of hardware, software, and communication protocols, variability of resource limitations and varying wireless channel quality. In this scenario, security becomes a major concern for
A. N. Tkhishev
Full Text Available A special aspect of aircraft test is carrying out both flight evaluation and ground operation evaluation in a structure of flying aids and special tools equipment. The specific of flight and sea tests involve metering in offshore zone, which excludes the possibility of fixed geodetically related measuring tools. In this regard, the specific role is acquired by shipbased measurement systems, in particular the mobile modular measuring systems. Information processed in the mobile modular measurement systems is a critical resource having a high level of confidentiality. When carrying out their functions, it should be implemented a proper information control of the mobile modular measurement systems to ensure their protection from the risk of data leakage, modification or loss, i.e. to ensure a certain level of information security. Due to the specific of their application it is difficult to solve the problems of information security in such complexes. The intruder model, the threat model, the security requirements generated for fixed informatization objects are not applicable to mobile systems. It was concluded that the advanced mobile modular measuring systems designed for flight experiments monitoring and control should be created due to necessary information protection measures and means. The article contains a diagram of security requirements formation, starting with the data envelopment analysis and ending with the practical implementation. The information security probabilistic model applied to mobile modular measurement systems is developed. The list of current security threats based on the environment and specific of the mobile measurement system functioning is examined. The probabilistic model of the information security evaluation is given. The problems of vulnerabilities transformation of designed information system into the security targets with the subsequent formation of the functional and trust requirements list are examined.
This handbook is a quick reference guide to some of the most important points of the London 2012 information security policy. This information security handbook outlines the policies that all staff, secondees, volunteers and certain third parties who process LOCOG information must comply with.
Full Text Available Instead of paying by cash, check, or credit cards, customers can now also use their mobile devices to pay for a wide range of services and both digital and physical goods. However, customers’ security concerns are a major barrier to the broad adoption and use of mobile payments. In this paper we present the design of a secure operational model for mobile payments in which access control is based on a service-oriented architecture. A customer uses his/her mobile device to get authorization from a remote server and generate a two-dimensional barcode as the payment certificate. This payment certificate has a time limit and can be used once only. The system also provides the ability to remotely lock and disable the mobile payment service.
Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Paulsen, Phillip E.; Shell, Dan
This paper describes a network demonstration and three month field trial of mobile networking using mobile-IPv4. The network was implemented as part of the US Coast Guard operational network which is a ".mil" network and requires stringent levels of security. The initial demonstrations took place in November 2002 and a three month field trial took place from July through September of 2003. The mobile network utilized encryptors capable of NSA-approved Type 1 algorithms, mobile router from Cisco Systems and 802.11 and satellite wireless links. This paper also describes a conceptual architecture for wide-scale deployment of secure mobile networking in operational environments where both private and public infrastructure is used. Additional issues presented include link costs, placement of encryptors and running routing protocols over layer-3 encryption devices.
Chapter V, but Android provides default onboard encryption and it is an optional feature for removable media. Wipe the device (to scrub its stored...Mobile Data Solution Since Android has removed the ability to control mobile data, and it is unknown if a creative solution to shut this feature...down exists, then some exploration on this topic is warranted. Android removed the access to this feature under the auspices of preventing
Minhas, A.A.; Mehmood, W.; Ijaz, A.
Security is a crucial factor in the provision of secure mobile services. The rapid growth of harmful attacks has increased the need for higher security level, especially in the case of wireless networks. GSM security is proposed by A5/1 synchronous symmetric-key stream cipher. It has been revealed in (1), (2), and (3) that biased birthday attack, random subgraph attack and correlation attack, breach the security at the air interface. In this paper, we have proposed a high level security solution that incorporates a new Key setup routine and new feedback taps positions. We have shown that the proposed solution is more secure and efficient by simulating and application of different Statistical Tests for standard A5/1 and proposed A5/1 in MATLAB and comparing results. (author)
Dana Ramona ANDRISESCU
Full Text Available Mobile devices are used everywhere, from making acall to store huge volume of information. But together withdevices shrinking and rise of storage space on a single device webring to mind the problem of trusting the stored information.Trusting the information and assuring its quality meansknowing the security threats these devices face and measuresthat should be taken. Many questions rise from here like “Whathappens when a mobile device is used by several persons andespecially employees?”, “Is that information reliable andoriginal?”, “Who is responsible for a device and its security?”.We are going to see in this paper that information quality can beassured even on portable devices by using the adequate securitymeasures.
Chapter I : Introduction to Mobile Business and Mobile Banking Chapter II : Review of Literature on Mobile Business Technology, Mobile Banking Services & Security Chapter III : Research Objectives and Methodology Chapter IV : Results and Discussion Chapter V : Summary and Conclusions Bibliography
Mobile handsets, especially so-called smartphones, have become an indispensable commodity in day-to-day life. However, their growing versatility came at the cost of ever-increasing complexity, and this raises severe security concerns. This has come to be especially problematic for corporate IT infrastructures, because it is increasingly hard to reconcile personal user expectations with corporate security demands. A particular manifestation of this quandary is the bring-your-own-device (BYOD) ...
Hartel, Pieter H.; van Eck, Pascal; Etalle, Sandro; Wieringa, Roelf J.; Barthe, G.; Burdy, L.; Huisman, Marieke; Lanet, J.-L.; Muntean, T.
Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of
Agaian, Sos S.; Cherukuri, Ravindranath; Sifuentes, Ronnie R.
Adaptive steganography, an intelligent approach to message hiding, integrated with matrix encoding and pn-sequences serves as a promising resolution to recent security assurance concerns. Incorporating the above data hiding concepts with established cryptographic protocols in wireless communication would greatly increase the security and privacy of transmitting sensitive information. We present an algorithm which will address the following problems: 1) low embedding capacity in mobile devices due to fixed image dimensions and memory constraints, 2) compatibility between mobile and land based desktop computers, and 3) detection of stego images by widely available steganalysis software [1-3]. Consistent with the smaller available memory, processor capabilities, and limited resolution associated with mobile devices, we propose a more magnified approach to steganography by focusing adaptive efforts at the pixel level. This deeper method, in comparison to the block processing techniques commonly found in existing adaptive methods, allows an increase in capacity while still offering a desired level of security. Based on computer simulations using high resolution, natural imagery and mobile device captured images, comparisons show that the proposed method securely allows an increased amount of embedding capacity but still avoids detection by varying steganalysis techniques.
Speed, Timothy; Anderson, Joseph; Nampalli, Jaya
Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private.Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.
Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga
Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.
Mwakalinga, G Jeffy; Yngström, Louise
Information systems are growing in size and complexity making it infeasible for human administrators to manage them. The aim of this work is to study ways of securing and using mobile software agents to deter attackers, protect information systems, detect intrusions, automatically respond to the intrusions and attacks, and to produce recovery services to systems after attacks. Current systems provide intrusion detection, prevention, protection, response, and recovery services but most of thes...
Mr. Amandeep Singh Arora; Ms. Jasvinder Kumar
For the past several decades, designers have processed security for a wide variety of applications from mobiles to automatic machines. Losing a smart phone can be an especially bad thing, since they are so expensive, and carry so much information. This application needs to be installed before. With this application user has the choice to launch phone tracking and finding cell phone by sending SMS requests to their lost phone and even getting the locations of the phones that are lo...
Androulidakis, Iosif I
Mobile Phone Security and Forensics provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used “against” users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis.
With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…
... number or with an incorrect employee name or social security number. 422.120 Section 422.120 Employees... reported without a social security number or with an incorrect employee name or social security number. (a... social security number or with a different employee name or social security number than shown in SSA's...
Heber, E.; Lehr, D.; Ebert, D. D.
Background: Work-related stress is highly prevalent among employees and is associated with adverse mental health consequences. Web-based interventions offer the opportunity to deliver effective solutions on a large scale; however, the evidence is limited and the results conflicting. Objective......: This randomized controlled trial evaluated the efficacy of guided Web-and mobile-based stress management training for employees. Methods: A total of 264 employees with elevated symptoms of stress (Perceived Stress Scale-10, PSS-10 >= 22) were recruited from the general working population and randomly assigned...... to an Internet-based stress management intervention (iSMI) or waitlist control group. The intervention (GET. ON Stress) was based on Lazarus's transactional model of stress, consisted of seven sessions, and applied both well-established problem solving and more recently developed emotion regulation strategies...
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
van t Noordende, G.J.; Overeinder, B.J.; Timmer, R.J.; Brazier, F.M.; Tanenbaum, A.S.
Designing a secure and reliable mobile agent system is a difficult task. The agent operating system (AOS) is a building block that simplifies this task. AOS provides common primitives required by most mobile agent middleware systems, such as primitives for secure communication, secure and
Full Text Available Relational Marketing is now more possible than ever, due the fact that consumer devices and smart devices had penetrating the consumer markets. One can imagine the effect of this kind of shift at the consumer level. The challenge from the IT point of view was in the last period, to make computing simple, again. Let’s take the example of mobile devices, first the mobile devices had a “normal” size, then they had to be small and smaller, and now it seems that the smartphone have to be with some functionality near to a laptop. Do we use them? Do these functionalities use us, or our surroundings? We will consider the impact of mobile devices for the employees, regarding to the concept BYOD – Bring Your Own Device
Perceived competence mobilization is the degree to which employees perceive that they have adequate opportunities to utilize their competences in their current jobs. The findings of the research reported here suggest that employees' perceived competence mobilization is associated with a number of favourable employee attitudes, including intrinsic…
Full Text Available The IEEE 802.16 Working Group on Broadband Wireless Access Standards released IEEE 802.16-2004 which is a standardized technology for supporting broadband and wireless communication with fixed and nomadic access. After the IEEE 802.16-2004 standard, a new advanced and revised standard was released as the IEEE 802.16e-2005 amendment which is foundation of Mobile WiMAX network supporting handover and roaming capabilities. In the area of security aspects, compared to IEEE 802.16-2004, IEEE 802.16e, called Mobile WiMAX, adopts improved security architecture—PKMv2 which includes EAP authentication, AES-based authenticated encryption, and CMAC or HMAC message protection. However, there is no guarantee that PKMv2-based Mobile WiMAX network will not have security flaws. In this paper, we investigate the current Mobile WiMAX security architecture focusing mainly on pointing out new security vulnerabilities such as a disclosure of security context in network entry, a lack of secure communication in network domain, and a necessity of efficient handover supporting mutual authentication. Based on the investigation results, we propose a novel Mobile WiMAX security architecture, called RObust and Secure MobilE WiMAX (ROSMEX, to prevent the new security vulnerabilities.
A fleet of vehicles is being developed and maintained by Sandia National Labs for studies in remote control and autonomous operation. These vehicles range from modified commercial vehicles to specially constructed mobile platforms and are utilized as test beds for developing concepts in the application of robotics to interior and exterior physical security. Actuators control the vehicle speed, brakes, and steering through manual input from a remote driving station or through some level of digital computer control. On-board processing may include simple vehicle control functions or may allow for unmanned, autonomous operation. communication links are provided for digital communication between control computers, television transmission for vehicle vision, and voice for local control. With these vehicles, SNL can develop, test, and evaluate sensors, processing requirements, various methods of actuator implementation, operator controlled feedback requirements, and vehicle operations. A description of the major features and uses for each of the vehicles in the fleet is provided
Mc Govern, D.E.
A fleet of vehicles is being developed and maintained by Sandia National Labs for studies in remote control and autonomous operation. These vehicles range from modified commercial vehicles to specially constructed mobile platforms and are utilized as test beds for developing concepts in the application of robotics to interior and exterior physical security. Actuators control the vehicle speed, brakes, and steering through manual input from a remote driving station or through some level of digital computer control. On-board processing may include simple vehicle control functions or may allow for unmanned, autonomous operation. Communication links are provided for digital communication between control computers, television transmission for vehicle vision, and voice for local control. With these vehicles, SNL can develop, test, and evaluate sensors, processing requirements, various methods of actuator implementation, operator controlled feedback requirements, and vehicle operations. A description of the major features and uses for each of the vehicles in the fleet is provided
A fleet of vehicles is being developed and maintained by Sandia National Labs for studies in remote control and autonomous operation. These vehicles range from modified commercial vehicles to specially constructed mobile platforms and are utilized as test beds for developing concepts in the application of robotics to interior and exterior physical security. Actuators control the vehicle speed, brakes, and steering through manual input from a remote driving station or through some level of digital computer control. On-board processing may include simple vehicle control functions or may allow for unmanned, autonomous operation. Communication links are provided for digital communication between control computers, television transmission for vehicle vision, and voice for local control. With these vehicles, SNL can develop, test, and evaluate sensors, processing requirements, various methods of actuator implementation, operator controlled feedback requirements, and vehicle operations. A description of the major features and uses for each of the vehicles in the fleet is provided. 4 refs., 1 fig., 1 tab
van Cleeff, A.
Consumer mobile phone security requires more attention, now that their data storage capacity is increasing. At the same time, much effort is spent on data-centric security for large enterprises. In this article we try to apply data-centric security to consumer mobile phones. We show a maturity model
Litchfield, Ian; Sorahan, Tom; Tongeren, Martie van
Little is known about personal exposure to radiofrequency (RF) fields amongst employees in the telecommunications industry responsible for installing and maintaining transmitters. IARC classified RF exposure as a possible carcinogen, although evidence from occupational studies was judged to be inadequate. Hence, there is a need for improved evidence of any potentially adverse health effects amongst the workforce occupationally exposed to RF radiation. In this study, results are presented from an exposure survey using data from personal monitors used by employees in the broadcasting and telecommunication industries of the UK. These data were supplemented by spot measurements using broadband survey metres and information on daily work activities provided by employee questionnaires. The sets of real-time personal data were categorised by four types of site determined by the highest powered antenna present (high, medium or low power and ground-level sites). For measurements gathered at each type of site, the root mean square and a series of box plots were produced. Results from the daily activities diaries suggested that riggers working for radio and television broadcasters were exposed to much longer periods as compared to colleagues working for mobile operators. Combining the results from the measurements and daily activity diaries clearly demonstrate that exposures were highest for riggers working for broadcasting sites. This study demonstrates that it is feasible to carry out exposure surveys within these populations that will provide reliable estimates of exposure that can be used for epidemiological studies of occupational groups exposed to RF fields. (authors)
Yu, Xiaojun; Wen, Qiaoyan
It is popular to access the cloud storage by mobile devices. However, this application suffer data security risk, especial the data leakage and privacy violate problem. This risk exists not only in cloud storage system, but also in mobile client platform. To reduce the security risk, this paper proposed a new security solution. It makes full use of the searchable encryption and trusted computing technology. Given the performance limit of the mobile devices, it proposes the trusted proxy based protection architecture. The design basic idea, deploy model and key flows are detailed. The analysis from the security and performance shows the advantage.
Cosmin Cătălin Olteanu
The main purpose of the paper is to illustrate the importance of new software tools that can be used with mobile devices to make them more secure for the use of day to day business software. Many companies are using mobile applications to access some components to ERP’s or CRM’s remotely. Even the new come, cloud Informatic Systems are using more remote devices than ever. This is why we need to secure somehow these mobile applications.
Cosmin Cătălin Olteanu
Full Text Available The main purpose of the paper is to illustrate the importance of new software tools that can be used with mobile devices to make them more secure for the use of day to day business software. Many companies are using mobile applications to access some components to ERP’s or CRM’s remotely. Even the new come, cloud Informatic Systems are using more remote devices than ever. This is why we need to secure somehow these mobile applications.
Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander
Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients' protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students' perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants' perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority.
The dominant view of the relationship between employees and information security (InfoSec) is that employees are the weakest link. This research investigates the relationship between employees and InfoSec from a positive perspective. User buy-in is the theoretical framework of this study and Western U.S. Community Colleges (WUCCs) are the setting.…
Partee, M.S.; Moser, F.
One of the classic problems in information security is how to exchange confidential information securely in uncontrolled environments. There have been innumerable academic and commercial hours spent resolving this question. In traditional practice, securing communications meant investing in satellites, specialized hardware, rigorous security engineering and testing, and expending a lot of resources. For this reason, smaller organizations have often been unable to secure communications. The widespread adoption of mobile communications and the modern mobile device has brought about unprecedented abilities to stay connected with colleagues during work activities. As connectedness has increased, so have the opportunities for information compromise. The enormous mobile landscape, with competing ecosystems, large research and product development budgets, proliferating devices, and rapidly-shifting technical foundations prove to be a tremendous source of both opportunity and risk. With the reality of shrinking budgets and increasing threats, many organizations, commercial enterprises, and product vendors are looking for new ways to utilize existing resources for secure communications and mobile work capabilities. Keeping communications private and secure using the infrastructure of the world's telecommunications network and standard computing and mobile devices is the challenge. This paper will examine some methods for communicating securely using consumer mobile products and evaluate the risk such tools can present to an organization in the context of inspection work in the field. (author)
Litchfield, Ian; van Tongeren, Martie; Sorahan, Tom
Little is known about personal exposure to radiofrequency (RF) fields amongst employees in the telecommunications industry responsible for installing and maintaining transmitters. IARC classified RF exposure as a possible carcinogen, although evidence from occupational studies was judged to be inadequate. Hence, there is a need for improved evidence of any potentially adverse health effects amongst the workforce occupationally exposed to RF radiation. In this study, results are presented from an exposure survey using data from personal monitors used by employees in the broadcasting and telecommunication industries of the UK. These data were supplemented by spot measurements using broadband survey metres and information on daily work activities provided by employee questionnaires. The sets of real-time personal data were categorised by four types of site determined by the highest powered antenna present (high, medium or low power and ground-level sites). For measurements gathered at each type of site, the root mean square and a series of box plots were produced. Results from the daily activities diaries suggested that riggers working for radio and television broadcasters were exposed to much longer periods as compared to colleagues working for mobile operators. Combining the results from the measurements and daily activity diaries clearly demonstrate that exposures were highest for riggers working for broadcasting sites. This study demonstrates that it is feasible to carry out exposure surveys within these populations that will provide reliable estimates of exposure that can be used for epidemiological studies of occupational groups exposed to RF fields. © The Author 2016. Published by Oxford University Press.
Androulidakis, Iosif I
This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used “against” users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. The information on denial of service attacks has been thoroughly updated for the new edition. Also, a major addition to this edition is a section discussing software defined radio and open source tools for mobile phones.
Along with the progress of times and the development of science and technology, mobile devices have become more and more popular. At the same time, an increasing number of Wi-Fi networks are being built for the demand of mobile devices. Therefore, the security between mobile devices and Wi-Fi networks became a main object in the IT area. The purpose of the thesis is to analyze security threats and give relative advises for all the mobile device and Wi-Fi network users. The thesis mainly ta...
This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with NFC tags and on card emulation. The current security architectures of NFC-enabled cellular phones are evaluated with regard to the identified security aspects.
...' securities company pending determination of application. 270.6b-1 Section 270.6b-1 Commodity and Securities... 1940 § 270.6b-1 Exemption of employees' securities company pending determination of application. Any... Act (54 Stat. 801; 15 U.S.C. 80a-6) shall be exempt, pending final determination of such application...
... Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR... Interpretive bulletin relating to investments by employee benefit plans in securities of registered investment.... That section provides that an investment by an employee benefit plan in securities issued by an...
Through the in-depth study on the existing mobile e-commerce and WAP protocols, this paper presents a security solution of e-commerce system based on WPKI, and describes its implementation process and specific implementation details. This solution uniformly distributes the key used by the various participating entities , to fully ensure the confidentiality, authentication, fairness and integrity of mobile e-commerce payments, therefore has some pract ical value for improving the security of e-commerce system.
van Cleeff, A.
In the interconnected world that we live in, traditional security barriers are broken down. Developments such as outsourcing, increased usage of mobile devices and wireless networks each cause new security problems. To address the new security threats, a number of solutions have been suggested,
Choudhri, Asim F; Chatterjee, Arindam R; Javan, Ramin; Radvany, Martin G; Shih, George
The end-user of mobile device apps in the practice of clinical radiology should be aware of security measures that prevent unauthorized use of the device, including passcode policies, methods for dealing with failed login attempts, network manager-controllable passcode enforcement, and passcode enforcement for the protection of the mobile device itself. Protection of patient data must be in place that complies with the Health Insurance Portability and Accountability Act and U.S. Federal Information Processing Standards. Device security measures for data protection include methods for locally stored data encryption, hardware encryption, and the ability to locally and remotely clear data from the device. As these devices transfer information over both local wireless networks and public cell phone networks, wireless network security protocols, including wired equivalent privacy and Wi-Fi protected access, are important components in the chain of security. Specific virtual private network protocols, Secure Sockets Layer and related protocols (especially in the setting of hypertext transfer protocols), native apps, virtual desktops, and nonmedical commercial off-the-shelf apps require consideration in the transmission of medical data over both private and public networks. Enterprise security and management of both personal and enterprise mobile devices are discussed. Finally, specific standards for hardware and software platform security, including prevention of hardware tampering, protection from malicious software, and application authentication methods, are vital components in establishing a secure platform for the use of mobile devices in the medical field. © RSNA, 2015.
Capkun, Srdjan; Srivastava, Mani; Cagalj, Mario
localization based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques: ultrasonic or radio, based on received signal strength or signal time of flight. Through several examples we show how this approach can be used to secure nodecentric...
Feng, Wei; Yan, Zheng; Zhang, Hengrun; Zeng, Kai; Xiao, Yu; Hou, Thomas
With the popularity of sensor-rich mobile devices (e.g., smart phones and wearable devices), Mobile Crowdsourcing (MCS) has emerged as an effective method for data collection and processing. Compared with traditional Wireless Sensor Networking (WSN), MCS holds many advantages such as mobility, scalability, cost-efficiency, and human intelligence. However, MCS still faces many challenges with regard to security, privacy and trust. This paper provides a survey of these challenges and discusses ...
Tatli, Emin Islam
The support of location computation on mobile devices (e.g. mobile phones, PDAs) has enabled the development of context-aware and especially location-aware applications (e.g. Restaurant Finder, Friend Finder) which are becoming the new trend for future software applications. However, fears regarding security and privacy are the biggest barriers against their success. Especially, mobile users are afraid of the possible threats against their private identity and personal data. Within the M-Busi...
session, he drafts one more email to his therapist complaining about stress prior to retiring for the night. The next day, when he wakes up and returns... telecommuters or a web server to make internal information available to employees are identified upfront in the requirements analysis. The results of
Gorski, Adam L.
The smart mobile device market penetration reached 50% and has been increasing an average of 39% per year in the United States. More than 70% of the smart mobile device owners use such devices for personal and work activities. The problem was the lack of management's understanding of the effect smart mobile device use has on how employees work…
The secure messaging space is alive with new innovations that are moving the industry forward. Key in this space is the push toward moving secure messaging to the cloud and pushing it out to mobile devices. Among the examples are solutions that allow physicians to receive encrypted email on mobile devices, as well as ones that allow doctors to securely text-message each other to coordinate care. However, the security issues around these emerging technologies in this very active space must be further explored.
Le Vinh , Thinh
As living in the cyber era, we admit that a dozen of new technologies have been born every day with the promises that making a human life be more comfortable, convenient and safe. In the forest of new technologies, mobile computing is raise as an essential part of human life. Normally, mobile devices have become the best companions in daily activities. They have served us from the simple activities like entertainment to the complicated one as business operations. As playing the important role...
Full Text Available A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator to delegate its signing right to another entity (proxy to sign some specified messages on behalf of the delegator. However, the proxy signatures are often used in scenarios where the signing is done in an insecure environment, for example, the remote server of a mobile agent system. In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states. The proxy signatures which are secure in the traditional security models obviously cannot provide such security. Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems.
Heber, Elena; Lehr, Dirk; Ebert, David Daniel; Berking, Matthias; Riper, Heleen
Background: Work-related stress is highly prevalent among employees and is associated with adverse mental health consequences. Web-based interventions offer the opportunity to deliver effective solutions on a large scale; however, the evidence is limited and the results conflicting. Objective: This randomized controlled trial evaluated the efficacy of guided Web-and mobile-based stress management training for employees. Methods: A total of 264 employees with elevated symptoms of stress (Perce...
... million for training projects. Similarly, under the Intercity Bus Security Grant Program (IBSGP), which... related to the security elements in Table 1, per employee? (Please indicate whether this includes travel... on the size and scope of the exercise, including the phases of an exercise, travel expenses for...
Zufiria, Pedro J; Pastor-Escuredo, David; Úbeda-Medina, Luis; Hernandez-Medina, Miguel A; Barriales-Valbuena, Iker; Morales, Alfredo J; Jacques, Damien C; Nkwambi, Wilfred; Diop, M Bamba; Quinn, John; Hidalgo-Sanchís, Paula; Luengo-Oroz, Miguel
We propose a framework for the systematic analysis of mobile phone data to identify relevant mobility profiles in a population. The proposed framework allows finding distinct human mobility profiles based on the digital trace of mobile phone users characterized by a Matrix of Individual Trajectories (IT-Matrix). This matrix gathers a consistent and regularized description of individual trajectories that enables multi-scale representations along time and space, which can be used to extract aggregated indicators such as a dynamic multi-scale population count. Unsupervised clustering of individual trajectories generates mobility profiles (clusters of similar individual trajectories) which characterize relevant group behaviors preserving optimal aggregation levels for detailed and privacy-secured mobility characterization. The application of the proposed framework is illustrated by analyzing fully anonymized data on human mobility from mobile phones in Senegal at the arrondissement level over a calendar year. The analysis of monthly mobility patterns at the livelihood zone resolution resulted in the discovery and characterization of seasonal mobility profiles related with economic activities, agricultural calendars and rainfalls. The use of these mobility profiles could support the timely identification of mobility changes in vulnerable populations in response to external shocks (such as natural disasters, civil conflicts or sudden increases of food prices) to monitor food security.
Pedro J Zufiria
Full Text Available We propose a framework for the systematic analysis of mobile phone data to identify relevant mobility profiles in a population. The proposed framework allows finding distinct human mobility profiles based on the digital trace of mobile phone users characterized by a Matrix of Individual Trajectories (IT-Matrix. This matrix gathers a consistent and regularized description of individual trajectories that enables multi-scale representations along time and space, which can be used to extract aggregated indicators such as a dynamic multi-scale population count. Unsupervised clustering of individual trajectories generates mobility profiles (clusters of similar individual trajectories which characterize relevant group behaviors preserving optimal aggregation levels for detailed and privacy-secured mobility characterization. The application of the proposed framework is illustrated by analyzing fully anonymized data on human mobility from mobile phones in Senegal at the arrondissement level over a calendar year. The analysis of monthly mobility patterns at the livelihood zone resolution resulted in the discovery and characterization of seasonal mobility profiles related with economic activities, agricultural calendars and rainfalls. The use of these mobility profiles could support the timely identification of mobility changes in vulnerable populations in response to external shocks (such as natural disasters, civil conflicts or sudden increases of food prices to monitor food security.
primitives for instance synchronous operations Nondeterminism and Privacy Now suppose we introduce nondeterminism via a simple concurrent language...code setting is that the only observable events are those that can be observed from within a mobile program using language primitives and any host...Possibilistic NI is given in It uses a main thread and two triggered threads each with a busy wait loop implementing a semaphore to copy every bit of
Luu, Brian B.; Gopaul, Richard D.
Mobile Internet Protocol (IP) Local Area Network (LAN) is a technique, developed by the U.S. Army Research Laboratory, which allows a LAN to be IP mobile when attaching to a foreign IP-based network and using this network as a means to retain connectivity to its home network. In this paper, we describe a technique that uses Open Secure Shell (OpenSSH) software to ensure secure, encrypted transmission of a mobile LAN's network traffic. Whenever a mobile LAN, implemented with Mobile IP LAN, moves to a foreign network, its gateway (router) obtains an IP address from the new network. IP tunnels, using IP encapsulation, are then established from the gateway through the foreign network to a home agent on its home network. These tunnels provide a virtual two-way connection to the home network for the mobile LAN as if the LAN were connected directly to its home network. Hence, when IP mobile, a mobile LAN's tunneled network traffic must traverse one or more foreign networks that may not be trusted. This traffic could be subject to eavesdropping, interception, modification, or redirection by malicious nodes in these foreign networks. To protect network traffic passing through the tunnels, OpenSSH is used as a means of encryption because it prevents surveillance, modification, and redirection of mobile LAN traffic passing across foreign networks. Since the software is found in the public domain, is available for most current operating systems, and is commonly used to provide secure network communications, OpenSSH is the software of choice.
... of personal securities trading transactions? 551.150 Section 551.150 Banks and Banking OFFICE OF... TRANSACTIONS Securities Trading Policies and Procedures § 551.150 How do my officers and employees file reports of personal securities trading transactions? An officer or employee described in § 551.140(d) must...
Østergaard, Christian Richter; Drejer, Ina
This paper analyzes the role of mobility and employee-driven relations for firms' collaboration on innovation with specific universities. It is argued that personal employee-driven relations and geographical proximity are important determinants for which universities firms decide to collaborate...... with. Therefore, hiring and mobility of employees can help explain why firms collaborate with specific universities or discontinue collaboration. It is argued that the university of graduation and the field of study of a firm's employees help explain why it collaborate with a specific university....... Furthermore, the paper also addresses the importance of developing relations and collaborative experience over time for university-industry collaboration by studying employee-driven relations and collaboration patterns for a large sample of firms over two consecutive Community Innovation Surveys covering...
S. C. Dutta; Sudha Singh; D. K. Singh
This paper is to establish Ad Hoc network in mobile phones and start fully secured full duplex communication in any situation. This type of communication will be cost effective and it will be fastest way of communication in case of any server failure or server error.
Full Text Available Network security is one of the most important issues in mobile sensor networks (MSNs. Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA is proposed to resist malicious attacks by using mobile nodes’ dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.
Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang
Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.
Full Text Available The Mobile Broadband Association has developed the MIS and MISAUTH protocols as link-layer fast authentication protocols. A combination of MIS and MISAUTH protocols, called as MISP, provides secure and fast connection for a wireless access network, but it has been reported that MISP creates a weak session key and suffers from a denial-of-service attack. In addition, a transaction with an authentication server that is required for every authentication is considered as a delay factor during handovers. In this paper, we present an improvement of MISP that utilizes the fast handover approach of Fast Mobile IPv6 and minimizes an involvement of the authentication server while eliminating identified security drawbacks of MISP. The formal security analysis is performed to verify the correctness of the proposed scheme. Moreover, the handover performance of the proposed scheme is compared with an existing scheme.
issues, the article analyses the MPs by looking at the strategic significance of migration in the context of EU’s foreign and security policy cooperation with the five Arab Mediterranean states. The MPs are seen as an important element in the EU’s overall migration strategy, but have been met......The present article discusses the negotiating and implementing of Mobility Partnership (MP) agreements between the European Union (EU) and Egypt, Jordan, Lebanon, Morocco, and Tunisia. Taking its starting point in the conceptual notions of subregional security complexes and non-traditional security...... with reluctance by the Arab partner states. The article concludes that so far only to a limited degree have the MPs developed into well-functioning tools for managing the migration policies of the EU and its partners states, and that they seem mainly to play a role as instruments for the EU’s foreign and security...
Supraptono, Eko; Sudana, I. Made; Rini, Sri Hastuti Eko
The purposes of this report are: 1) to know how is the working mobility for garment employees, 2) to analyze the factors that caused working mobility, and new working orientation who searched by garment employees. This research is using qualitative and quantitative approach. The Informant in this research is gotten by purposive action. The data collecting techniques are observations, interviews, and documentations. The data analysis is using descriptive qualitative analysis by observing every aspect. The result of research shows that the criteria of the labor migration was high. It can be seen from Ungaran Sari Garment Company. The length of the migration is high, between 1 until 6 months. and the types of new job that searched by the employees is appropriate job vacancy with their competence. Some factors that influence the working mobility are mental of the workers and company management system. The orientation of the new job is feeling comfortable while working.
Full Text Available In modern times, the mobility of people and data are becoming essential to business. An important role in this development is played by wireless technology, but the risks to users of wireless technology have increased as the service has become more popular. As mobility and the use of smaller, personal devices increases, it is obvious that the security must be implemented as close to the source as possible, meaning in all end devices, but such solutions are difficult to deploy and very hard to manage. Wireless security is just an aspect of computer security, however organizations may be particularly vulnerable to security breaches. There are effective countermeasures (like disabling open switchports during switch configuration and VLAN configuration to limit network access that are available to protect both the network and the information it contains, but such countermeasures must be applied uniformly to all network devices. Consequently, a security policy must be described and written down to allow managers as well as technicians to react correctly to undesired circumstances
Full Text Available The paper aims to assess the use of genetic algorithms for training neural networks used in secured Business Intelligence Mobile Applications. A comparison is made between classic back-propagation method and a genetic algorithm based training. The design of these algorithms is presented. A comparative study is realized for determining the better way of training neural networks, from the point of view of time and memory usage. The results show that genetic algorithms based training offer better performance and memory usage than back-propagation and they are fit to be implemented on mobile devices.
motivated research in behavior grading systems . Peer-to-peer eCommerce appli- cations such as eBay, Amazon, uBid, and Yahoo have performed research that...Security in Mobile Ad Hoc Networks”. IEEE Security & Privacy , 72–75, 2008. 15. Chakeres, ID and EM Belding-Royer. “AODV Routing Protocol Implementa...Detection System”. Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy , 240–250. 1992. 21. Devore, J.L. and N.R. Farnum
... Federal Register, and are available on-line at the Social Security Administration's Internet site, http... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Suits against the Social Security... SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.1 Suits against the Social Security Administration and its...
Arora, Shifali; Yttri, Jennifer; Nilse, Wendy
Research on the use of mobile technologies for alcohol use problems is a developing field. Rapid technological advances in mobile health (or mHealth) research generate both opportunities and challenges, including how to create scalable systems capable of collecting unprecedented amounts of data and conducting interventions-some in real time-while at the same time protecting the privacy and safety of research participants. Although the research literature in this area is sparse, lessons can be borrowed from other communities, such as cybersecurity or Internet security, which offer many techniques to reduce the potential risk of data breaches or tampering in mHealth. More research into measures to minimize risk to privacy and security effectively in mHealth is needed. Even so, progress in mHealth research should not stop while the field waits for perfect solutions.
In this study, the Big Five factor model of personality traits theory was tested for its ability to predict or explain Employee Information Security Behavior (EISB), when Generational Cohort (GCOHORT) moderated the relationship between the five factors of personality and EISB. The independent variables (IVs) Extraversion, Agreeableness,…
Ivancic, William D.; Paulsen, Phillip E.
The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and
Jong Hyuk Park
Full Text Available Long Term Evolution (LTE and Long Term Evolution-Advanced (LTE-A support a better data transmission service than 3G dose and are globally commercialized technologies in a cyber world that is essential for constructing a future mobile environment, since network traffics have exponentially increased as people have started to use more than just one mobile device. However, when User Equipment (UE is executing initial attach processes to access LTE networks, there is a vulnerability in which identification parameters like International Mobile Subscriber Identity (IMSI and Radio Network Temporary Identities (RNTI are transmitted as plain texts. It can threat various services that are commercialized therewith in a cyber world. Therefore, a security scheme is proposed in this paper where identification parameters can be securely transmitted and hidden in four cases where initial attach occurs between UE and Mobility Management Entity (MME. The proposed security scheme not only supports encrypted transmission of identification parameters but also mutual authentication between Evolved Node B (eNB and MME to make a secure cyber world. Additionally, performance analysis results using an OPNET simulator showed the satisfaction of the average delay rate that is specified in LTE standards.
... security tax. 1.31-2 Section 1.31-2 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY INCOME TAX INCOME TAXES Credits Against Tax § 1.31-2 Credit for “special refunds” of employee social security tax. (a) In general. (1) In the case of an employee receiving wages from more than one employer...
Full Text Available Ad hoc wireless network consists of a set of wireless nodes communicating with each other without a pre-defined infrastructure. They communicate by forwarding packets which can reach wireless nodes that do not exist in the range of the direct radio transmission. Designing ad hoc network routing protocols is a challenging task because of its decentralized infrastructure which makes securing ad hoc networks more and more challenging. Dynamic Source Routing (DSR protocol is a popular routing protocol designed for use in wireless ad hoc networks. Mobile agent is a promising technology used in diverse fields of network applications. In this paper, we try to implement DSR using mobile agents for securing this type of wireless network. Hybrid encryption technique (symmetric key encryption/public key encryption is used to improve performance; where symmetric keys are used to encrypt routing data to authenticate and authorize node sending data, while, public keys are used for the exchange of symmetric keys between nodes. We found that DSR may be secured using mobile agents with competitive performance.
Nanz, Sebastian; Hankin, Chris
processes and the network's connectivity graph, which may change independently from protocol actions. We identify a property characterising an important aspect of security in this setting and express it using behavioural equivalences of the calculus. We complement this approach with a control flow analysis......We present a framework for specification and security analysis of communication protocols for mobile wireless networks. This setting introduces new challenges which are not being addressed by classical protocol analysis techniques. The main complication stems from the fact that the actions...... of intermediate nodes and their connectivity can no longer be abstracted into a single unstructured adversarial environment as they form an inherent part of the system's security. In order to model this scenario faithfully, we present a broadcast calculus which makes a clear distinction between the protocol...
Full Text Available Mobile ad hoc networks (MANETs are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.
Paramasivan, B; Kaliappan, M
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.
Veen, K. van; Geerlings, W.S.J.; Popping, R.
The study of organizational careers of employees developed in the last 20 years into an important branch of social mobility research. However, a major problem in this branch is the presence of many organizational mechanisms, which are theoretical interesting though hard to study simultaneously in
Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min
Objectives The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. Methods The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. Results From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. Conclusions This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another. PMID:22844648
Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min; Yoo, Sooyoung
The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another.
Ma, Bing; Liu, Shanshi; Liu, Donglai; Wang, Hongchun
This research focuses on investigating whether organisational identification mediates the effects of job security on in-role behaviour and extra-role behaviour and how these mediation mechanisms differ according to gender. Through analysing 212 supervisor-subordinate dyads from a Chinese air transportation group, the research indicated that organisational identification partially mediated the effect of job security on in-role behaviour and fully mediated the effect of job security on extra-role behaviour. A multi-group analysis also showed that there were significant differences between male and female employees in these relationships. In addition, moderated mediation analyses showed that gender moderated the indirect effects of job security on in-role behaviour and extra-role behaviour through organisational identification. Limitations and implications of these findings are discussed. © 2015 International Union of Psychological Science.
Leom, Ming Di; Choo, Kim-Kwang Raymond; Hunt, Ray
Mobile devices have become ubiquitous in almost every sector of both private and commercial endeavors. As a result of such widespread use in everyday life, many users knowingly and unknowingly save significant amounts of personal and/or commercial data on these mobile devices. Thus, loss of mobile devices through accident or theft can expose users-and their businesses-to significant personal and corporate cost. To mitigate this data leakage issue, remote wiping features have been introduced to modern mobile devices. Given the destructive nature of such a feature, however, it may be subject to criminal exploitation (e.g., a criminal exploiting one or more vulnerabilities to issue a remote wiping command to the victim's device). To obtain a better understanding of remote wiping, we survey the literature, focusing on existing approaches to secure flash storage deletion and provide a critical analysis and comparison of a variety of published research in this area. In support of our analysis, we further provide prototype experimental results for three Android devices, thus providing both a theoretical and applied focus to this article as well as providing directions for further research. © 2016 American Academy of Forensic Sciences.
Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.
Full Text Available The aim of this study is to measure Turkish government employees’ awareness of cyber security and cyber space elements. Participants were 71 Turkish public employees working for various ministries. Both qualitative and quantitative research methods were used to get the most detailed information from the participants. A survey was administered to cyber security officers in chosen state institutions. For qualitative research, open-ended questions were administered to the participants. Reliability and validity issues were established for both surveys. Results show that employees have enough information about cyber security and cyber warfare. Findings clearly suggests that cyber defense policy should be planned in coordination with other state institutions and experiences should be shared. In order to create feasible and realistic cyber security policy at institutional level, experts at cyber security must be trained, hired and help must be requested from specialized individuals and institutions. This study recommends that rapid reaction teams (RRT should be established to take care of cyber systems, to react against cyber breaches in time, to alert staff for cyber-attacks in order to establish effective recovery.
Ilmakunnas, Pekka; Bockerman, Petri; Johansson, Edvard
We examine the effects of establishment- and industry-level labor market turnover on employees’ well-being. The linked employer-employee panel data contain both survey information on employees’ subjective well-being and comprehensive register-based information on job and worker flows. Labor market turbulence decreases well-being as experienced job satisfaction and satisfaction with job security are negatively related to the previous year’s flows. We test for the existence of compensating wage...
Tzvetkov, Vesselin Dimitrov
The classical networks for broadcast, telephony and data are converging to services on the Next Generation Networks (NGN), which are introduced by all major Service Providers (SP). Major requirements on the future IP network are security and mobility, which are reflection of the Internet’s importance and wide use of portable smart devices. Secure IP mobility is the focus of this thesis, i.e. how the user can move through different access networks whilst maintaining uninterrupted and secure IP...
Casteel, Carri; Peek-Asa, Corinne; Nocera, Maryalice; Smith, Jamie B; Blando, James; Goldmacher, Suzi; O'Hagan, Emily; Valiante, David; Harrison, Robert
This study examines changes in violent event rates to hospital employees before and after enactment of the California Hospital Safety and Security Act in 1995. We compared pre- and post-initiative employee assault rates in California (n = 116) emergency departments and psychiatric units with those in New Jersey (n = 50), where statewide workplace violence initiatives do not exist. Poisson regression with generalized estimating equations was used to compare assault rates between a 3-year pre-enactment period (1993-1995) and a 6-year post-enactment period (1996-2001) using New Jersey hospitals as a temporal control. Assault rates among emergency department employees decreased 48% in California post-enactment, compared with emergency department employee assault rates in New Jersey (rate ratio [RR] = 0.52, 95% confidence interval [CI]: 0.31, 0.90). Emergency department employee assault rates decreased in smaller facilities (RR = 0.46, 95% CI: 0.21, 0.96) and for-profit-controlled hospitals (RR = 0.39, 95% CI: 0.19, 0.79) post-enactment. Among psychiatric units, for-profit-controlled hospitals (RR = 0.41, 95% CI: 0.19, 0.85) and hospitals located in smaller communities (RR = 0.44, 95% CI: 0.21, 0.92) experienced decreased assault rates post-enactment. Policy may be an effective method to increase safety to health care workers.
Full Text Available In this communication, we first show that the privacy-preserving roaming protocol recently proposed for mobile networks cannot achieve the claimed security level. Then we suggest an improved protocol to remedy its security problems.
The Independent Locking Securement System Project (ILS System Project) is a : successful attempt to respond to the transportation community's need for a : "universal" securement/restraint system that will accommodate most wheeled : mobility aids, inc...
Full Text Available One of the chief computer security problems is not the long list of viruses and other potential vulnerabilities, but the vast number of systems that continue to be easy prey, as their system administrators or owners simply are not able to keep up with all of the available patches, updates, or needed configuration changes in order to protect them from those known vulnerabilities. Even up-to-date systems could become vulnerable to attacks, due to inappropriate configuration or combined used of applications and services. Our mobile agent-based security tool (MAST is designed to bridge this gap, and provide automated methods to make sure that all of the systems in a specific domain or network are secured and up-to-date with all patches and updates. The tool is also designed to check systems for misconfigurations that make them vulnerable. Additionally, this user interface is presented in a domain knowledge model known as a Concept Map that provides a continuous learning experience for the system administrator.
can cause harm) to the physical well-being of or jeopardize the security of the employee , co-workers, customers or the general public through a lapse...DEPARTMENT OF THE ARMY US ARMY PUBLIC HEALTH CENTER 5158 BLACKHAWK ROAD ABERDEEN PROVING GROUND MARYLAND 21010-5403 Directorate of Clinical... Employees in Critical Safety or Security Positions and Positions with Safety Sensitive Duties. 1. REFERENCES. A. Army Regulation 40-5, Preventive
Hodson, Robert F.; Munk, Christopher; Helble, Adelle; Press, Martin T.; George, Cory; Johnson, David
The National Aeronautics and Space Administration (NASA) Game Changing Development (GCD) program manages technology projects across all NASA centers and reports to NASA headquarters regularly on progress. Program stakeholders expect an up-to-date, accurate status and often have questions about the program's portfolio that requires a timely response. Historically, reporting, data collection, and analysis were done with manual processes that were inefficient and prone to error. To address these issues, GCD set out to develop a new business automation solution. In doing this, the program wanted to leverage the latest information technology platforms and decided to utilize traditional systems along with new cloud-based web services and gaming technology for a novel and interactive user environment. The team also set out to develop a mobile solution for anytime information access. This paper discusses a solution to these challenging goals and how the GCD team succeeded in developing and deploying such a system. The architecture and approach taken has proven to be effective and robust and can serve as a model for others looking to develop secure interactive mobile business solutions for government or enterprise business automation.
Full Text Available In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.
Full Text Available This paper present and implement a Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Application. In the developing process is used a Windows Phone 7 application that interact with a WCF Web Service and a database. The types of Business Intelligence Mobile Applications are presented. The Windows mobile devices security and restrictions are presented. The namespaces and security algorithms used in .NET Compact Framework for assuring the application security are presented. The proposed architecture is showed underlying the flows between the application and the web service.
Recently, a communication protocol called controlled bidirectional quantum secret direct communication for mobile networks was proposed by Chou et al (2014 Mobile Netw. Appl. 19 121). We study the security of the proposed communication protocol and find that it is not secure. The controller, Telecom Company, may eavesdrop secret messages from mobile devices without being detected. Finally, we give a possible improvement of the communication protocol. (paper)
Abdelmorhit E. Rhazi; Samuel Pierre; Hanifa Boucheneb
The main challenge when deploying mobile agent environments pertains to security issues concerning mobile agents and their executive platform. This paper proposes a secure protocol which protects mobile agents against attacks from malicious hosts in these environments. Protection is based on the perfect cooperation of a sedentary agent running inside a trusted third host. Results show that the protocol detects several attacks, such as denial of service, incorrect execution and re-execution of...
Gu, Jia; Churchill, Daniel; Lu, Jie
Employees' informal learning in the workplace warrants more attention, and such learning could benefit from the latest mobile technologies such as Web 2.0 applications, which have increasingly been utilized and have the potential to enhance learning outcomes. This multiple-case study examined the impact of mobile Web 2.0 applications on…
Trabelsi, Zouheir; Al Matrooshi, Mohammed; Al Bairaq, Saeed; Ibrahim, Walid; Masud, Mohammad M.
As mobile devices grow increasingly in popularity within the student community, novel educational activities and tools, as well as learning approaches can be developed to get benefit from this prevalence of mobile devices (e.g. mobility and closeness to students' daily lives). Particularly, information security education should reflect the current…
Patten, Karen P.; Harris, Mark A.
Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading…
Full Text Available With the rapid development of mobile devices and wireless technologies, mobile social networks become increasingly available. People can implement many applications on the basis of mobile social networks. Secure computation, like exchanging information and file sharing, is one of such applications. Fairness in secure computation, which means that either all parties implement the application or none of them does, is deemed as an impossible task in traditional secure computation without mobile social networks. Here we regard the applications in mobile social networks as specific functions and stress on the achievement of fairness on these functions within mobile social networks in the presence of two rational parties. Rational parties value their utilities when they participate in secure computation protocol in mobile social networks. Therefore, we introduce reputation derived from mobile social networks into the utility definition such that rational parties have incentives to implement the applications for a higher utility. To the best of our knowledge, the protocol is the first fair secure computation in mobile social networks. Furthermore, it finishes within constant rounds and allows both parties to know the terminal round.
Costa, Gabriele; Dragoni, Nicola; Lazouski, Aliaksandr
program our architecture updates the trust level associated with the contract provider. We also present a possible application of our framework in the scenario of a mobile application marketplace, e.g., Apple AppStore, Cydia, Android Market, that, nowadays, are considered as one of the most attractive e......Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present the an extension of S×C, called Security-by-Contract-with-Trust (S×C×T). Indeed, we enrich the S×C architecture by integrating a trust model and adding new modules......-commerce activity for both mobile application developers and industries of mobile devices. Since the number of applications increases, Mobile Applications Marketplace (MAMp) sets up recommendation systems that rank and highlight mobile applications by category, social activity, etc. The S×C×T framework we propose...
Whipple, Elizabeth C; Allgood, Kacy L; Larue, Elizabeth M
The use of mobile devices are ubiquitous in medical-care professional settings, but information on privacy and security concerns of mobile devices for medical students is scarce. To gain baseline information about third-year medical students' mobile device use and knowledge of privacy and security issues concerning mobile devices. We surveyed 67 third-year medical students at a Midwestern university on their use of mobile devices and knowledge of how to protect information available through mobile devices. Students were also presented with clinical scenarios to rate their level of concern in regards to privacy and security of information. The most used features of mobile devices were: voice-to-voice (100%), text messaging (SMS) (94%), Internet (76.9%), and email (69.3%). For locking of one's personal mobile phone, 54.1% never physically lock their phone, and 58% never electronically lock their personal PDA. Scenarios considering definitely privacy concerns include emailing patient information intact (66.7%), and posting de-identified information on YouTube (45.2%) or Facebook (42.2%). As the ease of sharing data increases with the use of mobile devices, students need more education and training on possible privacy and security risks posed with mobile devices.
Full Text Available Mobile agents are smart programs that migrate from one platform to another to perform the user task. Mobile agents offer flexibility and performance enhancements to systems and service real-time applications. However, security in mobile agent systems is a great concern. In this paper, we propose a novel Broadcast based Secure Mobile Agent Protocol (BROSMAP for distributed service applications that provides mutual authentication, authorization, accountability, nonrepudiation, integrity, and confidentiality. The proposed system also provides protection from man in the middle, replay, repudiation, and modification attacks. We proved the efficiency of the proposed protocol through formal verification with Scyther verification tool.
Full Text Available Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs are used to prevent wireless security threats. However, these are not an ideal security measure for businesses that utilize mobile devices because they do not take account of temporal-spatial and role information factors. Therefore, in this paper, an efficient and secure mobile-IPS (m-IPS is proposed for businesses utilizing mobile devices in mobile environments for human-centric computing. The m-IPS system incorporates temporal-spatial awareness in human-centric computing with various mobile devices and checks users’ temporal spatial information, profiles, and role information to provide precise access control. And it also can extend application of m-IPS to the Internet of things (IoT, which is one of the important advanced technologies for supporting human-centric computing environment completely, for real ubiquitous field with mobile devices.
Improving the security of the Hwang-Su protocol for mobile networks. Miloud Ait ... But, it is threatened by weak ... Wireless networks (IEEE standard 802.11 1996, Gast 2005) have allowed computer systems to exchange data without cable.
Elena Vyacheslavovna Elistratova
Full Text Available The methodology is developed for carrying out the test of breaking into internal storages of mobile operational system Google Android in order to detect security threats for personal data.
The mobile networks are experiencing a growing success. This success is mainly due to the fact that these networks providing the mobility of users, the transmission of data through open air and the requirement of low power. But, it is threatened by weak security, especially at the level of authentication. Hwang and Su have ...
T-D. Truong (Thanh-Dam)
textabstractTransnational migration and its implications for human security as a policy field constitute one of the most complex issues of our time. Current experiences of displacement and security spans between a cyber world characterized by hyper mobility of finance, technology, information and
Improving the security of the Hwang-Su protocol for mobile networks. Miloud Ait Hemad, My ... Furthermore, the wireless data channel is low data rate. These restrictions have an ..... Research in Security and Privacy. Wu T. Y. and Tsen Y. M., ...
Company data on mobile devices is vulnerable and subject to unauthorized access. The general problem is that information security incidents compromise the integrity and authenticity of electronic data. The specific problem is that organizational security policies, procedures, and training do not adequately address the vulnerabilities associated…
Lindbäck, Karin; Blommé, Carl
Mobile payment is a new payment method that is being introduced on the Swedish market, but has not yet come to its breakthrough. This thesis investigates the attitude the Swedish consumer has towards mobile payment. Based on previous surveys and theory, three main attributes, security, privacy and convenience, were chosen to represent the attitude of the consumer towards mobile payment. In order to analyze the data obtained from the surveys conducted, the multi-attribute attitude model was us...
Ali A Altalbe
The purpose of this paper is to introduce a research proposal designed to explore the network securityissues concerning mobile devices protection. Many threats exist and they harm not only computers but handheld devices as well. The mobility of phones and their excessive use make them more vulnerable. The findings suggest a list of protections that can provide high level of security for new mobile devices.
Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kusumoto, Masahiko; Kaneko, Masahiro; Moriyama, Noriyuki
We have developed an external storage system by using secret sharing scheme and tokenization for regional medical cooperation, PHR service and information preservation. The use of mobile devices such as smart phones and tablets will be accelerated for a PHR service, and the confidential medical information is exposed to the risk of damage and intercept. We verified the transfer rate of the sending and receiving of data to and from the external storage system that connected it with PACS by the Internet this time. External storage systems are the data centers that exist in Okinawa, in Osaka, in Sapporo and in Tokyo by using secret sharing scheme. PACS continuously transmitted 382 CT images to the external data centers. Total capacity of the CT images is about 200MB. The total time that had been required to transmit was about 250 seconds. Because the preservation method to use secret sharing scheme is applied, security is strong. But, it also takes the information transfer time of this system too much. Therefore, DICOM data is masked to the header information part because it is made to anonymity in our method. The DICOM data made anonymous is preserved in the data base in the hospital. Header information including individual information is divided into two or more tallies by secret sharing scheme, and preserved at two or more external data centers. The token to relate the DICOM data anonymity made to header information preserved outside is strictly preserved in the token server. The capacity of header information that contains patient's individual information is only about 2% of the entire DICOM data. This total time that had been required to transmit was about 5 seconds. Other, common solutions that can protect computer communication networks from attacks are classified as cryptographic techniques or authentication techniques. Individual number IC card is connected with electronic certification authority of web medical image conference system. Individual number IC
Kainda , Ronald; Flechais , Ivan; Roscoe , A. W.
International audience; Protocols for bootstrapping security in ad hoc mobile device interactions rely on users' ability to perform specific tasks such as transferring or comparing fingerprints of information between devices. The size of fingerprints depends on the level of technical security required by a given application but, at the same time, is limited by users' inability to deal with large amounts of data with high levels of accuracy. Large fingerprints provide high technical security b...
Meyer, Ulrike; Tschofenig, Hannes; Karagiannis, Georgios; Devetsikiotis, M.; Michailidis, G.
The Internet Engineering Task Force (IETF) has worked on network layer mobility for more than 10 years and a number of RFCs are available by now. Although the IETF mobility protocols are not present in the Internet infrastructure as of today, deployment seems to be imminent since a number of
Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun
With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.
Kim, B. S.; Lee, Y. B.; Choi, Y. S.; Seo, Y. C.; Park, Y. M
The use of a mobile robot system in nuclear radioactive environments has the advantage of watching and inspecting the NPP safety-related equipment systematically and repairing damaged parts efficiently, thereby enhancing the safe operations of NPPs as well as reducing significantly personnel's dose rate to radioactive environment. Key technology achieved through the development of such robotic system can be used for security application and can offer new approaches to many of the tasks faced to the industry as well. The mobile robot system was composed of a mobile subsystem, a manipulator subsystem, a control subsystem, and a sensor subsystem to use in security application and nuclear radioactive environments. The mobile subsystem was adopted to synchro-drive method to improve the mobility of it. And the manipulator subsystem was developed to minimize the weight and easy to control at remote site. Finally, we developed the USB-based robot control system considering the expandability and modularity. The developed mobile robot for inspection and security was experimented for the collision avoidance and autonomous algorithm, and then it was confirmed that the mobile robot was very effective to the security application and inspection of nuclear facilities. (author)
Kim, B. S.; Lee, Y. B.; Choi, Y. S.; Seo, Y. C.; Park, Y. M.
The use of a mobile robot system in nuclear radioactive environments has the advantage of watching and inspecting the NPP safety-related equipment systematically and repairing damaged parts efficiently, thereby enhancing the safe operations of NPPs as well as reducing significantly personnel's dose rate to radioactive environment. Key technology achieved through the development of such robotic system can be used for security application and can offer new approaches to many of the tasks faced to the industry as well. The mobile robot system was composed of a mobile subsystem, a manipulator subsystem, a control subsystem, and a sensor subsystem to use in security application and nuclear radioactive environments. The mobile subsystem was adopted to synchro-drive method to improve the mobility of it. And the manipulator subsystem was developed to minimize the weight and easy to control at remote site. Finally, we developed the USB-based robot control system considering the expandability and modularity. The developed mobile robot for inspection and security was experimented for the collision avoidance and autonomous algorithm, and then it was confirmed that the mobile robot was very effective to the security application and inspection of nuclear facilities. (author)
Full Text Available Mobile communication security techniques are employed to guard the communication between the network entities. Mobile communication cellular systems have become one of the most important communication systems in recent times and are used by millions of people around the world. Since the 1990s, considerable efforts have been taken to improve both the communication and security features of the mobile communications systems. However, these improvements divide the mobile communications field into different generations according to the communication and security techniques such as A3, A5 and A8 algorithms for 2G-GSM cellular system, 3G-authentication and key agreement (AKA, evolved packet system-authentication and key agreement (EPS-AKA, and long term evolution-authentication and key agreement (LTE-AKA algorithms for 3rd generation partnership project (3GPP systems. Furthermore, these generations have many vulnerabilities, and huge security work is involved to solve such problems. Some of them are in the field of the public key cryptography (PKC which requires a high computational cost and more network flexibility to be achieved. As such, the public key infrastructure (PKI is more compatible with the modern generations due to the superior communications features. This paper surveys the latest proposed works on the security of GSM, CDMA, and LTE cellular systems using PKI. Firstly, we present the security issues for each generation of mobile communication systems, then we study and analyze the latest proposed schemes and give some comparisons. Finally, we introduce some new directions for the future scope. This paper classifies the mobile communication security schemes according to the techniques used for each cellular system and covers some of the PKI-based security techniques such as authentication, key agreement, and privacy preserving.
Kumar, Abhinav; Akopian, David; Agaian, Sos; Creutzburg, Reiner
Modern mobile devices are some of the most technologically advanced devices that people use on a daily basis and the current trends indicate continuous growth in mobile phone applications. Nowadays phones are equipped with cameras that can capture still images and video, they are equipped with software that can read, convert, manipulate, communicate and save multimedia in multiple formats. This tremendous progress increased the volumes of communicated sensitive information which should be protected against unauthorized access. This paper discusses two general approaches for data protection, steganography and cryptography, and demonstrates how to integrate such algorithms with a mobile-toserver link being used by many applications.
Because of its wide distribution and ease of use, the mobile phone, as a reliable personal communications channel, offers an excellent basis for the provision of reliable electronic communications services. In Finland, ca. 75% of the citizens have a mobile phone and, at present and most likely also in the future, it is the most widely spread service channel allowing reliable electronic communications. Despite the restricted functions of the mobile phone, the citizens can use the phone also as a communications medium. In 2001, the Finns sent over 1 billion SMS messages. In Finland, TeliaSonera Finland Oyi and the Population Register Centre (PRC) have closed a co-operation agreement with the aim of creating a mobile phone service for the electronic identification of a person. The co-operation launched is a significant development project from the perspective of the citizens. As a result, the consumers will have a new alternative for reliable electronic communications and commerce in data networks in addition to the electronic identification card. In the future, it will be possible to use the services of both public administration and the private sector by means of a mobile phone more reliably than before, without a physical visit, e.g. to a health centre or to another provider of healthcare services. The possibility of identification and signature by a mobile phone allows an easier provision of versatile services irrespective of time and place, because, in addition to voice, text message, and WAP functions, the service can be utilised also in communications services through the Internet, in which case, the mobile phone acts like a card reader. From the perspective of reliable personal mobile communications, the healthcare sector is one of the most significant and challenging application areas.
Nidhi Gupta; Dr. Anurag Dixit
The appearance of software agents has given rise too much discussion of what such an agent is and how it differs from programs in general. An agent is anything that can be viewed as perceiving its environment through sensors & acting upon that environment through actuators. The existing systems can be classified in the context of singleagent systems and multi-agent systems. Mobile agents cantransport themselves from one host to another. Mobile agents have been developed as an extension to and...
Domingo Prieto, Marc; Prieto Blázquez, Josep; Herrera Joancomartí, Jordi; Arnedo Moreno, Joan
Mobile devices have become ubiquitous, allowing the integration of new information from a large range of devices. However, the development of new applications requires a powerful framework which simplifies their construction. JXME is the JXTA implementation for mobile devices using J2ME, its main value being its simplicity when creating peer-to-peer (P2P) applications on limited devices. On that regard, an issue that is becoming very important in the recent times is being able to provide ...
...) sites for physical security and automated inventory missions MDARS was initiated in 1989 to improve the effectiveness of a shrinking guard force, but was quickly expanded to address the intensive...
Full Text Available Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property. The secret information which mobile users carry may be stolen by malicious entities. To guarantee the quality of advanced services, security and privacy would be important issues when users roam within various mobile networks. In this manuscript, an anonymous authentication scheme will be proposed to protect the security of the network system and the privacy of users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also each user’s identity is kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still generate correct bills to charge these anonymous users via a credit-based solution instead of debit-based ones. Furthermore, our protocols also achieve fair privacy which allows the judge to revoke the anonymity and trace the illegal users when they have misused the anonymity property, for example, if they have committed crimes. Finally, in this paper, we also carry out complete theoretical proofs on each claimed security property.
Full Text Available In a distributed environment, where a large number of computers are connected together to enable the large-scale sharing of data and computing resources, agents, especially mobile agents, are the tools for autonomously completing tasks on behalf of their owners. For applications of large-scale mobile agents, security and efficiency are of great concern. In this paper, we present a fast binary dispatch model and corresponding secure route structures for mobile agents dispatched in parallel to protect the dispatch routes of agents while ensuring the dispatch efficiency. The fast binary dispatch model is simple but efficient with a dispatch complexity of O(log2n. The secure route structures adopt the combination of public-key encryption and digital signature schemes and expose minimal route information to hosts. The nested structure can help detect attacks as early as possible. We evaluated the various models both analytically and empirically.
T. R. Khabibullin
Full Text Available The article reviews the most common mistakes made by developers when writing software for mobile platforms which lead to appearing vulnerabilities that allow attackers to perform various types of attacks. The basic principles of defensive programming are presented.
Zhou, Chao; Feng, Renjun; Jiang, Haitao; Huang, Wei; Zhu, Daohua
With the rapid development of social informatization process, the demands of government, enterprise, and individuals for spatial information becomes larger. In addition, the combination of wireless network technology and spatial information technology promotes the generation and development of mobile technologies. In today’s rapidly developed information technology field, network technology and mobile communication have become the two pillar industries by leaps and bounds. They almost absorbed and adopted all the latest information, communication, computer, electronics and so on new technologies. Concomitantly, the network coverage is more and more big, the transmission rate is faster and faster, the volume of user’s terminal is smaller and smaller. What’s more, from LAN to WAN, from wired network to wireless network, from wired access to mobile wireless access, people’s demand for communication technology is increasingly higher. As a result, mobile communication technology is facing unprecedented challenges as well as unprecedented opportunities. When combined with the existing mobile communication network, it led to the development of leaps and bounds. However, due to the inherent dependence of the system on the existing computer communication network, information security problems cannot be ignored. Today’s information security has penetrated into all aspects of life. Information system is a complex computer system, and it’s physical, operational and management vulnerabilities constitute the security vulnerability of the system. Firstly, this paper analyzes the composition of mobile enterprise network and information security threat. Secondly, this paper puts forward the security planning and measures, and constructs the information security structure.
Full Text Available The Proxy Mobile IPv6 (PMIPv6 is a network-based mobility management protocol that allows a Mobile Node(MN connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG. As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.
Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho
The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.
Bijlsma, T.; Kievit, S. de; Sluis, H.J.D. van de; Nunen, E. van; Passchier, I.; Luiijf, H.A.M.
Software is becoming an important part of the innovation for vehicles. In addition, the systems in vehicles become interconnected and also get external connections, to the internet and Vehicular Ad hoc NETworks (VANETs). These trends form a combined security and safety threat, because recent
problem studied Many military applications have the following characteristics: they start from a mobile device (e.g., a night vision goggle...Issue 8, Vol. 65, pp. 6678 - 6691, June 2016. DOI: 10.1109/TVT.2015.2472993  Gartner, “Worldwide smartphone sales to end users by operating system...SECURITY CLASSIFICATION OF: Many military applications have the following characteristics: they start from a mobile device (e.g., a night vision
Full Text Available Software-Defined Networking-based Mobile Networks (SDN-MNs are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.
Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua
Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.
Chen, Sen; Meng, Guozhu; Su, Ting; Fan, Lingling; Xue, Yinxing; Liu, Yang; Xu, Lihua; Xue, Minhui; Li, Bo; Hao, Shuang
Contemporary financial technology (FinTech) that enables cashless mobile payment has been widely adopted by financial institutions, such as banks, due to its convenience and efficiency. However, FinTech has also made massive and dynamic transactions susceptible to security risks. Given large financial losses caused by such vulnerabilities, regulatory technology (RegTech) has been developed, but more comprehensive security risk assessment is specifically desired to develop robust, scalable, an...
Vella, Mark; Computer Science Annual Workshop CSAW’14
Cloud computing nowadays constitutes a substantial portion of new enterprise IT spending. Whether signing up for applications deployed as a service, or outsourcing hosting concerns to third parties, cloud computing is taking us back to the days of the data center. Virtualization is a key enabler technology that enables consolidation of hardware utilization and provides the notion of elastic computing whereby hardware resources are allocated on demand. Mobile devices represent a natural fit to...
Graham, Christopher J.
Success in the future battle space is increasingly dependent on rapid access to the right information. Faced with a shrinking budget, the Government has a mandate to improve intelligence productivity, quality, and reliability. To achieve increased ISR effectiveness, leverage of tactical edge mobile devices via integration with strategic cloud-based infrastructure is the single, most likely candidate area for dramatic near-term impact. This paper discusses security, collaboration, and usability components of this evolving space. These three paramount tenets outlined below, embody how mission information is exchanged securely, efficiently, with social media cooperativeness. Tenet 1: Complete security, privacy, and data integrity, must be ensured within the net-centric battle space. This paper discusses data security on a mobile device, data at rest on a cloud-based system, authorization and access control, and securing data transport between entities. Tenet 2: Lack of collaborative information sharing and content reliability jeopardizes mission objectives and limits the end user capability. This paper discusses cooperative pairing of mobile devices and cloud systems, enabling social media style interaction via tagging, meta-data refinement, and sharing of pertinent data. Tenet 3: Fielded mobile solutions must address usability and complexity. Simplicity is a powerful paradigm on mobile platforms, where complex applications are not utilized, and simple, yet powerful, applications flourish. This paper discusses strategies for ensuring mobile applications are streamlined and usable at the tactical edge through focused features sets, leveraging the power of the back-end cloud, minimization of differing HMI concepts, and directed end-user feedback.teInput=
Toperesu, B-Abee; Van Belle, Jean-Paul
Background: Mobile device adoption is on the rise and people are increasingly using mobile devices as a part of their lives. Studies have shown that people can use mobile devices to perform their work duties from anywhere. Organisations are now exploring ways of enabling and supporting mobility for employees’ mobile devices, including BYOD (Bring-Your-Own-Device) policies. Objective: The objective of this study is to identify the main capabilities required for enterprise mobility. Methods/App...
Chiu, M. T.; Huang, X.; Baird, J.; Gourley, J. R.; Morelli, R.; de Lanerolle, T. R.; Haiti Food Security Monitoring Mobile App Team
Megan Chiu, Jason Baird, Xu Huang, Trishan de Lanerolle, Ralph Morelli, Jonathan Gourley Trinity College, Computer Science Department and Environmental Science Program, 300 Summit Street, Hartford, CT 06106 email@example.com, Jason.firstname.lastname@example.org, email@example.com, firstname.lastname@example.org, email@example.com, firstname.lastname@example.org Price data for Haiti commodities such as rice and potatoes have been traditionally recorded by hand on paper forms for many years. The information is then entered onto computer manually, thus making the process a long and arduous one. With the development of the Haiti Commodity Tracker mobile app, we are able to make this commodity price data recording process more efficient. Officials may use this information for making inferences about the difference in commodity prices and for food distribution during critical time after natural disasters. This information can also be utilized by governments and aid agencies on their food assistance programs. Agronomists record the item prices from several sample sites in a marketplace and compare those results from other markets across the region. Due to limited connectivity in rural areas, data is first saved to the phone's database and then retransmitted to a central server via SMS messaging. The mobile app is currently being field tested by an international NGO providing agricultural aid and support in rural Haiti.
You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki
Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.
Full Text Available Mobility support is an essential part of IPv6 because we have recently seen sharp increases in the number of mobile users. A security weakness in mobility support has a direct consequence on the security of users because it obscures the distinction between devices and users. Unfortunately, a malicious and unauthenticated message in mobility support may open a security hole for intruders by supplying an easy mean to launch an attack that hijacks an ongoing session to a location chosen by the intruder. In this paper, we show how to thwart such a session hijacking attack by authenticating a suspicious message. Although much research has been directed toward addressing similar problems, we contend that our proposed protocol would outperform other proposals that have been advanced. This claim is based on observations that the proposed protocol has strengths such as light computational load, backward compatibility, and dependable operation. The results of in-depth performance evaluation show that our protocol achieves strong security and at the same time requires minimal computational overhead.
Poropatich, Ronald K; Pavliscsak, Holly H; Tong, James C; Little, Jeanette R; McVeigh, Francis L
The U.S. Army Medical Department conducted a pilot mobile health project to determine the requirements for coordination of care for "Wounded Warriors" using mobile messaging. The primary objective was to determine if a secure mobile health (mhealth) intervention provided to geographically dispersed patients would improve contact rates and positively impact the military healthcare system. Over 21 months, volunteers enrolled in a Health Insurance Portability and Accountability Act-compliant, secure mobile messaging initiative called mCare. The study included males and females, 18-61 years old, with a minimum of 60 days of outpatient recovery. Volunteers were required to have a compatible phone. The mhealth intervention included appointment reminders, health and wellness tips, announcements, and other relevant information to this population exchanged between care teams and patients. Provider respondents reported that 85% would refer patients to mCare, and 56% noted improvement in appointment attendance (n=90). Patient responses also revealed high acceptability of mCare and refined the frequency and delivery times (n=114). The pilot project resulted in over 84,000 outbound messages and improved contact rates by 176%. The mCare pilot project demonstrated the feasibility and administrative effectiveness of a scalable mhealth application using secure mobile messaging and information exchanges, including personalized patient education.
Full Text Available Recently many authentication protocols using an extended chaotic map were suggested for a mobile user. Many researchers demonstrated that authentication protocol needs to provide key agreement, mutual authentication, and user anonymity between mobile user and server and resilience to many possible attacks. In this paper, we cautiously analyzed chaotic-map-based authentication scheme and proved that it is still insecure to off-line identity guessing, user and server impersonation, and on-line identity guessing attacks. To address these vulnerabilities, we proposed an improved protocol based on an extended chaotic map and a fuzzy extractor. We proved the security of the proposed protocol using a random oracle and AVISPA (Automated Validation of Internet Security Protocols and Applications tool. Furthermore, we present an informal security analysis to make sure that the improved protocol is invulnerable to possible attacks. The proposed protocol is also computationally efficient when compared to other previous protocols.
With the popularity of smart phones,mobile phone functions will become increasingly rich,mobile phone platform will be more and more open,mobile phone security issues become increasingly prominent.This paper describes the characteristics of the mobile security,discusses in detail the security issues of mobile terminal,and proposes the mobile phone security strategy with reality.%随着智能手机的普及,手机功能将越来越为丰富,手机平台越来越为开放,手机安全问题越来越突出。本文介绍了手机安全的特性,论述了手机终端的安全问题,结合实际,提出了手机安全防范策略。
In the recent years, with the rapid development of science and technology in the consumer markets, payment terms are being promoted much faster than ever. It is considered that NFC Mobile payment will enjoy a great prospect. NFC Mobile payment technique, which is based on the RFID technology, has been growing popularity. Near Field Communication (NFC) is the proximity standard for the proximity cards that can be modified to allow integration of the technology into a cellular phone. NFC tec...
Full Text Available Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant’s reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer’s credits for risk control, and users can have online-equivalent credits in offline transactions.
Two studies examined men's interventions in a virtual reality situation involving child grooming. In Study 1, 92 men observed an online encounter between an apparent minor and a sex offender. The results suggest that the bystander effect was stronger under computerized rather than user-assisted surveillance, and when the fellow cyberbystander was unknown rather than known. In Study 2, where 100 men observed the same encounter, the effect also emerged under computerized surveillance as long as the number unknown cyberbystanders was increased. Thus, vesting more responsibility for security in the average netizen rather than just in the automated abuse-detection technology is cautiously suggested, the relevance of which lies in increasing minors' health and safety.
Full Text Available In this work we investigate the security of security-critical applications, i.e. applications in which a failure may produce consequences that are unacceptable. We consider three areas: mobile devices, virtualization platforms, and domain name systems. The Java Micro Edition platform defines the Mobile Information Device Profile (MIDP to facilitate the development of applications for mobile devices, like cell phones and PDAs. We first study and compare formally several variants of the security model specified by MIDP to access sensitive resources of a mobile device. Hypervisors allow multiple guest operating systems to run on shared hardware, and offer a compelling means of improving the security and the flexibility of software systems. In this work we present a formalization of an idealized model of a hypervisor. We establish (formally that the hypervisor ensures strong isolation properties between the different operating systems, and guarantees that requests from guest operating systems are eventually attended. We show also that virtualized platforms are transparent, i.e. a guest operating system cannot distinguish whether it executes alone or together with other guest operating systems on the platform. The Domain Name System Security Extensions (DNSSEC is a suite of specifications that provides origin authentication and integrity assurance services for DNS data. We finally introduce a minimalistic specification of a DNSSEC model which provides the grounds needed to formally state and verify security properties concerning the chain of trust of the DNSSEC tree. We develop all our formalizations in the Calculus of Inductive Constructions --formal language that combines a higher-order logic and a richly-typed functional programming language-- using the Coq proof assistant.
Full Text Available The combination of information security and criminal law in the case of usage of smart mobile phones among the students is a very relevant and current topic. Namely, the number of smart mobile phones’ users is rising daily, including among the student population, due to the need for perpetual communication and constant access to information. However, the lack of knowledge about recommendations on information security and safe use of smart mobile phone together with their disregard could lead to criminal responsibility of the users of smart mobile phones, including students. The purpose of this paper is therefore to represent the potential consequences of criminal responsibility and how to avoid it. The knowledge on safe use of smart mobile phones, their software, but also threats and safety solutions is very low among students, as the survey shows. Due to the loss, conveyance or disclosure of protected data, criminal responsibility of a user could therefore be relevant. In certain cases the juvenile criminal justice system is partly still relevant due to the students’ age, whereas in every case the students' culpability should be assessed precisely. This assessment namely distinguishes the cases, when the student is a perpetrator of a criminal act from the cases, when the student is only a victim of a criminal act due to his improper use of smart mobile phones.
Introduction: Care professionals suffering with poor wellbeing is a phenomenon that has been found to have a damaging effect upon individual employees, service users and organisations. Employees working in forensic settings are believed to be at increased risk of damaged wellbeing due to the unique demands of their working environment, including exposure to violence and aggression. This issue was addressed in two ways. Firstly, a systematic review of the literature on the ef...
Novelan, M. S.; Husein, A. M.; Harahap, M.; Aisyah, S.
The development of telecommunications technology is so rapid has given such great benefits. With the telecommunication technology, distance and time no longer be a significant obstacle. One of the results of telecommunications technology that is well known is the Short Message Service. In this study developed an application on the mobile phone to modify the SMS message into ciphertext so that the information content of the SMS is not known by others. SMS delivery system for encrypting messages into ciphertext using a key that is entered by the sender then sends to the destination number. SMS reception system to decrypt it to others via SMS without the fear of information from these messages will be known by others. The method used in the system encrypt and decrypt the message is the algorithm Tiny Encryption Algorithm and implemented using the Java programming language. JDK 1.7 as the Java programming language ciphertext into plaintext using the key entered by the receiver and displays the original message to the recipient. This application can be used by someone who wants to send a confidential information and the Java compiler. Eclipse, a Java SDK and the Android SDK as a Java source code editor.
Stylianos S. Mamais
Full Text Available Online Behavioural Advertising (OBA enables promotion companies to effectively target users with ads that best satisfy their purchasing needs. This is highly beneficial for both vendors and publishers who are the owners of the advertising platforms, such as websites and app developers, but at the same time creates a serious privacy threat for users who expose their consumer interests. In this paper, we categorize the available ad-distribution methods and identify their limitations in terms of security, privacy, targeting effectiveness and practicality. We contribute our own system, which utilizes opportunistic networking in order to distribute targeted adverts within a social network. We improve upon previous work by eliminating the need for trust among the users (network nodes while at the same time achieving low memory and bandwidth overhead, which are inherent problems of many opportunistic networks. Our protocol accomplishes this by identifying similarities between the consumer interests of users and then allows them to share access to the same adverts, which need to be downloaded only once. Although the same ads may be viewed by multiple users, privacy is preserved as the users do not learn each other’s advertising interests. An additional contribution is that malicious users cannot alter the ads in order to spread malicious content, and also, they cannot launch impersonation attacks.
Wittmer, Jenell L. S.; Martin, James E.
Recent research supports the existence of a typology of part-time employees with demographic and behavioral differences. This research suggests that part-timers should not be viewed as one homogenous group and that certain part-time employee groups have fixed external role attachments, while others have more flexible attachments. Applying the…
Perelman, By Lina; Ostfeld, Avi
The deployment of fixed online water quality sensors in water distribution systems has been recognized as one of the key components of contamination warning systems for securing public health. This study proposes to explore how the inclusion of mobile sensors for inline monitoring of various water quality parameters (e.g., residual chlorine, pH) can enhance water distribution system security. Mobile sensors equipped with sampling, sensing, data acquisition, wireless transmission and power generation systems are being designed, fabricated, and tested, and prototypes are expected to be released in the very near future. This study initiates the development of a theoretical framework for modeling mobile sensor movement in water distribution systems and integrating the sensory data collected from stationary and non-stationary sensor nodes to increase system security. The methodology is applied and demonstrated on two benchmark networks. Performance of different sensor network designs are compared for fixed and combined fixed and mobile sensor networks. Results indicate that complementing online sensor networks with inline monitoring can increase detection likelihood and decrease mean time to detection. Copyright © 2013 Elsevier Ltd. All rights reserved.
Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.
G. V., Ramesh Babu; Narayana, G.; Sulaiman, A.; Padmavathamma, M.
Due to the evolution of the Electronic Learning (E-Learning), one can easily get desired information on computer or mobile system connected through Internet. Currently E-Learning materials are easily accessible on the desktop computer system, but in future, most of the information shall also be available on small digital devices like Mobile, PDA, etc. Most of the E-Learning materials are paid and customer has to pay entire amount through credit/debit card system. Therefore, it is very important to study about the security of the credit/debit card numbers. The present paper is an attempt in this direction and a security technique is presented to secure the credit/debit card numbers supplied over the Internet to access the E-Learning materials or any kind of purchase through Internet. A well known method i.e. Data Cube Technique is used to design the security model of the credit/debit card system. The major objective of this paper is to design a practical electronic payment protocol which is the safest and most secured mode of transaction. This technique may reduce fake transactions which are above 20% at the global level.
Al-Darraji, Haider Abdulrazzaq Abed; Tan, Cynthia; Kamarulzaman, Adeeba; Altice, Frederick L
Although prison employees share the same tuberculosis (TB) risk environment with prisoners, the magnitude of TB problems among prison employees is unknown in most resource-limited prisons. This survey was conducted to investigate the prevalence and correlates of tuberculin skin test (TST) positivity among employees in Malaysia's largest prison. Consented, full-time prison employees were interviewed using a structured questionnaire that included sociodemographic data, history of working in the correctional system and TB-related risk. TST was placed intradermally and read after 48-72 h. Induration size of ≥10 mm was considered positive. Logistic regression analyses were conducted to explore associations with TST positivity. Of the 445 recruited prison employees, 420 (94.4%) had complete data. Most were young (median=30.0 years) men (88.8%) who had only worked at this prison (76.4%) for a median total employment period of 60 months (IQR 34.5-132.0). The majority were correctional officers, while civilian employees represented only 7.6% of the sample. Only 26 (6.2%) reported having ever been screened for TB since employment. Prevalence of TST positivity was 81% and was independently associated with longer (≥12 months) prison employment (AOR 4.9; 95% CI 1.5 to 15.9) and current tobacco smoking (AOR=1.9, 95% CI 1.2 to 3.2). Latent TB prevalence was high in this sample, approximating that of prisoners in this setting, perhaps suggesting within prison TB transmission in this facility. Formal TB control programmes for personnel and prisoners alike are urgently needed within the Malaysian correctional system. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Taylor, Richard G.
With the increasing amount and severity of information security incidents, organizations are constantly looking for better ways to protect their information. The implementation of physical safeguards such as firewalls and intrusion detection systems is an integral part on an organization's overall information security; however these safeguards…
This document contains a final regulation revising the minimum requirements for benefit claims procedures of employee benefit plans covered by Title I of the Employee Retirement Income Security Act of 1974 (ERISA or the Act). The regulation establishes new standards for the processing of claims under group health plans and plans providing disability benefits and further clarifies existing standards for all other employee benefit plans. The new standards are intended to ensure more timely benefit determinations, to improve access to information on which a benefit determination is made, and to assure that participants and beneficiaries will be afforded a full and fair review of denied claims. When effective, the regulation will affect participants and beneficiaries of employee benefit plans, employers who sponsor employee benefit plans, plan fiduciaries, and others who assist in the provision of plan benefits, such as third-party benefits administrators and health service providers or health maintenance organizations that provide benefits to participants and beneficiaries of employee benefit plans.
Bisen, Dhananjay; Sharma, Sanjeev
This paper proposes an agent-based secure enhanced performance approach (AB-SEP) for mobile ad hoc network. In this approach, agent nodes are selected through optimal node reliability as a factor. This factor is calculated on the basis of node performance features such as degree difference, normalised distance value, energy level, mobility and optimal hello interval of node. After selection of agent nodes, a procedure of malicious behaviour detection is performed using fuzzy-based secure architecture (FBSA). To evaluate the performance of the proposed approach, comparative analysis is done with conventional schemes using performance parameters such as packet delivery ratio, throughput, total packet forwarding, network overhead, end-to-end delay and percentage of malicious detection.
Papadimitratos, P.; Poturalski, M.; Schaller, P.
Pervasive computing systems will likely be deployed in the near future, with the proliferation of wireless devices and the emergence of ad hoc networking as key enablers. Coping with mobility and the volatility of wireless communications in such systems is critical. Neighborhood discovery (ND......) - the discovery of devices directly reachable for communication or in physical proximity - becomes a fundamental requirement and building block for various applications. However, the very nature of wireless mobile networks makes it easy to abuse ND and thereby compromise the overlying protocols and applications....... Thus, providing methods to mitigate this vulnerability and secure ND is crucial. In this article we focus on this problem and provide definitions of neighborhood types and ND protocol properties, as well as a broad classification of attacks. Our ND literature survey reveals that securing ND is indeed...
... purchase of certain Government-owned property, require employees to report allegations of waste, fraud, and... for purposes of determining whether the donor of a gift is a ``prohibited source'' and of identifying... approval for outside activities, accepting gifts from non-Federal sources, outside teaching, speaking, and...
Fu, Donglai; Liu, Yanhua
Mobile devices are extensively used to store more private and often sensitive information. Therefore, it is important to protect them against unauthorised access. Authentication ensures that authorised users can use mobile devices. However, traditional authentication methods, such as numerical or graphic passwords, are vulnerable to passive attacks. For example, an adversary can steal the password by snooping from a shorter distance. To avoid these problems, this study presents a biometric approach that uses cloud models of heartbeats as the entity identifier to secure mobile devices. Here, it is identified that these concepts including cloud model or cloud have nothing to do with cloud computing. The cloud model appearing in the study is the cognitive model. In the proposed method, heartbeats are collected by two ECG electrodes that are connected to one mobile device. The backward normal cloud generator is used to generate ECG standard cloud models characterising the heartbeat template. When a user tries to have access to their mobile device, cloud models regenerated by fresh heartbeats will be compared with ECG standard cloud models to determine if the current user can use this mobile device. This authentication method was evaluated from three aspects including accuracy, authentication time and energy consumption. The proposed method gives 86.04% of true acceptance rate with 2.73% of false acceptance rate. One authentication can be done in 6s, and this processing consumes about 2000 mW of power.
Lee, S.; Kim, Y.S.; Ye, S.H.
This paper introduces cyber security evaluation results and a design of the wireless communication technology to apply to safeguard systems in nuclear power plants. While wireless communication technologies can generally make mobility and efficiency on plant operation, those have seldom been installed on the nuclear I&C systems due to the negative concern of unexpected outcomes that stem from electromagnetic interference and cyber attack. New design of advanced digital safeguard and I&C systems uses computer-based systems for the safeguard and safety functions. On the other hand, those are being exposed to various types of new and existing cyber threats, vulnerabilities and risks which significantly increase the likelihood that those could be compromised. In order to employ the wireless communication technology in safeguard function, licencees assess and manage the potential for adverse effects on safeguard and safety functions so as to provide high assurance that critical functions are properly protected cyber attack. It is expected that the safeguard function, specifically on the area of real-time monitoring, logging, can be enhanced by employing the mobile safeguard devices (: smart phone, laptop, smart pad, etc). In this paper, we deal with the cyber security evaluation, which consists of threat analysis, vulnerability test, establishment of security plan, and design solutions for the wireless communication on the basis of IEEE 802.11(Wi-Fi) protocol. Proposed evaluation and design solution could be a basis for the design of wireless communication and mobile safeguard systems in nuclear power plants. (author)
Full Text Available A continuing stream of new mobile data services are being released that rely upon the collection of personal data to support a business model. New technologies including facial recognition, sensors and Near Field Communications (NFC will increasingly become a part of everyday services and applications that challenge traditional concepts of individual privacy. The average person as well as the “tech‐savvy” mobile phone user may not yet be fully aware of the extent to which their privacy and security are being affected through their mobile activities and how comparable this situation is to personal computer usage. We investigate perceptions and usage of mobile data services that appear to have specific privacy and security sensitivities, specifically social networking,\tbanking/payments\tand\thealth‐related activities. Our annual survey of smartphone users in the U.S. and Japan is presented from 2011. This nationally representative survey data is used to show demographic and cultural differences, and substantiate our hypotheses about the links between use and privacy concerns
Klarer, P.R.; Harrington, J.J.
This paper describes a mobile robot system designed to function as part of an overall security system at a high security facility. The features of this robot system include specialized software and sensors for navigation without the need for external locator beacons or signposts, sensors for remote imaging and intruder detection, and the ability to communicate information either directly to the electronic portion of the security system or to a manned central control center. Other desirable features of the robot system include low weight, compact size, and low power consumption. The robot system can be operated either by remote manual control, or it can operate autonomously where direct human control can be limited to the global command level. The robot can act as a mobile remote sensing platform for alarm assessment or roving patrol, as a point sensor (sentry) in routine security applications, or as an exploratory device in situations potentially hazardous to humans. This robot system may also be used to ''walk-test'' intrusion detection sensors as part of a routine test and maintenance program for an interior intrusion detection system. The hardware, software, and operation of this robot system will be briefly described herein
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675
Full Text Available Methodologies and algorithms are presented for the secure cooperation of a team of autonomous mobile underwater sensors, connected through an acoustic communication network, within surveillance and patrolling applications. In particular, the work proposes a cooperative algorithm in which the mobile underwater sensors (installed on Autonomous Underwater Vehicles—AUVs respond to simple local rules based on the available information to perform the mission and maintain the communication link with the network (behavioral approach. The algorithm is intrinsically robust: with loss of communication among the vehicles the coverage performance (i.e., the mission goal is degraded but not lost. The ensuing form of graceful degradation provides also a reactive measure against Denial of Service. The cooperative algorithm relies on the fact that the available information from the other sensors, though not necessarily complete, is trustworthy. To ensure trustworthiness, a security suite has been designed, specifically oriented to the underwater scenario, and in particular with the goal of reducing the communication overhead introduced by security in terms of number and size of messages. The paper gives implementation details on the integration between the security suite and the cooperative algorithm and provides statistics on the performance of the system as collected during the UAN project sea trial held in Trondheim, Norway, in May 2011.
Full Text Available Security management in wireless networks has to deal with the changing character of the environment, which can further lead to decision making problem for unexpected events. Among a huge list of devices, the mobile ones are especially vulnerable to this situation. The solution for adapting systems and applications to dynamic environments can be context-aware description of the user actions, which gives a possibility to take into account the factors that influence these actions. In the article, we propose a context-aware security adjusting model, which is based on proposition logic and incorporates mechanisms that assist in the reasoning process. The main benefits that differentiate our approach from similar ones are a formal representation of the model, the usage of the whole spectrum of context attributes, the detection and analysis of contextual data integrity, and conflicting rules’ eradication capability. All these traits transcribe into a more effective way of adjusting security measures in accordance with existing circumstances. To illustrate the proposed approach, we present the case study of context-aware security management for mobile devices.
Full Text Available Considering the security of both the customers’ hosts and the eShops’ servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital signatures on remote hosts with the key-insulated property of the original signer’s signing key. From the theoretical perspective, we provide the formal definition and security notion of a key-insulated undetachable digital signature. From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce. The scheme is mainly focused on protecting the signing key from leakage and preventing the misuse of the signature algorithm on malicious servers. Agents do not carry the signing key when they generate digital signatures on behalf of the original signer, so the key is protected on remote servers. Furthermore, if a hacker gains the signing key of the original signer, the hacker is still unable to forge a signature for any time period other than the key being accessed. In addition, the encrypted function is combined with the original signer’s requirement to prevent the misuse of signing algorithm. The scheme is constructed on gap Diffie–Hellman groups with provable security, and the performance testing indicates that the scheme is efficient.
Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes’ participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.’s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.’s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic. PMID:26580963
Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.
Full Text Available Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.
Ebert, D. D.; Heber, E.; Berking, M.
Objective This randomised controlled trial (RCT) aimed to evaluate the efficacy of a self-guided internet-based stress management intervention (iSMI) for employees compared to a 6-month wait-list control group (WLC) with full access for both groups to treatment as usual. M e t h o d A sample of 264...... of stressed employees. Internet-based self-guided interventions could be an acceptable, effective and potentially costeffective approach to reduce the negative consequences associated with work-related stress....
Today, the mobile technology has set up devices and communication architectures which change the way to work and improve efficiency and interactivity. EADS Matra Systems and Information is involved into these changes and develops a generic technology, mobile geonet, which brings these new means to improve the link between people who works together. Mobile geonet is a framework to develop mobile applications with a high security level and geographic capabilities. It is based on fully networked technologies (intranet/extranet/internet). It uses common mobile devices, enhanced by localisation and communication add-ons, like GPS, GSM or satellite phones modules. All the information processed and produced by upstream activities is stored in the DB GEO database system. These can be reports, maps, satellite images, structured information, points of interest and anything else with an potential geographic component. The role of the ASP (Application Service Provider) is to integrate existing applications or provide new ones. These applications are activated whether server-side, to mine, prepare and encode data or client-side to decode, present or interact in particular means with the user. The applications and data are disseminated through an extranet server. A particular interest of distributing the client applications by the ASP is the deployment cost on all mobile and fixed terminals, which is very small, because it is automatically downloaded for each upgrade. The communication layer aims at delivering applications up to the mobile device and permits the data exchange between the mobile device and the central data repository. Different means can be used: GSM network, internet or satellite communications. The applications are adapted to the available bandwidth, especially when image parts are downloaded. The mobile device is chosen on the shelf, depending of the requirements of the application. The computer can be a very small Pocket PC or a typical portable PC. For
Kambourakis, G; Maglogiannis, I; Rouskas, A
Recent research works examine the potential employment of public-key cryptography schemes in e-health environments. In such systems, where a Public Key Infrastructure (PKI) is established beforehand, Attribute Certificates (ACs) and public key enabled protocols like TLS, can provide the appropriate mechanisms to effectively support authentication, authorization and confidentiality services. In other words, mutual trust and secure communications between all the stakeholders, namely physicians, patients and e-health service providers, can be successfully established and maintained. Furthermore, as the recently introduced mobile devices with access to computer-based patient record systems are expanding, the need of physicians and nurses to interact increasingly with such systems arises. Considering public key infrastructure requirements for mobile online health networks, this paper discusses the potential use of Attribute Certificates (ACs) in an anticipated trust model. Typical trust interactions among doctors, patients and e-health providers are presented, indicating that resourceful security mechanisms and trust control can be obtained and implemented. The application of attribute certificates to support medical mobile service provision along with the utilization of the de-facto TLS protocol to offer competent confidentiality and authorization services is also presented and evaluated through experimentation, using both the 802.11 WLAN and General Packet Radio Service (GPRS) networks.
Full Text Available The new styles and ways of life lead to greater use of wireless networks, the mobile device being a tool for data transmission, which are susceptible to threats in the transmission channels in the network. IT security plays a very important role in guaranteeing the availability, privacy and integrity of information, one of the techniques that helps in this task is cryptography, whose foundation is to transform a message so that it is unintelligible except for those who have the Key to decipher it. The research focuses on the use of the RSA algorithm between mobile devices, the encrypted data is sent through communication channels called threads that through formulas and processes executed on the server, will help to execute the encryption and decryption of the data. To carry it out, a prototype for the exchange of data between mobile devices wirelessly was designed and implemented, conducting performance tests with three nodes to improve the security. The results show the efficiency of the algorithm and additionally its functionality, the times of encryption and decryption are fast against the sending of information without any method or algorithm used.
Full Text Available Mobile health (also written as mHealth provisions the practice of public health supported by mobile devices. mHealth systems let patients and healthcare providers collect and share sensitive information, such as electronic and personal health records (EHRs at any time, allowing more rapid convergence to optimal treatment. Key to achieving this is securely sharing data by providing enhanced access control and reliability. Typically, such sharing follows policies that depend on patient and physician preferences defined by a set of attributes. In mHealth systems, not only the data but also the policies for sharing it may be sensitive since they directly contain sensitive information which can reveal the underlying data protected by the policy. Also, since the policies usually incur linearly increasing communication costs, mHealth is inapplicable to resource-constrained environments. Lastly, access privileges may be publicly known to users, so a malicious user could illegally share his access privileges without the risk of being traced. In this paper, we propose an efficient attribute-based secure data sharing scheme in mHealth. The proposed scheme guarantees a hidden policy, constant-sized ciphertexts, and traces, with security analyses. The computation cost to the user is reduced by delegating approximately 50% of the decryption operations to the more powerful storage systems.
Full Text Available One of the most popular internet services is electronic mail (e-mail. By using mobile devices with internet connection, e-mail can be widely used by anyone to exchange information anywhere and anytime whether public or confidential. Unfortunately, there are some security issues with email communication; e-mail is sent in over open networks and e-mail is stored on potentially insecure mail servers. Moreover, e-mail has no integrity protection so the body can be undectected altered in transit or on the e-mail server. E-mail also has no data origin authentication, so people cannot be sure that the emails they receive are from the e-mail address owner. In order to solve this problem, this study proposes a secure method of e-mail communication on Android-based mobile devices using a hybrid cryptosystem which combines symmetric encryption, asymmetric encryption and hash function. The experimental results show that the proposed method succeeded in meeting those aspects of information security including confidentiality, data integrity, authentication, and non-repudiation.
Diephuis, Maurits; Voloshynovskiy, Svyatoslav; Holotyak, Taras; Stendardo, Nabil; Keel, Bruno
In this paper, we address the problem of fast and secure packaging identification on mobile phones. It is a well known fact that consumer goods are counterfeited on a massive scale in certain regions of the world, illustrating how existing counter measures fall short or don't exist at all, as can be seen in the local absence of laws pertaining to brand protection. This paper introduces a technological tool that allows the consumer to quickly identify a product or package with a mobile device using a physical non-cloneable features in the form of a surface micro- structure image. This natural occurring identifier allows a producer or brand owner to track and trace all its products and gives the consumer a powerful tool to confirm the authenticity of an offered product.
Mangler, Jürgen; Schikuta, Erich; Witzany, Christoph; Jorns, Oliver; Ul Haq, Irfan; Wanek, Helmut
Until now, the research community mainly focused on the technical aspects of Grid computing and neglected commercial issues. However, recently the community tends to accept that the success of the Grid is crucially based on commercial exploitation. In our vision Foster's and Kesselman's statement "The Grid is all about sharing." has to be extended by "... and making money out of it!". To allow for the realization of this vision the trust-worthyness of the underlying technology needs to be ensured. This can be achieved by the use of gSET (Gridified Secure Electronic Transaction) as a basic technology for trust management and secure accounting in the presented Grid based workflow. We present a framework, conceptually and technically, from the area of the Mobile-Grid, which justifies the Grid infrastructure as a viable platform to enable commercially successful business workflows.
Sandy, Matt; Goldburt, Tim; Carapezza, Edward M.
It is desirable for executive officers of law enforcement agencies and other executive officers in homeland security and defense, as well as first responders, to have some basic information about the latest trend on mobile, portable lightweight wireless video recording solutions available on the market. This paper reviews and discusses a number of studies on the use and effectiveness of wireless video recording solutions. It provides insights into the features of wearable video recording devices that offer excellent applications for the category of security agencies listed in this paper. It also provides answers to key questions such as: how to determine the type of video recording solutions most suitable for the needs of your agency, the essential features to look for when selecting a device for your video needs, and the privacy issues involved with wearable video recording devices.
Full Text Available The self-organizing nature of the Mobile Ad hoc Networks (MANETs provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV protocol, Enhanced Secure Trusted AODV (ESTA, which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.
Amiri, IS; Saberi, Iman
In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required securi
Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable. We propose a challenge-response based one-time password (OTP) scheme that uses symmetric cryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks. Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their own trusted computers.
Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao
Recent advances in medical treatment and emergency applications, the need of integrating wireless body area network (WBAN) with cloud computing can be motivated by providing useful and real time information about patients' health state to the doctors and emergency staffs. WBAN is a set of body sensors carried by the patient to collect and transmit numerous health items to medical clouds via wireless and public communication channels. Therefore, a cloud-assisted WBAN facilitates response in case of emergency which can save patients' lives. Since the patient's data is sensitive and private, it is important to provide strong security and protection on the patient's medical data over public and insecure communication channels. In this paper, we address the challenge of participant authentication in mobile emergency medical care systems for patients supervision and propose a secure cloud-assisted architecture for accessing and monitoring health items collected by WBAN. For ensuring a high level of security and providing a mutual authentication property, chaotic maps based authentication and key agreement mechanisms are designed according to the concept of Diffie-Hellman key exchange, which depends on the CMBDLP and CMBDHP problems. Security and performance analyses show how the proposed system guaranteed the patient privacy and the system confidentiality of sensitive medical data while preserving the low computation property in medical treatment and remote medical monitoring.
Ricci, R.; Chollet, G.; Crispino, M. V.; Jassim, S.; Koreman, J.; Olivar-Dimas, M.; Garcia-Salicetti, S.; Soria-Rodriguez, P.
This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone's primary aim is to realise a mobile phone prototype - the 'SecurePhone' - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (esigned) documents and voice recordings. SecurePhone's 'biometric recogniser' is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone's built-in esignature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation. The SecurePhone is expected to boost m-commerce and open new scenarios for m-business and m-work, by changing the way people interact and by improving trust and confidence in information technologies, often considered intimidating and difficult to use. Exploitation plans will also explore other application domains (physical and logical access control, securised mobile communications).
Shien, Lau Khai; Singh, Manmeet Mahinderjit
According to the UN's (United Nations) projection, Malaysia will achieve ageing population status by 2030. The challenge of the growing ageing population is health and social care services. As the population lives longer, the costs of institutional care rises and elderly who not able live independently in their own homes without caregivers. Moreover, it restricted their activity area, safety and freedom in their daily life. Hence, a tracking system is worthy for their caregivers to track their real-time location with efficient. Currently tracking and monitoring systems are unable to satisfy the needs of the community. Hence, Indoor-Outdoor Elderly Secure and Tracking care system (IOET) proposed to track and monitor elderly. This Mobile Crowdsensing type of system is using indoor and outdoor positioning system to locate elder which utilizes the RFID, NFC, biometric system and GPS aim to secure the safety of elderly within indoors and outdoors environment. A mobile application and web-based application to be designed for this system. This system able to real-time tracking by combining GPS and NFC for outdoor coverage where ideally in smart city. In indoor coverage, the system utilizes active RFID tracking elderly movement. The system will prompt caregiver wherever elderly movement or request by using the notification service which provided the real-time notify. Caregiver also can review the place that visited by elderly and trace back elderly movement.
Ademola P. Abidoye
Full Text Available The sensitivity of health-care information and its accessibility via the Internet and mobile technology systems is a cause for concern in these modern times. The privacy, integrity and confidentiality of a patient’s data are key factors to be considered in the transmission of medical information for use by authorised health-care personnel. Mobile communication has enabled medical consultancy, treatment, drug administration and the provision of laboratory results to take place outside the hospital. With the implementation of electronic patient records and the Internet and Intranets, medical information sharing amongst relevant health-care providers was made possible. But the vital issue in this method of information sharing is security: the patient’s privacy, as well as the confidentiality and integrity of the health-care information system, should not be compromised. We examine various ways of ensuring the security and privacy of a patient’s electronic medical information in order to ensure the integrity and confidentiality of the information.
Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat
A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.
Guo, Kehua; Zhang, Ping; Ma, Jianhua
Secure data aggregation (SDA) schemes are widely used in distributed applications, such as mobile sensor networks, to reduce communication cost, prolong the network life cycle and provide security. However, most SDA are only suited for a single type of statistics (i.e., summation-based or comparison-based statistics) and are not applicable to obtaining multiple statistic results. Most SDA are also inefficient for dynamic networks. This paper presents multi-functional secure data aggregation (MFSDA), in which the mapping step and coding step are introduced to provide value-preserving and order-preserving and, later, to enable arbitrary statistics support in the same query. MFSDA is suited for dynamic networks because these active nodes can be counted directly from aggregation data. The proposed scheme is tolerant to many types of attacks. The network load of the proposed scheme is balanced, and no significant bottleneck exists. The MFSDA includes two versions: MFSDA-I and MFSDA-II. The first one can obtain accurate results, while the second one is a more generalized version that can significantly reduce network traffic at the expense of less accuracy loss.
Sa, Joao H G; Rebelo, Marina S; Brentani, Alexandra; Grisi, Sandra J F E; Iwaya, Leonardo H; Simplicio, Marcos A; Carvalho, Tereza C M B; Gutierrez, Marco A
Mobile health consists in applying mobile devices and communication capabilities for expanding the coverage and improving the effectiveness of health care programs. The technology is particularly promising for developing countries, in which health authorities can take advantage of the flourishing mobile market to provide adequate health care to underprivileged communities, especially primary care. In Brazil, the Primary Care Information System (SIAB) receives primary health care data from all regions of the country, creating a rich database for health-related action planning. Family Health Teams (FHTs) collect this data in periodic visits to families enrolled in governmental programs, following an acquisition procedure that involves filling in paper forms. This procedure compromises the quality of the data provided to health care authorities and slows down the decision-making process. To develop a mobile system (GeoHealth) that should address and overcome the aforementioned problems and deploy the proposed solution in a wide underprivileged metropolitan area of a major city in Brazil. The proposed solution comprises three main components: (a) an Application Server, with a database containing family health conditions; and two clients, (b) a Web Browser running visualization tools for management tasks, and (c) a data-gathering device (smartphone) to register and to georeference the family health data. A data security framework was designed to ensure the security of data, which was stored locally and transmitted over public networks. The system was successfully deployed at six primary care units in the city of Sao Paulo, where a total of 28,324 families/96,061 inhabitants are regularly followed up by government health policies. The health conditions observed from the population covered were: diabetes in 3.40%, hypertension (age >40) in 23.87% and tuberculosis in 0.06%. This estimated prevalence has enabled FHTs to set clinical appointments proactively, with the aim of
Le Xuan Hung
Full Text Available For many sensor network applications such as military or homeland security, it is essential for users (sinks to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1 Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2 The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3 The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4 Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5 No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.
Richardson, Joshua E; Ancker, Jessica S
Given growing interest in mobile phones for health management (mHealth), we surveyed consumer perceptions of mHealth in security, privacy, and healthcare quality using national random-digit-dial telephone surveys in 2013 and 2014. In 2013, 48% thought that using a mobile phone to communicate data with a physician's electronic health record (EHR) would improve the quality of health care. By 2014, the proportion rose to 57% (p privacy concerns yet nearly two-thirds expressed privacy concerns. In 2013 alone, respondents were more likely to express privacy concerns about medical data on mobile phones than they were to endorse similar concerns with EHRs or health information exchange (HIE). Consumers increasingly believe that mHealth improves healthcare quality, but security and privacy concerns need to be addressed for quality improvement to be fully realized.
Full Text Available Mobile healthcare social networks (MHSN integrated with connected medical sensors and cloud-based health data storage provide preventive and curative health services in smart cities. The fusion of social data together with real-time health data facilitates a novel paradigm of healthcare big data analysis. However, the collaboration of healthcare and social network service providers may pose a series of security and privacy issues. In this paper, we propose a secure health and social data sharing and collaboration scheme in MHSN. To preserve the data privacy, we realize secure and fine-grained health data and social data sharing with attribute-based encryption and identity-based broadcast encryption techniques, respectively, which allows patients to share their private personal data securely. In order to achieve enhanced data collaboration, we allow the healthcare analyzers to access both the reencrypted health data and the social data with authorization from the data owner based on proxy reencryption. Specifically, most of the health data encryption and decryption computations are outsourced from resource-constrained mobile devices to a health cloud, and the decryption of the healthcare analyzer incurs a low cost. The security and performance analysis results show the security and efficiency of our scheme.
Full Text Available To implement a new secure network with high mobility and low energy consumption, we use smart sensors. These sensors are powered by micro batteries generally non rechargeable. So, to extend their lifetime, it is necessary to implement new energy conservation techniques. Existing works separate the two features (security, energy conservation and are interested specifically in only one layer. Consequently, the originality of this work consists to combine together the two features using a crossing between three layers: physical layer, data link layer and network layer. Our proposition consists firstly in developing a new network deployment in hierarchical areas. This model takes place at the network layer. Secondly, implementing an energy efficient and secure MAC protocol providing a secure authentication, data privacy and integrity in a mobile WSN. Finally, implementing an intrusion detection system protecting the physical layer from malware and viruses that threaten it. We have been used OMNet++ for simulation .Our proposed protocol SXMachiavel offered the best performances and more reliability at the mobility rate (can reach 99% compared with XMachiavel, which doesn’t exceed 35%, loss packets rate (0.05% for a small network size and energy consumption (decreases by 0.01% for each exchanged packet.
Full Text Available In line with a patient-centred model of healthcare, Mobile Health applications (mhealth apps provide convenient and equitable access to health and well-being resources and programs that can enable consumers to monitor their health related problems, understand specific medical conditions and attain personal fitness goals. This increase in access and control comes with an increase in risk and responsibility to identify and manage the associated risks, such as the privacy and security of consumers’ personal and health information. Based on a review of the literature, this paper identifies a set of risk and safety features for evaluating mHealth apps and uses those features to conduct a comparative analysis of the 20 most popular mHealth apps. The comparative analysis reveals that current mHealth apps do pose a risk to consumers. To address the safety and privacy concerns, recommendations to consumers and app developers are offered together with consideration of mHealth app future trends.
Full Text Available This paper studies the relay selection schemes in mobile communication system over Nakagami-m channel. To make efficient use of licensed spectrum, both single relay selection (SRS scheme and multirelays selection (MRS scheme over the Nakagami-m channel are proposed. Also, the intercept probability (IP and outage probability (OP of the proposed SRS and MRS for the communication links depending on realistic spectrum sensing are derived. Furthermore, this paper assesses the manifestation of conventional direct transmission scheme to compare with the proposed SRS and MRS ones based on the Nakagami-m channel, and the security-reliability trade-off (SRT performance of the proposed schemes and the conventional schemes is well investigated. Additionally, the SRT of the proposed SRS and MRS schemes is demonstrated better than that of direct transmission scheme over the Nakagami-m channel, which can protect the communication transmissions against eavesdropping attacks. Additionally, simulation results show that our proposed relay selection schemes achieve better SRT performance than that of conventional direct transmission over the Nakagami-m channel.
Full Text Available Data gathering and optimal path selection for wireless sensor networks (WSN using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secure routing protocol for multiple mobile sink (RSRPMS. This protocol finds the rendezvous point for optimal transmission of data using a “splitting tree” technique in tree-shaped network topology and then to determine all the subsequent positions of a sink the “Biased Random Walk” model is used. In case of an event, the sink gathers the data from all sources, when they are in the sensing range of rendezvous point. Otherwise relay node is selected from its neighbor to transfer packets from rendezvous point to sink. A symmetric key cryptography is used for secure transmission. The proposed relay node based secure routing protocol for multiple mobile sink (RSRPMS is experimented and simulation results are compared with Intelligent Agent-Based Routing (IAR protocol to prove that there is increase in the network lifetime compared with other routing protocols.
Full Text Available Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff Equation using an Integration Factor (DiffEIF, minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.
Alagarsamy, Sumithra; Rajagopalan, S P
Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.
Mascarenas, David; Stull, Christopher; Farrar, Charles
In order to realize the wide-scale deployment of high-endurance, unattended mobile sensing technologies, it is vital to ensure the self-preservation of the sensing assets. Deployed mobile sensor nodes face a variety of physical security threats including theft, vandalism and physical damage. Unattended mobile sensor nodes must be able to respond to these threats with control policies that facilitate escape and evasion to a low-risk state. In this work the Precision Immobilization Technique (PIT) problem has been considered. The PIT maneuver is a technique that a pursuing, car-like vehicle can use to force a fleeing vehicle to abruptly turn ninety degrees to the direction of travel. The abrupt change in direction generally causes the fleeing driver to lose control and stop. The PIT maneuver was originally developed by law enforcement to end vehicular pursuits in a manner that minimizes damage to the persons and property involved. It is easy to imagine that unattended autonomous convoys could be targets of this type of action by adversarial agents. This effort focused on developing control policies unattended mobile sensor nodes could employ to escape, evade and recover from PIT-maneuver-like attacks. The development of these control policies involved both simulation as well as small-scale experimental testing. The goal of this work is to be a step toward ensuring the physical security of unattended sensor node assets.
... made available to a carrier by the customer solely by virtue of the carrier-customer relationship,'' a... mobile wireless services providers with respect to customer information stored on their users' mobile... practices of mobile wireless service providers with respect to customer information stored on their users...
Enenkel, Markus; See, Linda; Karner, Mathias; Álvarez, Mònica; Rogenhofer, Edith; Baraldès-Vallverdú, Carme; Lanusse, Candela; Salse, Núria
The Central African Republic is one of the world's most vulnerable countries, suffering from chronic poverty, violent conflicts and weak disaster resilience. In collaboration with Doctors without Borders/Médecins Sans Frontières (MSF), this study presents a novel approach to collect information about socio-economic vulnerabilities related to malnutrition, access to resources and coping capacities. The first technical test was carried out in the North of the country (sub-prefecture Kabo) in May 2015. All activities were aimed at the investigation of technical feasibility, not at operational data collection, which requires a random sampling strategy. At the core of the study is an open-source Android application named SATIDA COLLECT that facilitates rapid and simple data collection. All assessments were carried out by local MSF staff after they had been trained for one day. Once a mobile network is available, all assessments can easily be uploaded to a database for further processing and trend analysis via MSF in-house software. On one hand, regularly updated food security assessments can complement traditional large-scale surveys, whose completion can take up to eight months. Ideally, this leads to a gain in time for disaster logistics. On the other hand, recording the location of every assessment via the smart phones' GPS receiver helps to analyze and display the coupling between drought risk and impacts over many years. Although the current situation in the Central African Republic is mostly related to violent conflict it is necessary to consider information about drought risk, because climatic shocks can further disrupt the already vulnerable system. SATIDA COLLECT can easily be adapted to local conditions or other applications, such as the evaluation of vaccination campaigns. Most importantly, it facilitates the standardized collection of information without pen and paper, as well as straightforward sharing of collected data with the MSF headquarters or other
Full Text Available The Central African Republic is one of the world's most vulnerable countries, suffering from chronic poverty, violent conflicts and weak disaster resilience. In collaboration with Doctors without Borders/Médecins Sans Frontières (MSF, this study presents a novel approach to collect information about socio-economic vulnerabilities related to malnutrition, access to resources and coping capacities. The first technical test was carried out in the North of the country (sub-prefecture Kabo in May 2015. All activities were aimed at the investigation of technical feasibility, not at operational data collection, which requires a random sampling strategy. At the core of the study is an open-source Android application named SATIDA COLLECT that facilitates rapid and simple data collection. All assessments were carried out by local MSF staff after they had been trained for one day. Once a mobile network is available, all assessments can easily be uploaded to a database for further processing and trend analysis via MSF in-house software. On one hand, regularly updated food security assessments can complement traditional large-scale surveys, whose completion can take up to eight months. Ideally, this leads to a gain in time for disaster logistics. On the other hand, recording the location of every assessment via the smart phones' GPS receiver helps to analyze and display the coupling between drought risk and impacts over many years. Although the current situation in the Central African Republic is mostly related to violent conflict it is necessary to consider information about drought risk, because climatic shocks can further disrupt the already vulnerable system. SATIDA COLLECT can easily be adapted to local conditions or other applications, such as the evaluation of vaccination campaigns. Most importantly, it facilitates the standardized collection of information without pen and paper, as well as straightforward sharing of collected data with the MSF
Shoop, Brian; Johnston, Michael; Goehring, Richard; Moneyhun, Jon; Skibba, Brian
... & barrier assessment payloads. Its functions include surveillance, security, early warning, incident first response and product and barrier status primarily focused on a depot/munitions security mission at structured/semi-structured facilities...
Dehling, Tobias; Gao, Fangjian; Schneider, Stephan; Sunyaev, Ali
Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora and diversity of available mHealth apps, implications for information security and privacy are unclear and complex. The objective of this study was to establish an overview of mHealth apps offered on iOS and Android with a special focus on potential damage to users through information security and privacy infringements. We assessed apps available in English and offered in the categories "Medical" and "Health & Fitness" in the iOS and Android App Stores. Based on the information retrievable from the app stores, we established an overview of available mHealth apps, tagged apps to make offered information machine-readable, and clustered the discovered apps to identify and group similar apps. Subsequently, information security and privacy implications were assessed based on health specificity of information available to apps, potential damage through information leaks, potential damage through information manipulation, potential damage through information loss, and potential value of information to third parties. We discovered 24,405 health-related apps (iOS; 21,953; Android; 2452). Absence or scarceness of ratings for 81.36% (17,860/21,953) of iOS and 76.14% (1867/2452) of Android apps indicates that less than a quarter of mHealth apps are in more or less widespread use. Clustering resulted in 245 distinct clusters, which were consolidated into 12 app archetypes grouping clusters with similar assessments of potential damage through information security and privacy infringements. There were 6426 apps that were excluded during clustering. The majority of apps (95.63%, 17,193/17,979; of apps) pose at least some potential damage through
Dehling, Tobias; Gao, Fangjian; Schneider, Stephan
Background Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora and diversity of available mHealth apps, implications for information security and privacy are unclear and complex. Objective The objective of this study was to establish an overview of mHealth apps offered on iOS and Android with a special focus on potential damage to users through information security and privacy infringements. Methods We assessed apps available in English and offered in the categories “Medical” and “Health & Fitness” in the iOS and Android App Stores. Based on the information retrievable from the app stores, we established an overview of available mHealth apps, tagged apps to make offered information machine-readable, and clustered the discovered apps to identify and group similar apps. Subsequently, information security and privacy implications were assessed based on health specificity of information available to apps, potential damage through information leaks, potential damage through information manipulation, potential damage through information loss, and potential value of information to third parties. Results We discovered 24,405 health-related apps (iOS; 21,953; Android; 2452). Absence or scarceness of ratings for 81.36% (17,860/21,953) of iOS and 76.14% (1867/2452) of Android apps indicates that less than a quarter of mHealth apps are in more or less widespread use. Clustering resulted in 245 distinct clusters, which were consolidated into 12 app archetypes grouping clusters with similar assessments of potential damage through information security and privacy infringements. There were 6426 apps that were excluded during clustering. The majority of apps (95.63%, 17,193/17,979; of apps) pose
Jeong, Young-Sik; Lee, Jae Dong; Lee, Jeong-Bae; Jung, Jai-Jin; Park, Jong Hyuk
Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks repre...
Gejibo, Samson Hussien
The rapid growth in the mobile communications technology and wide cellular coverage created an opportunity to satisfy the demand for low-cost health care solutions. Mobile Health (a.k.a. mHealth) is a promising health service delivery concept that utilizes mobile communications technology to bridge the gap between remotely and sparsely populated communities and health care providers. So far, several mHealth applications have been developed and deployed in the field. Among those, a digital inf...
Goyal Chin, Amita; Etudo, Ugochukwu; Harris, Mark A.
The past decade has witnessed an explosion of the penetration of mobile technology through all strata of society. Mobile technologies including cell phones, tablets, and even some e-readers are used for surfing the web, running apps, reading email, posting to social media, conducting banking transactions, etc. This liberation from desktop and…
The study revealed that mobile technology is most used for booking appointments with labour and least used for obtaining agricultural innovations by the respondents. The study also shows a positive impact of the technology on food crop production. Therefore, the study recommends training farmers on the use of mobile ...
to social networks, personal identities, and our relationship to the built environment. The omnipresence of mobilities within everyday life, high politics, technology, and tourism (to mention but a few) all point to a key insight harnessed by the ‘mobilities turn’. Namely that mobilities is much more than......The world is on the move. This is a widespread understanding by many inhabitants of contemporary society across the Globe. But what does it actually mean? During over one decade the ‘mobilities turn’ within the social sciences have provided a new set of insights into the repercussions of mobilities...... and environmental degradation. The spaces and territories marked by mobilities as well as the sites marked by the bypassing of such are explored. Moreover, the architectural and technological dimensions to infrastructures and sites of mobilities will be included as well as the issues of power, social exclusion...
Amita GOYAL CHIN; Ugochukwu ETUDO; Mark A. HARRIS
The past decade has witnessed an explosion of the penetration of mobile technology through all strata of society. Mobile technologies including cell phones, tablets, and even some e-readers are used for surfing the web, running apps, reading email, posting to social media, conducting banking transactions, etc. This liberation from desktop and laptop machines and from the requirements of a specific geographic location raises concerns regarding the problems and challenges of maintaining securit...
Ahmad S. Mashhour; Zakarya Saleh
Bahraini banks and financial organizations have applied remote enabled service using the internet and a mobile device to increase efficiency, reduce costs and improve quality of services. There is need for these organizations to identify factors that persuade customers and raise their attitudes towards adoption and usage of these services. This study identifies the most important factors affecting customer attitudes towards mobile banking acceptance in Bahrain. The model formulated in this re...
Adesina, Ademola O.; Agbele, Kehinde K.; Februarie, Ronald; Abidoye, Ademola P.; Nyongesa, Henry O.
The sensitivity of health-care information and its accessibility via the Internet and mobile technology systems is a cause for concern in these modern times. The privacy, integrity and confidentiality of a patient’s data are key factors to be considered in the transmission of medical information for use by authorised health-care personnel. Mobile communication has enabled medical consultancy, treatment, drug administration and the provision of laboratory results to take place outside the hosp...
stations separated by 0.5 to 1 km can be coherently measured to a single mobile subscriber using LTE signaling. These are the first measurements of...undertake three parallel but inter-coupled tasks geared towards a) performing measurements via real deployments and enhancing our understanding of layer...dependencies and vulnerabilities in mobile ad hoc networks; these measurements will be on existing testbeds at The views, opinions and/or findings
Landman, Adam; Emani, Srinivas; Carlile, Narath; Rosenthal, David I; Semakov, Simon; Pallin, Daniel J; Poon, Eric G
Photographs are important tools to record, track, and communicate clinical findings. Mobile devices with high-resolution cameras are now ubiquitous, giving clinicians the opportunity to capture and share images from the bedside. However, secure and efficient ways to manage and share digital images are lacking. The aim of this study is to describe the implementation of a secure application for capturing and storing clinical images in the electronic health record (EHR), and to describe initial user experiences. We developed CliniCam, a secure Apple iOS (iPhone, iPad) application that allows for user authentication, patient selection, image capture, image annotation, and storage of images as a Portable Document Format (PDF) file in the EHR. We leveraged our organization's enterprise service-oriented architecture to transmit the image file from CliniCam to our enterprise clinical data repository. There is no permanent storage of protected health information on the mobile device. CliniCam also required connection to our organization's secure WiFi network. Resident physicians from emergency medicine, internal medicine, and dermatology used CliniCam in clinical practice for one month. They were then asked to complete a survey on their experience. We analyzed the survey results using descriptive statistics. Twenty-eight physicians participated and 19/28 (68%) completed the survey. Of the respondents who used CliniCam, 89% found it useful or very useful for clinical practice and easy to use, and wanted to continue using the app. Respondents provided constructive feedback on location of the photos in the EHR, preferring to have photos embedded in (or linked to) clinical notes instead of storing them as separate PDFs within the EHR. Some users experienced difficulty with WiFi connectivity which was addressed by enhancing CliniCam to check for connectivity on launch. CliniCam was implemented successfully and found to be easy to use and useful for clinical practice. CliniCam is
Lindner, James R.
Extension employees (n=23) ranked the following as the most important motivational factors: interesting work, good wages, appreciation, job security, and good working conditions. The findings were related to theories of motivation formulated by Herzberg, Adams, and Vroom. (SK)
... DEPARTMENT OF LABOR Employee Benefits Security Administration Proposed Extension of Information Collection; Comment Request; Employee Benefit Plan Claims Procedures Under ERISA AGENCY: Employee Benefits... Employee Benefits Security Administration (EBSA) is soliciting comments on a proposed extension of the...
Alex Bryson; Lorenzo Cappellari; Claudio Lucifora
We investigate the effect of employer job security guarantees on employee perceptions of job security. Using linked employer-employee data from the 1998 British Workplace Employee Relations Survey, we find job security guarantees reduce employee perceptions of job insecurity. This finding is robust to endogenous selection of job security guarantees by employers engaging in organisational change and workforce reductions. Furthermore, there is no evidence that increased job security through job...
Carlos Alberto Coca Muñoz
Full Text Available This paper draws the attention of the academic community, businessmen, worker associations/unions, and public decision makers to the relation between preventing psychosocial risks for private security workers in El Salvador, and the respect for their worker rights as enshrined in the Constitution of the Republic, the Labor Code, and the General Law for the Prevention of Risk at the Workplace. It addresses the doctrine and legal framework of psychosocial risk, and government responsibility in terms of occupational security and health –specifically, the intervention of work inspections by the Ministry of Labor, and verifying psychosocial risks.DOI: http://dx.doi.org/10.5377/rpsp.v4i1.1557
Full Text Available MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile, in military operation especially in the battlefield in freely medium which naturally needs high mobility and flexibility. Thus, applying MANETs make these networks vulnerable to various types of attacks such aspacket eavesdropping, data disseminating, message replay, message modification, and especially privacy issue. In this paper, we propose a secure communication and information exchange in MANET with considering secure adhoc routing and secure information exchange. Regarding privacy issue or anonymity, we use a reliable asymmetric encryption which protecting user privacy by utilizing insensitive user attributes as user identity, CP-ABE (Ciphertext-Policy Attribute-Based Encryption cryptographic scheme. We also design protocols to implement the proposed scheme for various battlefied scenarios in real evironment using embedded devices. Our experimental results showed that the additional of HMAC (Keyed-Hash Message Authentication Code and AES (Advanced Encryption standard schemes using processor 1.2GHz only take processing time about 4.452 ms, we can confirm that our approach by using CP-ABE with added HMAC and AES schemes make low overhead.
Dayananda, Karanam Ravichandran; Straub, Jeremy
This paper proposes a new hybrid algorithm for security, which incorporates both distributed and hierarchal approaches. It uses a mobile data collector (MDC) to collect information in order to save energy of sensor nodes in a wireless sensor network (WSN) as, in most networks, these sensor nodes have limited energy. Wireless sensor networks are prone to security problems because, among other things, it is possible to use a rogue sensor node to eavesdrop on or alter the information being transmitted. To prevent this, this paper introduces a security algorithm for MDC-based WSNs. A key use of this algorithm is to protect the confidentiality of the information sent by the sensor nodes. The sensor nodes are deployed in a random fashion and form group structures called clusters. Each cluster has a cluster head. The cluster head collects data from the other nodes using the time-division multiple access protocol. The sensor nodes send their data to the cluster head for transmission to the base station node for further processing. The MDC acts as an intermediate node between the cluster head and base station. The MDC, using its dynamic acyclic graph path, collects the data from the cluster head and sends it to base station. This approach is useful for applications including warfighting, intelligent building and medicine. To assess the proposed system, the paper presents a comparison of its performance with other approaches and algorithms that can be used for similar purposes.
Suleyman Erhan DEVECI
Full Text Available This study was carried out with the aim of identifying risk factors coronary artery disease (CAD in the employees of Elazig Security Department. Questionnaires were applied to members and/or spouses (313 individuals of Elazig Security Department admitting to the Health Office for any reason in November-December 2003. Measurements for fasting blood sugar, serum cholesterol levels and blood pressure values were carried out. Of the individuals participating in this study, 1.9% reported having diabetes, 2.9% heart disease and 5.4% hypertension. Mean blood pressure measurements were; systolic 114.1±15.9 and diastolic 74.6±10.3 mmHg, mean fasting blood glucose values were reported as 90.9±16.6 mg/dl. 8.9% had high systolic and 7.7% had high diastolic blood pressure measurements, 16.0% had elevated total cholesterol and 3.5% had elevated fasting blood sugar levels. 36.7% reported to be current smokers, 20.8% reported having regular physical activity. 65.5% reported skipping meals and 47.3% reported eating snacks between the meals. In the group that was analyzed, the rates of smoking, sedentary life style and irregular eating habits that are considered as risk factors for CAD were high. [TAF Prev Med Bull 2006; 5(4.000: 235-243
Solano, Antonio; Dormido, Raquel; Duro, Natividad; González, Víctor
The aim of this paper is to determine the physical proximity of connected things when they are accessed from a smartphone. Links between connected things and mobile communication devices are temporarily created by means of dynamic URLs (uniform resource locators) which may be easily discovered with pervasive short-range radio frequency technologies available on smartphones. In addition, a multi cross domain silent logging mechanism to allow people to interact with their surrounding connected things from their mobile communication devices is presented. The proposed mechanisms are based in web standards technologies, evolving our social network of Internet of Things towards the so-called Web of Things.
Montclair State University, a public New Jersey institution with more than 17,000 students enrolled, has harnessed the cell phone and cellular broadband technology to foster a stronger sense of community and provide students with a safe, secure, and rich learning environment. This paper discusses the potential for new technologies to foster…
The main objective of this project is to develop a secure, reliable, high throughput and integrated wireless network for Vehicle-To-Vehicle (V2V), Vehicle-To-Infrastructure (V2I) and intra-vehicle communications. Novel techniques and communication pr...
... DEPARTMENT OF LABOR Employee Benefits Security Administration 29 CFR Part 2570 RIN 1210-AB49 Prohibited Transaction Exemption Procedures; Employee Benefit Plans AGENCY: Employee Benefits Security... Determinations, Employee Benefits Security Administration, Room N-5700, U.S. Department of Labor, Washington, DC...
Georgiadis, C K; Baltatzis, J; Pangalos, G I
The healthcare environment consists of vast amounts of dynamic and unstructured information, distributed over a large number of information systems. Mobile agent technology is having an ever-growing impact on the delivery of medical information. It supports acquiring and manipulating information distributed in a large number of information systems. Moreover is suitable for the computer untrained medical stuff. But the introduction of mobile agents generates advanced threads to the sensitive healthcare information, unless the proper countermeasures are taken. By applying the role-based approach to the authorization problem, we ease the sharing of information between hospital information systems and we reduce the administering part. The different initiative of the agent's migration method, results in different methods of assigning roles to the agent.
Zhou, Chao; Feng, Renjun; Wang, Liming; Huang, Wei; Guo, Yajuan
Electric power GIS is one of the key information technologies to satisfy the power grid construction in China, and widely used in power grid construction planning, weather, and power distribution management. The introduction of electric power GIS based on mobile applications is an effective extension of the geographic information system that has been widely used in the electric power industry. It provides reliable, cheap and sustainable power service for the country. The accurate state estimation is the important conditions to maintain the normal operation of the electric power GIS. Recent research has shown that attackers can inject the complex false data into the power system. The injection attack of this new type of false data (load integrity attack LIA) can successfully bypass the routine detection to achieve the purpose of attack, so that the control center will make a series of wrong decision. Eventually, leading to uneven distribution of power in the grid. In order to ensure the safety of the electric power GIS system based on mobile application, it is very important to analyze the attack mechanism and propose a new type of attack, and to study the corresponding detection method and prevention strategy in the environment of electric power GIS system based on mobile application.
Solicitation / Modification of Contract. Fort Meade: National Security Agency. Mankiw , N. G. (2006). Essentials of Economics , 4 th Ed. Mason, OH: South...for current smartphone implementations. Results indicate growing strategic opportunities for the DoD to acquire more economical commercial handsets...opportunities for the DoD to acquire more economical commercial handsets and more flexible network services. The business cases may potentially save
Defense Information Systems Network Flag Panel, and its GIG waiver request within 14 days or be subject to censorship and punitive action (Office...can disproportionately affect the outcome of an engagement. Balancing the requirements of GIG security while also incorporating technologies which...classified the paradigm of the industrial age as the division of labor and economies of scale in his 1776 The Wealth of Nations, and it was on these
This book identifies the factors that has enabled the growth of mobile telephony in Africa. The book covers the regulatory factors, the development and usage of mobile application, mobile security and sustainable power source for mobile networks...
Scott, Jim; Railey, Leon
This paper describes the regulatory and radiation protection issues taken into consideration in the licensing of a mobile security screening device which employs backscatter X-ray technology. The views expressed are those of the authors and are not the formal view of ARPANSA. The US standard ANSI N43.17 proposes doses limits for X-ray personnel security screening systems, viz. 0.1 μSv effective dose per scan; 250 μSv effective dose per year. The Z backscatter van TM satisfies the first criterion, as demonstrated by the independent measurements. Finally, if we assume an average effective dose of 0.1 μSv per scan, an individual would require to be scanned approximately 7 times per day, every day for a year in order to exceed the second dose limit of 250 μSv per year. This is considered extremely unlikely, and hence the van also meets the requirements of ANSI N43.17.
Full Text Available Future wireless networks like mobile ad hoc networks and wireless mesh networks are expected to play important role in demanding communications such as mission critical communications. MANETs are ideal for emergency cases where the communication infrastructure has been completely destroyed and there is a need for quick set up of communications among the rescue/emergency workers. In such emergency scenarios wireless mesh networks may be employed in a later phase for providing advanced communications and services acting as a backbone network in the affected area. Internetworking of both types of future networks will provide a broad range of mission critical applications. While offering many advantages, such as flexibility, easy of deployment and low cost, MANETs and mesh networks face important security and resilience threats, especially for such demanding applications. We introduce a family of key agreement methods based on weak to strong authentication associated with several multiparty contributory key establishment methods. We examine the attributes of each key establishment method and how each method can be better applied in different scenarios. The proposed protocols support seamlessly both types of networks and consider system and application requirements such as efficient and secure internetworking, dynamicity of network topologies and support of thin clients.
Naveed Ahmed Sheikh
Full Text Available Providing secure and efficient real-time voice communication in mobile ad hoc network (MANET environment is a challenging problem. Voice over Internet protocol (VoIP has originally been developed over the past two decades for infrastructure-based networks. There are strict timing constraints for acceptable quality VoIP services, in addition to registration and discovery issues in VoIP end-points. In MANETs, ad hoc nature of networks and multi-hop wireless environment with significant packet loss and delays present formidable challenges to the implementation. Providing a secure real-time VoIP service on MANET is the main design objective of this paper. The authors have successfully developed a prototype system that establishes reliable and efficient VoIP communication and provides an extremely flexible method for voice communication in MANETs. The authors’ cooperative mesh-based MANET implementation can be used for rapidly deployable VoIP communication with survivable and efficient dynamic networking using open source software.
Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos
Mobile Ad-hoc Networks (MANETs) are increasingly employed in tactical military and civil rapid-deployment networks, including emergency rescue operations and ad hoc disaster-relief networks. However, this flexibility of MANETs comes at a price, when compared to wired and base station-based wireless networks: MANETs are susceptible to both insider and outsider attacks. This is mainly because of the lack of a well-defined defense perimeter preventing the effective use of wired defenses including firewalls and intrusion detection systems.
Attempting to re-engineer a telemedicine application, this report sets out to make a cheap yet robust solution that is portable and easy to use. It will be a Inera compliant system using Android that authenticates in a secure way with a .NET server behind F5 full proxy.The report begins with a background to telemedicine, and a technical specification that might fulfill the demands of privacy laws regarding health care records. The focus of the report moves on to inspects the choices for aut...
Articles focus on mobile Internet hand on behalf of the smartphone security issues, from the communication network selection strategy, the mobile terminal selection strategy, the use of mobile phones security policy, social information security environment to create four latitude on smartphone security strategy for full range analysis, introduce, strive for ordinary readers fully understand the safety problem of the intelligent mobile phone and application in the reality of life and learning, so that everyone's smartphone safer and more at ease.%文章聚焦于移动互联网手代智能手机安全问题，从通信网络选择策略、手机终端选择策略、手机使用安全策略、社会信息安全环境营造四个纬度对智能手机安全策略进行全方位的分析、介绍，力求让普通读者全面了解掌握智能手机安全问题，并应用于现实生活学习中，从而使大家的智能手机更安全、使用更放心。
Full Text Available Knowledge economy regards employee knowledge as a most important asset. It is a priority task to ensure systematic knowledge continuity of those employees who are the holders of critical knowledge. The aim of the article is to analyse the causes of mobility of knowledge workers and categorise types of employees and mobility according to the future development of an employee’s career. The research areas, i.e. ensuring knowledge continuity and employee turnover were analysed based on the premise of significant relation between those two areas. The data were collected in organizations in the Czech Republic. Surveys were drawn across sectors to ensure representativeness of the outcomes. The outputs revealed two basic approaches to maintaining knowledge inside organizations. Employees can be divided into knowledge workers and remainder, who seek only security. A knowledge worker who decides to transfer is not motivated by the amount of salary (they do not mind a lower level of remuneration; on the contrary they suffer due to an unclear vision on the part of the organization, where they used to work; they cannot stay in conditions where there is no possibility to participate on personal growth. Future research in this area should focus on the return of investments in the knowledge and employee learning, training and retention.
The theme of the bachelor's thesis is the issue of employee care and related provision of employee benefits. The main objective is to analyze the effective legislation and characterize the basic areas of employee care. First of all, the thesis focuses on the matter of employee care and related legislation analyzing the working conditions, professional growth of the employees, catering of employees and special conditions for some employees. Furthermore, the special attention is paid to the vol...
Grindrod, Kelly; Boersema, Jonathan; Waked, Khrystine; Smith, Vivian; Yang, Jilan; Gebotys, Catherine
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Employee expenses. 404.1045 Section 404.1045 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Employment, Wages, Self-Employment, and Self-Employment Income Wages § 404.1045 Employee expenses. Amounts...
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Employee response. 204.34... DEBT COLLECTION Salary Offset § 204.34 Employee response. (a) Introduction. An employee must respond to... ways discussed in § 204.34, Employee response, and § 204.35, Petition for pre-offset hearing. Where...
... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Employee benefit. 229.45 Section 229.45 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE RAILROAD RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.45 Employee benefit. The original...
Prevalence and predictors of problematic alcohol use, risky sexual practices and other negative consequences associated with alcohol use among safety and security employees in the Western Cape, South Africa.
Harker Burnhams, Nadine; Parry, Charles; Laubscher, Ria; London, Leslie
Harmful alcohol use can compromise worker health and productivity. Persons employed in safety-sensitive occupations are particularly vulnerable to hazardous alcohol use and its associated risks. This study describes the patterns of harmful alcohol use, related HIV risks and risk factors for the harmful use of alcohol among a sample of employees in South Africa working in the safety and security sector. A cross-sectional study that formed the baseline for a clustered randomized control trial was undertaken in 2011. A random sample of 325 employees employed within a safety and security sector of a local municipality in the Western Cape Province of South Africa participated in the study. Data were collected by means of an 18-page self-administered structured questionnaire and analyzed using SAS/STAT software version 9.2. For all significance testing, the F-statistic and p-values are reported. Three hundred and twenty-five employees were surveyed. Findings suggest that more than half (76.1%) of the 78.9% of participants who consumed alcohol engaged in binge drinking, with close to a quarter reporting a CAGE score greater than the cut-off of 2, indicating potentially hazardous drinking patterns. The study further found that employees who use alcohol are more likely to engage in risky sexual practices when under the influence. A favorable drinking climate (p safety-sensitive occupations at the workplace. It suggests that persons employed within such positions are at high risk for developing alcohol-related disorders and for contracting HIV. This study highlights the need for testing a comprehensive package of services designed to prevent hazardous alcohol use among safety and security employees.
Ali Abduljalil Abdulla
Full Text Available In this paper, a secure elevator handling system is presented to enable a flexible movement of wheeled mobile robots among laboratories distributed in different floors. The automated handling system consists mainly of an ADAM module which has the ability to call the elevator to the robot’s current floor and to request the destination floor. The LPS25HP pressure sensor attached to an STM32F411 microcontroller is utilized as a height measurement system to estimate the robot’s current floor inside the elevator. The ultrasonic sensor is used to recognize the elevator’s door status. Many challenges have to be solved to realize a stable height measurement system based on pressure sensor readings. The difference of the pressure sensor readings before and after soldering is realized by comparing the reading after soldering with an accurate barometric reading. In addition, the sensor output signal shows oscillation and wide variation of the same floor pressure sensor readings at different times. The oscillation in the output signal has been handled using a first order FIR smoothing filter. The first order filter was selected to balance between the stability and the elapsed time to receive the updated values. An auto-calibration stage is established to maintain the wide variation in the atmospheric pressure readings by calibrating the sensor readings with the robot’s current floor before entering the elevator. An error handling management system is utilized to guarantee a stable automated elevator management system performance. Many experiments to assess and verify the performance of the automated elevator management system and robot’s current floor estimation are reported. The experimental results show that the proposed methods and sub-systems developed for the mobile robot are effective and efficient in providing a transportation service in multiple-floor life sciences laboratories.
.... Domestic and national security information is provided through agency reports and direct communications from department heads, but lawmakers also receive information directly from employees within the agencies...
Peltier, Thomas R
Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r
Hoog, A., & Strzempka, K. (2011). iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota ()These are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers) continue to bring ne...
Hoog, A., & Strzempka, K. (2011). iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota ()These are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers) continue to bring ne...
A. Y. Ometov
Full Text Available The paper deals with the problems of peer-to-peer systems such as Device-to-Device (D2D operating in 5G networks. First, we consider the task of ensuring secure, direct connections between mobile users by utilizing the developed simulator. We present results of the dynamic user clustering in geographical proximity exchanging packet data and Levy flight mobility model. The study results give the possibility to determine benefits of the technology integration in the 3GPP LTE network in terms of throughput. We have shown that technology implementation provides a system capacity increase up to 30% with a slight growth in the time required for the initialization of direct connections. The results may be useful for the academy and industrial experts working in the field of telecommunication systems and information security
Bardus, Marco; Hamadeh, Ghassan; Hayek, Bouchra; Al Kherfan, Rawan
Overweight and obesity have become major health problems globally with more than 1.9 billion overweight adults. In Lebanon, the prevalence of obesity and overweight is 65.4% combined. Risk factors of obesity and overweight are preventable and can be addressed by modifications in the environment and in an individual's lifestyle. Mobile technologies are increasingly used in behavioral, self-directed weight management interventions, providing users with additional opportunities to attain weight control (weight loss, weight gain prevention, etc). Mobile apps may allow for the delivery of Just-in-Time Adaptive Interventions (JITAIs), which provide support through skill building, emotional support, and instrumental support, following the participants' progress. A few commercially available apps offer JITAI features, but no studies have tested their efficacy. The primary objective of this study is to examine the feasibility of a self-directed weight loss intervention, targeting employees of an academic institution, using a virtual coaching app with JITAI features (Lark) and a self-help calorie-counting app (MyFitnessPal). The secondary objective is to estimate the effects of the intervention on main study outcomes. This study is a single-center, parallel, randomized controlled trial with 2 study arms (intervention and control). Participants will be randomly allocated in equal proportions to the intervention (Lark) and control groups (MyFitnessPal). To be eligible for this study, participants must be employed full- or part-time at the university or its medical center, able to read English, have a smartphone, and be interested in controlling their weight. Recruitment strategies entail email invitations, printed posters, and social media postings. We will assess quantitative rates of recruitment, adherence, and retention, self-reported app quality using the user version of the Mobile App Rating Scale. We will also assess changes in weight-related outcomes (absolute weight
... for OMB Review; Comment Request; Securities Lending by Employee Benefit Plans ACTION: Notice. SUMMARY: The Department of Labor (DOL) is submitting the Employee Benefits Security Administration (EBSA) sponsored information collection request (ICR) titled, ``Securities Lending by Employee Benefit Plans,'' to...
Joseph, Jyothy; K, Shinto Kurian
In the fast growing mobile revolutionary era, many operating systems are playing vital role in present market. This study is intending to identify the apt and secure mobile based on mobile operating systems capability and user requirements.
and A8 algorithm contained within the SIM are used for authenticating the MCD to the MSC and for specific sessions, respectively. The A5 algorithm is...using the A5 algorithm initialized by the Kc and the number of the frame to be encrypted. 4. MCD Applications Applications are computer software...an icon from the list of applications on the device. The application opens to the first screen (Figure 5). This screen has two options for the
Employees development is one of the main activities of human resources management. It is connected with other activites, such as training of employees, career development and performance management. In the recent days there is an increased importance put on employees development, although the current economic crisis still has some consequences, such as reduced development budget of many organizations. The thesis mentiones employees development in the first place in the context of management o...
Daruwalla, Zubin Jimmy; Wong, Keng Lin; Thambiah, Joseph
The application of telemedicine has been described for its use in medical training and education, management of stroke patients, urologic surgeries, pediatric laparoscopic surgeries, clinical outreach, and the field of orthopedics. However, the usefulness of a secure, mobile telehealth application, and messaging platform has not been well described. A pilot study was conducted to implement a health insurance portability and accountability act (HIPAA) compliant form of communication between doctors in an orthopedic clinical setting and determine their reactions to MyDoc, a secure, mobile telehealth application, and messaging platform. By replacing current methods of communication through various mobile applications and text messaging services with MyDoc over a six week period, we gained feedback and determined user satisfaction with this innovative system from questionnaires handed to the program director, program coordinator, one trauma consultant, all orthopedic residents, and six non-orthopedic residents at the National University Hospital in Singapore. Almost everyone who completed the questionnaire strongly agreed that MyDoc should replace current systems of peer to peer communication in the hospital. The majority also felt that the quality of images, videos, and sound were excellent. Almost everyone agreed that they could communicate easily with each other and would feel comfortable doing so routinely. The majority felt that virtual consults through MyDoc should be made available to inpatients as well as outpatients to potentially lessen clinic loads and provide a secure manner in which patients can communicate with their primary teams any time convenient to both. It was also agreed by most that the potential of telerounding had advantages, especially on weekends as a supplement to normal rounds. Potential uses of MyDoc in an orthopedic clinical setting include HIPAA-compliant peer to peer communication, clinical outreach in the setting of trauma, supervision
Sollenberger, Mitchel A
.... TSA's application of the SSI regulations has, however, resulted in some controversies over airport security procedures, employee accountability, passenger screening, and airport secrecy agreements...
Administration Research and Theory, 25–57. O’Leary, R. (2010). Traditions, ideas, spirits, event, challenge. Journal of Public Adminstration , 1–36. Purdue...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited HOW SHOULD PUBLIC ... PUBLIC SECTOR EMPLOYEES? by Bryant S. Lucas March 2012 Thesis Advisor: Christopher Bellavita Second Reader: Lauren Wollman THIS PAGE
Full Text Available In this study, due to the influence of Mobbing (MO on Burnout (BU, the mediating role of Job Stress (JS on employees is examined. Hence, 826 employees of public and private institutions in Ankara were included in the sample. The data obtained by a questionnaire that prepared by Leymann (1996’s MO scale, and Maslach (1981's BU scale and Haynes (1996's JS scale. Data was evaluated by using One-Way ANOVA, correlation, regression, and multiple regression SPSS. As can be seen from the results of research, applied and perceived MO has a significant impact on employees' JS’s levels and becomes effective in the creation of JS. On the other hand, BU syndrome were seen as a consequence of the resulting JS. These conditions affect each other and existence of one within the organizational structure, results emergence of the other two. Therefore, management of organization, all levels of managers, and employees as individuals should be aware of these psychological states and conduct studies aimed for its prevention.In this research, meaningful relationships have been identified in the mediating role of JS at the impact of MO on BU. On the other hand in terms of demographic variables, significant variations were found in the levels of MO, BU, and JS
Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny
Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.
National Aeronautics and Space Administration — Cloud computing environments offer opportunities for malicious users to penetrate security layers and damage, destroy or steal data. This ability can be exploited to...
Ma, Xingpo; Liu, Xingjian; Liang, Junbin; Li, Yin; Li, Ran; Ma, Wenpeng; Qi, Chuanda
A novel network paradigm of mobile edge computing, namely TMWSNs (two-tiered mobile wireless sensor networks), has just been proposed by researchers in recent years for its high scalability and robustness. However, only a few works have considered the security of TMWSNs. In fact, the storage nodes, which are located at the upper layer of TMWSNs, are prone to being attacked by the adversaries because they play a key role in bridging both the sensor nodes and the sink, which may lead to the disclosure of all data stored on them as well as some other potentially devastating results. In this paper, we make a comparative study on two typical schemes, EVTopk and VTMSN, which have been proposed recently for securing Top- k queries in TMWSNs, through both theoretical analysis and extensive simulations, aiming at finding out their disadvantages and advancements. We find that both schemes unsatisfactorily raise communication costs. Specifically, the extra communication cost brought about by transmitting the proof information uses up more than 40% of the total communication cost between the sensor nodes and the storage nodes, and 80% of that between the storage nodes and the sink. We discuss the corresponding reasons and present our suggestions, hoping that it will inspire the researchers researching this subject.
Al Ayubi, Soleh U; Pelletier, Alexandra; Sunthara, Gajen; Gujral, Nitin; Mittal, Vandna; Bourgeois, Fabienne C
Hospitals today are introducing new mobile apps to improve patient care and workflow processes. Mobile device adoption by hospitals fits with present day technology behavior; however, requires a deeper look into hospital device policies and the impact on patients, staff, and technology development. Should hospitals spend thousands to millions of dollars to equip all personnel with a mobile device that is only used in a hospital environment? Allowing health care professionals to use personal mobile devices at work, known as bring-your-own-device (BYOD), has the potential to support both the hospital and its employees to deliver effective and efficient care. The objectives of this research were to create a mobile app development guideline for a BYOD hospital environment, apply the guideline to the development of an in-house mobile app called TaskList, pilot the TaskList app within Boston Children's Hospital (BCH), and refine the guideline based on the app pilot. TaskList is an Apple operating system (iOS)-based app designed for medical residents to monitor, create, capture, and share daily collaborative tasks associated with patients. To create the BYOD guidelines, we developed TaskList that required the use of mobile devices among medical resident. The TaskList app was designed in four phases: (1) mobile app guideline development, (2) requirements gathering and developing of TaskList fitting the guideline, (3) deployment of TaskList using BYOD with end-users, and (4) refinement of the guideline based on the TaskList pilot. Phase 1 included understanding the existing hospital BYOD policies and conducting Web searches to find best practices in software development for a BYOD environment. Phase 1 also included gathering subject matter input from the Information Services Department (ISD) at BCH. Phase 2 involved the collaboration between the Innovation Acceleration Program at BCH, the ISD Department and the TaskList Clinical team in understanding what features should be
A. O. Vybornov
Full Text Available Categories roles of information security employees of the banking organization are defined. Functional roles are described. The relationship between functional roles, employees, functions and authority are defined. The role of information security employees of the banking organization for information security system and information security management system are described. Recommendations for the implementation phases of the selection and appointment of the functional roles and to control the selection and role assignment information security employees of the banking organization are stated.
Full Text Available Hoog, A., & Strzempka, K. (2011. iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota (email@example.comThese are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers continue to bring new and sometimes hair-pulling challenges into our labs and on-site engagements, research and understanding of these tiny computers is increasing at what seems an exponential rate. This is especially true in the iOS (Apple Computerâ€™s mobile operating system that powers the iPhone, iPad, iPod Touch and Apple TV space. The diligent work of talented computer scientists in this field allows examiners everywhere to reap the benefits of easier, faster and more effective examinations that yield more accurate and defendable results.(see PDF for full review
Information and information systems have become embedded in the fabric of contemporary organizations throughout the world. As the reliance on information technology has increased, so too have the threats and costs associated with protecting organizational information resources. To combat potential information security threats, organizations rely…
Warden, Michael L.
Since 1957 the Department of Defense has subjected all forms of speech of U.S. military personnel meant for publication to prepublication review based on security and policy criteria. The historical development of the Defense Department's prepublication review program and its specific implementation by the U.S. Air Force lead to questions of First…
...- ) Employment, Wages, Self-Employment, and Self-Employment Income Employment § 404.1005 Who is an employee. You must be an employee for your work to be covered as employment for social security purposes. You are an...
The National Institute for Health and Care Excellence has produced a new guideline looking at improving the health and wellbeing of employees, with a particular focus on organisational culture and context, and the role of line managers.
Munich, Stephan A; Tan, Lee A; Nogueira, Danilo M; Keigher, Kiffon M; Chen, Michael; Crowley, R Webster; Conners, James J; Lopes, Demetrius K
The primary correlate to survival and preservation of neurologic function in patients suffering from an acute ischemic stroke is time from symptom onset to initiation of therapy and reperfusion. Communication and coordination among members of the stroke team are essential to maximizing efficiency and subsequently early reperfusion. In this work, we aim to describe our preliminary experience using the Join mobile application as a means to improve interdisciplinary team communication and efficiency. We describe our pilot experience with the initiation of the Join mobile application between July 2015 and July 2016. With this application, a mobile beacon is transported with the patient on the ambulance. Transportation milestone timestamps and geographic coordinates are transmitted to the treating facility and instantly communicated to all treatment team members. The transport team / patient can be tracked en route to the treating facility. During our pilot study, 62 patients were triaged and managed using the Join application. Automated time-stamping of critical events, geographic tracking of patient transport and summary documents were obtained for all patients. Treatment team members had an overall favorable impression of the Join application and recommended its continued use. The Join application is one of several components of a multi-institutional, interdisciplinary effort to improve the treatment of patients with acute ischemic stroke. The ability of the treatment team to track patient transport and communicate with the transporting team may improve reperfusion time and, therefore, improve neurologic outcomes.
Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...
Davis, Sarah; Mitchell, James; Palmer, Kevin A; Riggins, Liyang; Truex, Kathryn; Williams, Zac
...). Specifically, we evaluated whether all agency employees, including contractors, received IT security training and awareness and whether employees with significant IT security responsibilities...
Full Text Available Urry, John (2007 Mobilities.Oxford: Polity Press.Urry, John (2007 Mobilities.Oxford: Polity Press.John Urry (1946-, profesor en la Universidad de Lancaster, es un sociólogo de sobra conocido y altamente reputado en el panorama internacional de las ciencias sociales. Su dilatada carrera, aparentemente dispersa y diversificada, ha seguido senderos bastante bien definidos dejando tras de sí un catálogo extenso de obras sociológicas de primer nivel. Sus primeros trabajos se centraban en el campo de la teoría social y la filosofía de las ciencias sociales o de la sociología del poder [...
Bitsch, Vera; Hogberg, Michael
Fourteen businesses participated in case studies of labor management practices. Fifteen non-supervisory employee interviews were analyzed regarding components of job satisfaction. Components were family values, achievement, recognition, work itself, involvement, personal life, interpersonal relationships, job security, supervision, working conditions, organization, safety, compensation and information.
Full Text Available Mobile agents (MAs is one of the technologies considered in the recent years to perform management processes. This technology provides the ability to move code in distributed environments and to connect with other resources and agents locally which makes it an appropriate technology in the development of software applications of distributed network, especially management systems. For using mobile agent technology, an infrastructure for the management of MAs is needed. In this project, an infrastructure called MCT management is introduced for network management. In this infrastructure, some protocols like SNMP are used to get management data for the network administrator. With respect to management ability, MAs can dynamically access the database SNMP (i.e. MIB and extract the data required by the managers. Most well-known methods are characterized by being static relative to code and location in which components cannot modify their location or code in a lifetime. However, the MAs method can dynamically increase communications, reduce costs and overcome certain limitations by changing location and components.
Despite the benefits of employee participation in decision making, it is not widespread. Making it work requires commitment, job security, training, access to information, communication channels, goal setting, flat organizational structures, and financial reinforcement. (SK)
Welcome to Berkeley Lab. You are joining or are already a part of a laboratory with a sterling tradition of scientific achievement, including eleven Nobel Laureates and thirteen National Medal of Science winners. No matter what job you do, you make Berkeley Lab the outstanding organization that it is. Without your hard work and dedication, we could not achieve all that we have. We value you and thank you for choosing to be part of our community. This Employee Handbook is designed to help you navigate the Lab. With over 3,000 employees, an additional 3,000 guests visiting from countries around the world, a 200-acre campus and many policies and procedures, learning all the ins and outs may seem overwhelming, especially if you're a new employee. However, even if you have been here for a while, this Handbook should be a useful reference tool. It is meant to serve as a guide, highlighting and summarizing what you need to know and informing you where you can go for more detailed information. The general information provided in this Handbook serves only as a brief description of many of the Lab's policies. Policies, procedures and information are found in the Lab's Regulations and Procedures Manual (RPM), Summary Plan Descriptions, University of California policies, and provisions of Contract 31 between the Regents of the University and the U.S. Department of Energy. In addition, specific terms and conditions for represented employees are found in applicable collective bargaining agreements. Nothing in this Handbook is intended to supplant, change or conflict with the previously mentioned documents. In addition, the information in this Handbook does not constitute a contract or a promise of continued employment and may be changed at any time by the Lab. We believe employees are happier and more productive if they know what they can expect from their organization and what their organization expects from them. The Handbook will familiarize you with the
Przybelinski, Steven A.
Increasing use of outsourcing gives employees concern about personal job security. Using a modified van Kaam approach, this qualitative phenomenological study examined perceptions and experiences of 12 employees' on the influence outsourcing had on employee turnover. Five themes describing employee perceptions emerged: (a) preparation---education gives job security, (b) plausibility---all believed job loss plausible, (c) emotional influence---feelings of stress, threat, betrayal, and not being valued, (d) environment---value of communication and interaction with leaders, and (e) confidence---gained from increased education, skills, and knowledge protected from outsourcing. Significance of this study to leadership is the identification of employee perceptions of outsourcing and motivating factors influencing employee turnover during times of outsourcing. Findings might present new information and assist leaders with employee retention concerns for future outsourcing activities.
This paper shows that training of older employees is less effective. Training effectiveness is measured with respect to key dimensions such as career development, earnings, adoption of new skills, flexibility or job security. Older employees also pursue less ambitious goals with their training participation. An important reason for these differences during the life cycle might be that firms do not offer the “right” training forms and contents. Older employees get higher returns from informal ...
J Akbari; R Akbari; F Farasati; B Mahaki
Background: Exposure to job stress causes deleterious effects on physical and mental health of employees and productivity of organizations. Objective: To study work-related stressors among employees of prisons of Ilam, western Iran. Methods: In a cross-sectional study conducted from July to October 2013, 177 employees of Ilam prisons and security-corrective measures organization were enrolled in this study. The UK Health and Safety Executive Organization 35-item questionnaire for asse...
Kyndt, Eva; Dochy, Filip; Michielsen, Maya; Moeyaert, Bastiaan
In this continuously changing contemporary economy, companies have to be able to anticipate technological innovations and to compete with other companies worldwide. This need makes important a company's ability to evolve through its employees' learning and through continuous development. Securing and retaining skilled employees plays an important…
Vance, Robert J.; Kuhnert, Karl W.
This study explored the consequences of perceived job security and insecurity on the psychological and physical health of employees. Data were gathered from employees of a large midwestern manufacturing organization that produced products for material removal applications. Surveys were sent through company mail to a stratified random sample of 442…
Maurice Gesthuizen; Jaco Dagevos
Original title: Arbeidsmobiliteit in goede banen. Hundreds of thousands of employees change jobs each year. Why do they do this, and what benefits do they derive from it? Many employees are not in the right jobs. Job dissatisfaction is found to be a key reason for labour mobility. These
Heber, Elena; Ebert, David Daniel; Lehr, Dirk; Nobis, Stephanie; Berking, Matthias; Riper, Heleen
Work-related stress is associated with a variety of mental and emotional problems and can lead to substantial economic costs due to lost productivity, absenteeism or the inability to work. There is a considerable amount of evidence on the effectiveness of traditional face-to-face stress-management interventions for employees; however, they are often costly, time-consuming, and characterized by a high access threshold. Web-based interventions may overcome some of these problems yet the evidence in this field is scarce. This paper describes the protocol for a study that will examine the efficacy and cost-effectiveness of a web-based guided stress-management training which is based on problem solving and emotion regulation and aimed at reducing stress in adult employees. The study will target stressed employees aged 18 and older. A randomized controlled trial (RCT) design will be applied. Based on a power calculation of d=.35 (1-β of 80%, α = .05), 264 participants will be recruited and randomly assigned to either the intervention group or a six-month waitlist control group. Inclusion criteria include an elevated stress level (Cohen's Perceived Stress Scale-10 ≥ 22) and current employment. Exclusion criteria include risk of suicide or previously diagnosed psychosis or dissociative symptoms. The primary outcome will be perceived stress, and secondary outcomes include depression and anxiety. Data will be collected at baseline and seven weeks and six months after randomization. An extended follow up at 12 months is planned for the intervention group. Moreover, a cost-effectiveness analysis will be conducted from a societal perspective and will include both direct and indirect health care costs. Data will be analyzed on an intention-to-treat basis and per protocol. The substantial negative consequences of work-related stress emphasize the necessity for effective stress-management trainings. If the proposed internet intervention proves to be (cost-) effective, a
Ke, Chih-Kun; Lin, Zheng-Hua
The progress of information and communication technologies (ICT) has promoted the development of healthcare which has enabled the exchange of resources and services between organizations. Organizations want to integrate mobile devices into their hospital information systems (HIS) due to the convenience to employees who are then able to perform specific healthcare processes from any location. The collection and merage of healthcare data from discrete mobile devices are worth exploring possible ways for further use, especially in remote districts without public data network (PDN) to connect the HIS. In this study, we propose an optimal mobile service which automatically synchronizes the telecare file resources among discrete mobile devices. The proposed service enforces some technical methods. The role-based access control model defines the telecare file resources accessing mechanism; the symmetric data encryption method protects telecare file resources transmitted over a mobile peer-to-peer network. The multi-criteria decision analysis method, ELECTRE (Elimination Et Choice Translating Reality), evaluates multiple criteria of the candidates' mobile devices to determine a ranking order. This optimizes the synchronization of telecare file resources among discrete mobile devices. A prototype system is implemented to examine the proposed mobile service. The results of the experiment show that the proposed mobile service can automatically and effectively synchronize telecare file resources among discrete mobile devices. The contribution of this experiment is to provide an optimal mobile service that enhances the security of telecare file resource synchronization and strengthens an organization's mobility.
Weiss, Marjorie D; Tyink, Steve; Kubiak, Curt
Employee-centric strategies have moved from employee satisfaction and brand awareness to employee "affinity" or "attachment." In today's marketplace, occupational health nurses understand that differentiation (i.e., the perception of uniqueness) is the direct result of superior employee interactions, which lead to better employee care, enduring employee relationships, loyal employees, and satisfied employers. What drives employees to occupational health nurse attachment? The answer is a passion for rising above the competition to create ideal employee experiences.
Akbari, J; Akbari, R; Farasati, F; Mahaki, B
Exposure to job stress causes deleterious effects on physical and mental health of employees and productivity of organizations. To study work-related stressors among employees of prisons of Ilam, western Iran. In a cross-sectional study conducted from July to October 2013, 177 employees of Ilam prisons and security-corrective measures organization were enrolled in this study. The UK Health and Safety Executive Organization 35-item questionnaire for assessment of occupational stress was used to determine job stress among the studied employees. Job stress was highest among employees of "correction and rehabilitation center" of Ilam province followed by "Dalab vocational training center." There was no significant relationship between occupational stress and age, work experience, level of education, marital status, sex of employees, and obesity. Employees of prisons, for their nature of job and work environment, are exposed to high level of occupational stress.
Full Text Available Background: Exposure to job stress causes deleterious effects on physical and mental health of employees and productivity of organizations. Objective: To study work-related stressors among employees of prisons of Ilam, western Iran. Methods: In a cross-sectional study conducted from July to October 2013, 177 employees of Ilam prisons and security-corrective measures organization were enrolled in this study. The UK Health and Safety Executive Organization 35-item questionnaire for assessment of occupational stress was used to determine job stress among the studied employees. Results: Job stress was highest among employees of “correction and rehabilitation center” of Ilam province followed by “Dalab vocational training center.” There was no significant relationship between occupational stress and age, work experience, level of education, marital status, sex of employees, and obesity. Conclusion: Employees of prisons, for their nature of job and work environment, are exposed to high level of occupational stress.
Kirlappos, I.; Parkin, S.; Sasse, M. A.
Traditionally, organizations manage information security through policies and mechanisms that employees are expected to comply with. Non-compliance with security is regarded as undesirable, and often sanctions are threatened to deter it. But in a recent study, we identified a third category of employee security behavior: shadow security. This consists of workarounds employees devise to ensure primary business goals are achieved; they also devise their own security measures to counter the risk...
This bachelor's thesis examines the subject of employee motivation and employee benefits. The basic terms and theories needed to comprehend the subject are explained in the theoretical part of the work. The theoretical part of the work also focuses on employee benefits, mainly the goal of employee benefits and listing of currently available employee benefits. In the practical part of the work is an analysis and comparison of employee benefits used in two companies that are representing privat...
Breaugh, James A
The way an organization recruits can influence the type of employees it hires, how they perform, and their retention rate. This article provides a selective review of research that has addressed recruitment targeting, recruitment methods, the recruitment message, recruiters, the organizational site visit, the job offer, and the timing of recruitment actions. These and other topics (e.g., the job applicant's perspective) are discussed in terms of their potential influence on prehire (e.g., the quality of job applicants) and posthire (e.g., new employee retention) recruitment outcomes. In reviewing research, attention is given to the current state of scientific knowledge, limitations of previous research, and important issues meriting future investigation.
Yum, Dae Hyun; Shin, Jong Hoon; Lee, Pil Joong
Yeh and Tsai recently proposed an enhanced mobile commerce security mechanism. They modified the lightweight security mechanism due to Lam, Chung, Gu, and Sun to relieve the burden of mobile clients. However, this article shows that a malicious WAP gateway can successfully obtain the mobile client's PIN by sending a fake public key of a mobile commerce server and exploiting information leakage caused by addition operation. We also present a countermeasure against the proposed attack.
Full Text Available The use of smartphones worldwide is growing very fast and also the malicious attacks have increased. The mobile security applications development keeps the pace with this trend. The paper presents the vulnerabilities of mobile applications. The Android applications and devices are analyzed through the security perspective. The usage of restricted API is also presented. The paper also focuses on how users can prevent these malicious attacks and propose some prevention measures, including the architecture of a mobile security system for Android devices.
..., educational or recreational activities for the benefit of employees. ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Employee pensions and benefits... UTILITY HOLDING COMPANY ACT OF 1935 2. Expense § 256.926 Employee pensions and benefits. This account...
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep
Full Text Available Hoog, A., and Strzempka, K. (2011. iPhone and iOS Forensic: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Syngress, Elsevier, xv + 310 pages; ISBN-10: 1597496596; ISBN-13: 978-1597496599, $69.95Reviewed by Simson Garfinkel, Naval Postgraduate SchoolIn April 2011 news outlets around the world revealed shocking news about Apple’s iPhone: for reasons that were not apparently clear, every iPhone contained a small SQLite database that logged where and when the user had been whenever the phone was turned on, and those records went back for pretty much as long as the user had owned their phone. Apple eventually declared that the data cache was the result of a bug and issued a software update to prune the database (it had previously grown without limit. Privacy activists rejoiced that their beloved iPhones were once again trustworthy. But forensics examiners just shook their heads: many had known about the iPhone’s tracking capabilities for more than a year and had kept quiet. They had made good use of that data. Apple’s pro-privacy patch was actually a setback for law enforcement.(see PDF for full review
The goal of this thesis is to get acquainted with the issue of employee motivation from a theoretical perspective, and then analyze the incentive system in a selected company - Sellier & Bellot. In conclusion, I would like to evaluate the lessons learned and propose some changes and recommendations for improving motivation in the analyzed company. The work is divided into four parts. The first three are rather theoretical. The first part deals with the explanation of the concept of motivation...
Mosadeghrad, Ali Mohammad
The purpose of this study was to measure the level of quality of work life (QWL) among hospital employees in Iran. Additionally, it aimed to identify the factors that are critical to employees' QWL. It also aimed to test a theoretical model of the relationship between employees' QWL and their intention to leave the organization. A survey study was conducted based on a sample of 608 hospital employees using a validated questionnaire. Face, content and construct validity were conducted on the survey instrument. Hospital employees reported low QWL. Employees were least satisfied with pay, benefits, job promotion, and management support. The most important predictor of QWL was management support, followed by job proud, job security and job stress. An inverse relationship was found between employees QWL and their turnover intention. This study empirically examined the relationships between employees' QWL and their turnover intention. Managers can take appropriate actions to improve employees' QWL and subsequently reduce employees' turnover.
This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected
Full Text Available Mobile computing has supplanted internet computing because of the proliferation of cloud-based applications and mobile devices (such as smartphones, palmtops, and tablets. As a result of this, workers bring their mobile devices to the workplace and use them for enterprise work. The policy of allowing the employees to work with their own personal mobile devices is called Bring Your Own Devices (BYOD. In this article, we discuss BYOD’s background, prevalence, benefits, challenges, and possible security attacks. We then review contributions of academic researchers on BYOD. The Universiti Putra Malaysia online databases (such as IEEE Xplore digital library, Elsevier, Springer, ACM digital library were used to search for peer-reviewed academic publications and other relevant publications on BYOD. The Google Scholar search engine was also used. Our thorough review shows that security issues comprise the most significant challenge confronting BYOD policy and that very little has been done to tackle this security challenge. It is our hope that this review will provide a theoretical background for future research and enable researchers to identify researchable areas of BYOD.
WHY DO I NEED SECURITY? Introduction The Importance of an Effective Security Infrastructure People, Process, and Technology What Are You Protecting Against? Types of Attacks Types of Attackers Security as a Competitive Advantage Choosing a Solution Finding Security Employees The Layered Approach UNDERSTANDING REQUIREMENTS AND RISK What Is Risk? Embracing Risk Information Security Risk Assessment Assessing Risk Insurance SECURITY POLICIES AND PROCEDURES Internal Focus Is Key Security Awareness and Education Policy Life Cycle Developing Policies Components of a Security Policy Sample Security Po
The use of smartphones worldwide is growing very fast and also the malicious attacks have increased. The mobile security applications development keeps the pace with this trend. The paper presents the vulnerabilities of mobile applications. The Android applications and devices are analyzed through the security perspective. The usage of restricted API is also presented. The paper also focuses on how users can prevent these malicious attacks and propose some prevention measures, including the a...
Full Text Available Mobile devices are being considered as service platforms for mobile health information delivery, access and communication. However mobiles face challenges with regard to delivering secure multimedia based health services due to limitations...
随着移动互联网的发展，Android智能手机在市场上占据着很大的份额。文章首先分析了Android现有的安全机制沙箱模型和数字证书，然后提出Android系统存在的安全问题，最后从系统开发者和用户2个角度设计安全策略来对现有的安全策略进行改进。%With the development of mobile Internet, mobile phones using Androidsystem occupy a large share in the market. First of all, this paper analyzes sandbox model and digital certiifcate which are the existing security mechanisms of Androidsystem. Secondly, security problems in the Androidsystem have been put forward. Finally, security strategies are designed from two angles of system developers and users to improve the existing security strategy.
-for-performance systems) perceived as fair and when are they not? When can differences in contribution (equity) overrule the social norm of equality? Which contingent reward structure should be applied for teamwork members, if any? Which reward structure should be utilized to motivate employees to a continuous search......This article investigates the factors that determine workplace actors’ appeal to social norms of fairness in some situations and what ‘fairness’ is perceived as consisting of. When is a pay level considered as relativity fair, and when is it not? When are contingent pay systems (i.e. pay...... for smarter working procedures and solutions? These are central concerns of motivation theory, where rational choice decisions are counterbalanced by endowment effects or other fairness concerns. Management is placed in a dilemma between what is, e.g., an economically rational structure of incentives...
... 10 Energy 2 2010-01-01 2010-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...
... DEPARTMENT OF LABOR Employee Benefits Security Administration Advisory Council on Employee Welfare... appointment to the Advisory Council on Employee Welfare and Pension Benefit Plans. Section 512 of the Employee... of an Advisory Council on Employee Welfare and Pension Benefit Plans (the Council), which is to...
Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from
only have delegated investigative authority over their civilian employee population and therefore, can only report the overall timeliness for that...completed or pending security clearance determinations for government employees and contractors during the preceding fiscal year that have taken longer...Clearance Determinations to Congress. The IAA directs this report to include the number of United States Government (USG) employees who held a
... DEPARTMENT OF LABOR Employee Benefits Security Administration Advisory Council on Employee Welfare... Council on Employee Welfare and Pension Benefit Plans (the Council), which is to consist of 15 members to... desiring to recommend one or more individuals for appointment to the Advisory Council on Employee Welfare...
... DEPARTMENT OF LABOR Employee Benefits Security Administration Advisory Council on Employee Welfare... Council on Employee Welfare and Pension Benefit Plans (the Council), which is to consist of 15 members to... one or more individuals for appointment to the Advisory Council on Employee Welfare and Pension...
... DEPARTMENT OF LABOR Employee Benefits Security Administration Advisory Council on Employee Welfare... Council on Employee Welfare and Pension Benefit Plans (the Council), which is to consist of 15 members to... to the Advisory Council on Employee Welfare and Pension Benefit Plans to represent any of the groups...
... DEPARTMENT OF LABOR Employee Benefits Security Administration Advisory Council on Employee Welfare... charter for the Advisory Council on Employee Welfare and Pension Benefit Plans is renewed. The Advisory Council on Employee Welfare and Pension Benefit Plans shall advise the Secretary of Labor on technical...
... DEPARTMENT OF LABOR Employee Benefits Security Administration Advisory Council on Employee Welfare... Council on Employee Welfare and Pension Benefit Plans (the Council), which is to consist of 15 members to... appointment to the Advisory Council on Employee Welfare and Pension Benefit Plans to represent any of the...
... DEPARTMENT OF LABOR Employee Benefits Security Administration Advisory Council on Employee Welfare... charter for the Advisory Council on Employee Welfare and Pension Benefit Plans is renewed. The Advisory Council on Employee Welfare and Pension Benefit Plans shall advise the Secretary of Labor on technical...
Victor S. Gorbatov
Full Text Available Information security is one of the most important criteria for the quality of developed software. To obtain a sufficient level of application security companies implement security process into software development life cycle. At this stage software companies encounter with deficit employees who able to solve problems of software design, implementation and application security. This article provides a description of the secure software development training course. Training course of application security is designed for co-education students of different IT-specializations.
Kyndt, Eva; Dochy, Filip; Michielsen, Maya; Moeyaert, Bastiaan
In this continuously changing contemporary economy, companies have to be able to anticipate technological innovations and to compete with other companies worldwide. This need makes important a company’s ability to evolve through its employees’ learning and through continuous development. Securing and retaining skilled employees plays an important role in this process, because employees’ knowledge and skills are central to companies’ ability to be economically competitive. Given that employee ...
Lidong Wang; Cheryl Ann Alexander
Mobile devices such as smartphones and tablets support kinds of mobile computing and services. They can access to the cloud or offload the computation-intensive part to the cloud computing resources. Mobile cloud computing (MCC) integrates the cloud computing into the mobile environment, which extends mobile devices’ battery lifetime, improves their data storage capacity and processing power, and improves their reliability and information security. In this paper, the applications of smartphon...
Rose, Jonathan G; Adler, Adam
The first part of this article highlights important judicial developments involving employee benefits and the Employee Retirement Income Security Act of 1974 ("ERISA"), as amended, during the latter part of 2003 and the first part of 2004, including the most significant U.S. Supreme Court and federal circuit court decisions. The second part covers recent legislative and regulatory developments in employee benefits law. This article is not meant to be exhaustive, but discusses the more important developments during 2003-2004, with particular focus on issues of concern to the insurance industry.
... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Social security number required. 209.3... RAILROAD EMPLOYERS' REPORTS AND RESPONSIBILITIES § 209.3 Social security number required. Each employer shall furnish to the Board a social security number for each employee for whom any report is submitted...
Claussen, Jörg; Grohsjean, Thorsten
While most academics agree that information technology (IT) has a positive impact on firm performance, performance differences between firms due to IT investments are quite large. One way to increase firm productivity when adopting IT is to hire experienced people. However, using a data set that ...
This paper describes a computer network and data security problems in an existing company. Two main issues were pointed out: data loss protection and uncontrolled data copying. Security system was designed and implemented. The system consists of many dedicated programs. This system protect from data loss and detected unauthorized file copying from company's server by a dishonest employee.
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan
The topic of my bachelor's thesis is the employee motivation and benefits. The thesis is divided in two parts, a theoretical one and a practical one. The theoretical part deals with the theory of motivation and individual employee benefits. The practical part describes employee benefits in ČSOB, where I did my research by questionnaires that were filled in by employees from different departments of ČSOB. These employees answered questions about their work motivation and benefits. The resultts...
Dishon-Berkovits, Miriam; Koslowsky, Meni
Although researchers have studied employee lateness empirically (e.g., S. Adler & J. Golan, 1981; C. W. Clegg, 1983), few have attempted to describe the punctual employee. In the present study, results of a discriminant analysis on employees in Israel indicated that a personality characteristic, time urgency, a subcomponent of Type A behavioral pattern, distinguished between punctual and late employees. Organizational commitment and age of employee's youngest child also distinguished between the groups.
The target of this bachelor thesis is to analyze employee benefits from the perspective of employees and to employers suggest possible ideas to improve their provision. The work is divided into two parts: theoretical and practical. The theoretical part describes the overal remuneration of employees, payroll system and employee benefits. Benefits are included in the remuneration system, broken and some of them are defined. The practical part presents a survey among employees in the Czech Repub...
Teufl , Peter; Zefferer , Thomas; Stromberger , Christof
Part 4: Software Security; International audience; The initially consumer oriented iOS and Android platforms, and the newly available Windows Phone 8 platform start to play an important role within business related areas. Within the business context, the devices are typically deployed via mobile device management (MDM) solutions, or within the bring-your-own-device (BYOD) context. In both scenarios, the security depends on many platform security functions, such as permission systems, manageme...
Hardaway, Cecily R.; Mcloyd, Vonnie C.
This article draws on extant research from the disciplines of psychology, sociology, and economics to identify linkages between individual, family, community, and structural factors related to social mobility for African Americans during the transition to adulthood. It considers how race and class together affect opportunities for social mobility through where African Americans live, whom they associate with, and how they are impacted by racial and class-related stigma. Of particular interest is social mobility as accomplished through academic achievement, educational attainment, employment, economic independence, and homeownership. Research on five issues is reviewed and discussed: (a) the unique vulnerabilities of newly upwardly mobile African Americans, (b) wealth as a source of inequality, (c) racism and discrimination, (d) the stigma associated with lower-class status, and (e) social and cultural capital. The article concludes with a summary and directions for future research. PMID:19636721
Edit Szilvia Rubóczki
Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.
Patterns of employee turnover from a medium-sized law firm in Australia were examined in regard to theories of worker mobility (matching, sectoral shift, and incentive). Results support a role for matching effects, but personnel practices affect the timing of turnover. Matching and incentive-based theories do not explain the high rates of turnover…
... DEPARTMENT OF LABOR Employee Benefits Security Administration 29 CFR Part 2570 RIN 1210-AA98 Prohibited Transaction Exemption Procedures; Employee Benefit Plans Correction In proposed rule document 2010-21073 beginning on page 53172 in the issue of Monday, August 30, 2010, make the following correction...
Gabel, Daniel Glen [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Hughes, Heather [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)
This training at Los Alamos National Laboratory contains the following sections: Introduction to the Laboratory, Institutional Quality Assurance, Facilities, Policies, Procedures, and Other Requirements, Safety Expectations, Worker Protection: Occupational Safety and Health, Industrial Hygiene and Safety, Lockout/Tagout, General Employee Radiological Training, Fire Protection, Security, Emergency Operations, Occupational Health, and Environment.
Full Text Available In the study the analysis of agricultural employees structure on the basis of data from 120 agricultural farms in Kąty Wrocławskie has been conducted. The research confirmed, that agricultural people maximum of time spend on work in their own farms. The maximum annual time of work begins at the end of last five years of working age. The men work relatively less, in agricultural farms in the case of small area farms. While the women, if better educated and in mobile working age work more. Then the biggest engagement of work outside agricultural farm concerns persons at age of 25 to 44.
In the study the analysis of agricultural employees structure on the basis of data from 120 agricultural farms in Kąty Wrocławskie has been conducted. The research confirmed, that agricultural people maximum of time spend on work in their own farms. The maximum annual time of work begins at the end of last five years of working age. The men work relatively less, in agricultural farms in the case of small area farms. While the women, if better educated and in mobile working age work more. Then...
This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview
... Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting; Notice #0;#0;Federal Register... Employee Benefits Security Administration 154th Meeting of the Advisory Council on Employee Welfare and... Advisory Council on Employee Welfare and Pension Benefit Plans will be held on November 3-4, 2010. The...
Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.
YARAHMADI, H.; KAMANKESH, M.
Abstract. A mobile agent is software which performs an action autonomously and independently as a person or organizations assistance. Mobile agents are used for searching information, retrieval information, filtering, intruder recognition in networks, and so on. One of the important issues of mobile agent is their security. It must consider different security issues in effective and secured usage of mobile agent. One of those issues is the integrity’s protection of mobile agents.In this paper...
Abstract. The study assessed bank workers' level of job security and also investigated the relationship between job security level and job performance among employees of the banks. ... These comprised both permanent and contract workers.
Kröger, Knut; Creutzburg, Reiner
The growth of Android in the mobile sector and the interest to investigate these devices from a forensic point of view has rapidly increased. Many companies have security problems with mobile devices in their own IT infrastructure. To respond to these incidents, it is important to have professional trained staff. Furthermore, it is necessary to further train their existing employees in the practical applications of mobile forensics owing to the fact that a lot of companies are trusted with very sensitive data. Inspired by these facts, this paper - a continuation of a paper of January 2012  which showed the conception of a course for professional training and education in the field of computer and mobile forensics - addresses training approaches and practical exercises to investigate Android mobile devices.
The research team worked in collaboration with GDOT to conduct the 2016 GDOT Employee Survey. This research study aimed to increase the response rate and the usefulness of the feedback from the GDOT employee survey to support organizational decisions...
Well-designed wellness programs can keep healthy employees healthy, support employees with : health risks to improve their health behaviors, and facilitate organizational efforts to achieve : workforce performance goals. : Productivity lost through a...
... syndrome was often 10-15 minutes late for work every day due to amount and quality of sleep. The employer provided this employee with a half an hour flexible start time. Depending on when the employee arrived, ...
... at work. Allow employee to remain on the job after a seizure when possible Provide flexible schedule Modify an attendance policy Provide leave while the employee is adjusting to medications Work a straight shift instead of rotating shifts Personal ...
This paper reports that, as an outgrowth of research into physical security systems, Sandia is investigating robotic technologies for improving physical security performance and flexibility. Robotic systems have the potential to allow more effective utilization of security personnel, especially in scenarios where they might be exposed to harm. They also can supplement fixed site installations where sensors have failed or where transient assets are present. The Remote Security Station (RSS) program for the defense Nuclear Agency is developing a proof-of-principle robotic system which will be used to evaluate the role, and associated cost, of robotic technologies in exterior physical security systems. The RSS consists of three primary elements: a fixed but quickly moveable tripod with intrusion detection sensors and assessment camera; a mobile robotic platform with a functionally identical security module; and a control console which allows an operator to perform security functions and teleoperate the mobile platform
Laszlo Goerke; Jörn Block; Jose Maria Millan; Concepcion Roman
Work effort varies greatly across employees, as evidenced by substantial differences in absence rates. Moreover, absenteeism causes sizeable output losses. Using data from the European Community Household Panel (ECHP), this paper investigates absence behavior of family employees, i.e. workers who are employed in enterprises owned by a relative. Our estimates indicate that being a family employee instead of a regular employee in the private sector significantly reduces both the probability and...
In an era of low unemployment rates, companies are not only struggling to recruit talented employees, but they are straining to keep the ones they have. The purpose of this literature review is to look at companies, including many outside of the healthcare industry, and learn how they use incentives to retain employees. A review of a recently published book lists the following reasons why people stay with companies: Career growth, learning and development, exciting work challenges Meaningful work, making a difference and a contribution Great people Being part of a team Good boss, inspiring leadership Recognition for a job well done Fun on the job Autonomy, a sense of control over work and job security Flexibility Fair pay and benefits Great work environment and location Pride in the organization, it's mission and quality of product Family friendly Companies have to change with the times to retain a good work force. To survive, companies should ask employees what would keep them committed, look at all the possibilities, and then create an environment that makes employees want to stay because it provides the life balance they are looking for. There is risk in asking employees what would keep them from looking elsewhere. Employers need to weigh the risk of losing employees with the possibility of raising expectations by asking employees directly what they want. In the current climate, that may be a necessary risk.
One of the best ways for a child care program to lose an employment-related lawsuit is failure to document the performance of its employees. Documentation of an employee's performance can provide evidence of an employment-related decision such as discipline, promotion, or discharge. When properly implemented, documentation of employee performance…
Gleason, Ann Whitney
If you are wondering what mobile technology adoption means for your library or how to get started, Mobile Technologies for Every Library will answer your questions! This book will detail the opportunities and pitfalls in using mobile technology in libraries. It will also address platforms, options, security, and best practices for starting new mobile services programs or improving existing services. Gleason previews many useful apps for libraries. Web links and resources are also included.
Kreyer, Nina; Pousttchi, Key; Turowski, Klaus
Companies are not going to invest into the development of innovative applications or services unless these can be charged for appropriately. Thus, the existence of standardized and widely accepted mobile payment procedures is crucial for successful business-to-customer mobile commerce. The acceptance of mobile payment procedures depends on costs, security and convenience issues. For the latter, it is important that a procedure can be used over the different payment scenarios mobile commerce, ...
Highly developed mobile technology and devices enable the rise of mobile game industry and mobile marketing. Hence mobile marketing for mobile game is an essential key for a mobile game success. Even though there are many articles on marketing for mobile games, there is a need of highly understanding mobile marketing strategies, how to launch a mobile campaign for a mobile game. Besides that, it is essential to understand the relationship between mobile advertising and users behaviours. There...
What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...
Hardaway, Cecily R.; McLoyd, Vonnie C.
This article draws on extant research from the disciplines of psychology, sociology, and economics to identify linkages between individual, family, community, and structural factors related to social mobility for African Americans during the transition to adulthood. It considers how race and class together affect opportunities for social mobility…
Feliciano-Torres, Hector L.
The purpose of this quantitative, descriptive non experimental study was to investigate the use of wireless mobile network devices at a post-secondary institution using the innovation diffusion theory (IDT) and technology acceptance model (TAM) as background theories. The researcher intended to explore how students and personnel of the institution…
... compensation and section 209 of the Social Security Act for a definition of creditable wages.) Closing date... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Computation of the employee's 1937 Act LSDP basic amount. 234.20 Section 234.20 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE...
... Regulations; Exempted Senior Employee Positions AGENCY: Office of Government Ethics (OGE). ACTION: Final rule... notice of the revocation of certain regulatory exemptions of senior employee positions at the Securities... employee'' for a period of one year from knowingly making, with the intent to influence, any communication...
Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. Written in a user friendly style, this guide will get readers up and running with XenMobile MDM.If you want to run your mobile enterprises on XenMobile, or work on a BYOD strategy within your organization, then this is the ideal book for you. XenMobile MDM comprehensively explores how to set up and use XenMobile to provision, secure, and manage mobile devices.
Jaramillo, David; Agarwal, Ankur
This book presents effective ways to partition mobile devices such that the enterprise system access and its information are completely separated from the personal information. For those using mobile devices for personal and business purposes, the ability to keep the data secure and separate is critical. The applications for security in smart platforms range from personal email accounts to global enterprise systems.Several approaches for mobile virtualization are described, all creating secure and secluded environments for enterprise information. The authors present a reference architecture th
Hvass, Kristian Anders; Torfadóttir, Embla
Employee recovery addresses either employee well-being or management's practices in aiding employees in recovering themselves following a service failure. This paper surveys the cabin crew at a small, European, low-cost carrier and investigates employees' perceptions of management practices to aid...... personnel achieve service recovery. Employee recovery within service research often focuses on front-line employees that work in a fixed location, however a contribution to the field is made by investigating the recovery of spatially dispersed personnel, such as operational personnel in the transport sector......, who have a work place away from a fixed or central location and have minimal management contact. Results suggest that the support employees receive from management, such as recognition, information sharing, training, and strategic awareness are all important for spatially dispersed front...
Computer and network security have become concerns for enterprises ranging from sole proprietorships run from home offices to global corporations and government agencies with hundred of thousands of employees...
Full Text Available Abstract This study is conducted to investigate the effect of job stress on job performance. A random sampling technique is used to collect primary data of 120 employees of four telecommunication companies of Mongolia i.e. Mobicom Unitel Skytel and G-mobile. A well-structured questionnaire is utilized to collect relevant data descriptive and logistic analysis is used to estimate and describe the findings of results. It is found that work overload is major reason of stress among employees and majority of employees reduce their productivity and loss of interest in job due to stress. As for concern health issue eyes strain dizziness and disorder in sleep are due to job stress. According to results of logit model parameters of education experience and salary per month are statistically significant and have positive impact on employees performance but age family size no relaxation time giving to employees during working hours and work overload are statistically significant and have negative impact on employees job performance. For suggestions companies should increase salaries of employees and give reward to employees those have work overload. Workload of employees should reduce by proper work redesign and efficient management by proper allocation of job. It is also found that stress also becomes reason of several illnesses and majority of employees dont have medical facilities first aid at working place therefore it is suggested that companies should also provide medical facilities first aid for employees at work place.
Smith, Gwendolynn T.
The increasing dependence on technology presented more vulnerability to security breaches of information and the need to assess security awareness levels in federal organizations, as well as other organizations. Increased headlines of security breaches of federal employees' security actions prompted this study. The research study reviewed the…
Hoepman, J.H.; Joosten, H.J.M.; Knobbe, J.W.
A method and a system for securing communication between at least a first and a second hardware components of a mobile device is described. The method includes establishing a first shared secret between the first and the second hardware components during an initialization of the mobile device and,
Shah, P J; Martinez, R; Cooney, E
The US health care industry is in the midst of revolutionary changes. Under tremendous pressures from third-party payers and managed care programs to control costs while providing high quality medical services, health care entities are now looking at information technologies to help them achieve their goals. These goals typically include improved productivity, efficiency and decision-making capabilities among staff members. Moreover, hospitals and other health care facilities that provide a broad and integrated range of inpatient and outpatient care, wellness and home care services are in the best position to offer comprehensive packages to managed care and private insurers. Many health care providers and administrators are considered mobile employees. This mobility can range from intra-building and intra-campus to multi-site and metropolitan areas. This group often relies on a variety of information technologies such as personal computers, communicating laptops, pagers, cellular phones, wireline phones, cordless phones and fax machines to stay in touch and handle information needs. These health care professionals require mobile information access and messaging tools to improve communications, control accessibility and enhance decision-making capabilities. AirBoss mobile messaging services could address the health care industry's need for improved messaging capabilities for its mobile employees. The AirBoss family of services supports integrated voice services, data messaging, mobile facsimile and customized information delivery. This paper describes overview of the current mobile data networking capability, the AirBoss architecture, the health care-related applications it addresses and long-term benefits. In addition, a prototype application for mobile home health care workers is illustrated. This prototype application provides integrated e-mail, information services, web access, real-time access and update of patient records from wireline or wireless networks
support wireless capabilities, such as Wi-Fi or LTE -based 4G cellular infrastructures, into the DOD’s enterprise software, GCSS-MC could be a large...fielded mobile devices through ViaSat Inc. ViaSat’s goal is to provide secure communications over 3G/4G/ LTE cellular and Wi-Fi networks, secure...or commercial carrier network. While these measures are not all encompassing for protecting mobile devices, they are a ways that drastically improve
Rambow, Mark; Preuss, Thomas; Berdux, Jörg; Conrad, Marc
Simplicity is the major advantage of REST based webservices. Whereas SOAP is widespread in complex, security sensitive business-to-business aplications, REST is widely used for mashups and end-user centric applicatons. In that context we give an overview of REST and compare it to SOAP. Furthermore we apply the GeoDrawing application as an example for REST based mobile applications and emphasize on pros and cons for the use of REST in mobile application scenarios.
This project deals with authentication by a mobile device. The mobile device with the operating system Android 5.0 was chosen as authentication device. The user can perform authentication with emulation of contactless chip cards by using Host-based Card Emulation, which runs via Near Field Communication, where cryptographic keys are stored in a secure environment KeyStore. The project continues with implementation of authentication via Bluetooth LE and describes application for authentization...
Full Text Available This research is concerning the effect of workplace environment, job satisfaction, and job performance on employee turnover, and the background is to get the convenience of employees condition, the satisfaction of job results, maximum performance, and keep and reduce in and out employees. The purpose of this research is to see how far the influence of workplace environment, job satisfaction, and job performance on employee turnover. Planning of this research uses primary data that is got by handing over questioners to 200 employees in Telecommunication company in East Jakarta. The analysis method which is used is double regresi. Results of this research give conclusion that there's a positive and significant influence of workplace environment, job satisfaction, and job performance on employee turnover.
De Patta, Joe
Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…
Full Text Available Abstract: Purpose of the article: The level of unemployment and employee mobility can be considered as one of the persisting economical problems. Current knowledge economy is based on the quality and productivity of labour (employees. Employees and their productivity are thus key factor of success of economy. This study examines causes and consequences of employee mobility and how does it affect economy of state and organisations. Paper describes based on the content analysis and primary research employee mobility and suggests practices how to minimize its negative impact. Methodology/methods: The outputs are listed based upon primary and secondary research. Secondary data sources were processed from Czech statistical office and content analysis of scientific papers which focus on remuneration of employee mobility costs. Primary data has been collected in two successive quantitative surveys by means of questionnaire investigation. The surveys were focus on random sample of employees (who had already left their jobs. Scientific aim: The aim of the paper is to reveal costs and consequences of employee mobility and to suggest recommendations to keep employees in organisations in order to minimize loses, costs and production losings. Findings: The results show calculation of employee mobility costs. Costs per unemployed employee are listed. The outputs reflect whether it is just loss of production (employee just exchange job positions or additional loss of state caused by receiving unemployment support, lowering of VAT and other related items. The revealed outputs allow us to assume that employee mobility is quite expensive phenomenon, not just because of employee turnover cost, but also because of high loss of production in organisations and also in state economy. All results are counted per employee per year. Finally, recommendations to lower employee mobility and its costs and losses are listed. Suggestions are based on the results of surveys of
Vasudevan, Amit; Newsome, James
This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.
Abston, Kristie A.; Kupritz, Virginia W.
The role of retail employees as customers was explored by quantitatively examining the influence of service climate and employee patronage on employee turnover intentions. Employees representing all shifts in two stores of a national retailer participated. Results indicated that employee patronage partially mediates the effects of service climate…
S. B. Purić
Full Text Available The paper describes the functionality and implementation of applications for mobile phones used in the School of Electrical Engineering at the University of Belgrade in the daily work of faculty employees. The application uses a system’s shared data for financial and material accounting, human resources and teaching process. The system was implemented using a REST Web service, Google's model for Android REST client applications and Robospice technologies.
John Wiley & Sons
"Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.
WIRELESS TECHNOLOGY IN MOBILE DEVICES ..................................................................................................18 1. 4G LTE ...System LOS Line of Sight LTE Long-Term Evolution MANET Mobile Ad-hoc Network MCP Mobility Capabilities Package MPR Multipoint Relays NFC...National Security Agency, 2003). CCI, while unclassified, still requires strict physical control measures to protect against loss or compromise
Mobile Devices: Tools and Technologies provides readers with an understanding of the mobile landscape available to app developers, system and network engineers, and the avid techie. As the trend of mobile technology has enabled the continuous development of ubiquitous applications, this book offers insights into tools and technologies critical to evaluating and implementing mobile strategies.The book is organized into four parts of 18 contributed chapters written by engineers in the areas of application and database development, mobile enterprise strategy, and networking and security. Througho
As sales and usage of iPhones increase so does the demand on organizations that conduct examinations on this device. iPhone and iOS Forensics takes an in-depth look at methods and processes that analyze the iPhone/iPod in an official legal manner. All of the methods and procedures outlined in the book can be taken into any court room. This book details the iPhone with information data sets that are new and evolving, with official hardware knowledge from Apple itself to help aid investigators. iPhone market share has increased to 50% of worldwide mobile phone usageEmployment in digital fo
The Nuclear Employee Data System (NEDS) is a centralized, dedicated, computer-based information management system designed to provide participating utilities with information that allows them to grant unescorted access to transient workers. The ability to access security-related information on individuals is one of the most important features of the NEDS. This paper discusses the sponsorship, management, system development activities, and system configuration and provides a cost/benefit ratio
Levine, Hermine Zagat
The author reports company responses to a questionnaire concerning employee assistance programs (EAP). Answers concern EAP structure, staff training, use of outside consultant, services provided by EAPs, program administration, employee confidence in EAPs, advertising the program, program philosophy, problems encountered by EAP users, coverage and…
Gupta, Deeksha; Bajramovic, Edita
Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.
Snyder, Chris; Southwell, Michael
Kristensen, Catharina Juul
Employees form an important but less explored and utilized resource in social innovation in social welfare organisations it the third and public sectors. The employees have important knowledge of the everyday challenges of the organisations, the wishes and needs of their users and customers......, and of the local communities which can inspire and refine innovations. They are active, albeit not always consciously so and potential social intrapreneurs. Although wider international research exists the Nordic research seems to dominate the field. The aim of this chapter is to contribute to the existing...... research on employees as social intrapreneurs (the fields of employee-driven innovation and social intrapreneurship) by conceptualizing active employee participation in social innovation and elucidate the potential and multiplicity of the phenomenon. The chapter is theoretical explorative....
THAT SOME MANAGERS MUST BE ABLE TO HELP EMPLOYEES DEVELOP OR APPLY CREATIVITY. IN THIS CONFERENCE PAPER WE WILL ANALYSE A CASE STUDY IN ORDER TO PRODUCE A THEORETICAL FRAMEWORK FOR IDENTIFYING WHEN AND HOW EMPLOYEES BECOME CREATIVE AT WORK. AN ESSENTIAL ASPECT OF THIS CONFERENCE PAPER WILL BE ANALYZING......PREVIOUS STUDIES (e.g. Hertel, 2015) HAS SHOWN THAT SOME CLEANING INDUSTRIES ARE ACTUALLY REQUIRING CREATIVE EMPLOYEES. HUMAN BEINGS ARE (c.f. Richards, 2010) BY DEFINITION CREATIVE BUT NOT ALL EMPLOYEES ARE USED TO OR ACTUALLY ALLOWED TO APPLY CREATIVITY IN EVERYDAY ORGANIZATIONAL LIFE. THIS MEANS...... THE CREATIVITY PRODUCED BY EMPLOEES. ANALYZING THE CREATIVITY PRODUCED WILL HELP US DEVELOP A THEORETICAL FRAMEWORK FOR UNDERSTANDING HOW CREATIVE THE EMPLOYEES ACTUALLY BECOMES....
Witoff, Robert J.; Doody, David F.
At the time of this reporting, there are 2,589 rich mobile devices used at JPL, including 1,550 iPhones and 968 Blackberrys. Considering a total JPL population of 5,961 employees, mobile applications have a total addressable market of 43 percent of the employees at JPL, and that number is rising. While it was found that no existing desktop tools can realistically be replaced by a mobile application, there is certainly a need to improve access to these desktop tools. When an alarm occurs and an engineer is away from his desk, a convenient means of accessing relevant data can save an engineer a great deal of time and improve his job efficiency. To identify which data is relevant, an engineer benefits from a succinct overview of the data housed in 13+ tools. This need can be well met by a single, rich, mobile application that provides access to desired data across tools in the ops infrastructure.
... securities list as a result of marriage, inheritance, gift or otherwise without specific intent to acquire..., which is available in the NRC Public Document Room. (6) Tax treatment of gain on divested securities... employee) may be eligible to defer the tax consequences of divestiture under subpart J of 5 CFR part 2634...
As institutions review and strengthen their plans to secure confidential data, what proactive role does the human resource professional play as a strategic partner? Why are employees a critical part of the solution? And how are they educated regarding their responsibilities with data security? Datatel's HR product manager shares some…
Discusses rules governing social security and their implications for part-time employees in various countries. Topics include (1) methods of financing social security, (2) benefits, (3) measures concerning the unemployed, (4) a floor for employers' contributions, (5) graduated contribution rates, and (6) financial incentives. (CH)
D'Angelo, Michael S; Arias, Jean
Healthcare Security should be considered an active component in an infectious disease event, the authors maintain, and security officers must be included in an Employee Health screening and N95 fit testing initiative to safely welcome the incoming infected patients. In this article, they spell out the different levels of precautions officers should become familiar with in order to protect themselves.
The areas of the mobile device management is developing very fast. Hence, the thesis “An approach for management of mobile devices in pharmaceutical company” introduces all key directives that should be considered when implementing mobile device management. A survey of standards and recommendations on the mobile device security has been elaborated. Relevant guidelines for security policy definition are presented with the risk analysis for mobile device usage. Furthermore, the model for mana...
Shen, J. M.; O'Grady, Michael J.; O'Hare, G. M. P. (Greg M. P.)
Service provision for mobile users poses several challenges for those managing enterprise information systems. Some of these are ubiquitous, for example, privacy and security. Others give rise to integration and interoperability issues. The agent paradigm, though offering potential in fixed networked scenarios, has not been seriously considered as a mechanism for incorporating mobile clients, primarily to their computational intractability on mobile devices. However, recent developments in ag...
Lam, Simon S. K.; Ng, Thomas W. H.; Feldman, Daniel C.
The current study examines the relationship between external job mobility and salary for employees in different career stages. Based on career stage and career timetable theories, we predict that external job mobility would generate the greatest salary benefits for early-career employees whereas external job mobility would generate fewer salary…
Oyungerel Altangerel; Wang Ruimei; Ehsan Elahi; Bayandalai Dash
Abstract This study is conducted to investigate the effect of job stress on job performance. A random sampling technique is used to collect primary data of 120 employees of four telecommunication companies of Mongolia i.e. Mobicom Unitel Skytel and G-mobile. A well-structured questionnaire is utilized to collect relevant data descriptive and logistic analysis is used to estimate and describe the findings of results. It is found that work overload is major reason of stress among employees and ...
de Goede, M.; Burgess, J.P.
1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered
Voeller, John G
Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.
Full Text Available The aim of this study was to check the association of factors like work environment, job security,pay satisfaction and participation in decision making; with organizational commitment of theemployees, working in the banking sector of Pakistan. Two hundred and fifteen (215 responses toquestionnaire-based survey were collected from managerial and non-managerial employees, andanalyzed. The analysis showed positive correlations between the dependent and independentvariables. The relation between job security and organizational commitment was the most significant,indicating that a secure job can yield higher level of commitment. Work environment also had asignificant relation with organizational commitment, showing that a healthy and friendly workenvironment may enhance an employee’s commitment towards his work and organization. Paysatisfaction and participation in decision-making had low correlations with organizationalcommitment. Age and tenure seemed to affect the commitment of employees, with highercommitment shown for higher age and tenure; whereas gender did not show significant change incommitment level of employees.
Full Text Available The aim of this paper is to establish a general methodology for calculating the costs incurred by employee turnover. This paper deals with identification of costs incurred by the departure of an employee, and does not deal with the cost of recruitment of a new employee. Economic calculations are adjusted to the tax policy in the Czech Republic. The costs of employee turnover (according to Bliss, 2012 include the costs of substitution of the unoccupied position, costs of conducting the exit interview and termination of the contract. The cost of an executive’s time to understand the causes of leaving and costs of the leaving employee’s training were also determined. Important factors in the costs of employee turnover also include the loss of knowledge and possibly also a loss of customers. Costs of lost employee and department productiveness represent an important part of the costs of employee turnover, as well. For all of these costs there have been proposed general calculations formulas.
Mödersheim, Sebastian Alexander; Nielson, Flemming; Nielson, Hanne Riis
We present a new technique for analyzing platforms that execute potentially malicious code, such as web-browsers, mobile phones, or virtualized infrastructures. Rather than analyzing given code, we ask what code an intruder could create to break a security goal of the platform. To avoid searching...... that by communication, the malicious code can learn new information that it can use in subsequent operations, or that we may have several pieces of malicious code that can exchange information if they \\meet". To formalize both the platform and the malicious code we use the mobile ambient calculus, since it provides...... a small, abstract formalism that models the essence of mobile code. We provide a decision procedure for security against arbitrary intruder ambients when the honest ambients can only perform a bounded number of steps and without path constraints in communication....
Mödersheim, Sebastian Alexander; Nielson, Flemming; Nielson, Hanne Riis
We present a new technique for analyzing platforms that execute potentially malicious code, such as web-browsers, mobile phones, or virtualized infrastructures. Rather than analyzing given code, we ask what code an intruder could create to break a security goal of the platform. To avoid searching...... that by communication, the malicious code can learn new information that it can use in subsequent operations, or that we may have several pieces of malicious code that can exchange information if they “meet”. To formalize both the platform and the malicious code we use the mobile ambient calculus, since it provides...... a small, abstract formalism that models the essence of mobile code. We provide a decision procedure for security against arbitrary intruder processes when the honest processes can only perform a bounded number of steps and without path constraints in communication. We show that this problem is NP-complete....
... Internet site, Social Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY INFORMATION... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA-2011-0008] RIN 0960-AH29 Protecting the Public and Our Employees in Our Hearing Process AGENCY: Social Security Administration. ACTION...
Mitrović, Miroslav M.; Ivaniš, Željko
Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...
This thesis examines ownership of the firm by its employees, of varying stakes. It begins by identifying the existence of employee ownership in a Chinese context, presented in the form of a general analytical discussion which is informed by a review of the available evidence on the subject...... of this phenomenon. Employee ownership is found to have played a role in Chinese economic transition as a transitory phase before non-state enterprises were afforded official recognition in a context of publicly-owned enterprise privatisation. Senior managers became the key beneficiaries in firm sales and most...
... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Social Security. 638.528 Section 638.528... TITLE IV-B OF THE JOB TRAINING PARTNERSHIP ACT Center Operations § 638.528 Social Security. The Act provides that students are covered by title II of the Social Security Act (42 U.S.C. 401 et seq.) and shall...
Hong, J.; Lindqvist, J.; Pawar, P.; Stuntebeck, E.
HotMobile 2008 presented a two-day program on mobile computing systems and applications. The authors focuses on the sessions on sensors, modularity, wireless, security, systems, and screens. The mobile device is the most amazing invention in history and that it has had the largest impact on human
Wattanapongsakorn, Naruemon; Joukov, Nikolai
This book presents the peer-reviewed contributions of ICMWT2016, an international conference devoted to mobile and wireless technology. Researchers and professionals from academia and industry met to discuss the cutting-edge developments in the field. The book includes papers on mobile and wireless networks, the increasingly important security issues, data management, as well as the latest developments in mobile software development.
Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.
... employee pensions-IRS Form 5305-SEP. 2520.104-48 Section 2520.104-48 Labor Regulations Relating to Labor... compliance for model simplified employee pensions—IRS Form 5305-SEP. Under the authority of section 110 of... Security Act of 1974 in the case of a simplified employee pension (SEP) described in section 408(k) of the...
... employee benefit plans. 2509.94-3 Section 2509.94-3 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR GENERAL INTERPRETIVE BULLETINS RELATING TO...-kind contributions to employee benefit plans. (a) General. This bulletin sets forth the views of the...
... DEPARTMENT OF LABOR Employee Benefits Security Administration 166th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 166th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans (also known as...
... DEPARTMENT OF LABOR Employee Benefits Security Administration 151st Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 151st open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans will be held on...
... DEPARTMENT OF LABOR Employee Benefits Security Administration 158th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Teleconference Meeting Pursuant to the.... 1142, the 158th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans...
... DEPARTMENT OF LABOR Employee Benefits Security Administration 165th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 165th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans (also known as...
... DEPARTMENT OF LABOR Employee Benefits Security Administration 156th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 156th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; (also known as...
... DEPARTMENT OF LABOR Employee Benefits Security Administration 167th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 167th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans (also known as...
... DEPARTMENT OF LABOR Employee Benefits Security Administration 159th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 159th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans (also known as...
... DEPARTMENT OF LABOR Employee Benefits Security Administration 168th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Teleconference Meeting Pursuant to the.... 1142, the 168th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans...
... welfare plans maintained by employee organizations. 2520.104-26 Section 2520.104-26 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR REPORTING AND... exemption for certain unfunded dues financed welfare plans maintained by employee organizations. (a) Scope...
... DEPARTMENT OF LABOR Employee Benefits Security Administration 150th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 150th open meeting of the full Advisory Council on Employee Welfare and Pension Benefit Plans will be...
... DEPARTMENT OF LABOR Employee Benefits Security Administration 169th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 169th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans (also known as...
... DEPARTMENT OF LABOR Employee Benefits Security Administration 155th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Teleconference Meeting Pursuant to the.... 1142, the 155th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans...
... DEPARTMENT OF LABOR Employee Benefits Security Administration 164th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 164th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans (also known as...
... DEPARTMENT OF LABOR Employee Benefits Security Administration 153rd Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 153rd open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans will be held on...
... DEPARTMENT OF LABOR Employee Benefits Security Administration 161st Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 161st open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans (also known as...
... DEPARTMENT OF LABOR Employee Benefits Security Administration 160th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 160th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans (also known as...
... DEPARTMENT OF LABOR Employee Benefits Security Administration 163rd Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Teleconference Meeting Pursuant to the.... 1142, the 163rd open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans...
... employee welfare benefit plans. 2509.78-1 Section 2509.78-1 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR GENERAL INTERPRETIVE BULLETINS RELATING TO... payments by certain employee welfare benefit plans. The Department of Labor today announced its...
... DEPARTMENT OF LABOR Employee Benefits Security Administration 152nd Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 152nd open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans will be held on...
... DEPARTMENT OF LABOR Employee Benefits Security Administration 164th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 164th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans (also known as...
... DEPARTMENT OF LABOR Employee Benefits Security Administration 157th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 157th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans (also known as...
... information or records in legal proceedings? 403.100 Section 403.100 Employees' Benefits SOCIAL SECURITY ADMINISTRATION TESTIMONY BY EMPLOYEES AND THE PRODUCTION OF RECORDS AND INFORMATION IN LEGAL PROCEEDINGS § 403.100 When can an SSA employee testify or produce information or records in legal proceedings? An SSA...
Ion IVAN; Daniel MILODIN; Alin ZAMFIROIU
In this material electronic market are defined. How they are structured. Security in E-Commerce applications is very important both at the administrative level and from the user perspective. The new trend in the field is the M-commerce that involves making purchases through mobile devices. And for M-commerce transactions the security is a very important thing. Here’s how to analyze the security of M-commerce transactions and ways to increase security for these transactions taki...
Allegheny County / City of Pittsburgh / Western PA Regional Data Center — Employee salaries are a regular Right to Know request the County receives. Here is the disclaimer language that is included with the dataset from the Open Records...
... Resources Home | Accommodation and Compliance Series: Employees with Cerebral Palsy (CP) By Eddie Whidden, MA Preface Introduction Information ... SOAR) at http://AskJAN.org/soar. Information about Cerebral Palsy (CP) What is CP? Cerebral palsy is a ...
Reigle, Dale A
Current employees provide the best examples of the type of aptitude, attitude, motivation, and fit we are looking for, or not looking for, in new employees. All four of these attributes are present in star employees. Using what we know about our best and worst employees can assist us in developing questions and scoring templates that will help us categorize current applicants. Hiring managers should formulate questions in a way that elicits informative responses from candidates about past performance in situations similar to those they will face on the job. Nonverbal clues can help provide insight beyond the simple verbal answer given by candidates. Practice, critique, and critical review of the outcomes of our hiring decisions improve our ability to become good hiring managers.
Although around a hundred cases a year are reported to the Ombuds, several issues may still not be disclosed due to employee silence*. The deliberate withholding of concerns, escalating misunderstandings or genuine conflicts can impede the global process of learning and development of a better respectful organizational workplace environment, and prevent the detection and correction of acts violating the CERN Code of Conduct. For the employee him/herself, such silence can lead to feelings of anger, resentment, helplessness and humiliation. These feelings will inevitably contaminate personal and interpersonal relations, and poison creativity and effectiveness. Employee silence can be explained by many factors; sometimes it is connected to organizational forces. In their published paper*, authors Michael Knoll and Rolf van Dick found four forms of employee silence. People may stay silent if they feel that their opinion is neither welcomed nor valued by their management. They have gi...
Business Resources Division of Corporations, Business & Professional Licensing Dept. of Commerce Benefits Resources State Employee Directory State Calendar State Training: LearnAlaska State Travel Manager) Web Mail (Outlook) Login Who to Call Health Insurance Insurance Benefits Health and Optional
Coates, Cameron W [ORNL; Eisele, Gerhard R [ORNL
Organizations (facility, regulatory agency, or country) have a compelling interest in ensuring that individuals who occupy sensitive positions affording access to chemical biological, radiological and nuclear (CBRN) materials facilities and programs are functioning at their highest level of reliability. Human reliability and human performance relate not only to security but also focus on safety. Reliability has a logical and direct relationship to trustworthiness for the organization is placing trust in their employees to conduct themselves in a secure, safe, and dependable manner. This document focuses on providing an organization with a roadmap to implementing a successful and sustainable Structured Trusted Employee Program (STEP).
systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...
"Leaping into the future of labor economics: the research potential of linking employer and employee data" is the title of a paper by Daniel S Hammermesh published in Labour Economics in 1999. I quote it here, since it captures much of my motivation for the work included in this thesis. Considering applied micro econometrics and labor economics my main elds of interest, the development of linked employer-employee data that took place in Denmark around the time of the new mille...
Duvaa, Uffe; Ørngreen, Rikke; Weinkouff Mathiasen, Anne-Gitte
Mobile probing is a method, developed for learning about digital work situations, as an approach to discover new grounds. The method can be used when there is a need to know more about users and their work with certain tasks, but where users at the same time are distributed (in time and space......). Mobile probing was inspired by the cultural probe method, and was influenced by qualitative interview and inquiry approaches. The method has been used in two subsequent projects, involving school children (young adults at 15-17 years old) and employees (adults) in a consultancy company. Findings point...... to mobile probing being a flexible method for uncovering the unknowns, as a way of getting rich data to the analysis and design phases. On the other hand it is difficult to engage users to give in depth explanations, which seem easier in synchronous dialogs (whether online or face2face). The development...
Duvaa, Uffe; Ørngreen, Rikke; Weinkouff, Anne-Gitte
Mobile probing is a method, which has been developed for learning about digital work situations, as an approach to discover new grounds. The method can be used when there is a need to know more about users and their work with certain tasks, but where users at the same time are distributed (in time...... and space). Mobile probing was inspired by the cultural probe method, and was influenced by qualitative interview and inquiry approaches. The method has been used in two subsequent projects, involving school children (young adults at 15-17 years old) and employees (adults) in a consultancy company. Findings...... point to mobile probing being a flexible method for uncovering the unknowns, as a way of getting rich data to the analysis and design phases. On the other hand it is difficult to engage users to give in depth explanations, which seem easier in synchronous dialogs (whether online or face2face...
Carroll, Brian J.
Offers suggestions for managers relative to the employee selection process, focusing on the identification of a potential employee's needs and the employer's motivators that affect employee productivity. Discusses the use of a preemployment survey and offers a questionnaire that allows matching of the employee's needs with employment…
Gündüz, Semseddin; Çoklar, Ahmet Naci
The internet is the one of the most important global network and information source in information age. The internet has changed employee's life enormously. The purpose of this study is to clarify the benefitting situations of employees from e-employee services. For this purpose, a 20-item data collection tool, based on the e-employee services put…
... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Social security numbers. 1212.604 Section... REGULATIONS Instructions for NASA Employees § 1212.604 Social security numbers. (a) It is unlawful for NASA to...' refusal to disclose their social security numbers, except where: (1) The disclosure is required by law; or...
Clark, Paul C; Irvine, Cynthia E; Levin, Timothy E; Nguyen, Thuy D; Vidas, Timothy M
.... The purpose of the SecureCore research project is to investigate fundamental architectural features required for the trusted operation of mobile computing devices so the security is built-in, transparent and flexible...
Grimes, John G
.... The CNSS performs the vital function of mobilizing the full, interagency National Security Community for the protection of telecommunications and information systems that support U.S. national security...
The participation in mobile learning programs is conditioned by having/using mobile communication technology. Those who do not have or use such technology cannot participate in mobile learning programs. This study evaluates who are the most likely participants of mobile learning programs by examining the demographic profile and mobile phone usage…
As Android operation system platform is widely used in smart phone, one important aspect should not be ignored -its security. As android is an open mobile platform, and also a programmable software framework, is it more safe than his competitor - Iphone, Symbian and so on？ This paper will present some security issues on the mobile phones, analyze the security principles and mechanisms based on the architecture and features of Android OS platform, then it will compare Android with some other mobile operation systems like Iphone, Symbian in area of security to make a conclusion that Android is a safe mobile OS to a certain extent.
Gaggioli, Andrea; Riva, Giuseppe
The combination of smart phones, wearable sensor devices and social media offer new ways of monitoring and promoting mental and physical wellbeing. In this contribution, we describe recent developments in the field of mobile healthcare (or mHealth), by focusing in particular on mobile mental health applications. First, we examine the potential benefits associated with this approach, providing examples from existing projects. Next, we identify and explain possible differences in focus between mobile mental health and mobile wellbeing applications. Finally, we discuss some open challenges associated with the implementation of this vision, ranging from the lack of evidence-based validation to privacy, security and ethical concerns.
Pilukienė, Laura; Kšivickaitė, Gertūda
In this article, the authors analyse one of the main nowadays human resources problem – growing employee turnover. Employee motivation process is analysed as a key competitive advantage in employee retention that leads to the growth of the business company’s productivity and competitive stability. The main goal of the article is to analyse the employee motivation and employee turnover relationship and its development possibilities in Lithuania’s business sector.
Attacks on computer systems continue to be a problem. The majority of the attacks target home computer users. To help mitigate the attacks some companies provide security awareness training to their employees. However, not all people work for a company that provides security awareness training and typically, home computer users do not have the…
Jensen, Ole B.
, and systems 'hosting' these multiple and complex mobilities are designed and how they are staging these in terms of their physical layout. By analysing specific cases of ‘mobilities design’ related to the four modes of moving; Walk, Bike, Train, and Car, the book uncover important and until now neglected...... is more than movement between point A and B. It explores how the movement of people, goods, information, and signs influences human understandings of self, other and the built environment. Moving towards a new understanding of the relationship between movement, interaction and environments, the project...
This book provides a snapshot of the current state-of-the-art in the fields of mobile and wireless technology, security and applications. The proceedings of the 2nd International Conference on Mobile and Wireless Technology (ICMWT2015), it represents the outcome of a unique platform for researchers and practitioners from academia and industry to share cutting-edge developments in the field of mobile and wireless science technology, including those working on data management and mobile security. The contributions presented here describe the latest academic and industrial research from the international mobile and wireless community. The scope covers four major topical areas: mobile and wireless networks and applications; security in mobile and wireless technology; mobile data management and applications; and mobile software. The book will be a valuable reference for current researchers in academia and industry, and a useful resource for graduate-level students working on mobile and wireless technology...
Chell, Dominic; Colley, Shaun; Whitehouse, Ollie
See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage i
Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin
This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.
According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…
Weerasinghe, Dasun; Rajarajan, Muttukrishnan; Rakocevic, Veselin
The rapid growth in mobile technology makes the delivery of healthcare data and services on mobile phones a reality. However, the healthcare data is very sensitive and has to be protected against unauthorized access. While most of the development work on security of mobile healthcare today focuses on the data encryption and secure authentication in remote servers, protection of data on the mobile device itself has gained very little attention. This paper analyses the requirements and the architecture for a secure mobile capsule, specially designed to protect the data that is already on the device. The capsule is a downloadable software agent with additional functionalities to enable secure external communication with healthcare service providers, network operators and other relevant communication parties.
The aim of this bachelor's study is to describe and analyze the employee motivation and benefits in the payroll system and human recources field. Theoretical part attends to general terms as the employee motivation, the theory of the motivation,the types of the employee benefits, the influence of benefits to the employee's working performance. The practial part focuses on Elanor company, includes introduction of the company, it's history and the present, the offer of the employee benefits. Ne...
Contemporary organizations face big data security challenges in the cyber environment due to modern threats and actual business working model which relies heavily on collaboration, data sharing, tool integration, increased mobility, etc. The nowadays data classification and data obfuscation selection processes (encryption, masking or tokenization) suffer because of the human implication in the process. Organizations need to shirk data security domain by classifying information based on its...
Medidi, Sirisha; Golshani, Forouzan
There is an emerging interest in integrating mobile wireless communication with the Internet based on the Ipv6 technology. Many issues introduced by the mobility of users arise when such an integration is attempted. This paper addresses the problem of mobility management, i.e., that of tracking the current IP addresses of mobile terminals and sustaining active IP connections as mobiles move. The paper presents some architectural and mobility management options for integrating wireless access to the Internet. We then present performance results for Mobile IPv4, route optimization and Mobile IPv6.
Companies and organizations world-wide depend more and more on IT infrastructure and operations. Computer systems store vital information and sensitive data; computing services are essential for main business processes. This high dependency comes with a number of security risks, which have to be managed correctly on technological, organizational and human levels. Addressing the human aspects of information security often boils down just to procedures, training and awareness raising. On the other hand, employees and collaborators do not adopt security attitude and habits simply when told to do so – a real change in behaviour requires an established security culture. But how to introduce a security culture? This thesis outlines the need of developing or improving security culture, and discusses how this can be done. The proposed approach is to gradually build security knowledge and awareness, and influence behaviours. The way to achieve this is to make security communication pervasive by embedding security me...