期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Identification and Validation of Social Media Socio-Technical Information Security Factors with Respect to Usable-Security Principles 被引量:1
1
作者 Joe Mutebi Margaret Kareyo +1 位作者 Umezuruike Chinecherem Akampurira Paul 《Journal of Computer and Communications》 2022年第8期41-63,共23页
The goal of this manuscript is to present a research finding, based on a study conducted to identify, examine, and validate Social Media (SM) socio-technical information security factors, in line with usable-security ... The goal of this manuscript is to present a research finding, based on a study conducted to identify, examine, and validate Social Media (SM) socio-technical information security factors, in line with usable-security principles. The study followed literature search techniques, as well as theoretical and empirical methods of factor validation. The strategy used in literature search includes Boolean keywords search, and citation guides, using mainly web of science databases. As guided by study objectives, 9 SM socio-technical factors were identified, verified and validated. Both theoretical and empirical validation processes were followed. Thus, a theoretical validity test was conducted on 45 Likert scale items, involving 10 subject experts. From the score ratings of the experts, Content Validity Index (CVI) was calculated to determine the degree to which the identified factors exhibit appropriate items for the construct being measured, and 7 factors attained an adequate level of validity index. However, for reliability test, 32 respondents and 45 Likert scale items were used. Whereby, Cronbach’s alpha coefficient (α-values) were generated using SPSS. Subsequently, 8 factors attained an adequate level of reliability. Overall, the validated factors include;1) usability—visibility, learnability, and satisfaction;2) education and training—help and documentation;3) SM technology development—error handling, and revocability;4) information security —security, privacy, and expressiveness. In this case, the confirmed factors would add knowledge by providing a theoretical basis for rationalizing information security requirements on SM usage. 展开更多
关键词 Social Media Usage Information Security factors Cyber Security Socio-Technical Usable-Security
下载PDF
Comprehensive security risk factor identification for small reservoirs with heterogeneous data based on grey relational analysis model 被引量:6
2
作者 Jing-chun Feng Hua-ai Huang +1 位作者 Yao Yin Ke Zhang 《Water Science and Engineering》 EI CAS CSCD 2019年第4期330-338,共9页
Identification of security risk factors for small reservoirs is the basis for implementation of early warning systems.The manner of identification of the factors for small reservoirs is of practical significance when ... Identification of security risk factors for small reservoirs is the basis for implementation of early warning systems.The manner of identification of the factors for small reservoirs is of practical significance when data are incomplete.The existing grey relational models have some disadvantages in measuring the correlation between categorical data sequences.To this end,this paper introduces a new grey relational model to analyze heterogeneous data.In this study,a set of security risk factors for small reservoirs was first constructed based on theoretical analysis,and heterogeneous data of these factors were recorded as sequences.The sequences were regarded as random variables,and the information entropy and conditional entropy between sequences were measured to analyze the relational degree between risk factors.Then,a new grey relational analysis model for heterogeneous data was constructed,and a comprehensive security risk factor identification method was developed.A case study of small reservoirs in Guangxi Zhuang Autonomous Region in China shows that the model constructed in this study is applicable to security risk factor identification for small reservoirs with heterogeneous and sparse data. 展开更多
关键词 Security risk factor identification Heterogeneous data Grey relational analysis model Relational degree Information entropy Conditional entropy Small reservoir GUANGXI
下载PDF
Two security transmission realization schemes for MIMO Gaussian wiretap channel with one helper
3
作者 Xie Xianzhong Zhang Xiujuan +1 位作者 Lei Weijia Ma Bin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2015年第4期33-41,共9页
This paper presents noncooperative and cooperative security transmission schemes for multiple-input multiple-output(MIMO) Gaussian wiretap channel with one helper for antenna configuration with arbitrary number. In ... This paper presents noncooperative and cooperative security transmission schemes for multiple-input multiple-output(MIMO) Gaussian wiretap channel with one helper for antenna configuration with arbitrary number. In these two schemes, the transmitter performs beamforming based on generalized singular value decomposition(GSVD), where an appropriate power allocation algorithm is utilized. Meanwhile, the helper sends artificial noise for higher secrecy rate. However, the transmission strategies for the artificial noise are different in the two schemes. In the first scheme, the helper adopts GSVD-based beamforming. Nevertheless, in this scheme, the impact of the artificial noise on the information signal at the receiver is not considered. To solve the problem, the helper performs space projection(SP)-based beamforming in the second scheme. In this scheme, suboptimal weighting factors are introduced to reduce the computational complexity, which can be adapted to the change of the channel quality. Theoretical analysis for the performance of the two proposed schemes is then given. Furthermore, simulation results indicate that the two presented schemes perform better than the existed schemes without helper. They also show that in the second scheme the suboptimal parameter setting is better than equal parameter setting and quite close to optimal parameter setting. 展开更多
关键词 physical layer security GSVD space projection power allocation weighting factor secrecy rate
原文传递
How to Look at the U.S. Factor in China's Peripheral Security
4
作者 Wu Shan Li Chenyang 《Peace》 2016年第4期30-32,共3页
Since the Obama Administration implements the Asia-Pacific rebalancing strategy,China’s security situation in the peripheral areas shows a downward trend,the specific demonstration of which is the complex factors in ... Since the Obama Administration implements the Asia-Pacific rebalancing strategy,China’s security situation in the peripheral areas shows a downward trend,the specific demonstration of which is the complex factors in political relations 展开更多
关键词 How to Look at the U.S Factor in China’s Peripheral Security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部