The purpose of this research is to investigate the decision-making process for cybersecurity investments in organizations through development and utilization of a digital cybersecurity risk management framework. The i...The purpose of this research is to investigate the decision-making process for cybersecurity investments in organizations through development and utilization of a digital cybersecurity risk management framework. The initial article, Optimum Spending on Cybersecurity Measures is published on Emerald Insight at: </span><a href="https://www.emerald.com/insight/1750-6166.htm"><span style="font-size:12px;font-family:Verdana;">https://www.emerald.com/insight/1750-6166.htm</span></a><span style="font-size:12px;font-family:Verdana;">, contains the detailed literature review, and the data results from Phase I and Phase II of this research </span><span times="" new="" roman","serif";"="" style="font-size: 10pt;"> <span style="font-family:Verdana;font-size:12px;">REF _Ref61862658 \r \h</span> <span style="font-family:Verdana;font-size:12px;">\* MERGEFORMAT </span></span><span style="font-size:12px;font-family:Verdana;">[1]</span><span style="font-size:10pt;font-family:""></span><span times="" new="" roman","serif";"="" style="font-size: 10pt;"></span><span style="font-size:12px;font-family:Verdana;">. This article will highlight the research completed in the area of organizational decision-making on cybersecurity spend. In leveraging the review of additional studies, this research utilizes a regression framework and case study methodology to demonstrate that effective risk-based decisions are necessary when implementing cybersecurity controls. Through regression analysis, the effectiveness of current implemented cybersecurity measures in organizations </span><span style="font-size:12px;font-family:Verdana;">is</span><span style="font-size:12px;font-family:Verdana;"> explored when connecting a dependent variable with several independent variables. The focus of this article is on the strategic decisions made by organizations when implementing cybersecurity measures. This research belongs to the area of risk management, and various models within the field of 1) information security</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) strategic management</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 3) organizational decision-making to determine optimum spending on cybersecurity measures for risk taking organizations. This research resulted in the develop</span><span style="font-size:12px;font-family:Verdana;">ment</span><span style="font-size:10pt;font-family:""><span style="font-family:Verdana;font-size:12px;"> of a cyber risk investment model and a digital cybersecurity risk man</span><span style="font-family:Verdana;font-size:12px;">agement framework. Using a case study methodology, this model an</span><span style="font-family:Verdana;font-size:12px;">d framework w</span></span><span style="font-size:12px;font-family:Verdana;">ere</span><span style="font-size:12px;font-family:Verdana;"> leveraged to evaluate and implement cybersecurity measures. The case study methodology provides an in-depth view of a risk-taking organization’s risk mitigation strategy within the bounds of the educational environment focusing on five areas identified within a digital cyber risk model: 1) technology landscape and application portfolio</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) data centric focus</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 3) risk management practices</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 4) cost-benefit analysis for cybersecurity measures</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 5) strategic development. The outcome of this research provides greater insight into how an organization makes decisions when implementing cybersecurity controls. This research shows that most organizations are diligently implementing security measures to effectively monitor and detect cyber security attacks</span><span style="font-size:12px;font-family:Verdana;">,</span><span style="font-size:12px;font-family:Verdana;"> specifically showing that risk taking organizations implemented cybersecurity measures to meet compliance and audit obligations with an annual spend of $3.18 million. It also indicated that 23.6% of risk-taking organizations incurred more than 6 cybersecurity breaches with an average dollar loss of $3.5 million. In addition, the impact of a cybersecurity breach on risk taking organizations is as follows: 1) data loss</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) brand/reputational impact</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 3) financial loss fines</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 4) increase oversight by regulators/internal audit</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 5) customer/client impact. The implication this research has on practice is extensive, as it focuses on a broad range of areas to include risk, funding and type and impact of cyber security breaches encountered. The survey study clearly demonstrated the need to develop and utilize a digital cybersecurity risk management framework to integrate current industry frameworks within the risk management practice to include continuous compliance management. This type of framework would provide a balanced approach to managing the gap between a risk-taking organization and a risk averse organization when implementing cybersecurity measures.展开更多
In this paper,numeric simulations are performed for three dimension models built according to actual surface cleaner in airport runway rubber mark cleaning vehicle using ANSYS FLUENT software on the basis of previous ...In this paper,numeric simulations are performed for three dimension models built according to actual surface cleaner in airport runway rubber mark cleaning vehicle using ANSYS FLUENT software on the basis of previous research finished by the authors.After analyzing the simulated flow fields under different standoff distances between nozzle outlet and runway surface and different discharge pressures at nozzle outlet,the relationships of normal stress and shear stress at striking point to outlet pressure and standoff distance are obtained.Finally,the most appropriate discharge pressure at nozzle outlet for the studied surface cleaner model is found,and this will provide theoretical basis for future rubber mark cleaning process in airports and equipment model selection in subsequent design of airport runway rubber mark cleaning vehicles.展开更多
Objective: To investigate the age at menarche, pubarche and telarche in a representative sample of residents of an urban zone of Leon, Guanajuato, Central Mexico and to evaluate the secular change of the age at menarc...Objective: To investigate the age at menarche, pubarche and telarche in a representative sample of residents of an urban zone of Leon, Guanajuato, Central Mexico and to evaluate the secular change of the age at menarche between 1985 and 2000. Methods: Using status quo and retrospective methods, menarcheal, pubarcheal and telarcheal status of girls 8 - 17 years of age (n = 1093) were determined. Multiple regression analysis and logistic regression were used to determine factors that were related to or predictive of age at menarche. Results: Median ages for menarche, pubarche and telarche in our studied sample were: 11.9 ± 0.04;11.13 ± 1.25 and 10.84 ± 1.34 years, respectively. A direct correlation was found between the age of menarche of adolescents and that of their mother (p p p = 0.001), but an indirect correlation was found with the girls’ hip circumference (p = 0.004). We demonstrated a clear secular tendency towards an earlier onset of menarche by comparing our results (11.9 ± 0.04) with data from 1985 (12.8 ± 1.3) for adolescents from the same city. Conclusion: We demonstrated a clear reduction in age at menarche of approximately 0.75 year/decade, higher than Tanner’s finding in 1962, but similar than that of Malina et al. in 2004.展开更多
Fused magnesium aluminate spinel carbon materials were prepared using fused magnesium aluminate spinel and flake graphite as the main raw materials and phenolic resin as the binder.The effects of the Al-Si alloy addit...Fused magnesium aluminate spinel carbon materials were prepared using fused magnesium aluminate spinel and flake graphite as the main raw materials and phenolic resin as the binder.The effects of the Al-Si alloy addition(0,2%,4%,6%,8%and 10%,by mass)on the properties of fused magnesium aluminate spinel carbon materials were studied.The results show that fiber materials are generated in the samples with Al-Si alloy addition,which can significantly improve the cold and hot modulus of rupture,the cold elastic modulus,and the thermal shock resistance of the samples.When the addition of Al-Si alloy is 6%-8%,the comprehensive performance of the sample is the optimum.展开更多
Background:The paper examines the state and prospects of using 3D modeling in solving identification,classification,diagnostic and situational tasks of forensic examination.Aims and Objectives:The aim of this study is...Background:The paper examines the state and prospects of using 3D modeling in solving identification,classification,diagnostic and situational tasks of forensic examination.Aims and Objectives:The aim of this study is to analyze the world expert practice of using scientific and technical means of three-dimensional modeling in solving problems of forensic examination,using the example of our country,the leading countries of Europe,as well as the United States.Materials and Methods:The empirical basis of the study is the results of the systematization of scientific and technical means for 3D modeling in solving identification,classification,diagnostic and situational problems of forensic examinations used in the expert practice of Ukraine,the United Kingdom,France,Germany,and the USA.Results:The systematization of modem scientific and technical means for 3D modeling,used in solving identification,classification,diagnostic and situational tasks of forensic examination,has been carried out.We analyzed and identified 3D modeling software that most fully meets the requirements of effective forensic expert activities.The features of the use of effective 3D modeling mean for solving identification,classification,diagnostic and situational tasks of forensic examination,namely the software systems"ToolScan"and"TrasoScan",and the SketchUp program have been disclosed.Conclusion:The introduction of the SketchUp 8 software into forensic expert activities will increase the effectiveness of the modeling method in forensic examinations,which,in turn,will have an impact on the effectiveness of expert conclusions,increase their evidentiary value and,as a result,contribute to the entire process of a criminal investigation.展开更多
文摘The purpose of this research is to investigate the decision-making process for cybersecurity investments in organizations through development and utilization of a digital cybersecurity risk management framework. The initial article, Optimum Spending on Cybersecurity Measures is published on Emerald Insight at: </span><a href="https://www.emerald.com/insight/1750-6166.htm"><span style="font-size:12px;font-family:Verdana;">https://www.emerald.com/insight/1750-6166.htm</span></a><span style="font-size:12px;font-family:Verdana;">, contains the detailed literature review, and the data results from Phase I and Phase II of this research </span><span times="" new="" roman","serif";"="" style="font-size: 10pt;"> <span style="font-family:Verdana;font-size:12px;">REF _Ref61862658 \r \h</span> <span style="font-family:Verdana;font-size:12px;">\* MERGEFORMAT </span></span><span style="font-size:12px;font-family:Verdana;">[1]</span><span style="font-size:10pt;font-family:""></span><span times="" new="" roman","serif";"="" style="font-size: 10pt;"></span><span style="font-size:12px;font-family:Verdana;">. This article will highlight the research completed in the area of organizational decision-making on cybersecurity spend. In leveraging the review of additional studies, this research utilizes a regression framework and case study methodology to demonstrate that effective risk-based decisions are necessary when implementing cybersecurity controls. Through regression analysis, the effectiveness of current implemented cybersecurity measures in organizations </span><span style="font-size:12px;font-family:Verdana;">is</span><span style="font-size:12px;font-family:Verdana;"> explored when connecting a dependent variable with several independent variables. The focus of this article is on the strategic decisions made by organizations when implementing cybersecurity measures. This research belongs to the area of risk management, and various models within the field of 1) information security</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) strategic management</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 3) organizational decision-making to determine optimum spending on cybersecurity measures for risk taking organizations. This research resulted in the develop</span><span style="font-size:12px;font-family:Verdana;">ment</span><span style="font-size:10pt;font-family:""><span style="font-family:Verdana;font-size:12px;"> of a cyber risk investment model and a digital cybersecurity risk man</span><span style="font-family:Verdana;font-size:12px;">agement framework. Using a case study methodology, this model an</span><span style="font-family:Verdana;font-size:12px;">d framework w</span></span><span style="font-size:12px;font-family:Verdana;">ere</span><span style="font-size:12px;font-family:Verdana;"> leveraged to evaluate and implement cybersecurity measures. The case study methodology provides an in-depth view of a risk-taking organization’s risk mitigation strategy within the bounds of the educational environment focusing on five areas identified within a digital cyber risk model: 1) technology landscape and application portfolio</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) data centric focus</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 3) risk management practices</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 4) cost-benefit analysis for cybersecurity measures</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 5) strategic development. The outcome of this research provides greater insight into how an organization makes decisions when implementing cybersecurity controls. This research shows that most organizations are diligently implementing security measures to effectively monitor and detect cyber security attacks</span><span style="font-size:12px;font-family:Verdana;">,</span><span style="font-size:12px;font-family:Verdana;"> specifically showing that risk taking organizations implemented cybersecurity measures to meet compliance and audit obligations with an annual spend of $3.18 million. It also indicated that 23.6% of risk-taking organizations incurred more than 6 cybersecurity breaches with an average dollar loss of $3.5 million. In addition, the impact of a cybersecurity breach on risk taking organizations is as follows: 1) data loss</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) brand/reputational impact</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 3) financial loss fines</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 4) increase oversight by regulators/internal audit</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 5) customer/client impact. The implication this research has on practice is extensive, as it focuses on a broad range of areas to include risk, funding and type and impact of cyber security breaches encountered. The survey study clearly demonstrated the need to develop and utilize a digital cybersecurity risk management framework to integrate current industry frameworks within the risk management practice to include continuous compliance management. This type of framework would provide a balanced approach to managing the gap between a risk-taking organization and a risk averse organization when implementing cybersecurity measures.
文摘In this paper,numeric simulations are performed for three dimension models built according to actual surface cleaner in airport runway rubber mark cleaning vehicle using ANSYS FLUENT software on the basis of previous research finished by the authors.After analyzing the simulated flow fields under different standoff distances between nozzle outlet and runway surface and different discharge pressures at nozzle outlet,the relationships of normal stress and shear stress at striking point to outlet pressure and standoff distance are obtained.Finally,the most appropriate discharge pressure at nozzle outlet for the studied surface cleaner model is found,and this will provide theoretical basis for future rubber mark cleaning process in airports and equipment model selection in subsequent design of airport runway rubber mark cleaning vehicles.
文摘Objective: To investigate the age at menarche, pubarche and telarche in a representative sample of residents of an urban zone of Leon, Guanajuato, Central Mexico and to evaluate the secular change of the age at menarche between 1985 and 2000. Methods: Using status quo and retrospective methods, menarcheal, pubarcheal and telarcheal status of girls 8 - 17 years of age (n = 1093) were determined. Multiple regression analysis and logistic regression were used to determine factors that were related to or predictive of age at menarche. Results: Median ages for menarche, pubarche and telarche in our studied sample were: 11.9 ± 0.04;11.13 ± 1.25 and 10.84 ± 1.34 years, respectively. A direct correlation was found between the age of menarche of adolescents and that of their mother (p p p = 0.001), but an indirect correlation was found with the girls’ hip circumference (p = 0.004). We demonstrated a clear secular tendency towards an earlier onset of menarche by comparing our results (11.9 ± 0.04) with data from 1985 (12.8 ± 1.3) for adolescents from the same city. Conclusion: We demonstrated a clear reduction in age at menarche of approximately 0.75 year/decade, higher than Tanner’s finding in 1962, but similar than that of Malina et al. in 2004.
基金National Key Research and Development Program of China(2021YFB3701404)National Natural Science Foundation of China(51932008)for the support of the work
文摘Fused magnesium aluminate spinel carbon materials were prepared using fused magnesium aluminate spinel and flake graphite as the main raw materials and phenolic resin as the binder.The effects of the Al-Si alloy addition(0,2%,4%,6%,8%and 10%,by mass)on the properties of fused magnesium aluminate spinel carbon materials were studied.The results show that fiber materials are generated in the samples with Al-Si alloy addition,which can significantly improve the cold and hot modulus of rupture,the cold elastic modulus,and the thermal shock resistance of the samples.When the addition of Al-Si alloy is 6%-8%,the comprehensive performance of the sample is the optimum.
文摘Background:The paper examines the state and prospects of using 3D modeling in solving identification,classification,diagnostic and situational tasks of forensic examination.Aims and Objectives:The aim of this study is to analyze the world expert practice of using scientific and technical means of three-dimensional modeling in solving problems of forensic examination,using the example of our country,the leading countries of Europe,as well as the United States.Materials and Methods:The empirical basis of the study is the results of the systematization of scientific and technical means for 3D modeling in solving identification,classification,diagnostic and situational problems of forensic examinations used in the expert practice of Ukraine,the United Kingdom,France,Germany,and the USA.Results:The systematization of modem scientific and technical means for 3D modeling,used in solving identification,classification,diagnostic and situational tasks of forensic examination,has been carried out.We analyzed and identified 3D modeling software that most fully meets the requirements of effective forensic expert activities.The features of the use of effective 3D modeling mean for solving identification,classification,diagnostic and situational tasks of forensic examination,namely the software systems"ToolScan"and"TrasoScan",and the SketchUp program have been disclosed.Conclusion:The introduction of the SketchUp 8 software into forensic expert activities will increase the effectiveness of the modeling method in forensic examinations,which,in turn,will have an impact on the effectiveness of expert conclusions,increase their evidentiary value and,as a result,contribute to the entire process of a criminal investigation.