期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Optimum Spending on Cybersecurity Measures: Part II
1
作者 Sherita Tara Kissoon 《Journal of Information Security》 2021年第1期137-161,共25页
The purpose of this research is to investigate the decision-making process for cybersecurity investments in organizations through development and utilization of a digital cybersecurity risk management framework. The i... The purpose of this research is to investigate the decision-making process for cybersecurity investments in organizations through development and utilization of a digital cybersecurity risk management framework. The initial article, Optimum Spending on Cybersecurity Measures is published on Emerald Insight at: </span><a href="https://www.emerald.com/insight/1750-6166.htm"><span style="font-size:12px;font-family:Verdana;">https://www.emerald.com/insight/1750-6166.htm</span></a><span style="font-size:12px;font-family:Verdana;">, contains the detailed literature review, and the data results from Phase I and Phase II of this research </span><span times="" new="" roman","serif";"="" style="font-size: 10pt;"> <span style="font-family:Verdana;font-size:12px;">REF _Ref61862658 \r \h</span> <span style="font-family:Verdana;font-size:12px;">\* MERGEFORMAT </span></span><span style="font-size:12px;font-family:Verdana;">[1]</span><span style="font-size:10pt;font-family:""></span><span times="" new="" roman","serif";"="" style="font-size: 10pt;"></span><span style="font-size:12px;font-family:Verdana;">. This article will highlight the research completed in the area of organizational decision-making on cybersecurity spend. In leveraging the review of additional studies, this research utilizes a regression framework and case study methodology to demonstrate that effective risk-based decisions are necessary when implementing cybersecurity controls. Through regression analysis, the effectiveness of current implemented cybersecurity measures in organizations </span><span style="font-size:12px;font-family:Verdana;">is</span><span style="font-size:12px;font-family:Verdana;"> explored when connecting a dependent variable with several independent variables. The focus of this article is on the strategic decisions made by organizations when implementing cybersecurity measures. This research belongs to the area of risk management, and various models within the field of 1) information security</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) strategic management</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 3) organizational decision-making to determine optimum spending on cybersecurity measures for risk taking organizations. This research resulted in the develop</span><span style="font-size:12px;font-family:Verdana;">ment</span><span style="font-size:10pt;font-family:""><span style="font-family:Verdana;font-size:12px;"> of a cyber risk investment model and a digital cybersecurity risk man</span><span style="font-family:Verdana;font-size:12px;">agement framework. Using a case study methodology, this model an</span><span style="font-family:Verdana;font-size:12px;">d framework w</span></span><span style="font-size:12px;font-family:Verdana;">ere</span><span style="font-size:12px;font-family:Verdana;"> leveraged to evaluate and implement cybersecurity measures. The case study methodology provides an in-depth view of a risk-taking organization’s risk mitigation strategy within the bounds of the educational environment focusing on five areas identified within a digital cyber risk model: 1) technology landscape and application portfolio</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) data centric focus</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 3) risk management practices</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 4) cost-benefit analysis for cybersecurity measures</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 5) strategic development. The outcome of this research provides greater insight into how an organization makes decisions when implementing cybersecurity controls. This research shows that most organizations are diligently implementing security measures to effectively monitor and detect cyber security attacks</span><span style="font-size:12px;font-family:Verdana;">,</span><span style="font-size:12px;font-family:Verdana;"> specifically showing that risk taking organizations implemented cybersecurity measures to meet compliance and audit obligations with an annual spend of $3.18 million. It also indicated that 23.6% of risk-taking organizations incurred more than 6 cybersecurity breaches with an average dollar loss of $3.5 million. In addition, the impact of a cybersecurity breach on risk taking organizations is as follows: 1) data loss</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) brand/reputational impact</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 3) financial loss fines</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 4) increase oversight by regulators/internal audit</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 5) customer/client impact. The implication this research has on practice is extensive, as it focuses on a broad range of areas to include risk, funding and type and impact of cyber security breaches encountered. The survey study clearly demonstrated the need to develop and utilize a digital cybersecurity risk management framework to integrate current industry frameworks within the risk management practice to include continuous compliance management. This type of framework would provide a balanced approach to managing the gap between a risk-taking organization and a risk averse organization when implementing cybersecurity measures. 展开更多
关键词 Information Security Risk Management Strategy GOVERNANCE Organizational Decision Making
下载PDF
Determination of Working Pressure for Airport Runway Rubber Mark Cleaning Vehicle Based on Numeric Simulation
2
作者 Haojun Peng Zhongwei Wu +5 位作者 Jinbing Xia Bolin Dong Yuntao Peng Linghe Wang Xingxing Ma Wei Shen 《Computer Modeling in Engineering & Sciences》 SCIE EI 2019年第9期799-813,共15页
In this paper,numeric simulations are performed for three dimension models built according to actual surface cleaner in airport runway rubber mark cleaning vehicle using ANSYS FLUENT software on the basis of previous ... In this paper,numeric simulations are performed for three dimension models built according to actual surface cleaner in airport runway rubber mark cleaning vehicle using ANSYS FLUENT software on the basis of previous research finished by the authors.After analyzing the simulated flow fields under different standoff distances between nozzle outlet and runway surface and different discharge pressures at nozzle outlet,the relationships of normal stress and shear stress at striking point to outlet pressure and standoff distance are obtained.Finally,the most appropriate discharge pressure at nozzle outlet for the studied surface cleaner model is found,and this will provide theoretical basis for future rubber mark cleaning process in airports and equipment model selection in subsequent design of airport runway rubber mark cleaning vehicles. 展开更多
关键词 RUNWAY CLEANING surface CLEANER numeric simulation NOZZLE pressure PUMP model selection
下载PDF
The Secular Tendency of the Age at Menarche in a Representative Sample of Mexican Girls from an Urban Zone in Central Mexico
3
作者 María-Raquel Huerta-Franco Francisco-Miguel Vargas-Luna +3 位作者 Elba del Rosario Huerta-Franco Aminta Jimenez-Velazquez Marco Balleza Isabel Delgadillo-Holford 《Food and Nutrition Sciences》 2015年第15期1362-1370,共9页
Objective: To investigate the age at menarche, pubarche and telarche in a representative sample of residents of an urban zone of Leon, Guanajuato, Central Mexico and to evaluate the secular change of the age at menarc... Objective: To investigate the age at menarche, pubarche and telarche in a representative sample of residents of an urban zone of Leon, Guanajuato, Central Mexico and to evaluate the secular change of the age at menarche between 1985 and 2000. Methods: Using status quo and retrospective methods, menarcheal, pubarcheal and telarcheal status of girls 8 - 17 years of age (n = 1093) were determined. Multiple regression analysis and logistic regression were used to determine factors that were related to or predictive of age at menarche. Results: Median ages for menarche, pubarche and telarche in our studied sample were: 11.9 ± 0.04;11.13 ± 1.25 and 10.84 ± 1.34 years, respectively. A direct correlation was found between the age of menarche of adolescents and that of their mother (p p p = 0.001), but an indirect correlation was found with the girls’ hip circumference (p = 0.004). We demonstrated a clear secular tendency towards an earlier onset of menarche by comparing our results (11.9 ± 0.04) with data from 1985 (12.8 ± 1.3) for adolescents from the same city. Conclusion: We demonstrated a clear reduction in age at menarche of approximately 0.75 year/decade, higher than Tanner’s finding in 1962, but similar than that of Malina et al. in 2004. 展开更多
关键词 Age at MENARCHE ADOLESCENT GIRLS SECULAR TENDENCY
下载PDF
Effect of Al-Si Alloy Addition on Properties of Fused Spinel Carbon Materials
4
作者 HAO Xian LIU Guoqi +6 位作者 LI Zhixing XU Chaojie ZHANG Jianwei LI Yong LI Hongyu LI Hongxia FU Baoquan 《China's Refractories》 CAS 2022年第4期45-51,共7页
Fused magnesium aluminate spinel carbon materials were prepared using fused magnesium aluminate spinel and flake graphite as the main raw materials and phenolic resin as the binder.The effects of the Al-Si alloy addit... Fused magnesium aluminate spinel carbon materials were prepared using fused magnesium aluminate spinel and flake graphite as the main raw materials and phenolic resin as the binder.The effects of the Al-Si alloy addition(0,2%,4%,6%,8%and 10%,by mass)on the properties of fused magnesium aluminate spinel carbon materials were studied.The results show that fiber materials are generated in the samples with Al-Si alloy addition,which can significantly improve the cold and hot modulus of rupture,the cold elastic modulus,and the thermal shock resistance of the samples.When the addition of Al-Si alloy is 6%-8%,the comprehensive performance of the sample is the optimum. 展开更多
关键词 fused magnesium aluminate spinel aluminum-silicon alloy corrosion resistance thermal shock resistance
下载PDF
双因素认证加强Web安全——保卫网站,抗击在线犯罪
5
作者 Tony Howlett 盛青(译者) 《Windows IT Pro Magazine(国际中文版)》 2007年第5期44-45,50,共3页
双因素认证到底是什么?如何部署到Web应用?本文将介绍一些目前可行的解决方案。
关键词 双因素认证 WEB安全 网站 保卫 犯罪 在线 WEB应用
下载PDF
2008年十大信息安全意外
6
作者 Tony Howlett 黄思维(译者) 《Windows IT Pro Magazine(国际中文版)》 2009年第4期53-54,共2页
在上个月。我们刊登了《信息周刊》评选出的2008年十大安全事件,这个月来看看我们的Tony所选出的2008年十大信息安全事件。
关键词 信息安全 安全事件 计算机网络 网络安全 2008年
下载PDF
灾难恢复新时代
7
作者 Tony Howlett 肖欣(译) 《Windows IT Pro Magazine(国际中文版)》 2008年第8期52-54,共3页
2001年9月11日恐怖袭击以及2005年Katrina和Rita飓风已经给我们上了一堂印象很深的课,我们应该随时准备好以防大型灾难的降临。
关键词 IT系统 灾难恢复 灾难计划 计算机安全
下载PDF
On the Possibilities of using Some Modern Three-dimensional Modeling Means in Forensic Examination
8
作者 Dmitry S Afonin Iryna V Hora +2 位作者 Valerii A Kolesnyk Inna I Popovych Iryna V Kuchynska 《Journal of Forensic Science and Medicine》 2022年第1期17-23,共7页
Background:The paper examines the state and prospects of using 3D modeling in solving identification,classification,diagnostic and situational tasks of forensic examination.Aims and Objectives:The aim of this study is... Background:The paper examines the state and prospects of using 3D modeling in solving identification,classification,diagnostic and situational tasks of forensic examination.Aims and Objectives:The aim of this study is to analyze the world expert practice of using scientific and technical means of three-dimensional modeling in solving problems of forensic examination,using the example of our country,the leading countries of Europe,as well as the United States.Materials and Methods:The empirical basis of the study is the results of the systematization of scientific and technical means for 3D modeling in solving identification,classification,diagnostic and situational problems of forensic examinations used in the expert practice of Ukraine,the United Kingdom,France,Germany,and the USA.Results:The systematization of modem scientific and technical means for 3D modeling,used in solving identification,classification,diagnostic and situational tasks of forensic examination,has been carried out.We analyzed and identified 3D modeling software that most fully meets the requirements of effective forensic expert activities.The features of the use of effective 3D modeling mean for solving identification,classification,diagnostic and situational tasks of forensic examination,namely the software systems"ToolScan"and"TrasoScan",and the SketchUp program have been disclosed.Conclusion:The introduction of the SketchUp 8 software into forensic expert activities will increase the effectiveness of the modeling method in forensic examinations,which,in turn,will have an impact on the effectiveness of expert conclusions,increase their evidentiary value and,as a result,contribute to the entire process of a criminal investigation. 展开更多
关键词 Classification tasks diagnostic tasks forensic practice identification tasks photogrammetric modeling simulation modeling three-dimensional model
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部