Abstract: This study found that most corporate personnel are
using social media to communicate with colleagues to make the
process of working more efficient. Complete satisfaction occurred on
the use of security within the University’s computer network. The
social network usage for communication, collaboration,
entertainment and demonstrating concerns accounted for fifty percent
of variance to predict interpersonal relationships of corporate
personnel. This evaluation on the effectiveness of social networking
involved 213 corporate personnel’s. The data was collected by
questionnaires. This data was analyzed by using percentage, mean,
and standard deviation.
The results from the analysis and the effectiveness of using online
social networks were derived from the attitude of private users and
safety data within the security system. The results showed that the
effectiveness on the use of an online social network for corporate
personnel of Suan Sunandha Rajabhat University was specifically at
a good level, and the overall effects of each aspect was (Ẋ=3.11).
Abstract: It is a well-established fact that terrorism is one of the foremost threats to present-day international security. The creation of tools or mechanisms for confronting it in an effective and efficient manner will only be possible by way of an objective assessment of the phenomenon. In order to achieve this, this paper has the following three main objectives: Firstly, setting out to find the reasons that have prevented the establishment of a universally accepted definition of terrorism, and consequently trying to outline the main features defining the face of the terrorist threat in order to discover the fundamental goals of what is now a serious blight on world society. Secondly, trying to explain the differences between a terrorist movement and a terrorist organisation, and the reasons for which a terrorist movement can be led to transform itself into an organisation. After analysing these motivations and the characteristics of a terrorist organisation, an example of the latter will be succinctly analysed to help the reader understand the ideas expressed. Lastly, discovering and exposing the factors that can lead to the appearance of terrorist tendencies, and discussing the most efficient and effective responses that can be given to this global security threat.
Abstract: Nowadays, cloud environments are becoming a need for companies, this new technology gives the opportunities to access to the data anywhere and anytime. It also provides an optimized and secured access to the resources and gives more security for the data which is stored in the platform. However, some companies do not trust Cloud providers, they think that providers can access and modify some confidential data such as bank accounts. Many works have been done in this context, they conclude that encryption methods realized by providers ensure the confidentiality, but, they forgot that Cloud providers can decrypt the confidential resources. The best solution here is to apply some operations on the data before sending them to the provider Cloud in the objective to make them unreadable. The principal idea is to allow user how it can protect his data with his own methods. In this paper, we are going to demonstrate our approach and prove that is more efficient in term of execution time than some existing methods. This work aims at enhancing the quality of service of providers and ensuring the trust of the customers.
Abstract: Designing cost-efficient, secure network protocols for
Wireless Sensor Networks (WSNs) is a challenging problem because
sensors are resource-limited wireless devices. Security services such
as authentication and improved pairwise key establishment are
critical to high efficient networks with sensor nodes. For sensor
nodes to correspond securely with each other efficiently, usage of
cryptographic techniques is necessary. In this paper, two key
predistribution schemes that enable a mobile sink to establish a
secure data-communication link, on the fly, with any sensor nodes.
The intermediate nodes along the path to the sink are able to verify
the authenticity and integrity of the incoming packets using a
predicted value of the key generated by the sender’s essential power.
The proposed schemes are based on the pairwise key with the mobile
sink, our analytical results clearly show that our schemes perform
better in terms of network resilience to node capture than existing
schemes if used in wireless sensor networks with mobile sinks.
Abstract: The security of cloud services is the concern of cloud
service providers. In this paper, we will mention different
classifications of cloud attacks referred by specialized organizations.
Each agency has its classification of well-defined properties. The
purpose is to present a high-level classification of current research in
cloud computing security. This classification is organized around
attack strategies and corresponding defenses.
Abstract: Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having her own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.
Abstract: This paper presents a novel algorithm for secure,
reliable and flexible transmission of big data in two hop wireless
networks using cooperative jamming scheme. Two hop wireless
networks consist of source, relay and destination nodes. Big data has
to transmit from source to relay and from relay to destination by
deploying security in physical layer. Cooperative jamming scheme
determines transmission of big data in more secure manner by
protecting it from eavesdroppers and malicious nodes of unknown
location. The novel algorithm that ensures secure and energy balance
transmission of big data, includes selection of data transmitting
region, segmenting the selected region, determining probability ratio
for each node (capture node, non-capture and eavesdropper node) in
every segment, evaluating the probability using binary based
evaluation. If it is secure transmission resume with the two- hop
transmission of big data, otherwise prevent the attackers by
cooperative jamming scheme and transmit the data in two-hop
transmission.
Abstract: The concept of national security in Iran is a
permanently effective factor in acceptance or rejection of many
international obligations. These obligations had been defined
according to the type of legislation of Iran in many aspects.
Therefore, there are several treaties at international level which
requires Iran’s security to come in contact with obligations in these
treaties in a way that an obstacle to join to them and their passage in
parliament. This issue is a typical category which every country pays
attention to be accepted in treaties or to include their national
security in that treaties and also they can see the related treaties from
this perspective, but this issue that 'what is the concept of Iran’s
national security', and 'To what extent it is changed in recent years,
especially after Islamic Revolution' are important issues that can be
criticized. Thus, this study is trying to assess singed treaties from the
perspective of Iran’s national security according of the true meaning
of treaty and to investigate how the international treaties may be in
conflict with Iran’s national security.
Abstract: The area of liberty, security and justice within the
European Union is still a work in progress. No one can deny that the
EU struggles between a monistic and a dualist approach.
The aim of our essay is to first review how the European law is
perceived by the rest of the international scene. It will then discuss
two main mechanisms at play: the interpretation of larger
international treaties and the penal mechanisms of European law.
Finally, it will help us understand the role of a penal Europe on the
international scene with concrete examples.
Special attention will be paid to cases that deal with fundamental
rights as they represent an interesting case study in Europe and in the
rest of the World. It could illustrate the aforementioned duality
currently present in the Union’s interpretation of international public
law. On the other hand, it will explore some specific European penal
mechanism through mutual recognition and the European arrest
warrant in the transnational criminality frame.
Concerning the interpretation of the treaties, it will first, underline
the ambiguity and the general nature of some treaties that leave the
EU exposed to tension and misunderstanding then it will review the
validity of an EU act (whether or not it is compatible with the rules of
International law).
Finally, it will focus on the most complete manifestation of liberty,
security and justice through the principle of mutual recognition. Used
initially in commercial matters, it has become “the cornerstone” of
European construction. It will see how it is applied in judicial
decisions (its main event and achieving success is via the European
arrest warrant) and how European member states have managed to
develop this cooperation.
Abstract: Mass media campaigns against obesity are often
designed to impact large audiences. This usually means that their
audience is defined based on general demographic characteristics like
age, gender, occupation etc., not taking into account psychographics
like behavior, motivations, wants, etc. Using psychographics, as the
base for the audience segmentation, is a common practice in case of
successful campaigns, as it allows developing more relevant
messages. It also serves a purpose of identifying key segments, those
that generate the best return on investment. For a health campaign,
that would be segments that have the best chance of being converted
into healthy lifestyle at the lowest cost. This paper presents the
limitations of the demographic targeting, based on the findings from
the reception study of IMSS (Mexican Social Security Institute) antiobesity
TV commercials and proposes mothers as the first level of
segmentation, in the process of identifying the key segment for these
campaigns.
Abstract: With the growing of computer and network, digital
data can be spread to anywhere in the world quickly. In addition,
digital data can also be copied or tampered easily so that the security
issue becomes an important topic in the protection of digital data.
Digital watermark is a method to protect the ownership of digital data.
Embedding the watermark will influence the quality certainly. In this
paper, Vector Quantization (VQ) is used to embed the watermark into
the image to fulfill the goal of data hiding. This kind of watermarking
is invisible which means that the users will not conscious the existing
of embedded watermark even though the embedded image has tiny
difference compared to the original image. Meanwhile, VQ needs a lot
of computation burden so that we adopt a fast VQ encoding scheme by
partial distortion searching (PDS) and mean approximation scheme to
speed up the data hiding process.
The watermarks we hide to the image could be gray, bi-level and
color images. Texts are also can be regarded as watermark to embed.
In order to test the robustness of the system, we adopt Photoshop to
fulfill sharpen, cropping and altering to check if the extracted
watermark is still recognizable. Experimental results demonstrate that
the proposed system can resist the above three kinds of tampering in
general cases.
Abstract: In order to avoid self-collision of space manipulators
during operation process, a real-time detection method is proposed in
this paper. The manipulator is fitted into a cylinder-enveloping
surface, and then, a kind of detection algorithm of collision between
cylinders is analyzed. The collision model of space manipulator
self-links can be detected by using this algorithm in real-time detection
during the operation process. To ensure security of the operation, a
safety threshold is designed. The simulation and experiment results
verify the effectiveness of the proposed algorithm for a 7-DOF space
manipulator.
Abstract: One of the crucial parameters of digital cryptographic
systems is the selection of the keys used and their distribution. The
randomness of the keys has a strong impact on the system’s security
strength being difficult to be predicted, guessed, reproduced, or
discovered by a cryptanalyst. Therefore, adequate key randomness
generation is still sought for the benefit of stronger cryptosystems.
This paper suggests an algorithm designed to generate and test
pseudo random number sequences intended for cryptographic
applications. This algorithm is based on mathematically manipulating
a publically agreed upon information between sender and receiver
over a public channel. This information is used as a seed for
performing some mathematical functions in order to generate a
sequence of pseudorandom numbers that will be used for
encryption/decryption purposes. This manipulation involves
permutations and substitutions that fulfill Shannon’s principle of
“confusion and diffusion”. ASCII code characters were utilized in the
generation process instead of using bit strings initially, which adds
more flexibility in testing different seed values. Finally, the obtained
results would indicate sound difficulty of guessing keys by attackers.
Abstract: This paper proposes the application of the Smart
Security Concept in the East Mediterranean. Smart Security aims to
secure critical infrastructure, such as hydrocarbon platforms, against
asymmetrical threats. The concept is based on Anti Asymmetrical
Area Denial (A3D) which necessitates limiting freedom of action of
maritime terrorists and piracy by founding safe and secure maritime
areas through sea lines of communication using short range
capabilities.
Abstract: In order to protect data privacy, image with sensitive or
private information needs to be encrypted before being outsourced to
the cloud. However, this causes difficulties in image retrieval and data
management. A secure image retrieval method based on orthogonal
decomposition is proposed in the paper. The image is divided into two
different components, for which encryption and feature extraction are
executed separately. As a result, cloud server can extract features from
an encrypted image directly and compare them with the features of the
queried images, so that the user can thus obtain the image. Different
from other methods, the proposed method has no special requirements
to encryption algorithms. Experimental results prove that the proposed
method can achieve better security and better retrieval precision.
Abstract: In this article we will study the elliptic curve defined
over the ring An and we define the mathematical operations of ECC,
which provides a high security and advantage for wireless
applications compared to other asymmetric key cryptosystem.
Abstract: In this paper, we investigate the effect of friendly
jamming power allocation strategies on the achievable average
secrecy rate over a bank of parallel fading wiretap channels.
We investigate the achievable average secrecy rate in parallel
fading wiretap channels subject to Rayleigh and Rician fading.
The achievable average secrecy rate, due to the presence of a
line-of-sight component in the jammer channel is also evaluated.
Moreover, we study the detrimental effect of correlation across the
parallel sub-channels, and evaluate the corresponding decrease in the
achievable average secrecy rate for the various fading configurations.
We also investigate the tradeoff between the transmission power
and the jamming power for a fixed total power budget. Our
results, which are applicable to current orthogonal frequency division
multiplexing (OFDM) communications systems, shed further light on
the achievable average secrecy rates over a bank of parallel fading
channels in the presence of friendly jammers.
Abstract: A Smart Building Controller (SBC) is a server
software that offers secured access to a pool of building specific
resources, executes monitoring tasks and performs automatic
administration of a building, thus optimizing the exploitation cost and
maximizing comfort. This paper brings to discussion the issues that
arise with the secure exploitation of the SBC administered resources
and proposes a technical solution to implement a robust secure access
system based on roles, individual rights and privileges (special
rights).
Abstract: The paper describes the OAS role in dispute
resolution. The authors make an attempt to identify a general pattern
of the OAS activities within the peaceful settlement of interstate
conflicts, in the beginning of 21st century, as well as to analyze some
features of Honduras–Belize, Nicaragua–Honduras, Honduras–El
Salvador, Costa-Rica–Nicaragua, Colombia–Ecuador cases.
Abstract: This article focuses on the issue of airport emergency
plans, which are documents describing reactions to events with
impact on aviation safety or aviation security. The article specifically
focuses on the use and creation of emergency plans, where could be
found a number of disagreements between different stakeholders, for
which the airport emergency plan applies. Those are the friction
surfaces of interfaces, which is necessary to identify and ensure them
smooth process to avoid dangerous situations or delay.