2014
DOI: 10.12948/issn14531305/18.4.2014.12
|View full text |Cite
|
Sign up to set email alerts
|

Indicators for Determining Collaborative Security Level in Organizational Environments

Abstract: This paper presents the concept of security management through collaboration highlighting the limitations for conventional security management systems and the challenges in maintaining an acceptable level of security in organizational environments. There are presented four different aspects regarding information security, aspects that involve malware threats, perimeter protection, exploiting vulnerabilities and detection of vulnerabilities. Analyzing a set of experiments regarding malware protection the paper … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Privacy is an important challenge in the IoT environment, due to availability of sensory devices, and the speed and volume of information flow [33]. Any compromise of privacy may lead to problems such as eavesdropping [34], [35], unauthorised access to, or alteration or destruction of, information [36], hacking, identity theft, forgery and social engineering [37]. Some organisations are reluctant to adopt the IoT because of fears of privacy compromises [38], [39], particularly in cases that involve medical data, in which maintaining the privacy and anonymity of the user is of the utmost importance [22], [40]- [42] because of legal and statutory requirements, which in turn affect trust to adopt the IoT in the healthcare domain.…”
Section: B Privacymentioning
confidence: 99%
“…Privacy is an important challenge in the IoT environment, due to availability of sensory devices, and the speed and volume of information flow [33]. Any compromise of privacy may lead to problems such as eavesdropping [34], [35], unauthorised access to, or alteration or destruction of, information [36], hacking, identity theft, forgery and social engineering [37]. Some organisations are reluctant to adopt the IoT because of fears of privacy compromises [38], [39], particularly in cases that involve medical data, in which maintaining the privacy and anonymity of the user is of the utmost importance [22], [40]- [42] because of legal and statutory requirements, which in turn affect trust to adopt the IoT in the healthcare domain.…”
Section: B Privacymentioning
confidence: 99%
“…The confidence threshold h c is commonly used to extract high confidence items from frequent items, which are the students' social ties. Support and confidence thresholds are usually set by users or experts in the traditional approach and are usually fixed [31,32]. However, in mining the college students' social network, different students have different check-in data numbers.…”
Section: Social Ties Mining With Association Analysismentioning
confidence: 99%