首页 > 最新文献

2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)最新文献

英文 中文
Replica selection in the cloud environments using an ant colony algorithm 在云环境中使用蚁群算法进行副本选择
N. J. Navimipour, Bahareh Alami Milani
Cloud computing as a new and popular IT-based technology is a large-scale distributed computing paradigm. Cloud computing is driven by economies of scale, in which a pool of abstracted, virtualized, dynamically scalable, managed computing power, storage, platforms, and services are delivered on demand to external customers over the internet. Replica selection requires information about the capabilities and performance characteristics of a storage system. It is based on the user demand and failure occurs during response time. In data cloud, the selection of replica is an important issue for users and to access a data file. Our research is mainly focused on replica selection mechanism in order to achieve the best performance. This research proposes new replica selection base on ant colony optimization to improve average access time. We use Java to evaluate the approach. The obtained result showed better performance of the proposed algorithm.
云计算作为一种新兴的、流行的基于it的技术,是一种大规模的分布式计算范式。云计算是由规模经济驱动的,在规模经济中,一组抽象的、虚拟化的、动态可伸缩的、可管理的计算能力、存储、平台和服务通过互联网按需交付给外部客户。选择副本需要了解存储系统的能力和性能特征。它基于用户需求,故障发生在响应时间内。在数据云中,副本的选择是用户访问数据文件的一个重要问题。为了达到最佳性能,我们主要研究副本选择机制。为了提高平均访问时间,提出了一种基于蚁群优化的副本选择方法。我们使用Java来评估该方法。实验结果表明,该算法具有较好的性能。
{"title":"Replica selection in the cloud environments using an ant colony algorithm","authors":"N. J. Navimipour, Bahareh Alami Milani","doi":"10.1109/DIPDMWC.2016.7529372","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529372","url":null,"abstract":"Cloud computing as a new and popular IT-based technology is a large-scale distributed computing paradigm. Cloud computing is driven by economies of scale, in which a pool of abstracted, virtualized, dynamically scalable, managed computing power, storage, platforms, and services are delivered on demand to external customers over the internet. Replica selection requires information about the capabilities and performance characteristics of a storage system. It is based on the user demand and failure occurs during response time. In data cloud, the selection of replica is an important issue for users and to access a data file. Our research is mainly focused on replica selection mechanism in order to achieve the best performance. This research proposes new replica selection base on ant colony optimization to improve average access time. We use Java to evaluate the approach. The obtained result showed better performance of the proposed algorithm.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128009405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Staffing policy for information security maintenance tasks solution 信息安全维护任务解决方案的人员配置策略
N. Miloslavskaya, A. Tolstoy
The paper defines the structure and basic requirements that should be taken into account when an organization develops the staffing policy for its information security maintenance (ISM) tasks solution.
本文定义了组织为其信息安全维护(ISM)任务解决方案制定人员配置策略时应考虑的结构和基本要求。
{"title":"Staffing policy for information security maintenance tasks solution","authors":"N. Miloslavskaya, A. Tolstoy","doi":"10.1109/DIPDMWC.2016.7529399","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529399","url":null,"abstract":"The paper defines the structure and basic requirements that should be taken into account when an organization develops the staffing policy for its information security maintenance (ISM) tasks solution.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124480166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A course of Mathematical Logic and Theory of Algorithms as a mathematical background of modern cryptology 数学逻辑和算法理论课程,作为现代密码学的数学背景
A. Epishkina, K. Kogos, N. Nikiforova
The purpose of this work is to show that the course, Mathematical Logic and Theory of Algorithms, lectured by the authors in National Research Nuclear University MEPhI (Moscow Engineering Physics Institute) is the mathematical background of the cryptology study. Bachelors and specialists information security teaching has to focus attention on the mathematical training, therefore a set of mathematical disciplines should stand before applied cryptography in the curriculum. Due to the rapid development of computer power and information communication, cryptographic techniques have change. Hence, the course of Mathematical Logic and Theory of Algorithms is not fixed and vice versa it is dynamically updated, since changes in cryptographic methods bring out a revision of the mathematical background.
这项工作的目的是表明作者在国立核研究大学MEPhI(莫斯科工程物理研究所)讲授的数学逻辑和算法理论课程是密码学研究的数学背景。本科及专科院校的信息安全教学必须注重数学训练,因此在应用密码学的课程设置之前,必须先建立一套数学学科。随着计算机技术和信息通信技术的飞速发展,密码技术也发生了变化。因此,数学逻辑和算法理论的课程不是固定的,反之亦然,它是动态更新的,因为密码方法的变化带来了数学背景的修订。
{"title":"A course of Mathematical Logic and Theory of Algorithms as a mathematical background of modern cryptology","authors":"A. Epishkina, K. Kogos, N. Nikiforova","doi":"10.1109/DIPDMWC.2016.7529389","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529389","url":null,"abstract":"The purpose of this work is to show that the course, Mathematical Logic and Theory of Algorithms, lectured by the authors in National Research Nuclear University MEPhI (Moscow Engineering Physics Institute) is the mathematical background of the cryptology study. Bachelors and specialists information security teaching has to focus attention on the mathematical training, therefore a set of mathematical disciplines should stand before applied cryptography in the curriculum. Due to the rapid development of computer power and information communication, cryptographic techniques have change. Hence, the course of Mathematical Logic and Theory of Algorithms is not fixed and vice versa it is dynamically updated, since changes in cryptographic methods bring out a revision of the mathematical background.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128337443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards ranking cultural terms from originating source 对文化术语按来源排序
Opoku-Mensah Eugene, Fengli Zhang, B. Yellakuor
The use of Search Engine enables the information seeker to seek information from a wide range of categories. Cultural information is one of the unique categories among the classes of information searched by users. This is because, there exists a significant relationship between a cultural keyword and its' originating society. Naturally, societies are supposed to be the highest authoritative body over their own cultural keywords. However, current ranking schemes treat all queries as the same without considering the uniqueness of cultural keywords, and this easily misleads information seekers. Therefore, to evaluate search engines performance on cultural keywords, we conducted a survey using some Ghanaian's terms as our case study on the basis of trust, relevance and accessibility. Surprisingly, the results showed that several documents from external sources (regions outside the location of that culture) had higher rankings against that of the originating source. Further investigations using precision and discounted cumulative gain proved that the cultural term problem is more of ranking than retrieval. Upon our findings, we propose a ranking framework based on the keyword-source namely TermSource. It is centered on cultural information advocacy, cultural websites management, and usage adaptation. By the adoption of this framework, the web will be enriched not only with cultural information but also be improved in ranking efficiency.
搜索引擎的使用使信息寻求者能够从广泛的类别中寻找信息。文化信息是用户搜索的信息类别中独特的一类。这是因为,一个文化关键词与其产生的社会之间存在着显著的关系。自然,社会应该是对自己的文化关键词拥有最高权威的机构。然而,目前排名方案对所有查询相同的不考虑文化关键字的唯一性,这很容易误导的信息搜索者。因此,为了评估搜索引擎在文化关键词上的表现,我们进行了一项调查,在信任、相关性和可访问性的基础上,使用一些加纳术语作为我们的案例研究。令人惊讶的是,结果显示,来自外部来源(该文化所在地以外的地区)的几个文档比原始来源的文档排名更高。利用精度和贴现累积增益的进一步研究证明,文化术语问题更多的是排序问题而不是检索问题。根据我们的发现,我们提出了一个基于关键词来源的排名框架,即TermSource。以文化信息宣传、文化网站管理和使用适应为核心。通过采用这个框架,网络不仅丰富了文化信息,而且提高了排名效率。
{"title":"Towards ranking cultural terms from originating source","authors":"Opoku-Mensah Eugene, Fengli Zhang, B. Yellakuor","doi":"10.1109/DIPDMWC.2016.7529365","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529365","url":null,"abstract":"The use of Search Engine enables the information seeker to seek information from a wide range of categories. Cultural information is one of the unique categories among the classes of information searched by users. This is because, there exists a significant relationship between a cultural keyword and its' originating society. Naturally, societies are supposed to be the highest authoritative body over their own cultural keywords. However, current ranking schemes treat all queries as the same without considering the uniqueness of cultural keywords, and this easily misleads information seekers. Therefore, to evaluate search engines performance on cultural keywords, we conducted a survey using some Ghanaian's terms as our case study on the basis of trust, relevance and accessibility. Surprisingly, the results showed that several documents from external sources (regions outside the location of that culture) had higher rankings against that of the originating source. Further investigations using precision and discounted cumulative gain proved that the cultural term problem is more of ranking than retrieval. Upon our findings, we propose a ranking framework based on the keyword-source namely TermSource. It is centered on cultural information advocacy, cultural websites management, and usage adaptation. By the adoption of this framework, the web will be enriched not only with cultural information but also be improved in ranking efficiency.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130936464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improvement and discussion on pronunciation method of DIVA model based on auditory perception space 基于听觉感知空间的DIVA模型发音方法的改进与探讨
Shaojing Zhang, Xin-Bing Xu
Based on DIVA(Directions Into of Articulators) model, the paper attempts to construct a neural network model which can better simulate speech perception, speech acquisition and speech production. The model classifies speech phonemes from formant frequencies by unsupervised learning, and through the modifications of DIVA model speech mapping and self-organizing mapping algorithm, it simulates the natural process of human speech acquisition in auditory. What's more, by the comparison with achievements of psychological phonetics experiments, the simulation result shows that the model we build can better identify the difference between prototype and non-prototype and fully form auditory perception for vowels, so it better shows the natural process of the ability of human speech acquisition.
本文试图在DIVA(Directions Into of Articulators)模型的基础上,构建一个能够更好地模拟语音感知、语音获取和语音产生的神经网络模型。该模型采用无监督学习的方法对语音音素进行共振频率分类,并通过对DIVA模型语音映射和自组织映射算法的改进,模拟了人类在听觉环境下语音习得的自然过程。此外,通过与心理语音学实验成果的对比,仿真结果表明,我们构建的模型能够更好地识别原型与非原型的区别,并对元音形成完整的听觉感知,从而更好地体现了人类语言习得能力的自然过程。
{"title":"Improvement and discussion on pronunciation method of DIVA model based on auditory perception space","authors":"Shaojing Zhang, Xin-Bing Xu","doi":"10.1109/DIPDMWC.2016.7529354","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529354","url":null,"abstract":"Based on DIVA(Directions Into of Articulators) model, the paper attempts to construct a neural network model which can better simulate speech perception, speech acquisition and speech production. The model classifies speech phonemes from formant frequencies by unsupervised learning, and through the modifications of DIVA model speech mapping and self-organizing mapping algorithm, it simulates the natural process of human speech acquisition in auditory. What's more, by the comparison with achievements of psychological phonetics experiments, the simulation result shows that the model we build can better identify the difference between prototype and non-prototype and fully form auditory perception for vowels, so it better shows the natural process of the ability of human speech acquisition.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115065226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining MIC feature selection and feature-based MSPCA for network traffic anomaly detection 结合MIC特征选择和基于特征的MSPCA进行网络流量异常检测
Zhaomin Chen, C. Yeo, Bu Sung Lee Francis, C. Lau
In this paper, we propose a network anomaly detection system which consists of a Maximal Information Coefficient based feature selection algorithm and a feature-based MSPCA detection algorithm, which can separate the anomalous information more efficiently. Maximal Information Coefficient can provide a good information measurement of any dependency between two random variables. MSPCA combines the benefit of PCA and wavelet analysis to reduce the effect of normal subspace contamination, which is the main challenge of PCA-based anomaly detection algorithm. We utilize multiple network flow features to describe the network traffic instead of using only volumes. To evaluate our proposed system, we test it on the DARPA 1999 dataset. The results indicate a large improvement when using our method compared to PCA-based anomaly detection algorithms.
本文提出了一种网络异常检测系统,该系统由基于最大信息系数的特征选择算法和基于特征的MSPCA检测算法组成,可以更有效地分离异常信息。最大信息系数可以很好地度量两个随机变量之间的依赖关系。MSPCA结合了PCA和小波分析的优点,减少了正态子空间污染的影响,这是基于PCA的异常检测算法面临的主要挑战。我们利用多个网络流特征来描述网络流量,而不是只使用卷。为了评估我们提出的系统,我们在DARPA 1999数据集上进行了测试。结果表明,与基于pca的异常检测算法相比,我们的方法有很大的改进。
{"title":"Combining MIC feature selection and feature-based MSPCA for network traffic anomaly detection","authors":"Zhaomin Chen, C. Yeo, Bu Sung Lee Francis, C. Lau","doi":"10.1109/DIPDMWC.2016.7529385","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529385","url":null,"abstract":"In this paper, we propose a network anomaly detection system which consists of a Maximal Information Coefficient based feature selection algorithm and a feature-based MSPCA detection algorithm, which can separate the anomalous information more efficiently. Maximal Information Coefficient can provide a good information measurement of any dependency between two random variables. MSPCA combines the benefit of PCA and wavelet analysis to reduce the effect of normal subspace contamination, which is the main challenge of PCA-based anomaly detection algorithm. We utilize multiple network flow features to describe the network traffic instead of using only volumes. To evaluate our proposed system, we test it on the DARPA 1999 dataset. The results indicate a large improvement when using our method compared to PCA-based anomaly detection algorithms.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133177323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Factographic information retrieval for competences forming 能力形成的因子信息检索
S. Kulik
The effective factographic information retrieval problem has been investigated in the paper. The primary objective of this paper is to outline factographic information retrieval and new Lemma related to properties of factographic information retrieval. The special curriculum has been developed for the set competences. The curriculum contains specialized disciplines. These disciplines use factographic information retrieval. Factographic information retrieval has effectiveness indicators. New Lemma about effectiveness and properties of factographic information retrieval was proved.
本文研究了有效因子信息检索问题。本文的主要目的是概述因子信息检索和与因子信息检索性质有关的新引理。专门的课程是为培养学生的能力而设计的。课程包含专业学科。这些学科使用因子信息检索。因子信息检索具有有效性指标。证明了因子信息检索的有效性和性质的新引理。
{"title":"Factographic information retrieval for competences forming","authors":"S. Kulik","doi":"10.1109/DIPDMWC.2016.7529397","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529397","url":null,"abstract":"The effective factographic information retrieval problem has been investigated in the paper. The primary objective of this paper is to outline factographic information retrieval and new Lemma related to properties of factographic information retrieval. The special curriculum has been developed for the set competences. The curriculum contains specialized disciplines. These disciplines use factographic information retrieval. Factographic information retrieval has effectiveness indicators. New Lemma about effectiveness and properties of factographic information retrieval was proved.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"316 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116103269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Secure public-auditing cloud storage enabling data dynamics in the standard model 安全的公共审计云存储,支持标准模型中的数据动态
Mingxiao Ma, Jos Weber, Jan van den Berg
In cloud computing, the paradigm of data outsourcing introduces security challenges, which requires an independent auditing service to check the data integrity in the cloud. Many existing integrity checking protocols cannot be applied to the auditing service because they can only deal with static data, but it is natural for the client to dynamically update their remotely stored data. Thus, an efficient and secure auditing protocol enabling data dynamics is desired to convince the client that the data are correctly stored in the cloud. In this work, we propose a privacy-preserving public auditing cloud storage protocol enabling data dynamics in the standard model. Inspired by a recent homomorphic network coding signature scheme, we employ a data integrity auditing protocol based on the strong RSA assumption, and extend it to enable a third party auditor to audit client's data without learning the data content. Then we further extend our auditing protocol to support the data dynamic operations (modification, insertion and deletion), which achieves high security level in the standard model. At last we prove the security and justify the performance of our proposed protocol through concrete experiments and comparisons with the state of the art.
在云计算中,数据外包的模式带来了安全挑战,这需要一个独立的审计服务来检查云中的数据完整性。许多现有的完整性检查协议不能应用于审计服务,因为它们只能处理静态数据,但客户端动态更新远程存储的数据是很自然的。因此,需要一个支持数据动态的高效且安全的审计协议,以使客户确信数据正确地存储在云中。在这项工作中,我们提出了一种保护隐私的公共审计云存储协议,支持标准模型中的数据动态。受最近同态网络编码签名方案的启发,我们采用了一种基于强RSA假设的数据完整性审计协议,并对其进行了扩展,使第三方审计员能够在不了解数据内容的情况下审计客户端的数据。然后,我们进一步扩展了审计协议,以支持数据动态操作(修改、插入和删除),从而在标准模型中实现了较高的安全级别。最后,我们通过具体的实验和与当前技术的比较,证明了我们提出的协议的安全性和合理性。
{"title":"Secure public-auditing cloud storage enabling data dynamics in the standard model","authors":"Mingxiao Ma, Jos Weber, Jan van den Berg","doi":"10.1109/DIPDMWC.2016.7529384","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529384","url":null,"abstract":"In cloud computing, the paradigm of data outsourcing introduces security challenges, which requires an independent auditing service to check the data integrity in the cloud. Many existing integrity checking protocols cannot be applied to the auditing service because they can only deal with static data, but it is natural for the client to dynamically update their remotely stored data. Thus, an efficient and secure auditing protocol enabling data dynamics is desired to convince the client that the data are correctly stored in the cloud. In this work, we propose a privacy-preserving public auditing cloud storage protocol enabling data dynamics in the standard model. Inspired by a recent homomorphic network coding signature scheme, we employ a data integrity auditing protocol based on the strong RSA assumption, and extend it to enable a third party auditor to audit client's data without learning the data content. Then we further extend our auditing protocol to support the data dynamic operations (modification, insertion and deletion), which achieves high security level in the standard model. At last we prove the security and justify the performance of our proposed protocol through concrete experiments and comparisons with the state of the art.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126400438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Identifying core disciplines to foster the development of professional competences 确定核心学科,促进专业能力的发展
J. Domashova, Elena Pisarchik
The paper discusses identification of core disciplines for the most effective development of basic professional competences set forth by “Financial monitoring specialist (in the area of anti-money laundering and combating financing of terrorism)” professional standard. It builds on an earlier effort to translate the capabilities of the professional standard into educational standard competences and outlines the steps that were carried out to identify and align the disciplines essential for fostering the core capabilities of the standard.
本文讨论了“金融监测专家(在反洗钱和打击恐怖主义融资领域)”专业标准所规定的最有效发展基本专业能力的核心学科的确定。它建立在早期工作的基础上,将专业标准的能力转化为教育标准的能力,并概述了确定和调整培养标准核心能力所必需的学科的步骤。
{"title":"Identifying core disciplines to foster the development of professional competences","authors":"J. Domashova, Elena Pisarchik","doi":"10.1109/DIPDMWC.2016.7529398","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529398","url":null,"abstract":"The paper discusses identification of core disciplines for the most effective development of basic professional competences set forth by “Financial monitoring specialist (in the area of anti-money laundering and combating financing of terrorism)” professional standard. It builds on an earlier effort to translate the capabilities of the professional standard into educational standard competences and outlines the steps that were carried out to identify and align the disciplines essential for fostering the core capabilities of the standard.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124194443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Managing the loss of control over cyber identity 管理对网络身份失去控制
Erik L. Moore
Professionals entering the information security field need new models to manage user reactions to the loss of control over their digital identities. Escalations in authentication technologies like behavioral blocks and biometric data breaches are reducing the user's control over the management of their digital identities. Simultaneously, users are becoming more digitally dependant regarding financial transactions, buying food, emotionally connecting with loved ones on social media, managing personal information, and writing personal documents. This research presents a tool to address this issue pulled from the fields of education, political science, psychology, and cyber security. It is combined as a set of models to be delivered as part of information security curricula. Recent analysis of brain scans and population behavior studies have suggested that when people feel their identity at risk and feel disempowered they will have a stronger disposition towards authoritarianism, desire for retribution, and a desire for simplistic solutions instead of acting with reasoned and adaptive responses. Indicators in other fields suggest that the way professionals and educators characterize incidents that threaten digital identity can habituate different types of societal attitudes about the Internet and institutional data usage. The model presented herein should help cyber security educators characterize user responds to digital identity threats, and provides a scale for evaluating those responses.
进入信息安全领域的专业人员需要新的模型来管理用户对其数字身份失去控制的反应。行为障碍和生物识别数据泄露等身份验证技术的升级正在降低用户对其数字身份管理的控制。与此同时,用户在金融交易、购买食品、在社交媒体上与亲人建立情感联系、管理个人信息和撰写个人文件等方面变得越来越依赖数字技术。本研究从教育学、政治学、心理学和网络安全等领域提出了一种解决这一问题的工具。它被组合成一组模型,作为信息安全课程的一部分交付。最近对大脑扫描和人口行为研究的分析表明,当人们感到自己的身份处于危险之中,感到权力被剥夺时,他们会更倾向于威权主义,渴望报复,渴望简单化的解决方案,而不是理性和适应性的反应。其他领域的指标表明,专业人士和教育工作者描述威胁数字身份的事件的方式可以习惯不同类型的社会对互联网和机构数据使用的态度。本文提出的模型应有助于网络安全教育者描述用户对数字身份威胁的反应,并提供评估这些反应的尺度。
{"title":"Managing the loss of control over cyber identity","authors":"Erik L. Moore","doi":"10.1109/DIPDMWC.2016.7529395","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529395","url":null,"abstract":"Professionals entering the information security field need new models to manage user reactions to the loss of control over their digital identities. Escalations in authentication technologies like behavioral blocks and biometric data breaches are reducing the user's control over the management of their digital identities. Simultaneously, users are becoming more digitally dependant regarding financial transactions, buying food, emotionally connecting with loved ones on social media, managing personal information, and writing personal documents. This research presents a tool to address this issue pulled from the fields of education, political science, psychology, and cyber security. It is combined as a set of models to be delivered as part of information security curricula. Recent analysis of brain scans and population behavior studies have suggested that when people feel their identity at risk and feel disempowered they will have a stronger disposition towards authoritarianism, desire for retribution, and a desire for simplistic solutions instead of acting with reasoned and adaptive responses. Indicators in other fields suggest that the way professionals and educators characterize incidents that threaten digital identity can habituate different types of societal attitudes about the Internet and institutional data usage. The model presented herein should help cyber security educators characterize user responds to digital identity threats, and provides a scale for evaluating those responses.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123394943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1