首页 > 最新文献

International Journal of Security and Its Applications最新文献

英文 中文
Privacy and Disclosure: Customer Attitudes Towards the Use of Big Data by Retail Companies 隐私和披露:客户对零售公司使用大数据的态度
Pub Date : 2018-05-31 DOI: 10.14257/IJSIA.2018.12.3.02
M. Sayegh, Karine Aoun Barakat
{"title":"Privacy and Disclosure: Customer Attitudes Towards the Use of Big Data by Retail Companies","authors":"M. Sayegh, Karine Aoun Barakat","doi":"10.14257/IJSIA.2018.12.3.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.3.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48346153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Some Studies on the Security and Space Issues and Challenges in Cloud Computing based Data Centers 基于云计算的数据中心安全与空间问题与挑战研究
Pub Date : 2018-05-31 DOI: 10.14257/ijsia.2018.12.3.01
N. Thirupathi Rao, C. Sekhar, D. Bhattacharyya, Tai-hoon Kim
{"title":"Some Studies on the Security and Space Issues and Challenges in Cloud Computing based Data Centers","authors":"N. Thirupathi Rao, C. Sekhar, D. Bhattacharyya, Tai-hoon Kim","doi":"10.14257/ijsia.2018.12.3.01","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.3.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42691192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Invisible Image Watermarking Based On Modified Particle Swarm Optimization (PSO) Algorithm 基于改进粒子群算法的图像不可见水印
Pub Date : 2018-03-31 DOI: 10.14257/IJSIA.2018.12.2.01
Atheer Bassel, J. Nordin, Mohammed B. Abdulkareem
{"title":"An Invisible Image Watermarking Based On Modified Particle Swarm Optimization (PSO) Algorithm","authors":"Atheer Bassel, J. Nordin, Mohammed B. Abdulkareem","doi":"10.14257/IJSIA.2018.12.2.01","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2018.12.2.01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41313745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Classification of Malware Analytics Techniques: A Systematic Literature Review 恶意软件分析技术分类:系统文献综述
Pub Date : 2018-03-31 DOI: 10.14257/IJSIA.2018.12.2.02
Nur Farhana Hordri, Noor Azurati Ahmad, S. Yuhaniz, S. Sahibuddin, A. Ariffin, Nur Afifah Mohd Saupi, N. Zamani, Yasmin Jeffry, Mohamad Firham Efendy Md. Senan
Context: Malware is a variety of forms of hostile or intrusive software that being thrown around online. Data analytics is the process of examining data sets in order to draw conclusions about information they contain, increasingly with the aid of specialized systems and software. Objectives: The aims of the study are to identify the types of malware analytics and identify the purpose of malware analytics. Method: A Systematic Literature Review (SLR) was carried out and reported based on the preferred reporting items for systematic reviews. 1114 papers were retrieved by manual search in six databases which are IEEE, Science Direct, Taylor and Francis, ACM, Wiley and Springer Link. 53 primary studies were finally included. Results: From these studies, 70% were conference papers and 30% were journal articles. Five classification of malware analytics techniques were identified and analysed. The classifications are (1) descriptive analytics, (2) diagnostic analytics, (3) predictive analytics, (4) prescriptive analytics and (5) visual analytics. Conclusion: This review delivers the evidence that malware analytics is an active research area. The review provides researchers with some guidelines for future research on this topic. It also provides broad information on malware analytics techniques which could be useful for practitioners.
背景:恶意软件是各种形式的恶意或侵入性软件,被扔在网上。数据分析是检查数据集的过程,目的是得出关于其中包含的信息的结论,越来越多地借助专门的系统和软件。目的:本研究的目的是确定恶意软件分析的类型和确定恶意软件分析的目的。方法:进行系统文献综述(SLR),并根据系统评价的首选报告项目进行报告。在IEEE、Science Direct、Taylor and Francis、ACM、Wiley和施普林格Link 6个数据库中人工检索论文1114篇,最终纳入53篇主要研究。结果:这些研究中,70%为会议论文,30%为期刊论文。识别并分析了五种类型的恶意软件分析技术。分类是(1)描述性分析,(2)诊断性分析,(3)预测性分析,(4)规定性分析和(5)可视化分析。结论:这篇综述提供了恶意软件分析是一个活跃的研究领域的证据。该综述为今后的研究提供了一些指导。它还提供了关于恶意软件分析技术的广泛信息,这可能对从业者有用。
{"title":"Classification of Malware Analytics Techniques: A Systematic Literature Review","authors":"Nur Farhana Hordri, Noor Azurati Ahmad, S. Yuhaniz, S. Sahibuddin, A. Ariffin, Nur Afifah Mohd Saupi, N. Zamani, Yasmin Jeffry, Mohamad Firham Efendy Md. Senan","doi":"10.14257/IJSIA.2018.12.2.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.02","url":null,"abstract":"Context: Malware is a variety of forms of hostile or intrusive software that being thrown around online. Data analytics is the process of examining data sets in order to draw conclusions about information they contain, increasingly with the aid of specialized systems and software. Objectives: The aims of the study are to identify the types of malware analytics and identify the purpose of malware analytics. Method: A Systematic Literature Review (SLR) was carried out and reported based on the preferred reporting items for systematic reviews. 1114 papers were retrieved by manual search in six databases which are IEEE, Science Direct, Taylor and Francis, ACM, Wiley and Springer Link. 53 primary studies were finally included. Results: From these studies, 70% were conference papers and 30% were journal articles. Five classification of malware analytics techniques were identified and analysed. The classifications are (1) descriptive analytics, (2) diagnostic analytics, (3) predictive analytics, (4) prescriptive analytics and (5) visual analytics. Conclusion: This review delivers the evidence that malware analytics is an active research area. The review provides researchers with some guidelines for future research on this topic. It also provides broad information on malware analytics techniques which could be useful for practitioners.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42472902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Rabin-Karp Elaboration in Comparing Pattern Based on Hash Data 基于Hash数据的比较模式Rabin-Karp精化
Pub Date : 2018-03-31 DOI: 10.14257/IJSIA.2018.12.2.06
A. Siahaan
{"title":"Rabin-Karp Elaboration in Comparing Pattern Based on Hash Data","authors":"A. Siahaan","doi":"10.14257/IJSIA.2018.12.2.06","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.06","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2018.12.2.06","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47273205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Towards a More Secured Solution in RDP: On-Demand Desktop Local Admin Rights 在RDP中实现更安全的解决方案:按需桌面本地管理员权限
Pub Date : 2018-03-31 DOI: 10.14257/IJSIA.2018.12.2.05
Manal Al-Sharrah, Mohammad A. Alkandari
{"title":"Towards a More Secured Solution in RDP: On-Demand Desktop Local Admin Rights","authors":"Manal Al-Sharrah, Mohammad A. Alkandari","doi":"10.14257/IJSIA.2018.12.2.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.05","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43790756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Detailed Review on Mobile Ad Hoc Networks: Protocols, Security Issues and Challenges 移动Ad Hoc网络:协议、安全问题和挑战
Pub Date : 2018-03-31 DOI: 10.14257/IJSIA.2018.12.2.07
N. Thirupathi Rao, P. Srinivas, D. Bhattacharyya, Tai-hoon Kim
{"title":"A Detailed Review on Mobile Ad Hoc Networks: Protocols, Security Issues and Challenges","authors":"N. Thirupathi Rao, P. Srinivas, D. Bhattacharyya, Tai-hoon Kim","doi":"10.14257/IJSIA.2018.12.2.07","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.07","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47793399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Novel Approach for E-passport Authentication using Elgamal Cryptosystem 基于Elgamal密码系统的电子护照认证新方法
Pub Date : 2018-03-31 DOI: 10.14257/IJSIA.2018.12.2.03
Anurag Singh Tomar, Sumit Kumar, S. K. Chaurasiya, Vanshika Shrivastava
{"title":"Novel Approach for E-passport Authentication using Elgamal Cryptosystem","authors":"Anurag Singh Tomar, Sumit Kumar, S. K. Chaurasiya, Vanshika Shrivastava","doi":"10.14257/IJSIA.2018.12.2.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.2.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43828571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Query-Dependency-Aware Location Privacy Protection for Road Networks 基于查询相关性的道路网络位置隐私保护
Pub Date : 2018-03-31 DOI: 10.14257/ijsia.2018.12.2.04
Huiyun Chen, X. Qin
{"title":"Query-Dependency-Aware Location Privacy Protection for Road Networks","authors":"Huiyun Chen, X. Qin","doi":"10.14257/ijsia.2018.12.2.04","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.2.04","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46767341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A qualitative analysis of information privacy concerns among healthcare employees. 医疗保健员工信息隐私问题的定性分析。
Pub Date : 2018-01-31 DOI: 10.14257/IJSIA.2018.12.1.06
Fiza Abdul Rahim, Gopinath Muruti, Z. Ismail, Ganthan Narayana Samy
Healthcare organizationsprocess massive amount of electronic medical records (EMR) utilizedby their employees. Having given privileged access to sensitive and valuable patient information in the EMR, healthcare employees may cause privacy breaches, which may lead to detrimental consequences. Therefore, it is vital to impose particular attention to healthcare employees’ concerns on privacy in the use of EMR. The purpose of this paper is to indicate the results from quantitative analysis (phase 1) through qualitative analysis (phase 2). From phase 1, privacy awareness is the only factor that influences information privacy concerns (IPC) in the use of EMRamong healthcare employees, suggesting that healthcare employees do not think that privacy policy, privacy control, privacy risk, and privacy experience influence their IPC. To investigate why the respondents answered in this manner, the interviewees were asked to clarify why they think privacy awareness is veryimportant to ensure the IPC among healthcare employees. Indeed, the mediating relationship of privacy awareness between privacy policy and IPC were discussed by highlighting on the implementation practices regarding privacy policy enforcement and awareness programs in healthcare organization.
医疗保健组织需要处理员工使用的大量电子医疗记录(EMR)。医疗保健员工获得了访问EMR中敏感和有价值的患者信息的特权,可能会造成隐私泄露,从而导致有害后果。因此,必须特别关注医疗保健员工在使用电子病历时对隐私的关注。本文的目的是通过定性分析(第二阶段)来说明定量分析(第一阶段)的结果。从第一阶段来看,隐私意识是医疗保健员工在使用电子病历时影响信息隐私关注(IPC)的唯一因素,这表明医疗保健员工并不认为隐私政策、隐私控制、隐私风险和隐私体验会影响他们的IPC。为了调查为什么受访者以这种方式回答,受访者被要求澄清为什么他们认为隐私意识对于确保医疗保健员工的IPC非常重要。实际上,通过强调医疗机构中隐私政策执行和意识项目的实施实践,讨论了隐私政策和IPC之间隐私意识的中介关系。
{"title":"A qualitative analysis of information privacy concerns among healthcare employees.","authors":"Fiza Abdul Rahim, Gopinath Muruti, Z. Ismail, Ganthan Narayana Samy","doi":"10.14257/IJSIA.2018.12.1.06","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.1.06","url":null,"abstract":"Healthcare organizationsprocess massive amount of electronic medical records (EMR) utilizedby their employees. Having given privileged access to sensitive and valuable patient information in the EMR, healthcare employees may cause privacy breaches, which may lead to detrimental consequences. Therefore, it is vital to impose particular attention to healthcare employees’ concerns on privacy in the use of EMR. The purpose of this paper is to indicate the results from quantitative analysis (phase 1) through qualitative analysis (phase 2). From phase 1, privacy awareness is the only factor that influences information privacy concerns (IPC) in the use of EMRamong healthcare employees, suggesting that healthcare employees do not think that privacy policy, privacy control, privacy risk, and privacy experience influence their IPC. To investigate why the respondents answered in this manner, the interviewees were asked to clarify why they think privacy awareness is veryimportant to ensure the IPC among healthcare employees. Indeed, the mediating relationship of privacy awareness between privacy policy and IPC were discussed by highlighting on the implementation practices regarding privacy policy enforcement and awareness programs in healthcare organization.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48623959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Security and Its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1