TASAM - Towards the Smart Devices App-Stores Applications Security Management Related Best Practices

Author(s):  
Zafar Kazmi ◽  
Toni Felguera ◽  
Jorge Aguila Vila ◽  
Mario Maawad Marcos
Author(s):  
John D’Arcy ◽  
Anat Hovav

A number of academic studies that focus on various aspects of information security management (ISM) have emerged in recent years. This body of work ranges from the technical, economic, and behavioral aspects of ISM to the effect of industry standards, regulations, and best practices. The purpose of this chapter is to review the current state of ISM research, while providing an integrative framework for future studies. Using the proposed framework as a guide, we identify areas of depth within current ISM literature and areas where research is underdeveloped. Finally, we call for a more comprehensive approach to ISM research that considers multiple dimensions of our framework and their interrelationships.


Sensors ◽  
2018 ◽  
Vol 19 (1) ◽  
pp. 19 ◽  
Author(s):  
Georgia Lykou ◽  
Argiro Anagnostopoulou ◽  
Dimitris Gritzalis

Airports are at the forefront of technological innovation, mainly due to the fact that the number of air travel passengers is exponentially increasing every year. As a result, airports enhance their infrastructure intelligence and evolve as smart facilities to support growth, by offering an enjoyable travel experience. New challenges are coming up, which aviation has to deal with and adapt to, such as the integration of Industrial IoT (Internet of Things) in airport facilities and the increased use of smart devices from travelers and employees. Cybersecurity is becoming a key enabler for safety, which is paramount in the aviation context. Smart airports strive to provide optimal services in a reliable and sustainable manner, by working around the domains of growth, efficiency, safety and security. This article researches: (a) the implementation rate of cybersecurity measures in commercial airports; (b) malicious threats that evolve due to IoT and smart devices installed; (c) risk scenario analysis for IoT malicious attacks with threat mitigation actions. With the aim to enhance operational practices and develop robust cybersecurity governance in smart airports, we present a systematic and comprehensive analysis of malicious attacks in smart airports, to facilitate airport community comprehend risks and proactively act, by implementing cybersecurity best practices and resilience measures.


Author(s):  
Matthew Nicho

The purpose of this paper is to propose an IS security governance model to enhance the security of information systems in an organisation by viewing security from a holistic perspective of encompassing information security, information assurance, audit, governance, and compliance. This is achieved through the strategic integration of appropriate frameworks, models, and concepts in information governance, IS service management, and information security. This involves analysing the relevant frameworks, models, and concepts used in the above domains, extracting the best practices for implementing them from the literature and mapping these into an integrated standard. The frameworks identified are Control Objectives for Information and related Technology (COBIT), Information Technology Infrastructure Library (ITIL), ISO 27002, Risk IT, and Payment Card Industry Data Security Standard (PCI DSS). While it is evident that each of these five frameworks serve different purpose of information systems, such as information auditing and governance, facilitating the delivery of high-quality IT services, providing a model managing an Information Security Management System, providing a risk focus, and protection of cardholder data, all of these frameworks have the common objective to secure the IS assets in an organisation. Hence, extraction of the best practices in each of these framework can provide effective security of organisational IS assets rather than adequate security.


Author(s):  
Kristen Izaryk ◽  
Robin Edge ◽  
Dawn Lechwar

Purpose The purpose of this article is to explore and describe the approaches and specific assessment tools that speech-language pathologists are currently using to assess social communication disorders (SCDs) in children, in relation to current best practices. Method Ninety-four speech-language pathologists completed an online survey asking them to identify which of the following approaches they use to assess children with SCD: parent/teacher report, naturalistic observation, formal assessment, language sample analysis, interviews, semistructured tasks, and peer/self-report. Participants were also asked to identify specific assessment tools they use within each approach. Results Participants most commonly assess SCDs by combining interviews, naturalistic observation, language sampling, parent/teacher report, and formal assessment. Semistructured tasks and peer/self-report tools were less frequently utilized. Several established parent/teacher report and formal assessment tools were commonly identified for assessing SCDs. Most participants use an informal approach for interviews, language sampling, and naturalistic observations in their SCD assessment process. Conclusions Generally, participants follow best practices for assessing SCDs by combining several different approaches. Some considerations for future assessment are identified, including the use of established protocols in the place of informal approaches in order to make the assessment of SCDs more systematic. Future directions for research are discussed.


Author(s):  
Elena Dukhovny ◽  
E. Betsy Kelly

According to the 2010 U.S. Census, over 20% of Americans speak a language other than English in the home, with Spanish, Chinese, and French being the languages most commonly spoken, aside from English. However, few augmentative and alternative communication (AAC) systems offer multilingual support for individuals with limited functional speech. There has been much discussion in the AAC community about best practices in AAC system design and intervention strategies, but limited resources exist to help us provide robust, flexible systems for users who speak languages other than English. We must provide services that take into consideration the unique needs of culturally and linguistically diverse users of AAC and help them reach their full communication potential. This article outlines basic guidelines for best practices in AAC design and selection, and presents practical applications of these best practices to multilingual/multicultural clients.


Sign in / Sign up

Export Citation Format

Share Document