واقع أمن وسرية المعلومات الإلكترونية في بنك فلسطين "دراسة حالة" (The Reality of Electronic Information Security in Bank of Palestine "Case Study")

2020 ◽  
Author(s):  
Feras Shehada ◽  
Mohammed Bader
2020 ◽  
Vol 4 (2) ◽  
pp. 51-58
Author(s):  
Sry Wahyuni ◽  
Elwidarifa Marwenny

The subject matter of this research is the Juridical Review of the Crime of Threats in the Information and Electronic Transactions Law (Case Study of the Koto Baru District Court). This issue is divided into two sub-discussions, first, how is the application of material crimes against criminal acts of threats in the Law on Information and Electronic Transactions, second, how are judges' legal considerations in imposing crimes against threats of threats in the Law on Electronic Information and transactions. The method used in this research is to use a normative juridical problem approach. about the problem that is the object of the problem.The results showed that efforts to apply sanctions were made to overcome the perpetrators of extortion and threats, namely: firmly enforcing the existing positive laws. For subjective positive law enforcement, it may be necessary to have instruments or law enforcers who have the instinct of justice, namely "Judges" who decide all existing cases. The research implication is: it is hoped that the inculcation of social values ​​and norms in society in using social media and in UUITE is not trapped in behavior that plunges them into criminal acts / crimes, it is also hoped that the Panel of Judges in deciding cases must consider more The facts of the trial, the elements of the offense, and the consideration of the severity of the crime with reference to the defendant's situation and the victim's loss.


Author(s):  
Sadiq Shehu ◽  
Abdullahi Hussaini ◽  
Zahriya Lawal

Cryptography is fundamental to the provision of a wider notion of information security. Electronic information can easily be transmitted and stored in relatively insecure environments. This research was present to factor the prime power modulus \(N = p^r q\) for \(r \geq 2\) using the RSA key equation, if \(\frac{y}{x}\) is a convergents of the continued fractions expansions of \(\frac{e}{N - \left(2^{\frac{2r+1}{r+1}} N^{\frac{r}{r+1}} - 2^{\frac{r-1}{r+1}} N^{\frac{r-1}{r+1}}\right)}\). We furthered our analysis on \(n\) prime power moduli \(N_i = p_i^r q_i\) by transforming the generalized key equations into Simultaneous Diophantine approximations and using the LLL algorithm on \(n\) prime power public keys \((N_i,e_i)\) we were able to factorize the \(n\) prime power moduli \(N_i = p_i^r q_i\), for \(i = 1,....,n\) simultaneously in polynomial time.


2018 ◽  
Vol 26 (1) ◽  
pp. 91-108 ◽  
Author(s):  
Khaled A. Alshare ◽  
Peggy L. Lane ◽  
Michael R. Lane

Purpose The purpose of this case study is to examine the factors that impact higher education employees’ violations of information security policy by developing a research model based on grounded theories such as deterrence theory, neutralization theory and justice theory. Design/methodology/approach The research model was tested using 195 usable responses. After conducting model validation, the hypotheses were tested using multiple linear regression. Findings The results of the study revealed that procedural justice, distributive justice, severity and celerity of sanction, privacy, responsibility and organizational security culture were significant predictors of violations of information security measures. Only interactional justice was not significant. Research limitations/implications As with any exploratory case study, this research has limitations such as the self-reported information and the method of measuring the violation of information security measures. The method of measuring information security violations has been a challenge for researchers. Of course, the best method is to capture the actual behavior. Another limitation to this case study which might have affected the results is the significant number of faculty members in the respondent pool. The shared governance culture of faculty members on a US university campus might bias the results more than in a company environment. Caution should be applied when generalizing the results of this case study. Practical implications The findings validate past research and should encourage managers to ensure employees are involved with developing and implementing information security measures. Additionally, the information security measures should be applied consistently and in a timely manner. Past research has focused more on the certainty and severity of sanctions and not as much on the celerity or swiftness of applying sanctions. The results of this research indicate there is a need to be timely (swift) in applying sanctions. The importance of information security should be grounded in company culture. Employees should have a strong sense of treating company data as they would want their own data to be treated. Social implications Engaging employees in developing and implementing information security measures will reduce employees’ violations. Additionally, giving employees the assurance that all are given the same treatment when it comes to applying sanctions will reduce the violations. Originality/value Setting and enforcing in a timely manner a solid sanction system will help in preventing information security violations. Moreover, creating a culture that fosters information security will help in positively affecting the employees’ perceptions toward privacy and responsibility, which in turn, impacts information security violations. This case study applies some existing theories in the context of the US higher education environment. The results of this case study contributed to the extension of existing theories by including new factors, on one hand, and confirming previous findings, on the other hand.


2013 ◽  
pp. 1208-1218
Author(s):  
James Suleiman ◽  
Terry Huston

Compliance with regulatory guidelines and mandates surrounding information security and the protection of privacy has been under close scrutiny for some time throughout the world. Smaller organizations have remained “out of the spotlight” and generally do not hire staff with the expertise to fully address issues of compliance. This case study examines a project partnership between an information-technology (IT) consultant who specializes in small business and a diminutive medical practice that sought support with compliance issues surrounding a research study it was conducting. Other small medical practices were contributing to the research; consequently, information sharing while concurrently adhering to the regulations of the Health Insurance Portability and Accountability Act (HIPAA) of 1996 was a significant aspect of the project. It was also critical that numerous other security and privacy legislative requirements were met. The issue of data security is often neglected in IT instruction. This case study provides a foundation for examining aspects of information security from the perspective of the small-business IT consultant.


Author(s):  
Nicole Fahey ◽  
Wal Taylor

This chapter uses a case study approach to highlight issues surrounding the provision of government agency sponsored programs aimed at increasing Electronic Information Literacy (EIL), as a basic requirement for community engagement in an electronically enabled world. The Skills.net program was designed to increase EIL skills by providing “free or low cost access to training in online services and the Internet for those in the community who are least likely to have access” in Victoria, Australia. This study found that whilst the Skills.net program did increase EIL, it did not adequately address the accepted training needs of the participants nor did it adequately adhere to known guidelines for success in information literacy enhancement. This experience provides further evidence of lessons being learned from many government agency imposed programs which do not provide adequate outcomes for regional areas as they grapple with the impact of being increasingly marginalized in an electronically enabled age.


Author(s):  
Robert van Wessel

In this Section an outline will be given on the discipline of Information Security and some of its related standards. Special attention will be paid to the ISO/IEC 17799 process standard as this information security management standard formed the basis of this case study.


Sign in / Sign up

Export Citation Format

Share Document