scholarly journals An Information Security Situation Analysis Model of Intelligent Electric Grid based on Large Data

Author(s):  
Ying Yang ◽  
Huiping Meng ◽  
Fangfang Dang ◽  
Lijing Yan
2019 ◽  
Vol 30 (3) ◽  
pp. 18-37
Author(s):  
Tawei Wang ◽  
Yen-Yao Wang ◽  
Ju-Chun Yen

This article investigates the transfer of information security breach information between breached firms and their peers. Using a large data set of information security incidents from 2003 to 2013, the results suggest that 1) the effect of information security breach information transfer exists between breached firms and non-breached firms that offer similar products and 2) the effect of information transfer is weaker when the information security breach is due to internal faults or is related to the loss of personally identifiable information. Additional tests demonstrate that the effect of information transfer exhibits consistent patterns across time and with different types of information security breaches. Finally, the effect does not depend on whether the firms are IT intensive. Implications, limitations, and future research are discussed.


2003 ◽  
Vol 47 ◽  
pp. 199-204
Author(s):  
Takuma HADANO ◽  
Yasuyuki TAKAGI ◽  
Noriyuki NAKASHIMA ◽  
Shigeru NAKAMURA ◽  
Srikantha HERATH

Author(s):  
Lin Li ◽  
Kai Zhang ◽  
Tao Li

There are many defects with the existing performance analysis system for the training and education (T&E) of information security talents in Chinese colleges, ranging from the difficulty in transforming fuzzy information to the lack of objectivity. To overcome these defects, this paper develops an improved performance analysis model for the T&E of information security talents. Firstly, the existing analysis strategies for the T&E performance of information security talents were fully analyzed, and a performance analysis indicator system was established through the analysis. Based on the established indicator system, the gray classification and fuzzy information transformation were discussed for the performance analysis. On this basis, a grey clustering model for the T&E of information security talents was constructed, and the realization of the corresponding algorithm was explained in details. The proposed model was proved feasible and effective through case analysis. In addition to theoretical innovation, our model also has a great potential in engineering, because the solving algorithm can effectively process fuzzy information with only a small sample set.


Author(s):  
Kamil Yağcı ◽  
Süreyya Akçay ◽  
Mahmut Efendi ◽  
Hande Mutlu Öztürk

With the increase in information technology use, problems related to the security of these technologies have become significant. Businesses are required to acquire information, use information technologies, and rely on the information they collected to continue their presence. The requirement of information technology use and related security problems cannot be ignored by both individuals and businesses. One of the industries with large data pools is the tourism industry. Thus, the protection of personal or corporate information is a process that should be managed especially for businesses. In order for this management process to be successful, it is necessary for the corporations to have security policies that are supported by the senior management, possible to implement and understand, and accepted at all corporate levels. Thus, the present study aimed to explain the significance of information security, especially the security of the information in the tourism industry, which is as an important part of the service industry.


Author(s):  
Tawei Wang ◽  
Yen-Yao Wang ◽  
Ju-Chun Yen

This article investigates the transfer of information security breach information between breached firms and their peers. Using a large data set of information security incidents from 2003 to 2013, the results suggest that 1) the effect of information security breach information transfer exists between breached firms and non-breached firms that offer similar products and 2) the effect of information transfer is weaker when the information security breach is due to internal faults or is related to the loss of personally identifiable information. Additional tests demonstrate that the effect of information transfer exhibits consistent patterns across time and with different types of information security breaches. Finally, the effect does not depend on whether the firms are IT intensive. Implications, limitations, and future research are discussed.


2015 ◽  
Vol 29 (13) ◽  
pp. 1550061 ◽  
Author(s):  
Ke Li ◽  
Hui-Jia Li ◽  
Hao Wang

Since the existence of certain and uncertain characteristics of the relationships between nodes in social network, the study of social features is expanded by combining the set pair analysis and social computing. In this paper, a new method is created to describe nodes relationship situation in social network, i.e. set pair relationship situation, including generalized set pair relationship situation, generalized set pair close situation and generalized set pair loosen situation. In order to analyze the situation in social network, each kind of set pair relation situation are classified. Combining with the complexity of the social network system and the features of connection entropy, generalized connection entropy which used to express the complexity of social networks is proposed. It includes the generalized same entropy, the generalized difference entropy, and the generalized opposite entropy. These different types of entropies can be used to analyze the social network relationship stability from a more theoretical view. Then a situation analysis model and the corresponding algorithm is proposed. Finally the effectiveness of this method in analyzing the relationships in social networks is proved. Thus, our model can be used to reveal the relationship between social network and node state stability efficiently.


Sign in / Sign up

Export Citation Format

Share Document