scholarly journals Human Sensor Web Crowd Sourcing Security Incidents Management in Tanzania Context

2018 ◽  
Vol 09 (03) ◽  
pp. 191-208 ◽  
Author(s):  
Maduhu Mshangi ◽  
Edephonce Ngemera Nfuka ◽  
Camilius Sanga
2020 ◽  
Vol 5 ◽  
pp. 119-124
Author(s):  
A.P. Pronichev ◽  
A. A. Chechulin ◽  
L.A. Vitkova

The paper describes an approach to management of heterogeneous swarm of cyber-physical devices. This approach includes 3 functional levels: the aggregation level, the peripheral level and the data collection level. Variants of using this approach are considered: a crisis management network, a robotic complex for monitoring premises and a system for detecting security incidents in premises.


2016 ◽  
Vol 2 (1) ◽  
Author(s):  
Devi Premnath ◽  
Dr. C. Nateson

“Crowd sourcing” is a brand new concept which has started to make wave in the field of management'. It refers to the process of outsourcing of activities to an online community or crowd in the form of an open call. Any member of the crowd can complete the assignment who will then be paid for his efforts. This phenomenon is increasingly noticed in the field of advertising where companies have started generating ideas and strategies of advertisement from crowd, for a better realistic approach. The process is speedy and is less expensive in terms of time and money. This paper is an attempt to put light on the various nuances of “crowd sourcing”, the methodologies involved and its impacts related to competitive segment of business. The success mantra of crowd sourcing is the power of crowd that drives the future of management.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 57036-57048 ◽  
Author(s):  
Xinxin Wang ◽  
Danyang Qin ◽  
Ruolin Guo ◽  
Min Zhao ◽  
Lin Ma ◽  
...  

Author(s):  
Randy S. Tolentino ◽  
Kijeong Lee ◽  
Yoon-Su Jeong ◽  
Yong-Tae Kim ◽  
Sang-Ho Lee ◽  
...  
Keyword(s):  

2019 ◽  
Vol 11 (7) ◽  
pp. 162 ◽  
Author(s):  
Nikolaos Serketzis ◽  
Vasilios Katos ◽  
Christos Ilioudis ◽  
Dimitrios Baltatzis ◽  
Georgios Pangalos

The complication of information technology and the proliferation of heterogeneous security devices that produce increased volumes of data coupled with the ever-changing threat landscape challenges have an adverse impact on the efficiency of information security controls and digital forensics, as well as incident response approaches. Cyber Threat Intelligence (CTI)and forensic preparedness are the two parts of the so-called managed security services that defendants can employ to repel, mitigate or investigate security incidents. Despite their success, there is no known effort that has combined these two approaches to enhance Digital Forensic Readiness (DFR) and thus decrease the time and cost of incident response and investigation. This paper builds upon and extends a DFR model that utilises actionable CTI to improve the maturity levels of DFR. The effectiveness and applicability of this model are evaluated through a series of experiments that employ malware-related network data simulating real-world attack scenarios. To this extent, the model manages to identify the root causes of information security incidents with high accuracy (90.73%), precision (96.17%) and recall (93.61%), while managing to decrease significantly the volume of data digital forensic investigators need to examine. The contribution of this paper is twofold. First, it indicates that CTI can be employed by digital forensics processes. Second, it demonstrates and evaluates an efficient mechanism that enhances operational DFR.


Author(s):  
Surya S. Durbha ◽  
Roger L. King ◽  
Santhosh K. Amanchi ◽  
Shruthi Bheemireddy ◽  
Nicolas H. Younan
Keyword(s):  

Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 378
Author(s):  
Alberto Partida ◽  
Regino Criado ◽  
Miguel Romance

Some Internet of Things (IoT) platforms use blockchain to transport data. The value proposition of IoT is the connection to the Internet of a myriad of devices that provide and exchange data to improve people’s lives and add value to industries. The blockchain technology transfers data and value in an immutable and decentralised fashion. Security, composed of both non-intentional and intentional risk management, is a fundamental design requirement for both IoT and blockchain. We study how blockchain answers some of the IoT security requirements with a focus on intentional risk. The review of a sample of security incidents impacting public blockchains confirm that identity and access management (IAM) is a key security requirement to build resilience against intentional risk. This fact is also applicable to IoT solutions built on a blockchain. We compare the two IoT platforms based on public permissionless distributed ledgers with the highest market capitalisation: IOTA, run on an alternative to a blockchain, which is a directed acyclic graph (DAG); and IoTeX, its contender, built on a blockchain. Our objective is to discover how we can create IAM resilience against intentional risk in these IoT platforms. For that, we turn to complex network theory: a tool to describe and compare systems with many participants. We conclude that IoTeX and possibly IOTA transaction networks are scale-free. As both platforms are vulnerable to attacks, they require resilience against intentional risk. In the case of IoTeX, DIoTA provides a resilient IAM solution. Furthermore, we suggest that resilience against intentional risk requires an IAM concept that transcends a single blockchain. Only with the interplay of edge and global ledgers can we obtain data integrity in a multi-vendor and multi-purpose IoT network.


2013 ◽  
Vol 95 (890) ◽  
pp. 287-307 ◽  
Author(s):  
Sorcha O'Callaghan ◽  
Leslie Leach

AbstractMany aid agencies and commentators suggest that humanitarian principles are of little value to the humanitarian crises of today. However, through profiling the experience of the Lebanese Red Cross, this article highlights the enduring value and impact of the application of the International Red Cross and Red Crescent Fundamental Principles as effective operational tools for acceptance, access and safety. Having suffered a series of security incidents during the civil war and subsequent disturbances and tensions, this National Society deliberately sought to increase its acceptance amongst different groups. One of the approaches used was the systematic operational application of the Fundamental Principles. Today, the Lebanese Red Cross is the only public service and Lebanese humanitarian actor with access throughout the country. This article seeks to address the relative absence of attention to how humanitarian organisations apply humanitarian principles in practice – and their responsibility and accountability to do so – by describing the systematic approach of the Lebanese Red Cross.


Sign in / Sign up

Export Citation Format

Share Document