The increasing threat of ransomware attacks in an interconnected and digital world presents important hurdles for cybersecurity, prompting further examination into how organizational security culture affects their abi...
The increasing threat of ransomware attacks in an interconnected and digital world presents important hurdles for cybersecurity, prompting further examination into how organizational security culture affects their ability to withstand these malicious threats. This study examines the impact and importance of organizational security culture in ransomware threat mitigation. We have surveyed five organizations, giving points from 1 to 5 for each question on cultural factors, leadership support, employee awareness and involvement (compliance), communication, behavior change or BBS practice incorporation, learning/training delivery methodology, and Size and industry impact on their security culture. The results indicate that a robust security culture, with leadership and effective communication, builds stronger resilience to ransomware. Organizations with jointly accountable cybersecurity and training practices are highly efficient. Suggestions range from establishing a secure environment to increasing management buy-in and integrating compliance. This work helps advance our understanding of ransomware resilience and highlights the key role of organizational security culture. The resulting learnings can help to inform organizations' security posture, ultimately helping them better protect their defenses against ransomware threats.
Several studies suggest that sleep quality is associated with physical activities. Moreover, deep sleep time can be used to determine the sleep quality of an individual. In this work, we aim to find the association be...
详细信息
The measurement of information security risk in a public sector organization is of utmost importance. This measurement serves the purpose of taking appropriate actions in response to potential risks or damaging incide...
The measurement of information security risk in a public sector organization is of utmost importance. This measurement serves the purpose of taking appropriate actions in response to potential risks or damaging incidents. The objective of this study is to develop a straightforward yet smart decision model capable of evaluating risks, particularly within the public sector organization. The decision support modelling (DSM) concept is employed as a framework to construct a computer model that supports decision-making in a specific case. The study comprises five stages, which are integral parts of the DSM process. These stages include analyzing the case, examining relevant documents, designing the model, constructing the model, and evaluating the finalized model. The object-oriented method serves as a fundamental approach to model design. Additionally, the fuzzy logic method, an intelligent computational technique, plays a central role in the development of this decision model. The proposed model demonstrates an average error value of 0.05 when compared to the actual risk measurement conducted. Furthermore, it reveals average risk values of 0.59 and 0.45 for the pre- and post-remediation scenarios, respectively.
Containerization has become a popular approach in application development in applications development and deployment, many benefits we can get such as improved scalability, portability, and resource efficiency. Contai...
Containerization has become a popular approach in application development in applications development and deployment, many benefits we can get such as improved scalability, portability, and resource efficiency. Container-based applications, utilizing technologies like Docker and Kubernetes, have transformed the packaging, deployment, and management of software from the desktop environment to the cloud platform. In this context, software metrics approach plays a good role in evaluating the characteristics and performance of container-based applications, ensuring that developers and operators are on the same page. This article explores the importance of software metrics in optimizing the software lifecycle of container-based applications, addressing the unique challenges they present, and highlighting the potential benefits of leveraging metrics to improve performance and efficiency. Our finding Performance Metrics and Availability Metrics is the most metrics that the most measure by applications owner, relevant studies and industry practices, this study aims to provide insights and recommendations to effectively measure and optimize region-based software systems.
Hate speech is any act of provoking or insulting another person or group based on their ethnicity, religion, race, gender, sexual orientation, physical ability, or other characteristics. This can be done in a variety ...
详细信息
Sentiment analysis is widely used as a tool to find valuable insight from texts without explicitly expressed. Lots of techniques have already been used to get it but there still have shortcomings in data source or the...
详细信息
This study proposes a smart contract risk management model built on the NIST Risk Management Framework (RMF) to help identify, assess, and manage the risks of smart contracts. While smart contracts are beloved as a me...
This study proposes a smart contract risk management model built on the NIST Risk Management Framework (RMF) to help identify, assess, and manage the risks of smart contracts. While smart contracts are beloved as a means to automate and disintermediate business processes, their security vulnerabilities can be critical. The main issue discussed in this paper is the lack of a holistic approach to risk management smart contracts. The resulting framework consists of six steps: Risk identification, assessment, prioritization, mitigation, testing, and continuous monitoring (and was developed through reviewing existing literature on smart contract security and the NIST RMF). It is recommended that a case study be performed to prove the proposed model's effectiveness in managing the risks of smart contracts and minimizing financial losses and reputational harm. The paper presents a risk management framework for smart contracts to increase trust and adoption to enhance security while reducing financial losses and reputation damage. This has wider implications for the security of smart contracts and can be used as a starting point for future work. This study is expected to significantly contribute to smart contract security by introducing an organized way to address these contracts' risks using the NIST RMF.
Addressing multiple criteria and parameter issues in computer modelling presents a significant challenge. Several factors including data types, parameter behaviours, and purposes, must be taken into account to enhance...
Addressing multiple criteria and parameter issues in computer modelling presents a significant challenge. Several factors including data types, parameter behaviours, and purposes, must be taken into account to enhance computer modelling capability; particularly in evaluation cases. Through the utilization of a multi-criteria and method approach, a decision model was effectively developed to assess a case of environmental sustainability level of a building. One method operated in the study is the curve method for handling membership function form in realizing fuzzy logic. This innovative model demonstrates superior performance. It achieves an impressive accuracy rate of 96%, surpassing the previous model that employed a trapezoidal approach to describe fuzzy membership functions hy 1%.
Detecting fake news in the digital era is challenging due to the proliferation of misinformation. One of the crucial is-sues in this domain is the inherent class imbalance, where genuine news articles significantly ou...
Detecting fake news in the digital era is challenging due to the proliferation of misinformation. One of the crucial is-sues in this domain is the inherent class imbalance, where genuine news articles significantly outnumber fake ones. This imbalance severely hampers the performance of machine and deep learning models in accurately identifying fake news. Consequently, there is a compelling need to address this problem effectively. In this study, we delve into fake news detection and tackle the critical issue of imbalanced data. We investigate the application of Easy Data Augmentation (EDA) techniques, including back-translation, random insertion, random deletion, and random swap to mitigate the adverse effects of imbalanced data. This study focuses on employing these techniques in conjunction with a deep learning framework, specifically a Bidirectional Long Short-Term Memory (BiLSTM) architecture. The results of the EDA techniques will be systematically compared to see their effectiveness and their impacts on model performance. This study reveals that various EDA techniques, when coupled with a BiLSTM architecture, yield significant improvements in fake news detection. Among the experiments, it shows that Random Insertion, with an impressive accuracy rate of 81.68%, a precision score of 89.38%, and an F1-Score of 87.77% emerges as the most promising technique. The study also highlights the exceptional potential of Back-translation stands out with an 87.16% recall performance.
Opening or closing dam-gate activities manually conducted in Manggarai dam to control the dam water level. The controlling action operated to avoid the flood possibility occurring in Jakarta city (the Indonesian capit...
Opening or closing dam-gate activities manually conducted in Manggarai dam to control the dam water level. The controlling action operated to avoid the flood possibility occurring in Jakarta city (the Indonesian capital). The study was conducted to develop a smart model for flood controlling based on service or called a service-oriented smart model (SOSM). The water-flow algorithm (WFA), fuzzy logic, object and service-oriented are four main methods operated in the study. The WFA is a central method to model the real water flow in the river coming from Katulampa dam (in Bogor city) until Manggarai dam (in Jakarta). The fuzzy logic functioned to simulate the dam’s water level and the gate open/close decision should be decided by avoiding the bias value. The object-oriented model analysis and design approach, where the unified modelling language (UML) tools are operated to analyze and design the constructed model. Then, the service-oriented conception is used to integrate all sides in implementing the model. Finally, the constructed model can simulate the flood status in Jakarta via status value in decimal numbers with 6 numbers behind the point.
暂无评论