Level of Information

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 1776219 Experts worldwide ranked by ideXlab platform

Simon Laflamme - One of the best experts on this subject based on the ideXlab platform.

  • optimal sensor placement within a hybrid dense sensor network using an adaptive genetic algorithm with learning gene pool
    Structural Health Monitoring-an International Journal, 2018
    Co-Authors: Austin Downey, Chao Hu, Simon Laflamme
    Abstract:

    This work develops optimal sensor placement within a hybrid dense sensor network used in the construction of accurate strain maps for large-scale structural components. Realization of accurate strain maps is imperative for improved strain-based fault diagnosis and prognosis health management in large-scale structures. Here, an objective function specifically formulated to reduce type I and II errors and an adaptive mutation-based genetic algorithm for the placement of sensors within the hybrid dense sensor network are introduced. The objective function is based on the linear combination method and validates sensor placement while increasing Information entropy. Optimal sensor placement is achieved through a genetic algorithm that leverages the concept that not all potential sensor locations contain the same Level of Information. The Level of Information in a potential sensor location is taught to subsequent generations through updating the algorithm’s gene pool. The objective function and genetic algorith...

Laila Dahabiyeh - One of the best experts on this subject based on the ideXlab platform.

  • College students Information security awareness: a comparison between smartphones and computers
    Education and Information Technologies, 2020
    Co-Authors: Nashrawan Taha, Laila Dahabiyeh
    Abstract:

    The rapid technological developments associated with the decrease in the cost of smartphones made the latter more accessible and convenient to be used. In an educational setting, students are increasingly bringing their smartphones to classrooms, this could have serious security implications, particularly when students are less aware of smartphone Information security threats. This paper is set out to provide an empirical comparison in the Level of Information security awareness among college students in terms of knowledge and behavior. The main aim is to find the difference between students’ awareness Level of Information security using smartphones vs. computers. A descriptive research design was adopted and an online survey method was employed. Research findings showed that students were highly aware of some Information security concepts, however, they behaved differently in protecting their smartphones compared to computers. Training campaigns are suggested to be conducted aiming to educate students with possible Information security risks related to smartphone usage in educational settings.

William Lucyshyn - One of the best experts on this subject based on the ideXlab platform.

  • sharing Information on computer systems security an economic analysis
    Journal of Accounting and Public Policy, 2003
    Co-Authors: Lawrence A Gordon, Martin P Loeb, William Lucyshyn
    Abstract:

    Abstract The US federal government has fostered a movement toward sharing Information concerning computer security, with particular emphasis on protecting critical infrastructure assets that are largely owned by the private sector. As Information security is paramount to accurate financial reporting and the provision of timely and relevant managerial accounting reports for decision-making, the issue of sharing Information on computer systems security has direct relevance to accounting, as well as to public policy. This paper presents a model to examine the welfare economic implications of this movement. In the absence of Information sharing, each firm independently sets its Information security expenditures at a Level where the marginal benefits equal the marginal costs. It is shown that when Information is shared, each firm reduces the amount spent on Information security activities. Nevertheless, Information sharing can lead to an increased Level of Information security. The paper provides necessary and sufficient conditions for Information sharing to lead to an increased (decreased) Level of Information security. The Level of Information security that would be optimal for a firm in the absence of Information sharing can be attained by the firm at a lesser cost when computer security Information is shared. Hence, sharing provides benefits to each firm and total welfare also increases. However, in the absence of appropriate incentive mechanisms, each firm will attempt to free ride on the security expenditures of other firms (i.e., renege from the sharing agreement and refuse to share Information). This latter situation results in the underinvestment of Information security. Thus, appropriate incentive mechanisms are necessary for increases in both firm-Level profits and social welfare to be realized from Information sharing arrangements.

Austin Downey - One of the best experts on this subject based on the ideXlab platform.

  • optimal sensor placement within a hybrid dense sensor network using an adaptive genetic algorithm with learning gene pool
    Structural Health Monitoring-an International Journal, 2018
    Co-Authors: Austin Downey, Chao Hu, Simon Laflamme
    Abstract:

    This work develops optimal sensor placement within a hybrid dense sensor network used in the construction of accurate strain maps for large-scale structural components. Realization of accurate strain maps is imperative for improved strain-based fault diagnosis and prognosis health management in large-scale structures. Here, an objective function specifically formulated to reduce type I and II errors and an adaptive mutation-based genetic algorithm for the placement of sensors within the hybrid dense sensor network are introduced. The objective function is based on the linear combination method and validates sensor placement while increasing Information entropy. Optimal sensor placement is achieved through a genetic algorithm that leverages the concept that not all potential sensor locations contain the same Level of Information. The Level of Information in a potential sensor location is taught to subsequent generations through updating the algorithm’s gene pool. The objective function and genetic algorith...

Jan H P Eloff - One of the best experts on this subject based on the ideXlab platform.

  • An Information Security Governance Framework
    Information Systems Management, 2007
    Co-Authors: A. Da Veiga, Jan H P Eloff
    Abstract:

    Information security culture develops in an organization due to certain actions taken by the organization. Management implements Information security components, such as policies and technical security measures with which employees interact and that they include in their working procedures. Employees develop certain perceptions and exhibit behavior, such as the reporting of security incidents or sharing of passwords, which could either contribute or be a threat to the securing of Information assets. To inculcate an acceptable Level of Information security culture, the organization must govern Information security effectively by implementing all the required Information security components. This article evaluates four approaches towards Information security governance frameworks in order to arrive at a complete list of Information security components. The Information security components are used to compile a new comprehensive Information security Governance framework. The proposed governance framework can be used by organizations to ensure they are governing Information security from a holistic perspective, thereby minimising risk and cultivating an acceptable Level of Information security culture. [PUBLICATION ABSTRACT]