...------------------------------------------------- Introduction The research topic in this paper is a security management plan thesis. The paper concentrates on the security management plan of the VANFEST event. This is an event that will gather together a diversity of Australia’s best local personalities, performers and VIPs. It is the first occasion of its kind in Forbes and it is expected that a projected multitude of up to and maybe between 5,000 and 10,000 persons will be in presence, with an all-out Capacity of 15,000. The VANFEST occurrence will be carried out on Saturday the 6th December 2014 from 1:40pm to 12:30am (Twelve midnight) inside the Protected Boundary Area at Forbes Showground. The entire happening has been categorized as a Low Risk Event because of the target spectators and kind of the entertainment. The Police and the security personnel are to handle each happening on its virtues. However, any anti-social conduct should be clogged instantly and unwelcome patrons expelled from the event and the adjacent areas. Will the security personnel and the police handle the any anti-social conduct in the field? Is there enough police and security to patrons’ ratio in the field? The research proposal will use several inductive research methods to give answer to the questions. Some of the methods used are quantitative analysis, carrying out survey, interviews, and developing of hypothesis. Through the use of this methodological approach, a good security plan will be achieved at the end of this...
Words: 2339 - Pages: 10
...INDIA, CHINA AND AMERICA INSTITUTE 1549 CLAIRMONT ROAD, SUITE 202 ● DECATUR, GA 30033 USA WWW.ICAINSTITUTE.ORG An Exploration of Human Resource Management Information Systems Security Humayun Zafar, Jan G. Clark & Myung S. Ko Journal of Emerging Knowledge on Emerging Markets Volume 3 November 2011 1 Zafar et al.: An Exploration of Human Resource Management Information Systems S Produced by The Berkeley Electronic Press, 2011 2011 JOURNAL OF EMERGING KNOWLEDGE ON EMERGING MARKETS ● WWW.ICAINSTITUTE.ORG PAGE 489 An Exploration of Human Resource Management Information Systems Security Humayun Zafar Kennesaw State University Jan G. Clark The University of Texas at San Antonio Myung S. Ko The University of Texas at San Antonio Journal of Emerging Knowledge on Emerging Markets Volume 3 November 2011 uman resource (HR) information systems are employed extensively by modern day firms. They are designed to support the HR functions such as attracting job applicants (Stone, Lukaszewski, & Isenhour, 2005) automating training and development, managing employee performance, and administering benefits systems (Burkhard, Schooley, Dawson, & Horan, 2010; Strohmeier, 2007). HR information systems can help meet employee needs, streamline operating procedures, reduce operating expenses, and also increase information accuracy and accessibility. They also aid in improving the professional standing of HR professionals in the organization (Hussain, H 2 ...
Words: 8453 - Pages: 34
...Research Skills Name Institution Table of Contents 1. Research Proposal 3 1.1. Rationale and Context 3 1.2. Aims 4 1.3. Research Question 5 1.4. Proposed Research Method 5 1.5. Ethical and Access Issues 6 1.6. Potential Value of Research 7 2. Initial Literature Review 8 References 14 Research Skills 1. Research Proposal 2.1. Rationale and Context Cambridge City Government is an institution that is currently facing problems with the management of its information transfer over the internet. This is seen in the need to align data, particularly revenue streams, incomes and expenditures. In fact, the situation is worsened by an increasing city population, as well as amenities complexities that are placing a strain on the available internet facilities that serve the institution. As such, the proposed research study intends to analyse the role that cloud computing could play in solving the information transfer problems that face the government. The research results will act as the blueprint for the city administrators to develop and implement networking management approaches that will address its needs. I assume that if cloud computing is determined to be advantageous for the government, then its implementation will make it easier for the institution to meet its information management needs. This proposal describes the approach to research that will be adopted for the proposed study. Kenrick et al. (2010, pp. 293-294) argue that the cognitively driven constructs...
Words: 3423 - Pages: 14
...internet has become an important aspect through which education institutions use to carry out research, communicate and innovate. Even through this evolution has brought many benefits but also it has also brought serious threats such as cyber-attacks that has been demonstrated over the past few years through acts of cyber espionage and cyber-crime through the virtual space. In this context, the University of Dar es Salaam needs to develop policies towards cyber threats even through this has often be clustered and fragmented. Using theoretical and conceptual models this paper provides an informed understanding and critical assessment of the University of Dar es Salaam cyber security policy through addressing the following research questions: What are the IT risk management policy and systems that can be developed for the University of Dar es salaam? The primary data is collected through surveys, and interviews that are open ended and close ended. The results of the paper demonstrated that colleges and universities have been a target for cyber-attacks due to the fact that of the vast amount of computing power they possess, and they provide open access to their constituents and to the public. The research also showed that University of Dar es Salaam doesn’t have a comprehensive IT security risk management policy or guidelines that will guide the business process in the event of an IT security threat. Therefore the University needs to develop policiesthat provide roadmap for effectively...
Words: 7435 - Pages: 30
...long time, university-managements have put much investment in IT security appliances towards improving system security, (Bichanga & Obara, (2014). Despite continued investment in IT security, there is increased frequency at which security of university information systems are getting breached thus compromising productivity and security of information systems that support teaching, learning, administrative and research activities, (Vacca, 2012). Research studies indicate that to ensure better IT security management, a reliable way of determining security status need to be considered besides heavy investment in security appliances, (Mong'ira, 2011). This is supported by Broadbent (2007),...
Words: 962 - Pages: 4
...Human Resource Management Review 23 (2013) 105–113 Contents lists available at SciVerse ScienceDirect Human Resource Management Review journal homepage: www.elsevier.com/locate/humres Human resource information systems: Information security concerns for organizations Humayun Zafar ⁎ Department of Information Systems, Kennesaw State University, 1000 Chastain Road, MD 1101, Kennesaw, GA 30144, United States. a r t i c l e i n f o Keywords: Human resource information system Information security Information privacy Security policies Security legislation Security architecture Security training Risk analysis a b s t r a c t We explore HRIS and e-HR security by presenting information security fundamentals and how they pertain to organizations. With increasing use of enterprise systems such as HRIS and e-HR, security of such systems is an area that is worthy of further exploration. Even then, there is surprisingly little research in this area, albeit that extensive work is present in regard to HRIS privacy. While focusing on HRIS and e-HR security, we introduce aspects of HRIS and e-HR security and how it can be enhanced in organizations. A research model is also presented along with propositions that can guide future research. © 2012 Elsevier Inc. All rights reserved. 1. Introduction A human resource information system (HRIS) is an integrated computerized system used to acquire, store, manipulate, analyze, retrieve, and distribute pertinent...
Words: 7376 - Pages: 30
...Homeland Security Research Design Chris Hix HSM421: Research & Analysis in Homeland Security Professor: Kenneth Jenkins March 7, 2016 Homeland Security Research Design The United States has invested heavily in maintaining cyber security and border security in the homeland. Federal, State, and Local level initiatives have been implemented to escalate enforcement undertakings in communities across the country. These efforts are geared towards thwarting illegal border crossings and unlawful presence and occur in tandem with workplace enforcement to prevent illegal employment. However, these measures are not level with the excessive’ focus on terrorist threats displayed by agencies tasked with ensuring homeland security. The system is correctly focused on the terrorist threat posed by radical groups that are miles away while exhibiting complacency to more immediate threats. For instance, hackings, illegal immigration, human, and substance trafficking do more damage in a year than the combined damage of all terrorist activities to ever occur on American soil. Consequently, if the system is to achieve its mandate of ensuring Homeland Security, its main focus should be on immediate threats, of which cyber and border security are of most concern. The continued focus on terrorism as the central threat to homeland security necessitates an examination of the key factors that influence decision-making regarding homeland security. Hypotheses Getting the priorities right...
Words: 2565 - Pages: 11
...See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/263893131 TruSMS: A trustworthy SMS spam control system based on trust management Article in Future Generation Computer Systems · July 2014 Impact Factor: 2.79 · DOI: 10.1016/j.future.2014.06.010 CITATIONS READS 4 2,022 4 authors, including: Zheng Yan Raimo Kantola Xidian University Aalto University 88 PUBLICATIONS 588 CITATIONS 91 PUBLICATIONS 298 CITATIONS SEE PROFILE All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. SEE PROFILE Available from: Zheng Yan Retrieved on: 12 April 2016 This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and sharing with colleagues. Other uses, including reproduction and distribution, or selling or licensing copies, or posting to personal, institutional or third party websites are prohibited. In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier’s archiving and manuscript policies are encouraged to visit: http://www.elsevier.com/authorsrights Author's personal copy ...
Words: 18072 - Pages: 73
...Effective Information Security Requires a Balance of Social and Technology Factors EffEctivE information SEcurity rEquirES MIS Uarterly a BalancE of Social and tEchnology xecutive factorS1,2 Q E Tim Kayworth Baylor University (U.S.) Dwayne Whitten Texas A&M University (U.S.) Executive Summary 2 Industry experts have called for organizations to be more strategic in their approach to information security, yet it has not been clear what such an approach looks like in practice or how firms actually achieve this. To address this issue, we interviewed 21 information security executives from 11 organizations. Our results suggest that a strategically focused information security strategy encompasses not only IT products and solutions but also organizational integration and social alignment mechanisms. Together, these form a framework for a socio-technical approach to information security that achieves three objectives: balancing the need to secure information assets against the need to enable the business, maintaining compliance, and ensuring cultural fit. The article describes these objectives and the security alignment mechanisms needed to achieve them and concludes with guidelines that can be applied to ensure effective information security management in different organizational settings. INFORMATION SECURITY HAS BECOME A STRATEGIC ISSUE Information security continues to be a major concern among corporate executives. The threat of terrorism,...
Words: 7959 - Pages: 32
...systems risk management strategies through cultural theory Aggeliki Tsohou, Maria Karyda and Spyros Kokolakis Department of Information and Communication Systems Engineering, University of the Aegean, Samos, Greece 198 Evangelos Kiountouzis Department of Informatics, Athens University of Economics and Business, Athens, Greece Abstract Purpose – The purpose of this paper is to examine the potential of cultural theory as a tool for identifying patterns in the stakeholders’ perception of risk and its effect on information system (IS) risk management. Design/methodology/approach – Risk management involves a number of human activities which are based on the way the various stakeholders perceive risk associated with IS assets. Cultural theory claims that risk perception within social groups and structures is predictable according to group and individual worldviews; therefore this paper examines the implications of cultural theory on IS risk management as a means for security experts to manage stakeholders perceptions. Findings – A basic theoretical element of cultural theory is the grid/group typology, where four cultural groups with differentiating worldviews are identified. This paper presents how these worldviews affect the process of IS risk management and suggests key issues to be considered in developing strategies of risk management according to the different perceptions cultural groups have. Research limitations/implications – The findings of this research are based on...
Words: 9716 - Pages: 39
...SECR 6000 Research Study – Time to update the DoD Personnel Security regulation Submitted by R. Allen Green Prepared for Dr. Beth Vivaldi SECR 6000 Security Management Fall II, 2012 Webster University December 12, 2012 CERTIFICATE OF AUTHORSHIP: I certify that I am the author. I have cited all sources from which I used data, ideas, or words, either quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for this course. TABLE OF CONTENTS Cover Page……...…………………………………………………………………………………1 Table of Contents…………....…………………………………………………………………….2 Definitions and Terms…………………………………………………………………………......4 Chapter 1 – Introduction…………………………………………………………….…………….6 Background………………………………………………………………………………..6 Statement of the Problem………………………………………………………………….8 Purpose of the Study…………………………………………………………………..…10 Research Question(s)………………………………………………………………...…..10 Chapter 2 – Literature Review………………………………………………………………...…11 Legal and Ethical Issues in Security……………………………………………………..11 Security Administration and Management………………………………………………14 Business Asset Protection………………………………………………………………..16 Emergency Planning………………………………………………………………......…17 Information System Security……………………………………………………….……18 Behavior Issues……………………………………………………………………..……20 Chapter 3 – Methodology…………...………………………………………………………..….23 Research Design………………………………………………………………………….23 Data collection…………………………………………………………………...25 Data Analysis……………………………………………………………………...
Words: 7232 - Pages: 29
...Shareholders are the owners of a corporation. The goal of a corporation is to maximise shareholders wealth, which sounds reasonable, since the owners (shareholders) want their company to be profitable. This goal was not an issue when the owners of the corporation were also the managers. However in the present day, corporate ownership has become increasingly diffused and while the shareholders may own the corporation, they do not run it. Rather a board of directors are elected who then appoint managers to oversee the day to day running of the company. This is called a separation of ownership and management and represents one distinctive feature of a corporation. In theory most financial managers would agree with the goal of maximising wealth for the owners of the corporation. In practice however, it could be suggested that managers are also concerned with their personal wealth, job security, lifestyle and other benefits such as golf club memberships, company vehicles and impressive offices all provided at company expense. Such concerns may make managers reluctant or unwilling to make decisions that while it may increase the owner’s wealth, may result in the loss of their job and damage to their personal wealth. This compromise between management’s personal goals and owner maximisation produces a less-than maximum return and could mean potential loss of wealth for owners. Such a phenomenon commonly referred to as the agency problem is prevalent in modern day corporations. Jensen...
Words: 3062 - Pages: 13
...Advanced research | Tenable Nessus Security Center | Executive Proposal | | James Ellis | 2/21/2015 | [ The following proposal will outline an effective solution for Advanced Research to incorporate in their security audits and assessments. ] | Executive Summary Security testing software is a very important entity for many organizations as it provides security to a company’s network by identifying and testing vulnerabilities before potential hackers can exploit them. Advanced Research has been the victim of cybercriminal efforts to take intellectual assets and sell it to their competitors. It is assumed that our network of corporate documents has been infiltrated by illegal sources more than once. The amount of malware being released to the Internet and infiltrating corporate networks is escalating at an alarming, exponential pace that is doubling every year, (Kaspersky, 2014). Even more disconcerting is that in spite of software vendors efforts to provide patches for vulnerabilities in an expeditious manner as they are discovered, the number of vulnerabilities discovered on existing systems has also increased exponentially, (Kaspersky, 2014). In addition, over 41% of all computers connected to a network were attacked at least once, and this number does not account for the number of attacks to Android mobile devices for which over 98% of all malware is designed to attack, (Kaspersky, 2014). The following is a plan for implementation and purchase of the Tenable...
Words: 1577 - Pages: 7
...PORTFOLIO MANAGEMENT Meaning of portfolio:- A combination of securities with different risk & return characteristics will constitute the portfolio of the investor. Thus, a portfolio is the combination of various assets and/or instruments of investments. The combination may have different features of risk & return, separate from those of the components. The portfolio is also built up out of the wealth or income of the investor over a period of time, with a view to suit his risk and return preference to that of the portfolio that he holds. An investor considering investments in securities is faced with the problem of choosing from among a large number of securities. His choice depends upon the risk and return characteristics of individual securities. He would attempt to choose the most desirable securities and like to allocate is funds over this group of securities. Again he is faced with the problem of deciding which securities to hold and how much to invest in each. The investor faces an infinite number of possible portfolios or groups of securities. The risk and return characteristics of portfolio differ from those of individual securities combining to form a portfolio. The investor tries to choose the optimal portfolio taking in to consideration the risk return characteristics of all possible portfolios. As the economy and the financial environment keep changing the risk return characteristics of individual securities as well as portfolios also change. This calls...
Words: 3303 - Pages: 14
...Dublin Institute of Technology ARROW@DIT Dissertations School of Computing 2010-09-01 Cloud Computing:Strategies for Cloud Computing Adoption Faith Shimba Dublin Institute of Technology, faith.shimba@gmail.com Recommended Citation Shimba, F.:Cloud Computing:Strategies for Cloud Computing Adoption. Masters Dissertation. Dublin, Dublin Institute of Technology, 2010. This Dissertation is brought to you for free and open access by the School of Computing at ARROW@DIT. It has been accepted for inclusion in Dissertations by an authorized administrator of ARROW@DIT. For more information, please contact yvonne.desmond@dit.ie, arrow.admin@dit.ie. This work is licensed under a Creative Commons AttributionNoncommercial-Share Alike 3.0 License School of Computing Dissertations Dublin Institute of Technology Year Cloud Computing:Strategies for Cloud Computing Adoption Faith Shimba Mr. Dublin Institute of Technology, faith.shimba@student.dit.ie This paper is posted at ARROW@DIT. http://arrow.dit.ie/scschcomdis/1 — Use Licence — Attribution-NonCommercial-ShareAlike 1.0 You are free: • to copy, distribute, display, and perform the work • to make derivative works Under the following conditions: • Attribution. You must give the original author credit. • Non-Commercial. You may not use this work for commercial purposes. • Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under a license identical...
Words: 35464 - Pages: 142