IoT Information Security Evaluation for Developers and Users

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Users, developers and dilemmas

This paper presents the results of an ethnography of a small evolutionary software development project in a British oil company, focusing on the relationship between users and software developers. The discussion starts by looking at how activities come to be defined as either “user” or “developer” jobs. At the company studied there was considerable conflict over the user development of Lotus No...

متن کامل

Hackers, Users, Information Security

We analyze the strategic interactions among end-users and between end-users and a hacker. We show that security efforts by end users are strategic substitutes. This explains the inertia among end-users in taking precautions even in the face of grave potential consequences. Next, we analyze the direct and indirect effects of changes in user fixing cost and the rate of enforcement against hacking...

متن کامل

On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users

One of the main security mechanisms in Android is the permission system. Previous research has pointed out that this system is too coarse-grained. Hence, several mechanisms have been proposed to address this issue. However, to date, the impact of changes in the current permission system on both end users and software developers has not been studied, and no significant work has been done to dete...

متن کامل

Effective Information Processing between Users and Developers during Information System Project Development

When users participate in information system (IS) project development, the lack of linkage between developers and users may hinder the achievement of effective information processing. The purpose of this study is to explore the effect of various linkages on information processing capacity. This paper studied information flows of seven projects in an IT company in Singapore. Analysis archival da...

متن کامل

Users as the Biggest Threats to Security of Health Information Systems

There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information Security and Cryptography (Enigma)

سال: 2018

ISSN: 2595-5217

DOI: 10.17648/enigma.v4i1.63