{"title":"The State Corporate Cloud Computing- Based Network for Registration of Potentially Dangerous Objects","authors":"Andrey Melenets","doi":"10.11610/ISIJ.2804","DOIUrl":"https://doi.org/10.11610/ISIJ.2804","url":null,"abstract":"This papers presents the considerations for maintaining information resources of the state with implementation of cloud computing. In particular, it examines a scheme for maintaining the state register of potentially dangerous objects on the basis of cloud computing technology. Special attention is paid to the issue of information protection in cloud computing and the implementation of the hybrid cloud model for maintaining information resources of the state.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115907754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strategic and Technology Policy Implications for E-Government","authors":"P. Krairit, Worraya Choomongkol, D. Krairit","doi":"10.11610/isij.1502","DOIUrl":"https://doi.org/10.11610/isij.1502","url":null,"abstract":"Smart card technology was first introduced in Thailand by the Thai government who planned to use the technology for the government's e-ID and e- Government projects in 2004. This situation is contrary to the introduction of smart cards by the private sector in developed countries. On the research front, this con- trast provided an excellent opportunity to study the differences, if any, in factors affecting consumers' perceptions of smart card technologies. The study shows that, statistically, no demographic factors, except age, were found to have statistically significant effects on the users' decision to use smart cards. In addition, it was found that perceived convenience and security level of smart cards are the other two statistically significant factors found to affect Thai users' decisions to adopt smart card technologies. This study concludes that the key issue with respect to using smart cards in Thailand is not so much about which applications are the \"right\" ones to be put on the cards, but more on the matters of security of the cards. This issue is very important to Thai people as shown empirically by this study. As a re- sult, the Thai government should put high emphasis on the security issue when planning for and implementing the smart card technologies in their e-ID and e- Government projects.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124382659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges and Advantages of Distance Learning Systems","authors":"Greta Keremidchieva, P. Yankov","doi":"10.11610/ISIJ.0609","DOIUrl":"https://doi.org/10.11610/ISIJ.0609","url":null,"abstract":"Distance learning has been around for ages. From the moment you decide you would like to continue your education, the Internet can provide access to detailed information about the many institutions and distance-learning courses currently available to you worldwide – information about the teachers, deadlines, grants and fees. A course web site might include a syllabus, a summary of lessons, notes, links to helpful sites and related research, projects done by students, model assignments and a long list of etceteras considered impractical under the more traditional system. The interactivity of the Web allows for spontaneous feedback and rapid change, without the hassle of endless photocopying.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"436 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116014019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DECISION MODEL ANALYSIS FOR SPAM","authors":"A. Orfila, J. Carbo, A. Ribagorda","doi":"10.11610/ISIJ.1510","DOIUrl":"https://doi.org/10.11610/ISIJ.1510","url":null,"abstract":"One of the security challenges in e-Government is to offer a smooth dialogue with citizens, which guarantees the availability, confidentiality and integ- rity of the information interchanged. Spam jeopardizes the survival of electronic mail as a communication means. Many approaches to tackle the problem with spam have been proposed. This paper shows the necessity of studying the real value of spam filters. Contrary to common belief, false positive rate and false negative rate do not completely reveal to what extent a junk filter is worth using. Very important parameters like the hostility of the environment (summarized by the probability of receiving spam) or the error costs associated with the filter play a decisive role.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116175724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Aleksandrova, Miroslav Kochankov, Vanya Tagareva, Anna Guncheva, Violeta Vasileva
{"title":"Interface Solutions for Improving Information Interoperability in the Conditions of Hybrid Threats","authors":"V. Aleksandrova, Miroslav Kochankov, Vanya Tagareva, Anna Guncheva, Violeta Vasileva","doi":"10.11610/isij.3923","DOIUrl":"https://doi.org/10.11610/isij.3923","url":null,"abstract":"In this article the authors offer interface alternatives and solutions for the information exchange in the infrastructure of cyber domains. Information interoperability is seen as a guarantee for secure information transfer related to the development of capabilities to counter hybrid threats. This is achievable when NATO interoperability directives are strictly followed. Technical interface gateways are proposed which allow change of data character in a heterogeneous environment as well as information exchange gateways in an environment with various security domains in order to check and filter information.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116487904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Generic Reference Curriculum on Cybersecurity","authors":"T. Tagarev","doi":"10.11610/ISIJ.3510","DOIUrl":"https://doi.org/10.11610/ISIJ.3510","url":null,"abstract":"A volunteer group of academics and practitioners embarked on a twoyear project to develop a generic reference curriculum on cybersecurity on behalf of NATO and the Partnership for Peace Consortium. This paper provides a brief overview of the result of this work – a curriculum that is recommended as a starting point for any university or training organization considering a program in the field of cybersecurity.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117088463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Semerdjiev, K. Alexiev, Emanuil Djerassi, P. Konstantinova
{"title":"Multiple Hypothesis Tracking Using Hough Transform Track Detector","authors":"E. Semerdjiev, K. Alexiev, Emanuil Djerassi, P. Konstantinova","doi":"10.11610/isij.0210","DOIUrl":"https://doi.org/10.11610/isij.0210","url":null,"abstract":"The Multiple Hypothesis Tracking algorithm (MHT) is an effective algorithm for moving objects detection and tracking.1,2 Few versions of this complex algorithm are described and evaluated in 1,2,4. Its measurement oriented version is considered as the most effective from theoretical point of view, but its practical implementation is limited because of the required significant computational load in cluttered environment. Several techniques minimizing this load were proposed,1,2,4 but they do not provide general solution to these problems. A new problem solution is proposed in this paper. A Hough Transform (HT) track detector is used for preliminary filtering of arriving false alarms (FA). The tracks detected in this way are processed asynchronously with another standard MHT algorithm to include them in the overall MHT scheme. The standard and the proposed MHT-HT algorithm (MHT2-HT) are evaluated and compared in the paper. The proposed algorithm shows remarkably good performance in cluttered environment at the cost of delayed track detection process.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117204961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Communication between the Defence Sector and the Civil Society of Bulgaria as a Way to Build Capacity for Countering Hybrid Threats","authors":"Vyara Zhekova","doi":"10.11610/ISIJ.3905","DOIUrl":"https://doi.org/10.11610/ISIJ.3905","url":null,"abstract":"The choice of the topic for this article has been provoked by the growing significance of the hybrid threats. To understand the impact of hybrid threats, one should analyse a number of normative and state documents and publications, as well as various aspects of the relations between the state and the civil society at both national and international levels. In this article, the author focuses on the processes of management of information and communication between the defence sector and the civil society in Bulgaria in view of the White Book on Defence and Armed Forces and the National Security Strategy of the Republic of Bulgaria and their contribution to the national capacity to counter hybrid threats.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120808363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conceptualizing the Role of Societal Resilience in Countering Hybrid Warfare","authors":"Y. Yanakiev, P. Dimov, D. Bachvarov","doi":"10.11610/isij.3907","DOIUrl":"https://doi.org/10.11610/isij.3907","url":null,"abstract":"No single tool is available to counter the diversity and complexity of hybrid threats, examined by the authors as a as a military strategy that blends conventional warfare, irregular warfare, and cyber warfare. The concept of hybrid warfare is used to describe the flexible and complex dynamics of the battlespace requiring a highly adaptable and resilient response. Reflecting on recent NATO policies and documents, this article looks into the importance of strengthening societal resilience, understood as the ability of a state, organization or society to absorb and recover from a shock.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123926295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IT-related Challenges Facing the Bulgarian Armed Forces and Their Performance Related Impact","authors":"A. Zaprianov","doi":"10.11610/ISIJ.0602","DOIUrl":"https://doi.org/10.11610/ISIJ.0602","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129701400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}