{"title":"Information security challenges in social media interactions: strategies to normalize practices across physical and virtual worlds","authors":"Santosh Putchala, K. Bhat, R. Anitha","doi":"10.1109/BPM.2013.6615012","DOIUrl":"https://doi.org/10.1109/BPM.2013.6615012","url":null,"abstract":"With the onset of new communication models, social communication took a new shape and these interactions embraced the World Wide Web. These social media interactions are quite analogous to the real world communications, and have numerous derived benefits. Humongous amount of information is generated and exchanged through social media interactions. In most instances, this information exchange does not pass through authorizations, approvals and is thus uncontrolled. This poses major concerns regarding information security & privacy. For the organization, even though there are perceived business benefits from engaging in social media, un-controlled information exchange stands as a major concern. This paper details the strategies that can be employed so as to mitigate risks of social media to the organization. It discusses the information security & privacy risks and issues underlying the social media interactions. Further, the paper suggests strategies that can minimize the risks from these interactions. The paper concludes with a discussion on the nuances and suggests future work in this arena.","PeriodicalId":186910,"journal":{"name":"DSCI - Best Practices Meet 2013","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127337316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic malware detection and recording using virtual machine introspection","authors":"A. More, S. Tapaswi","doi":"10.1109/BPM.2013.6615011","DOIUrl":"https://doi.org/10.1109/BPM.2013.6615011","url":null,"abstract":"Detecting and collecting malware samples is considered to be a milestone in computer security. Recording entire Virtual Machine (VM) activities requires considerable resources and it is not the wiser choice too. Our approach is combination of Virtual machine introspection (VMI), file system clustering, malware activity recording. The proposed framework consists of four steps. In initial step possible executable codes are detected using clustering algorithm. Next step monitors process and information flow for these executables using VMI. The data and information flow graph is generated for such processes. Malicious graphs among all are detected in next step. Final step comprises of recording malicious graphs and commitment of VM. We have implemented the prototype of this framework on leading hypervisor for Windows OS. Experimental results shows that it is better way to detect and store malicious processes than storing entire VM. We believe it as a cost effective intelligent solution for malware recording.","PeriodicalId":186910,"journal":{"name":"DSCI - Best Practices Meet 2013","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129029444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modernize the network: Device identity networks meet enterprise needs","authors":"S. Sprague","doi":"10.1109/BPM.2013.6615010","DOIUrl":"https://doi.org/10.1109/BPM.2013.6615010","url":null,"abstract":"The enterprise network is being modernized because users expect consistent availability of services regardless of the device they are using and the network they are on. They balk when their laptops or tablets supply email or voice services different from the services on their smart phones, where their email or voice “just works.” They no longer want to use tablets if they are barred from the services available through their enterprise networks.","PeriodicalId":186910,"journal":{"name":"DSCI - Best Practices Meet 2013","volume":"51 35","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113957731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}