Search Results

Results (17)

Search Parameters:

Keyword: Information security
Order results
Results per page
Open AccessArticle
9 Pages, 1,865 KB Download PDF

Deep Learning Affective Computing to Elicit Sentiment Towards Information Security Policies

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 3, Page # 152–160, 2022; DOI: 10.25046/aj070317
Abstract:

Information security behaviour is an integral part of modern business and has become a central theme in many research studies. One of the essential tools available that can be used to influence information security behaviour is information security policies (ISPs). These types of policies, which is mandatory in most organisations, are formalised rules and regulations…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 798 KB Download PDF

Measurement of Employee Awareness Levels for Information Security at the Center of Analysis and Information Services Judicial Commission Republic of Indonesia

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 501–509, 2020; DOI: 10.25046/aj050362
Abstract:

The Center for Analysis and Information Services (Palinfo) at the Judicial Commission closely related to the management of information systems which are used to process organizational internal data and information systems on public services. Data processing and network management have an information system security risk. The Judicial Commission seeks to reduce risk and improve the…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 671 KB Download PDF

Analysis of Information Security for a Voting Process for Sectional Governments in Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 352–359, 2019; DOI: 10.25046/aj040546
Abstract:

Knowing about different events in several Latin American countries, as well as in Ecuador, in relation to data alteration, in the different sectional voting processes, it has been necessary to carry out a security analysis provided by the systems of choice in the different sectional governments of the country. The objective of this study is…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 678 KB Download PDF

An Immutable Algorithm Approach to Improve the Information Security of a Process for a Public Organization of Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 25–30, 2019; DOI: 10.25046/aj040304
Abstract:

Currently, information security is among the main characteristics that must be achieved within the security of private and public organizations worldwide. For this reason, globally recognized algorithms such as the AES, IDEA, RC5, DES, RSA are researched with the aim of identifying the most suitable and obtaining a greater degree of security and speed of…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
12 Pages, 1,419 KB Download PDF

Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives.

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 88–99, 2017; DOI: 10.25046/aj020313
Abstract:

This article is an extended version of the study presented at the IEEE Ecuador Technical Chapters Meeting (ETCM)-2016. At that time, a methodological proposal was designed, implemented, and applied in a group of industrial plants for the management of the information security of the Industrial control systems (ICS). The present study displays an adaptation and…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 522 KB Download PDF

The Security of Information Systems and Image Processing Supported by the Quantum Computer: A review

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 77–86, 2022; DOI: 10.25046/aj070609
Abstract:

The knowledge and understanding of the technology of quantum computers and their superiority over classical computers are still insufficient or uncertain for many communities of researchers, manufacturers, investors and the general public. For this reason, we try in this article to present and explain some of the basic concepts of quantum computers. We explain how…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
14 Pages, 872 KB Download PDF

Challenges in IoT Technology Adoption into Information System Security Management of Smart Cities: A Review

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 99–112, 2021; DOI: 10.25046/aj060213
Abstract:

Sustainable urban development and utilization of Internet of Things (IoT) technology is driving cities globally to evolve into Smart Cities (SC). The power of IoT services and applications will enable public agencies to provide personalized services to the citizens and inevitably improves their much-needed quality of life. However, although the use of IoT technology proves…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
12 Pages, 1,497 KB Download PDF

Prototype to Mitigate the Risks, Vulnerabilities and Threats of Information to Ensure Data Integrity

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 139–150, 2022; DOI: 10.25046/aj070614
Abstract:

The constant evolution of Information and Communication Technologies, Internet, access to different free software, among others; they generate problems in the management of information security in companies; to mitigate risks, vulnerabilities, and information threats, an alternative was presented considering that information security systems are the basis for decision-making at the government, strategic, tactical, and operational…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 625 KB Download PDF

Based on Reconfiguring the Supercomputers Runtime Environment New Security Methods

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 291–298, 2020; DOI: 10.25046/aj050338
Abstract:

This paper is an extension of work originally presented in 2019 Third World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). Author describes two new methods: reactive protection method (without delay after detecting an attack), which consists in virtualizing the execution environment of supercomputers processes if the calculated state descriptor falls into the…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 669 KB Download PDF

Security in SWIPT with Power Splitting Eavesdropper

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 384–388, 2017; DOI: 10.25046/aj020349
Abstract:

Simultaneous wireless information and power transfer (SWIPT) has drawn significant research interest in recent years. In this paper, we investigate the information theoretic secrecy of a SWIPT system under Weibull fading channel. To be specific, we analyze the information security in the presence of an energy harvesting and information decoding eavesdropper. All links are subjected…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
9 Pages, 973 KB Download PDF

A Framework for the Alignment of ICT with Green IT

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 593–601, 2021; DOI: 10.25046/aj060268
Abstract:

The Public Administration is forced to transform itself by taking advantage of the contribution of ICT to in the process of reducing bureaucracy and increase transparency, promoting the dematerialization of processes, increasing the quality of online services, allowing greater ubiquity of access, reducing response times, in the search for improvement of the quality of life…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 681 KB Download PDF

An Operational Responsibility and Task Monitoring Method: A Data Breach Case Study

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 1157–1163, 2021; DOI: 10.25046/aj0601130
Abstract:

As a result of digitalization, services become highly dependent on information systems thus increasing the criticality of security management. However, with system complexity and the involvement of more human resources, it becomes more arduous to monitor and track tasks and responsibilities. This creates a lack of visibility hindering decision making. To support operational monitoring, we…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 796 KB Download PDF

Analysis of Vulnerabilities, Risks and Threats in the Process of Quota Allocation for the State University of Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 673–682, 2020; DOI: 10.25046/aj050283
Abstract:

Different models and standards of information security were analyzed, to adopt a model that mitigates vulnerabilities, risks and threats in the quota allocation process for the State University in Ecuador. The main objective is defining a prototype for the management of processes and information security in this type of organization. It was used the deductive…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 319 KB Download PDF

Stream Cipher by Reed-Solomon Codes

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 4, Page # 26–32, 2018; DOI: 10.25046/aj030404
Abstract:

Stream cipher can be used in constrained environments to provide information security and reduce energy expense at data transmission. In this paper, it is shown that Reed-Solomon (RS) code can be used to implement stream cipher, which is widely used for error corrections of data in transmission and storages. The proposed stream cipher combines the…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 702 KB Download PDF

Toward Confirming a Framework for Securing the Virtual Machine Image in Cloud Computing

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 44–50, 2017; DOI: 10.25046/aj020406
Abstract:

The concept of cloud computing has arisen thanks to academic work in the fields of utility computing, distributed computing, virtualisation, and web services. By using cloud computing, which can be accessed from anywhere, newly-launched businesses can minimise their start-up costs. Among the most important notions when it comes to the construction of cloud computing is…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 812 KB Download PDF

An Approach to Vulnerabilities, Threats and Risk in Voting Systems for Popular Elections in Latin America

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 106–116, 2019; DOI: 10.25046/aj040315
Abstract:

The problems in information security regarding vulnerabilities, threats and risks in voting systems for popular election in Latin America and the world persist; because in most of the countries of the world there is no maturity in democracy and defined policies; the problems of confidentiality, integrity and authenticity in the electoral processes can be evidenced.…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 445 KB Download PDF

Towards Deployment Strategies for Deception Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1272–1279, 2017; DOI: 10.25046/aj0203161
Abstract:

Network security is often built on perimeter defense. Sophisticated attacks are able to penetrate the perimeter and access valuable resources in the network. A more complete defense strategy also contains mechanisms to detect and mitigate perimeter breaches. Deceptive systems are a promising technology to detect, deceive and counter infiltration. In this work we provide an…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026