Search results
1 – 10 of 302While liberals agree that the best society is one that supports the equal exercise of personal liberty, there is little agreement among them on what policies best achieve this…
Abstract
While liberals agree that the best society is one that supports the equal exercise of personal liberty, there is little agreement among them on what policies best achieve this end. Conflicts within liberalism over the place of socially derived goals vis-à-vis personal liberty and autonomy create tension and skew public discourse on policy alternatives. In this article, I characterize the debate among dominant strands of liberal ideology and consider the effort of Charles Taylor to resolve these tensions. Finding his resolution unsatisfying, I explore the alternative conception offered by American pragmatism. I argue that liberal theories fail because they fall prey to the problem of principles-they attempt to justify axiomatic thinking rather than perpetuate society and culture. Pragmatism provides a justification for liberal public discourse as the best mechanism for constructing, evaluating and revising policies that support cultural adaptation to social, economic and technological contingencies.
A zero-day vulnerability is a complimentary ticket to the attackers for gaining entry into the network. Thus, there is necessity to device appropriate threat detection systems and…
Abstract
A zero-day vulnerability is a complimentary ticket to the attackers for gaining entry into the network. Thus, there is necessity to device appropriate threat detection systems and establish an innovative and safe solution that prevents unauthorised intrusions for defending various components of cybersecurity. We present a survey of recent Intrusion Detection Systems (IDS) in detecting zero-day vulnerabilities based on the following dimensions: types of cyber-attacks, datasets used and kinds of network detection systems.
Purpose: The study focuses on presenting an exhaustive review on the effectiveness of the recent IDS with respect to zero-day vulnerabilities.
Methodology: Systematic exploration was done at the IEEE, Elsevier, Springer, RAID, ESCORICS, Google Scholar, and other relevant platforms of studies published in English between 2015 and 2021 using keywords and combinations of relevant terms.
Findings: It is possible to train IDS for zero-day attacks. The existing IDS have strengths that make them capable of effective detection against zero-day attacks. However, they display certain limitations that reduce their credibility. Novel strategies like deep learning, machine learning, fuzzing technique, runtime verification technique, and Hidden Markov Models can be used to design IDS to detect malicious traffic.
Implication: This paper explored and highlighted the advantages and limitations of existing IDS enabling the selection of best possible IDS to protect the system. Moreover, the comparison between signature-based and anomaly-based IDS exemplifies that one viable approach to accurately detect the zero-day vulnerabilities would be the integration of hybrid mechanism.
Details
Keywords
Adam J. Vanhove, Tiffany Brutus and Kristin A. Sowden
In recent years, a wide range of psychosocial health interventions have been implemented among military service members and their families. However, there are questions over the…
Abstract
In recent years, a wide range of psychosocial health interventions have been implemented among military service members and their families. However, there are questions over the evaluative rigor of these interventions. We conducted a systematic review of this literature, rating each relevant study (k = 111) on five evaluative rigor scales (type of control group, approach to participant assignment, outcome quality, number of measurement time points, and follow-up distality). The most frequently coded values on three of the five scales (control group type, participant assignment, and follow-up distality) were those indicating the lowest level of operationally defined rigor. Logistic regression results indicate that the evaluative rigor of intervention studies has largely remained consistent over time, with exceptions indicating that rigor has decreased. Analyses among seven military sub-populations indicate that interventions conducted among soldiers completing basic training, soldiers returning from combat deployment, and combat veterans have had, on average, the greatest evaluative rigor. However, variability in mean scores across evaluative rigor scales within sub-populations highlights the unique methodological hurdles common to different military settings. Recommendations for better standardizing the intervention evaluation process are discussed.
Details
Keywords
M. K. Ward, Stefan Volk and William J. Becker
This chapter overviews organizational neuroscience (ON), covering the past, present, and future of this growing field of inquiry. First, we define ON and clarify the boundaries of…
Abstract
This chapter overviews organizational neuroscience (ON), covering the past, present, and future of this growing field of inquiry. First, we define ON and clarify the boundaries of the field. Second, we describe the evolution of ON by starting with early papers that tended to discuss the potential of ON to benefit both research and practice. Throughout its development, debates have abounded about the value of ON. Such debates are often related to challenges in collecting, integrating, interpreting, and using information from the brain-level of analysis. It is time for the field to move beyond these debates to focus on applying neuroscience to further theory development and reveal more comprehensive answers to research questions of importance to both academics and practitioners. Third, we propose and describe future research directions for ON. The research directions that we propose are merely a sample of the many paths along which ON inquiry can move forward. Fourth, we outline potential practical implications of ON, including: training and development, job design, high-performance assessment, motivating communications, and conflict prevention. Finally, we draw conclusions about ON as it stands today, address challenges in developing ON, and point out opportunities. We conclude with takeaways and highlight the importance of ON for both academics and practitioners.
Details
Keywords
In wireless sensor network (WSN), user authentication plays as a vital role in which data sensing, as well as sharing, will be spoiled by hackers. To enhance user security, user…
Abstract
Purpose
In wireless sensor network (WSN), user authentication plays as a vital role in which data sensing, as well as sharing, will be spoiled by hackers. To enhance user security, user authentication must be focused.
Design/methodology/approach
In previous works, for secured authentication, Enhanced User Authentication Protocol (EUAP) is presented. On the other hand, the user free password generation is permitted in the previous technique.
Findings
Here, password leakage may cause a malevolent user's contribution to the WSN environment. By presenting the Flexible and Secured User Authentication Protocol (FSUAP), this is solved in the presented technique in which secured as well as reliable sharing of data contents via unsecured wireless sensor devices was accomplished.
Originality/value
The foremost objective of the present technique is to device the protocol that would verify the users beforehand letting them access the sensor devices situated in various sites. The use of a sensor device could be reduced in a significant way. Three-factor authentication protocols are presented in place of two-factor authentication protocol in the presented technique that could deal with and safeguard the environment from a brute force attack in an effective manner.
Details
Keywords
Kuldeep Singh Kaswan, Jagjit Singh Dhatterwal, Naresh Kumar and Sandeep Lal
It is difficult to argue against the fact that research has focussed on artificial intelligence (AI) and robotisation over the past few decades. Additionally, during the past…
Abstract
It is difficult to argue against the fact that research has focussed on artificial intelligence (AI) and robotisation over the past few decades. Additionally, during the past several years, it has taken off and is now extensively used in numerous businesses across various industries. Most of the time, AI has been associated with some industrial sector process automation. Still, recently, the authors have noticed more positive technology uses, especially in the financial services industry. Due to several factors, the financial sector needs to adopt AI and recognise its potential. The industry has historically been concerned about unpredictability, legislation, stronger cybersecurity, technological limitations and disruption of established lucrative operations.
Never before has there been more discussion about AI due to the advantages it provides to businesses that are providing financial services. That may explain why this change is referred to as the fourth industrial revolution. Both positively and negatively, it is quite disruptive. The effectiveness, accuracy and cost-effectiveness of solutions greatly increase. However, immense power also entails great responsibility.
Precautions and security are more crucial than ever for businesses since the financial sector is changing significantly and quickly. The various benefits and drawbacks of this technology are yet unknown to humans. Although AI was first shown to us in the 1950s, it has recently gained new prominence as processing power, and the available quantity of data has increased dramatically.
Details