Search results

1 – 10 of 302
Article
Publication date: 1 March 2010

Hans J. Hacker

While liberals agree that the best society is one that supports the equal exercise of personal liberty, there is little agreement among them on what policies best achieve this…

Abstract

While liberals agree that the best society is one that supports the equal exercise of personal liberty, there is little agreement among them on what policies best achieve this end. Conflicts within liberalism over the place of socially derived goals vis-à-vis personal liberty and autonomy create tension and skew public discourse on policy alternatives. In this article, I characterize the debate among dominant strands of liberal ideology and consider the effort of Charles Taylor to resolve these tensions. Finding his resolution unsatisfying, I explore the alternative conception offered by American pragmatism. I argue that liberal theories fail because they fall prey to the problem of principles-they attempt to justify axiomatic thinking rather than perpetuate society and culture. Pragmatism provides a justification for liberal public discourse as the best mechanism for constructing, evaluating and revising policies that support cultural adaptation to social, economic and technological contingencies.

Details

International Journal of Organization Theory & Behavior, vol. 13 no. 1
Type: Research Article
ISSN: 1093-4537

Book part
Publication date: 29 May 2023

Divya Nair and Neeta Mhavan

A zero-day vulnerability is a complimentary ticket to the attackers for gaining entry into the network. Thus, there is necessity to device appropriate threat detection systems and…

Abstract

A zero-day vulnerability is a complimentary ticket to the attackers for gaining entry into the network. Thus, there is necessity to device appropriate threat detection systems and establish an innovative and safe solution that prevents unauthorised intrusions for defending various components of cybersecurity. We present a survey of recent Intrusion Detection Systems (IDS) in detecting zero-day vulnerabilities based on the following dimensions: types of cyber-attacks, datasets used and kinds of network detection systems.

Purpose: The study focuses on presenting an exhaustive review on the effectiveness of the recent IDS with respect to zero-day vulnerabilities.

Methodology: Systematic exploration was done at the IEEE, Elsevier, Springer, RAID, ESCORICS, Google Scholar, and other relevant platforms of studies published in English between 2015 and 2021 using keywords and combinations of relevant terms.

Findings: It is possible to train IDS for zero-day attacks. The existing IDS have strengths that make them capable of effective detection against zero-day attacks. However, they display certain limitations that reduce their credibility. Novel strategies like deep learning, machine learning, fuzzing technique, runtime verification technique, and Hidden Markov Models can be used to design IDS to detect malicious traffic.

Implication: This paper explored and highlighted the advantages and limitations of existing IDS enabling the selection of best possible IDS to protect the system. Moreover, the comparison between signature-based and anomaly-based IDS exemplifies that one viable approach to accurately detect the zero-day vulnerabilities would be the integration of hybrid mechanism.

Details

Smart Analytics, Artificial Intelligence and Sustainable Performance Management in a Global Digitalised Economy
Type: Book
ISBN: 978-1-80382-555-7

Keywords

Book part
Publication date: 5 September 2018

Adam J. Vanhove, Tiffany Brutus and Kristin A. Sowden

In recent years, a wide range of psychosocial health interventions have been implemented among military service members and their families. However, there are questions over the…

Abstract

In recent years, a wide range of psychosocial health interventions have been implemented among military service members and their families. However, there are questions over the evaluative rigor of these interventions. We conducted a systematic review of this literature, rating each relevant study (k = 111) on five evaluative rigor scales (type of control group, approach to participant assignment, outcome quality, number of measurement time points, and follow-up distality). The most frequently coded values on three of the five scales (control group type, participant assignment, and follow-up distality) were those indicating the lowest level of operationally defined rigor. Logistic regression results indicate that the evaluative rigor of intervention studies has largely remained consistent over time, with exceptions indicating that rigor has decreased. Analyses among seven military sub-populations indicate that interventions conducted among soldiers completing basic training, soldiers returning from combat deployment, and combat veterans have had, on average, the greatest evaluative rigor. However, variability in mean scores across evaluative rigor scales within sub-populations highlights the unique methodological hurdles common to different military settings. Recommendations for better standardizing the intervention evaluation process are discussed.

Details

Occupational Stress and Well-Being in Military Contexts
Type: Book
ISBN: 978-1-78756-184-7

Keywords

Content available
Book part
Publication date: 8 September 2022

Stephen Turner

Abstract

Details

Mad Hazard
Type: Book
ISBN: 978-1-80382-670-7

Book part
Publication date: 15 November 2022

Jingrong Tong

Abstract

Details

Journalism, Economic Uncertainty and Political Irregularity in the Digital and Data Era
Type: Book
ISBN: 978-1-80043-559-9

Book part
Publication date: 13 August 2018

Robert L. Dipboye

Abstract

Details

The Emerald Review of Industrial and Organizational Psychology
Type: Book
ISBN: 978-1-78743-786-9

Book part
Publication date: 11 November 2019

Mariann Hardey

Abstract

Details

The Culture of Women in Tech
Type: Book
ISBN: 978-1-78973-426-3

Book part
Publication date: 15 December 2015

M. K. Ward, Stefan Volk and William J. Becker

This chapter overviews organizational neuroscience (ON), covering the past, present, and future of this growing field of inquiry. First, we define ON and clarify the boundaries of…

Abstract

This chapter overviews organizational neuroscience (ON), covering the past, present, and future of this growing field of inquiry. First, we define ON and clarify the boundaries of the field. Second, we describe the evolution of ON by starting with early papers that tended to discuss the potential of ON to benefit both research and practice. Throughout its development, debates have abounded about the value of ON. Such debates are often related to challenges in collecting, integrating, interpreting, and using information from the brain-level of analysis. It is time for the field to move beyond these debates to focus on applying neuroscience to further theory development and reveal more comprehensive answers to research questions of importance to both academics and practitioners. Third, we propose and describe future research directions for ON. The research directions that we propose are merely a sample of the many paths along which ON inquiry can move forward. Fourth, we outline potential practical implications of ON, including: training and development, job design, high-performance assessment, motivating communications, and conflict prevention. Finally, we draw conclusions about ON as it stands today, address challenges in developing ON, and point out opportunities. We conclude with takeaways and highlight the importance of ON for both academics and practitioners.

Details

Organizational Neuroscience
Type: Book
ISBN: 978-1-78560-430-0

Keywords

Article
Publication date: 7 May 2020

Prabu P and Senthilnathan T

In wireless sensor network (WSN), user authentication plays as a vital role in which data sensing, as well as sharing, will be spoiled by hackers. To enhance user security, user…

Abstract

Purpose

In wireless sensor network (WSN), user authentication plays as a vital role in which data sensing, as well as sharing, will be spoiled by hackers. To enhance user security, user authentication must be focused.

Design/methodology/approach

In previous works, for secured authentication, Enhanced User Authentication Protocol (EUAP) is presented. On the other hand, the user free password generation is permitted in the previous technique.

Findings

Here, password leakage may cause a malevolent user's contribution to the WSN environment. By presenting the Flexible and Secured User Authentication Protocol (FSUAP), this is solved in the presented technique in which secured as well as reliable sharing of data contents via unsecured wireless sensor devices was accomplished.

Originality/value

The foremost objective of the present technique is to device the protocol that would verify the users beforehand letting them access the sensor devices situated in various sites. The use of a sensor device could be reduced in a significant way. Three-factor authentication protocols are presented in place of two-factor authentication protocol in the presented technique that could deal with and safeguard the environment from a brute force attack in an effective manner.

Details

International Journal of Intelligent Unmanned Systems, vol. 8 no. 4
Type: Research Article
ISSN: 2049-6427

Keywords

Book part
Publication date: 10 May 2023

Kuldeep Singh Kaswan, Jagjit Singh Dhatterwal, Naresh Kumar and Sandeep Lal

It is difficult to argue against the fact that research has focussed on artificial intelligence (AI) and robotisation over the past few decades. Additionally, during the past…

Abstract

It is difficult to argue against the fact that research has focussed on artificial intelligence (AI) and robotisation over the past few decades. Additionally, during the past several years, it has taken off and is now extensively used in numerous businesses across various industries. Most of the time, AI has been associated with some industrial sector process automation. Still, recently, the authors have noticed more positive technology uses, especially in the financial services industry. Due to several factors, the financial sector needs to adopt AI and recognise its potential. The industry has historically been concerned about unpredictability, legislation, stronger cybersecurity, technological limitations and disruption of established lucrative operations.

Never before has there been more discussion about AI due to the advantages it provides to businesses that are providing financial services. That may explain why this change is referred to as the fourth industrial revolution. Both positively and negatively, it is quite disruptive. The effectiveness, accuracy and cost-effectiveness of solutions greatly increase. However, immense power also entails great responsibility.

Precautions and security are more crucial than ever for businesses since the financial sector is changing significantly and quickly. The various benefits and drawbacks of this technology are yet unknown to humans. Although AI was first shown to us in the 1950s, it has recently gained new prominence as processing power, and the available quantity of data has increased dramatically.

Details

Contemporary Studies of Risks in Emerging Technology, Part A
Type: Book
ISBN: 978-1-80455-563-7

Keywords

1 – 10 of 302