Tag: Security

“The effects of security techniques on the performance of the IP addressing schemes used in different Operating Systems In the Wireless 802.11n Networks”

1. Introduction: Utilization of Bandwidth Efficiently is the most Challenging factor, in today’s IT Revolution. Providing security for the data transmission over wired and wireless networks is again a very important factor in order to avoid piracy, illegal and unauthorized accesses. Here we are investigating the effect of WPA2 security technique on the IP addressing …

What are the effects on trade regulation for food security under the world trade organization system

Abstract With the launch of new negotiations on international trade called ‘Doha Development Agenda’ (DDA), agriculture is once again expected to be a central and difficult issue. As a solution to the problems associated with food security in the DDA negotiation on agriculture, this article suggested a creation of a food security box. The basic …

Bio-metric technologies are capable of providing the secured way of identification and personal activities to overcome the security issues in the process of Internet banking in banks

INTRODUCTION: The purpose of this literature is to identify whether Bio-metric technologies are capable of providing the secured way of identification and personal activities to overcome the security issues in the process of Internet banking in banks. This literature also discusses about the possible security threats which most affect the online banking and the progress …

Critically examine the circumstances under which the United Nations Security Council can trigger the exercise of jurisdiction by the International Criminal Court.

Abstract Human rights and fundamental freedoms are an important element of international law and foreign policy. This has led to many interventionist measures being employed by various international bodies. The ability of the United Nations Security Council to trigger the exercise of jurisdiction by the International Criminal Court is an important measure, which seeks to …

What are the problems associated with the increasing use of international and national commercial security companies and how can these problems be overcome?

Abstract There has been an increasing use of national and international security companies, particularly in the wake of the occupation of Iraq. Although these security companies can often offer efficiency and expertise in areas that government military cannot, they also present certain difficulties, in terms of regulation and control. In particular, it is found in …

Continental Europe seeks to combine flexibility with security in its relations with the workforce via a range of measures one of which is flexicurity.

Introduction Flexicurity promises to address the problems relating to the labour market by enhancing the need for security and flexibility. In this study the establishment of the Flexicurity concept will be identified followed by a determination as to whether Flexicurity has been successful for business and the workforce in relation to young workers. Main Body …

Information Privacy Security: TJX Data Breach Crisis and Lessons

Introduction Protecting the privacy of consumer personal information continues to pose significant challenges for organisations. The complexity is aggravated by consumers’ vulnerability that comes about when they are unable to control the usage of personal information they share with business organisations. Given the importance of information privacy, there has been a host of privacy research …

Data Security and Integrity: Software and Physical Restrictions

Table of Contents Page # Introduction Introduction Maintenance of data security and integrity in reference to: Software Access Restrictions These are inserted for the purposes of protecting computer software. A few forms of software access restrictions are as follows: Passwords Definition: -A string of characters that allows access to a computer, interface or system. How …

Diversity of People in United States: A Threat to U. S. Security?

I. Introduction As the globalization become rampant, people are migrating to and from different parts of the world. The United States (U.S.), being a well developed country in the world, apparently, different citizens from different countries and continents are trying to migrate and build their lives in the U.S. This could not only be seen …

Design of a New Security Protocol Using Hybrid Cryptography

Subasree & Sakthivel ? Design of a New Security Protocol IJRRAS 2 (2) ? February 2010 DESIGN OF A NEW SECURITY PROTOCOL USING HYBRID CRYPTOGRAPHY ALGORITHMS S. Subasree and N. K. Sakthivel School of Computing, Sastra University, Thanjavur – 613401, Tamil Nadu, INDIA. ABSTRACT A Computer Network is an interconnected group of autono mous computing …

Security and Privacy in Workplace

1. 0 Introduction Whalen and Gates (2010), define monitoring differently in their article. They define it as a method and procedure of examining the workers in an organization and study their constant events intended to guarantee that together the protection of employees and requirements of the employer are met. Nearly all companies nowadays take videos …