cure

Swisscom submits new remedies to secure Vodafone Italia-Fastweb merger - report

(Telecompaper) Swisscom has submitted a second set of remedies with a view to securing the approval of the Italian Competition Authority (AGCM) for its intended...




cure

LTIMindtree to implement Cisco Secure Access for hybrid working, zero-trust and SD-WAN use cases

(Telecompaper) Cisco is publicising a deal with consulting firm LTIMindtree to deploy secure edge technology for its hybrid workforce and global consulting client base...




cure

Starlink secures licence to launch internet services in Chad

(Telecompaper) SpaceX's Starlink announced that its satellite internet service is now available in Chad, making it the latest African country to approve Starlink's low-Earth orbit (LEO) satellite internet services. Elon Musk announced on his X feed that Chad approved the licensing of Starlink on 11 November to...




cure

Rivada secures key spectrum rights ahead of satellite constellation launch

(Telecompaper) Rivada announced it has secured new spectrum rights to support its planned satellite constellation and services. In the past year Rivada secured market access for its Outernet constellation in 18 countries and on every continent, including the UK, the Netherlands, Denmark, Finland, Colombia and...




cure

Is Voting Secure?

Summary: I'm fairly certain that what I write here won't change the minds that need changing. But I feel like I need to make a statement anyway: your vote is secure.

There's a lot of fear mongering about the security of elections. I've wanted to discuss this for a while. I have several things in my background that have given me insight into how elections work. I was the CIO for the State of Utah. I was a member of the Lt Governor of Utah's voting equipment selection committee. And I've been involved in identity and security for several decades.

Let me give you the headline up front: committing election fraud in a way that changes the result is difficult, nearly impossible. Let's examine how elections are run and how fraud could happen to see why.

First a caveat: there is no single way that US elections are run. Elections in the US are quite decentralized. Each state has different election laws and in most cases the mechanics of running an election are given over to county clerks who must follow state law, but also have freedom to create their own workflows and processes within that law. There are 3244 counties in the US. The analysis that follows is generalized and likely more true of Utah, which I'm very familiar with, than other places. Still, I think the big ideas are largely the same everywhere.

The process of voting is divided into two parts: (1) voter registration and (2) voting. This is important because most people who make up scenarios to convince you that voting is insecure usually ignore voter registration. Registration requires that you provide an address. This is an important piece of information because if you're voting by mail, it's where the ballot will be mailed. If you're voting in person, you need to vote at a specific polling place depending on your address.

When you vote, you either mail back the ballot that was mailed to you at the address you provided or you go to your assigned polling place and fill out a ballot (usually via a voting machine). In either case, the ballot presented to you depends on your address since the candidates listed on your ballot depend on your voting precinct. Also, as of 2024, 35 states require voters to present identification at the polling place in order to vote. Of those that don't, many require it for voters who are voting for the first time after their registration.

Now, let's examine voting fraud and how it might work. One important factor is scale. You need to commit fraud at a scale necessary to impact the outcome. For small elections (say a single state legislative race or a small school board election) you don't need to change a lot of votes to change the outcome in a tight race—hundreds of votes might do it. For larger elections, like the presidential election, scale is a significant issue. I'm going to focus on presidential elections since they are the most consequential. Less consequential elections are not likely to attract the kind of money and talent necessary to commit election fraud.

A second factor is stealth. You have to keep the fraud from being discovered so that it's not reversed. Proving consequential fraud would likely result in the election being challenged and rerun. You don't have to identify who did it, just prove that it was done. So election fraud is much more dependent on not being discovered than commercial transaction fraud where the loss is likely to only be recoverable if the identity of the perpetrator is known.

The nature of presidential elections is greatly influenced by the electoral college system. You need to influence the votes in enough states to swing that state's electoral votes to the candidate you favor. You don't want to commit fraud where it's not needed because you'll waste money while increasing your chances of discovery. So, selecting the states where you want to commit fraud is critical. Each of those states will have different requirements, so you'll have to tailor your attack to each of them. Furthermore, you'll have to tailor your attack to each voting precinct within the counties you determine are the most likely to impact the election.

There are a few ways to attack an election:

  • Sending your people to vote—for this to work, your fake voters have to have been registered and, in most cases, provide some form of ID. To register, they need a plausible address. The election office might not notice if one or two extra people with different last names are registered at a specific address, but they might if this is systematic or if an unreasonable number of people register at the same address. Remember that elections are run at the county level, so you have to assume that the election workers have a good understanding of the local environment. These fake voters now have to go to many different polling locations and cast a vote. They can't easily cast multiple ballots at the same polling location since the poll workers might remember them. So, you need lots of people going to lots of different polling locations.
  • Intercepting mail-in ballots—for this to work, you have to register at someone else's home address and then get to the mail before they do or steal their ballots after they've filled them in and change the vote. This requires lots of people. You can't do this remotely. It requires "boots on the ground" as the saying goes. Furthermore, those people are exposed since they're looking in mailboxes in neighborhoods where they don't live. Doable, but not very stealthy.
  • Paying people to vote—for this to work, you have to contact a lot of people, convince them to commit fraud, and then be satisfied with the fact that you'll never know if they voted for your candidate or not because ballots are secret. They could take your money and vote for whoever they want. Or just not vote at all unless you're supervising them, an activity that will call attention to you and your agents.
  • Replacing real ballots with fake ones—for this to work, you have to create realistic facimiles of real ballots for many different polling places (remember they're different because of overlapping jurisdictions), intercept the ballots somewhere in transit or on delivery, and replace the real ballots with ones that you've filled out for your candidate. This likely involves subverting county election workers. Not just one, but many. Again, the risk of discovery goes up with each contact.
  • Destroying ballots—for this to work, you need to destroy ballots that are for the candidate you don't want to win. You could simple destroy ballots without regard to how they're filled, but this won't assure you'll meet your goal. To be effective, you have to just destroy the ones for the other candidate and leave the ones for your candidate. Again, you will have to subvert election workers to get your hands on the ballots and determine who the ballot is for.
  • Changing the results after the ballots are counted—for this to work, you have to either hack the machines that record the vote or hack the machines that are tabulating the vote. Hacking the machines won't work if the machines keep a paper audit trail and it's used to audit results. Hacking the tabulators means getting access to those machines. Recall those are kept at the county level, so you have to hack many in different locations unless a single county can swing the election your way.

I hope all of this has at least given you a feel for the scale and scope of the problem. Pulling it off successfully without anyone knowing it happened is a difficult problem. Each method involves many people being let in on the secret—in some cases a lot of people. This isn't an operation that a small group of hackers can reliably pull off. Having lots of people involved increases the chances that you'll be discovered. The decentralized and distributed nature of how elections are run is a feature and makes elections more secure and trustworthy.

On top of all this, election officials aren't stupid, lazy, or inept. Sure, you're going to find a few who are. But as a rule the elections officials I've interacted with at the state and county level are professionals who are attuned to these dangers and take active steps to protect against them. They are usually happy to talk about how they operate and will respond to polite requests for information about how they audit systems and the processes they have in place to protect the vote.

As an aside, do you know what's easier than committing election fraud? Using social media to convince people that election fraud is happening to reduce confidence in the election and sow discontent. Then you can use that discontent to challenge a legitimate election and maybe change the outcome. Ask yourself which is more likely.

Successfully changing the results of a presidential election isn't impossible. But the odds of doing so and not leaving any evidence—the perfect crime—are vanishingly small. I have confidence in the security of the US election system.


Photo Credit: Voting from DALL-E (public domain) Prompt: Draw a horizontal picture of a woman casting a ballot with a ballot box

Tags:




cure

New defense suite is designed to secure AI workloads

As organizations increasingly adopt AI capabilities, the most common and dangerous attacks often go undetected by static code scanning or traditional security methods. The only effective way to stop common AI attacks, such as prompt injection and zero-day vulnerabilities, is through active runtime detection and defense. Operant AI is launching a new 3D Runtime Defense Suite aimed at protecting live cloud applications, including AI models and APIs in their native environments. Because AI applications don't operate in isolation, they need to be secured in the full context of the modern cloud application stack. The 3D Runtime Defense Suite is designed… [Continue Reading]




cure

How to Make Your WordPress Website Secure (SSL) in 6 Steps

If you've looked into search engine optimization as a promotional technique for your website, you have likely come across the advice to make your website secure (having an https:// appear in front of your URLs instead of http://). Google has been very vocal in pushing for all websites to make the move to being secure,…

The post How to Make Your WordPress Website Secure (SSL) in 6 Steps appeared first on Sugarrae.




cure

The Cure of the Cross

Fr. John Whiteford shares from Mark 8:34-9:1 on the Sunday of the Holy Cross.




cure

The Cure For Intoxication

Circumstances can be intoxicating and Fr. Barnabas says that true contentment begins in the heart not with our circumstances.




cure

The Cure for the Poison of Complaining (Sermon Sept. 11, 2016)

On this Sunday before the Elevation of the Cross, Fr. Andrew discusses the Old Testament allusion Jesus makes to the serpent lifted up in the wilderness.




cure

The Lethality of Sin and Its Cure

Fr. Apostolos Hill speaks about the Parable of the Good Samaritan and the image of the man beset by robbers on the road down to Jericho. This is about the lethal reality of sin as the Prophet Ezekiel stated "the soul that sinneth, it shall die," and the totally effective cure available in the blood of the Christ.




cure

The Causes and Cures of Spiritual Blindness

Fr. Apostolos Hill shares a homily on the Sunday of the Blind Man about the Causes and Cures of Spiritual Blindness.




cure

The Cure For Being Ineffective




cure

The Cure is Painful, But Necessary




cure

The Cure I Need




cure

A Painful Cure




cure

Ding secures spot in International Championship final

Ding Junhui beats Xu Si 9-6 to set up a final against Chris Wakelin at the International Championship in Nanjing.




cure

Australia's men and women secure Pacific Cup double

Australia claim a Pacific Cup double as their men and women both win the tournament.




cure

Fans' joy as Ipswich secure first win of season

A first win in the Premier League for 22 years lifts Town out of the relegation zone.




cure

Sailing club reaches cash target to secure future

A sailing club thanks supporters after raising £30,000 towards the cost of a new slipway.




cure

News roundup: Node causes cancer, node cures cancer!

This week's podcast (I was hoping to keep it short, but I kept talking and talking... sorry!) Libraries, frameworks, and code Cube - open-source visualization for time series data chainvas - chaining sugar for Canvas JS-Forth: Forth Interpreter in JavaScript when.js is a lightweight Promises and when() implementation (from CommonJS) MongoSpy is a MongoDB monitor that ...




cure

Do my Guardian quiz about the Cure!

Clearly one of the best British bands of the last one hundred years, on Friday the Cure are releasing their first new album for 16 years. Regular readers will know that I do the Guardian’s Thursday quiz, but today as...




cure

Hierarchical Graph-Grammar Model for Secure and Efficient Handwritten Signatures Classification

One important subject associated with personal authentication capabilities is the analysis of handwritten signatures. Among the many known techniques, algorithms based on linguistic formalisms are also possible. However, such techniques require a number of algorithms for intelligent image analysis to be applied, allowing the development of new solutions in the field of personal authentication and building modern security systems based on the advanced recognition of such patterns. The article presents the approach based on the usage of syntactic methods for the static analysis of handwritten signatures. The graph linguistic formalisms applied, such as the IE graph and ETPL(k) grammar, are characterised by considerable descriptive strength and a polynomial membership problem of the syntactic analysis. For the purposes of representing the analysed handwritten signatures, new hierarchical (two-layer) HIE graph structures based on IE graphs have been defined. The two-layer graph description makes it possible to take into consideration both local and global features of the signature. The usage of attributed graphs enables the storage of additional semantic information describing the properties of individual signature strokes. The verification and recognition of a signature consists in analysing the affiliation of its graph description to the language describing the specimen database. Initial assessments display a precision of the method at a average level of under 75%.




cure

Data dissemination and policy enforcement in multi-level secure multi-domain environments

Several challenges exist in disseminating multi-level secure (MLS) data in multi-domain environments. First, the security domains participating in data dissemination generally use different MLS labels and lattice structures. Second, when MLS data objects are transferred across multiple domains, there is a need for an agreed security policy that must be properly applied, and correctly enforced for the data objects. Moreover, the data sender may not be able to predetermine the data recipients located beyond its trust boundary. To address these challenges, we propose a new framework that enables secure dissemination and access of the data as intended by the owner. Our novel framework leverages simple public key infrastructure and active bundle, and allows domains to securely disseminate data without the need to repackage it for each domain.




cure

Robust and secure file transmission through video streaming using steganography and blockchain

File transfer is always handled by a separate service, sometimes it is a third-party service in videoconferencing. When sending files during a video session, file data flow and video stream are independent of each other. Encryption is a mature method to ensure file security. However, it still has the chance to leave footprints on the intermediate forwarding machines. These footprints can indicate that a file once passed through, some protocol-related logs give clues to the hackers' later investigation. This work proposes a file-sending scheme through the video stream using blockchain and steganography. Blockchain is used as a file slicing and linkage mechanism. Steganography is applied to embed file pieces into video frames that are continuously generated during the session. The scheme merges files into the video stream with no file transfer protocol use and no extra bandwidth consumed by the file to provide trackless file transmission during the video communication.




cure

Secure digital academic certificate verification system using blockchain

At present, there is a need for an authentic and fast approach to certificate verification. Which verifies and authenticates the certificates to reduce the extent of duplicity and time. An academic certificate is significant for students, the government, universities, and employers. Academic credentials play a vital role in the career of students. A few people manipulate academic documents for their benefit. There are cases identified where people produced fake academic certificates for jobs or higher education admission. Various research works are developing a secure model to verify genuine academic credentials. This research article proposed a new security model which contains several security algorithms such as timestamps, hash function, digital signature, steganography, and blockchain. The proposed model issues secure digital academic certificates. It enhanced security measures and automated educational certificate verification using blockchain technology. The advantages of the proposed model are automated, cost-effective, secured, traceable, accurate, and time-saving.




cure

Secure E-Examination Systems Compared: Case Studies from Two Countries

Aim/Purpose: Electronic examinations have some inherent problems. Students have expressed negative opinions about electronic examinations (e-examinations) due to a fear of, or unfamiliarity with, the technology of assessment, and a lack of knowledge about the methods of e-examinations. Background: Electronic examinations are now a viable alternative method of assessing student learning. They provide freedom of choice, in terms of the location of the examination, and can provide immediate feedback; students and institutions can be assured of the integrity of knowledge testing. This in turn motivates students to strive for deeper learning and better results, in a higher quality and more rigorous educational process. Methodology : This paper compares an e-examination system at FUT Minna Nigeria with one in Australia, at the University of Tasmania, using case study analysis. The functions supported, or inhibited, by each of the two e-examination systems, with different approaches to question types, cohort size, technology used, and security features, are compared. Contribution: The researchers’ aim is to assist stakeholders (including lecturers, invigilators, candidates, computer instructors, and server operators) to identify ways of improving the process. The relative convenience for students, administrators, and lecturer/assessors and the reliability and security of the two systems are considered. Challenges in conducting e-examinations in both countries are revealed by juxtaposing the systems. The authors propose ways of developing more effective e-examination systems. Findings: The comparison of the two institutions in Nigeria and Australia shows e-examinations have been implemented for the purpose of selecting students for university courses, and for their assessment once enrolled. In Nigeria, there is widespread systemic adoption for university entrance merit selection. In Australia this has been limited to one subject in one state, rather than being adopted nationally. Within undergraduate courses, the Nigerian scenario is quite extensive; in Australia this adoption has been slower, but has penetrated a wide variety of disciplines. Recommendations for Practitioners: Assessment integrity and equipment reliability were common issues across the two case studies, although the delivery of e-examinations is different in each country. As with any procedural process, a particular solution is only as good as its weakest attribute. Technical differences highlight the link between e-examination system approaches and pedagogical implications. It is clear that social, cultural, and environmental factors affect the success of e-examinations. For example, an interrupted electrical power supply and limited technical know-how are two of the challenges affecting the conduct of e-examinations in Nigeria. In Tasmania, the challenge with the “bring your own device” (BYOD) is to make the system operate on an increasing variety of user equipment, including tablets. Recommendation for Researchers: The comparisons between the two universities indicate there will be a productive convergence of the approaches in future. One key proposal, which arose from the analysis of the existing e-examination systems in Nigeria and Australia, is to design a form of “live” operating system that is deployable over the Internet. This method would use public key cryptography for lecturers to encrypt their questions online. Impact on Society : If institutions are to transition to e-examinations, one way of facilitating this move is by using computers to imitate other assessment techniques. However, higher order thinking is usually demonstrated through open-ended or creative tasks. In this respect the Australian system shows promise by providing the same full operating system and software application suite to all candidates, thereby supporting assessment of such creative higher order thinking. The two cases illustrate the potential tension between “online” or networked reticulation of questions and answers, as opposed to “offline” methods. Future Research: A future design proposition is a web-based strategy for a virtual machine, which is launched into candidates’ computers at the start of each e-examination. The new system is a form of BYOD externally booted e-examination (as in Australia) that is deployable over the Internet with encryption and decryption features using public key cryptography (Nigeria). This will allow lecturers to encrypt their questions and post them online while the questions are decrypted by the administrator or students are given the key. The system will support both objective and open-ended questions (possibly essays and creative design tasks). The authors believe this can re-define e-examinations as the “gold standard” of assessment.




cure

A novel IoT-enabled portable, secure automatic self-lecture attendance system: design, development and comparison

This study focuses on the importance of monitoring student attendance in education and the challenges faced by educators in doing so. Existing methods for attendance tracking have drawbacks, including high costs, long processing times, and inaccuracies, while security and privacy concerns have often been overlooked. To address these issues, the authors present a novel internet of things (IoT)-based self-lecture attendance system (SLAS) that leverages smartphones and QR codes. This system effectively addresses security and privacy concerns while providing streamlined attendance tracking. It offers several advantages such as compact size, affordability, scalability, and flexible features for teachers and students. Empirical research conducted in a live lecture setting demonstrates the efficacy and precision of the SLAS system. The authors believe that their system will be valuable for educational institutions aiming to streamline attendance tracking while ensuring security and privacy.




cure

LDSAE: LeNet deep stacked autoencoder for secure systems to mitigate the errors of jamming attacks in cognitive radio networks

A hybrid network system for mitigating errors due to jamming attacks in cognitive radio networks (CRNs) is named LeNet deep stacked autoencoder (LDSAE) and is developed. In this exploration, the sensing stage and decision-making are considered. The sensing unit is composed of four steps. First, the detected signal is forwarded to filtering progression. Here, BPF is utilised to filter the detected signal. The filtered signal is squared in the second phase. Third, signal samples are combined and jamming attacks occur by including false energy levels. Last, the attack is maliciously affecting the FC decision in the fourth step. On the other hand, FC initiated the decision-making and also recognised jamming attacks that affect the link amidst PU and SN in decision-making stage and it is accomplished by employing LDSAE-based trust model where the proposed module differentiates the malicious and selfish users. The analytic measures of LDSAE gained 79.40%, 79.90%, and 78.40%.




cure

Towards Building Secure Software Systems




cure

Framework on Hybrid Network Management System Using a Secure Mobile Agent Protocol




cure

University Procurement Officers’ Use of Technology When Seeking Information

The transition from printed to electronic sources of information has resulted in a profound change to the way procurement officers seek information. Furthermore, in the past decade there have been additional technological revolutions that are expected to further affect the procurement process. In this paper, we conduct a survey among forty nine university procurement officers in Israel to examine to what extent procurement officers have adapted to smartphones and tablets by testing how frequently officers use notebooks, smartphones, and tablets for work-related and leisure purposes. We find that while officers prefer electronic sources of information over printed sources of information, officers have not yet adapted to the later technological advances (i.e., smartphones and tablets). Notebooks are more frequently used than either smartphones or tablets for work-related and leisure purposes. One explanation behind this result is that officers are not skilled in using smartphone and tablets applications. This implies that training officers in the use of these devices may improve their performance.




cure

Secure Software Engineering: A New Teaching Perspective Based on the SWEBOK




cure

Hybrid encryption of Fernet and initialisation vector with attribute-based encryption: a secure and flexible approach for data protection

With the continuous growth and importance of data, the need for strong data protection becomes crucial. Encryption plays a vital role in preserving the confidentiality of data, and attribute-based encryption (ABE) offers a meticulous access control system based on attributes. This study investigates the integration of Fernet encryption with initialisation vector (IV) and ABE, resulting in a hybrid encryption approach that enhances both security and flexibility. By combining the advantages of Fernet encryption and IV-based encryption, the hybrid encryption scheme establishes an effective and robust mechanism for safeguarding data. Fernet encryption, renowned for its simplicity and efficiency, provides authenticated encryption, guaranteeing both the confidentiality and integrity of the data. The incorporation of an initialisation vector (IV) introduces an element of randomness into the encryption process, thereby strengthening the overall security measures. This research paper discusses the advantages and drawbacks of the hybrid encryption of Fernet and IV with ABE.




cure

Changing Multitasking Intention with Course-Based Undergraduate Research Experiences (CUREs)

Aim/Purpose: This article aimed to design and evaluate a pedagogical technique for altering students’ classroom digital multitasking behaviors. The technique we designed and evaluated is called course-based undergraduate research experience (CURE). With this technique, the students wrote a research article based on a multitasking experiment that the instructor conducted with the students. The students conducted a literature review, developed their own research questions, they analyzed experiment data, and presented results. This study evaluated the how the CURE contributed to student multitasking behavior change. Background: Multitasking is defined as doing more than one thing at a time. Multitasking is really the engagement in individual and discrete tasks that are performed in succession. Research showed that students multitasked very often during courses. Researchers indicated that this was a problem especially for online teaching, because when students went online, they tended to multitask. Extant research indicated that digital multitasking in class harmed student performance. Multiple studies suggested that students who multitasked spent more time finishing their tasks and made more mistakes. Regardless of students’ gender or GPA, students who multitasked in class performed worse and got a lower grade than those who did not. However, little is known about how to change students’ digital multitasking behaviors. In this study, we used the transtheoretical model of behavior change to investigate how our pedagogical technique (CURE) changed students’ digital multitasking behaviors. Methodology: Using a course-based undergraduate research experience design, a new classroom intervention was designed and evaluated through a content analysis of pre- and post-intervention student reflections. As part of the course-based undergraduate research experience design, the students conducted a literature review, developed their own research questions, they analyzed experiment data, and presented results. This study evaluated the how teaching using a course-based undergraduate research experience contributed to student multitasking behavior change. Transtheoretical model of behavior change was used to investigate how our pedagogical technique changed students’ digital multitasking behaviors. Contribution: The paper described how teaching using a course-based undergraduate research experience can be used in practice. Further, it demonstrated the utility of this technique in changing student digital multitasking behaviors. This study contributed to constructivist approaches in education. Other unwanted student attitudes and behaviors can be changed using this approach to learning. Findings: As a result of CURE teaching, a majority of students observed the negative aspects of multitasking and intended to change their digital multitasking behaviors. Sixty-one percent of the participants experienced attitude changes, namely increased negative attitude towards multitasking in class. This is important because research found that while both students and instructors believed off-task technology use hinders learning, their views differed significantly, with more instructors than students feeling strongly that students’ use of technology in class is a problem. Moreover, our study showed that with teaching using CURE, it is possible to move the students on the ladder of change as quickly as within one semester (13 weeks). Seventy-one percent of the students reported moving to a higher stage of change post-intervention. Recommendations for Practitioners: Faculty wishing to curb student digital multitasking behaviors may conduct in-class experimentation with multitasking and have their students write a research report on their findings. Course-based undergraduate research experiences may make the effects of digital multitasking more apparent to the students. The students may become more aware of their own multitasking behaviors rather than doing them habitually. This technique is also recommended for those instructors who would like to introduce academic careers as a potential career option to their students. Recommendation for Researchers: Researchers should explore changing other unwanted undergraduate student behaviors with course-based undergraduate experiences. Researchers may use the transtheoretical model of change to evaluate the effectiveness of techniques used to change behaviors. Impact on Society: The negative outcomes of digital multitasking are not confined to the classroom. Digital multitasking impacts productivity in many domains. If techniques such as those used in this article become more common, changes in multitasking intentions could show broad improvements in productivity across many fields. Future Research: This paper constitutes a pilot study due to the small convenience sample that is used for the study. Future research should replicate this study with larger and randomized samples. Further investigation of the CURE technique can improve its effectiveness or reduce the instructor input while attaining the same behavioral changes.




cure

The Informing Needs of Procurement Officers in Israel

Aim/Purpose: To develop and introduce a questionnaire that investigates the informing needs, information-seeking behavior, and supplier selection of procurement officers in Israel. The questionnaire’s internal consistency reliability is given. Additionally, we describe the demographic description of the procurement officers in Israel. Background: Procurement science is an important field that affects firms’ profits in the private sector and is significant to growth, innovation, sustainability, and welfare in the public sector. There is little research about the informing needs of procurement officers in general and particularly in Israel. Methodology: A quantitative questionnaire that is sent to all the procurement officers in Israel’s procuring association. Contribution: The questionnaire that is developed in this paper may be used by other researchers and practitioners to evaluate the information needs of procurement officers. Findings: The typical procurement officer is male, with a bachelor degree and is digitally proficient. Recommendations for Practitioners: The procuring side can use the questionnaire to develop better tools for obtaining information efficiently. The supplying side can use this knowledge to improve its exposure to potential customers and address its customer’s needs better. Recommendation for Researchers: The questionnaire can address theoretical questions such as how digital literacy affects the procuring process and provide empirical findings about active research areas such as supplier selection and information-seeking behavior. Future Research: Future research will examine the relationship between the various variables and demographic features to understand why specific information needs and information-seeking behaviors arise.




cure

Avast Secure Browser 75.0.1447.81 Privacy and Security Tool for PC Windows

Avast Secure Browser strives to offer a ‘private, fast and secure’ service for Windows users. Simply put, this product has been built for privacy by security experts. It boasts an array of features to make sure that all cybersecurity bases are more t...




cure

Ecoscience secures RM2m EPC contract for black pellet plant in Kuantan

KUALA LUMPUR: Integrated palm oil milling services provider Ecoscience International Bhd (EIB), via its wholly-owned subsidiary Ecoscience Manufacturing & Engineering Sdn Bhd, has accepted a letter of award (LoA) for a RM200 million engineering, procurement, and construction (EPC) contract from renewable energy company, Wilhelmina Energy Malaysia Sdn Bhd (WEMSB).

Under the LOA, EIB will provide comprehensive EPC services for the TG2 black pellet plant in Kuantan, Pahang.

These services will include design and engineering, sourcing and quality assurance of equipment and materials, plant infrastructure construction, and testing and start-up activities to support commissioning and ensure operational standards are met.

The specific terms and conditions of the EPC works will be outlined in a binding EPC agreement, which is expected by November 30, 2024.

The LoA was built upon the collaboration agreement (CA) with WEMSB in March 2024, aimed at transforming agricultural waste into sustainable energy, thereby reducing coal consumption and carbon emissions.

EIB managing director Wong Choi Ong expressed confidence in delivering a robust waste-to-energy solution that aligns with WEMSB’s vision for sustainable energy transformation.

“This project is a strategic fit for our expansion into environmental and energy efficiency sectors, building on our core strengths in constructing palm oil mills, supporting facilities, and equipment fabrication.

“As the largest project to be undertaken in our corporate history, we see this as a valuable opportunity to broaden our customer base, enhance our project portfolio, and strengthen our market position.

“The LoA will significantly boost our order book, providing our group with healthy earnings visibility over the next two years,“ he said.

The TG2 black pellet plant will convert oil palm empty fruit bunch (EFB) waste into TG2 black pellets – a drop-in coal replacement fuel.

TG2 black pellets are an advanced type of biofuel pellet, providing benefits over traditional biomass pellets, including enhanced grindability, water resistance, and higher energy density.

As a drop-in fuel, it is renewable and can be used in existing pulverised coal power plants without requiring significant infrastructure modifications.

EIB will continue supporting WEMSB as it expands TG2 black pellet plants across the region.

“Beyond the EPC scope for the TG2 black pellet plant, the CA signed in March 2024 also outlined the possibility of WEMSB outsourcing the plant’s operation and maintenance (O&M) to EIB.

“We are currently exploring this opportunity, and both parties will decide in due course.

“This potential arrangement, if materialise, would create a new, recurring revenue stream for us, complementing our current project-based work,“ Wong added.

WEMSB is a subsidiary of the Netherlands-based renewable energy company Maatschappij Wilhelmina NV, specialising in converting agricultural waste streams into sustainable energy using TG2 black pellets.

The EPC works are expected to commence by December 2024, with an expected project completion timeline of 24 months from the commencement date.




cure

Blank And Secure 7.89

Portable tool to securely delete data. Securely deleting files is required to block the recovering of deleted data. Secure deletion is possible with this program, because Blank And Secure overwrites t... [License: Freeware | Requires: 11|10|8|7 | Size: 158 KB ]




cure

13 Steps To Keeping Your Email Safe and Secure

You can’t be too vigilant when it comes to computer security. It’s way too often that we hear of a new virus or another type of malware making the rounds. Email is often used to implant malware into a computer or direct the user to a malicious website. Once the computer has been compromised or […]

The post 13 Steps To Keeping Your Email Safe and Secure appeared first on Clark Howard.





cure

Celebrate in Style: 12 Fabulous Birthday Nail Designs for a Standout Manicure

Today is the youngest you’ll ever be!




cure

11 Stunning Earthy Manicures to Sport This Virgo Season

Let Virgo season inspire your nails with a blend of earthy tones and flawless precision.




cure

Pakistan hammer China to secure semifinal spot

The Green Shirts handed 5-1 defeat in the Asian Champions Trophy




cure

Indicted D.C. Council member Trayon White secures third term despite ongoing bribery case

Ward 8 voters on Tuesday sent incumbent Trayon White back to the D.C. Council for a third term, even as the embattled lawmaker faces a federal bribery case that clouds his political future.





cure

Learn the Cure for Burned-Out Syndrome

BURNED OUT  Burnout can occur for many reasons, and is common in certain professions, including the military, clergy, and healthcare. As a busy physician with young children, Dr. Saundra Dalton-Smith was a prime candidate. She remembers the day her chaotic life simply stopped her in her tracks: “So I did what any burned-out human would do after picking up the kids from day care. I set them in front of the TV with a snack, and I lay on the floor.” She remained there for quite a while. “The smile...




cure

CertainTeed Secures Third-Party Verification of Ceiling Panels’ Environmental Performance

UL Environment has certified a pair of new Environmental Product Declarations for CertainTeed’s Symphony mineral fiber and VOC Compliant Symphony fiberglass ceiling panels.




cure

SmarterSecurity Solutions Secure 10,000-Foot Solar Farm Perimeter

With a nearly 10,000-foot perimeter to secure at its newly constructed solar farm in the Midwest, an independent power producer turned to SmarterFence and SmarterBeam solutions from SmarterSecurity Inc. Systems integrator MidCo Inc. took on the task of installing the solutions to help secure the owner’s investment and operations from intruders to allow the site to be routinely unmanned.




cure

New 'Cyber Trust Mark' Label to Promote Secure Smart Devices

The Biden administration’s new Energy Star-like labels are intended to make it easier for consumers to purchase secure IoT gear and help ward off cyberattacks.