security

Understanding Internal Information Systems Security Policy Violations as Paradoxes

Aim/Purpose: Violations of Information Systems (IS) security policies continue to generate great anxiety amongst many organizations that use information systems, partly because these violations are carried out by internal employees. This article addresses IS security policy violations in organizational settings, and conceptualizes and problematizes IS security violations by employees of organizations from a paradox perspective. Background: The paradox is that internal employees are increasingly being perceived as more of a threat to the security of organizational systems than outsiders. The notion of paradox is exemplified in four organizational contexts of belonging paradox, learning paradox, organizing paradox and performing paradox. Methodology : A qualitative conceptual framework exemplifying how IS security violations occur as paradoxes in context to these four areas is presented at the end of this article. Contribution: The article contributes to IS security management practice and suggests how IS security managers should be positioned to understand violations in light of this paradox perspective. Findings: The employee generally in the process of carrying out ordinary activities using computing technology exemplifies unique tensions (or paradoxes in belonging, learning, organizing and performing) and these tensions would generally tend to lead to policy violations when an imbalance occurs. Recommendations for Practitioners: IS security managers must be sensitive to employees tensions. Future Research: A quantitative study, where statistical analysis could be applied to generalize findings, could be useful.




security

The Effect of Rational Based Beliefs and Awareness on Employee Compliance with Information Security Procedures: A Case Study of a Financial Corporation in Israel

Aim/Purpose: This paper examines the behavior of financial firm employees with regard to information security procedures instituted within their organization. Furthermore, the effect of information security awareness and its importance within a firm is explored. Background: The study focuses on employees’ attitude toward compliance with information security policies (ISP), combined with various norms and personal abilities. Methodology: A self-reported questionnaire was distributed among 202 employees of a large financial Corporation Contribution: As far as we know, this is the first paper to thoroughly explore employees’ awareness of information system procedures, among financial organizations in Israel, and also the first to develop operative recommendations for these organizations aimed at increasing ISP compliance behavior. The main contribution of this study is that it investigates compliance with information security practices among employees of a defined financial corporation operating under rigid regulatory governance, confidentiality and privacy of data, and stringent requirements for compliance with information security procedures. Findings: Our results indicate that employees’ attitudes, normative beliefs and personal capabilities to comply with firm’s ISP, have positive effects on the firm’s ISP compliance. Also, employees’ general awareness of IS, as well as awareness to ISP within the firm, positively affect employees’ ISP compliance. Recommendations for Practitioners: This study can help information security managers identify the motivating factors for employee behavior to maintain information security procedures, properly channel information security resources, and manage appropriate information security behavior. Recommendation for Researchers: Researchers can see that corporate rewards and sanctions have significant effects on employee security behavior, but other motivational factors also reinforce the ISP’s compliance behavior. Distinguishing between types of corporations and organizations is essential to understanding employee compliance with information security procedures. Impact on Society: This study offers another level of understanding of employee behavior with regard to information security in organizations and comprises a significant contribution to the growing knowledge in this area. The research results form an important basis for IS policymakers, culture designers, managers, and those directly responsible for IS in the organization. Future Research: Future work should sample employees from another type of corporation from other fields and should apply qualitative analysis to explore other aspects of behavioral patterns related to the subject matter.




security

Security as a Solution: An Intrusion Detection System Using a Neural Network for IoT Enabled Healthcare Ecosystem

Aim/Purpose: The primary purpose of this study is to provide a cost-effective and artificial intelligence enabled security solution for IoT enabled healthcare ecosystem. It helps to implement, improve, and add new attributes to healthcare services. The paper aims to develop a method based on an artificial neural network technique to predict suspicious devices based on bandwidth usage. Background: COVID has made it mandatory to make medical services available online to every remote place. However, services in the healthcare ecosystem require fast, uninterrupted facilities while securing the data flowing through them. The solution in this paper addresses both the security and uninterrupted services issue. This paper proposes a neural network based solution to detect and disable suspicious devices without interrupting critical and life-saving services. Methodology: This paper is an advancement on our previous research, where we performed manual knowledge-based intrusion detection. In this research, all the experiments were executed in the healthcare domain. The mobility pattern of the devices was divided into six parts, and each one is assigned a dedicated slice. The security module regularly monitored all the clients connected to slices, and machine learning was used to detect and disable the problematic or suspicious devices. We have used MATLAB’s neural network to train the dataset and automatically detect and disable suspicious devices. The different network architectures and different training algorithms (Levenberg–Marquardt and Bayesian Framework) in MATLAB software have attempted to achieve more precise values with different properties. Five iterations of training were executed and compared to get the best result of R=99971. We configured the application to handle the four most applicable use cases. We also performed an experimental application simulation for the assessment and validation of predictions. Contribution: This paper provides a security solution for the IoT enabled healthcare system. The architectures discussed suggest an end-to-end solution on the sliced network. Efficient use of artificial neural networks detects and block suspicious devices. Moreover, the solution can be modified, configured and deployed in many other ecosystems like home automation. Findings: This simulation is a subset of the more extensive simulation previously performed on the sliced network to enhance its security. This paper trained the data using a neural network to make the application intelligent and robust. This enhancement helps detect suspicious devices and isolate them before any harm is caused on the network. The solution works both for an intrusion detection and prevention system by detecting and blocking them from using network resources. The result concludes that using multiple hidden layers and a non-linear transfer function, logsig improved the learning and results. Recommendations for Practitioners: Everything from offices, schools, colleges, and e-consultation is currently happening remotely. It has caused extensive pressure on the network where the data flowing through it has increased multifold. Therefore, it becomes our joint responsibility to provide a cost-effective and sustainable security solution for IoT enabled healthcare services. Practitioners can efficiently use this affordable solution compared to the expensive security options available in the commercial market and deploy it over a sliced network. The solution can be implemented by NGOs and federal governments to provide secure and affordable healthcare monitoring services to patients in remote locations. Recommendation for Researchers: Research can take this solution to the next level by integrating artificial intelligence into all the modules. They can augment this solution by making it compatible with the federal government’s data privacy laws. Authentication and encryption modules can be integrated to enhance it further. Impact on Society: COVID has given massive exposure to the healthcare sector since last year. With everything online, data security and privacy is the next most significant concern. This research can be of great support to those working for the security of health care services. This paper provides “Security as a Solution”, which can enhance the security of an otherwise less secure ecosystem. The healthcare use cases discussed in this paper address the most common security issues in the IoT enabled healthcare ecosystem. Future Research: We can enhance this application by including data privacy modules like authentication and authorisation, data encryption and help to abide by the federal privacy laws. In addition, machine learning and artificial intelligence can be extended to other modules of this application. Moreover, this experiment can be easily applicable to many other domains like e-homes, e-offices and many others. For example, e-homes can have devices like kitchen equipment, rooms, dining, cars, bicycles, and smartwatches. Therefore, one can use this application to monitor these devices and detect any suspicious activity.




security

Establishing a Security Control Framework for Blockchain Technology

Aim/Purpose: The aim of this paper is to propose a new information security controls framework for blockchain technology, which is currently absent from the National and International Information Security Standards. Background: Blockchain technology is a secure and relatively new technology of distributed digital ledgers, which is based on inter-linked blocks of transactions, providing great benefits such as decentralization, transparency, immutability, and automation. There is a rapid growth in the adoption of blockchain technology in different solutions and applications and within different industries throughout the world, such as finance, supply chain, digital identity, energy, healthcare, real estate, and the government sector. Methodology: Risk assessment and treatments were performed on five blockchain use cases to determine their associated risks with respect to security controls. Contribution: The significance of the proposed security controls is manifested in complementing the frameworks that were already established by the International and National Information Security Standards in order to keep pace with the emerging blockchain technology and prevent/reduce its associated information security risks. Findings: The analysis results showed that the proposed security controls herein can mitigate relevant information security risks in blockchain-based solutions and applications and, consequently, protect information and assets from unauthorized disclosure, modification, and destruction. Recommendations for Practitioners: The performed risk assessment on the blockchain use cases herein demonstrates that blockchain can involve security risks that require the establishment of certain measures in order to avoid them. As such, practitioners should not blindly assume that through the use of blockchain all security threats are mitigated. Recommendation for Researchers: The results from our study show that some security risks not covered by existing Standards can be mitigated and reduced when applying our proposed security controls. In addition, researchers should further justify the need for such additional controls and encourage the standardization bodies to incorporate them in their future editions. Impact on Society: Similar to any other emerging technology, blockchain has several drawbacks that, in turn, could have negative impacts on society (e.g., individuals, entities and/or countries). This is mainly due to the lack of a solid national and international standards for managing and mitigating risks associated with such technology. Future Research: The majority of the blockchain use cases in this study are publicly published papers. Therefore, one limitation of this study is the lack of technical details about these respective solutions, resulting in the inability to perform a comprehensive risk identification properly. Hence, this area will be expanded upon in our future work. In addition, covering other standardization bodies in the area of distributed ledger in blockchain technology would also prove fruitful, along with respective future design of relevant security architectures.




security

Implementing Security in IoT Ecosystem Using 5G Network Slicing and Pattern Matched Intrusion Detection System: A Simulation Study

Aim/Purpose: 5G and IoT are two path-breaking technologies, and they are like wall and climbers, where IoT as a climber is growing tremendously, taking the support of 5G as a wall. The main challenge that emerges here is to secure the ecosystem created by the collaboration of 5G and IoT, which consists of a network, users, endpoints, devices, and data. Other than underlying and hereditary security issues, they bring many Zero-day vulnerabilities, which always pose a risk. This paper proposes a security solution using network slicing, where each slice serves customers with different problems. Background: 5G and IoT are a combination of technology that will enhance the user experience and add many security issues to existing ones like DDoS, DoS. This paper aims to solve some of these problems by using network slicing and implementing an Intrusion Detection System to identify and isolate the compromised resources. Methodology: This paper proposes a 5G-IoT architecture using network slicing. Research here is an advancement to our previous implementation, a Python-based software divided into five different modules. This paper’s amplification includes induction of security using pattern matching intrusion detection methods and conducting tests in five different scenarios, with 1000 up to 5000 devices in different security modes. This enhancement in security helps differentiate and isolate attacks on IoT endpoints, base stations, and slices. Contribution: Network slicing is a known security technique; we have used it as a platform and developed a solution to host IoT devices with peculiar requirements and enhance their security by identifying intruders. This paper gives a different solution for implementing security while using slicing technology. Findings: The study entails and simulates how the IoT ecosystem can be variedly deployed on 5G networks using network slicing for different types of IoT devices and users. Simulation done in this research proves that the suggested architecture can be successfully implemented on IoT users with peculiar requirements in a network slicing environment. Recommendations for Practitioners: Practitioners can implement this solution in any live or production IoT environment to enhance security. This solution helps them get a cost-effective method for deploying IoT devices on a 5G network, which would otherwise have been an expensive technology to implement. Recommendation for Researchers: Researchers can enhance the simulations by amplifying the different types of IoT devices on varied hardware. They can even perform the simulation on a real network to unearth the actual impact. Impact on Society: This research provides an affordable and modest solution for securing the IoT ecosystem on a 5G network using network slicing technology, which will eventually benefit society as an end-user. This research can be of great assistance to all those working towards implementing security in IoT ecosystems. Future Research: All the configuration and slicing resources allocation done in this research was performed manually; it can be automated to improve accuracy and results. Our future direction will include machine learning techniques to make this application and intrusion detection more intelligent and advanced. This simulation can be combined and performed with smart network devices to obtain more varied results. A proof-of-concept system can be implemented on a real 5G network to amplify the concept further.




security

How Information Security Management Systems Influence the Healthcare Professionals’ Security Behavior in a Public Hospital in Indonesia

Aim/Purpose: This study analyzes health professionals’ information security behavior (ISB) as health information system (HIS) users concerning associated information security controls and risks established in a public hospital. This work measures ISB using a complete measuring scale and explains the relevant influential factors from the perspectives of Protection Motivation Theory (PMT) and General Deterrence Theory (GDT) Background: Internal users are the primary source of security concerns in hospitals, with malware and social engineering becoming common attack vectors in the health industry. This study focuses on HIS user behavior in developing countries with limited information security policies and resources. Methodology: The research was carried out in three stages. First, a semi-structured interview was conducted with three hospital administrators in charge of HIS implementation to investigate information security controls and threats. Second, a survey of 144 HIS users to determine ISB based on hospital security risk. Third, a semi-structured interview was conducted with 11 HIS users to discuss the elements influencing behavior and current information security implementation. Contribution: This study contributes to ISB practices in hospitals. It discusses how HIS managers could build information security programs to enhance health professionals’ behavior by considering PMT and GDT elements. Findings: According to the findings of this study, the hospital has implemented particular information security management system (ISMS) controls based on international standards, but there is still room for improvement. Insiders are the most prevalent information security dangers discovered, with certain working practices requiring HIS users to disclose passwords with others. The top three most common ISBs HIS users practice include appropriately disposing of printouts, validating link sources, and using a password to unlock the device. Meanwhile, the top three least commonly seen ISBs include transferring sensitive information online, leaving a password in an unsupervised area, and revealing sensitive information via social media. Recommendations for Practitioners: Hospital managers should create work practices that align with information security requirements. HIS managers should provide incentives to improve workers’ perceptions of the benefit of robust information security measures. Recommendation for Researchers: This study suggests more research into the components that influence ISB utilizing diverse theoretical foundations such as Regulatory Focus Theory to compare preventive and promotion motivation to enhance ISB. Impact on Society: This study can potentially improve information security in the healthcare industry, which has substantial risks to human life but still lags behind other vital sector implementations. Future Research: Future research could look into the best content and format for an information security education and training program to promote the behaviors of healthcare professionals that need to be improved based on this ISB measurement and other influential factors.




security

Factors Influencing User’s Intention to Adopt AI-Based Cybersecurity Systems in the UAE

Aim/Purpose: The UAE and other Middle Eastern countries suffer from various cybersecurity vulnerabilities that are widespread and go undetected. Still, many UAE government organizations rely on human-centric approaches to combat the growing cybersecurity threats. These approaches are ineffective due to the rapid increase in the amount of data in cyberspace, hence necessitating the employment of intelligent technologies such as AI cybersecurity systems. In this regard, this study investigates factors influencing users’ intention to adopt AI-based cybersecurity systems in the UAE. Background: Even though UAE is ranked among the top countries in embracing emerging technologies such as digital identity, robotic process automation (RPA), intelligent automation, and blockchain technologies, among others, it has experienced sluggish adoption of AI cybersecurity systems. This selectiveness in adopting technology begs the question of what factors could make the UAE embrace or accept new technologies, including AI-based cybersecurity systems. One of the probable reasons for the slow adoption and use of AI in cybersecurity systems in UAE organizations is the employee’s perception and attitudes towards such intelligent technologies. Methodology: The study utilized a quantitative approach whereby web-based questionnaires were used to collect data from 370 participants working in UAE government organizations considering or intending to adopt AI-based cybersecurity systems. The data was analyzed using the PLS-SEM approach. Contribution: The study is based on the Protection Motivation Theory (PMT) framework, widely used in information security research. However, it extends this model by including two more variables, job insecurity and resistance to change, to enhance its predictive/exploratory power. Thus, this research improves PMT and contributes to the body of knowledge on technology acceptance, especially in intelligent cybersecurity technology. Findings: This paper’s findings provide the basis from which further studies can be conducted while at the same time offering critical insights into the measures that can boost the acceptability and use of cybersecurity systems in the UAE. All the hypotheses were accepted. The relationship between the six constructs (perceived vulnerability (PV), perceived severity (PS), perceived response efficacy (PRE), perceived self-efficacy (PSE), job insecurity (JI), and resistance to change (RC)) and the intention to adopt AI cybersecurity systems in the UAE was found to be statistically significant. This paper’s findings provide the basis from which further studies can be conducted while at the same time offering critical insights into the measures that can boost the acceptability and use of cybersecurity systems in the UAE. Recommendations for Practitioners: All practitioners must be able to take steps and strategies that focus on factors that have a significant impact on increasing usage intentions. PSE and PRE were found to be positively related to the intention to adopt AI-based cybersecurity systems, suggesting the need for practitioners to focus on them. The government can enact legislation that emphasizes the simplicity and awareness of the benefits of cybersecurity systems in organizations. Recommendation for Researchers: Further research is needed to include other variables such as facilitating conditions, AI knowledge, social influence, and effort efficacy as well as other frameworks such as UTAUT, to better explain individuals’ behavioral intentions to use cybersecurity systems in the UAE. Impact on Society: This study can help all stakeholders understand what factors can increase users’ interest in investing in the applications that are embedded with security. As a result, they have an impact on economic recovery following the COVID-19 pandemic. Future Research: Future research is expected to investigate additional factors that can influence individuals’ behavioral intention to use cybersecurity systems such as facilitating conditions, AI knowledge, social influence, effort efficacy, as well other variables from UTAUT. International research across nations is also required to build a larger sample size to examine the behavior of users.




security

Software Quality and Security in Teachers' and Students' Codes When Learning a New Programming Language

In recent years, schools (as well as universities) have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to explore differences in both populations’ learning, we compared measures of software quality and security between high-school teachers and students. We collected 109 source files, written in Python by 18 teachers and 31 students, and engineered 32 features, based on common standards for software quality (PEP 8) and security (derived from CERT Secure Coding Standards). We use a multi-view, data-driven approach, by (a) using hierarchical clustering to bottom-up partition the population into groups based on their code-related features and (b) building a decision tree model that predicts whether a student or a teacher wrote a given code (resulting with a LOOCV kappa of 0.751). Overall, our findings suggest that the teachers’ codes have a better quality than the students’ – with a sub-group of the teachers, mostly males, demonstrate better coding than their peers and the students – and that the students’ codes are slightly better secured than the teachers’ codes (although both populations show very low security levels). The findings imply that teachers might benefit from their prior knowledge and experience, but also emphasize the lack of continuous involvement of some of the teachers with code-writing. Therefore, findings shed light on computer science teachers as lifelong learners. Findings also highlight the difference between quality and security in today’s programming paradigms. Implications for these findings are discussed.




security

Data Security Management in Distributed Computer Systems




security

Addiction Potential among Iranian Governmental Employees: Predicting Role of Perceived Stress, Job Security, and Job Satisfaction

Aim/Purpose: To explore the incidence of addiction potential within the Iranian public working population, describing how many Iranian public employees fall within the diagnostic categories of low, moderate, and high addiction potential. Also, to investigate the predicting role of occupational variables such as perceived stress, job security, and job satisfaction on addiction potential and belonging to low, moderate, and high addiction potential diagnostic categories. Background: Substance addiction among employees can lead to several negative consequences at the individual and organizational levels. Also, it is the fourth cause of death in Iran. However, few studies have been conducted on the topic among employees, and non among Iranian employees. Methodology: The study participants were 430 employees working in governmental offices of the North Khorasan province, Iran. Descriptive statistical analysis and multiple linear regression analysis were conducted to explore the incidence of addiction potential within the analyzed population and to investigate whether occupational variables such as perceived stress, job security, and job satisfaction predicted low, moderate, or high addiction potential. Contribution: This paper suggests that perceived stress might act as a risk factor for developing addiction, whereas job security and job satisfaction might be protective factors against the likelihood of addiction development. Findings: More than half of the sample showed moderate to high addiction potential. Perceived stress was positively related to addiction potential. Job security and job satisfaction were negatively related to addiction potential. Recommendation for Researchers: When addressing the topic of substance addiction, researchers should focus on the preventative side of investigating it; that is, addiction risk rather than already unfolded addiction. Also, researchers should be mindful of the cultural context in which studies are conducted. Future Research: Future research might investigate other relevant occupational predictors in relation to employee addiction potential, such as leadership style, work-life balance, and worktime schedule, or expand on the relevant causal chain by including personality traits such as neuroticism.




security

Defense: Taneeya Satyapanich, Modeling and Extracting Information about Cybersecurity Events from Text

Ph.D. Dissertation Defense Modeling and Extracting Information about Cybersecurity Events from Text Taneeya Satyapanich 9:30-11:30 Monday, 18 November, 2019, ITE346? People now rely on the Internet to carry out much of their daily activities such as banking, ordering food, and socializing with their family and friends. The technology facilitates our lives, but also comes with […]

The post Defense: Taneeya Satyapanich, Modeling and Extracting Information about Cybersecurity Events from Text appeared first on UMBC ebiquity.





security

Avast Secure Browser 75.0.1447.81 Privacy and Security Tool for PC Windows

Avast Secure Browser strives to offer a ‘private, fast and secure’ service for Windows users. Simply put, this product has been built for privacy by security experts. It boasts an array of features to make sure that all cybersecurity bases are more t...




security

Microsoft November 2024 Security Updates

...




security

Do Not Give Your Social Security Number at These Places

When should you give your Social Security number and when should you not? Giving out your Social Security number is something you shouldn’t do unless you know it’s absolutely, positively required for what you’re doing. Companies and institutions ask for our Social Security numbers all the time. Unfortunately, they do a mediocre-to-terrible job of securing […]

The post Do Not Give Your Social Security Number at These Places appeared first on Clark Howard.




security

Cloudflare to EU: Anti-Piracy Measures Shouldn’t Harm Privacy and Security

Cloudflare is urging the EU Commission to exclude the company from its upcoming Piracy Watch List, despite requests from several rightsholder groups for its inclusion. The American company says it's committed to addressing piracy concerns but not at the expense of user privacy and security. Instead, the European Commission should ensure that its Piracy Watch List does not become a tool for advocating policy changes.

From: TF, for the latest news on copyright battles, piracy and more.




security

Trump picks South Dakota Gov Kristi Noem as Homeland Security secretary: report

Donald Trump gestures next to South Dakota Governor Kristi Noem during a town hall campaign event in Oaks, Pennsylvania, US, October 14, 2024. — Reuters

US President-elect Donald Trump has picked South Dakota Governor Kristi Noem to serve as the next secretary of the Department of...




security

Criminals becoming security guards, says Karachi's top cop

Karachi Police Chief Javed Alam Odho speaks during an event in Karachi, on July 24, 2024. — Facebook/@ssusindhpoliceOdho calls for stricter laws to address this alarming trend.Karachi's top cop warns security company owners of action.Legislation to tighten rules for companies in...




security

Tightened security around Karachi airport troubles commuters

Police personnel stop commuters at a checkpoint on a road leading towards Karachi airport, on November 13, 2024. — ReporterLEAs close off road leading from Star Gate to Jinnah Terminal.Traffic being diverted from Model Colony to Sharea Faisal: police.New measures taken due to...




security

Massive security walls and fences transform Washington streets ahead of Election Day

Federal and local authorities ramped up security measures across downtown Washington, D.C. this weekend, with businesses installing protective barriers and federal buildings receiving additional fortification ahead of Tuesday's presidential election.




security

Chinese security services are blocking America's diplomatic efforts

American diplomatic efforts to conduct people-to-people contacts and exchanges in China are being blocked by Chinese intelligence and security services.




security

Trump team to weigh national security picks

President-elect Donald Trump's victory in Tuesday's presidential contest sets in motion the selection of key officials for a forthcoming administration through a transition team headed by some of his family and key supporters, including selections for a number of key senior national security positions.




security

Trump asks Rep. Mike Waltz, China hawk, to be his national security adviser

President-elect Donald Trump has asked U.S. Rep. Michael Waltz, a retired Army National Guard officer and war veteran, to be his national security adviser, a person familiar with the matter said Monday.




security

Trump to pick Gov. Kristi Noem to lead Homeland Security

President-elect Donald Trump is expected to select South Dakota Gov. Kristi Noem to lead the Department of Homeland Security, naming a loyal ally to carry out his border security and deportation plans.




security

Mayor downplays election unrest worries, but D.C. businesses, federal properties amp up security

D.C. Mayor Muriel Bowser said there are "no credible threats" to the District ahead of Tuesday's presidential election, despite several downtown businesses boarding up their buildings and the White House and other federal properties erecting climb-proof fencing along their perimeters.




security

Security for Trump, Vance should be placed at the forefront

The president-elect and vice president-elect undoubtedly understand that until they are inaugurated an existential threat shadows both of them.




security

Canada forces TikTok to close its offices, claiming company poses threat to national security

TikTok has been forced to close its offices in Vancouver and Toronto because Canadian security and intelligence officials said activity at the offices threatened the national security of Canada, a charge that TikTok plans to fight in court.




security

Biodiversity and Food Security – From Trade-offs to Synergies

3rd International Conference on Biodiversity and the UN Millennium Development Goals - October 29-31, 2014, Aix-en-Provence, France
 
This international conference is the third in a series, organized by the French CNRSInstitut Ecologie et Environnement (InEE) and the German Leibniz Association (WGL).
The goal is to identify science-based solutions for global sustainability focusing on the issues of biodiversity and food security. Current ecological, economic and societal challenges for development require a holistic understanding of food security and environmental management: from this perspective, biodiversity can be seen as key to overcome trade-offs and to develop synergies between the food system and the conservation of landscapes, ecosystems, and species. The conference seeks to attract scientists from basic and applied research. It involves policy makers and other stakeholders concerned with biodiversity and food security themes who are interested in developing new solutions and strategies. It will connect researchers and stakeholders from natural sciences, social sciences, economics, humanities, technology and related fields.
 




security

Biodiversity and Food Security – From Trade-offs to Synergies

The 3rd International Conference on Biodiversity and the UN Millennium Development Goals will take place between October 29-31, 2014 in Aix-en-Provence, France. under the tematic title "Biodiversity and Food Security – From Trade-offs to Synergies".

This conference is the third in a series, organized by the French CNRS Institut Ecologie et Environnement (InEE) and the German Leibniz Association (WGL). The conference is based on invited keynotes and contributed posters for any of the topics relevant to the conference theme. Keynote speakers are now confirmed, including Professor José Sarukhán, UNAM, México, and Professor Jacqueline McGlade, UNEP, Nairobi.

Across scales from genes to species, landscapes and biomes, biodiversity is an important resource for humanity. It is the key for a broad range of services provided by ecosystems. Biodiversity helps regulate the nutrient cycle, water (e.g. floods) and mitigates impacts of climate change. Biodiversity is also of direct importance for human well-being and for cultural and other values including recreation. The provisioning of clean water and diverse food supply makes it vital for all people.

Biodiversity at all levels, including the diversity of genes, species and ecosystems, is lost at alarming rates. Critical factors for these trends are habitat destruction, global warming and the uncontrolled spread of alien species. Pollution, nitrogen deposition and shifts in precipitation further affect biodiversity.

Food security faces significant challenges due to population growth, poverty, globalization, climate change and other factors. Supplying healthy food to all citizens is crucial for global development - to reach it, not only food production but also equitable access to food for all people must be improved substantially. Biodiversity loss and global food security are hence two major challenges of our time.

Linking biodiversity and food security issues from a research perspective, and seeking synergies between them is likely to generate multiple benefits for social, ecological and economic development.

Follow this link to register, submit your abstract and secure your hotel reservations.

 





security

Biodiversity and Food Security – From Trade-offs to Synergies

3rd International Conference on Biodiversity and the UN Millennium Development Goals - October 29-31, 2014, Aix-en-Provence, France
 
This international conference is the third in a series, organized by the French CNRSInstitut Ecologie et Environnement (InEE) and the German Leibniz Association (WGL).

The goal is to identify science-based solutions for global sustainability focusing on the issues of biodiversity and food security. Current ecological, economic and societal challenges for development require a holistic understanding of food security and environmental management: from this perspective, biodiversity can be seen as key to overcome trade-offs and to develop synergies between the food system and the conservation of landscapes, ecosystems, and species. The conference seeks to attract scientists from basic and applied research. It involves policy makers and other stakeholders concerned with biodiversity and food security themes who are interested in developing new solutions and strategies. It will connect researchers and stakeholders from natural sciences, social sciences, economics, humanities, technology and related fields.

http://biodiv2014.sciencesconf.org/

 







security

Cyber Security: Is Nothing Safe?

Take heed that cyber security is critical for your company—and cash flow.




security

Workplace violence and security: Are your employees safe?

Is your office prepared to deal with workplace violence? If you’re unsure or think it’s unlikely to occur, consider this: “Some 2 million American workers are victims of workplace violence each year,” states OSHA, which adds that “workplace violence can strike anywhere, and no one is immune.”




security

A Snapshot of Sustainability in the Security Industry: 2014

The time certainly is ripe for security industry businesses that are involved in sustainability. First movers are blazing a profitable path to the sustainable future and demonstrating the value of going green to companies that are preparing to dive into what will soon be the “new normal.”




security

ASSA ABLOY Shares Important Considerations for Door Security Solutions in the Built Environment

As we look ahead to the coming year, it is a good opportunity to reflect on the learning moments of 2017 ― the areas where the security industry learned, grew and shifted thinking to better provide products and solutions for buildings of all types, across all industries.




security

Do Lighting and Security Go Together?<BR>Brighten Your Bottom Line with Lighting Control

Customers never have to come home to a dark house when the lighting is turned on by this wireless controller.Widely perceived as a residential crime deterrent, lighting is a natural




security

Wind Project Takes Equipment Beyond Security

The University of Minnesota’s UMore Park wind energy research site in Rosemount, Minn. is not a typical security installation. In fact, security is only secondary to the needs of this project. Yet, Tom Fuxa, director of sales for Plymouth, Minn.-based Paragon Solutions Group Inc., saw an opportunity to apply security technology to this unique project.




security

SmarterSecurity Solutions Secure 10,000-Foot Solar Farm Perimeter

With a nearly 10,000-foot perimeter to secure at its newly constructed solar farm in the Midwest, an independent power producer turned to SmarterFence and SmarterBeam solutions from SmarterSecurity Inc. Systems integrator MidCo Inc. took on the task of installing the solutions to help secure the owner’s investment and operations from intruders to allow the site to be routinely unmanned.




security

‘Green’ in the Security Industry – Part II

Throughout the channel and around the industry, security just keeps getting greener all the time.




security

The Smart Home & Security

Traditional security and the smart home are the same. There — I’ve said it. Our industry likes to see them as different, but for someone growing up now, without any preconceptions of alarm systems, they all just look like a lot of gadgets for the home.  So what does this mean for the smart home and traditional alarm monitoring?




security

SecurityCEU.com Unveils Pro Alarm Contractor Education Program

The self-paced program is designed to prepare individuals for obtaining their alarm contractor license and serves as a Level One equivalent certification.




security

What Will 5G Do for the Security Business?

With the COVID-19 outbreak and various levels of lockdown, I’ve had a lot of time to read books and watch television. One of the technologies being heavily advertised is the 5G wireless technology, which is supposed to revolutionize cellular and internet connectivity.

But what is it going to do for our industry?




security

Interface Security Systems Introduces New Business Text Messaging App

Interface Security Systems released a new business text messaging app that allows its restaurant, retail and hospitality customers to communicate with their patrons via SMS and MMS text messages.




security

Capitalize on the New Convergence: Cyber-Physical System Security

Here’s the good news: Experts predict that within the next four or five years, there will be more than 40 billion IoT devices hard at work — improving the safety, efficiency, reliability and productivity of the world’s enterprises.




security

The Impact of Analytics on Security

Security professionals examine the evolution of analytics in security applications.




security

The New DICE Launches VPN services With Cyber Security & Automated Registration of Devices

This new service includes tunneling and full network management for cameras, NVRs, alarm panels and other devices with built-in cyber security site isolation and automated AI VPN credentialing.




security

Why a Security Technician Was Denied Compensation Despite Injuries

A worker claiming unsafe working conditions sought unemployment benefits after quitting is role as a technician with a fire services company.   




security

Why Illinois’ Biometric Privacy Act Could Create ‘Catastrophic Exposure’ for Security Companies

An Illinois state law ensures that individuals are in control of their own biometric data and prohibits private companies from collecting it unless they meet certain consent criteria.




security

Felon Ordered to Foot Bill for Victim’s Security Gear

A plaintiff entered into a negotiated plea agreement under which he agreed to reimburse his victim for a video surveillance camera and other security equipment.