Academic literature on the topic 'Information security fields'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information security fields.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Information security fields"

1

Al Reshan, Mana Saleh. "IoT-based Application of Information Security Triad." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 24 (December 21, 2021): 61–76. http://dx.doi.org/10.3991/ijim.v15i24.27333.

Full text
Abstract:
Information Security is the foremost concern for IoT (Internet of things) devices and applications. Since the advent of IoT, its applications and devices have experienced an exponential increase in numerous applications which are utilized. Nowadays we people are becoming smart because we started using smart devices like a smartwatch, smart TV, smart home appliances. These devices are part of the IoT devices. The IoT device differs widely in capacity storage, size, computational power, and supply of energy. With the rapid increase of IoT devices in different IoT fields, information security, and privacy are not addressed well. Most IoT devices having constraints in computational and operational capabilities are a threat to security and privacy, also prone to cyber-attacks. This study presents a CIA triad-based information security implementation for the four-layer architecture of the IoT devices. An overview of layer-wise threats to the IoT devices and finally suggest CIA triad-based security techniques for securing the IoT devices.
APA, Harvard, Vancouver, ISO, and other styles
2

Calkavur, Selda. "Some Public-key Cryptosystems Over Finite Fields." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 19 (April 26, 2022): 99–104. http://dx.doi.org/10.37394/23209.2022.19.10.

Full text
Abstract:
In this paper, we present two public-key cry ptosystems over finite fields. First of them is based on polynomials. The presented system also considers a digital signature algorithm. Its security is based on the difficulty of finding discrete logarithms over GF(qd+1) with sufficiently large q and d. Is is also examined along with comparison with other polynomial based public-key systems. The other public-key cryptosystem is based on linear codes. McEliece studied the first code-based public-key cryptosystem. We are inspired by McEliece system in the construction of the new system. We examine its security using linear algebra and compare it with the other code-based cryptosystems. Our new cryptosystems are too reliable in terms of security.
APA, Harvard, Vancouver, ISO, and other styles
3

Calkavur, Selda. "Some Public-key Cryptosystems Over Finite Fields." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 19 (April 26, 2022): 99–104. http://dx.doi.org/10.37394/23209.2022.19.10.

Full text
Abstract:
In this paper, we present two public-key cry ptosystems over finite fields. First of them is based on polynomials. The presented system also considers a digital signature algorithm. Its security is based on the difficulty of finding discrete logarithms over GF(qd+1) with sufficiently large q and d. Is is also examined along with comparison with other polynomial based public-key systems. The other public-key cryptosystem is based on linear codes. McEliece studied the first code-based public-key cryptosystem. We are inspired by McEliece system in the construction of the new system. We examine its security using linear algebra and compare it with the other code-based cryptosystems. Our new cryptosystems are too reliable in terms of security.
APA, Harvard, Vancouver, ISO, and other styles
4

Wen, Xiaojun, Genping Wang, Yongzhi Chen, Zhengzhong Yi, Zoe L. Jiang, and Junbin Fang. "Quantum solution for secure information transmission of wearable devices." International Journal of Distributed Sensor Networks 14, no. 5 (May 2018): 155014771877967. http://dx.doi.org/10.1177/1550147718779678.

Full text
Abstract:
Currently, wearable devices are developing prosperously in the fields of global communication electronic products and personal intelligent terminals, but their information security problem cannot be ignored. Based on quantum security communication principle and combined with the special requirements of wearable devices for information security technology, this article gives a safe transmission scheme used for protecting the sensitive information of wearable devices. This scheme is to realize the safe transmission of sensitive information about wearable devices through quantum key distribution, quantum teleportation, and other quantum information security technologies and this scheme has an unconditional security than the traditional encryption methods based on algorithmic complexity.
APA, Harvard, Vancouver, ISO, and other styles
5

Szentgáli, Gergely. "Seven Pieces of Advice to Improve Your Information Security." Academic and Applied Research in Military and Public Management Science 17, no. 3 (December 31, 2018): 171–78. http://dx.doi.org/10.32565/aarms.2018.3.12.

Full text
Abstract:
Establishing and operating an effective information security management system within an organization is never an easy job. Organizational culture, management support, budget restrictions and many other factors affect the security efforts of a company. Although the information security academic literature is growing, there is no clear guidance in several fields of the topic, therefore the life-tested best practices can be a useful aid in operating such systems. The aim of this paper is to provide a short guidance regarding the basic steps of a beginner information security manager, and maybe to give some useful thoughts to the experienced officers, as well.
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Harbi, Ibrahim Sulaiman. "The Information Security in Kingdom Of Saudi Arabia." Ulum Islamiyyah 22 (December 29, 2017): 89–102. http://dx.doi.org/10.33102/uij.vol22no0.12.

Full text
Abstract:
The information security in our time is the fundamental national security substrate, especially with the need for modern electronic services in various fields, however, the need for a protection of her which is called information security is considered most important topic. This research is contribution as a statement of information security and its relationship to national security, explanation of the basic elements of information security and its threats, analyses the prevention of information security crimes by a statement varieties of information security criminals and then release the protection of information security in the Kingdom of Saudi Arabia. The researcher has used the descriptive study by following the analytical method by collecting information on each topic and related law then analyzed them. The research has divided into four chapters: the first chapter which is the subject of research, and the second chapter is the concept of information security and its relationship to national security, the third chapter which the basic elements of information security and its threats, the fourth chapter is the prevention of information security crimes، then the results of the study and recommendations.
APA, Harvard, Vancouver, ISO, and other styles
7

Tershukov, Dmitry. "Analysis of Modern Information Security Threats." NBI Technologies, no. 3 (January 2019): 6–12. http://dx.doi.org/10.15688/nbit.jvolsu.2018.3.1.

Full text
Abstract:
In the modern world, knowledge and awareness have become the most important products, services have taken the lead, the global information space is rapidly developing, while modern information technologies represent not only new opportunities in solving various problems, but also create fundamentally new challenges and threats. The emergence of new information technologies and systems, the development and expansion of the functions of social networks, the introduction of a variety of services in social networks and their algorithmization have created tools for turning the historical process of human development from uncontrollable to manageable and even projected, there are opportunities to create a reality that does not correspond to reality, to influence the mass consciousness of millions of people around the world. Currently, specialists in the field of information security require knowledge and skills that are at the intersection of various fields of knowledge: information technology, psychology, political science, law, criminology. Meanwhile, graduates of technical universities do not always have sufficient knowledge and skills to properly assess the actions of the violator of information security, to understand the political component of the problems of information security. Graduates of humanities universities are not sufficiently versed in the specifics of threats to information security, the physical nature of the channels of information leakage. The way out of this situation can be the use of a system of retraining and advanced training of specialists in information protection.
APA, Harvard, Vancouver, ISO, and other styles
8

Zou, Shihong, Yanhong Xu, Honggang Wang, Zhouzhou Li, Shanzhi Chen, and Bo Hu. "A Survey on Secure Wireless Body Area Networks." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/3721234.

Full text
Abstract:
Combining tiny sensors and wireless communication technology, wireless body area network (WBAN) is one of the most promising fields. Wearable and implantable sensors are utilized for collecting the physiological data to achieve continuously monitoring of people’s physical conditions. However, due to the openness of wireless environment and the significance and privacy of people’s physiological data, WBAN is vulnerable to various attacks; thus, strict security mechanisms are required to enable a secure WBAN. In this article, we mainly focus on a survey on the security issues in WBAN, including securing internal communication in WBAN and securing communication between WBAN and external users. For each part, we discuss and identify the security goals to be achieved. Meanwhile, relevant security solutions in existing research on WBAN are presented and their applicability is analyzed.
APA, Harvard, Vancouver, ISO, and other styles
9

Xu, Ning, and Dong Mei Zhao. "The Research of Information Security Risk Assessment Method Based on AHP." Advanced Materials Research 187 (February 2011): 575–80. http://dx.doi.org/10.4028/www.scientific.net/amr.187.575.

Full text
Abstract:
Information security risk assessment is one important part of the security engineering in information system. It has been the focus of the research in the world wide information security fields. This paper designs and realizes a new model of information security risk assessment based on AHP method. In this case, In order to estimate the network security risk by AHP method, firstly should identify the most related factors and establish the threaten identification Hierarchical Model and Vulnerability Identification Hierarchical Model for information security risks. Then, compare every two elements to determine the relative importance of each element. Finally, judge the comprehensive weight for each element. The study of the case shows that the method can be easily used to the risk assessment of the network security. The results are in accord with the reality.
APA, Harvard, Vancouver, ISO, and other styles
10

Kompantseva, Larysa. "Gender Perspectives of the Information Security." Information Security of the Person, Society and State, no. 26 (2019): 115–25. http://dx.doi.org/10.51369/2707-7276-2019-2-14.

Full text
Abstract:
The article defines the conceptual apparatus of the metalanguage of gender studies in the field of information security and solves a number of problems, in particular: the history of gender studies examined through the prism of the society’s information organization; proposes the definition of a number of gender concepts relevant to information security; substantiates gender perception characteristic of security and defense sector institutions as an important condition for ensuring information security. Gender studies is considered as a broad scientific field, a research practice in which new opportunities are realized related to the use of a gender approach to the analysis of power interdependencies and hierarchies, power structures, their subordination and domination. The emphasis is placed upon the fact that gender paradigm mainstreaming responds to one of the most important trends of the 21st century – ensuring tolerant attitudes towards different styles of scientific thinking, providing for understanding of interdisciplinary relations as a trans paradigm phenomenon (the coexistence of several scientific paradigms that determine methodological pluralism in the course of research, the activities conducted at the intersection of sciences, involving the use of methods and comparison of the results of two or more branches of scientific knowledge) and methods of meta paradigm phenomenon (the creation of an all-encompassing, unifying doctrine capable of replacing the confrontation of scientific fields with their synthesis) The theory of gender studies has led to the emergence of a new philosophical and communicative paradigm of security and defense institutions focused on gender sensitivity, that is meeting specific needs of diverse groups of men and women, boys and girls in the field of security and justice, and promotes the full and equal participation of women and men in this activity. Key words: gender communication, gender sensitivity, gender studies, gender prospective.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Information security fields"

1

Kahrs, Katharina. "Share Computing Protocols over Fields and Rings." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9001.

Full text
Abstract:

In this thesis, we explain linear secret sharing schemes, in particular multiplicative threshold linear secret sharing schemes, over fields and rings in a compact and concise way. We explain two characterisations of linear secret sharing schemes, and in particular, we characterise threshold linear secret sharing schemes. We develop an algorithm to generate all multiplicative $(t+1)$-out-of-$n$ threshold linear secret sharing schemes over a field $mathbb{Z}sb{p}$. For the ring $mathbb{Z}sb{2sp{32}}$, we explain the generation of secret sharing schemes for threshold access structures and prove the non-existence of $(t+1)$-out-of-$n$ threshold linear secret sharing schemes with $n > t+1$.

APA, Harvard, Vancouver, ISO, and other styles
2

Gutmann, Peter. "The Design and Verification of a Cryptographic Security Architecture." Thesis, University of Auckland, 2000. http://hdl.handle.net/2292/2310.

Full text
Abstract:
A cryptographic security architecture constitutes the collection of hardware and software which protects and controls the use of encryption keys and similar cryptovariables. This thesis presents a design for a portable, flexible high-security architecture based on a traditional computer security model. Behind the API it consists of a kernel implementing a reference monitor which controls access to security-relevant objects and attributes based on a configurable security policy. Layered over the kernel are various objects which abstract core functionality such as encryption and digital signature capabilities, certificate management and secure sessions and data enveloping (email encryption). The kernel itself uses a novel design which bases its security policy on a collection of filter rules enforcing a cryptographic module-specific security policy. Since the enforcement mechanism (&e kernel) is completely independent of the policy database (the filter rules), it is possible to change the behaviour of the architecture by updating the policy database without having to make any changes to the kernel itself. This clear separation of policy and mechanism contrasts with current cryptographic security architecture approaches which, if they enforce controls at all, hardcode them into the implementation, making it difficult to either change the controls to meet application-specific requirements or to assess and verify them. To provide assurance of the correctness of the implementation, this thesis presents a design and implementation process which has been selected to allow the implementation to be verified in a manner which can reassure an outsider that it does indeed function as required. In addition to producing verification evidence which is understandable to the average user, the verification process for an implementation needs to be fully automated and capable of being taken down to the level of running code, an approach which is currently impossible with traditional methods. The approach presented here makes it possible to perform verification at this level, something which had previously been classed as "beyond Al" (that is, not achievable using any known technology). The versatility of the architecture presented here has been proven through its use in implementations ranging from l6-bit microcontrollers through to supercomputers, as well as a number of unusual areas such as security modules in ATMs and cryptographic coprocessors for general-purpose computers.
Note: Updated version of the thesis now published as Gutmann, P (2004). Cryptographic security architecture: design and verification. New York: Springer. ISBN 9780387953876.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Yang. "An empirical study on the relationship between identity-checking steps and perceived trustworthiness in online banking system use : submitted in partial fulfilment of the requirements for the Degree of Master of Information Sciences in Information Technology." Massey University, 2009. http://hdl.handle.net/10179/982.

Full text
Abstract:
Online banking systems have become more common and widely used in daily life, bringing huge changes in modern banking transaction activities and giving us a greater opportunity to access the banking system anytime and anywhere. At the same time, however, one of the key challenges that still remain is to fully resolve the security concerns associated with the online banking system. Many clients feel that online banking is not secure enough, and to increase its security levels, many banks simply add more identity-checking steps or put on more security measures to some extent to give users the impression of a secure online banking system. However, this is easier to be said than done, because we believe that more identity-checking steps could compromise the usability of the online banking system, which is an inevitable feature in design of usable and useful online banking systems. Banks can simply enhance their security level with more sophisticated technologies, but this does not seem to guarantee the online banking system is in line with its key usability concern. Therefore, the research question raised in this thesis is to establish the relationships between usability, security and trustworthiness in the online banking system. To demonstrate these relationships, three experiments were carried out using the simulation of an online banking logon procedure to provide a similar online banking experience. Post questionnaires were used to measure the three concepts, i.e. usability, security and trustworthiness. The resulting analyses revealed that simply adding more identity-checking steps in the online banking system did not improve the customers? perceived security and trustworthiness, nor the biometric security technique (i.e., fingerprints) did enhance the subjective ratings on the perceived security and trustworthiness. This showed that the systems designer needs to be aware that the customer?s perception of the online banking system is not the same as that conceived from a technical standpoint.
APA, Harvard, Vancouver, ISO, and other styles
4

Steele, Aaron. "Ontological lockdown assessment : a thesis presented in partial fulfilment of the requirements for the degree of Master of Science in Information Technology at Massey University, Palmerston North, New Zealand." Massey University, 2008. http://hdl.handle.net/10179/946.

Full text
Abstract:
In order to keep shared access computers secure and stable system administrators resort to locking down the computing environment in order to prevent intentional and unintentional damage by users. Skilled attackers are often able to break out of locked down computing environments and intentionally misuse shared access computers. This misuse has resulted in cases of mass identity theft and fraud, some of which have had an estimated cost ranging in millions. In order to determine if it is possible to break out of locked down computing environments an assessment method is required. Although a number of vulnerability assessment techniques exist, none of the existing techniques are sufficient for assessing locked down shared access computers. This is due to the existing techniques focusing on traditional, application specific, software vulnerabilities. Break out path vulnerabilities (which are exploited by attackers in order to break out of locked down environments) differ substantially from traditional vulnerabilities, and as a consequence are not easily discovered using existing techniques. Ontologies can be thought of as a modelling technique that can be used to capture expert knowledge about a domain of interest. The method for discovering break out paths in locked down computers can be considered expert knowledge in the domain of shared access computer security. This research proposes an ontology based assessment process for discovering break out path vulnerabilities in locked down shared access computers. The proposed approach is called the ontological lockdown assessment process. The ontological lockdown assessment process is implemented against a real world system and successfully identifies numerous break out path vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
5

Xiao, Jiaxi. "Information theoretic approach in detection and security codes." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43620.

Full text
Abstract:
Signal detection plays a critical role in realizing reliable transmission through communication systems. In this dissertation, by applying information theoretic approach, efficient detection schemes and algorithms are designed for three particular communication systems. First, a computation efficient coding and detection algorithm is developed to decode two dimensional inter-symbol interference (ISI) channels. The detection algorithm significantly reduces the computation complexity and makes the proposed equalization algorithm applicable. A new metric, the post-detection mutual information (PMI), is established to quantify the ultimate information rate between the discrete inputs and the hard detected output. This is the first time that the information rate loss caused by the hard mapping of the detectors is considered. Since the hard mapping step in the detector is irreversible, we expect that the PMI is reduced compared to the MI without hard mapping. The conclusion is confirmed by both the simulation and the theoretic results. Random complex field code is designed to achieve the secrecy capacity of wiretap channel with noiseless main channel and binary erasure eavesdroppers' channel. More importantly, in addition to approaching the secrecy capacity, RCFC is the first code design which provides a platform to tradeoff secrecy performance with the erasure rate of the eavesdropper's channel and the secrecy rate.
APA, Harvard, Vancouver, ISO, and other styles
6

Pourghomi, Pardis. "Managing near field communication (NFC) payment applications through cloud computing." Thesis, Brunel University, 2014. http://bura.brunel.ac.uk/handle/2438/8538.

Full text
Abstract:
The Near Field Communication (NFC) technology is a short-range radio communication channel which enables users to exchange data between devices. NFC provides a contactless technology for data transmission between smart phones, Personal Computers (PCs), Personal Digital Assistants (PDAs) and such devices. It enables the mobile phone to act as identification and a credit card for customers. However, the NFC chip can act as a reader as well as a card, and also be used to design symmetric protocols. Having several parties involved in NFC ecosystem and not having a common standard affects the security of this technology where all the parties are claiming to have access to client’s information (e.g. bank account details). The dynamic relationships of the parties in an NFC transaction process make them partners in a way that sometimes they share their access permissions on the applications that are running in the service environment. These parties can only access their part of involvement as they are not fully aware of each other’s rights and access permissions. The lack of knowledge between involved parties makes the management and ownership of the NFC ecosystem very puzzling. To solve this issue, a security module that is called Secure Element (SE) is designed to be the base of the security for NFC. However, there are still some security issues with SE personalization, management, ownership and architecture that can be exploitable by attackers and delay the adaption of NFC payment technology. Reorganizing and describing what is required for the success of this technology have motivated us to extend the current NFC ecosystem models to accelerate the development of this business area. One of the technologies that can be used to ensure secure NFC transactions is cloud computing which offers wide range advantages compared to the use of SE as a single entity in an NFC enabled mobile phone. We believe cloud computing can solve many issues in regards to NFC application management. Therefore, in the first contribution of part of this thesis we propose a new payment model called “NFC Cloud Wallet". This model demonstrates a reliable structure of an NFC ecosystem which satisfies the requirements of an NFC payment during the development process in a systematic, manageable, and effective way.
APA, Harvard, Vancouver, ISO, and other styles
7

Blommé, Johan. "Evaluation of biometric security systems against artificial fingers." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1145.

Full text
Abstract:

Verification of users’ identities are normally carried out via PIN-codes or ID- cards. Biometric identification, identification of unique body features, offers an alternative solution to these methods.

Fingerprint scanning is the most common biometric identification method used today. It uses a simple and quick method of identification and has therefore been favored instead of other biometric identification methods such as retina scan or signature verification.

In this report biometric security systems have been evaluated based on fingerprint scanners. The evaluation method focuses on copies of real fingers, artificial fingers, as intrusion method but it also mentions currently used algorithms for identification and strengths and weaknesses in hardware solutions used.

The artificial fingers used in the evaluation were made of gelatin, as it resembles the surface of human skin in ways of moisture, electric resistance and texture. Artificial fingers were based on ten subjects whose real fingers and artificial counterpart were tested on three different fingerprint scanners. All scanners tested accepted artificial fingers as substitutes for real fingers. Results varied between users and scanners but the artificial fingers were accepted between about one forth and half of the times.

Techniques used in image enhancement, minutiae analysis and pattern matching are analyzed. Normalization, binarization, quality markup and low pass filtering are described within image enhancement. In minutiae analysis connectivity numbers, point identification and skeletonization (thinning algorithms) are analyzed. Within pattern matching, direction field analysis and principal component analysis are described. Finally combinations of both minutiae analysis and pattern matching, hybrid models, are mentioned.

Based on experiments made and analysis of used techniques a recommendation for future use and development of fingerprint scanners is made.

APA, Harvard, Vancouver, ISO, and other styles
8

Nordström, Daniel, and David Nyqvist. "Near Field Communication : En studie av säkerhetsaspekternas påverkan för mobila betalningar." Thesis, Uppsala universitet, Institutionen för informatik och media, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-179609.

Full text
Abstract:
Near Field Communication (NFC) är en teknik som möjliggjort utvecklingen av vardagliga betalningar med hjälp av mobiltelefonen. I Sverige är betalningar med NFC-tekniken i mobiltelefoner fortfarande i introduktionsfasen. För att denna teknik ska ha möjlighet att fungera som ett komplement till redan befintliga betallösningar, granskas därför möjligheten för NFC-teknik som betallösningsmetod med inriktning på säkerhetsaspekter. Syftet med uppsatsen är att granska säkerhetsaspekter för NFC-teknik som mobil betallösningsmetod samt analysera dessa aspekter för att få djupare kunskap för NFC-teknologins möjligheter. Kunskapen har erhållits genom en litteraturstudie samt kompletterande av en intervju för att få bredd i informationsbehandlingen. Resultatet av studien visar att NFC-teknologin som betallösningsmetod kan påverkas av ett antal säkerhetsaspekter. För att NFC-tekniken skall nå en bredd i marknaden måste flertalet aktörer samarbeta för en standardisering i användandet av tekniken.
Near Field Communication (NFC) is a technology that enables the development of payments using the mobile phone. In Sweden, payments with NFC technology in mobile phones are still in the introductory phase. To ensure that the proposed technology can be utilized as a complement to existing payment options, one must consider the safety aspects of said construct. In this thesis we will review the technology with a focus on safety aspects. The purpose of this thesis is to review the security aspects of NFC technology for mobile payment and analyze these aspects in order to gain deeper knowledge of NFC technology opportunities. The knowledge has been obtained through a literature review, complemented by an interview to get a wide knowledge about the information. The results of the study show that NFC technology as a payment option can be affected by a number of safety issues. To ensure a viable market share, operators utilizing NFC technology must cooperate to standardize the implementation.
APA, Harvard, Vancouver, ISO, and other styles
9

Швець, Валеріян Анатолійович, and Тетяна Вікторівна Мелешко. "Напрями забезпечення доступності і цілісності інформації глобальних навігаційних супутникових систем." Thesis, RS Global Sp. z O.O. Warsaw, Poland, 2020. http://er.nau.edu.ua/handle/NAU/41256.

Full text
Abstract:
Based on the analysis of reports and literature on the vulnerability of global navigation satellite systems, the robot presents a developed threat model and an intruder model for navigation information. Using the developed models, organizational and technical measures to protect information are determined. Directions for improving consumer equipment to jamming are given. Organizational measures for protecting against jamming are described.
APA, Harvard, Vancouver, ISO, and other styles
10

Hassanzadeh, Reza. "A secure framework and related protocols for ubiquitous access to electronic health records using Java sim cards." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/37589/1/Reza_Hassanzadeh_Thesis.pdf.

Full text
Abstract:
Ubiquitous access to patient medical records is an important aspect of caring for patient safety. Unavailability of sufficient medical information at the point-ofcare could possibly lead to a fatality. The U.S. Institute of Medicine has reported that between 44,000 and 98,000 people die each year due to medical errors, such as incorrect medication dosages, due to poor legibility in manual records, or delays in consolidating needed information to discern the proper intervention. In this research we propose employing emergent technologies such as Java SIM Cards (JSC), Smart Phones (SP), Next Generation Networks (NGN), Near Field Communications (NFC), Public Key Infrastructure (PKI), and Biometric Identification to develop a secure framework and related protocols for ubiquitous access to Electronic Health Records (EHR). A partial EHR contained within a JSC can be used at the point-of-care in order to help quick diagnosis of a patient’s problems. The full EHR can be accessed from an Electronic Health Records Centre (EHRC) when time and network availability permit. Moreover, this framework and related protocols enable patients to give their explicit consent to a doctor to access their personal medical data, by using their Smart Phone, when the doctor needs to see or update the patient’s medical information during an examination. Also our proposed solution would give the power to patients to modify the Access Control List (ACL) related to their EHRs and view their EHRs through their Smart Phone. Currently, very limited research has been done on using JSCs and similar technologies as a portable repository of EHRs or on the specific security issues that are likely to arise when JSCs are used with ubiquitous access to EHRs. Previous research is concerned with using Medicare cards, a kind of Smart Card, as a repository of medical information at the patient point-of-care. However, this imposes some limitations on the patient’s emergency medical care, including the inability to detect the patient’s location, to call and send information to an emergency room automatically, and to interact with the patient in order to get consent. The aim of our framework and related protocols is to overcome these limitations by taking advantage of the SIM card and the technologies mentioned above. Briefly, our framework and related protocols will offer the full benefits of accessing an up-to-date, precise, and comprehensive medical history of a patient, whilst its mobility will provide ubiquitous access to medical and patient information everywhere it is needed. The objective of our framework and related protocols is to automate interactions between patients, healthcare providers and insurance organisations, increase patient safety, improve quality of care, and reduce the costs.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Information security fields"

1

1941-, Bruen Aiden A., Wehlau David L. 1960-, and Canadian Mathematical Society. Special Session on Error Control Codes, Information Theory, and Applied Cryptography, eds. Error-correcting codes, finite geometries, and cryptography: Conference on Error-control Codes, Information Theory, and Applied Cryptography, December 5-6, 2007, Fields Institute, Toronto, Ontario, Canada : Canadian Mathematical Society Special Session on Error Control Codes, Information Theory, and Applied Cryptography, Dec 8-10, 2007, CMS Winter Meeting, London, Ontario, Canada. Providence, R.I: American Mathematical Society, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Romanova, Yuliya, Pavel Muzychkin, Nataliya Zhenova, Lyudmila D'yakonova, Galina Eydlina, Konstantin Miloradov, Svetlana Vokina, and Al'bina Antonenkova. Modern information and communication technologies for successful business. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1073931.

Full text
Abstract:
The textbook contains a verified set of materials about the opportunities and technologies of doing business on the global Internet. Technologies and means of the electronic market, electronic cash flows and possibilities of their management are considered. Special attention is paid to the issues of site construction: tips and step-by-step instructions are given for the direct creation of a site, setting a task and implementing it to order, as well as numerous opportunities and tools for promoting a site on the web. The basics of the security of electronic business activity are presented. The material is presented in a clear and accessible form. For students and undergraduates of various profiles, studying in the fields of "Economics" and "Management", graduate students, as well as entrepreneurs who want to promote their business via the Internet.
APA, Harvard, Vancouver, ISO, and other styles
3

Shitov, Viktor. Information content management. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1842520.

Full text
Abstract:
The textbook describes methods of ensuring quality and compliance with legislation when publishing content, the legislation of the Russian Federation in the field of intellectual property, rules for the use of information materials on the Internet, general principles of differentiation of access rights to information on the Internet, ensuring information security, types of spam and unwanted content, methods and means of combating them, technologies for managing, processing and modifying content, technologies for transmitting information on the network, duties of a moderator of a website / forum / resource, and much more. Meets the requirements of the federal state educational standards of secondary vocational education of the latest generation. For students of secondary vocational education institutions. It can be used when mastering the professional module "Information resources Administration" in the discipline "Information content Management" for the specialty "Information systems and programming" when mastering the qualification "Information Resources Specialist".
APA, Harvard, Vancouver, ISO, and other styles
4

Russkevich, Evgeniy. Criminally-legal counteraction to crimes committed through the use of modern information and communication technologies. ru: INFRA-M Academic Publishing LLC., 2017. http://dx.doi.org/10.12737/24712.

Full text
Abstract:
The publication is devoted to the investigation of the criminal law aspects of countering crimes committed through the use of modern information and communication technologies (computers, information and communication networks, including the Internet). We analyze the current legislation, the theoretical development and practice in cases of information crimes. The manual complies with federal state educational standards of higher professional education in the field of "Law Enforcement", "Legal provision of national security" and "Jurisprudence".
APA, Harvard, Vancouver, ISO, and other styles
5

Hodakov, Viktor. Natural environment and human activity. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1194879.

Full text
Abstract:
The monograph describes the influence of the natural environment and its natural and climatic conditions on human life and socio-economic systems, which are considered as regions, territories of Eastern Europe. The natural and climatic factors (PCFs) characterizing the natural environment of Eastern Europe (Russia and Ukraine) and Western (England and France) are considered. Eastern Europe is in the zone of negative PCFs, close to critical. The influence of the PCF on the vital activity of the state and man is systematically described: mentality, systemic thinking, human health, ensuring the safety of life, sustainability of development, agricultural production, housing and communal services, construction, industry, information security, parrying of the PCF, the influence of the PCF on the development of science and education. Climate change trends at the global and regional levels are also described. Estimates of the impact of the PCF on the economy of the state and regions, recommendations on the adaptation of the economy to the PCF, the relationship of information security and information about the PCF, information technologies for assessing the sustainability of development and investment attractiveness of territories, conceptual foundations of state anti-crisis management of socio-economic systems are presented. It is intended for researchers, teachers, postgraduates, students specializing in the field of life safety, computer ecological and economic monitoring. It can be used to educate society in the field of the natural environment and its natural and climatic conditions.
APA, Harvard, Vancouver, ISO, and other styles
6

Fedotova, Elena. Computer science. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1200564.

Full text
Abstract:
The basic concepts in the field of computer science are given, the main categories of computer hardware and software, the principles of building the architecture of computer systems are described. The structural organization of data and the basics of algorithmization, types of software, classification of information technologies and systems, modern document management and office management automation systems, the basics of building artificial intelligence systems, geoinformation systems, virtual reality systems, as well as the basics of information security are considered. Meets the requirements of the federal state educational standards of higher education of the latest generation. It is intended for students of higher technical educational institutions studying the discipline "Computer Science", for teachers and specialists working in this field, as well as for those who study this subject area independently.
APA, Harvard, Vancouver, ISO, and other styles
7

Russkevich, Evgeniy. Criminal law and "digital crime": problems and solutions. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1840963.

Full text
Abstract:
The monograph is devoted to a complex of theoretical and applied problems of adapting the domestic mechanism of criminal law protection to the "digitalization" of crime in the conditions of the formation of the information society. Along with general theoretical issues, foreign criminal legislation and provisions of international law are being thoroughly analyzed. The paper presents an updated criminal-legal description of crimes in the field of computer information, including novelties of Russian criminal legislation - unlawful impact on the critical information infrastructure of the Russian Federation (Article 2741 of the Criminal Code of the Russian Federation), developed proposals for the differentiation of criminal liability for attacks on the security of computer data and systems, developed scientifically sound recommendations for qualification. In the second edition, the issues of differentiation of criminal liability for digital crimes by means of the General and Special Parts of the Criminal Code of the Russian Federation are separately worked out. The analysis of the problems of qualification of crimes in the field of computer information, as well as other crimes committed using information and communication technologies, outside of Chapter 28 of the Criminal Code of the Russian Federation. Taking into account the results obtained, a draft resolution of the Plenum of the Supreme Court of the Russian Federation "On judicial practice in cases of crimes in the field of computer information" is presented. It is intended for researchers, teachers, practicing lawyers, students and postgraduates of law schools and faculties.
APA, Harvard, Vancouver, ISO, and other styles
8

Information sharing and national special security events: Preparing for the 2008 presidential conventions : field hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, August 10, 2007. Washington: U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United, States Congress House Committee on Homeland Security Subcommittee on Intelligence Information Sharing and Terrorism Risk Assessment. Information sharing and national special security events: Preparing for the 2008 presidential conventions : field hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, August 10, 2007. Washington: U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Office, General Accounting. Social security: Issues relating to agency field offices : briefing report to the chairman, Subcommittee on Social Security, Committee on Ways and Means, House of Representatives. Washington, D.C: The Office, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Information security fields"

1

Seo, Hwajeong, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, and Howon Kim. "Improved Modular Multiplication for Optimal Prime Fields." In Information Security Applications, 150–61. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15087-1_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yang, Bo-Yin, and Jiun-Ming Chen. "Theoretical Analysis of XL over Small Fields." In Information Security and Privacy, 277–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-27800-9_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Doche, Christophe. "Redundant Trinomials for Finite Fields of Characteristic 2." In Information Security and Privacy, 122–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11506157_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Miyamoto, Eito, Takeshi Sugawara, and Kazuo Sakiyama. "Efficient Software Implementation of Modular Multiplication in Prime Fields on TI’s DSP TMS320C6678." In Information Security Applications, 261–73. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93563-8_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Aoki, Kazumaro, Fumitaka Hoshino, and Tetsutaro Kobayashi. "A Cyclic Window Algorithm for ECC Defined over Extension Fields." In Information and Communications Security, 62–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45600-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kwon, Soonhak. "Efficient Tate Pairing Computation for Elliptic Curves over Binary Fields." In Information Security and Privacy, 134–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11506157_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fan, Xuejun, Song Tian, Bao Li, and Weixuan Li. "Constructing Hyperelliptic Covers for Elliptic Curves over Quadratic Extension Fields." In Information Security and Privacy, 630–38. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21548-4_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Meyer, Andreas, Stefan Neis, and Thomas Pfahler. "First Implementation of Cryptographic Protocols Based on Algebraic Number Fields." In Information Security and Privacy, 84–103. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-47719-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Großschädl, Johann, and Guy-Armand Kamendje. "Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2 m )." In Information Security Applications, 227–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24591-9_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lenstra, Arjen K. "Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fields." In Information Security and Privacy, 126–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0027920.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Information security fields"

1

Zhou, Shihai, and Xiangjiang Lu. "Fingerprint Identification and its Applications in Information Security Fields." In 2010 International Conference of Information Science and Management Engineering. ISME 2010. IEEE, 2010. http://dx.doi.org/10.1109/isme.2010.186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bioglio, V., T. Bianchi, and E. Magli. "Secure compressed sensing over finite fields." In 2014 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2014. http://dx.doi.org/10.1109/wifs.2014.7084326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhe Li, Zhenfu Cao, and Xiaolei Dong. "Generalized Cipolla-Lehmer Root Computation in Finite Fields." In ICINS 2014 - 2014 International Conference on Information and Network Security. Institution of Engineering and Technology, 2014. http://dx.doi.org/10.1049/cp.2014.1281.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Varna, Avinash L., and Min Wu. "Modeling content fingerprints using markov random fields." In 2009 First IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2009. http://dx.doi.org/10.1109/wifs.2009.5386471.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Khodaiemehr, Hassan, Daniel Panario, and Mohammad-Reza Sadeghi. "Modular Construction a Lattices from Cyclotomic Fields and their Applications in Information Security." In 2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC). IEEE, 2018. http://dx.doi.org/10.1109/iscisc.2018.8546855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vasseur, Marion, Xiuzhen Chen, Rida Khatoun, and Ahmed Serhrouchni. "Survey on packet marking fields and information for IP traceback." In 2015 International Conference on Cyber Security of Smart cities, Industrial Control System and Communications (SSIC). IEEE, 2015. http://dx.doi.org/10.1109/ssic.2015.7245326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Samardjiska, Simona, Yanling Chen, and Danilo Gligoroski. "Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fields." In 2011 7th International Conference on Information Assurance and Security (IAS). IEEE, 2011. http://dx.doi.org/10.1109/isias.2011.6122839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lima, J. B., R. M. Campello de Souza, and D. Panario. "Security of public-key cryptosystems based on Chebyshev polynomials over prime finite fields." In 2008 IEEE International Symposium on Information Theory - ISIT. IEEE, 2008. http://dx.doi.org/10.1109/isit.2008.4595307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Teng, Jihong, Xiaoying Huang, and Weiming Zhang. "Some Results on the Degenerate Criterion of Cryptographic Functions over Finite Fields." In 2010 International Conference on Multimedia Information Networking and Security. IEEE, 2010. http://dx.doi.org/10.1109/mines.2010.186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Qiang Bian, Min Zhang, Lihua Wang, and Fangjun Zhou. "Optimization of the compensatory anticathode in the electric fields protection of ship based on evolutionary programming." In 2010 IEEE International Conference on Information Theory and Information Security (ICITIS). IEEE, 2010. http://dx.doi.org/10.1109/icitis.2010.5689751.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Information security fields"

1

Polyakova, Tatiyana An, Ignat S. Boychenko, and Nataliya An Troyan. Information and legal support of information security in the transport sector in the context of digital development. DOI CODE, 2021. http://dx.doi.org/10.18411/2021-0339-1001-46156.

Full text
Abstract:
The current paper deals with the information and legal support of information security in the transport sector in the context of digital development. Thus, the development of information and telecommunication technologies and the digitalization of public relations have also affected the field of transport and transport services. There have appeared not only new Транспортное право и безопасность. 2021. № 3(39) 148 transportation means, such as unmanned aircraft, but there are also being introduced information systems related to the identification of passengers in transport. The development of electronic interaction between various subjects of information exchange in transport is a consequence of the global digitalization of public relations, which creates certain risks of enforcing information security, a threat to the information transport infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
2

Temple, Dorota S., Jason S. Polly, Meghan Hegarty-Craver, James I. Rineer, Daniel Lapidus, Kemen Austin, Katherine P. Woodward, and Robert H. Beach III. The View From Above: Satellites Inform Decision-Making for Food Security. RTI Press, August 2019. http://dx.doi.org/10.3768/rtipress.2019.rb.0021.1908.

Full text
Abstract:
Despite notable progress in reducing global poverty and hunger in recent decades, about one out of nine people in the world suffers from hunger and malnutrition. Stakeholders charged with making decisions pertaining to agricultural production, development priorities, and policies at a region-to-country scale require quantitative and up-to-date information on the types of crops being cultivated, the acreage under cultivation, and crop yields. However, many low- and middle-income countries lack the infrastructure and resources for frequent and extensive agricultural field surveys to obtain this information. Technology supports a change of paradigm. Traditional methods of obtaining agricultural information through field surveys are increasingly being augmented by images of the Earth acquired through sensors placed on satellites. The continued improvement in the resolution of satellite images, the establishment of open-access infrastructure for processing of the images, and the recent revolutionary progress in artificial intelligence make it feasible to obtain the information at low cost and in near-to-real time. In this brief, we discuss the use of satellite images to provide information about agricultural production in low-income countries, and we comment on research challenges and opportunities. We highlight the near-term potential of the methodology in the context of Rwanda, a country in sub-Saharan Africa whose government has recognized early the value of information technology in its strategic planning for food security and sustainability.
APA, Harvard, Vancouver, ISO, and other styles
3

Mouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, July 2021. http://dx.doi.org/10.6028/nist.ir.8319.

Full text
Abstract:
The field of cryptography continues to advance at a very rapid pace, leading to new insights that may impact the security properties of cryptographic algorithms. The Crypto Publication Review Board ("the Board") has been established to identify publications to be reviewed. This report subjects the first standard to the review process: Federal Information Processing Standard (FIPS) 197, which defines the Advanced Encryption Standard (AES).
APA, Harvard, Vancouver, ISO, and other styles
4

Beuermann, Diether, Nicolas L. Bottan, Bridget Hoffmann, Jeetendra Khadan, and Diego A. Vera-Cossio. Suriname COVID-19 Survey. Inter-American Development Bank, May 2021. http://dx.doi.org/10.18235/0003266.

Full text
Abstract:
This dataset constitutes a panel follow-up to the 2016/2017 Suriname Survey of Living Conditions. It measures welfare related variables before and after the onset of the COVID-19 pandemic including labor market outcomes, financial literacy, and food security. The survey was executed in August 2020. The Suriname COVID-19 Survey is a project of the Inter-American Development Bank (IDB). It collected data on critical socioeconomic topics in the context of the COVID-19 pandemic to support policymaking and help mitigate the crisis impacts on the populations welfare. The survey recontacted households interviewed in 2016/2017 by the Suriname Survey of Living Conditions (SSLC) and was conducted by phone due to the mobility restrictions and social distancing measures in place. It interviewed 1,016 households during August 2020 and gathered information about disease transmission, household finances, labor, income, remittances, spending, and social protection programs. Data and documentation of the 2016/2017 Suriname Survey of Living Conditions can be found at: https://publications.iadb.org/en/suriname-survey-living-conditions-2016-2017 The survey was designed and implemented by Sistemas Integrales. This publication describes the main methodological aspects, such as sample design, estimation procedures, topics covered by the questionnaire, field organization and quality control. It also presents the structure and codebook for the two resulting publicly available datasets.
APA, Harvard, Vancouver, ISO, and other styles
5

Kramer, Robert. LED Street Lighting Implementation Research, Support, and Testing. Purdue University, 2020. http://dx.doi.org/10.5703/1288284317274.

Full text
Abstract:
This report describes the results of technical analysis, field tests, and laboratory tests that were performed for LED highway lighting options by the Energy Efficiency and Reliability Center (EERC) at Purdue University Northwest for the Indiana Department of Transportation (INDOT). This effort was conducted over the past 3 years to evaluate and test the technology and viability of using modern highway lighting technology to enhance energy efficiency, safety, security, and economic development of communities and roadways. During the testing period there was a continuous discussion between INDOT and EERC regarding the laboratory and field testing of INDOT approved luminaires submitted by vendors. There were multiple discussions with INDOT and vendors regarding the individual details and issues for the 29 luminaires that were tested. A comparison study was conducted by EERC of the various alternatives and comparison to currently installed luminaires. Data was collected for field tests of the luminaires by EERC and INDOT personnel for the luminaires. Field data was evaluated and compared to lighting models using vendor supplied ies data files. Multiple presentations were made at 3 separate Purdue Road Schools regarding the results and procedures of the testing program by EERC in conjunction with INDOT. A total of 22 final reports, considered confidential by INDOT, for individual vendor luminaires have been prepared as part of this effort. These reports were submitted sequentially to INDOT as testing was completed during the course of this effort. A total of 29 luminaires were tested. Some luminaire testing was terminated during testing due to design issues or vendor requests. All testing was summarized in the INDOT specification sheet attached to each report. Observations regarding the consistency of the supplied test luminaire with the requirements of Section 7.2 of the INDOT test procedure “Procedure for evaluation and approval list requirements for solid state ballasted luminaires ITM 957-17P” is provided in the Appendix to the report for each luminaire. Details regarding how these tests were performed and the respective associated evaluation of performance and reliability are provided in the report. This effort included: consideration of published and vendor information; appraisal of products consistent with national industry standards; review of physical design, thermal performance; laboratory testing of photopic performance, reliability, life cycle data and characteristics, and power characteristics; technical and probabilistic risk studies; and field testing and analysis of LED light sources including comparison to currently installed conventional light sources. Assistance in preparing INDOT standards for highway lighting was provided on multiple occasions.
APA, Harvard, Vancouver, ISO, and other styles
6

Lers, Amnon, Majid R. Foolad, and Haya Friedman. genetic basis for postharvest chilling tolerance in tomato fruit. United States Department of Agriculture, January 2014. http://dx.doi.org/10.32747/2014.7600014.bard.

Full text
Abstract:
ABSTRACT Postharvest losses of fresh produce are estimated globally to be around 30%. Reducing these losses is considered a major solution to ensure global food security. Storage at low temperatures is an efficient practice to prolong postharvest performance of crops with minimal negative impact on produce quality or human health and the environment. However, many fresh produce commodities are susceptible to chilling temperatures, and the application of cold storage is limited as it would cause physiological chilling injury (CI) leading to reduced produce quality. Further, the primary CI becomes a preferred site for pathogens leading to decay and massive produce losses. Thus, chilling sensitive crops should be stored at higher minimal temperatures, which curtails their marketing life and in some cases necessitates the use of other storage strategies. Development of new knowledge about the biological basis for chilling tolerance in fruits and vegetables should allow development of both new varieties more tolerant to cold, and more efficient postharvest storage treatments and storage conditions. In order to improve the agricultural performance of modern crop varieties, including tomato, there is great potential in introgression of marker-defined genomic regions from wild species onto the background of elite breeding lines. To exploit this potential for improving tomato fruit chilling tolerance during postharvest storage, we have used in this research a recombinant inbred line (RIL) population derived from a cross between the red-fruited tomato wild species SolanumpimpinellifoliumL. accession LA2093 and an advanced Solanum lycopersicumL. tomato breeding line NCEBR-1, developed in the laboratory of the US co-PI. The original specific objectives were: 1) Screening of RIL population resulting from the cross NCEBR1 X LA2093 for fruit chilling response during postharvest storage and estimation of its heritability; 2) Perform a transcriptopmic and bioinformatics analysis for the two parental lines following exposure to chilling storage. During the course of the project, we learned that we could measure greater differences in chilling responses among specific RILs compared to that observed between the two parental lines, and thus we decided not to perform transcriptomic analysis and instead invest our efforts more on characterization of the RILs. Performing the transcriptomic analysis for several RILs, which significantly differ in their chilling tolerance/sensitivity, at a later stage could result with more significant insights. The RIL population, (172 lines), was used in field experiment in which fruits were examined for chilling sensitivity by determining CI severity. Following the field experiments, including 4 harvest days and CI measurements, two extreme tails of the response distribution, each consisting of 11 RILs exhibiting either high sensitivity or tolerance to chilling stress, were identified and were further examined for chilling response in greenhouse experiments. Across the RILs, we found significant (P < 0.01) correlation between field and greenhouse grown plants in fruit CI. Two groups of 5 RILs, whose fruits exhibited reproducible chilling tolerant/sensitive phenotypes in both field and greenhouse experiments, were selected for further analyses. Numerous genetic, physiological, biochemical and molecular variations were investigated in response to postharvest chilling stress in the selected RILs. We confirmed the differential response of the parental lines of the RIL population to chilling stress, and examined the extent of variation in the RIL population in response to chilling treatment. We determined parameters which would be useful for further characterization of chilling response in the RIL population. These included chlorophyll fluorescence Fv/Fm, water loss, total non-enzymatic potential of antioxidant activity, ascorbate and proline content, and expression of LeCBF1 gene, known to be associated with cold acclimation. These parameters could be used in continuation studies for the identification and genetic mapping of loci contributing to chilling tolerance in this population, and identifying genetic markers associated with chilling tolerance in tomato. Once genetic markers associated with chilling tolerance are identified, the trait could be transferred to different genetic background via marker-assisted selection (MAS) and breeding. The collaborative research established in this program has resulted in new information and insights in this area of research and the collaboration will be continued to obtain further insights into the genetic, molecular biology and physiology of postharvest chilling tolerance in tomato fruit. The US Co-PI, developed the RIL population that was used for screening and measurement of the relevant chilling stress responses and conducted statistical analyses of the data. Because we were not able to grow the RIL population under field conditions in two successive generations, we could not estimate heritability of response to chilling temperatures. However, we plan to continue the research, grow the RIL progeny in the field again, and determine heritability of chilling tolerance in a near future. The IS and US investigators interacted regularly and plan to continue and expand on this study, since combing the expertise of the Co-PI in genetics and breeding with that of the PI in postharvest physiology and molecular biology will have great impact on this line of research, given the significant findings of this one-year feasibility project.
APA, Harvard, Vancouver, ISO, and other styles
7

Payment Systems Report - June of 2021. Banco de la República, February 2022. http://dx.doi.org/10.32468/rept-sist-pag.eng.2021.

Full text
Abstract:
Banco de la República provides a comprehensive overview of Colombia’s finan¬cial infrastructure in its Payment Systems Report, which is an important product of the work it does to oversee that infrastructure. The figures published in this edition of the report are for the year 2020, a pandemic period in which the con¬tainment measures designed and adopted to alleviate the strain on the health system led to a sharp reduction in economic activity and consumption in Colom¬bia, as was the case in most countries. At the start of the pandemic, the Board of Directors of Banco de la República adopted decisions that were necessary to supply the market with ample liquid¬ity in pesos and US dollars to guarantee market stability, protect the payment system and preserve the supply of credit. The pronounced growth in mone¬tary aggregates reflected an increased preference for liquidity, which Banco de la República addressed at the right time. These decisions were implemented through operations that were cleared and settled via the financial infrastructure. The second section of this report, following the introduction, offers an analysis of how the various financial infrastructures in Colombia have evolved and per¬formed. One of the highlights is the large-value payment system (CUD), which registered more momentum in 2020 than during the previous year, mainly be¬cause of an increase in average daily remunerated deposits made with Banco de la República by the General Directorate of Public Credit and the National Treasury (DGCPTN), as well as more activity in the sell/buy-back market with sovereign debt. Consequently, with more activity in the CUD, the Central Securi¬ties Depository (DCV) experienced an added impetus sparked by an increase in the money market for bonds and securities placed on the primary market by the national government. The value of operations cleared and settled through the Colombian Central Counterparty (CRCC) continues to grow, propelled largely by peso/dollar non-deliverable forward (NDF) contracts. With respect to the CRCC, it is important to note this clearing house has been in charge of managing risks and clearing and settling operations in the peso/dollar spot market since the end of last year, following its merger with the Foreign Exchange Clearing House of Colombia (CCDC). Since the final quarter of 2020, the CRCC has also been re¬sponsible for clearing and settlement in the equities market, which was former¬ly done by the Colombian Stock Exchange (BVC). The third section of this report provides an all-inclusive view of payments in the market for goods and services; namely, transactions carried out by members of the public and non-financial institutions. During the pandemic, inter- and intra-bank electronic funds transfers, which originate mostly with companies, increased in both the number and value of transactions with respect to 2019. However, debit and credit card payments, which are made largely by private citizens, declined compared to 2019. The incidence of payment by check contin¬ue to drop, exhibiting quite a pronounced downward trend during the past last year. To supplement to the information on electronic funds transfers, section three includes a segment (Box 4) characterizing the population with savings and checking accounts, based on data from a survey by Banco de la República con-cerning the perception of the use of payment instruments in 2019. There also is segment (Box 2) on the growth in transactions with a mobile wallet provided by a company specialized in electronic deposits and payments (Sedpe). It shows the number of users and the value of their transactions have increased since the wallet was introduced in late 2017, particularly during the pandemic. In addition, there is a diagnosis of the effects of the pandemic on the payment patterns of the population, based on data related to the use of cash in circu¬lation, payments with electronic instruments, and consumption and consumer confidence. The conclusion is that the collapse in the consumer confidence in¬dex and the drop in private consumption led to changes in the public’s pay¬ment patterns. Credit and debit card purchases were down, while payments for goods and services through electronic funds transfers increased. These findings, coupled with the considerable increase in cash in circulation, might indicate a possible precautionary cash hoarding by individuals and more use of cash as a payment instrument. There is also a segment (in Focus 3) on the major changes introduced in regulations on the retail-value payment system in Colombia, as provided for in Decree 1692 of December 2020. The fourth section of this report refers to the important innovations and tech¬nological changes that have occurred in the retail-value payment system. Four themes are highlighted in this respect. The first is a key point in building the financial infrastructure for instant payments. It involves of the design and im¬plementation of overlay schemes, a technological development that allows the various participants in the payment chain to communicate openly. The result is a high degree of interoperability among the different payment service providers. The second topic explores developments in the international debate on central bank digital currency (CBDC). The purpose is to understand how it could impact the retail-value payment system and the use of cash if it were to be issued. The third topic is related to new forms of payment initiation, such as QR codes, bio¬metrics or near field communication (NFC) technology. These seemingly small changes can have a major impact on the user’s experience with the retail-value payment system. The fourth theme is the growth in payments via mobile tele¬phone and the internet. The report ends in section five with a review of two papers on applied research done at Banco de la República in 2020. The first analyzes the extent of the CRCC’s capital, acknowledging the relevant role this infrastructure has acquired in pro¬viding clearing and settlement services for various financial markets in Colom¬bia. The capital requirements defined for central counterparties in some jurisdic¬tions are explored, and the risks to be hedged are identified from the standpoint of the service these type of institutions offer to the market and those associated with their corporate activity. The CRCC’s capital levels are analyzed in light of what has been observed in the European Union’s regulations, and the conclusion is that the CRCC has a scheme of security rings very similar to those applied internationally and the extent of its capital exceeds what is stipulated in Colombian regulations, being sufficient to hedge other risks. The second study presents an algorithm used to identify and quantify the liquidity sources that CUD’s participants use under normal conditions to meet their daily obligations in the local financial market. This algorithm can be used as a tool to monitor intraday liquidity. Leonardo Villar Gómez Governor
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography