Academic literature on the topic 'Information security projects'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information security projects.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Information security projects"

1

Sommestad, Teodor, Mathias Ekstedt, Hannes Holm, and Muhammad Afzal. "Security mistakes in information system deployment projects." Information Management & Computer Security 19, no. 2 (June 7, 2011): 80–94. http://dx.doi.org/10.1108/09685221111143033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vasilishin, Igor, Evgeny Khaimin, and Lyudmila Khaimina. "The Project Approach in Training of Information Security Students." Russian Digital Libraries Journal 23, no. 1-2 (March 3, 2020): 210–15. http://dx.doi.org/10.26907/1562-5419-2020-23-1-2-210-215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fedosov, Alexander, and Anastasia Karnaukhova. "The Problem of Ensuring the Information Security of Children and Adolescents in the Context of Educational Internet Projects Implementation." Mathematics and Informatics LXIV, no. 1 (February 25, 2021): 84–98. http://dx.doi.org/10.53656/math2021-1-6-the.

Full text
Abstract:
The continuous development of technologies on the Internet leads to new threats that can harm the physical and mental health of children and adolescents and their personal safety. The article analyses the importance of creating a culture of information security for children and adolescents, which is necessary to neutralize the negative consequences of Internet threats, highlights the main problems in ensuring the security and development of children in the information space. The article describes the results of the study of Internet projects directed at creating a culture of information security of children and adolescents, as well as projects aimed at ensuring their information security on the Internet. It has been shown that sufficient attention to the problem of creating a culture of information security for children and adolescents has already been paid at the State level and the relevance of solving the problem of developing and implementing educational programs that provide systematic study of the foundations of information security for students has been justified.
APA, Harvard, Vancouver, ISO, and other styles
4

Goonetillake, M. D. J. S., Rangana Jayashanka, and S. V. Rathnayaka. "Predicting Security-Vulnerable Developers Based on Their Techno-Behavioral Characteristics." International Journal of Information Security and Privacy 16, no. 1 (January 2022): 1–26. http://dx.doi.org/10.4018/ijisp.2022010103.

Full text
Abstract:
Assigning developers for highly secured software projects requires identifying developers’ tendency to contribute towards vulnerable software codes called developer-centric security vulnerability to mitigate issues on human resource management, financial and project timelines. There are problems in assessing the previous codebases in evaluating the developer-centric security vulnerability level of each developer. Thus, this paper suggests a method to evaluate this through the techno-behavioral features of their previous projects. Consequently, we present results of an exploratory study of the developer-centric security vulnerability level prediction using a dataset of 1827 developers by logically selecting 13 techno-behavioral features. Our results depict that there is a correlation between techno-behavioral features and developer-centric security vulnerability with 89.46% accuracy. This model enables to predict developer-centric security vulnerability level of any developer if the required techno-behavioral features are available avoiding the analysis of his/her previous codebases.
APA, Harvard, Vancouver, ISO, and other styles
5

Kultygin, Oleg P. "Economic efficiency assessment of projects for the information systems creation." Journal Of Applied Informatics 16, no. 95 (October 29, 2021): 117–25. http://dx.doi.org/10.37791/2687-0649-2021-16-5-117-125.

Full text
Abstract:
The article is concerned with an approach to assess the economic efficiency of IT projects, which results are recommended to be used when choosing the informatization version for organizations of various types. This approach is based on the calculation of such indicators as capital costs for an IT project, the magnitude of the projected change in operating costs to ensure the functioning of the IS (information system), the growth rate in the efficiency of business processes as a result of informatization, as well as the costs to ensure the required level of information security. The analysis results of modern trends in the IS development for informatization of organization business processes are given, which made it possible to identify the main features of the solutions offered on the market. The analysis of direct and indirect costs for an IT project is shown to be rather difficult in a number of cases, which leads to inaccuracies in assessing its economic efficiency. In this case, the estimated payback period of the project (usually unreasonably short) can be exceeded many times in practice. At the same time, as a result of rapid progress in the field of information technology, the IT projects results are subjected to intense obsolescence, so long payback periods can lead to significant losses for the organization implementing the project. The consideration of the influence of the information security threats and the necessary additional funds for its provision on the forecast indicators for the economic efficiency of the proposed IT projects can significantly affect the decisions on choosing not only the configuration of the IS but the platform on which it operates as well. The article proposes an approach to determine the costs for ensuring information security, which should be considered when assessing the IT project economic efficiency. A mathematical model is described to choose an option for the tables rational placement on IS units (database servers) used by employees of various geographically detached divisions of an enterprise, which will allow reducing operating costs for this system operation.
APA, Harvard, Vancouver, ISO, and other styles
6

OU YANG, YU-PING, HOW-MING SHIEH, JUN-DER LEU, and GWO-HSHIUNG TZENG. "A VIKOR-BASED MULTIPLE CRITERIA DECISION METHOD FOR IMPROVING INFORMATION SECURITY RISK." International Journal of Information Technology & Decision Making 08, no. 02 (June 2009): 267–87. http://dx.doi.org/10.1142/s0219622009003375.

Full text
Abstract:
Most multicriteria methods focus on ranking and selecting from a set of alternatives. These methods are usually used to compare all alternatives based on the synthesized scorings within a normalized scale with respect to the same criteria in multicriteria problems. However, the decision makers often simultaneously manage one or several alternatives/projects with conflicting and noncommensurable criteria to reduce the gaps to achieve the aspired grade in practice. They then need to rank the gaps that have not been reduced or improved (the unimproved gaps) for the alternatives/projects or aspects of a project to get the most benefit. Because these compared alternatives/projects do not usually have the same criteria/aspects, traditional methods are unsuitable to deal with them. Thus, this research proposes a new VIKOR method to solve this problem; this new method allows the decision maker to understand these gaps of the projects/aspects and rank them to improve these large gaps in control items to achieve the aspired level. Its concept originates in compromise solutions, in particular the VIKOR method. In addition, this research also provides an example of improving information security risk to demonstrate the suitability of this new method. The results show the effectiveness of the new method.
APA, Harvard, Vancouver, ISO, and other styles
7

Chandrakumar, T., and S. Parthasarathy. "Enhancing Data Security in ERP Projects Using XML." International Journal of Enterprise Information Systems 8, no. 1 (January 2012): 51–65. http://dx.doi.org/10.4018/jeis.2012010104.

Full text
Abstract:
Enterprise resource planning (ERP) is integrated packaged software, which addresses most fundamental business processing functionality across different functional areas and business units, in a single software system, with single database and accessible through a unified interface and channel of communication. Meeting security requirements for privacy, confidentiality and integrity is essential in order to move business online ERP System requires an accurate, precise and Data security in business concepts of the enterprise. The authors introduce basic features and security of ERP System using Extensible Mark-up Language (XML) technology. Traditionally, XML security has developed along two distinct though related lines of research, corresponding to two facts of the XML security notion. The first fact defines XML security as a set of security techniques (encryption, digital signature) tightly coupled with XML to maintain the main features of the XML semi-structured data model while adding to it all necessary security capabilities. In this paper we will explore XML Signature specification from W3C and its implementation in .NET.
APA, Harvard, Vancouver, ISO, and other styles
8

Švedaitė, Eglė. "JRMAD METHOD USES OF INFORMATION TECHNOLOGY SECURITY / JRMAD METODO PANAUDOJIMAS TAIKANT INFORMACINIŲ TECHNOLOGIJŲ SAUGOS POLITIKĄ." Mokslas - Lietuvos ateitis 3, no. 1 (August 22, 2011): 29–32. http://dx.doi.org/10.3846/mla.2011.006.

Full text
Abstract:
Analyzing the flexible uses security problems in existing information technology systems. Looking for way to ensure the safety of the reaction time to smooth access to more projects in development. Review of projects undertaken. Codified in the project design and development components. Made of the findings of the methods used to discover, which exclude parts of the draft rule and resort to emergency planning in the early part of the project development phase. Analytical result: JRMAD mixed method, allowing simultaneous two of the project and the time to change the current system.
APA, Harvard, Vancouver, ISO, and other styles
9

ADEBOWALE, AJAYI, NICULAE GOGA, OTUSILE OLUWABUKOLA, and ABEL SAMUEL. "Formal Methods in Information Security." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 4 (February 9, 2015): 5621–31. http://dx.doi.org/10.24297/ijct.v14i4.1963.

Full text
Abstract:
Formal methods use mathematical models for analysis and verification at any part of the program life-cycle. The use of formal methods is admitted, recommended, and sometimes prescribed in safety-and security-related standards dealing, e.g., with avionics, railways, nuclear energy, and secure information systems. This paper describes the state of the art in the industrial use of formal methods ininformation security with a focus on verification of security protocols. Given the vast scope of available solutions, attention has been focused just on the most popular and most representative ones, without exhaustiveness claims. We describe some of the highlights of our survey by presenting a series of industrial projects, and we draw some observations from these surveys and records of experience. Based on this, we discuss issues surrounding the industrial adoption of formal methods in security protocol engineering.
APA, Harvard, Vancouver, ISO, and other styles
10

Ghafarian, Ahmad. "Ideas for projects in undergraduate information assurance and security courses." ACM SIGCSE Bulletin 39, no. 3 (June 25, 2007): 322. http://dx.doi.org/10.1145/1269900.1268889.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Information security projects"

1

Tshabalala, Obediant. "Critical success factors of information security projects." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/10397.

Full text
Abstract:
The research shows the critical success factors when implementing information security projects. Many Information security projects in the past have not been successful because these factors were not identified and emphasised effectively. By identifying these factors the research basically presents a model by which information security projects can be executed with guaranteed success. The factors identified during the study cover the following streams: top management commitment as a factor of success; accountability as a factor of success; responsibility as a factor of success; awareness as a factor of success and an information security policy as a factor of success. For the empirical study, a physical questionnaire was administrated to a pool of experts in project management and information security. The study consisted of 60 participants who were verified to have minimum requirements core for questionnaire completion. The questionnaire requested for biological information of the participants and their perceived relations (based on their experience) between project success versus accountability, information security project success versus responsibilities, information security project success versus training & awareness, information security project success versus top management commitment and information security project success versus information security policy. The participants’ responses were structured according to a Likert-type scale. Participants had to indicate the extent to which they agreed with each of the statements in the questionnaire. The responses obtained from the survey were presented and analysed. The researcher observed in this study that information security projects are so specific that critical success factors need to be emphasised from project inception. With the identified critical success factors, the researcher recommends that a project methodology be structured to include these factors so that there is a standard in running information security projects successfully. The researcher also identified that amongst the critical success factors identified, there are some that need to be emphasised more than the others due to their level of importance in such projects.
APA, Harvard, Vancouver, ISO, and other styles
2

Basson, Delton Jade. "Managing infrastructure risks in information communication technology outsourced projects : a case study at Transnet, South Africa." Thesis, Cape Peninsula University of Technology, 2017. http://hdl.handle.net/20.500.11838/2535.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2017.
The balance between the dependency on Information and Communications Technology (ICT) and reducing costs has led to an increase in ICT outsourcing in many organisations. ICT outsourcing has benefits, but organisations have limited knowledge on information security and risks when outsourcing these functions. A lack of information security knowledge or a poor organisational risk culture carries the risk of project failure and security breaches. It is unclear how to manage information risks through the usage of ICT infrastructure risk management when outsourcing ICT projects, and this exposes organisations to ICT security risks. The aim of the study is to explore how a selected transport organisation can manage information risks through the usage of infrastructure risk management when outsourcing ICT projects. Two primary research questions are posed namely, “what information risks does the ICT department manage when outsourcing ICT projects?”, and “how can the ICT department protect their information through the usage of infrastructure risk management against ICT security threats when outsourcing ICT?” To answer these two questions, a study was conducted at a transport organisation in South Africa. A subjective ontological and interpretivist epistemological stance has been adopted and an inductive research approach was followed. The research strategy was a case study. Data for this study was gathered through interviews (17 in total) using semi-structured questionnaires. Data collected were transcribed, summarised, and categorised to provide a clear understanding of the data. For this study, forty findings and eight themes were identified. The themes are ICT outsourcing, information risks, costs, ICT vendor dependency, vendor access and management, risk management, user awareness, and frameworks. Guidelines are proposed, comprising six primary components. The results point to gaps that need to be addressed to ensure that information is protected when outsourcing ICT projects. Measures need to be put in place and communication has to be improved among operating divisions. The findings lead to questions such as, ““how does business create an ICT security culture to ensure that information is protected at all times”, and “does vendor access management really get the necessary attention it requires?” Further studies on human behaviour towards ICT security is needed to ensure the protection of organisations against security risks.
APA, Harvard, Vancouver, ISO, and other styles
3

Wells, William Ward. "Information security program development." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ma, Chunyan. "Mathematical security models for multi-agent distributed systems." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2568.

Full text
Abstract:
This thesis presents the developed taxonomy of the security threats in agent-based distributed systems. Based on this taxonomy, a set of theories is developed to facilitate analyzng the security threats of the mobile-agent systems. We propose the idea of using the developed security risk graph to model the system's vulnerabilties.
APA, Harvard, Vancouver, ISO, and other styles
5

Andersson, Mari-Louise. "Securing an ERP Implementation." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-1882.

Full text
Abstract:

An implementation project of an ERP system results in large changes. Organizations

that face an ERP implementation project have several risks to

consider in order to avoid problems that cause failures. The purpose of

this research is to extend existing models and create a method for implementation

of ERP systems. The method has then been employed to an

ongoing project at the department of Procurement and Supply at Ericsson

Mobile Platforms in Lund. Objectives for the research are to consider

which implementation strategy can be used and how an organization can

minimize risks.

The research approach and methodology is influenced by the qualitative

research method since it was necessary to gather qualitative facts instead

of quantitative facts. Included is also a case study due to the research is

executed within Ericsson Mobile Platforms in Lund.

There are two main opposite implementation strategies, Big Bang and

Step-by-Step. The choice of implementation strategy depends on number

of factors like the size of the organizations, complexity and resources.

A method of ERP implementation has been put forward as a result of the

integrated models. The method includes an overall model and a check list.

Risk identification is a problem that many implementation project faces, a

way to solve this is to make a careful risk analysis, a risk matirx with several

identified risks are putted forward throughout this study.

APA, Harvard, Vancouver, ISO, and other styles
6

Martinez, Antonio. "Information management and the biological warfare threat." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://sirsi.nps.navy.mil/uhtbin/hyperion-image/02Mar%5FMartinez.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lachheb, Tawfik. "A secure client/server java application programming interface." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2561.

Full text
Abstract:
The purpose of this project is to develop a generic Java Application Programming Interface (API) that would be used to provide security and user privacy to functions such as data transfer, key management, digital signature, etc.
APA, Harvard, Vancouver, ISO, and other styles
8

Stocking, Galen Asher Thomas. "The threat of cyberterrorism: Contemporary consequences and prescriptions." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2590.

Full text
Abstract:
This study researches the varying threats that emanate from terrorists who carry their activity into the online arena. It examines several elements of this threat, including virtual to virtual attacks and threats to critical infrastructure that can be traced to online sources. It then reports on the methods that terrorists employ in using information technology such as the internet for propaganda and other communication purposes. It discusses how the United States government has responded to these problems, and concludes with recommendations for best practices.
APA, Harvard, Vancouver, ISO, and other styles
9

Prati, Marco. "ROP Gadgets hiding techniques in Open Source Projects." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/4682/.

Full text
Abstract:
Today there are many techniques that allows to exploit vulnerabilities of an application; there are also many techniques that are designed to stop these exploit attacks. This thesis wants to highlight how a specific type of attack, based on a technique called Return Oriented Programming (ROP), can be easily applied to binaries with particular characteristics. A new method that allows the injection of "useful" code in an Open Source projects without arousing suspicions is presented; this is possible because of the harmless aspects of the injected code. This useful code facilitate a ROP attack against an executable that contains vulnerable bugs. The injection process can be visualized in environment where an user can contribute with own code to a particular Open Source project. This thesis also highlights how current software protections are not correctly applied to Open Source project, thus enabling the proposed approach.
APA, Harvard, Vancouver, ISO, and other styles
10

Reis, David W. "An Examination of an Information Security Framework Implementation Based on Agile Values to Achieve Health Insurance Portability and Accountability Act Security Rule Compliance in an Academic Medical Center: The Thomas Jefferson University Case Study." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/286.

Full text
Abstract:
Agile project management is most often examined in relation to software development, while information security frameworks are often examined with respect to certain risk management capabilities rather than in terms of successful implementation approaches. This dissertation extended the study of both Agile project management and information security frameworks by examining the efficacy of implementing a security framework using a nontraditional project management approach. Such an investigation is significant because of the high rate of failed IT projects, gaps in the current security framework implementation literature, and increased regulatory pressure on Health Insurance Portability and Accountability (HIPAA)-covered entities to become compliant with the HIPAA Security Rule. HIPAA-covered entities have struggled to achieve HIPAA compliance since the Act's enforcement date. Specifically, academic medical centers have struggled to achieve and authoritatively document their compliance with the HIPAA Security Rule. To aid HIPAA-covered entities in confirming and documenting their HIPAA Security Rule compliance, the HITRUST Alliance has published the Common Security Framework. Thomas Jefferson University selected the Common Security Framework to help them assess and document their HIPAA Security Rule compliance. However, there is a documented gap in the literature on successful methods for implementing information security-related projects, particularly HIPAA compliance. In this single-case case study, the author examined the implementation of an Information Security Framework based on Agile values. Specifically examined were the values of (a) individuals and interactions over processes and tools; (b) working software over comprehensive documentation; (c) customer collaboration over contract negotiation; and (d) responding to change over following a plan. The results of this investigation indicated that an information security framework implementation based on Agile values is a viable approach for successfully implementing the Common Security Framework at an academic medical center.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Information security projects"

1

NATO Advanced Research Workshop on Secure Telematic Applications for National Scale Projects (2006 Minsk, Belarus). Secure telematic applications for national scale projects. Amsterdam, Netherlands: Fairfax, VA, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

NATO, Advanced Research Workshop on Secure Telematic Applications for National Scale Projects (2006 Minsk Belarus). Secure telematic applications for national scale projects. Amsterdam, Netherlands: Fairfax, VA, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

NATO Advanced Research Workshop on Secure Telematic Applications for National Scale Projects (2006 Minsk, Belarus). Secure telematic applications for national scale projects. Amsterdam, Netherlands: Fairfax, VA, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

New York (State). Office of the State Comptroller. Division of State Services. Metropolitan Transportation Authority, controls over security-sensitive information for the Capital Projects Program. [Albany, NY: Office of the State Comptroller, Division of State Services, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Office, General Accounting. Information technology: Justice plans to improve oversight of agency projects : report to congressional requesters. Washington, D.C: U.S. GAO, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

High-risk information technology projects: Is poor management leading to billions in waste? : hearing before the Federal Financial Management, Government Information, Federal Services, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Tenth Congress, first session, September 20, 2007. Washington: U.S. G.P.O., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Office, General Accounting. ADP acquisition: Air Force logistics system modernization projects : report to the Honorable John Conyers, Jr., chairman, Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Office, General Accounting. Information technology: DOD needs to leverage lessons learned from its outsourcing projects : report to the Subcommittee on Readiness and Management Support, Committee on Armed Services, U.S. Senate. Washington, D.C: United States General Accounting Office, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sweden. Defense, cooperative projects: Agreement between the United States of America and Sweden, signed at Washington and Stockholm March 10 and April 22, 1997, with annex. [Washington, D.C.]: U.S. Dept. of State, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sweden. Defense, cooperative projects: Agreement between the United States of America and Sweden, signed at Washington and Stockholm March 10 and April 22, 1997, with annex. [Washington, D.C.]: U.S. Dept. of State, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Information security projects"

1

Tafokeng Talla, Landry, and Jean Robert Kala Kamdjoug. "Factors Influencing Adoption of Information Security in Information Systems Projects." In Advances in Intelligent Systems and Computing, 890–99. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16184-2_84.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Taveter, Kuldar, and Alex Norta. "Agile Software Engineering Methodology for Information Systems’ Integration Projects." In Future Data and Security Engineering, 215–30. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70004-5_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sadok, M. "Managing Security Projects: Proposition of a Cost Model." In Information Systems: People, Organizations, Institutions, and Technologies, 237–44. Heidelberg: Physica-Verlag HD, 2009. http://dx.doi.org/10.1007/978-3-7908-2148-2_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Monnik, Michael, and Lei Pan. "Forensic Identification of Students Outsourcing Assignment Projects from Freelancer.com." In Applications and Techniques in Information Security, 183–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45670-5_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ginzburg, A. V., and S. I. Kozminykh. "Information Support of Integrated Security for Capital Construction Projects." In Building Life-cycle Management. Information Systems and Technologies, 59–67. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96206-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lan, Shizhan, and Jing Huang. "Brief Analysis for Network Security Issues in Mega-Projects Approved for Data Clusters." In Communications in Computer and Information Science, 38–50. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-8285-9_3.

Full text
Abstract:
AbstractNetwork security is an important guarantee for Mega-projects approved for data clusters. It is necessary to comprehensively improve the network security awareness, monitoring, early warning, disposal and evaluation capabilities of Mega-projects approved for data clusters. It makes a comprehensive analysis on the network security issues in Mega-projects approved for data clusters from dimensions of computing facility security, network facility security, combination and scheduling security, network operation service security, data security, network situation awareness, etc. It is set up gradually evolving atomic power security capabilities for building a ubiquitous security network computing brain. It identifies data assets in an active and passive ways, sorts out data assets through in-depth scanning and information completion, supports the formation of preset templates according to AI (artificial intelligence) models, regular matching, keywords, combination rules, etc., classifies and grades data according to data sensitivity, and visually displays them in the form of charts. It forms a multi-layer architecture system that includes the collaborative scheduling of computing networks on the control side, the perception of network convergence on the data side, management and the scheduling of computing resources on the service side, realizes the interaction and supervision of the whole process, all elements and the whole industry chain of computing scheduling, has functions of security perception, monitoring, early warning, disposal and evaluation, and improves the security perception and linkage monitoring capability of cross data center and clusters. Gradually, it builds a coordinated threat handling capability.
APA, Harvard, Vancouver, ISO, and other styles
7

Alvares, Marcos, Fernando Buarque de Lima Neto, and Tshilidzi Marwala. "Prioritising Security Tests on Large-Scale and Distributed Software Development Projects by Using Self-organised Maps." In Neural Information Processing, 60–69. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46681-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Çag̃layan, Mehmet Ufuk. "AI and Quality of Service Driven Attack Detection, Mitigation and Energy Optimization: A Review of Some EU Project Results." In Communications in Computer and Information Science, 1–12. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09357-9_1.

Full text
Abstract:
AbstractThis article summarizes briefly the contributions presented in this EuroCyberSecurity Workshop 2021 which is organized as part of the series of International Symposia on Computer and Information Sciences (ISCIS), with the support of the European Commission funded IoTAC Project, that was held on November and in NIce, France, and sponsored by the Institute of Teoretical and Applied Informatics of the Polish Academy of Sciences. It also summarizes some of the research contributions of several EU Projects including NEMESYS, GHOST, KONFIDO, SDK4ED and IoTAC, primarily with a cybersecurity and Machine Learning orientation. Thus subjects covered include the cybersecurity of Mobile Networks and of the Internet of Things (IoT), the design of IoT Gateways and their performance, the security of networked health systems that provide health services to individuals across the EU Member states, as well as the issues of energy consumption by ICT which are becoming increasingly important, including in the cybersecurity perspective, as we focus increasingly on climate change and the needed transition towards highly reduced emissions. Many of the techniques and results discussed in this article are based either on Machine Learning (ML) methods, or on methods for the performance modeling and optimization of networked and distributed computer systems.
APA, Harvard, Vancouver, ISO, and other styles
9

Nowikowska, Monika. "The Main Tasks of the Network of Computer Security Incident Response Teams in the Light of the Act on the National Cybersecurity System in Poland." In Cybersecurity in Poland, 223–41. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78551-2_15.

Full text
Abstract:
AbstractComputer Security Incident Response Teams (CSIRTs) are specialised entities established to handle network and information system security incidents and cooperate with similar entities around the world, both in terms of operational, as well as research and implementation activities. The main tasks of CSIRTs include: recognition, prevention, recording and handling of events that breach network security, active response in the event of direct threats, cooperation with other CSIRT teams, and, finally, participation in national and international projects related to information security and research activities on the scope of methods for detecting security incidents. The article analyses the detailed tasks established on the basis of the Act of 5 July 2018 on the National Cybersecurity System of three CSIRTs operating in Poland: CSIRT MON, CSIRT NASK and CSIRT GOV.
APA, Harvard, Vancouver, ISO, and other styles
10

Ganapathy, Vinod. "Reflections on the Self-service Cloud Computing Project." In Information Systems Security, 36–57. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26961-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Information security projects"

1

Fotopoulou, Eleni, Anastasios Zafeiropoulos, Spiros Mouzakitis, and Panagiotis Gouvas. "Information Driven Cyber Security Management through LinDA." In The Success of European Projects using New Information and Communication Technologies. SCITEPRESS - Science and and Technology Publications, 2015. http://dx.doi.org/10.5220/0006163300030016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Qiu, Qi-rong. "Economic Analysis Optimization Model for Information Security Projects." In 2010 International Conference on Biomedical Engineering and Computer Science (ICBECS). IEEE, 2010. http://dx.doi.org/10.1109/icbecs.2010.5462321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hutinski, Zeljko, Neven Vrcek, and G. Bubas. "Communication In Complex Information System Development Projects." In 2001 Informing Science Conference. Informing Science Institute, 2001. http://dx.doi.org/10.28945/2356.

Full text
Abstract:
The relevance of the communication in the complex information system (IS) development projects is becoming issue of primary importance. Various researches show that many projects failed due to inadequate management of communication. Project data exchange is still not performed in a structured and standardised manner, which leads to misunderstandings between team members. Too many complex IS projects do not have established an adequate project communication management subsystems. This paper analyses results of a survey performed on information technology (IT) professionals and presents degree of communication problems during various project phases. (This research was supported by the Croatian Ministry of Science and Technology under projects: "Strategic planning of Information Systems" and "Information Systems Security.) It reveals that average rating of a degree of communication problems varies at different project stages and among different communication subjects. The paper also proposes software tools that, if properly used, might enhance project communication. Such technologies are still not completely mature but they are developing fast and might play an important role in project management, by providing support to its holism.
APA, Harvard, Vancouver, ISO, and other styles
4

Francia, Guillermo A., and Jay Snellen. "Laboratory projects for embedded and control systems security." In the 2014 Information Security Curriculum Development Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2670739.2670754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Incertis Jarillo, David, and Rafael Company Peris. "Innovation in ports security through cooperation projects." In 2014 5th International Conference on Information, Intelligence, Systems and Applications (IISA). IEEE, 2014. http://dx.doi.org/10.1109/iisa.2014.6878836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Almutairi, Moneef, and Stephen Riddle. "Security threat classification for outsourced IT projects." In 2017 11th International Conference on Research Challenges in Information Science (RCIS). IEEE, 2017. http://dx.doi.org/10.1109/rcis.2017.7956579.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Richter, Dorothea H. "A Standardized Approach for Providing Information Security to Space Projects." In SpaceOps 2016 Conference. Reston, Virginia: American Institute of Aeronautics and Astronautics, 2016. http://dx.doi.org/10.2514/6.2016-2393.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ghafarian, Ahmad. "Ideas for projects in undergraduate information assurance and security courses." In the 12th annual SIGCSE conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1268784.1268889.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Meghanathan, Natarajan, Hyunju Kim, and Loretta A. Moore. "Incorporation of Aspects of Systems Security and Software Security in Senior Capstone Projects." In 2012 Ninth International Conference on Information Technology: New Generations (ITNG). IEEE, 2012. http://dx.doi.org/10.1109/itng.2012.54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Livshitz, Ilya I., Lyudmila I. Tatarnikova, Olga M. Safonova, and Natalia P. Lontsikh. "HR EDI Projects Risk Assessment." In 2022 International Conference on Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS). IEEE, 2022. http://dx.doi.org/10.1109/itqmis56172.2022.9976584.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Information security projects"

1

Roberts, Paige, Ahmed-Yasin Osman Moge, and Kaija Hurlburt. PROJECT BADWEYN: SOMALI COASTAL DEVELOPMENT OPPORTUNITIES. One Earth Future, August 2018. http://dx.doi.org/10.18289/oef.2018.032.

Full text
Abstract:
Interest in the Somali fishing sector is growing. Development agencies, donors, and investors see the potential for fisheries in Somali waters to provide income, food security, and stability in coastal communities. But reliable and up-to-date information about the state of Somali fisheries is difficult to find, complicating business decisions. Where should development be focused? What kind of investment will provide the most benefit and long-term return for coastal communities? What fisheries sector opportunities are the most sustainable, and which might be a threat to the health of Somali fisheries? Somali Coastal Development Opportunities answers these questions through targeted and original analysis of fisheries data coupled with information on current development projects throughout the Somali region. This report highlights six coastal fishing villages – Bereda, Hordio, Bander Beyla, Maydh, Hawaay, and Merca – to investigate the development needs and opportunities in each. Opportunities in the fisheries sectors are analyzed in light of sustainability and feasibility to provide recommendations that will guide investment and development in the Somali fisheries sector.
APA, Harvard, Vancouver, ISO, and other styles
2

García-Espinosa, J., and C. Soriano. Data management plan. Scipedia, 2021. http://dx.doi.org/10.23967/prodphd.2021.9.003.

Full text
Abstract:
This document presents the deliverable D8.1 – the Data Management Plan (DMP) of work package 8 of the prodPhD project. It aims to present the plan for the management, generation, collection, security, preservation and sharing of data generated through the prodPhD project. The DMP is a key element for organizing the project’s data. It provides an analysis of the data, which will be collected, processed and published by the prodPhD consortium. The project embraces the initiatives of the European Commission to promote the open access to research data, aiming to improve and maximize access to and reuse of research data generated by Horizon 2020 projects. In this sense prodPhD will adhere to the Open Research Data Pilot (ORD Pilot) fostered by the European Commission, and this DMP will be developed following the standards of data storage, access and management. This plan will detail what data will be generated through the project, whether and how it will be made accessible for the verification and reuse and how it will be curated and preserved. In this context, the term data applies to the information generated during the different experimental campaigns carried out in the project, and specifically to the data, including associated metadata, to be used to validate the computational models and the technical solutions to be developed in the project. This document is the first version of the DMP and may be updated throughout the project, if significant changes (new data, changes in consortium policies, changes in consortium composition, etc.) arise.
APA, Harvard, Vancouver, ISO, and other styles
3

Kurth, Margaret, Bari Greenfeld, Matthew Smith, Samuel Fielding, Marriah Abellera, and Jeffrey King. Financing natural infrastructure : South Bay Salt Pond Restoration Project, California. Engineer Research and Development Center (U.S.), August 2022. http://dx.doi.org/10.21079/11681/45240.

Full text
Abstract:
This technical note is part of a series collaboratively produced by the US Army Corps of Engineers (USACE)–Institute for Water Resources (IWR) and the US Army Engineer Research and Development Center (ERDC). It describes the funding and financing process for the South Bay Salt Pond Restoration Project in San Francisco Bay, California and, like the other technical notes in this series, documents successful examples of funding natural infrastructure projects. The research effort is a collaboration between the Engineering With Nature® (EWN®) and Systems Approach to Geomorphic Engineering (SAGE) programs of USACE. A key need for greater application of natural infrastructure approaches is information about obtaining funds to scope, design, construct, monitor, and adaptively manage these projects. As natural infrastructure techniques vary widely by location, purpose, and scale, there is no standard process for securing funds. The goal of this series is to share lessons learned about a variety of funding and financing methods to increase the implementation of natural infrastructure projects.
APA, Harvard, Vancouver, ISO, and other styles
4

Saalman, Lora, Fei Su, and Larisa Saveleva Dovgal. Cyber Posture Trends in China, Russia, the United States and the European Union. Stockholm International Peace Research Institute, December 2022. http://dx.doi.org/10.55163/elwl8053.

Full text
Abstract:
Current understanding of the cyber postures of China, Russia, the USA and the EU merits re-evaluation. It is often assumed that China and Russia are aligned, yet this is not always the case. Unlike Russia, which has an ongoing focus on information security, China’s official documents incorporate both information security and cybersecurity concerns that are similar to the USA and the EU. Moreover, while often paired, the USA and the EU have differing regulatory structures in cyberspace. Further, both actors increasingly mirror Russian and Chinese concerns about the impact of information warfare on domestic stability. By examining key trends in each actor’s cyber posture, this report identifies points of convergence and divergence. Its conclusions will inform a broader SIPRI project that maps cyber posture trajectories and explores trilateral cyber dynamics among China, Russia and the USA to assist the EU in navigating future cyber escalation and enhancing global cyber stability.
APA, Harvard, Vancouver, ISO, and other styles
5

Coelho Resende, Noelle, Renata Weber, Jardel Fischer Loeck, Mathias Vaiano Glens, Carolina Gomes, Priscila Farfan Barroso, Janine Targino, Emerson Elias Merhy, Leandro Dominguez Barretto, and Carly Machado. Working Paper Series: Therapeutic Communities in Brazil. Edited by Taniele Rui and Fiore Mauricio. Drugs, Security and Democracy Program, Social Science Research Council, June 2021. http://dx.doi.org/10.35650/ssrc.2081.d.2021.

Full text
Abstract:
Spread across Brazil and attaining an unparalleled political force, therapeutic communities are as inescapable in the debate on drug policy as they are complex to define. Although they are not a Brazilian creation, they have been operating in that country for decades, and their dissemination intensified in the 1990s. In 2011, they were officially incorporated into Brazil's Psychosocial Care Network (Rede de Atenção Psicossocial, or RAPS). Since then, therapeutic communities have been at the center of public debates about their regulation; about how they should—or even if they should—be a part of the healthcare system; about the level of supervision to which they should be submitted; about their sources of funding, particularly whether or not they should have access to public funding; and, most importantly, about the quality of the services they offer and the many reports of rights violation that have been made public. However, a well-informed public debate can only flourish if the available information is based on sound evidence. The SSRC’s Drugs, Security and Democracy Program is concerned with the policy relevance of the research projects it supports, and the debate around therapeutic communities in Brazil points to a clear need for impartial research that addresses different cross-cutting aspects of this topic in its various dimensions: legal, regulatory, health, and observance of human rights, among others. It is in this context that we publish this working paper series on therapeutic communities in Brazil. The eight articles that compose this series offer a multidisciplinary view of the topic, expanding and deepening the existing literature and offering powerful contributions to a substantive analysis of therapeutic communities as instruments of public policy. Although they can be read separately, it is as a whole that the strength of the eight articles that make up this series becomes more evident. Even though they offer different perspectives, they are complementary works in—and already essential for—delineating and understanding the phenomenon of therapeutic communities in Brazil.
APA, Harvard, Vancouver, ISO, and other styles
6

Greenfeld, Bari, Margaret Kurth, Matthew Smith, Ellis Kalaidjian, Marriah Abellera, and Jeffrey King. Financing natural infrastructure : Exploration Green, Texas. Engineer Research and Development Center (U.S.), September 2022. http://dx.doi.org/10.21079/11681/45601.

Full text
Abstract:
This technical note is part of a series collaboratively produced by the US Army Corps of Engineers (USACE)–Institute for Water Resources (IWR) and the US Army Engineer Research and Development Center (ERDC). It describes the funding process for Exploration Green, a largescale community initiative that transformed a former golf course into a multipurpose green space with flood detention, habitat, and recreation benefits. It is one in a series of technical notes that document successful examples of funding natural infrastructure projects. The research effort is a collaboration between the Engineering With Nature® (EWN®) and Systems Approach to Geomorphic Engineering (SAGE) programs of USACE. A key need for greater application of natural infrastructure approaches is information about obtaining funds to scope, design, construct, monitor, and adaptively manage these projects. As natural infrastructure techniques vary widely by location, purpose, and scale, there is no standard process for securing funds. The goal of this series is to share lessons learned about a variety of funding and financing methods to increase the implementation of natural infrastructure projects.
APA, Harvard, Vancouver, ISO, and other styles
7

Friedman, Haya, Julia Vrebalov, and James Giovannoni. Elucidating the ripening signaling pathway in banana for improved fruit quality, shelf-life and food security. United States Department of Agriculture, October 2014. http://dx.doi.org/10.32747/2014.7594401.bard.

Full text
Abstract:
Background : Banana being a monocot and having distinct peel and pulp tissues is unique among the fleshy fruits and hence can provide a more comprehensive understanding of fruit ripening. Our previous research which translated ripening discoveries from tomato, led to the identification of six banana fruit-associated MADS-box genes, and we confirmed the positive role of MaMADS1/2 in banana ripening. The overall goal was to further elucidate the banana ripening signaling pathway as mediated by MADS-boxtranscriptional regulators. Specific objectives were: 1) characterize transcriptional profiles and quality of MaMADS1/2 repressed fruit; 2) reveal the role of additional MaMADSgenes in ripening; 3) develop a model of fruit MaMADS-box mode of action; and 4) isolate new components of the banana ripening signaling pathway. Major conclusion: The functions of the banana MaMADS1-5 have been examined by complimenting the rinor the TAGL1-suppressed lines of tomato. Only MaMADS5 exhibited partial complementation of TAGL1-suppressed and rinlines, suggesting that while similar genes play corresponding roles in ripening, evolutionary divergence makes heterologous complementation studies challenging. Nevertheless, the partial complementation of tomato TAGL1-surpessed and rinlines with MaMADS5 suggests this gene is likely an important ripening regulator in banana, worthy of further study. RNA-seqtranscriptome analysis during ripening was performed on WT and MaMADS2-suppressed lines revealing additional candidate genes contributing to ripening control mechanisms. In summary, we discovered 39 MaMADS-box genes in addition to homologues of CNR, NOR and HB-1 expressed in banana fruits, and which were shown in tomato to play necessary roles in ripening. For most of these genes the expression in peel and pulp was similar. However, a number of key genes were differentially expressed between these tissues indicating that the regulatory components which are active in peel and pulp include both common and tissue-specific regulatory systems, a distinction as compared to the more uniform tomato fruit pericarp. Because plant hormones are well documented to affect fruit ripening, the expressions of genes within the auxin, gibberellin, abscisic acid, jasmonic acid, salicylic and ethylene signal transduction and synthesis pathways were targeted in our transcriptome analysis. Genes’ expression associated with these pathways generally declined during normal ripening in both peel and pulp, excluding cytokinin and ethylene, and this decline was delayed in MaMADS2-suppressed banana lines. Hence, we suggest that normal MaMADS2 activity promotes the observed downward expression within these non-ethylene pathways (especially in the pulp), thus enabling ripening progression. In contrast, the expressions of ACSand ACOof the ethylene biosynthesis pathway increase in peel and pulp during ripening and are delayed/inhibited in the transgenic bananas, explaining the reduced ethylene production of MaMADS2-suppressed lines. Inferred by the different genes’ expression in peel and pulp of the gibberellins, salicylic acid and cytokinins pathways, it is suggested that hormonal regulation in these tissues is diverse. These results provide important insights into possible avenues of ripening control in the diverse fruit tissues of banana which was not previously revealed in other ripening systems. As such, our transcriptome analysis of WT and ripening delayed banana mutants provides a starting point for further characterization of ripening. In this study we also developed novel evidence that the cytoskeleton may have a positive role in ripening as components of this pathway were down-regulated by MaMADS2 suppression. The mode of cytoskeleton involvement in fruit ripening remains unclear but presents a novel new frontier in ripening investigations. In summary, this project yielded functional understanding of the role and mode of action of MaMADS2 during ripening, pointing to both induction of ethylene and suppression of non-ethylene hormonal singling pathways. Furthermore, our data suggest important roles for cytoskeleton components and MaMADS5 in the overall banana ripening control network. Implications: The project revealed new molecular components/genes involved in banana ripening and refines our understanding of ripening responses in the peel and pulp tissues of this important species. This information is novel as compared to that derived from the more uniform carpel tissues of other highly studied ripening systems including tomato and grape. The work provides specific target genes for potential modification through genetic engineering or for exploration of useful genetic diversity in traditional breeding. The results from the project might point toward improved methods or new treatments to improve banana fruit storage and quality.
APA, Harvard, Vancouver, ISO, and other styles
8

Beuermann, Diether, Nicolas L. Bottan, Bridget Hoffmann, Jeetendra Khadan, and Diego A. Vera-Cossio. Suriname COVID-19 Survey. Inter-American Development Bank, May 2021. http://dx.doi.org/10.18235/0003266.

Full text
Abstract:
This dataset constitutes a panel follow-up to the 2016/2017 Suriname Survey of Living Conditions. It measures welfare related variables before and after the onset of the COVID-19 pandemic including labor market outcomes, financial literacy, and food security. The survey was executed in August 2020. The Suriname COVID-19 Survey is a project of the Inter-American Development Bank (IDB). It collected data on critical socioeconomic topics in the context of the COVID-19 pandemic to support policymaking and help mitigate the crisis impacts on the populations welfare. The survey recontacted households interviewed in 2016/2017 by the Suriname Survey of Living Conditions (SSLC) and was conducted by phone due to the mobility restrictions and social distancing measures in place. It interviewed 1,016 households during August 2020 and gathered information about disease transmission, household finances, labor, income, remittances, spending, and social protection programs. Data and documentation of the 2016/2017 Suriname Survey of Living Conditions can be found at: https://publications.iadb.org/en/suriname-survey-living-conditions-2016-2017 The survey was designed and implemented by Sistemas Integrales. This publication describes the main methodological aspects, such as sample design, estimation procedures, topics covered by the questionnaire, field organization and quality control. It also presents the structure and codebook for the two resulting publicly available datasets.
APA, Harvard, Vancouver, ISO, and other styles
9

Schmidt-Sane, Megan, Tabitha Hrynick, Elizabeth Benninger, Janet McGrath, and Santiago Ripoll. The COVID-19 YPAR Project: Youth Participatory Action Research (YPAR) to Explore the Context of Ethnic Minority Youth Responses to COVID-19 Vaccines in the United States and United Kingdom. Institute of Development Studies, October 2022. http://dx.doi.org/10.19088/ids.2022.072.

Full text
Abstract:
Despite progress in COVID-19 vaccination rates overall in the US and UK, vaccine inequity persists as young people from minoritised and/or deprived communities are often less likely to be vaccinated. COVID-19 ‘vaccine hesitancy’ is not just an issue of misinformation or lack of information. ‘Vaccine hesitancy’ among young people is reflective of wider issues such as mistrust in the state or the medical establishment and negative experiences during the pandemic. This report is based on case study research conducted among young people (ages 12-18) in Cleveland, Ohio, US and the London borough of Ealing, UK. Whilst public discourse may label young people as ‘vaccine hesitant,’ we found that there were differences based on social location and place and this labelling may portray young people as ‘ignorant.’ We found the greatest vaccine hesitancy among older youth (15+ years old), particularly those from minoritised and deprived communities. Unvaccinated youth were also more likely to be from families and friend groups that were unvaccinated. While some expressed distrust of the vaccines, others reported that COVID-19 prevention was not a priority in their lives, but instead concerns over food security, livelihood, and education take precedence. Minoritised youth were more likely to report negative experiences with authorities, including teachers at their schools and police in their communities. Our findings demonstrate that COVID-19 vaccine hesitancy is embedded in a context that drives relationships of mistrust between minoritised and deprived communities and the state, with implications for COVID-19 vaccine uptake. Young people’s attitudes toward vaccines are further patterned by experiences within their community, school, family, and friend groups.
APA, Harvard, Vancouver, ISO, and other styles
10

Lers, Amnon, Majid R. Foolad, and Haya Friedman. genetic basis for postharvest chilling tolerance in tomato fruit. United States Department of Agriculture, January 2014. http://dx.doi.org/10.32747/2014.7600014.bard.

Full text
Abstract:
ABSTRACT Postharvest losses of fresh produce are estimated globally to be around 30%. Reducing these losses is considered a major solution to ensure global food security. Storage at low temperatures is an efficient practice to prolong postharvest performance of crops with minimal negative impact on produce quality or human health and the environment. However, many fresh produce commodities are susceptible to chilling temperatures, and the application of cold storage is limited as it would cause physiological chilling injury (CI) leading to reduced produce quality. Further, the primary CI becomes a preferred site for pathogens leading to decay and massive produce losses. Thus, chilling sensitive crops should be stored at higher minimal temperatures, which curtails their marketing life and in some cases necessitates the use of other storage strategies. Development of new knowledge about the biological basis for chilling tolerance in fruits and vegetables should allow development of both new varieties more tolerant to cold, and more efficient postharvest storage treatments and storage conditions. In order to improve the agricultural performance of modern crop varieties, including tomato, there is great potential in introgression of marker-defined genomic regions from wild species onto the background of elite breeding lines. To exploit this potential for improving tomato fruit chilling tolerance during postharvest storage, we have used in this research a recombinant inbred line (RIL) population derived from a cross between the red-fruited tomato wild species SolanumpimpinellifoliumL. accession LA2093 and an advanced Solanum lycopersicumL. tomato breeding line NCEBR-1, developed in the laboratory of the US co-PI. The original specific objectives were: 1) Screening of RIL population resulting from the cross NCEBR1 X LA2093 for fruit chilling response during postharvest storage and estimation of its heritability; 2) Perform a transcriptopmic and bioinformatics analysis for the two parental lines following exposure to chilling storage. During the course of the project, we learned that we could measure greater differences in chilling responses among specific RILs compared to that observed between the two parental lines, and thus we decided not to perform transcriptomic analysis and instead invest our efforts more on characterization of the RILs. Performing the transcriptomic analysis for several RILs, which significantly differ in their chilling tolerance/sensitivity, at a later stage could result with more significant insights. The RIL population, (172 lines), was used in field experiment in which fruits were examined for chilling sensitivity by determining CI severity. Following the field experiments, including 4 harvest days and CI measurements, two extreme tails of the response distribution, each consisting of 11 RILs exhibiting either high sensitivity or tolerance to chilling stress, were identified and were further examined for chilling response in greenhouse experiments. Across the RILs, we found significant (P < 0.01) correlation between field and greenhouse grown plants in fruit CI. Two groups of 5 RILs, whose fruits exhibited reproducible chilling tolerant/sensitive phenotypes in both field and greenhouse experiments, were selected for further analyses. Numerous genetic, physiological, biochemical and molecular variations were investigated in response to postharvest chilling stress in the selected RILs. We confirmed the differential response of the parental lines of the RIL population to chilling stress, and examined the extent of variation in the RIL population in response to chilling treatment. We determined parameters which would be useful for further characterization of chilling response in the RIL population. These included chlorophyll fluorescence Fv/Fm, water loss, total non-enzymatic potential of antioxidant activity, ascorbate and proline content, and expression of LeCBF1 gene, known to be associated with cold acclimation. These parameters could be used in continuation studies for the identification and genetic mapping of loci contributing to chilling tolerance in this population, and identifying genetic markers associated with chilling tolerance in tomato. Once genetic markers associated with chilling tolerance are identified, the trait could be transferred to different genetic background via marker-assisted selection (MAS) and breeding. The collaborative research established in this program has resulted in new information and insights in this area of research and the collaboration will be continued to obtain further insights into the genetic, molecular biology and physiology of postharvest chilling tolerance in tomato fruit. The US Co-PI, developed the RIL population that was used for screening and measurement of the relevant chilling stress responses and conducted statistical analyses of the data. Because we were not able to grow the RIL population under field conditions in two successive generations, we could not estimate heritability of response to chilling temperatures. However, we plan to continue the research, grow the RIL progeny in the field again, and determine heritability of chilling tolerance in a near future. The IS and US investigators interacted regularly and plan to continue and expand on this study, since combing the expertise of the Co-PI in genetics and breeding with that of the PI in postharvest physiology and molecular biology will have great impact on this line of research, given the significant findings of this one-year feasibility project.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography