Publicação
Computational security models in organizations: bringing a pedagogical user-centered perspective
| Resumo: | The security of systems and networks is a multidisciplinary challenge of increasingly importance which has stimulated the development of multiple solutions for an effective response to the requirements that are needed. In pursuing this demand much of the focus of security proposals has focused on ensuring mechanisms that prevent organizations from being attacked from outside their perimeter. However, the evolution of the tasks carried out by the internal organizations collaborators, which demand an increasing degree of use of computational resources and privileged access to multiple sources of information, emerge an increasing concern in the monitoring of the behaviours of the users. In addition to this problem, there is often an ill-defined borderline confusion over what internal workers should be able to do with the resources they have in organizations. The mix between strictly professional use and personal use can be problematic in organization's security context. Define organizations security policies, understand user’ behaviours, act effectively over security incidents and promote users’ organizational security culture, by a pedagogical approach seems to us to be a necessary advance in security frameworks nowadays. This paper presents a reflection on the aspects of internal security of Local Area Networks and proposes a conceptual security framework, which aims to contribute to an effective control and understanding of LANs user’ behaviour, to a real-time response to unwanted occurrences but, especially, to a pedagogical approach to help the development of users’ security culture. |
|---|---|
| Autores principais: | Cunha, Carlos R. |
| Outros Autores: | Gomes, João Pedro; Morais, Elisabete Paulo |
| Assunto: | Security models User-centered systems Computational security Conceptual model |
| Ano: | 2018 |
| País: | Portugal |
| Tipo de documento: | comunicação em conferência |
| Tipo de acesso: | acesso aberto |
| Instituição associada: | Instituto Politécnico de Bragança |
| Idioma: | inglês |
| Origem: | Biblioteca Digital do IPB |
Registos relacionados
category Special issue on social and ethical aspects of secure computing
por: Soares, Filipe de Sá
Publicado em: (2008)
por: Soares, Filipe de Sá
Publicado em: (2008)
article A study on security grade assignment model for mobile users in urban computing
por: Ko, Hoon
Publicado em: (2013)
por: Ko, Hoon
Publicado em: (2013)
groups Cloud computing and security.
por: Simões, Paulo
Publicado em: (2015)
por: Simões, Paulo
Publicado em: (2015)
school HANDLING CYBERSECURITY RELATED INCIDENTS IN THE SECURITY OPERATION CENTER OF THE POLYTECHNIC OF LEIRIA
por: Mateus, Marco Alexandre Clemente
Publicado em: (2021)
por: Mateus, Marco Alexandre Clemente
Publicado em: (2021)
school Secure multiParty computation protocols
por: Torres, Daniel Casanova Faria
Publicado em: (2015)
por: Torres, Daniel Casanova Faria
Publicado em: (2015)
article A formal treatment of the role of verified compilers in secure computation
por: Almeida, José Bacelar
Publicado em: (2022)
por: Almeida, José Bacelar
Publicado em: (2022)
school Incorporation of quantum technologies in secure communication and computation services
por: Matos, Diogo Filipe Tavares
Publicado em: (2025)
por: Matos, Diogo Filipe Tavares
Publicado em: (2025)
school Object modeling for user-centered development and user interface design: the wisdom approach
por: Nunes, Nuno Jardim
Publicado em: (2001)
por: Nunes, Nuno Jardim
Publicado em: (2001)
article An activity-centered ubiquitous computing framework for public spaces
por: Pinto, Helder
Publicado em: (2007)
por: Pinto, Helder
Publicado em: (2007)
school Machine Learning to Improve Security Operations Centers
por: Sousa, Norberto João Gomes Lopes de
Publicado em: (2022)
por: Sousa, Norberto João Gomes Lopes de
Publicado em: (2022)
article Challenges of Securing Internet of Things Devices
por: Samaila, Musa Gwani
Publicado em: (2018)
por: Samaila, Musa Gwani
Publicado em: (2018)
groups Competence-based model for securing the in-ternet of things in organizations
por: Silva, Rui
Publicado em: (2016)
por: Silva, Rui
Publicado em: (2016)
article Bridging the gap between organizations policies and the network security and systems administration in SMEs
por: Cunha, Carlos R.
Publicado em: (2013)
por: Cunha, Carlos R.
Publicado em: (2013)
groups Contexts-management strategy in considering the security in urban computing based on urban design
por: Ko, Hoon
Publicado em: (2011)
por: Ko, Hoon
Publicado em: (2011)
book Design Thinking and Gamification: User Centered Methodologies
por: Villegas, Eva
Publicado em: (2021)
por: Villegas, Eva
Publicado em: (2021)
article Applications of artificial immune systems to computer security: A survey
por: Fernandes, Diogo A. B.
Publicado em: (2017)
por: Fernandes, Diogo A. B.
Publicado em: (2017)
article User-Centered Dashboard Design in Serious VR Game for Cognitive Rehabilitation
por: Neto, Jecé Xavier
Publicado em: (2025)
por: Neto, Jecé Xavier
Publicado em: (2025)
school IMPLEMENTAÇÃO DE UM SECURITY OPERATIONS CENTER
por: Fernandes, Alexandre Josué Confraria
Publicado em: (2021)
por: Fernandes, Alexandre Josué Confraria
Publicado em: (2021)
article Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL
por: Tu, Shanshan
Publicado em: (2020)
por: Tu, Shanshan
Publicado em: (2020)
groups User-Centered CASE Tools for User-Centered Information Systems
por: Campos, Pedro
Publicado em: (2005)
por: Campos, Pedro
Publicado em: (2005)
article Bringing together high school actors using mobile applications: a conceptual model proposal
por: Cunha, Carlos R.
Publicado em: (2019)
por: Cunha, Carlos R.
Publicado em: (2019)
school Icarus - A Cloud Security Perspective
por: Maciel, Henrique Nuno Marques
Publicado em: (2021)
por: Maciel, Henrique Nuno Marques
Publicado em: (2021)
school Analyzing and quantifying security data through a geospatial visualization framework : empirical research regarding social and economic indicators in Portugal
por: Nascimento, Marcel Motta do
Publicado em: (2019)
por: Nascimento, Marcel Motta do
Publicado em: (2019)
groups A proposal framework security assessment for large language models
por: Colares, Daniel Mendonça
Publicado em: (2024)
por: Colares, Daniel Mendonça
Publicado em: (2024)
article Comprehensive Security: The Opportunities and Challenges of Incorporating Environmental Threats in Security Policy
por: Räisänen, Helmi
Publicado em: (2021)
por: Räisänen, Helmi
Publicado em: (2021)
image Modeling and analysis of network resilience : the security perspective
por: Rodrigues, Nuno G.
Publicado em: (2012)
por: Rodrigues, Nuno G.
Publicado em: (2012)
image Modeling and analysis of network resilience : the security perspective
por: Rodrigues, Nuno G.
Publicado em: (2013)
por: Rodrigues, Nuno G.
Publicado em: (2013)
article Automated Reusable Tests for Mitigating Secure Pattern Interpretation Errors
por: Cunha, Carlos
Publicado em: (2023)
por: Cunha, Carlos
Publicado em: (2023)
article Definition of information systems security policies
por: Lopes, Isabel Maria
Publicado em: (2017)
por: Lopes, Isabel Maria
Publicado em: (2017)
school Threat Detection with Computer Vision
por: Cardoso, Gabriel Azenha
Publicado em: (2023)
por: Cardoso, Gabriel Azenha
Publicado em: (2023)
school Why phishing attacks remain a threat for organizations with a robust cyber security
por: Wahl, Axel Rynjus
Publicado em: (2022)
por: Wahl, Axel Rynjus
Publicado em: (2022)
article Using Secure Multi-Party Computation to Create Clinical Trial Cohorts
por: Borges, Rafael
Publicado em: (2025)
por: Borges, Rafael
Publicado em: (2025)
school Cloud computing: prática organizacional
por: Sá, Rui Carlos Pereira da Silva Durão de
Publicado em: (2024)
por: Sá, Rui Carlos Pereira da Silva Durão de
Publicado em: (2024)
article Web applications security and vulnerability analysis financial web applications security audit – a case study
por: Vieira, T.
Publicado em: (2016)
por: Vieira, T.
Publicado em: (2016)
article A cooperative agent-based security framework
por: Cunha, Carlos R.
Publicado em: (2013)
por: Cunha, Carlos R.
Publicado em: (2013)
article Recent Trends in Applying TPM to Cloud Computing
por: Hosseinzadeh, Shohreh
Publicado em: (2019)
por: Hosseinzadeh, Shohreh
Publicado em: (2019)
article A trust model for cloud computing environment
por: Branco, T. T.
Publicado em: (2015)
por: Branco, T. T.
Publicado em: (2015)
article Cyber Security Assemblages: A Framework for Understanding the Dynamic and Contested Nature of Security Provision
por: Collier, Jamie
Publicado em: (2018)
por: Collier, Jamie
Publicado em: (2018)
school Volatility GUI : Simplifying Memory analysis
por: Monteiro, Alexandre de Sousa
Publicado em: (2022)
por: Monteiro, Alexandre de Sousa
Publicado em: (2022)
article An agent-based security framework for cooperative business networks
por: Cunha, Carlos R.
Publicado em: (2013)
por: Cunha, Carlos R.
Publicado em: (2013)
Registos relacionados
-
category Special issue on social and ethical aspects of secure computing
por: Soares, Filipe de Sá
Publicado em: (2008) -
article A study on security grade assignment model for mobile users in urban computing
por: Ko, Hoon
Publicado em: (2013) -
groups Cloud computing and security.
por: Simões, Paulo
Publicado em: (2015) -
school HANDLING CYBERSECURITY RELATED INCIDENTS IN THE SECURITY OPERATION CENTER OF THE POLYTECHNIC OF LEIRIA
por: Mateus, Marco Alexandre Clemente
Publicado em: (2021) -
school Secure multiParty computation protocols
por: Torres, Daniel Casanova Faria
Publicado em: (2015)