ebook img

Global Security, Safety, and Sustainability: 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010. Proceedings PDF

309 Pages·2010·8.007 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Global Security, Safety, and Sustainability: 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010. Proceedings

Communications in Computer and Information Science 92 Sérgio Tenreiro de Magalhães Hamid Jahankhani Ali G. Hessami (Eds.) Global Security, Safety, and Sustainability 6th International Conference, ICGS3 2010 Braga, Portugal, September 1-3, 2010 Proceedings 1 3 VolumeEditors SérgioTenreirodeMagalhães UniversidadeCatólicaPortuguesa Braga,Portugal E-mail:[email protected] HamidJahankhani UniversityofEastLondon London,UK E-mail:[email protected] AliG.Hessami CityUniversity London,UK E-mail:[email protected] LibraryofCongressControlNumber:Appliedfor CRSubjectClassification(1998):C.2,K.6.5,D.4.6,E.3,H.4,J.1 ISSN 1865-0929 ISBN-10 3-642-15716-5SpringerBerlinHeidelbergNewYork ISBN-13 978-3-642-15716-5SpringerBerlinHeidelbergNewYork Thisworkissubjecttocopyright.Allrightsarereserved,whetherthewholeorpartofthematerialis concerned,specificallytherightsoftranslation,reprinting,re-useofillustrations,recitation,broadcasting, reproductiononmicrofilmsorinanyotherway,andstorageindatabanks.Duplicationofthispublication orpartsthereofispermittedonlyundertheprovisionsoftheGermanCopyrightLawofSeptember9,1965, initscurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Violationsareliable toprosecutionundertheGermanCopyrightLaw. springer.com ©Springer-VerlagBerlinHeidelberg2010 PrintedinGermany Typesetting:Camera-readybyauthor,dataconversionbyScientificPublishingServices,Chennai,India Printedonacid-freepaper 06/3180 543210 Preface The annual International Conference on Global Security, Safety and Sustainability (ICGS3) is an established platform in which security, safety and sustainability issues can be examined from several global perspectives through dialogue between academ- ics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe. The three-day conference focused on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. The importance of adopting systematic and systemic ap- proaches to the assurance of these systems was emphasized within a special stream focused on strategic frameworks, architectures and human factors. The conference provided an opportunity for systems scientists, assurance researchers, owners, opera- tors and maintainers of large, complex and advanced systems and infrastructures to update their knowledge on the state of best practice in these challenging domains while networking with the leading researchers and solution providers. ICGS3 2010 received paper submissions from more than 17 different countries in all continents. Only 31 papers were selected and were presented as full papers. The program also included a number of keynote lectures by leading researchers, security professionals and government representatives. June 2010 Hamid Jahankhani Organization Organizers Universidade Católica Portuguesa, Faculdade de Ciências Sociais, Portugal University of East London, School of Computing, IT and Engineering, UK IEEE SMC, Technical Committee for Systems Safety & Security General Chair Hamid Jahankhani University of East London, UK IEEE SMC Chair Ali Hessami Vega Systems, UK Program Committee Chair Sérgio Tenreiro de Magalhães Universidade Católica Portuguesa, Portugal Henrique M.D. Santos University of Minho, Portugal Local Chair Sérgio Tenreiro de Magalhães Universidade Católica Portuguesa, Portugal Program Committee Major G.S. Aki Huhtinen National Defence College, Finland Ali Hessami Vega Systems, UK Ali Sanayei Director of ITM Research group, University of Isfahan, Iran Ameer Al-Nemrat University of East London, UK Carlos Sousa Pinto University of Minho, Portugal David Lilburn Watson Forensic Computing Ltd., UK Duarte Duque EXVA Ltd., Portugal Elias Pimenidis University of East London, UK Feng Hsu Aerospace Technology Working Group, USA Col Fernando Freire Military Academy, Portugal Florin Gorunescu University of Medicine and Pharmacy of Craiova, Romania Filipe de Sá-Soares University of Minho, Portugal VIII Organization George Weir University of Strathclyde, UK Gianluigi Me University of Rome Tor Vergata, Italy Henrique M.D. Santos University of Minho, Portugal Hossein Jahankhani University of East London, UK Hugo Gamboa New University of Lisbon, Portugal Kenneth Revett University of Westminster, UK Konstantinos Kardaras Technical Consultant, Greece Leonel Duarte dos Santos University of Minho, Portugal Marios Efthymiopoulos University of Cyprus, Cyprus Orhan Gemikonakl Middlesex University, UK Mohammad Dastbaz University of East London, UK Paulo Viegas Nunes Military Academy, Portugal Rain Ottis Cooperative Cyber Defence Centre of Excellence, Estonia Reza Sahandi Bournemouth University, UK Sérgio Tenreiro de Magalhães Catholic University of Portugal, Portugal Sufian Yousef Anglia Ruskin University, UK Vasilios Zorkadis Directorate of the Hellenic Data Protection Authority, Greece Table of Contents Management of the Benefits on the Client’s Involvement on Ergonomic Analysis ........................................................ 1 Isabel F. Loureiro, Celina P. Lea˜o, and Pedro Arezes A Security Audit Framework to Manage Information System Security ........................................................ 9 Teresa Pereira and Henrique Santos The Cloud’s Core Virtual Infrastructure Security .................... 19 Annette Tolnai and Sebastiaan von Solms Collaboration and Command Tools for Crises Management............ 28 Tapio Saarelainen and Jorma Jormakka Trust and Reputation Management for Critical Infrastructure Protection ...................................................... 39 Filipe Caldeira, Edmundo Monteiro, and Paulo Simo˜es An Approach to Textual Steganography ............................ 48 Michael Morran and George R.S. Weir Cybercrime Victimisations/Criminalisation and Punishment........... 55 Ameer Al-Nemrat, Hamid Jahankhani, and David S. Preston Baby-Crying Acceptance.......................................... 63 Tiago Martins and S´ergio Tenreiro de Magalha˜es Design of Discrete Variable Structure Controller Based on Variable Boundary Layer ................................................. 71 Shibin Su, Heng Wang, Hua Zhang, and Wei Xiong Cognitive Biometrics: Challenges for the Future...................... 79 Kenneth Revett and Sergio Tenreiro de Magalh˜aes Multimodal Biometrics and Multilayered IDM for Secure Authentication .................................................. 87 Abdullah Rashed and Henrique Santos SecureBiometricMulti-LogonSystemBasedonCurrentAuthentication Technologies .................................................... 96 Bobby L. Tait Analysis of Fingerprint Image to Verify a Person..................... 104 Hossein Jahankhani and Maktuba Mohid X Table of Contents Methods of Organizational Information Security (A Literature Review) ............................................ 120 Jos´e Martins and Henrique dos Santos OTM Machine Acceptance: In the Arab Culture ..................... 131 Abdullah Rashed and Henrique Santos AStudyontheInterrelationsbetweentheSecurity-RelatedAntecedents of Customers’ Online Trust........................................ 139 Hamid Reza Peikari Does Nationality Matter in the B2C Environment? Results from a Two Nation Study.................................................... 149 Hamid Reza Peikari Deployment of ERP Systems at Automotive Industries, Security Inspection (Case Study: IRAN KHODRO Automotive Company) ...... 160 Hatamirad Ali and Mehrjerdi Hasan Governance and Risk Management of Network and Information Security: The Role of Public Private Partnerships in Managing the Existing and Emerging Risks ...................................... 170 Jyoti Navare and Orhan Gemikonakli The Effect of Non-technical Factors in B2C E-Commerce (A Case Study in Iran) ........................................... 178 Ali Sanayei and Reza Shafe’ei Self-monitoring Composite Rods for Sustainable Construction ......... 193 Cristiana Gonilho-Pereira, Emilija Zdraveva, Raul Fangueiro, S. Lanceros-Mendez, Said Jalali, and Ma´rio de Arau´jo Systems Assurance, Complexity and Emergence: The Need for a Systems Based Approach ......................................... 202 Ali Hessami and Nicos Karcanias A Review on Sustainability Models................................. 216 Amin Hosseinian Far, Elias Pimenidis, Hamid Jahankhani, and D.C. Wijeyesekera The Influence of Security Statement, Technical Protection, and Privacy on Satisfaction and Loyalty;A Structural Equation Modeling.......... 223 Hamid Reza Peikari “Fiscal Illusion Causes Fiscal Delusion – Please Be Careful!” .......... 232 Paulo Mourao A Coloured Petri Net Analysis of the Transaction Internet Protocol .... 238 Christos K. Georgiadis, Ioannis Kokkinidis, and Elias Pimenidis Table of Contents XI Identification of the Required Security Practices during e-Government Maturity........................................................ 250 Ali Shayan, Behnam Abdi, and Malihe Qeisari Dynamic Device Configuration in Ubiquitous Environments ........... 263 Abdullahi Arabo, Qi Shi, and Madjid Merabti Mitigation of Control Channel Jamming via Combinatorial Key Distribution..................................................... 274 Abolfazl Falahati and Mahdi Azarafrooz A Proxy Signature Scheme Based on Coding Theory ................. 282 Hoda Jannati and Abolfazl Falahati Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes.............................................. 291 Saeed Ebadi Tavallaei and Abolfazl Falahati Author Index.................................................. 301 Management of the Benefits on the Client’s Involvement on Ergonomic Analysis ∗ Isabel F. Loureiro , Celina P. Leão, and Pedro Arezes Departamento de Produção e Sistemas, Escola de Engenharia, Universidade do Minho, 4710-057 Braga, Portugal Abstract. Nowadays, market trade economy is witnessing to a continuous de- velopment and transformation. The organizations come to be seen as socio- technical systems with new ergonomic contexts. Various types of relationships can be established. From the ergonomic analysis point of view, it is necessary to understand all the mechanisms that regulate these relationships. The interac- tion between clients and professionals (workers) reproduce a relationship that can be important to the ergonomic analysis. This paper allows a better compre- hension of the relationship in the effective’s ergonomic intervention. A case study was analyzed in a private health sector using the Ergonomic Three- dimension Analysis as an ergonomic approach. This analysis is made by three different but related dimensions: analyst, professional and client. The results show that that clients’ involvement in the ergonomic analysis will benefit the ergonomic intervention and consequently the professional environment. Keywords: systems, relationships, clients, analysis, intervention. 1 Introduction In the last years, the corporations are no longer the centre of the market economy. They became a scene for different actors who, over time, have different roles within organizations. This new market approach provides that organizations come to be seen as a socio-technical system [1] comprising a set of different but interrelated subsys- tems involved: supplier, customer, employee, patient, managers … [2]. The oncoming between these subsystems is the result of the technological revolution boom involving new communication technologies and information [3]. This whole process of chang- ing will have impact in the chain distribution were clients are assuming a vital role. According to Lindon (2000) [4], the corporation is constructed in such a way as to en- sure an effective response to the marketing exigencies. Client commands the corporation destiny, and the top management strategies are developed in horizontal collaboration, stretching the different organization hierarchies [4]. The quality of goods and services are improved through the participation of individuals at all organization levels [5].Therefore, the total quality management philosophy must be focused not only in workforce satisfac- tion, but also in clients’ satisfaction since in modern social-technical systems they are in- trinsically linked to the organizations. This complexity of work systems [6] originates new ergonomic contexts, and for each one, it can be establish various types of relationships: ∗ Corresponding author; [email protected] S. Tenreiro de Magalhães, H. Jahankhani, and A.G. Hessami (Eds.): ICGS3 2010, CCIS 92, pp. 1–8, 2010. © Springer-Verlag Berlin Heidelberg 2010

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.