816   Artículos

« Anterior     Página: 1 de 41     Siguiente »

 
en línea
Duy Dang-Pham,Karlheinz Kautz,Siddhi Pittayachawan,Vince Bruno    
Behavioural information security (InfoSec) research has studied InfoSec at workplaces through the employees? perceptions of InfoSec climate, which is determined by observable InfoSec practices performed by their colleagues and direct supervisors. Prior s... ver más
Revista: Australasian Journal of Information Systems    Formato: Electrónico

 
en línea
A. A. Grusho,N. A. Grusho,M. I. Zabezhailo,E. E. Timonina     Pág. 61 - 66
In the paper the methods of estimation of security of the distributed information systems in the conditions of assumptions of security with usage of language of diagrams of information security are developed. The principle of prevention of damage which c... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Agata McCormac,Dragana Calic,Marcus Butavicius,Kathryn Parsons,Tara Zwaans,Malcolm Pattinson    
The Human Aspects of Information Security Questionnaire (HAIS-Q) is designed to measure Information Security Awareness. More specifically, the tool measures an individual?s knowledge, attitude, and self-reported behaviour relating to information security... ver más
Revista: Australasian Journal of Information Systems    Formato: Electrónico

 
en línea
Craig A. Horne,Sean B. Maynard,Atif Ahmad    
Dependence on information, including for some of the world?s largest organisations such as governments and multi-national corporations, has grown rapidly in recent years. However, reports of information security breaches and their associated consequences... ver más
Revista: Australasian Journal of Information Systems    Formato: Electrónico

 
en línea
Lothar Fritsch    
This article speculates on the future of privacy and electronic identities on the Internet. Based on a short review of security models and the development of privacy-enhancing technology, privacy and electronic identities will be discussed as parts of a ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
L. C.H. Fourie    
AbstractThe growing misuse of information technology and the increased dependence on computer technology and systems heightened the requirements for information security. Unfortunately there often is a feeling of apathy towards information security by ma... ver más
Revista: South African Journal of Business Management    Formato: Electrónico

 
en línea
Boyu Zhu, Song Deng, Yunan Xu, Xinya Yuan and Zi Zhang    
With the high integration of smart grid information and physical systems, the security of information systems must affect the safe and stable operation of physical systems. Risk assessment is an effectual means to objectively evaluate the information sec... ver más
Revista: Information    Formato: Electrónico

 
en línea
Pankaj Pandey and Einar Snekkenes    
For many individuals and organizations, cyber-insurance is the most practical and only way of handling a major financial impact of an information security event. However, the cyber-insurance market suffers from the problem of information asymmetry, lack ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Sushma Mishra, Donald J. Caputo, Gregory J. Leone, Fred G. Kohun, Peter J. Draus    
The purpose and intent of this research study is to understand and interpret the perception of stakeholders in healthcare organizations concerning security awareness and communications. The data is analyzed using the demographic characteristics of age, g... ver más

 
en línea
Benjamin Khoo, Peter Harris, Stephen Hartman    
Enterprises are now operating in the network economy.  The network economy is dependent on the information infrastructure via the Internet.  Organizations of all types (business, academia, government, etc.) are facing risks resulting from their... ver más

 
en línea
Amirhossein Javaherikhah, Mercedes Valiente Lopez and Saeed Reza Mohandes    
Due to the unique atmospheric conditions on Mars, the management of essential information in Mars buildings is of great importance. Even the smallest error or manipulation of data can create irreparable risks for residents. Martian buildings require a st... ver más
Revista: Buildings    Formato: Electrónico

 
en línea
Tareq Salahi Almigheerbi, David Ramsey and Anna Lamek    
This paper is a part of an exploratory study with the goal of investigating the applicability of collaboratively-developed enterprise resource planning (the CD-ERP approach) within Libyan public universities. Since it is being proposed in order to overco... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yelyzaveta Meleshko     Pág. 52 - 57
The subject matter of the research is the process of identifying information attacks on the recommendation system. The goal of this work is to develop a method for detecting information attack objects in a recommendation system based on the analysis of t... ver más

 
en línea
Haidong Zhong, Xianyi Chen and Qinglong Tian    
Recently, reversible image transformation (RIT) technology has attracted considerable attention because it is able not only to generate stego-images that look similar to target images of the same size, but also to recover the secret image losslessly. The... ver más
Revista: Information    Formato: Electrónico

 
en línea
Bing Su and Jiwu Liang    
With the innovation of wireless communication technology and the surge of data in mobile networks, traditional routing strategies need to be improved. Given the shortcomings of existing opportunistic routing strategies in transmission performance and sec... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Fahad Alqahtani, Mohammed Almutairi and Frederick T. Sheldon    
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead o... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Maki Kihara and Satoshi Iriyama    
A new class of cryptosystems called verifiable encryption (VE) that facilitates the verification of two plaintexts without decryption was proposed in our previous paper. The main contributions of our previous study include the following. (1) Certain cryp... ver más
Revista: Information    Formato: Electrónico

 
en línea
Harshvardhan J. Pandit    
Solid is a new radical paradigm based on decentralising control of data from central organisations to individuals that seeks to empower individuals to have active control of who and how their data is being used. In order to realise this vision, the use-c... ver más
Revista: Information    Formato: Electrónico

 
en línea
Thiago Poleto, Thyago Celso Cavalcante Nepomuceno, Victor Diogho Heuer de Carvalho, Ligiane Cristina Braga de Oliveira Friaes, Rodrigo Cleiton Paiva de Oliveira and Ciro José Jardim Figueiredo    
This paper aims to analyze the intellectual structure and research fronts in application information security in smart cities to identify research boundaries, trends, and new opportunities in the area. It applies bibliometric analyses to identify the mai... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ryosuke Kakiuchi, Dinh Tuan Tran and Joo-Ho Lee    
Revista: Drones    Formato: Electrónico

« Anterior     Página: 1 de 41     Siguiente »