|
|
|
Duy Dang-Pham,Karlheinz Kautz,Siddhi Pittayachawan,Vince Bruno
Behavioural information security (InfoSec) research has studied InfoSec at workplaces through the employees? perceptions of InfoSec climate, which is determined by observable InfoSec practices performed by their colleagues and direct supervisors. Prior s...
ver más
|
|
|
|
|
|
|
A. A. Grusho,N. A. Grusho,M. I. Zabezhailo,E. E. Timonina
Pág. 61 - 66
In the paper the methods of estimation of security of the distributed information systems in the conditions of assumptions of security with usage of language of diagrams of information security are developed. The principle of prevention of damage which c...
ver más
|
|
|
|
|
|
|
Agata McCormac,Dragana Calic,Marcus Butavicius,Kathryn Parsons,Tara Zwaans,Malcolm Pattinson
The Human Aspects of Information Security Questionnaire (HAIS-Q) is designed to measure Information Security Awareness. More specifically, the tool measures an individual?s knowledge, attitude, and self-reported behaviour relating to information security...
ver más
|
|
|
|
|
|
|
Craig A. Horne,Sean B. Maynard,Atif Ahmad
Dependence on information, including for some of the world?s largest organisations such as governments and multi-national corporations, has grown rapidly in recent years. However, reports of information security breaches and their associated consequences...
ver más
|
|
|
|
|
|
|
Lothar Fritsch
This article speculates on the future of privacy and electronic identities on the Internet. Based on a short review of security models and the development of privacy-enhancing technology, privacy and electronic identities will be discussed as parts of a ...
ver más
|
|
|
|
|
|
|
L. C.H. Fourie
AbstractThe growing misuse of information technology and the increased dependence on computer technology and systems heightened the requirements for information security. Unfortunately there often is a feeling of apathy towards information security by ma...
ver más
|
|
|
|
|
|
|
Boyu Zhu, Song Deng, Yunan Xu, Xinya Yuan and Zi Zhang
With the high integration of smart grid information and physical systems, the security of information systems must affect the safe and stable operation of physical systems. Risk assessment is an effectual means to objectively evaluate the information sec...
ver más
|
|
|
|
|
|
|
Pankaj Pandey and Einar Snekkenes
For many individuals and organizations, cyber-insurance is the most practical and only way of handling a major financial impact of an information security event. However, the cyber-insurance market suffers from the problem of information asymmetry, lack ...
ver más
|
|
|
|
|
|
|
Sushma Mishra, Donald J. Caputo, Gregory J. Leone, Fred G. Kohun, Peter J. Draus
The purpose and intent of this research study is to understand and interpret the perception of stakeholders in healthcare organizations concerning security awareness and communications. The data is analyzed using the demographic characteristics of age, g...
ver más
|
|
|
|
|
|
|
Benjamin Khoo, Peter Harris, Stephen Hartman
Enterprises are now operating in the network economy. The network economy is dependent on the information infrastructure via the Internet. Organizations of all types (business, academia, government, etc.) are facing risks resulting from their...
ver más
|
|
|
|
|
|
|
Amirhossein Javaherikhah, Mercedes Valiente Lopez and Saeed Reza Mohandes
Due to the unique atmospheric conditions on Mars, the management of essential information in Mars buildings is of great importance. Even the smallest error or manipulation of data can create irreparable risks for residents. Martian buildings require a st...
ver más
|
|
|
|
|
|
|
Tareq Salahi Almigheerbi, David Ramsey and Anna Lamek
This paper is a part of an exploratory study with the goal of investigating the applicability of collaboratively-developed enterprise resource planning (the CD-ERP approach) within Libyan public universities. Since it is being proposed in order to overco...
ver más
|
|
|
|
|
|
|
Yelyzaveta Meleshko
Pág. 52 - 57
The subject matter of the research is the process of identifying information attacks on the recommendation system. The goal of this work is to develop a method for detecting information attack objects in a recommendation system based on the analysis of t...
ver más
|
|
|
|
|
|
|
Haidong Zhong, Xianyi Chen and Qinglong Tian
Recently, reversible image transformation (RIT) technology has attracted considerable attention because it is able not only to generate stego-images that look similar to target images of the same size, but also to recover the secret image losslessly. The...
ver más
|
|
|
|
|
|
|
Bing Su and Jiwu Liang
With the innovation of wireless communication technology and the surge of data in mobile networks, traditional routing strategies need to be improved. Given the shortcomings of existing opportunistic routing strategies in transmission performance and sec...
ver más
|
|
|
|
|
|
|
Fahad Alqahtani, Mohammed Almutairi and Frederick T. Sheldon
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead o...
ver más
|
|
|
|
|
|
|
Maki Kihara and Satoshi Iriyama
A new class of cryptosystems called verifiable encryption (VE) that facilitates the verification of two plaintexts without decryption was proposed in our previous paper. The main contributions of our previous study include the following. (1) Certain cryp...
ver más
|
|
|
|
|
|
|
Harshvardhan J. Pandit
Solid is a new radical paradigm based on decentralising control of data from central organisations to individuals that seeks to empower individuals to have active control of who and how their data is being used. In order to realise this vision, the use-c...
ver más
|
|
|
|
|
|
|
Thiago Poleto, Thyago Celso Cavalcante Nepomuceno, Victor Diogho Heuer de Carvalho, Ligiane Cristina Braga de Oliveira Friaes, Rodrigo Cleiton Paiva de Oliveira and Ciro José Jardim Figueiredo
This paper aims to analyze the intellectual structure and research fronts in application information security in smart cities to identify research boundaries, trends, and new opportunities in the area. It applies bibliometric analyses to identify the mai...
ver más
|
|
|
|
|
|
|
Ryosuke Kakiuchi, Dinh Tuan Tran and Joo-Ho Lee
|
|
|
|