Results 1 to 10 of about 373,921 (174)

Ensuring Privacy and Security on Banking Websites in Malaysia: A Cookies Scanner Solution

open access: yesJournal of Informatics and Web Engineering, 2023
In this new era of science and technology, data can be said to be an extremely valuable asset for individuals, corporations, and even countries. Different parties attempt to obtain users' data occasionally, and the collection of web cookies is a ...
Yi Hong Tay   +4 more
semanticscholar   +1 more source

Real Estate Security using Blockchain

open access: yesInternational Journal of Advanced Research in Science, Communication and Technology, 2023
Property is an important asset, and the use of blockchain technology can help improve the implementation of work in this sector as well as its characteristics significantly for a smooth and trouble-free work flow to achieve a reliable system.
R. C. Suryawanshi   +3 more
semanticscholar   +1 more source

Threats in Software CPS and Potential Security Solutions

open access: yesJournal of Machine and Computing, 2022
The concept of cybernetics, microelectronics, design, and process science are all intertwined in CPS. Embedded systems are often used to describe process control. While a strong connection between the physical and computational aspects is still important
heanyi Emeka Ukamaka, Agada Martina
semanticscholar   +1 more source

The management of information security: A South African case study

open access: yesSouth African Journal of Business Management, 2003
The growing misuse of information technology and the increased dependence on computer technology and systems heightened the requirements for information security. Unfortunately there often is a feeling of apathy towards information security by management,
L. C.H. Fourie
doaj   +1 more source

Impact Assessment for Cyber Security Situation Awareness [PDF]

open access: yesInternational Journal of Information and Communication Technology Research, 2023
Cyber security situation awareness is important for the analysis of cyberspace, and detection of ever-changing threats. As computer networks and systems continue to increase in complexity and sophistication, the requirements and on a cybersecurity ...
Sina FarahaniNia   +3 more
doaj  

Integrating security and usability into the requirements and design process [PDF]

open access: yes, 2006
According to Ross Anderson, 'Many systems fail because their designers protect the wrong things or protect the right things in the wrong way'. Surveys also show that security incidents in industry are rising, which highlights the difficulty of designing ...
Flechais, I, Mascolo, C, Sasse, MA
core   +1 more source

Cross border Interbank Payment System (CIPS) Security Supplements; Tangible Radio Safety Box, Software as non-textual Password and Revolving Executable Code Modules

open access: yesWseas Transactions on Business and Economics, 2022
Our research started a long ago as additional security for the asset owner to facilitate CIPS ( Cross-border Interbank Payment System) holistic security.
A. Zisopoulos   +3 more
semanticscholar   +1 more source

Balancing Usability and Protection: A Decision-Making Approach to Computer Network Security Evaluation using the Neutrosophic Fuzzy Dombi Operator [PDF]

open access: yesNeutrosophic Sets and Systems
In an era where data is a vital organizational asset, the challenge of safeguarding digital infrastructure while maintaining system usability has become increasingly complex.
Meijing Zhang, Linghui Li
doaj   +1 more source

A framework for security requirements engineering [PDF]

open access: yes, 2006
This paper presents a framework for security requirements elicitation and analysis, based upon the construction of a context for the system and satisfaction arguments for the security of the system. One starts with enumeration of security goals based on
Haley, Charles B.   +3 more
core   +1 more source

Asset Management Security System Using RFID Technology

open access: yesInternational journal of engineering and technology, 2018
Using radio wave or radio frequency scanners to identify wirelessly any object is not so much complex in reality. The latest version of this technology is known as radio frequency identification or RFID.
Soumyasanta Rakshit, Dr. S. S. Sridhar
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy