Results 21 to 30 of about 373,921 (174)

Run-time risk management in adaptive ICT systems [PDF]

open access: yes, 2013
We will present results of the SERSCIS project related to risk management and mitigation strategies in adaptive multi-stakeholder ICT systems.
Chakravarthy, Ajay   +4 more
core   +1 more source

Evaluation of Information Management Systems in Isfahan University of Medical Science by ISO/IEC 27001 Standard

open access: yesمدیریت اطلاعات سلامت, 2015
Introduction: considering the information threats and the need to procedures for develop and improve security and confidentiality, international standard organization (ISO) established information security standard ISO/IEC 27001.
Rouhollah Sheikh Abumasoudi   +3 more
doaj   +1 more source

COMPUTER SECURITY AND SECURITY TECHNOLOGIES [PDF]

open access: yesJournal of Process Management and New Technologies, 2013
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution.
Lazar Stošić, Dragan Veličković
doaj  

Enhancing security incident response follow-up efforts with lightweight agile retrospectives [PDF]

open access: yes, 2017
Security incidents detected by organizations are escalating in both scale and complexity. As a result, security incident response has become a critical mechanism for organizations in an effort to minimize the damage from security incidents.
Glisson, William Bradley   +2 more
core   +2 more sources

The Burn-to-Claim cross-blockchain asset transfer protocol

open access: yesIEEE International Conference on Engineering of Complex Computer Systems, 2020
The future of multi-blockchain architecture depends on the emergence of new protocols that achieve communication between trustless cross-chain participants. However, interoperability between blockchains remains an open problem.
Babu Pillai   +3 more
semanticscholar   +1 more source

Computing Optimal Security Strategies for Interdependent Assets

open access: yes, 2012
Appears in Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence (UAI2012)
Letchford, Joshua, Vorobeychik, Yevgeniy
openaire   +2 more sources

Estimating ToE Risk Level using CVSS [PDF]

open access: yes, 2009
Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, cost-benefit investments in security.
Franqueira, Virginia Nunes Leal   +1 more
core   +3 more sources

A Community Assets Infrastructure for the Secure Use of Mobile Computing Devices in the Rural Health Landscape

open access: yes, 2016
The ubiquity of mobile computing devices in the workplace has created a vast landscape of opportunity in rural communities centered on the increased population access owing to the improved mobility. Healthcare workers are able to reach previously disconnected communities and homesteads to deliver health related services through the use of custom mobile
Kevin Tatenda Kativu, Dalenca Pottas
openaire   +3 more sources

How does intellectual capital align with cyber security? [PDF]

open access: yes, 2019
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their ...
Renaud, Karen   +2 more
core   +3 more sources

THE IMPORTANCE OF PHYSICAL CULTURE IN EDUCATION OF STUDENTS

open access: yesВестник Мининского университета, 2018
Introduction: physical health of a person is a natural state of an organism caused by normal functioning of all its organs and systems. It is an invaluable asset for the entire community.Training sessions in the discipline "Elective courses in physical ...
S. E. Volozhanin
doaj   +1 more source

Home - About - Disclaimer - Privacy