Results 1 to 10 of about 251,419 (115)

Evaluating the threat to national information security [PDF]

open access: yesProblems and Perspectives in Management, 2020
An effective strategy for managing the national information security with capabilities to resist information threats significantly impacts its further development.
Hanna Yarovenko
doaj   +1 more source

DEA-Analysis Of The Effectiveness Of The Country’s Information Security System [PDF]

open access: yesSocioEconomic Challenges, 2020
The consequences of the fourth industrial revolution caused an increase in the level of computerization and digitalization of society, which led to problems related to the protection of information of individual users, companies and the state as a whole.
Hanna Yarovenko   +2 more
doaj   +1 more source

Exploring the Impact of AI-Based Cyber Security Financial Sector Management

open access: yesApplied Sciences, 2023
Cyber threats are attempts to secure unauthorized access to, change, or delete private information, to demand money from victims, or to disrupt business. Cybercrime includes everything from identity theft, malware threats, email and online fraud, to bank
Shailendra Mishra
doaj   +1 more source

Algorithmization for calculating the security assessment of AIS operating systems of internal affairs bodies, developed on the basis of an analysis of security requirements GOST R ISO/IEC 15408 and possible threats

open access: yesВестник Дагестанского государственного технического университета: Технические науки, 2023
Objective. The article provides a generalized algorithmization of the processes necessary for developing software for assessing the security of operating systems of automated information systems of internal affairs bodies of the Russian Federation.Method.
A. I. Yangirov   +3 more
doaj   +1 more source

The Relationship between Information Security Awareness and the Intention to Violate Information Security with the Mediating Role of Individual Norms and Self-control [PDF]

open access: yesپژوهش‌های راهبردی مسائل اجتماعی ایران, 2019
Introduction: while the role of information in today’s world cannot be denied, and since most activities and processes depend on information, the violation of information security is a critical concern.
Hamid Reza Peikari, Babak Banazdeh
doaj   +1 more source

A Survey on SQL Injection Attacks Types & their Prevention Techniques

open access: yesJISR on Computing, 2023
In the world of connectedness even more than ever before we are using digital technologies in daily life from bank transactions to social networking.
Jibran Rasheed Khan   +2 more
doaj   +1 more source

IDENTIFICATION OF THREATS TO FINANCIAL INSTITUTIONS’ ECONOMIC SECURITY AS AN ELEMENT OF THE STATE FINANCIAL SECURITY REGULATION [PDF]

open access: yesBaltic Journal of Economic Studies, 2018
Government structures should start financial security regulation at the macro-level with the definition of a list of threats, which impact on participants in the financial market can destabilize their activities and lead to negative trends in the ...
Nataliia Zachosova, Nataliia Babina
doaj   +1 more source

Cyber security laws and safety in e-commerce in India

open access: yesLaw and Safety, 2023
In today’s information technology age, the issue of cyber Security is a complicated and fascinating area of law. The phenomenal growth and development of e-commerce in India is astounding.
A. K. Kashyap, M. Chaudhary
doaj   +1 more source

Impact of political instability on 1948-Palestinian shoppers’ satisfaction: Palestinian tourist destination as a case study

open access: yesHeliyon, 2023
This study examines tourist satisfaction and its relationship with demographic variables in Nablus, Palestine. Two hundred two tourists were surveyed using a structured questionnaire to collect data on their satisfaction level and demographic information.
Jafar Abahre   +7 more
doaj   +1 more source

Impact of Blockchain Technology in Modern Banking Sector to Exterminate the Financial Scams

open access: yesSukkur IBA Journal of Computing and Mathematical Sciences, 2023
The paper examined the use of blockchain in banking sector. With the increase of user’s interest in banking sector, transactions are conducted online or via physical credit scanners. Banking sector is easy target for the hackers. Unauthorized person can
Muhammad Asif Chuadhry   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy