Results 11 to 20 of about 35,083 (135)
Cyber security laws and safety in e-commerce in India
In today’s information technology age, the issue of cyber Security is a complicated and fascinating area of law. The phenomenal growth and development of e-commerce in India is astounding.
A. K. Kashyap, M. Chaudhary
doaj +1 more source
Introduction. Insurance constitutes a key component of the infrastructure of socio-economic development of the country and regions. This industry needs to be able to counter threats to its existence and sustainable development.
E. Lelikova, Nelly R. Burnasheva
semanticscholar +1 more source
This study examines tourist satisfaction and its relationship with demographic variables in Nablus, Palestine. Two hundred two tourists were surveyed using a structured questionnaire to collect data on their satisfaction level and demographic information.
Jafar Abahre +7 more
doaj +1 more source
Impact of Blockchain Technology in Modern Banking Sector to Exterminate the Financial Scams
The paper examined the use of blockchain in banking sector. With the increase of user’s interest in banking sector, transactions are conducted online or via physical credit scanners. Banking sector is easy target for the hackers. Unauthorized person can
Muhammad Asif Chuadhry +2 more
doaj +1 more source
Penguatan Manajemen Risiko Lembaga Keuangan Syariah Non-Bank dalam Menghadapi Ancaman Cyber Security
This research is a qualitative research that discusses the strengthening of risk management non-bank Islamic financial institutions, KSPPS Artha Bahana Syariah Pati Central Java. The sources of data in this study were obtained through focus groups and in
F. Kurniawan, Khabib Solihin
semanticscholar +1 more source
The paper presents the results of the analysis of threats implemented through remote unauthorized access (UA) (network attacks) to the information resource of automated systems (AS) at the objects of Informatization of internal Affairs bodies (ATS ...
Anna V. Batskih +3 more
doaj +1 more source
Calculation of risks of information security of telecommunication enterprise
The goal of this work is to identify and assess information security risks for a typical distributed information system within three controlled areas. The main emphasis, application of information security in the considered information system is done to ...
L. M. Il’chenko +3 more
doaj +1 more source
Keamanan Informasi Data Dalam Pemanfaatan Teknologi Informasi Pada PT Bank Central Asia (BCA)
In this era of very rapid growth of information systems, the security of information is something that must be considered, because if information can be accessed by unauthorized or irresponsible people, then the accuracy of the information will be ...
Edy Soesanto +3 more
semanticscholar +1 more source
Chatbots: Security, privacy, data protection, and social aspects
Chatbots are artificial communication systems becoming increasingly popular and not all their security questions are clearly solved. People use chatbots for assistance in shopping, bank communication, meal delivery, healthcare, cars, and many other ...
M. Hasal +5 more
semanticscholar +1 more source
Minimizing information security risks based on security threat modeling
The well-elaborated models of information security threats (IST) allow for the optimal development of a protection plan. This plan will be based on current threats and will consider effective countermeasures that increase the level of information ...
I. Barankova +2 more
semanticscholar +1 more source

