Results 11 to 20 of about 251,419 (115)

Turnover Intention as an Impact of Job Insecurity Among Bank Employees [PDF]

open access: yes, 2020
The purpose of this research was to investigate the influence of job insecurity on the turnover intention among bank employees in Palembang. This descriptive qualitative study employed job insecurity as the independent variable and turnover intention as
Inharjanto, Anselmus, Leovani, Ega
core   +1 more source

Analysis and classification of the main threats to information security of automated systems at the objects of informatization of internal affairs bodies

open access: yesБезопасность информационных технологий, 2020
The paper presents the results of the analysis of threats implemented through remote unauthorized access (UA) (network attacks) to the information resource of automated systems (AS) at the objects of Informatization of internal Affairs bodies (ATS ...
Anna V. Batskih   +3 more
doaj   +1 more source

Calculation of risks of information security of telecommunication enterprise

open access: yesОткрытое образование (Москва), 2018
The goal of this work is to identify and assess information security risks for a typical distributed information system within three controlled areas. The main emphasis, application of information security in the considered information system is done to ...
L. M. Il’chenko   +3 more
doaj   +1 more source

Current capabilities, requirements and a proposed strategy for interdependency analysis in the UK [PDF]

open access: yes, 2009
The UK government recently commissioned a research study to identify the state-of-the-art in Critical Infrastructure modelling and analysis, and the government/industry requirements for such tools and services.
Bloomfield, R. E.   +2 more
core   +1 more source

Improvement of the Regulatory Framework of Information Security for Terminal Access Devices of the State Information System

open access: yesОткрытое образование (Москва), 2020
The aim of the study is to increase the effectiveness of information security management for state information systems (SIS) with terminal access devices by improving regulatory legal acts that should be logically interconnected and not contradict each ...
V. A. Sizov   +2 more
doaj   +1 more source

CYBERSECURITY ASPECTS OF E-LEARNING PLATFORMS

open access: yesРадіоелектронні і комп'ютерні системи, 2020
The subject of study in the article is the platforms used to organize the educational process in the context of distance learning. The following platforms are selected: learning content management systems (open source systems and individual development),
Артем Григорович Тецький   +1 more
doaj   +1 more source

Social Aspects of New Technologies - the CCTV and Biometric (Framing Privacy and Data Protection) in the Case of Poland [PDF]

open access: yes, 2011
The purpose of this paper is to review the institution responsible for the protection of personal data within the European Union and national example - Polish as a country representing the new Member States.
A. Ścios   +3 more
core   +1 more source

METHODOLOGY FOR INVESTIGATING THE PROBABILITY-TIME CHARACTERISTICS OF NETWORK ATTACKS IN THE SIMULATION MODELLING SOFTWARE ENVIRONMENT

open access: yesВестник Дагестанского государственного технического университета: Технические науки, 2018
. Objectives An analysis of open access literature sources and normative documents on the problem of information protection in automated systems was carried out.
Irina G. Drovnikova   +3 more
doaj   +1 more source

Workplace Violence and Security: Are there Lessons for Peacemaking? [PDF]

open access: yes, 2003
Workplace violence has captured the attention of commentators, employers, and the public at large. Although statistically the incidents of workplace homicide and assault are decreasing, public awareness of the problem has heightened, largely through ...
Callahan, Elletta Sangrey   +1 more
core   +2 more sources

Methodological approach to quantitative assessment of the security of open operating systems AS of the Internal Affairs Bodies

open access: yesВестник Дагестанского государственного технического университета: Технические науки
Objective. The article considers the provisions of the fuzzy logic approach in relation to the method of quantifying the security of open operating systems (OS) of automated systems of the internal affairs bodies of the Russian Federation (AS of the ...
A. I. Yangirov   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy