Results 11 to 20 of about 251,419 (115)
Turnover Intention as an Impact of Job Insecurity Among Bank Employees [PDF]
The purpose of this research was to investigate the influence of job insecurity on the turnover intention among bank employees in Palembang. This descriptive qualitative study employed job insecurity as the independent variable and turnover intention as
Inharjanto, Anselmus, Leovani, Ega
core +1 more source
The paper presents the results of the analysis of threats implemented through remote unauthorized access (UA) (network attacks) to the information resource of automated systems (AS) at the objects of Informatization of internal Affairs bodies (ATS ...
Anna V. Batskih +3 more
doaj +1 more source
Calculation of risks of information security of telecommunication enterprise
The goal of this work is to identify and assess information security risks for a typical distributed information system within three controlled areas. The main emphasis, application of information security in the considered information system is done to ...
L. M. Il’chenko +3 more
doaj +1 more source
Current capabilities, requirements and a proposed strategy for interdependency analysis in the UK [PDF]
The UK government recently commissioned a research study to identify the state-of-the-art in Critical Infrastructure modelling and analysis, and the government/industry requirements for such tools and services.
Bloomfield, R. E. +2 more
core +1 more source
The aim of the study is to increase the effectiveness of information security management for state information systems (SIS) with terminal access devices by improving regulatory legal acts that should be logically interconnected and not contradict each ...
V. A. Sizov +2 more
doaj +1 more source
CYBERSECURITY ASPECTS OF E-LEARNING PLATFORMS
The subject of study in the article is the platforms used to organize the educational process in the context of distance learning. The following platforms are selected: learning content management systems (open source systems and individual development),
Артем Григорович Тецький +1 more
doaj +1 more source
Social Aspects of New Technologies - the CCTV and Biometric (Framing Privacy and Data Protection) in the Case of Poland [PDF]
The purpose of this paper is to review the institution responsible for the protection of personal data within the European Union and national example - Polish as a country representing the new Member States.
A. Ścios +3 more
core +1 more source
. Objectives An analysis of open access literature sources and normative documents on the problem of information protection in automated systems was carried out.
Irina G. Drovnikova +3 more
doaj +1 more source
Workplace Violence and Security: Are there Lessons for Peacemaking? [PDF]
Workplace violence has captured the attention of commentators, employers, and the public at large. Although statistically the incidents of workplace homicide and assault are decreasing, public awareness of the problem has heightened, largely through ...
Callahan, Elletta Sangrey +1 more
core +2 more sources
Objective. The article considers the provisions of the fuzzy logic approach in relation to the method of quantifying the security of open operating systems (OS) of automated systems of the internal affairs bodies of the Russian Federation (AS of the ...
A. I. Yangirov +3 more
doaj +1 more source

