Results 51 to 60 of about 251,419 (115)

Legal Archetypes and Metadata Collection [PDF]

open access: yes, 2017
In discussions of state surveillance, the values of privacy and security are often set against one another, and people often ask whether privacy is more important than national security.2 I will argue that in one sense privacy is more important than ...
Rubel, Alan
core  

Heartland Payment Systems: lessons learned from a data breach [PDF]

open access: yes
On August 13, 2009, the Payment Cards Center hosted a workshop examining the changing nature of data security in consumer electronic payments. The center invited the chairman and CEO of Heartland Payment Systems (HPS or Heartland), Robert (Bob) Carr, to ...
Julia S. Cheney
core  

HIV/AIDS, Security and Conflict: New Realities, New Responses [PDF]

open access: yes, 2010
Ten years after the HIV/AIDS epidemic itself was identified as a threat to international peace and security, findings from the three-year AIDS, Security and Conflict Initiative (ASCI)(1) present evidence of the mutually reinforcing dynamics linking HIV ...
Frerks, G.   +5 more
core   +2 more sources

Building in web application security at the requirements stage : a tool for visualizing and evaluating security trade-offs : a thesis presented in partial fulfilment of the requirements for the degree of Master of Information Science in Information Systems at Massey University, Albany, New Zealand [PDF]

open access: yes, 2007
One dimension of Internet security is web application security. The purpose of this Design-science study was to design, build and evaluate a computer-based tool to support security vulnerability and risk assessment in the early stages of web application ...
Nehring, Natalia Alekseevna
core  

Introducing a Model for Suspicious Behaviors Detection in Electronic Banking by Using Decision Tree Algorithms

open access: yesIranian Journal of Information Processing & Management, 2014
Change the world through information technology and Internet development, has created competitive knowledge in the field of electronic commerce, lead to increasing in competitive potential among organizations.
Rohulla Kosari Langari   +2 more
doaj  

Keberkesanan carta pembelajaran Omygram terhadap tahap pencapaian pelajar PVMA dalam mata pelajaran Bahasa Inggeris bagi topik plurals [PDF]

open access: yes, 2019
Pembinaan bahan bantu belajar untuk tujuan PdPC sememangnya digalakkan oleh Kementerian Pendidikan Malaysia bagi meningkatkan kualiti pendidikan. Kajian ini bertujuan untuk membangun dan mengenalpasti keberkesanan carta pembelajaran Omygram terhadap ...
Abd Hamid, Ruhiana Idayu
core  

Email Babel: Does Language Affect Criminal Activity in Compromised Webmail Accounts? [PDF]

open access: yes, 2017
We set out to understand the effects of differing language on the ability of cybercriminals to navigate webmail accounts and locate sensitive information in them. To this end, we configured thirty Gmail honeypot accounts with English, Romanian, and Greek
Bernard-Jones, Emeric   +2 more
core  

Payments fraud: perception versus reality - a conference summary [PDF]

open access: yes
The authors highlight key issues from the presentations, keynote addresses, and open floor discussions at the Federal Reserve Bank of Chicago's eighth annual Payments Conference.
Katy Jacob, Tiffany Gates
core  

SOME LEGAL AND TECHNICAL ASPECTS RELATED TO POSSIBLE INTERNET’S THREATS ON THE FUNDAMENTAL RIGHT TO PRIVATE PROPERTY [PDF]

open access: yes
Once an individual uses the modern means of payment, the credit cards, he must be aware of the possible issue that might come out. Even more, when using these “plastic money” in the online environment provided by the omnipresent world wide web one must ...
Alexandru Tabusca   +2 more
core  

Investing in payment innovations: risks and rewards [PDF]

open access: yes
Advances in technology have helped usher in new payment mechanisms catered to current demographic and cross-border demands. Yet these payment innovations also pose increasingly complex security challenges worldwide.
Carrie Jankowski, Tiffany White
core  

Home - About - Disclaimer - Privacy