Results 241 to 250 of about 1,362,310 (293)
Some of the next articles are maybe not open access.
Science, 1999
By now, you have probably bought into the idea of using the Internet for e-mail, database searching, and surfing the World Wide Web. You may have even purchased items online and may subscribe to a journal or two in digital form. But is the Internet secure? If you don't know about security technology, the answer is no.
Robert Sikorski, Richard Peters
openaire +1 more source
By now, you have probably bought into the idea of using the Internet for e-mail, database searching, and surfing the World Wide Web. You may have even purchased items online and may subscribe to a journal or two in digital form. But is the Internet secure? If you don't know about security technology, the answer is no.
Robert Sikorski, Richard Peters
openaire +1 more source
Maritime Cyber Security - Securing the Digital Seaways
Engineering & Technology Reference, 2013Maritime transport is critical to the global economy. In a competitive environment, the industry is constantly seeking economies of scale and efficiencies. This has led to the introduction of larger vessels and an increasing use of information technology to achieve greater automation, both in ports and at sea.
openaire +1 more source
2022
This chapter analyzes digital security strategies for the 21st century. The chapter begins by examining different types of cyberattacks, such as identity theft, malware, and phishing. Next, the chapter reviews statistics about cyberattacks in the US and the world, focusing on the monetary costs.
openaire +1 more source
This chapter analyzes digital security strategies for the 21st century. The chapter begins by examining different types of cyberattacks, such as identity theft, malware, and phishing. Next, the chapter reviews statistics about cyberattacks in the US and the world, focusing on the monetary costs.
openaire +1 more source
Digital Steganography Security
2020Steganography has been considered as a major instrument used for an unauthorized and destructive purpose such as crime and warfare, and forensics has been used for a constructive purpose such as crime detection and fraud detection. Hence, the combination of both steganography and forensics plays a major role in the present internet era for information ...
Parkavi R., Anitha S., Gayathri R.
openaire +1 more source
International Journal of Game-Based Learning, 2017
The United Nations (UN) Convention (1989) on the Rights of the Child changed the way children are viewed and treated worldwide. The Convention has been affecting governments, civil society and the private sector. ICT driven companies on the internet should not be an exception.
Conceição Costa +3 more
openaire +1 more source
The United Nations (UN) Convention (1989) on the Rights of the Child changed the way children are viewed and treated worldwide. The Convention has been affecting governments, civil society and the private sector. ICT driven companies on the internet should not be an exception.
Conceição Costa +3 more
openaire +1 more source
2023
With the growing digitalization of businesses, digital security governance (DSG) is becoming central to organizational survival strategies. However, many organizations fail to establish successful DSG practices and, consequently, fail to understand how DSG can lower the severity of cybersecurity failures.
Schinagl, Stef +3 more
openaire +1 more source
With the growing digitalization of businesses, digital security governance (DSG) is becoming central to organizational survival strategies. However, many organizations fail to establish successful DSG practices and, consequently, fail to understand how DSG can lower the severity of cybersecurity failures.
Schinagl, Stef +3 more
openaire +1 more source
2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2017
Healthcare is an essential part of the national critical infrastructure network. Of the four critical infrastructures (safety, mission, business and security), hospital infrastructures are a mission-critical infrastructure. Damage to network communications and the loss of patient data would have a detrimental impact on the health provision ...
openaire +1 more source
Healthcare is an essential part of the national critical infrastructure network. Of the four critical infrastructures (safety, mission, business and security), hospital infrastructures are a mission-critical infrastructure. Damage to network communications and the loss of patient data would have a detrimental impact on the health provision ...
openaire +1 more source
IEEE Security & Privacy, 2009
The economic advantage of capitalism flows through cultivating the division of labor. Division of labor means specialization and hierarchy, and where labor becomes specialized enough to be routinized, it soon becomes automated. Mass-market software products hide their complexity from users, never expecting them to acquire detailed competence in the ...
openaire +1 more source
The economic advantage of capitalism flows through cultivating the division of labor. Division of labor means specialization and hierarchy, and where labor becomes specialized enough to be routinized, it soon becomes automated. Mass-market software products hide their complexity from users, never expecting them to acquire detailed competence in the ...
openaire +1 more source
Digital Holography for Security Applications
2012A survey of Digital Holography (DH) and its employment in different application fields is provided. This paper reviews the main principles of the DH focusing on the optical techniques for security purposes. Recording and processing of three dimensional data, secured storage data, the use of Multimedia Sensor Network (MSN) for encrypted data ...
Pellegrini, RM +2 more
openaire +3 more sources

