Results 261 to 270 of about 114,269 (316)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Secure medical digital libraries
International Journal of Medical Informatics, 2001In this paper, a secure medical digital library is presented. It is based on the CORBA specifications for distributed systems. The described approach relies on a three-tier architecture. Interaction between the medical digital library and its users is achieved through a Web server. The choice of employing Web technology for the dissemination of medical
I, Papadakis +2 more
openaire +2 more sources
Science, 1999
By now, you have probably bought into the idea of using the Internet for e-mail, database searching, and surfing the World Wide Web. You may have even purchased items online and may subscribe to a journal or two in digital form. But is the Internet secure? If you don't know about security technology, the answer is no.
Robert Sikorski, Richard Peters
openaire +1 more source
By now, you have probably bought into the idea of using the Internet for e-mail, database searching, and surfing the World Wide Web. You may have even purchased items online and may subscribe to a journal or two in digital form. But is the Internet secure? If you don't know about security technology, the answer is no.
Robert Sikorski, Richard Peters
openaire +1 more source
Maritime Cyber Security - Securing the Digital Seaways
Engineering & Technology Reference, 2013Maritime transport is critical to the global economy. In a competitive environment, the industry is constantly seeking economies of scale and efficiencies. This has led to the introduction of larger vessels and an increasing use of information technology to achieve greater automation, both in ports and at sea.
openaire +1 more source
2022
This chapter analyzes digital security strategies for the 21st century. The chapter begins by examining different types of cyberattacks, such as identity theft, malware, and phishing. Next, the chapter reviews statistics about cyberattacks in the US and the world, focusing on the monetary costs.
openaire +1 more source
This chapter analyzes digital security strategies for the 21st century. The chapter begins by examining different types of cyberattacks, such as identity theft, malware, and phishing. Next, the chapter reviews statistics about cyberattacks in the US and the world, focusing on the monetary costs.
openaire +1 more source
Digital Steganography Security
2020Steganography has been considered as a major instrument used for an unauthorized and destructive purpose such as crime and warfare, and forensics has been used for a constructive purpose such as crime detection and fraud detection. Hence, the combination of both steganography and forensics plays a major role in the present internet era for information ...
Parkavi R., Anitha S., Gayathri R.
openaire +1 more source
International Journal of Game-Based Learning, 2017
The United Nations (UN) Convention (1989) on the Rights of the Child changed the way children are viewed and treated worldwide. The Convention has been affecting governments, civil society and the private sector. ICT driven companies on the internet should not be an exception.
Conceição Costa +3 more
openaire +1 more source
The United Nations (UN) Convention (1989) on the Rights of the Child changed the way children are viewed and treated worldwide. The Convention has been affecting governments, civil society and the private sector. ICT driven companies on the internet should not be an exception.
Conceição Costa +3 more
openaire +1 more source
2023
With the growing digitalization of businesses, digital security governance (DSG) is becoming central to organizational survival strategies. However, many organizations fail to establish successful DSG practices and, consequently, fail to understand how DSG can lower the severity of cybersecurity failures.
Schinagl, Stef +3 more
openaire +1 more source
With the growing digitalization of businesses, digital security governance (DSG) is becoming central to organizational survival strategies. However, many organizations fail to establish successful DSG practices and, consequently, fail to understand how DSG can lower the severity of cybersecurity failures.
Schinagl, Stef +3 more
openaire +1 more source
2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2017
Healthcare is an essential part of the national critical infrastructure network. Of the four critical infrastructures (safety, mission, business and security), hospital infrastructures are a mission-critical infrastructure. Damage to network communications and the loss of patient data would have a detrimental impact on the health provision ...
openaire +1 more source
Healthcare is an essential part of the national critical infrastructure network. Of the four critical infrastructures (safety, mission, business and security), hospital infrastructures are a mission-critical infrastructure. Damage to network communications and the loss of patient data would have a detrimental impact on the health provision ...
openaire +1 more source

