Results 61 to 70 of about 5,419,894 (362)

Competence of future teachers in the digital security area

open access: yesComunicar, 2019
Technology and Internet use poses digital security problems and risks. This article presents the results of a study evaluating the digital competence of preservice teachers within the DigCompEdu European framework.
M.J. Gallego-Arrufat   +2 more
semanticscholar   +1 more source

Experimental measurement-device-independent quantum digital signatures over a metropolitan network [PDF]

open access: yes, 2017
Quantum digital signatures (QDS) provide a means for signing electronic communications with informationtheoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable
Andersson, Erika   +18 more
core   +2 more sources

CyberFusion Protocols: Strategic Integration of Enterprise Risk Management, ISO 27001, and Mobile Forensics for Advanced Digital Security in the Modern Business Ecosystem

open access: yesJournal of Engineering Research and Reports
This research paper explores the integration of Enterprise Risk Management (ERM), the ISO 27001 standard, and mobile forensics methodologies as a comprehensive framework for enhancing digital security measures within modern business ecosystems. Employing
O. O. Olaniyi   +4 more
semanticscholar   +1 more source

Composting and computing: On digital security compositions

open access: yesEuropean Journal of International Security, 2019
Making sense of digital security practice requires grasping how data are put to use to compose the governing of individuals. Data need to be understood in their becoming, and in their becoming something across diverse practices.
R. Bellanova, G. González Fuster
semanticscholar   +1 more source

Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]

open access: yes, 2015
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya   +12 more
core   +1 more source

Legal support for digitalization of art

open access: yesRUDN Journal of Law, 2023
The relevance of digital art and digitalization of art, as a more general category, reflecting the modern technological approach to this sphere of human activity, is manifested in mainstreaming of legal regulation of various aspects of digital ...
Tatsiana N. Mikhaliova
doaj   +1 more source

Strengthening Digital Security: Dynamic Attack Detection with LSTM, KNN, and Random Forest

open access: yesJournal of Computer Science and Technology Studies
Digital security is an ever-escalating concern in today's interconnected world, necessitating advanced intrusion detection systems. This research focuses on fortifying digital security through the integration of Long Short-Term Memory (LSTM), K-Nearest ...
Ansarullah Hasas   +3 more
semanticscholar   +1 more source

Tough Times at Transitional Homeless Shelters: Considering the Impact of Financial Insecurity on Digital Security and Privacy

open access: yesInternational Conference on Human Factors in Computing Systems, 2019
Addressing digital security and privacy issues can be particularly difficult for users who face challenging circumstances. We performed semi-structured interviews with residents and staff at 4 transitional homeless shelters in the U.S.
Manya Sleeper   +8 more
semanticscholar   +1 more source

Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues [PDF]

open access: yes, 2010
Improved interoperability between public and private organizations is of key significance to make digital government newest triumphant. Digital Government interoperability, information sharing protocol and security are measured the key issue for ...
Headayetullah, Md., Pradhan, G. K.
core   +2 more sources

Digital security of the hotel brand

open access: yesMенаџмент у хотелијерству и туризму, 2023
This article is devoted to the study of the brand digital security and its impact on the business processes of hotel businesses. The emphasis is on the fact that digital communications as key drivers of the sales system create increased risks to the ...
Lyudmyla Bovsh   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy