Results 11 to 20 of about 993,359 (292)

Algorithm of ensuring confidential data security of the cloud medical information system [PDF]

open access: yesE3S Web of Conferences, 2020
The objectives of the study are to develop and assess the effectiveness of the structure of a cloud platform for storing, processing and organizing medical data, determining a method of protection, in particular, ensuring confidentiality when ...
Babenko L, Shumilin A, Alekseev D
doaj   +1 more source

Method for Ensuring Information Security of Object Fiber-Optical Data Transmission System

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2022
Currently, ensuring information security of object fiber-optic data transmission systems is an important and urgent task. Therefore, the purpose of this article is to develop an easy-to-implement method for protecting object fiber-optic data transmission
A. O. Zenevich   +3 more
doaj   +1 more source

THE E-GOVERNMENT DEVELOPMENT IN ENSURING THE COUNTRY FINANCIAL AND INFORMATION SECURITY

open access: yesФінансово-кредитна діяльність: проблеми теорії та практики, 2021
The article substantiates that the country's e-government depends on a coherent government policy and is capable of promoting a high level of financial and information security for the state. The digital economy is based on information and communication
T. S. Yarovoy   +4 more
doaj   +1 more source

Personal information security as a social problem

open access: yesRUDN journal of Sociology, 2023
Informatization of society has led to a set of fundamentally new problems that humanity has not faced throughout the history of its development. These are the challenges of ensuring the information security of man, society, the state and the entire ...
V. A. Tsvyk, I. V. Tsvyk
doaj   +1 more source

2011 Annual Report [PDF]

open access: yes, 2012
This fiscal year, we awarded more than $850,000 through 106 grants and other support, bringing our historical total to more than 2,900 grants totaling nearly $19 million.

core   +1 more source

Threats and ensuring information security in crisis management systems

open access: yesNowoczesne Systemy Zarządzania, 2019
Constantly progressing technical and technological development has allowed the creation of IT tools, the use of which will positively affect the actions taken by decision-makers.
Michał Jurek, Marcin Staruch
doaj   +1 more source

NEW VECTORS FOR DEVELOPMENT OF THE SYSTEM OF LEGAL SUPPORT OF INFORMATION SECURITY AS ONE OF THE PRIORITIES OF NATIONAL SECURITY (TO THE 30TH ANNIVERSARY OF THE ADOPTION OF THE LAW OF THE RUSSIAN FEDERATION «ON SECURITY»)

open access: yesПравовое государство: теория и практика, 2022
The article is devoted to topical issues of development of legislation on information security in the context of ensuring the national security of the Russian Federation.
POLYAKOVA Tatiana Anatolievna   +1 more
doaj   +1 more source

The Impact of the Goals of Information Security Standards to Ensure Information Security

open access: yesJournal of Management Research, 2014
The study presents the results of the analysis of the goals of information security to ensure information security through a case study of the income tax department and sales inJordan. The goal of the analysis is to identify the security situation in the department of information and the development of information system security software and knowledge
Kulthoom Mansour Alghananeem   +2 more
openaire   +2 more sources

Role of Libraries in Ensuring Information Security

open access: yesScientific journal “Library Science. Record Studies. Informology”, 2022
The purpose of the article is to analyse the forms, methods, and means of library work for resistance in the information war. The research methodology is based on the application of general scientific and special methods of cognition, in particular, selection, analysis, synthesis, and systematisation of materials.
Nataliia Kunanets, Marta Prystai
openaire   +3 more sources

INFORMATION BASE OF ENSURING ECONOMIC SECURITY OF THE ENTERPRISE

open access: yesВестник Российского экономического университета имени Г. В. Плеханова, 2017
The article deals with specific features of the information base functioning, which is used to ensure economic security of the enterprise. The author pays attention to principle official sources, gives their brief characteristics and shows opportunities ...
Eugene O. Savchenko
doaj   +1 more source

Home - About - Disclaimer - Privacy