International normative framework for information protection in banks and financial institutions through the example of constituting Basel agreements and determining operational risks [PDF]
International coordination of banking policies can be seen through the work of the Basel Committee, where the importance of security and protection of information in banks and other financial institutions highlights the Basel II agreement, as it ...
Miletić Perica
doaj +1 more source
Automatic depersonalization of confidential information
Objectives. As the scope of personal data transmitted online continues to grow, national legislatures are increasingly regulating the storage and processing of digital information.
N G. Babak +4 more
doaj +1 more source
Approach to the problem of information protection in the organization [PDF]
Information is a strategic resource of modern society, hence the importance that their protection has for the functioning of organizations, as well as for their very survival.
Miletić Perica
doaj +1 more source
This article presents issues that determine the protection of the security of the Republic of Poland against the threats posed by computer crime. In particular, it discusses cybercrime under Art. 268 of the Penal Code.
Dorota KAMUDA, Małgorzata TRYBUS
doaj +1 more source
Green Synthesis of Phosphorescent Carbon Dots for Anticounterfeiting and Information Encryption
Room-temperature phosphorescent (RTP) carbon dots (CDs) have promising applications in bioimaging, anticounterfeiting, and information encryption owing to their long lifetimes and wide Stokes shifts.
Mingming Cheng +4 more
doaj +1 more source
Searching for and blocking destructive content in images [PDF]
Children and underage teenagers use the Internet not only for communication. So, for 2020, children aged five to seven years in half of cases use the network to play online games, at the age of eight to eleven years, this figure increases to 78%, and ...
Zelensky Alexander +4 more
doaj +1 more source
Targeted advertising: civil legal aspect [PDF]
Targeted advertising simplifies the search for counterparties, significantly expands the possibilities of electronic civil legal relations, in particular, distance sales and the provision of services on the Internet.
Ablyatipova N.A., Kravtsova A.A.
doaj +1 more source
CHOICE OF OPTION FOR IMPLEMENTATION OF THE MULTILEVEL SECURE ACCESS TO THE EXTERNAL NETWORK [PDF]
We study the optimal way for design of access scheme called "Direct Connection. This scheme provides a secure access to external network resources, and consists of several groups of routers and two kinds of firewalls.
V. S. Kolomoitcev
doaj +1 more source
Development trends of the information technology and cyberspace security
The basic characteristics,mutual differences and intrinsic relationships of the internet,mobile internet,internet of things,cloud computing and big data technologies were analyzed,and the evolutions of the information technology and information service ...
Feng-hua LI
doaj +3 more sources
Threats associated with the human factor in the aspect of information security [PDF]
The current publication presents selected risks resulting from the involvement of the human factor. In the opinion of the authors of the paper, it is the human inclination to make mistakes, commit breaches and abuses that can generate losses and damages ...
Michal Palega, Marcin Knapinski
doaj +1 more source

