Results 1 to 10 of about 4,412,712 (309)

International normative framework for information protection in banks and financial institutions through the example of constituting Basel agreements and determining operational risks [PDF]

open access: yesMegatrend Revija, 2021
International coordination of banking policies can be seen through the work of the Basel Committee, where the importance of security and protection of information in banks and other financial institutions highlights the Basel II agreement, as it ...
Miletić Perica
doaj   +1 more source

Automatic depersonalization of confidential information

open access: yesРоссийский технологический журнал, 2023
Objectives. As the scope of personal data transmitted online continues to grow, national legislatures are increasingly regulating the storage and processing of digital information.
N G. Babak   +4 more
doaj   +1 more source

Approach to the problem of information protection in the organization [PDF]

open access: yesMegatrend Revija, 2021
Information is a strategic resource of modern society, hence the importance that their protection has for the functioning of organizations, as well as for their very survival.
Miletić Perica
doaj   +1 more source

CYBERCRIME OF READING INFORMATION OBSTRUCTION UNDER ART. 268 OF PENAL CODE AS A THREAT TO SECURITY OF THE REPUBLIC OF POLAND

open access: yesHumanities and Social Sciences, 2023
This article presents issues that determine the protection of the security of the Republic of Poland against the threats posed by computer crime. In particular, it discusses cybercrime under Art. 268 of the Penal Code.
Dorota KAMUDA, Małgorzata TRYBUS
doaj   +1 more source

Green Synthesis of Phosphorescent Carbon Dots for Anticounterfeiting and Information Encryption

open access: yesSensors, 2022
Room-temperature phosphorescent (RTP) carbon dots (CDs) have promising applications in bioimaging, anticounterfeiting, and information encryption owing to their long lifetimes and wide Stokes shifts.
Mingming Cheng   +4 more
doaj   +1 more source

Searching for and blocking destructive content in images [PDF]

open access: yesE3S Web of Conferences, 2023
Children and underage teenagers use the Internet not only for communication. So, for 2020, children aged five to seven years in half of cases use the network to play online games, at the age of eight to eleven years, this figure increases to 78%, and ...
Zelensky Alexander   +4 more
doaj   +1 more source

Targeted advertising: civil legal aspect [PDF]

open access: yesKrymskij Naučnyj Vestnik, 2019
Targeted advertising simplifies the search for counterparties, significantly expands the possibilities of electronic civil legal relations, in particular, distance sales and the provision of services on the Internet.
Ablyatipova N.A., Kravtsova A.A.
doaj   +1 more source

CHOICE OF OPTION FOR IMPLEMENTATION OF THE MULTILEVEL SECURE ACCESS TO THE EXTERNAL NETWORK [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2016
We study the optimal way for design of access scheme called "Direct Connection. This scheme provides a secure access to external network resources, and consists of several groups of routers and two kinds of firewalls.
V. S. Kolomoitcev
doaj   +1 more source

Development trends of the information technology and cyberspace security

open access: yes网络与信息安全学报, 2015
The basic characteristics,mutual differences and intrinsic relationships of the internet,mobile internet,internet of things,cloud computing and big data technologies were analyzed,and the evolutions of the information technology and information service ...
Feng-hua LI
doaj   +3 more sources

Threats associated with the human factor in the aspect of information security [PDF]

open access: yesScientific Journal of the Military University of Land Forces, 2018
The current publication presents selected risks resulting from the involvement of the human factor. In the opinion of the authors of the paper, it is the human inclination to make mistakes, commit breaches and abuses that can generate losses and damages ...
Michal Palega, Marcin Knapinski
doaj   +1 more source

Home - About - Disclaimer - Privacy