Results 11 to 20 of about 13,332,800 (308)

Determining the patterns of using information protection systems at financial institutions in order to improve the level of financial security

open access: yesEastern-European Journal of Enterprise Technologies, 2023
This paper reports a study aimed at determining the features of using information protection systems at financial institutions in order to improve the level of financial security.
S. Onyshchenko   +3 more
semanticscholar   +1 more source

Green Synthesis of Phosphorescent Carbon Dots for Anticounterfeiting and Information Encryption

open access: yesSensors, 2022
Room-temperature phosphorescent (RTP) carbon dots (CDs) have promising applications in bioimaging, anticounterfeiting, and information encryption owing to their long lifetimes and wide Stokes shifts.
Mingming Cheng   +4 more
doaj   +1 more source

Searching for and blocking destructive content in images [PDF]

open access: yesE3S Web of Conferences, 2023
Children and underage teenagers use the Internet not only for communication. So, for 2020, children aged five to seven years in half of cases use the network to play online games, at the age of eight to eleven years, this figure increases to 78%, and ...
Zelensky Alexander   +4 more
doaj   +1 more source

Citizens’ Data Privacy in China: The State of the Art of the Personal Information Protection Law (PIPL)

open access: yesSmart Cities, 2022
The Personal Information Protection Law (PIPL) was launched on 1 November 2021 in China. This article provides a state-of-the-art review of PIPL through a policy analysis.
Igor Calzada
semanticscholar   +1 more source

Targeted advertising: civil legal aspect [PDF]

open access: yesKrymskij Naučnyj Vestnik, 2019
Targeted advertising simplifies the search for counterparties, significantly expands the possibilities of electronic civil legal relations, in particular, distance sales and the provision of services on the Internet.
Ablyatipova N.A., Kravtsova A.A.
doaj   +1 more source

CHOICE OF OPTION FOR IMPLEMENTATION OF THE MULTILEVEL SECURE ACCESS TO THE EXTERNAL NETWORK [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2016
We study the optimal way for design of access scheme called "Direct Connection. This scheme provides a secure access to external network resources, and consists of several groups of routers and two kinds of firewalls.
V. S. Kolomoitcev
doaj   +1 more source

Information Protection in Dark Web Drug Markets Research

open access: yesHawaii International Conference on System Sciences, 2021
In recent years, there have increasingly been conflicting calls for more government surveillance online and, paradoxically, increased protection of the privacy and anonymity of individuals.
J. Harviainen   +5 more
semanticscholar   +1 more source

INFORMATION PROTECTION MODEL BASED ON INFORMATION SECURITY RISK ASSESSMENT FOR SMALL AND MEDIUM-SIZED BUSINESS

open access: yesCybersecurity: Education, Science, Technique, 2021
This study focuses on the protection of information resources on the basis of risk-oriented approach for small and medium-sized businesses with an emphasis on risk assessment of information security (IS).
Svitlana Shevchenko   +2 more
semanticscholar   +1 more source

Development trends of the information technology and cyberspace security

open access: yes网络与信息安全学报, 2015
The basic characteristics,mutual differences and intrinsic relationships of the internet,mobile internet,internet of things,cloud computing and big data technologies were analyzed,and the evolutions of the information technology and information service ...
Feng-hua LI
doaj   +3 more sources

Threats associated with the human factor in the aspect of information security [PDF]

open access: yesScientific Journal of the Military University of Land Forces, 2018
The current publication presents selected risks resulting from the involvement of the human factor. In the opinion of the authors of the paper, it is the human inclination to make mistakes, commit breaches and abuses that can generate losses and damages ...
Michal Palega, Marcin Knapinski
doaj   +1 more source

Home - About - Disclaimer - Privacy