Results 11 to 20 of about 13,332,800 (308)
This paper reports a study aimed at determining the features of using information protection systems at financial institutions in order to improve the level of financial security.
S. Onyshchenko +3 more
semanticscholar +1 more source
Green Synthesis of Phosphorescent Carbon Dots for Anticounterfeiting and Information Encryption
Room-temperature phosphorescent (RTP) carbon dots (CDs) have promising applications in bioimaging, anticounterfeiting, and information encryption owing to their long lifetimes and wide Stokes shifts.
Mingming Cheng +4 more
doaj +1 more source
Searching for and blocking destructive content in images [PDF]
Children and underage teenagers use the Internet not only for communication. So, for 2020, children aged five to seven years in half of cases use the network to play online games, at the age of eight to eleven years, this figure increases to 78%, and ...
Zelensky Alexander +4 more
doaj +1 more source
The Personal Information Protection Law (PIPL) was launched on 1 November 2021 in China. This article provides a state-of-the-art review of PIPL through a policy analysis.
Igor Calzada
semanticscholar +1 more source
Targeted advertising: civil legal aspect [PDF]
Targeted advertising simplifies the search for counterparties, significantly expands the possibilities of electronic civil legal relations, in particular, distance sales and the provision of services on the Internet.
Ablyatipova N.A., Kravtsova A.A.
doaj +1 more source
CHOICE OF OPTION FOR IMPLEMENTATION OF THE MULTILEVEL SECURE ACCESS TO THE EXTERNAL NETWORK [PDF]
We study the optimal way for design of access scheme called "Direct Connection. This scheme provides a secure access to external network resources, and consists of several groups of routers and two kinds of firewalls.
V. S. Kolomoitcev
doaj +1 more source
Information Protection in Dark Web Drug Markets Research
In recent years, there have increasingly been conflicting calls for more government surveillance online and, paradoxically, increased protection of the privacy and anonymity of individuals.
J. Harviainen +5 more
semanticscholar +1 more source
This study focuses on the protection of information resources on the basis of risk-oriented approach for small and medium-sized businesses with an emphasis on risk assessment of information security (IS).
Svitlana Shevchenko +2 more
semanticscholar +1 more source
Development trends of the information technology and cyberspace security
The basic characteristics,mutual differences and intrinsic relationships of the internet,mobile internet,internet of things,cloud computing and big data technologies were analyzed,and the evolutions of the information technology and information service ...
Feng-hua LI
doaj +3 more sources
Threats associated with the human factor in the aspect of information security [PDF]
The current publication presents selected risks resulting from the involvement of the human factor. In the opinion of the authors of the paper, it is the human inclination to make mistakes, commit breaches and abuses that can generate losses and damages ...
Michal Palega, Marcin Knapinski
doaj +1 more source

