The Application of AHP Model to Guide Decision Makers: A Case Study of E-banking Security [PDF]
Changes in technology have resulted in new ways for bankers to deliver their services to costumers. Electronic banking systems in various forms are the evidence of such advancement.
Hwang, Junseok, Syamsuddin, Irfan
core +2 more sources
A New Fuzzy MCDM Framework to Evaluate E-Government Security Strategy [PDF]
Ensuring security of e-government applications and infrastructures is crucial to maintain trust among stakeholders to store, process and exchange information over the e-government systems. Due to dynamic and continuous threats on e-government information
Hwang, Junseok, Syamsuddin, Irfan
core +2 more sources
Information-Theoretic Security for the Masses [PDF]
We combine interactive zero-knowledge protocols and weak physical layer randomness properties to construct a protocol which allows bootstrapping an IT-secure and PF-secure channel from a memorizable shared secret.
Nikitin, Oleksandr
core +1 more source
People Are the Answer to Security: Establishing a Sustainable Information Security Awareness Training (ISAT) Program in Organization [PDF]
Educating the users on the essential of information security is very vital and important to the mission of establishing a sustainable information security in any organization and institute.
Ithnin, Norafida Binti+1 more
core +1 more source
Relations between information science and information security culture
Objectives The aim of the article is to present the relations that exist between the culture of information security and information sciences. Material and methods desk research, Literature criticism, Synthesis, Comparative analysis.
Bogusław Jagusiak, Piotr Zaskórski
doaj +1 more source
A grave concern to an organization’s information security is employees’ behavior when they do not value information security policy compliance (ISPC). Most ISPC studies evaluate compliance and noncompliance behaviors separately.
Rao Faizan Ali+4 more
semanticscholar +1 more source
A Secure CDM-Based Data Analysis Platform (SCAP) in Multi-Centered Distributed Setting
Hospitals have their own database structures and maintain their data in a closed manner. For this reason, it is difficult for researchers outside of institutions to access multi-center data.
Seungho Jeon+3 more
doaj +1 more source
A dynamic graph Hawkes process based on linear complexity self-attention for dynamic recommender systems [PDF]
The dynamic recommender system realizes the real-time recommendation for users by learning the dynamic interest characteristics, which is especially suitable for the scenarios of rapid transfer of user interests, such as e-commerce and social media.
Zhiwen Hou+6 more
doaj +2 more sources
MODERN INFORMATION SECURITY AND INFORMATION SECURITY
This article examines the concept of information security, how it is implemented and enforced. It analyses the essence of information, what it is for, what processes are studied with its help.
Vera Shumilina, Alexander Kim
semanticscholar +1 more source
Specialized processors and algorithms for computing standard functions [PDF]
This article discusses the problem of creating a specialized processor device that allows you to increase the number of calculated mathematical functions, resulting in a single calculation scheme for all elementary functions, an algorithm for lowering ...
Turdimatov Mamirjon+4 more
doaj +1 more source