Results 101 to 110 of about 14,261,936 (322)

A framework for estimating information security risk assessment method completeness

open access: yesInternational Journal of Information Security, 2017
In general, an information security risk assessment (ISRA) method produces risk estimates, where risk is the product of the probability of occurrence of an event and the associated consequences for the given organization.
G. Wangen   +2 more
semanticscholar   +1 more source

An Overview of Economic Approaches to Information Security Management [PDF]

open access: yes, 2006
The increasing concerns of clients, particularly in online commerce, plus the impact of legislations on information security have compelled companies to put more resources in information security.
Su, X.
core   +2 more sources

A Cross-Layer Security Analysis for Process-Aware Information Systems [PDF]

open access: yesarXiv, 2015
Information security in Process-aware Information System (PAIS) relies on many factors, including security of business process and the underlying system and technologies. Moreover, humans can be the weakest link that creates pathway to vulnerabilities, or the worst enemy that compromises a well-defended system.
arxiv  

Information Security Risk Management

open access: yesThe Practice of Enterprise Modeling, 2017
Security breaches on the socio-technical systems organizations depend on cost the latter billions of dollars of losses each year. Although information security is a growing concern, most organizations deploy technical security measures to prevent ...
Salimeh Dashti, P. Giorgini, Elda Paja
semanticscholar   +1 more source

Data Privacy Day [PDF]

open access: yes
January 28th was Data Privacy Day, a day to reflect on what you can do to protect the privacy of yourself and others. Aside from oversharing data, the best approach you can take is to use Multi-Factor Authentication (MFA) on your personal and University ...
University of Maine System Information Security   +1 more
core   +1 more source

A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing

open access: yesIET Information Security
Blockchain is commonly employed in access control to provide safe medical data exchange because of the characteristics of decentralization, nontamperability, and traceability.
Canling Wang   +8 more
doaj   +1 more source

Information Security: A Saga of Security Measures

open access: yesInternational Journal Of Engineering And Computer Science, 2017
In the time of extreme proclivity of users towards internet and its services, it is almost implied to worry for the concerned security of highly confidential information. So, are the available safety trends and the continuous endeavor in this domain towards unfolding new techniques with enhanced features suggest pioneering concerns of the associated ...
Neha Tyagi   +4 more
openaire   +2 more sources

Author Correction: Attention-based message passing and dynamic graph convolution for spatiotemporal data imputation

open access: yesScientific Reports, 2023
Yifan Wang   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy