Results 41 to 50 of about 14,261,936 (322)

Mathematical approximator based on basic spline approximation [PDF]

open access: yesE3S Web of Conferences
The article considers the problem of constructing a mathematical piecewise linear approximator based on approximation by basis splines. An algorithm has been developed designed to implement a class of special functions and create parallel ...
Turdimatov Mamirjon   +5 more
doaj   +1 more source

Toward a Unified Model of Information Security Policy Compliance

open access: yesMIS Q., 2018
Information systems security (ISS) behavioral research has produced different models to explain security policy compliance. This paper (1) reviews 11 theories that have served the majority of previous information security behavior models, (2) empirically
Gregory Moody, M. Siponen, Seppo Pahnila
semanticscholar   +1 more source

Influence Maximization with Priority in Online Social Networks

open access: yesAlgorithms, 2020
The Influence Maximization (IM) problem, which finds a set of k nodes (called seedset) in a social network to initiate the influence spread so that the number of influenced nodes after propagation process is maximized, is an important problem in ...
Canh V. Pham   +4 more
doaj   +1 more source

The defintions of information and security; history of information security development

open access: yesVilnius University Open Series, 2020
Taking into consideration its historical evolvement, it is evident that information security is not a new concept. Starting from the very moment of writing down the information, it presents by itself a data that can be protected, stolen, or destroyed.
openaire   +3 more sources

Security and Information

open access: yes, 2020
With the argument that society needs to have certain products and / or services, the constituted powers create public bodies that are properly structured to act in a certain line of activity, such as education, security, health, social welfare, etc. In this way, they provide products and / or services directly to the population, who pay for them by ...
openaire   +1 more source

Information security climate and the assessment of information security risk among healthcare employees

open access: yesHealth Informatics Journal, 2019
Since 2009, over 176 million patients in the United States have been adversely impacted by data breaches affecting Health Insurance Portability and Accountability Act–covered institutions.
Stacey R. Kessler   +4 more
semanticscholar   +1 more source

Comments on the Clique Number of Zero-Divisor Graphs of Zn

open access: yesJournal of Mathematics, 2022
In 2008, J. Skowronek-kazio´w extended the study of the clique number ωGZn to the zero-divisor graph of the ring Zn, but their result was imperfect. In this paper, we reconsider ωGZn of the ring Zn and give some counterexamples. We propose a constructive
Yanzhao Tian, Lixiang Li
doaj   +1 more source

Information security management in SMEs: factors of success

open access: yesEntrepreneurship and Sustainability Issues, 2019
While the consecutive metamorphoses in the world economy changes the paradigm of doing business, the sources of success of almost every type of business transfer from tangible to intangible assets, and the information and its value becomes more and more ...
A. Ključnikov, L. Mura, David Sklenár
semanticscholar   +1 more source

Cyber-crime Science = Crime Science + Information Security [PDF]

open access: yes, 2010
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science.
Hartel, Pieter   +2 more
core   +8 more sources

Security-Informed Safety [PDF]

open access: yesComputer, 2016
Society relies on the safe functioning of computer based networks and systems whether it is in transportation, in energy production, banking or in medical devices. In some sectors, notably high hazard ones, achieving and assuring safety is a relatively mature undertaking - although of course we must not be complacent [20,21]. The advent of cyber issues
Robin Bloomfield, Kate Netkachova
openaire   +2 more sources

Home - About - Disclaimer - Privacy