Results 11 to 20 of about 2,116,286 (342)
Practical Methods for Information Security Risk Management [PDF]
The purpose of this paper is to present some directions to perform the risk man-agement for information security. The article follows to practical methods through question-naire that asses the internal control, and through evaluation based on existing ...
Cristian AMANCEI
doaj +4 more sources
Information Security management: A human challenge? [PDF]
This paper considers to what extent the management of Information Security is a human challenge. It suggests that the human challenge lies in accepting that individuals in the organisation have not only an identity conferred by their role but also a ...
Debi Ashenden
openalex +4 more sources
Threats associated with the human factor in the aspect of information security [PDF]
The current publication presents selected risks resulting from the involvement of the human factor. In the opinion of the authors of the paper, it is the human inclination to make mistakes, commit breaches and abuses that can generate losses and damages ...
Michal Palega, Marcin Knapinski
doaj +1 more source
In this age of increasing digitalisation, information security is becoming one of the most important issues for every state and organisation. This article provides an analysis of the current situation of information security and the challenges it faces.
Aleksander Sapiński
doaj +1 more source
An Integrated Graph Model for Spatial–Temporal Urban Crime Prediction Based on Attention Mechanism
Crime issues have been attracting widespread attention from citizens and managers of cities due to their unexpected and massive consequences. As an effective technique to prevent and control urban crimes, the data-driven spatial–temporal crime prediction
Miaomiao Hou +4 more
doaj +1 more source
Corporate information security management [PDF]
To ensure business continuity the security of corporate information is extremely important. Previous studies have shown that corporate information is vulnerable to security attacks. Companies are losing money through security breaches. This paper describes an MSc project that aimed to investigate the issues surrounding corporate information security ...
Mitchell, Ruth C. +2 more
openaire +3 more sources
Shinren : Non-monotonic trust management for distributed systems [PDF]
The open and dynamic nature of modern distributed systems and pervasive environments presents significant challenges to security management. One solution may be trust management which utilises the notion of trust in order to specify and interpret security
Dong, Changyu, Dulay, Naranker
core +4 more sources
Identify devices and events from non-IP heterogeneous IoT network traffic [PDF]
In recent years, notable advancements have been achieved in the realm of identifying IP-based Internet of Things (IoT) devices and events. Nevertheless, the majority of methods rely on extracting fingerprints or features from plain text IP-based packets,
Yi Chen +4 more
doaj +2 more sources
The Management of the Security Information
With the time advancement and the development of information technologies, the process of managing security information is present in most of the actions carried out at the level of state institutions, national economy, business, service provision, etc.
CREANGĂ, Liliana, BUZEV, Anatoli
openaire +1 more source
Artificial Intelligence-Based Security Authentication: Applications in Wireless Multimedia Networks
Security provisioning has become a key issue in wireless multimedia networks due to their vital roles in supporting various services. Conventional security solutions have deficiencies in computing efficiency and addressing emerging security challenges ...
Xiaoying Qiu, Zhiguo Du, Xuan Sun
doaj +1 more source

