Results 21 to 30 of about 2,067,027 (330)

The importance and challenges of information security in the digital age: analysis of the current situation and prospects for development

open access: yesZeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej, 2023
In this age of increasing digitalisation, information security is becoming one of the most important issues for every state and organisation. This article provides an analysis of the current situation of information security and the challenges it faces.
Aleksander Sapiński
doaj   +1 more source

Information Security and Cybersecurity Management: A Case Study with SMEs in Portugal

open access: yesJournal of Cybersecurity and Privacy, 2021
Information security plays a key role in enterprises management, as it deals with the confidentiality, privacy, integrity, and availability of one of their most valuable resources: data and information.
Mário Antunes   +3 more
semanticscholar   +1 more source

An Integrated Graph Model for Spatial–Temporal Urban Crime Prediction Based on Attention Mechanism

open access: yesISPRS International Journal of Geo-Information, 2022
Crime issues have been attracting widespread attention from citizens and managers of cities due to their unexpected and massive consequences. As an effective technique to prevent and control urban crimes, the data-driven spatial–temporal crime prediction
Miaomiao Hou   +4 more
doaj   +1 more source

Identify devices and events from non-IP heterogeneous IoT network traffic [PDF]

open access: yesPeerJ Computer Science
In recent years, notable advancements have been achieved in the realm of identifying IP-based Internet of Things (IoT) devices and events. Nevertheless, the majority of methods rely on extracting fingerprints or features from plain text IP-based packets,
Yi Chen   +4 more
doaj   +2 more sources

The Information Richness Assessment of Information Security Awareness in Iranian Cloud Storage Users: Case Study of iCloud [PDF]

open access: yesInternational Journal of Information Science and Management, 2023
Cloud storage technology is attracting more attention due to the increasing implementation of technology in everyday life. The present study aims to assess Iranian iCloud users' richness of information security awareness at the three levels of knowledge,
Mahnam Zamani Kalajahi   +2 more
doaj   +1 more source

The effect of information security on e-supply chain in the UAE logistics and distribution industry

open access: yesUncertain Supply Chain Management, 2023
The effect of information security on the e-supply chain attracted attention to investigate its relationship with the mediating role of supply chain risk in the logistics and distribution industry in the United Arab Emirates (UAE).
M. Alshurideh   +4 more
semanticscholar   +1 more source

Artificial Intelligence-Based Security Authentication: Applications in Wireless Multimedia Networks

open access: yesIEEE Access, 2019
Security provisioning has become a key issue in wireless multimedia networks due to their vital roles in supporting various services. Conventional security solutions have deficiencies in computing efficiency and addressing emerging security challenges ...
Xiaoying Qiu, Zhiguo Du, Xuan Sun
doaj   +1 more source

Subjective health status of multimorbidity: verifying the mediating effects of medical and assistive devices

open access: yesInternational Journal for Equity in Health, 2018
Background This study aimed to verify the mediating effect of using assistive devices as a factor that alleviates the relationship between multimorbidity and subjective health status.
Munjae Lee, Kichan Yoon, Kyu-Sung Lee
doaj   +1 more source

Threats and ensuring information security in crisis management systems

open access: yesNowoczesne Systemy Zarządzania, 2019
Constantly progressing technical and technological development has allowed the creation of IT tools, the use of which will positively affect the actions taken by decision-makers.
Michał Jurek, Marcin Staruch
doaj   +1 more source

Making a good thing better: enhancing password/PIN-based user authentication with smartwatch

open access: yesCybersecurity, 2018
Wearing smartwatches becomes increasingly popular in people’s lives. This paper shows that a smartwatch can help its bearer authenticate to a login system effectively and securely even if the bearer’s password has already been revealed.
Bing Chang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy