Results 21 to 30 of about 1,697,459 (345)
Information security management in SMEs: factors of success
While the consecutive metamorphoses in the world economy changes the paradigm of doing business, the sources of success of almost every type of business transfer from tangible to intangible assets, and the information and its value becomes more and more ...
Aleksandr Ključnikov+2 more
openalex +3 more sources
Threats associated with the human factor in the aspect of information security [PDF]
The current publication presents selected risks resulting from the involvement of the human factor. In the opinion of the authors of the paper, it is the human inclination to make mistakes, commit breaches and abuses that can generate losses and damages ...
Michal Palega, Marcin Knapinski
doaj +1 more source
This article examines the occurrences of four types of unethical employee information security behavior—misbehavior in networks/applications, dangerous Web use, omissive security behavior, and poor access control—and their relationships with employees ...
Amanda M. Y. Chu, Mike K. P. So
semanticscholar +1 more source
In this age of increasing digitalisation, information security is becoming one of the most important issues for every state and organisation. This article provides an analysis of the current situation of information security and the challenges it faces.
Aleksander Sapiński
doaj +1 more source
The Information Richness Assessment of Information Security Awareness in Iranian Cloud Storage Users: Case Study of iCloud [PDF]
Cloud storage technology is attracting more attention due to the increasing implementation of technology in everyday life. The present study aims to assess Iranian iCloud users' richness of information security awareness at the three levels of knowledge,
Mahnam Zamani Kalajahi+2 more
doaj +1 more source
Corporate information security management [PDF]
To ensure business continuity the security of corporate information is extremely important. Previous studies have shown that corporate information is vulnerable to security attacks. Companies are losing money through security breaches. This paper describes an MSc project that aimed to investigate the issues surrounding corporate information security ...
Mitchell, Ruth C.+2 more
openaire +3 more sources
An Integrated Graph Model for Spatial–Temporal Urban Crime Prediction Based on Attention Mechanism
Crime issues have been attracting widespread attention from citizens and managers of cities due to their unexpected and massive consequences. As an effective technique to prevent and control urban crimes, the data-driven spatial–temporal crime prediction
Miaomiao Hou+4 more
doaj +1 more source
Identify devices and events from non-IP heterogeneous IoT network traffic [PDF]
In recent years, notable advancements have been achieved in the realm of identifying IP-based Internet of Things (IoT) devices and events. Nevertheless, the majority of methods rely on extracting fingerprints or features from plain text IP-based packets,
Yi Chen+4 more
doaj +2 more sources
Information Security and Cybersecurity Management: A Case Study with SMEs in Portugal
Information security plays a key role in enterprises management, as it deals with the confidentiality, privacy, integrity, and availability of one of their most valuable resources: data and information.
Mário Antunes+3 more
semanticscholar +1 more source