Results 31 to 40 of about 1,697,459 (345)
The Management of the Security Information
With the time advancement and the development of information technologies, the process of managing security information is present in most of the actions carried out at the level of state institutions, national economy, business, service provision, etc.
CREANGĂ, Liliana, BUZEV, Anatoli
openaire +2 more sources
Artificial Intelligence-Based Security Authentication: Applications in Wireless Multimedia Networks
Security provisioning has become a key issue in wireless multimedia networks due to their vital roles in supporting various services. Conventional security solutions have deficiencies in computing efficiency and addressing emerging security challenges ...
Xiaoying Qiu, Zhiguo Du, Xuan Sun
doaj +1 more source
Security information management systems [PDF]
The article includes a literature outline of the scientific field of management sciences concerning issues of security management an organization. The article focuses on identifying literature in this area and describing the process in terms of the essence of management in the organization.
openaire +2 more sources
Threats and ensuring information security in crisis management systems
Constantly progressing technical and technological development has allowed the creation of IT tools, the use of which will positively affect the actions taken by decision-makers.
Michał Jurek, Marcin Staruch
doaj +1 more source
The effect of information security on e-supply chain in the UAE logistics and distribution industry
The effect of information security on the e-supply chain attracted attention to investigate its relationship with the mediating role of supply chain risk in the logistics and distribution industry in the United Arab Emirates (UAE).
M. Alshurideh+4 more
semanticscholar +1 more source
Background This study aimed to verify the mediating effect of using assistive devices as a factor that alleviates the relationship between multimorbidity and subjective health status.
Munjae Lee, Kichan Yoon, Kyu-Sung Lee
doaj +1 more source
Making a good thing better: enhancing password/PIN-based user authentication with smartwatch
Wearing smartwatches becomes increasingly popular in people’s lives. This paper shows that a smartwatch can help its bearer authenticate to a login system effectively and securely even if the bearer’s password has already been revealed.
Bing Chang+4 more
doaj +1 more source
Development of multi-agent information security management system
The issue of creating an information security system is very relevant in the world today. One of the urgent tasks is to solve the issues of effective protection of information from both external and internal threats through the creation and ...
I. P. Khavina+2 more
doaj +1 more source
Organizational practices as antecedents of the information security management performance
Purpose The purpose of this paper is to expand current knowledge about the security organizational practices and analyze its effects on the information security management performance.
Daniel Perez González+2 more
semanticscholar +1 more source
Self-Organized Network Management and Computing of Intelligent Solutions to Information Security
The network in the information age has become an important part of life, but in the process of in-depth application of computers and networks, information security issues have also become a significant obstacle to their development.
Xiaomeng Zhu
semanticscholar +1 more source