Results 31 to 40 of about 3,727,125 (329)
Background This study aimed to verify the mediating effect of using assistive devices as a factor that alleviates the relationship between multimorbidity and subjective health status.
Munjae Lee, Kichan Yoon, Kyu-Sung Lee
doaj +1 more source
Making a good thing better: enhancing password/PIN-based user authentication with smartwatch
Wearing smartwatches becomes increasingly popular in people’s lives. This paper shows that a smartwatch can help its bearer authenticate to a login system effectively and securely even if the bearer’s password has already been revealed.
Bing Chang +4 more
doaj +1 more source
Information security management in SMEs: factors of success
While the consecutive metamorphoses in the world economy changes the paradigm of doing business, the sources of success of almost every type of business transfer from tangible to intangible assets, and the information and its value becomes more and more ...
A. Ključnikov, L. Mura, David Sklenár
semanticscholar +1 more source
Threats and ensuring information security in crisis management systems
Constantly progressing technical and technological development has allowed the creation of IT tools, the use of which will positively affect the actions taken by decision-makers.
Michał Jurek, Marcin Staruch
doaj +1 more source
Management attitudes toward information security in Omani public sector organisations [PDF]
The incorporation of ICT in public sector organisations is progressing rapidly in Oman where the government sees this as a means to enhance the delivery of online services.
Al-Izki, Fathiya, Weir, George R S
core +1 more source
Self-Organized Network Management and Computing of Intelligent Solutions to Information Security
The network in the information age has become an important part of life, but in the process of in-depth application of computers and networks, information security issues have also become a significant obstacle to their development.
Xiaomeng Zhu
semanticscholar +1 more source
Organizational practices as antecedents of the information security management performance
Purpose The purpose of this paper is to expand current knowledge about the security organizational practices and analyze its effects on the information security management performance.
Daniel Perez González +2 more
semanticscholar +1 more source
Development of multi-agent information security management system
The issue of creating an information security system is very relevant in the world today. One of the urgent tasks is to solve the issues of effective protection of information from both external and internal threats through the creation and ...
I. P. Khavina +2 more
doaj +1 more source
A Formal Framework for Concrete Reputation Systems [PDF]
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions about interaction.
Krukow, K., Nielsen, M., Sassone, V.
core +2 more sources
A Study on Industrial Security Experts Demanding Forecasting in Intelligent Sensor Network
There have been efforts made to come up with a solution through advancement based on developing technological solution. However, it has come to the point where various forms of the leakage centering on people that are the subject of core asset leakage ...
Hyungwook Yang, Hyeri Kim, Hangbae Chang
doaj +1 more source

