The Information Richness Assessment of Information Security Awareness in Iranian Cloud Storage Users: Case Study of iCloud [PDF]
Cloud storage technology is attracting more attention due to the increasing implementation of technology in everyday life. The present study aims to assess Iranian iCloud users' richness of information security awareness at the three levels of knowledge,
Mahnam Zamani Kalajahi +2 more
doaj +1 more source
Threats and ensuring information security in crisis management systems
Constantly progressing technical and technological development has allowed the creation of IT tools, the use of which will positively affect the actions taken by decision-makers.
Michał Jurek, Marcin Staruch
doaj +1 more source
Management attitudes toward information security in Omani public sector organisations [PDF]
The incorporation of ICT in public sector organisations is progressing rapidly in Oman where the government sees this as a means to enhance the delivery of online services.
Al-Izki, Fathiya, Weir, George R S
core +1 more source
A Formal Framework for Concrete Reputation Systems [PDF]
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions about interaction.
Krukow, K., Nielsen, M., Sassone, V.
core +2 more sources
A Study on Industrial Security Experts Demanding Forecasting in Intelligent Sensor Network
There have been efforts made to come up with a solution through advancement based on developing technological solution. However, it has come to the point where various forms of the leakage centering on people that are the subject of core asset leakage ...
Hyungwook Yang, Hyeri Kim, Hangbae Chang
doaj +1 more source
Development of multi-agent information security management system
The issue of creating an information security system is very relevant in the world today. One of the urgent tasks is to solve the issues of effective protection of information from both external and internal threats through the creation and ...
I. P. Khavina +2 more
doaj +1 more source
INVESTIGATION OF CHANGES IN THE LEVEL OF NETWORK SECURITY BASED ON A COGNITIVE APPROACH
A study was conducted on the impact of the most significant threats on the level of network security based on the examination of impulse processes on a fuzzy cognitive map.
Olha Saliieva, Yurii Yaremchuk
doaj +1 more source
The public security patrol path planning plays a key role in public security work, however, existing ones has varying degrees of shortcomings. To address these shortcomings, this paper proposes a public security patrol path planning recommendation method
Dongxing Wang +4 more
doaj +1 more source
Interpreting the management of information systems security [PDF]
The management of adverse events within organisations has become a pressing issue as the perceptions of risk continue to heighten. However the basic need for developing secure information systems has remained unfulfilled.
Dhillon, Gurpreet
core
A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo +3 more
core +2 more sources

