Results 31 to 40 of about 2,067,027 (330)

Self-Organized Network Management and Computing of Intelligent Solutions to Information Security

open access: yesJournal of Organizational and End User Computing, 2021
The network in the information age has become an important part of life, but in the process of in-depth application of computers and networks, information security issues have also become a significant obstacle to their development.
Xiaomeng Zhu
semanticscholar   +1 more source

Secure Web-Based Student Information Management System [PDF]

open access: yesarXiv, 2022
The reliability and success of any organization such as academic institution rely on its ability to provide secure, accurate and timely data about its operations. Erstwhile managing student information in academic institution was done through paper-based information system, where academic records are documented in several files that are kept in shelves.
arxiv  

Organizational practices as antecedents of the information security management performance

open access: yesInformation Technology and People, 2019
Purpose The purpose of this paper is to expand current knowledge about the security organizational practices and analyze its effects on the information security management performance.
Daniel Perez González   +2 more
semanticscholar   +1 more source

Development of multi-agent information security management system

open access: yesLaw and Safety, 2022
The issue of creating an information security system is very relevant in the world today. One of the urgent tasks is to solve the issues of effective protection of information from both external and internal threats through the creation and ...
I. P. Khavina   +2 more
doaj   +1 more source

The Emperor's New Autofill Framework: A Security Analysis of Autofill on iOS and Android [PDF]

open access: yes, 2021
Password managers help users more effectively manage their passwords, encouraging them to adopt stronger passwords across their many accounts. In contrast to desktop systems where password managers receive no system-level support, mobile operating systems provide autofill frameworks designed to integrate with password managers to provide secure and ...
arxiv   +1 more source

Social networks as an apparatus for managing of information security in the digital economy [PDF]

open access: yesarXiv, 2021
The paper aims to present a new apparatus for managing of the information security of the digital economy with using of social networks. A general problem for optimization of the information security management for participants in the digital economy is formulated.
arxiv  

A Novel Blockchain-based Trust Model for Cloud Identity Management [PDF]

open access: yes16th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2018), 2019
Secure and reliable management of identities has become one of the greatest challenges facing cloud computing today, mainly due to the huge number of new cloud-based applications generated by this model, which means more user accounts, passwords, and personal information to provision, monitor, and secure.
arxiv   +1 more source

A Study on Industrial Security Experts Demanding Forecasting in Intelligent Sensor Network

open access: yesInternational Journal of Distributed Sensor Networks, 2015
There have been efforts made to come up with a solution through advancement based on developing technological solution. However, it has come to the point where various forms of the leakage centering on people that are the subject of core asset leakage ...
Hyungwook Yang, Hyeri Kim, Hangbae Chang
doaj   +1 more source

Risk Prediction of Theft Crimes in Urban Communities: An Integrated Model of LSTM and ST-GCN

open access: yesIEEE Access, 2020
Urbanization has been speeding up social and economic transformations in urban communities, the smallest social units in a city. However, urbanization brings challenges to urban management and security.
Xinge Han   +4 more
doaj   +1 more source

Detecting and Characterizing Propagation of Security Weaknesses in Puppet-based Infrastructure Management [PDF]

open access: yesarXiv, 2022
Despite being beneficial for managing computing infrastructure automatically, Puppet manifests are susceptible to security weaknesses, e.g., hard-coded secrets and use of weak cryptography algorithms. Adequate mitigation of security weaknesses in Puppet manifests is thus necessary to secure computing infrastructure that are managed with Puppet ...
arxiv  

Home - About - Disclaimer - Privacy