Results 31 to 40 of about 2,116,286 (342)

The Effective Factors on Continuity of Corporate Information Security Management: Based on TOE Framework

open access: yesInformation, 2021
In the Fourth Industrial Revolution era, data-based business management activities among enterprises proliferated are mainly based on digital transformation.
Yongho Kim, Boyoung Kim
doaj   +1 more source

INVESTIGATION OF CHANGES IN THE LEVEL OF NETWORK SECURITY BASED ON A COGNITIVE APPROACH

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska
A study was conducted on the impact of the most significant threats on the level of network security based on the examination of impulse processes on a fuzzy cognitive map.
Olha Saliieva, Yurii Yaremchuk
doaj   +1 more source

Information Security Management

open access: yes, 2022
From the definition of words based on the rule NBR ISO/IEC 17799:2001, and a company case study, this report searches to help the Information Security understanding, and also to get the conscience of the importance one should give to it, especially these days.
openaire   +1 more source

A Formal Framework for Concrete Reputation Systems [PDF]

open access: yes, 2005
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions about interaction.
Krukow, K., Nielsen, M., Sassone, V.
core   +2 more sources

Public security patrol path planning recommendation method based on wolf-pack optimization algorithm using DAF and BRS

open access: yesScientific Reports
The public security patrol path planning plays a key role in public security work, however, existing ones has varying degrees of shortcomings. To address these shortcomings, this paper proposes a public security patrol path planning recommendation method
Dongxing Wang   +4 more
doaj   +1 more source

Risk Prediction of Theft Crimes in Urban Communities: An Integrated Model of LSTM and ST-GCN

open access: yesIEEE Access, 2020
Urbanization has been speeding up social and economic transformations in urban communities, the smallest social units in a city. However, urbanization brings challenges to urban management and security.
Xinge Han   +4 more
doaj   +1 more source

Design and evaluation of a mobile-based nutrition education application for infertile women in Iran

open access: yesBMC Medical Informatics and Decision Making, 2022
Background The prevalence of infertility in Iran is higher than the world average. Furthermorte, education and nutrition are among the effective factors in improving the quality of life of women with infertility.
Mostafa Langarizadeh   +2 more
doaj   +1 more source

Interpreting the management of information systems security [PDF]

open access: yes, 1995
The management of adverse events within organisations has become a pressing issue as the perceptions of risk continue to heighten. However the basic need for developing secure information systems has remained unfulfilled.
Dhillon, Gurpreet
core  

occumb: An R package for site occupancy modeling of eDNA metabarcoding data

open access: yesPopulation Ecology, EarlyView.
This study introduces a new R package, occumb, for the convenient application of site occupancy modeling using environmental DNA (eDNA) metabarcoding data. We outline a data analysis workflow, including data setup, model fitting, model assessment, and comparison of potential study settings based on model predictions, all of which can be performed using
Keiichi Fukaya, Yuta Hasebe
wiley   +1 more source

Leveraging Taxonomical Engineering for Security Baseline Compliance in International Regulatory Frameworks

open access: yesFuture Internet, 2023
A surge in successful Information Security (IS) breaches targeting Research and Education (R&E) institutions highlights a pressing need for enhanced protection.
Šarūnas Grigaliūnas   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy