Results 31 to 40 of about 3,727,125 (329)

Subjective health status of multimorbidity: verifying the mediating effects of medical and assistive devices

open access: yesInternational Journal for Equity in Health, 2018
Background This study aimed to verify the mediating effect of using assistive devices as a factor that alleviates the relationship between multimorbidity and subjective health status.
Munjae Lee, Kichan Yoon, Kyu-Sung Lee
doaj   +1 more source

Making a good thing better: enhancing password/PIN-based user authentication with smartwatch

open access: yesCybersecurity, 2018
Wearing smartwatches becomes increasingly popular in people’s lives. This paper shows that a smartwatch can help its bearer authenticate to a login system effectively and securely even if the bearer’s password has already been revealed.
Bing Chang   +4 more
doaj   +1 more source

Information security management in SMEs: factors of success

open access: yesEntrepreneurship and Sustainability Issues, 2019
While the consecutive metamorphoses in the world economy changes the paradigm of doing business, the sources of success of almost every type of business transfer from tangible to intangible assets, and the information and its value becomes more and more ...
A. Ključnikov, L. Mura, David Sklenár
semanticscholar   +1 more source

Threats and ensuring information security in crisis management systems

open access: yesNowoczesne Systemy Zarządzania, 2019
Constantly progressing technical and technological development has allowed the creation of IT tools, the use of which will positively affect the actions taken by decision-makers.
Michał Jurek, Marcin Staruch
doaj   +1 more source

Management attitudes toward information security in Omani public sector organisations [PDF]

open access: yes, 2016
The incorporation of ICT in public sector organisations is progressing rapidly in Oman where the government sees this as a means to enhance the delivery of online services.
Al-Izki, Fathiya, Weir, George R S
core   +1 more source

Self-Organized Network Management and Computing of Intelligent Solutions to Information Security

open access: yesJournal of Organizational and End User Computing, 2021
The network in the information age has become an important part of life, but in the process of in-depth application of computers and networks, information security issues have also become a significant obstacle to their development.
Xiaomeng Zhu
semanticscholar   +1 more source

Organizational practices as antecedents of the information security management performance

open access: yesInformation Technology and People, 2019
Purpose The purpose of this paper is to expand current knowledge about the security organizational practices and analyze its effects on the information security management performance.
Daniel Perez González   +2 more
semanticscholar   +1 more source

Development of multi-agent information security management system

open access: yesLaw and Safety, 2022
The issue of creating an information security system is very relevant in the world today. One of the urgent tasks is to solve the issues of effective protection of information from both external and internal threats through the creation and ...
I. P. Khavina   +2 more
doaj   +1 more source

A Formal Framework for Concrete Reputation Systems [PDF]

open access: yes, 2005
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions about interaction.
Krukow, K., Nielsen, M., Sassone, V.
core   +2 more sources

A Study on Industrial Security Experts Demanding Forecasting in Intelligent Sensor Network

open access: yesInternational Journal of Distributed Sensor Networks, 2015
There have been efforts made to come up with a solution through advancement based on developing technological solution. However, it has come to the point where various forms of the leakage centering on people that are the subject of core asset leakage ...
Hyungwook Yang, Hyeri Kim, Hangbae Chang
doaj   +1 more source

Home - About - Disclaimer - Privacy