Objective Traditional manual review processes can no longer meet the demands for real-time and accurate information assessment. To enhance the security of Shanghai rail transit system, it is necessary to implement an intelligent review mechanism for ...
FENG Junhao
doaj +1 more source
Considerations regarding the Performance Improvement of the Hospital Healthcare Services from Romania by the Implementation of an Integrated Management System [PDF]
The continuous quality improvement is an obligatory condition for the achievement and maintaining of the performance in healthcare services. Introducing the concepts of quality improvement in medical practice represents a distinctive component of the ...
Lelia Voinea, Rodica Pamfilie
core
Design and realization of a network security model [PDF]
The security of information is a key problem in the development of network technology. The basic requirements of security of information clearly include confidentiality, integrity, authentication and non-repudiation.
HAN Fangxi +4 more
core +1 more source
Review of Information Security Processes’ Maturity Models
The most commonly used maturity model as applied in the field of information security (IS) and information technologies (IT) are described. The results of a comparative analysis of selected models are given.
Natalia Georgievna Miloslavskaya +1 more
doaj
Advanced Information Security Management Evaluation System
Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis.
Heasuk Jo, Seungjoo Kim, Dongho Won
openaire +1 more source
Understanding the U.S. Generic Advertising System and Its Role in Information Management Among Commodities and Food Systems [PDF]
Understanding the U.S. Generic Advertising System and Its Role in Information Management Among Commodities and Food SystemsGeneric promotions, checkoff, demand, Agribusiness, Agricultural and Food Policy, Food Consumption/Nutrition/Food Safety, Food ...
Ward, Ronald W.
core +1 more source
Study on Database Management System Security Issues
The study is about the security system of database management (DBMS) and proposed method. Information is an essential element in database management system where the users trust service providers will have a secure system to protect and prevent their ...
Mohd Amin Mohd Yunus +3 more
doaj +1 more source
PEMBUATAN SOFTWARE SISTEM KEAMANAN PINTU DENGAN BARCODE READER BERBASIS AT89S51 MENGGUNAKAN VISUAL BASIC 6.0 [PDF]
The application of door security system with barcode reader have been designed for security system in room and help job of operator or administrator in member management easily.
Kholiq, Abdul
core
Norms, standards, models and recommendations for information security management
Information is the factor which can decide about the potential and market value of a company. An increase in the value of intellectual capital of an information-driven company requires development of an effective security management system. More and more
Karol Kreft
doaj
Practical Guidelines and Major Issues in Information Security Management Systems Implementations [PDF]
Information is a major asset for any organization, to public or private. Threatsto information and information handling resources are getting more sophisticatedcontinuously.
Lami KAYA
core

