Results 61 to 70 of about 1,942,206 (195)

Research on Security Enhancement for Abnormal Content Release in Unified Audio Video Information service Systems

open access: yesChengshi guidao jiaotong yanjiu
Objective Traditional manual review processes can no longer meet the demands for real-time and accurate information assessment. To enhance the security of Shanghai rail transit system, it is necessary to implement an intelligent review mechanism for ...
FENG Junhao
doaj   +1 more source

Considerations regarding the Performance Improvement of the Hospital Healthcare Services from Romania by the Implementation of an Integrated Management System [PDF]

open access: yes
The continuous quality improvement is an obligatory condition for the achievement and maintaining of the performance in healthcare services. Introducing the concepts of quality improvement in medical practice represents a distinctive component of the ...
Lelia Voinea, Rodica Pamfilie
core  

Design and realization of a network security model [PDF]

open access: yes, 2002
The security of information is a key problem in the development of network technology. The basic requirements of security of information clearly include confidentiality, integrity, authentication and non-repudiation.
HAN Fangxi   +4 more
core   +1 more source

Review of Information Security Processes’ Maturity Models

open access: yesБезопасность информационных технологий, 2015
The most commonly used maturity model as applied in the field of information security (IS) and information technologies (IT) are described. The results of a comparative analysis of selected models are given.
Natalia Georgievna Miloslavskaya   +1 more
doaj  

Advanced Information Security Management Evaluation System

open access: yesKSII Transactions on Internet and Information Systems, 2011
Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis.
Heasuk Jo, Seungjoo Kim, Dongho Won
openaire   +1 more source

Understanding the U.S. Generic Advertising System and Its Role in Information Management Among Commodities and Food Systems [PDF]

open access: yes
Understanding the U.S. Generic Advertising System and Its Role in Information Management Among Commodities and Food SystemsGeneric promotions, checkoff, demand, Agribusiness, Agricultural and Food Policy, Food Consumption/Nutrition/Food Safety, Food ...
Ward, Ronald W.
core   +1 more source

Study on Database Management System Security Issues

open access: yesJOIV: International Journal on Informatics Visualization, 2017
The study is about the security system of database management (DBMS) and proposed method. Information is an essential element in database management system where the users trust service providers will have a secure system to protect and prevent their ...
Mohd Amin Mohd Yunus   +3 more
doaj   +1 more source

PEMBUATAN SOFTWARE SISTEM KEAMANAN PINTU DENGAN BARCODE READER BERBASIS AT89S51 MENGGUNAKAN VISUAL BASIC 6.0 [PDF]

open access: yes, 2008
The application of door security system with barcode reader have been designed for security system in room and help job of operator or administrator in member management easily.
Kholiq, Abdul
core  

Norms, standards, models and recommendations for information security management

open access: yesContemporary Economy, 2010
Information is the factor which can decide about the potential and market value of a company. An increase in the value of intellectual capital of an information-driven company requires development of an effective security management system. More and more
Karol Kreft
doaj  

Practical Guidelines and Major Issues in Information Security Management Systems Implementations [PDF]

open access: yes, 2013
Information is a major asset for any organization, to public or private. Threatsto information and information handling resources are getting more sophisticatedcontinuously.
Lami KAYA
core  

Home - About - Disclaimer - Privacy