Results 1 to 10 of about 2,381,348 (304)

Problems and Priorities of Strengthening Economic Security Using it Management: Structural Modeling Approach [PDF]

open access: yesJournal of Information Technology Management, 2022
The article examines the multiaspected problem of ensuring economic security. An analysis of challenges and threats to Ukraine's economic security during 2010-2019. Strategic goals of economic security have been set. The study of the relationship between
Maryna Nehrey   +4 more
doaj   +1 more source

Problems of building consolidated corporation strategies for corporate information security management in the EMEA region

open access: yesВісник Харківського національного університету імені В.Н. Каразіна: Серія Міжнародні відносини, економіка, країнознавство, туризм, 2021
The problems of development and construction of a universal consolidated strategy of interaction of IT services and information security, which is based on the study and in-depth analysis of statistics on the current situation with the interaction of ...
Serhii Lubenets   +2 more
doaj   +1 more source

Heuristics for evaluating IT security management tools [PDF]

open access: yesCHI '11 Extended Abstracts on Human Factors in Computing Systems, 2011
The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive. However, ITSM occurs within a complex and collaborative context that involves diverse stakeholders; this makes standard usability heuristics difficult to apply. We propose a set of ITSM usability heuristics that are based
Jaferian, Pooya   +3 more
openaire   +2 more sources

Integrated Multi-level Information System of the Ministry of National Defence as an IT System supporting the management of military resources

open access: yesJournal of Modern Science, 2023
Objectives The aim of this study is to define the nature and designation of the Integrated Multi-level Information System of the Ministry of National Defence as an integrated and unified IT system designated to support the organisational cells and units ...
Konrad Stańczyk
doaj   +1 more source

IT Security Management Implementation Model in Iranian Bank Industry [PDF]

open access: yesJournal of Information Technology Management, 2017
According to the complexity and differences between Iranian banks and other developed countries the appropriate actions to implement effective security management of information technology have not been taken.
Mona Vanaki   +3 more
doaj   +1 more source

On safety issue of industrial control systems

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2021
There are several various methodological approaches well known for the current level safety ensuring of industrial control systems. Two worlds apart methodological approaches have been considered fundamentally over the past few years: the proposal to ...
Ilya I. Livshitz
doaj   +1 more source

Information Technology Asset Security Risk Management at the Secretariat of the Salatiga City DPRD Using ISO 31000

open access: yesJournal of Information Systems and Informatics, 2022
The lack of resources that have an information technology background in handling information technology asset security risks makes it asset management in the Secretariat of the Salatiga City DPRD less  optimal.
Margaretha Ayuningtyas   +1 more
doaj   +1 more source

Scientific Views on the Structure of the Elements in the Financial Security Management System in Economic Sectors [PDF]

open access: yesProblemi Ekonomiki, 2021
It has been clarified that the process of ensuring the financial security of the economy is closely correlated with the establishment of an appropriate management system in this area.
Kunytska-Iliash Marta V.
doaj   +1 more source

A process framework for information security management

open access: yesInternational Journal of Information Systems and Project Management, 2016
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving ...
Knut Haufe   +4 more
doaj   +2 more sources

Predicting the Impact of Data Poisoning Attacks in Blockchain-Enabled Supply Chain Networks

open access: yesAlgorithms, 2023
As computer networks become increasingly important in various domains, the need for secure and reliable networks becomes more pressing, particularly in the context of blockchain-enabled supply chain networks.
Usman Javed Butt   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy