Results 1 to 10 of about 2,381,348 (304)
Problems and Priorities of Strengthening Economic Security Using it Management: Structural Modeling Approach [PDF]
The article examines the multiaspected problem of ensuring economic security. An analysis of challenges and threats to Ukraine's economic security during 2010-2019. Strategic goals of economic security have been set. The study of the relationship between
Maryna Nehrey +4 more
doaj +1 more source
The problems of development and construction of a universal consolidated strategy of interaction of IT services and information security, which is based on the study and in-depth analysis of statistics on the current situation with the interaction of ...
Serhii Lubenets +2 more
doaj +1 more source
Heuristics for evaluating IT security management tools [PDF]
The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive. However, ITSM occurs within a complex and collaborative context that involves diverse stakeholders; this makes standard usability heuristics difficult to apply. We propose a set of ITSM usability heuristics that are based
Jaferian, Pooya +3 more
openaire +2 more sources
Objectives The aim of this study is to define the nature and designation of the Integrated Multi-level Information System of the Ministry of National Defence as an integrated and unified IT system designated to support the organisational cells and units ...
Konrad Stańczyk
doaj +1 more source
IT Security Management Implementation Model in Iranian Bank Industry [PDF]
According to the complexity and differences between Iranian banks and other developed countries the appropriate actions to implement effective security management of information technology have not been taken.
Mona Vanaki +3 more
doaj +1 more source
On safety issue of industrial control systems
There are several various methodological approaches well known for the current level safety ensuring of industrial control systems. Two worlds apart methodological approaches have been considered fundamentally over the past few years: the proposal to ...
Ilya I. Livshitz
doaj +1 more source
The lack of resources that have an information technology background in handling information technology asset security risks makes it asset management in the Secretariat of the Salatiga City DPRD less optimal.
Margaretha Ayuningtyas +1 more
doaj +1 more source
Scientific Views on the Structure of the Elements in the Financial Security Management System in Economic Sectors [PDF]
It has been clarified that the process of ensuring the financial security of the economy is closely correlated with the establishment of an appropriate management system in this area.
Kunytska-Iliash Marta V.
doaj +1 more source
A process framework for information security management
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving ...
Knut Haufe +4 more
doaj +2 more sources
Predicting the Impact of Data Poisoning Attacks in Blockchain-Enabled Supply Chain Networks
As computer networks become increasingly important in various domains, the need for secure and reliable networks becomes more pressing, particularly in the context of blockchain-enabled supply chain networks.
Usman Javed Butt +5 more
doaj +1 more source

