Results 1 to 10 of about 2,389,131 (303)

An effective approach to mobile device management: Security and privacy issues associated with mobile applications

open access: yesDigital Business, 2020
Consumers and organizations often rely on permissions requested during the installation of mobile applications (apps) and on official privacy policies to determine how safe an app is and decide whether the app producer is acting ethically or not.
Darren Hayes   +2 more
doaj   +1 more source

Building an Enterprise it Security Management System [PDF]

open access: yes, 2003
Moving towards a knowledge economy, managing effectively and safely the corporate data is the key to an organisation’s survival and success. Corporative employees that technologies like computers, mobile and portable devices to access the information.
Meletis A. Belsis, Leonid Smalov
openaire   +1 more source

ORACLE DATABASE SECURITY [PDF]

open access: yes
This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development.
Cristina-Maria Titrade
core  

How to Efficiently Conduct an IT Audit – In the Perspective of Research, Consulting and Teaching [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2016
This article reflects the topic of IT audit – information technology audit – with respect to research, consulting and teaching. The expression 'IT audit' comprises information systems audits as well as information security audits combining the short-term
Gabriel Felley, Rolf Dornberger
doaj  

Human Factor Aspects in Information Security Management in the Traditional it and Cloud Computing Models

open access: yesOperations Research and Decisions, 2021
This paper attempts to classify the main areas of threats occurring in enterprises in the information management processes. Particular attention was paid to the effect of the human factor which is present in virtually every area of information security ...
Paweł Kobis
doaj  

Critical Management Issues for Implementing RFID in Supply Chain Management [PDF]

open access: yes, 2010
The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability ...
Srivastava, Bharatendu
core   +1 more source

Simulating the overload of medical processes due to system failures during a cyberattack

open access: yesBMC Medical Informatics and Decision Making
Today’s medical IT is more and more connected and network or IT system outages may impact the quality of patient treatment. IT outages from cyberattacks are particularly worrisome if attackers focus on those medical IT devices that are critical for ...
Markus Willing   +5 more
doaj   +1 more source

Leveraging Machine Learning for Sophisticated Rental Value Predictions: A Case Study from Munich, Germany

open access: yesApplied Sciences
There has been very limited research conducted to predict rental prices in the German real estate market using an AI-based approach. From a general perspective, conventional approaches struggle to handle large amounts of data and fail to consider the ...
Wenjun Chen   +3 more
doaj   +1 more source

Security risk analysis and management

open access: yesMATEC Web of Conferences, 2018
The management system of informational security is a part of the management system of an organization, that approaches the management of risk from the point of view of the involved information, approach that is used in order to set, to implement, to ...
Anton Nicolae, Nedelcu Anişor
doaj   +1 more source

The Economic Case for Cyberinsurance [PDF]

open access: yes
We present three economic arguments for cyberinsurance. First, cyberinsurance results in higher security investment, increasing the level of safety for information technology (IT) infrastructure.
Jay Kesan   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy