Results 1 to 10 of about 2,389,131 (303)
Consumers and organizations often rely on permissions requested during the installation of mobile applications (apps) and on official privacy policies to determine how safe an app is and decide whether the app producer is acting ethically or not.
Darren Hayes +2 more
doaj +1 more source
Building an Enterprise it Security Management System [PDF]
Moving towards a knowledge economy, managing effectively and safely the corporate data is the key to an organisation’s survival and success. Corporative employees that technologies like computers, mobile and portable devices to access the information.
Meletis A. Belsis, Leonid Smalov
openaire +1 more source
ORACLE DATABASE SECURITY [PDF]
This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development.
Cristina-Maria Titrade
core
How to Efficiently Conduct an IT Audit – In the Perspective of Research, Consulting and Teaching [PDF]
This article reflects the topic of IT audit – information technology audit – with respect to research, consulting and teaching. The expression 'IT audit' comprises information systems audits as well as information security audits combining the short-term
Gabriel Felley, Rolf Dornberger
doaj
This paper attempts to classify the main areas of threats occurring in enterprises in the information management processes. Particular attention was paid to the effect of the human factor which is present in virtually every area of information security ...
Paweł Kobis
doaj
Critical Management Issues for Implementing RFID in Supply Chain Management [PDF]
The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability ...
Srivastava, Bharatendu
core +1 more source
Simulating the overload of medical processes due to system failures during a cyberattack
Today’s medical IT is more and more connected and network or IT system outages may impact the quality of patient treatment. IT outages from cyberattacks are particularly worrisome if attackers focus on those medical IT devices that are critical for ...
Markus Willing +5 more
doaj +1 more source
There has been very limited research conducted to predict rental prices in the German real estate market using an AI-based approach. From a general perspective, conventional approaches struggle to handle large amounts of data and fail to consider the ...
Wenjun Chen +3 more
doaj +1 more source
Security risk analysis and management
The management system of informational security is a part of the management system of an organization, that approaches the management of risk from the point of view of the involved information, approach that is used in order to set, to implement, to ...
Anton Nicolae, Nedelcu Anişor
doaj +1 more source
The Economic Case for Cyberinsurance [PDF]
We present three economic arguments for cyberinsurance. First, cyberinsurance results in higher security investment, increasing the level of safety for information technology (IT) infrastructure.
Jay Kesan +2 more
core +1 more source

