Results 11 to 20 of about 2,381,348 (304)

Blockchain Technology and GDPR Compliance: A Comprehensive Applicability Model [PDF]

open access: yesInternational Journal of Web Research
This study investigates the potential of blockchain technology to support compliance with the General Data Protection Regulation (GDPR). By integrating blockchain's core features, such as transparency, immutability, and data encryption, with GDPR ...
Abouzar Arabsorkhi , Elham Khazaei
doaj   +1 more source

IT/IS security management with uncertain information [PDF]

open access: yesKybernetika, 2015
Summary: The paper introduces a novel proposal of a security management system destined primarily for application in the field of IT. Its core is formed by a triplet of cooperating knowledge-based (expert) systems, the knowledge bases of which consist of vague If-Then rules. The knowledge bases were created by experts on the problem domain and multiple
Klimeš, Cyril, Bartoš, Jiří
openaire   +1 more source

A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]

open access: yes, 2020
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo   +3 more
core   +2 more sources

Guidelines for designing IT security management tools [PDF]

open access: yesProceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology, 2008
An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of design guidelines for such tools. We gathered guidelines and recommendations related to IT security management tools from the literature as well as from our own prior studies ...
Jaferian, Pooya   +4 more
openaire   +1 more source

Analisis Manajemen Keamanan Informasi Menggunakan Standard ISO 27001:2005 Pada Staff IT Support Di Instansi XYZ

open access: yesJISA (Jurnal Informatika dan Sains), 2020
Information security management is very important to use, especially for educational instutions, because it is able to reduce the risk of threats to the use of information technology for educational organizations.
Titus Kristanto   +3 more
doaj   +1 more source

The Role of Implementation of Service Management and Security Frameworks in Information Technology Service Continuity [PDF]

open access: yesمطالعات مدیریت کسب و کار هوشمند, 2019
Competitive business environment and high dependency to the services has caused organizations to be evaluated based on the level of their ability in providing continuous services.
Soheila Jafarnezhad   +1 more
doaj   +1 more source

Shinren : Non-monotonic trust management for distributed systems [PDF]

open access: yes, 2010
The open and dynamic nature of modern distributed systems and pervasive environments presents significant challenges to security management. One solution may be trust management which utilises the notion of trust in order to specify and interpret security
Dong, Changyu, Dulay, Naranker
core   +4 more sources

Enterprise data security compliance strategy: A study based on typical cases [PDF]

open access: yesSHS Web of Conferences, 2023
Data security compliance management is the fundamental premise that data application does not infringe on the interests of countries, enterprises and individuals. It is an important foundation for realizing the driving role of data elements. Based on the
Xu Yinghui   +5 more
doaj   +1 more source

The Effect of the Implementation of Information Security Management System (ISMS) and Information Technology Infrastructure Library (ITIL) on the Promotion of Information Systems and Information Technology Services Continues [PDF]

open access: yesپژوهش‌های مدیریت عمومی, 2019
The purpose of this study was to investigate and analyze the factors affecting the upgrading of information systems and the continues of information technology services.
Ahmad Salehi, Zahra Vazife
doaj   +1 more source

Analytic Hierarchy Process Framework for Water Security Management in Egypt [PDF]

open access: yesPort Said Engineering Research Journal, 2022
Water security is one of the main serious constraints for development in Egypt. Furthermore, it is essential to develop strategies for the water sector in an integrated way.
Mohamed Hamed
doaj   +1 more source

Home - About - Disclaimer - Privacy